Computer Science GK Questions

Computer Science GK Questions


1. All of the following are examples of real security and privacy risks EXCEPT: 
           Spam

2. A process known as ____________ is used by large retailers to study trends. 
            Data Mining

3.. ____________terminals (formerly known as cash registers) are often connected to 
            Point-of-sale (POS)

4. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements. 
           RFID

5. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as: 
          Robotics

6. Technology no longer protected by copyright, available to everyone, is considered to be:                             proprietary. 

7. ____________ is data that has been organized or presented in a meaningful fashion. 
          Information

8. The name for the way that computers manipulate data into information is called: 
            Processing'

9, Computers gather data, which means that they allow users to ____________ data. 
             Input

10.. Computers use the ____________ language to process data. 
                Binary

11. Computers process data into information by working exclusively with: 
                 Numbers
 
12, The term bit is short for: 
                Binary Digit
 
13. A string of eight 0s and 1s is called a: 
                 Byte

14. The transparency provided in a distributed system where users cannot tell how many copies of a resource exist is termed as?
               Replication transparency 
 
15. In a computer network, routing issues are handled in 
             Network Layer
       

No comments:

Post a Comment

Ramadan Mubarak to Muslims