Computer Studies covers general knowledge of computers, computing terms, and technologies. It focuses on building interest and confidence in using computers.
-
Question 81:
Which of the following is a valid variable name in Python?
Options:
A) my_variable$
B) my_variable
C) my-variable
D) 1my_variable
Show Answer
The correct answer is B .
-
Question 82:
A light sensitive device that converts drawing, printed text or other images into digital form is
Options:
A) keyboard
B) Plotter
C) Scanner
D) OMR
Show Answer
The correct answer is C .
-
Question 83:
When does the output of a NOR gate =0?
Options:
A) whenever 0 is present at input
B) only when all input =0
C) whenever 1 is present at input
D) only when all input =1.
Show Answer
The correct answer is C .
-
Question 84:
The joystick typically have a button on _________ used to select the option pointed by the cursor.
Options:
A) bottom
B) left
C) right
D) top
Show Answer
The correct answer is D .
-
Question 85:
To determine if a computer has the ability to think, a test was conducted named as
Options:
A) Turing test
B) Computation test
C) Teletype test
D) Interrogator test
Show Answer
The correct answer is A .
-
Question 86:
Which process is used by large retailers to study trends?
Options:
A) Data mining
B) Data selection
C) Data conversion
D) Pos
Show Answer
The correct answer is A .
-
Question 87:
Which can be the input and output devices both?
Options:
A) Scanner
B) Touch screen monitor
C) Speaker
D) Digitizer
Show Answer
The correct answer is B .
-
Question 88:
What generation of computer is characterized by the use of vacuum tubes for circuitry and magnetic drums for main memory?
Options:
A) second generation
B) fourth generation
C) first generation
D) third generation
Show Answer
The correct answer is C .
-
Question 89:
What is the function of firewall?
Options:
A) Service provider
B) Cyber security
C) Internet browser
D) Storage device
Show Answer
The correct answer is B .
-
Question 90:
.......... provides total solutions to reduce data redundancy, inconsistency, dependence and unauthorized access of data
Options:
A) Tables
B) DBMS
C) Production passwords
D) Database
Show Answer
The correct answer is B .