logo

CuriousTab

CuriousTab

Discussion


Home General Knowledge Computer Comments

  • Question
  • Properly arranged data is called


  • Options
  • A. Information
  • B. File
  • C. Field
  • D. Words

  • Correct Answer
  • Information 

  • Tags: AIEEE, Bank Exams, CAT, GATE, Analyst, Bank Clerk, Bank PO, Database Administrator, IT Trainer

    Computer problems


    Search Results


    • 1. Which of these is not a means of personal communication on the internet ?

    • Options
    • A. Instant messaging
    • B. Chat
    • C. Electronic mail
    • D. Instanotes
    • Discuss
    • 2. What is "Trend Micro" ?

    • Options
    • A. Name of an insect
    • B. It is an electronic machine
    • C. It is anti-virus software
    • D. None
    • Discuss
    • 3. The popular Access Method for computer network is

    • Options
    • A. Ethernet
    • B. Token Ring
    • C. Bus Token
    • D. None
    • Discuss
    • 4. If a new device is attached to a computer, such as printer or scanner, its ______ must be installed before the device can be used

    • Options
    • A. buffer
    • B. driver
    • C. pager
    • D. server
    • Discuss
    • 5. Which of the following is the largest unit of storage?

    • Options
    • A. GB
    • B. KB
    • C. MB
    • D. TB
    • Discuss
    • 6. A(n) .......... is a small group of computers and peripherals linked together in a small geographic area.

    • Options
    • A. WAN
    • B. PAN
    • C. LAN
    • D. CAN
    • Discuss
    • 7. When you save to this, your data will remain intact even when the computer is turned off ____

    • Options
    • A. RAM
    • B. Mother board
    • C. Secondary storage device
    • D. Primary storage device
    • Discuss
    • 8. Secondary storage ________

    • Options
    • A. does not require constant power
    • B. does not use magnetic media
    • C. consists of four main types of devices
    • D. does not store information for later retrieval
    • Discuss
    • 9. Inventor of WWW is ______

    • Options
    • A. Bill Gates
    • B. Lee.N.Feyong
    • C. N. Resscl
    • D. Tim Berners Lee
    • Discuss
    • 10. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a ________

    • Options
    • A. spammer
    • B. hacker
    • C. instant messenger
    • D. programmer
    • Discuss


    Comments

    There are no comments.

Enter a new Comment