ICT Related TRIVIAS

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

ICT related TRIVIAS 1.

It took the radio 38 years and the


television only 13, but the internet reached 50
1. Over 6,000 new computer viruses are created million users in just four years.
and released every month. 90% of emails 2. The computer mouse was invented by
contain some form of malware! Doug Engelbart in 1963. It was made out of
2. The Firefox logo isn’t a fox… it’s a red wood (weird, huh).
panda! 3. In 2009 the average number of Internet
3. Samsung is 38 years and 1 month older than transactions per second was 2,000. The total
Apple. number of goods sold was worth $60 billion.
4. One Petabyte (PB) = 1024 (TB). To put this 5. Rear Admiral Grace Hopper, the first
in perspective, a 50PB hard drive could hold the female admiral in the US Navy is also known in
entire written works of mankind from the the computer world for creating the popular
beginning of recorded history in all languages. programming language COBOL. She also came
5. Alexa is always listening to your up with the term ‘debugging’ after removing a
conversations. Alexa stores all of your dialogue moth from a computer.
history in the cloud to improve the Alexa 6. The computing power in today’s cell phones
experience. is much higher than the processing power of all
6. On average, people read 10% slower from the computers in the Apollo 11 Lunar Lander
a screen than from paper. that put 2 men on the moon.
7. The first computer mouse was made in 7. The two main components in IT
1964 by Doug Engelbart. It was rectangular and (Information Technology) are hardware and
made from wood! software. But there is also a lesser known ‘grey’
8. On average, there is only one reply per 12 component. This is the software that is stored in
million spam emails sent. hardware and cannot be modified easily. It is
9. Surgeons that grew up playing video known as ‘firmware’.
games more than three hours per week make 8. There are over 20 billion web pages on the
37% fewer errors and have a 42% faster internet, and that number is rapidly growing
completion rate when performing laparoscopic every day. Also, there are over 2 billion internet
surgery and suturing. users worldwide at present.
10. NASA’s internet speed is 91 GB per 9. RIM (the BlackBerry operating system
second. company) co-CEO and co-founder Mike
11. Until 2010, carrier pigeons were faster than Lazaridis dropped out of college to start his own
the internet. company. He did so after reading Microsoft’s
12. In 1971, the first ever computer virus was founder, Bill Gates’, book.
developed. Named Creeper, it was made as an 10. The first hard disk drive was created in
experiment just to see how it spread between 1979 by Seagate. Its capacity was a whopping
computers. The virus simply displayed the (not) 5 MB.
message: “I’m the creeper, catch me if you can!” 11. HP, Google, Microsoft, and Apple have
13. The foundation of the internet began in one thing in common – apart from the obvious
1969, when the US Department of Defense that they are IT companies. They were all
created ARPAnet, a project to allow military started in garages.
personnel to communicate with each other in an 12. The 12 engineers at IBM that developed
emergency. the IBM PC had a code name – “The Dirty
14. By 2011, the number of internet users Dozen”.
worldwide reached 2.2 billion—about one third 13. The first and still the oldest domain name to
of the world's population. be registered is Symbolics.com, it was created
15. To store all of the information on the on March 15th, 1985.
internet, you would need over 1 billion DVDs or 14. Most Central Processing Units (CPU’s) are
200 million Bluray discs. sold as a bit slower than they actually run. By
over-clocking them you can get them to run
faster – for free.
15. The first microprocessor was the 4004,
Intel had initially designed it for a calculator, and
no one had any idea to what it would lead.
1. ENIAC was the first electronic computer. It weighed over 27 tons.
2. The computer mouse was invented in 1964. The first one was made of wood.
3. Ada Lovelace was the first computer programmer. She lived in the 1800s.
4. Charles Babbage invented the parts for the modern computer in 1833.
5. Johann Henrich von Muller designed a computer in 1786 but it was not built.
6. The first computer virus was created in 1971. It was called "The Creeper".
7. The fastest spreading computer virus, created in 2004, was called MyDoom.
8. According to McAfee, 100,000 new malware programs are created every day.
9. 92% of malware comes by email so think twice before opening attachments.
10. In 2017 a computer virus hit the NHS causing £92 million of damage.
11. Until 2012 "password" was the most common password. It's now "123456".
12. 59% of people have just one password which they use everywhere.
13. Just 20 passwords make up 10% of the millions in use.
14. The password to launch America's nuclear missiles was set to "00000000".
15. In 1999 hackers logged into Hotmail accounts by using the password "eh".
16. In 2015 hackers got records of every US govt employee for the past 50 years.
17. Computer security consultant Kevin Mitnick served 5 years in prison for hacking.
18. In 2016 a 15-year-old hacked the FBI and released information on its officers.
19. Julian Assange started hacking when he was 16 years old. His name was Mendax.
20. The personal information of 145 million eBay users was taken by hackers in 2014.
21. Almost 3 million emails are sent every second. That's 250 billion a day!
22. On average people spend 5.4 hours a day checking emails.
23. 28% of emails are spam. In 2008 93% of emails were spam!
24. Hotmail and rocketmail were the first free email providers, both launched in 1996.
25. The first email was sent by engineer Ray Tomlinson in 1971.
26. It used to be possible to set your language on Facebook to "pirate".
27. The search engine Google was originally called "BackRub".
28. A man accidentally bought Google for $12. He owned it for one minute.
29. On average we spend 142 minutes a day on social media.
30. Facebook is the most popular social media site. It has over 2.5 billion users.
31. 92% of web developers are men according to a recent survey.
32. Microsoft is the largest software company. In 2020 it made $138.6 billion.
33. Java is the most popular programming languages. 59% of developers use it.
34. Apple's original logo was Isaac newton leant against an apple tree.
35. IBM was founded in 1896 with the name "Tabulating Machine Company".
36. In the 2008 presidential election, Barack Obama advertised in 18 games.
37. A gene that separates your right brain from the left is called "sonic hedgehog".
38. In 1993 Super Mario Bros. was the first video game to be made into a movie,
39. The Sega Saturn was the first console games could be saved on.
40. MUD (Multi-User Dungeon) was the first online game. It was created in 1978.
41. The first wireless internet connection was developed in 1990.
42. By 2025 a total of 75.44 billion devices will be connected to the internet.
43. Items connected to the internet include umbrellas, cutlery, and tails!
44. We spend an average of 6 hours and 42 minutes online each day.
45. Google does 70,000 search queries every second or 5.8 billion per day.
46. Computers become hot as you use them, so they have fans inside to cool them.
47. The motherboard is arguably the most important piece of computer hardware.
48. The first computer with a built-in monitor was the Xerox Alto released in 1973.
49. The first hard drive held 5MB of data. Modern ones hold 800,000 times more.
50. The first hard disk came out in 1980. It cost $40,000 and weighed 250 kg.
GENERAL INFORMATION

IT (Information Technology) encompasses all of the properly, Smart phones use operating systems, which are
technology that we use to collect, process, protect and store the basis for application development. Some smart phones
information. It refers to hardware, software (computer can be connected to an external screen and keypad, which
programs), and computer networks. creates a working environment, similar to that of a laptop or a
desktop computer. Some operating systems for Smartphone
ICT (Information and Communication Technology) This are: GoogleAndroid, Symbian, Blackberry, PalmPilot, and
concept involves transfer and use of all kinds of information. WindowsPhone.
ICT is the foundation of economy and a driving force of
social changes in the 21st century. Distance is no longer an MAIN COMPUTER PARTS
issue when it comes to accessing information; for example,
working-from-home, distance learning, e-banking, and e- Motherboard, MBO is computer's basic circuit, to which all
government are now possible from any place with an Internet computer components are connected, directly or indirectly.
connection and a computing device. Devices are connected to the motherboard through a system
bus. System bus connects all devices, ensures data flow and
Personal computer (PC), as the name suggests, is communication between different devices using predefined
intended for personal use, as opposed to the server, which is protocols.
used by a larger number of people simultaneously, from
different locations, often via terminals. If you do not intend to Central Processing Unit (CPU or processor) is a central
move your computer frequently from one place to another, part of a computer (and can be referred to as the computer’s
and at the same time you want maximal price/performance “brain”). It manages all other computer parts, monitors their
ratio, then you should use a desktop computer. In mutual communication and performs arithmetic-logical
comparison to laptops or tablet computers, it is much larger operations. Processor speed is measured in hertz (or
in size, inconvenient to carry/move, consumes more megahertz or gigahertz). Most famous manufacturers for
electricity but has a much better price/performance ratio. personal computer processors are Intel and AMD.
Also, they are much easier to upgrade.
Cache is a small capacity memory which allows quick
Laptop or tablet PC is used by individuals who have the access to data. By storing data from working memory in
need to travel with a computer or simply use them for cache, the speed of communication between processor and
aesthetic reasons when computing power is not an issue. RAM is increased. Microprocessors use three levels of fast
Laptop computers, as opposed to tablet PCs, more closely cache, L1, L2 and L3, used to store often used data.
resemble a personal computer when it comes to data input.
Data entry is done via keyboard and mouse, while the tablet ROM (Read Only Memory) is a type of permanent, internal
PC data entry is done via touch screen. Unlike desktop memory that is used solely for reading. BIOS (Basic
computers, notebooks and tablet PCs are optimized for Input/Output System), a program which is located in a
portability, low power requirements at the expense of separate ROM on the motherboard, and defines, as the
performance and can be used (for a limited period of time-i.e. name suggests, basic input/output system, is a good
until the batteries are depleted) without connection to the example. Please note that not all BIOS programs are stored
power grid. In order to prepare a laptop or a tablet computer in ROM.
for use without a power connection, it is necessary to RAM (Random Access Memory) is a working memory in
recharge the batteries. which analyzed data and programs are stored, while
computer runs. It allows reading and writing data, and is
PORTABLE DIGITAL DEVICES deleted/cleared when the computer shuts down.
PDA-Personal Digital Assistant (PALM) is a convenient
Hard Disk Drive (HDD) is a place for permanent data
small sized computer. It easily connects to mobile phones
storage (it does not delete/clear when computer shuts down).
and can prove a good solution for less demanding users. As
Its features are: large capacity, faster performance in
the name suggests, it is a device that fits in the user’s palm.
comparison to optical devices but slower in comparison to
Its name directly tells us that this computer is more of an
RAM and are used for permanent data storage. We can
assistant and not a workstation-whose name suggests the
distinguish between internal and external hard drives.
superiority in capabilities and computing power, especially in
comparison with PDA. Floppy Disk Drive is used for storing and reading data
stored on a floppy disk. Disk capacity is 1.44MB. Before
Mobile phone is a portable electronic device used for distant
memory stick and a wider usage of CD recorders, it was
communication. In recent years, mobile phone has evolved
used as data carrier. 'Modern memory sticks have a memory
from simple communication device into a multi-functional
capacity measured in GB while floppy disks only have
device. Additional functions, such as short text messaging
memory capacity of 1.44MB, indicating that floppy disks are
(SMS), electronic mail, Internet access, contact registration,
becoming obsolete.
calculator, clock, alarm, recording and photograph
displaying, recording and playback of video clips, sending/ CD-ROM (Compact Disk – Read Only Memory) drive is
receiving multimedia messages (MMS), audio recording and used for reading CD media.
playback, etc. has turned the mobile phone into an extremely
useful device, whose absence would make active DVD drive is used for reading DVD discs. DVD disc capacity
involvement and participation in a modern society not ranges from 4.7 to 18GB.
possible.
Soundcard is a device used for sound creation and
Smartphone is a device that merges functionality of phones, production by means of computer speakers.
PDAs, cameras, camcorders, and computers. To function
Graphics card is responsible for image processing and Serial port is used for example in connecting a mouse
displaying it on a monitor. It has its own graphics processor (labeled COM1 or COM2).
and memory. Image quality depends on the strength of these
components. Parallel port is used for connecting a local printer (LPT1 or
LPT2).
Modem enables computers to communicate via telephone
lines. They connect computers to the Internet. Network port is used for connecting computers to a
network.
Connectors or ports are slots visible in the back and the
front side of a computer. Firewire is used for connecting computers and audio-video
devices (digital cameras, etc.).
Common Input/Output Ports
Bit (binary digit) is the basic unit used to measure the
Universal Serial Bus (USB) is used to connect various amount of information. A byte or octet contains eight bits.
devices (mouse, keyboard, USB memory).

1 KB (kilobyte)- 1024 B (approx. 1000 B) determines the position of the cursor by touching the
1 MB (megabyte)- 1024 KB (approx. 1000 KB) touchpad.
1 GB (gigabyte) -- 1024 MB (approx. 1000 MB)
1 TB (terabyte) – 1024 GB (approx. 1000 GB) Lightpen enables handwriting on screen and can be used as
a mouse. It requires an appropriate monitor type.
BASIC TYPES OF STORAGE DEVICES Joystick: mainly used in computer games. Unlike a mouse,
it has many buttons which allow control over game objects.
CD (Compact Disc) is an optical disc used for data storage.
The standard capacity of a CD is 700MB. CD-R is used for Microphone is a device that converts sound into an
reading and writing data one time-only, while CD-RW for electrical signal, which can be stored on a computer. It is
reading and writing data multiple times. mainly used for recording sound, communication between
players in online games, in combination with a web camera
DVD (Digital Versatile Disc) is an optical disc which is, due in video conferencing, for converting voice into text on a
to the larger capacity (about 4.7 GB), mostly used for video computer (speech-to-text processing (e.g., textual files or
storage. emails), etc.

Blu-ray disc (BD) is the successor to DVD, is an optical disk Webcam is a camera that stores video signal in a format
storage, it comes in different capacities, depending on how appropriate for video transfer over the Internet in realtime.
many layers it has and the capacity of each layer. Currently,
the capacity of one layer is between 27 GB and 33 GB, while Digital camera, unlike analog, stores photographs in digital
the overall capacity is the product of the number of layers format. It can be directly connected to a computer and
and capacity of each layer. photographs can be downloaded. Photograph quality is
expressed in megapixels. More megapixels mean better
Memory card is a type of flash memory used to store data in quality of photograph, however more memory is occupied.
digital cameras, cell phones, MP3 players etc.
Output Devices
USB (Universal Serial Bus) Stick is a data storage device.
It features small dimensions, relatively high capacity, Monitor displays images from the computer, it enables us to
reliability, and speed. It belongs to the type of flash memory see, work and control computers. In other words, working on
that remembers data, even when not under voltage i.e. they a computer without a monitor would be inconceivable.
do not need electric power to maintain data integrity. Common types of monitors, with regard to manufacturing
technology, are the CRT and LCD.
Input Devices
 CRT monitors have been present on the market for
Mouse is an input device that facilitates work with the a long time, and other technologies are pushing
graphical user interface (GUI). The mouse transmits hand them out. They are based on cathode tube
movements, and the screen displays the cursor (mouse technology.
pointer) movements. They are divided into mechanical and  LCD monitors use liquid crystal technology. In
optical (with respect to a transfer movement), and wired and comparison with CRT monitors, LCD monitors use
wireless (with respect to connection). less electrical energy, do not emit radiation and
their price is higher, however due to smaller
Trackball, unlike a mouse, is not movable. Hand movements dimensions, more attractive design and a good
are transmitted to the screen by rolling the ball which is picture quality, they are pushing CRT monitors out
located on the upperside of the device. Keyboard is used for of the market. Monitor size is expressed by the size
data entry and issuing commands. They can also be wired or of screen diagonal and measured in inches ('').
wireless. Picture quality is expressed with the notion of
Scanner is used to load data (image, text, etc.) from the resolution, which is a number of horizontal and
printed material into a computer. The result of scanning is an vertical dots (pixels) (e.g. 1920x1080).
image, but with special programs, if we scan the text, we can Projector is a device used to project a computer image or
get a text as a result. Software used to recognize text from other images from independent devices, such as DVD
image is called a text recognition tool. players, Blu-ray player, etc. onto canvas or a wall.
Touchpad is used for transmission of hand movement, but Printer is a device used for printing data from a computer
unlike working with a mouse, the user is the one who onto a paper. We distinguish between local printer
(connected directly to the computer) and network printer Text processing software is used for creating and
(connected directly to network using a network card). Also,
forming text documents and nowadays, they can
printers also differ according to print technology: dot matrix,
laser, inkjet, thermal printer and plotter. contain images, charts and tables. Examples of such
programs are OpenOffice.org Writer (open source
 Dot matrix printers are the oldest, with the lowest
price of print per paper, they are slow, make a lot of software) and Microsoft Word (proprietary software).
noise while printing, and are mostly appropriate for
printing text. Spreadsheet calculations software is used for
 Laser printers are similar to photocopy devices performing various calculations and presentation of
when it comes to technology. They have results in charts. Examples of such programs are
exceptional print quality, speed and are quiet.
OpenOffice.org Calc Writer (open source software)
Downsides of laser printers are their high price and
high price of toners. and Microsoft Excel (proprietary software).
 Inkjet printers have a high print quality (somewhat
lower in comparison with laser printer), they are Software for presentations is used to create
quiet while printing, and have low initial investment. professional presentations that consist of slides with
Ink price, especially color ink, can cost as much as graphical and textual elements. Such a presentation
the printer itself. Printing technology is based on ink
dispersion from container onto paper. can afterwards be displayed as a "slide show” by using
 Plotter is used for printing large drawings (up to A0). a projector. Examples of such programs are
They are extremely expensive and used only for OpenOffice.org Impress (open source software) and
professional purposes, such as in designing firms
Microsoft PowerPoint (proprietary software)
for printing technical drawings (blueprints).
 Thermal printer, as its name states, leaves a print Software for creating and managing database helps to
on the paper by utilizing heat. They use paper manage a collection of structured data. Examples of such
sensitive to heat, feature small dimensions; they are programs are OpenOffice.org Base (open source software)
quiet while printing and relatively cheap. They are and Microsoft Access (proprietary software).
usually used for printing receipts, and owing to that
they are called POS printer (printer of sale). Also, Common utility software installed on a computer:
they are used as calculator printers and due to their
small dimensions, as portable printer.  office programs - OpenOffice.org, Microsoft Office
 antivirus programs – Avira, Sophos, Kaspersky,
Software is, unlike hardware, intangible part of the computer. Antivir etc.
It consists of a sequence of commands, written according to  Internet browser: Mozilla Firefox, Microsoft Internet
strict rules. Programs are written by programmers, in various Explorer, Opera, Safari etc.
programming languages.  programs for image editing: Adobe Photoshop,
Canvas, CorelDraw, Draw etc.\
Software types:
Magnifier is used to enhance a part of the screen.
Operating system is a program which manages computer
hardware. First computers did not have operating systems; On-Screen Keyboard – text is entered using a mouse to
they had programs that were directly loaded into the click on the on-screen keyboard.
computer (e.g. punchcards). Today, computers have an
operating system which loads into the computer's memory Narrator is commonly used by users with visual impairment -
during its startup. Computer functions are based on its it can read text displayed on monitor, it tells current cursor
operating system. Within operating system, drivers position, and describes certain events, like warning and error
(responsible for the functioning of a computer) and various messages generated by OS.
utility programs (responsible for the functionality of a Windows Speech Recognition enables speech recognition,
computer) are installed. The most famous operating systems i.e. recognizes spoken word, transfers it to text and enters it
are: into a document; therefore it enables you to dictate a text to
1. Linux (Debian, Ubuntu, Fedora, Knoppix,...) - open source a computer, to browse the web using your voice etc.
software Computer network is comprised of at least two, connected,
2. Microsoft Windows (XP, Vista, 7,...) - proprietary software by wire or wireless, computers that can exchange data i.e.
3. Mac OS X (Cheetah, Panther, Snow Leopard,...) - communicate. Internet is the most famous and most
proprietary software widespread network with nearly2 billion users and the
number of users is still growing.
Application Software (Utility programs) are all programs
that users use to perform different tasks or for problem Types of Network according to size
solving. Users, according to his/her needs, install the
appropriate utility software. Computer functions and tasks PAN (Personal Area Network) A personal area network
that computers can perform are defined by the installed utility (PAN) is a computer network that will be useful in
software. Utility software can often cost more than computer communicating computerizes devices such as telephones
hardware unless the software is open source. and PDAs. Mostly, the PAN is communicated through
wireless network technologies such as Wireless USB,
Common utility software are: Bluetooth, Z-Wave, and IrDA. You may use PANs to
communicate among the personal devices or you may
connect even to higher level networks or to the internet.
LAN (Local Area Network) - a network that covers a  Virus is a malicious program with the possibility of
relatively small geographical area- it connects computers self-replication. In a computer it seeks other files,
within a firm or household by wire, trying to infect them and the ultimate goal is to
spread to other computers. Depending on what
WLAN(Wireless Local Area Network) - a network that malicious code it contains, it may cause more or
covers a relatively small geographical area - it connects less damage to your computer.
computers within a firm or household wirelessly,  Worms like viruses, they possess the ability of self-
WAN (Wide Area Network)- a network that covers a replication, however they cannot infect other
relatively large geographical area - it connects a greater programs. Their usual intent is to take control of
number of computers and local networks. your computer and allow remote control by opening,
the so-called, 'backdoor'.
MAN (Metropolitan Area Network) MAN is a network that  Trojan horses can be presented in the form of
interconnect users with computer resources in a geographic games or files in e-mail attachments, with different
area or region larger than that covered by a local area purposes, such as: to allow remote control to your
network (LAN) but smaller than the area covered by wide computer, delete data, allow spreading of viruses,
area network (WAN). Further a MAN is a network that send spam from the infected computer, etc. Unlike
connects two or more Local Area Networks or Campus Area viruses and worms, it does not replicate and it
Networks together but does not extend beyond the needs to be executed, that is, it is not autonomous.
boundaries of the immediate town, city, or metropolitan area.  Spyware is a program that secretly collects data
about computer users (passwords, credit card
Internet ("network of all networks") is a global system numbers, etc.), therefore it spies on users. The
comprised of interconnected computers and computer most common spyware infections usually occur
networks, which communicate by means of using TCP/IP while visiting suspicious sites with illegal or
protocols. pornographic content.
Intranet is a private network of an organization to which only  Adware is a program that uses collected data about
authorized employees have access (login and password). a user in order to display advertisements in a way
regarded as intrusive. It usually manifests itself in
Extranet is part of Intranet, to which independent the form of many pop-up windows that display ads.
collaborators have access.  Hoax is a false message being spread by e-mail to
deceive users. Their goal is to obtain data of, for
Download is a term that implies taking a copy of digital data instance, a bank account, or persuade users to pay
from a network computer on a local computer, and upload some fees in order to win the lottery (which they
means placing digital content on a network computer. never applied for), or pay costs of money transfers
Bitrate represents speed at which data is transferred from an exotic prince to help him withdraw money
through a modem (network). It is measured in bit/s (bit per from a country that is falling apart and, in return, will
second). bit/s is/are a measurement unit for speed of digital receive an impressive award, etc.
data flow through the network. The number of bits IP (Internet Protocol) Address. An Internet Protocol (IP)
transferred in one second tells us how many bits can be address is a numerical identification (logical address) that is
transferred through a network in one second. assigned to devices participating in a computer network
1,000 bit/s rate = 1 kbit/s (one kilobit or one thousand bits utilizing the Internet Protocol for communication between its
per second) nodes. Although IP addresses are stored as binary numbers,
1,000,000 bit/s rate = 1 Mbit/s (one megabit or one million they are often displayed in more human-readable notations,
bits per second) such as 192.168.100.1(for IPv4). The role of the IP address
1,000,000,000 bit/s rate = 1 Gbit/s (one gigabit or one billion has been characterized as follows: "A name indicates what
bits per second we seek. An address indicates where it is. A route indicates
Firewall is a software (or network device) that is used to how to get there."
control authorized access and protect against unauthorized Router is a networking device that forwards packets
access to your computer. between networks using information in protocol headers and
forwarding tables to determine the best next router for each
Malicious Programs packet. Routers work at the Network Layer of the OSI model
Malware (malicious + software) is a software, which and the Internet Layer of TCP/IP.
infiltrates an operating system in a seamless manner,
(WWW) World wide web is the computer based network of
whether by human mistake or due to shortcomings of the
information resources that a user can move through by using
operating system and software support, with malicious
links form one document to another.
intentions. Malicious software includes:

ICT QUESTIONS WITH ANSWER


Which one is the first search engine in internet (b) 64 bit
(a) Google (c) 128 bit
(b) Archie (d) 256 bit
(c) Altavista Answer: (c) 128 bit
(d) WAIS
Answer: (b) Archie Which one is the first web browser invented in 1990
(a) Internet Explorer
Number of bit used by the IPv6 address (b) Mosaic
(a) 32 bit (c) Mozilla
(d) Nexus (d) Samsung
Answer: (d) Nexus Answer: (b) Apple

Which of the following programming language is used to Where is the headquarter of Microsoft office located
create programs like applets? (a) Texas
(a) COBOL (b) NewYork
(b) C Language (c) California
(c) Java (d) Washington
(d) BASIC Answer: (d) Washington
Answer: (c) Java
.gif is an extension of
First computer virus is known as (a) Image file
(a) Rabbit (b) Video file
(b) Creeper Virus (c) Audio file
(c) Elk Cloner (d) Word file
(d) SCA Virus Answer: (a) Image file
Answer: (b) Creeper Virus
Which one is the first fully supported 64-bit operating system
Which one programming language is exclusively used for (a) Windows Vista
artificial intelligence (b) Mac
(a) C (c) Linux
(b) Java (d) Windows XP
(c) J2EE Answer: (c) Linux
(d) Prolog
Answer: (d) Prolog Computer Hard Disk was first introduced in 1956 by
(a) Dell
Firewall in computer is used for (b) Apple
(a) Security (c) Microsoft
(b) Data Transmission (d) IBM
(c) Authentication Answer: (d) IBM
(d) Monitoring
Answer: (a) Security Which of the following is not a web browser
(a) MOSAIC
A dual layer Blue-ray Disc can store data upto (b) WWW
(a) 20GB (c) Facebook
(b) 35 GB (d) Netscape navigator
(c) 12 GB Answer: (c) Facebook
(d) 50 GB
Answer: (d) 50 GB In computer world, Trojan refer to
(a) Virus
Which of the following is not an operating system (b) Malware
(a) DOS (c) Worm
(b) Mac (d) Spyware
(c) C Answer: (b) Malware
(d) Linux
Answer: (c) C Which one of the followings is a programming language
(a) HTTP
Which of the following is not a database management (b) HTML
software (c) HPML
(a) MySQL (d) FTP
(b) Oracle Answer: (b) HTML
(c) Sybase
(d) COBOL Which protocol is used to received e-mail
Answer: (d) COBOL (a) SMTP
(b) POP3
Number of layers in the OSI (Open Systems Interconnection) (c) HTTP
Model (d) FTP
(a) 9 Answer: (b) POP3
(b) 3
(c) 7 Which protocol is used to send e-mail
(d) 11 (a) HTTP
Answer: (c) 7 (b) POP3
(c) SMTP
1024 bit is equal to how many byte (d) SSH
(a) 1 Byte Answer: (c) SMTP
(b) 128 Byte
(c) 32 Byte Which computer program converts assembly language to
(d) 64 Byte machine language
Answer: (b) 128 Byte (a) Interpreter
(b) Compiler
Mac Operating System is developed by which company (c) Assembler
(a) IBM (d) Comparator
(b) Apple Answer: (c) Assembler
(c) Microsoft
In which year ‘@’ sign was first chosen for its use in e-mail Answer: (d) Notepad
address
(a) 1976 Which one is the default ‘Word Processor’ for Microsoft
(b) 1980 Windows
(c) 1977 (a) MS Word
(d) 1972 (b) Ms Paint
Answer: (d) 1972 (c) WordPad
(d) Notepad
Which one is the latest one from PARAM SuperSries Answer: (c) WordPad
computers
(a) PARAM Yuva II What is the maximum size of a word document created
(b) PARAM 10000 (a) 1 MB
(c) PARAM Padma (b) 32 MB
(d) PARAMnet (c) 16MB
Answer: (a) PARAM Yuva II (d) 999KB
Answer: (b) 32 MB
Who is also know as the father of Indian Supercomputing
(a) Ragunath Mashelkar What is the maximum number of Primary Partitions that can
(b) Vijay Bhatkar be created on a Hard-disk
(c) Jayant Narlikar (a) 2
(d) Nandan Nilekani (b) 3
Answer: (b) Vijay Bhatkar (c) 4
(d) 1
A folder in windows computer can’t be made with the name Answer: (c) 4
(a) can
(b) con How many layers in the TCP/IP protocol layers
(c) mak (a) 7
(d) make (b) 5
Answer: (b) con (c) 4
(d) 11
A computer use which type of number system to calculate Answer: (c) 4
and to store data
(a) decimal What is the binary value of ‘A’
(b) octal (a) 01000100
(c) binary (b) 11000001
(d) hexadecimal (c) 01100001
Answer: (c) binary (d) 01000001
Answer: (d) 01000001
What is the extension type of the excel 2007 files
(a) .xls Which key combination is used to minimize all open windows
(b) .xlsx and displays in the screen
(c) .xsl (a) Alt+M
(d) None of the above (b) Shift+M
Answer: (b) .xlsx (c) Windows Key+D
(d) CTRL+D
The basic units of a excel spreedsheet where we enter data Answer: (c) Windows Key+D
is called
(a) Tab Which function key needs to be press during reboot to enter
(b) Box in Safe Mode of a Windows machine
(c) Cell (a) F8
(d) None of the above (b) F2
Answer: (c) Cell (c) F1
(d) F9
The maximum number of rows supported by Excel 2003 Answer: (a) F8
spreadsheet is
(a) 10,000 ‘Linux’ is an example of
(b) 35,356 (a) Software
(c) 55,782 (b) Application
(d) 65,536 (c) Operating System
Answer: (d) 65,536 (d) Browser
Answer: (c) Operating System
The maximum number of rows supported by Excel 2007
spreadsheet is Which key combination is used to permanently delete a file
(a) 9,68,576 or folder
(b) 12,15,857 (a) Shift+delete
(c) 13,42,554 (b) Alt+delete
(d) 10,48,576 (c) CTRL+delete
Answer: (d) 10,48,576 (d) Delete
Answer: (a) Shift+delete
Which one is a ‘text editor’ for Microsoft Windows
(a) MS Word Which is an Input device
(b) Ms Excel (a) Monitor
(c) WordPad (b) Printer
(d) Notepad (c) Mouse
(d) None of the above (d) Linkedln
Answer: (c) Mouse Answer: (a) Facebook

Which one is an example of connectionless protocols Who invented Java?


(a) TCP Ans : James A Gosling
(b) IPX/SPX Longhorn was the code name of ?
(c) Frame Relay Ans : Windows Vista
(d) UDP
Answer: (d) UDP Who is known as the Human Computer of India?
Ans : Shakunthala Devi
A common boundary between two computer systems is What is mean by Liveware?
known as Ans : People who work with the computer
(a) Intradiction Which computer engineer got Nobel Prize for literature in
(b) Surface 2003?
(c) Interface J.M. Coetzee
(d) None of the above ‘Weaving The Web’ was written by…..
Answer: (c) Interface Ans : Tim Burners Lee
What is Beta Test?
Which one of the following is not a computer language Ans : Trial test of a computer or software before the
(a) BASIC commercial launch
(b) LOTUS ‘Do no evil’ is tag line of ……
(c) C++ Ans : Google
(d) JAVA
Answer: (b) LOTUS First Indian cinema released through internet is …..
Ans : Vivah
Which one is used for making presentation file from Microsoft
Office package Rediff was founded by…..
(a) MS Outlook Ans : Ajith Balakrishnan and Manish Agarwal
(b) MS Excel
(c) MS Word What is the extension of PDF?
(d) MS Powerpoint Ans : Portable document format
Answer: (d) MS PowerPoint
Mows is a type of mouse for …….. people
Network Interface Card (NIC) is generally used for Ans : Physically handicapped people
(a) Connectivity
(b) Programming Expand RDBMS?
(c) Printing Ans : Relational Data Base Management System
(d) None of the above
Answer: (a) Connectivity Difference engine was developed by…..
Ans : Charles Babbage
Total number of pins in a traditional parallel port is
(a) 5 Orkut is now owned by ……
(b) 14 Ans : Google
(c) 25
(d) 27 World’s first microprocessor is …..
Answer: (c) 25 Ans : Intel 4004

Which web browser is developed by the Google What is SQL?


(a) IE Ans : Structured Query Language
(b) FireFox
(c) Safri What is the expansion of COBOL?
(d) Chrome Ans : Common Business Oriented Language
Answer: (d) Chrome
What is the expansion of SMS?
Which web browser is provided default with a Windows Ans : Short Message Service
machine
a) Opera Which IT company’s nickname is ‘ The Big Blue ‘ ?
(b) IE Ans : IBM
(c) Chrome
(d) Mosaic What is the full form of IEEE?
Answer: (b) IE Ans : Institute of Electric and Electronic Engineers

Which company first developed the Java programming Who developed COBOL?
language Ans : Grace Murry Hopper
(a) Microsoft
(b) Google Email was developed by……
(c) Sun Microsystems Ans : Raymond Samuel Tomlinson (Ray Tomlinson)
(d) IBM
Answer: (c) Sun Microsystems Green dam is ……
Ans : Web Filter
Mark Zuckerberg is the owner of
(a) Facebook What is the expanded form of CMOS ?
(b) Google Ans : Complementary Metal Oxide Semoconductor
(c) Linux
Who is Netizen ?
Ans : Net Citizen (Citizen who uses internet)

What is Scareware?
Ans : Fake antivirus softwares

When was the first smart phone launched?


Ans : 1992 (IBM Simon)
Which of the following is the telephone based shared Service
Center?
(A) Call center
(B) ATM
(C) Phone center
(D) None of these

A facility that allows the user to speak into a special device


while typing a letter using computer is called
(A) Speaker
(B) Dictaphone
(C) Telephone
(D) Cell phone

BPO may be expanded as ___


(A) Business Process Outsourcing
(B) Business Product Outsourcing
(C) Business Process Outcome
(D) Business Product Outcome

Collection, digitization and processing of data is basic


function of ____
(A) Call center
(B) Data management
(C) E- Governance
(D) Data collection

Which of the following is an IT enabled service?


(A) Database
(B) Spreadsheet
(C) Word processor
(D) E-Governance

ITES stands for ___


(A) Information Technology Entrusted Systems
(B) Information Technology Extended Services
(C) Information Technology Enabled Services
(D) Improving Technology Enlighted Services

____ refers to conversion of non-digital material to digital


form.
(A) Digitization
(B) Data transfer
(C) Transcription
(D) None of the given

A channel for communicating across a boundary between


two or more subsystem is known as
(A) Data path
(B) Walk through
(C) Act gram
(D) Interface

A system analyst designs a new system by


(A) Identifying subsystems and interfaces between
subsystems
(B) Adopting a developed system to the present environment
(C) Developing the system as a large, single unit
(D) None of these

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy