logo

CuriousTab

CuriousTab

Discussion


Home General Knowledge Computer Comments

  • Question
  • Symbolic logic was discovered by ___________


  • Options
  • A. Herman Hollerith
  • B. Vonn Neumann
  • C. George Boole
  • D. Sun Microsystem

  • Correct Answer
  • George Boole 

  • Tags: AIEEE, Bank Exams, CAT, Bank Clerk, Bank PO

    Computer problems


    Search Results


    • 1. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a ________

    • Options
    • A. spammer
    • B. hacker
    • C. instant messenger
    • D. programmer
    • Discuss
    • 2. Inventor of WWW is ______

    • Options
    • A. Bill Gates
    • B. Lee.N.Feyong
    • C. N. Resscl
    • D. Tim Berners Lee
    • Discuss
    • 3. Secondary storage ________

    • Options
    • A. does not require constant power
    • B. does not use magnetic media
    • C. consists of four main types of devices
    • D. does not store information for later retrieval
    • Discuss
    • 4. When you save to this, your data will remain intact even when the computer is turned off ____

    • Options
    • A. RAM
    • B. Mother board
    • C. Secondary storage device
    • D. Primary storage device
    • Discuss
    • 5. A(n) .......... is a small group of computers and peripherals linked together in a small geographic area.

    • Options
    • A. WAN
    • B. PAN
    • C. LAN
    • D. CAN
    • Discuss
    • 6. Who is the father of email ?

    • Options
    • A. Charles Babbage
    • B. Ray Tomlinson
    • C. Tim Berners Lee
    • D. Paul Buchheit
    • Discuss
    • 7. What command is used to count the total number of lines, words, and characters contained in a file ?

    • Options
    • A. wc
    • B. count p
    • C. wcount
    • D. countw
    • Discuss
    • 8. How do you display current date and time in MS Excel ?

    • Options
    • A. Time ()
    • B. Now ()
    • C. Date ()
    • D. Today ()
    • Discuss
    • 9. ...... this is the act of copying or downloading a program from a network and making multiple copies of it

    • Options
    • A. Network piracy
    • B. Plagiarism
    • C. Software piracy
    • D. Site-Licency piracy
    • Discuss
    • 10. __________ cookies are also known as transient cookies.

    • Options
    • A. Persistent
    • B. Second party
    • C. Session
    • D. Third party
    • Discuss


    Comments

    There are no comments.

Enter a new Comment