Computer Science GK-Set 15

401. A database that spreads information across different tables while maintaining links between them is referred to as Answer:  Relational database 402.________ is a method of storing data on two or more hard drives that work in combination to do the job…

Computer Science GK-Set 14

376. A network consists of interconnected Answer:  Workstations 377. Which is not true for LAN? Answer:  It is a public network. 378. Which of the following is not a transmission medium? Answer:   Modem  379. Faster data communication is possible using Answer:   Optical…

Computer Science GK-Set 13

326.________ program gives instructions regarding operations inside the computer. Answer: System software 327. The first electronic computer was made in the year Answer: 1946 328. The record produced in an audit trail is known as Answer:  Journal tape 329. A group of…

Computer Science GK-Set 12

301. Documents of the web that are transported over the Internet are called Answer:  Web pages 302. The ability to convey a message without disclosing your name or identity is called Answer: Anonymity 303. A computer program that scans resumes and is…

Computer Science GK- Set 11

276. The silicon chips used in computers are made from Answer:  Ordinary sand 277. In modems, the data transfer rate is measured in Answer:  Bits per second 278. The output of a 2 input and gate is 1 only when its Answer:…

Computer Science GK -Set 10

251. To prepare a presentation/slide show on which application is commonly used Answer: Powerpoint 252. — is the process of carrying out commands Answer: Executing 253.Which of the following refers to the fastest, biggest, and most expensive computers Answer: Supercomputers 254. Microsoft…

Computer Science GK-Set 9

226. A repair for a known software bug, usually available at no charge on the internet, is called a (n) Answer: Patch 227. In the URL http://www.yahoo.com. The portion labelled http is the Answer:  Protocol 228. In the database, a field is…

Computer Science GK- Set 8

201. Which of the following is normally used to initialize a computer system’s hardware? Answer: Random access memory 202. Which is NOT a good Web security strategy? Answer: Removing unnecessary compilers and interpreters 203. The different styles of lettering in a word-processing…

Computer Science GK-Set 7

176. If you do not want to select any option after opening a menu, then click the menu title again or press key ________ to close the menu. Answer:  Escape 177. It is easier to change the name of a file using…