2.
What is the main function of the command interpreter?
2 out of 50
3.
What is the full form of “AI”?
3 out of 50
4.
The IETF standards documents are called ________
4 out of 50
8.
Who is the father of Computers?
8 out of 50
10.
Which of the following statements define Computer Graphics?
10 out of 50
11.
What is the main function of the command interpreter?
11 out of 50
12.
What is Artificial Intelligence?
12 out of 50
13.
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ____
13 out of 50
14.
Which of the following is correct about 8086 microprocessor?
14 out of 50
15.
Which of the following is a stage of compiler design?
15 out of 50
16.
The Unix shell is both _______ and _______ language.
16 out of 50
17.
Which of the following is the correct abbreviation of COMPUTER?
17 out of 50
18.
What does cyber security protect?
18 out of 50
19.
Among the given scientists/inventor who is known as the father of Computer Graphics?
19 out of 50
20.
In Operating Systems, which of the following is/are CPU scheduling algorithms?
20 out of 50
21.
Who is the inventor of Artificial Intelligence?
21 out of 50
22.
The structure or format of data is called __________
22 out of 50
23.
Which of the following is a type of microprocessor?
23 out of 50
24.
What is the use of a symbol table in compiler design?
24 out of 50
25.
In which language UNIX is written?
25 out of 50
26.
Which of the following is the correct definition of Computer?
26 out of 50
27.
Who is the father of computer security?
27 out of 50
28.
Which of the following are the features of Computer Graphics?
28 out of 50
29.
To access the services of the operating system, the interface is provided by the ___________
29 out of 50
30.
Which of the following is the branch of Artificial Intelligence?
30 out of 50
31.
Communication between a computer and a keyboard involves ______________ transmission.
31 out of 50
32.
The microprocessor of a computer can operate on any information if it is present in ______________ only.
32 out of 50
33.
Which of the following error can a compiler check?
33 out of 50
34.
Which of the following is the first UNIX editor?
34 out of 50
35.
What is the full form of CPU?
35 out of 50
36.
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
36 out of 50
37.
Which of the following is a Computer Graphics type?
37 out of 50
38.
CPU scheduling is the basis of __________
38 out of 50
39.
What is the goal of Artificial Intelligence?
39 out of 50
40.
The first Network was called ________
40 out of 50
41.
Which of the following technology was used by Intel to design its first 8-bit microprocessor?
41 out of 50
42.
A programmer, writes a program to multiply two numbers instead of dividing them by mistake, how can this error be detected?
42 out of 50
43.
Which of the following is not a feature of Unix?
43 out of 50
44.
Which of the following language does the computer understand?
44 out of 50
45.
Which of the following is a type of cyber security?
45 out of 50
46.
Which of the following plane is used for 2D transformations?
46 out of 50
47.
Which one of the following is not true?
47 out of 50
48.
Which of the following is an application of Artificial Intelligence?
48 out of 50
49.
A _______ is the physical path over which a message travels.
49 out of 50
50.
Which of the following addressing method does the instruction, MOV AX,[BX] represent?
50 out of 50