1 |
The method in which unauthorized access is prevented by providing a key,badge,token or a plastic card to authorized users is called |
What you have
What you know
What you do
What you are
|
2 |
MS-Word and MS-Excel are: |
Operating systems
Application software
High level languages
Low level languages
|
3 |
The information contained in this type of memory is lost power is switched off: |
Disk Memory
Read only memory
Random access memory
Magnetic memory
|
4 |
Which of the following is/are part/parts of the CPU? |
Control unit
Arithmetic & logical unit
Registers
All of the above
|
5 |
Which of the following is not a function of CPU in the computer system? |
Perform logical operation
Perform arithmetic operation
Control input/output devices
Think
|
6 |
Data and programs that are not being executed by the computer are stored in |
Cache memory
Main memory
Hard disk
Printer
|
7 |
A computer bus is |
A register
Parallel metal lines
ALU and CU
A computer clock
|
8 |
CPU is an example of |
Software
Hardware
A program
An output
|
9 |
According to the design proposed by,,,,,,,,,and his team instructions are stored in the memory of the computer. |
Von Neumann
Alen Mathison Turing
Al-Khuwarizmi
Intel Moor
|
10 |
Which of the following is an example of a package software? |
Microsoft Word
Microsoft Excel
Micro Power Point
All of the above
|