Computer Science GK Questions
1. All of the following are examples of real security and privacy risks EXCEPT:
Spam
2. A process known as ____________ is used by large retailers to study trends.
Data Mining
3.. ____________terminals (formerly known as cash registers) are often connected to
Point-of-sale (POS)
4. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
RFID
5. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
Robotics
6. Technology no longer protected by copyright, available to everyone, is considered to be: proprietary.
7. ____________ is data that has been organized or presented in a meaningful fashion.
Information
8. The name for the way that computers manipulate data into information is called:
Processing'
9, Computers gather data, which means that they allow users to ____________ data.
Input
10.. Computers use the ____________ language to process data.
Binary
11. Computers process data into information by working exclusively with:
Numbers
12, The term bit is short for:
Binary Digit
13. A string of eight 0s and 1s is called a:
Byte
14. The transparency provided in a distributed system where users cannot tell how many copies of a resource exist is termed as?
Replication transparency
15. In a computer network, routing issues are handled in
Network Layer
No comments:
Post a Comment