Curioustab
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Take Free Test
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Take Free Test
Computer Questions
In computer terminology, what does the term wetware refer to in the context of computing and information systems?
In computer architecture and caching, the method that updates main memory when modified data is written back only when the cache block is removed is called which write policy?
Which type of computing performs computation, storage, and even complete applications as a service delivered across a network?
In basic computer awareness, C++ is correctly classified as which of the following?
In computer memory terminology, associative memory is more precisely known as which of the following?
In standard IPv4 networking, an IP address is a binary number of how many bits in length?
In storage technology, an HHDD is a type of drive where a conventional hard disk is combined with non volatile flash memory to cache data. What does HHDD stand for?
In Microsoft Word, which option on the toolbar allows a user to change the color of the selected text characters?
Among the following terms, which one is the odd one out in the context of global networking and web technologies?
Which type of malicious code changes its internal form or code each time it is installed in order to avoid detection by antivirus software?
Among the following options, which device is not considered an external storage device for a computer system?
In computer networking, the commonly used abbreviation ISP stands for which of the following?
Cache memory in computer architecture is designed based on which fundamental principle of program behaviour?
A huge global network made up of millions of interconnected computer networks collectively forms which of the following?
In operating systems, the CPU scheduler that selects processes from the ready queue for execution on the processor is also known as which type of scheduler?
In basic computer organisation, the Central Processing Unit CPU consists of which combination of major components?
In computer security, which of the following is commonly used to protect objects and restrict access in the absence of more complete protection schemes?
In data communication protocols, the technique of temporarily delaying outgoing acknowledgements so that they can be sent together with data frames is known as what?
In relational database theory, which of the following statements about keys is true?
In operating systems, constantly running system program processes that provide background services are commonly known as what?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28