Computers Basic MCQs Set-29
Hello Friends,this section is specifically dedicated to those users who wants to clear the fundamental of computer science. Here we have included IT Engineering Basic multiple choice questions with answers(MCQs). Students can expect some questions from this section for sure in the respective university exams,competitive exams and interviews.So practice it well and enjoy with good score you expect.
1. —— refers to electronic trespassing or criminal hacking.
- Cracking
- Jacking
- Spoofing
- Smarming
"Cracking" refers to the act of breaking or bypassing the security measures of computer systems, software, or networks with malicious intent. It involves unauthorized access to protected systems, often for purposes such as gaining control, stealing sensitive information, or carrying out illegal activities.
Crackers, also known as malicious hackers or black hat hackers, exploit vulnerabilities in computer systems and networks to gain unauthorized access. They may employ various techniques and tools to compromise security defenses, such as exploiting software vulnerabilities, using password cracking methods, or conducting network-based attacks.
Cracking activities can include:
1. Password Cracking: Attempting to decipher or guess passwords to gain unauthorized access to user accounts or systems.
2. Software Cracking: Breaking the copy protection or licensing mechanisms of software to use it without authorization or distribute it illegally.
3. Network Cracking: Breaking into computer networks or systems to gain control, monitor network traffic, or carry out attacks on other connected systems.
4. Reverse Engineering: Analyzing and manipulating software or hardware to understand its functionality, bypass security measures, or extract proprietary information.
5. Unauthorized Distribution and Piracy: Illegally sharing or distributing copyrighted software, media, or other digital content.
It's important to note that cracking is an illegal activity and is considered a form of cybercrime. The unauthorized access and manipulation of computer systems, networks, or software can have serious legal and ethical consequences. Organizations and individuals employ various security measures, such as firewalls, encryption, and access controls, to protect against cracking attempts and safeguard their digital assets.
2. The first electronic computer was developed by
- J.V. Attansoff
- Bill Gates
- Simur Cray
- Winton Serf
The first electronic computer, known as the "Electronic Numerical Integrator and Computer" (ENIAC), was developed by J. Presper Eckert and John W. Mauchly. ENIAC was built at the University of Pennsylvania's Moore School of Electrical Engineering and was completed in 1945.
ENIAC was a groundbreaking achievement in the history of computing. It was a large machine, weighing about 30 tons and occupying a significant amount of floor space. ENIAC used electronic vacuum tubes as its primary components and was designed to perform numerical calculations for scientific and military applications.
ENIAC was not a stored-program computer like modern computers but was instead programmed by physically rewiring its circuits. This required a considerable amount of time and effort to change the program or perform different calculations.
ENIAC was used for various purposes, including calculations related to artillery trajectory, atomic energy research, weather prediction, and cryptography. It played a crucial role in scientific and engineering computations, marking a significant milestone in the development of electronic computing.
The successful development and operation of ENIAC paved the way for further advancements in electronic computing, leading to the development of subsequent generations of computers with increased speed, efficiency, and programmability.
3. Snowball is an/a———
- Operating system
- HLL
- Software
- Search engine
Snowball is a high-level programming language (HLL). Snowball, also known as Snowball programming language, was developed in the 1960s by Martin Richards. It was designed for text processing and language translation tasks.
Snowball provides a simple and expressive syntax for manipulating text and performing string-based operations. It was specifically created to facilitate the development of programs related to language processing and information retrieval. Snowball allows programmers to write concise and efficient code for tasks such as stemming, stemming algorithms, and search algorithms.
One notable feature of Snowball is its support for stemming, which is the process of reducing words to their base or root form. Stemming is often used in search engines and natural language processing applications to improve search accuracy and language analysis.
Snowball has influenced the development of other programming languages, particularly in the field of information retrieval and natural language processing. It provides a higher-level abstraction for working with textual data, making it easier to write programs for tasks related to text manipulation, indexing, and linguistic analysis.
It's worth noting that Snowball is sometimes referred to as "Snowball I" to distinguish it from a newer programming language called "Snowball II" or "Snowball SNOBOL4," which is a different language altogether.
In summary, Snowball is a high-level programming language designed for text processing and language-related tasks. It offers features specifically tailored to working with textual data and has been influential in the development of languages in the field of information retrieval and natural language processing.
4. Switching device of fifth generation computer is——–
- Vacuum tubes
- Transistors
- IC
- VLSI
VLSI stands for Very Large Scale Integration, and it refers to the technology of integrating a large number of transistors and other electronic components onto a single integrated circuit (IC) or chip.
In the context of fifth-generation computers, VLSI technology would likely play a significant role. The concept of fifth-generation computers envisions highly advanced computing systems that would surpass the capabilities of current computers and incorporate innovative technologies.
VLSI technology enables the creation of complex and powerful integrated circuits that can accommodate a vast number of transistors and other electronic components. By integrating a large number of components onto a single chip, VLSI technology allows for increased computational power, reduced size, improved energy efficiency, and enhanced performance.
In the context of fifth-generation computers, VLSI technology could be utilized to design and manufacture advanced processors, memory systems, and other critical components. These components would enable the efficient execution of complex computational tasks, including artificial intelligence, machine learning, natural language processing, advanced simulations, and more.
VLSI technology has played a crucial role in advancing the capabilities of modern computers, and it would continue to be a fundamental aspect of future computing systems, including potential fifth-generation computers. However, it's important to note that the realization of fifth-generation computers is still largely speculative, and the specific technologies and advancements involved would depend on the progress and innovations in the field at that time.
5. ———- computers operates essentially by counting
- Portable computer
- Hybrid computer
- Analog computer
- Digital computer
Digital computers operate essentially by counting using a system called binary arithmetic.
Binary arithmetic is a numerical system that uses only two digits, 0 and 1, to represent numbers. In a digital computer, information is processed and stored in binary form. Each digit in a binary number is referred to as a "bit" (short for binary digit), which can represent either a 0 or a 1.
The binary counting system follows the same principles as the decimal counting system used by humans, but with a base of 2 instead of 10. In the decimal system, each digit represents a power of 10, such as units, tens, hundreds, etc. In the binary system, each digit represents a power of 2, such as 1, 2, 4, 8, 16, and so on.
Using binary arithmetic, computers can perform various operations, including addition, subtraction, multiplication, and division. These operations are carried out by manipulating the binary representations of numbers using logic gates and circuits within the computer's hardware.
Binary counting and arithmetic provide the foundation for digital data representation and processing in computers. By using binary numbers, computers can represent and manipulate vast amounts of information, perform complex calculations, and execute a wide range of tasks across different applications and domains.
6. ———- computer is small general purpose micro computer, but larger than portable computer
- Hybrid
- Digital
- Desktop
- Laptop
The term you are referring to is "laptop computer."
A laptop computer, often referred to as a "laptop" or "notebook," is a small, portable computer that is larger than a portable computer but smaller than a desktop computer. Laptops are designed to provide the functionality of a desktop computer in a compact and portable form factor, making them convenient for mobile use.
Laptops typically feature a built-in keyboard, display screen, and pointing device (such as a touchpad or trackpad). They are self-contained units that integrate all the essential components of a computer, including the central processing unit (CPU), memory, storage, and connectivity options.
Laptops offer a balance between portability and performance. While they are smaller and lighter than desktop computers, they still provide sufficient processing power and storage capacity to handle a wide range of tasks, including web browsing, productivity applications, multimedia playback, and even demanding software applications such as photo and video editing.
Laptop computers are widely used by professionals, students, and individuals who require a portable computing solution. They provide the flexibility to work or access information from various locations, whether at home, in the office, or on the go. Laptops also offer battery power, allowing users to use them without being constantly connected to a power source.
It's worth noting that the term "laptop" is often used interchangeably with "notebook" to describe this type of portable computer. However, there may be slight differences in design and features between different laptop models, and manufacturers may use these terms differently.
7. Cathode Ray Tube is a form of…….
- Keyboard
- Mouse
- Monitor
- Mother board
Cathode Ray Tube (CRT) is a form of display technology.
A Cathode Ray Tube is a vacuum tube that contains an electron gun and a fluorescent screen. It was a widely used display technology in older television sets and computer monitors before the advent of flat-panel displays like LCD (Liquid Crystal Display) and LED (Light Emitting Diode) screens.
CRT technology works by emitting a stream of electrons from an electron gun towards the fluorescent screen. The electron beam is controlled and manipulated using magnetic fields generated by coils surrounding the tube. When the electron beam strikes the phosphor-coated screen, it causes the phosphors to emit light, which creates the visible image.
CRTs offer several advantages, including:
1. Good Color Reproduction: CRTs generally have excellent color reproduction capabilities and can display a wide range of colors accurately.
2. High Contrast Ratio: CRTs typically provide high contrast ratios, allowing for better differentiation between dark and light areas on the screen.
3. Wide Viewing Angles: CRTs offer wide viewing angles, meaning the displayed image remains consistent even when viewed from different angles.
4. Fast Response Time: CRTs have fast response times, making them suitable for applications that require quick image updates, such as gaming or fast-moving videos.
However, CRTs also have some disadvantages, including their large and bulky design, significant power consumption, and the presence of harmful substances like lead in their construction.
With the development of more compact, energy-efficient, and lightweight display technologies like LCD and LED, CRTs have become less common and are mostly found in older devices or specialized applications.
8. Trackball is a………..
- Input device
- Output device
- Programming language
- Software
A trackball is a pointing device that is used to control the movement of a cursor or pointer on a computer screen. It is similar to a mouse but operates differently in terms of its design and functionality.
A trackball consists of a ball housed in a socket, which can be rotated in any direction by the user's fingers or palm. The movement of the ball translates into corresponding cursor movement on the screen. The trackball is typically surrounded by buttons that can be clicked to perform various actions, such as selecting objects or activating functions.
Trackballs are available in various sizes and configurations. Some trackballs are integrated into keyboards, while others are standalone devices that can be connected to a computer via USB or wireless connections
9. …………. computer is a medium sized computer
- Micro
- Mainframe
- Super
- Mini
The term you are referring to is "minicomputer."
A minicomputer, also known as a midrange computer, is a medium-sized computer system that falls between mainframe computers and microcomputers (personal computers) in terms of processing power, size, and capabilities. Minicomputers emerged in the 1960s and 1970s as a more affordable and compact alternative to mainframe computers.
Minicomputers were designed to provide computing power and resources to small to medium-sized businesses, research institutions, and scientific laboratories. They were more accessible in terms of cost and physical space requirements compared to mainframes, while still offering significant processing capabilities.
Some key features and characteristics of minicomputers include:
1. Size and Portability: Minicomputers were smaller in size compared to mainframes, typically fitting within a few cabinets or racks. They were more portable and required less dedicated space.
2. Processing Power: Minicomputers offered moderate to high processing power, capable of handling complex calculations and running multiple concurrent tasks or user sessions.
3. Multiuser and Multitasking: Minicomputers supported multiple users and offered multitasking capabilities, allowing several users to access the system simultaneously and run different programs concurrently.
4. Peripheral Support: Minicomputers could connect to a wide range of peripheral devices, such as disk drives, printers, and terminals, to support data storage, input, and output.
5. Operating Systems: Minicomputers had their own dedicated operating systems, which provided system management, resource allocation, and user interface capabilities.
Over time, advancements in microcomputer technology, including the development of powerful desktop and server-class computers, contributed to the decline of minicomputers. Many of the functions and capabilities that were once exclusive to minicomputers became accessible on smaller-scale systems.
However, the term "minicomputer" is still used in certain contexts to describe medium-sized computing systems, such as specialized servers or high-performance computing clusters, that are more powerful and capable than personal computers but fall short of the scale and complexity of mainframe systems.
10. ……….. computer are of large size
- Micro
- Mainframe
- Super
- Mini
The term you are referring to is "mainframe computer."
Mainframe computers are large-scale computer systems designed to handle vast amounts of data processing and support multiple users concurrently. They are known for their high performance, reliability, and scalability, making them suitable for organizations that require robust computing capabilities.
Mainframe computers are characterized by their physical size, as they typically occupy dedicated rooms or data centers due to their extensive hardware components. They consist of multiple processors, extensive memory capacity, high-speed input/output channels, and specialized operating systems.
Mainframes are capable of processing large volumes of transactions and supporting numerous users simultaneously. They are often used in industries such as banking, finance, government, healthcare, and large-scale enterprises that handle critical data and require high levels of processing power and reliability.
Some key features and uses of mainframe computers include:
1. Batch Processing: Mainframes excel at handling batch processing, where large volumes of data are processed in batches without the need for immediate user interaction. This is commonly used for tasks such as billing, payroll processing, and large-scale data processing.
2. Online Transaction Processing (OLTP): Mainframes are capable of handling real-time transaction processing, providing rapid response times for online transaction systems like banking, airline reservations, and e-commerce platforms.
3. Virtualization and Partitioning: Mainframes have advanced virtualization capabilities, allowing them to run multiple operating systems and partition resources to support different workloads concurrently.
4. High Availability and Reliability: Mainframes are designed with redundant components and failover mechanisms to ensure high availability and minimize downtime. They often incorporate features like hot-swappable components and extensive backup and recovery options.
While mainframe computers are large and complex, they continue to be relevant and widely used in industries that require massive data processing, security, and high availability. They complement other computing platforms and are often integrated into modern hybrid IT infrastructures to handle critical and demanding workloads.