Q: 122
Magnetic disk is an example of____________?
Secondary memory
Primary memory
Main memory
Both (1) and (2)
Q: 123
Which one of the following is NOT a computer language?
MS-Excel
BASIC
COBOL
C++
Q: 124
___________Store data or information temporarily and pass it on as directed by the control unit?
Address
Register
Number
Memory
Q: 125
Select the Odd one from the following
Operating system
Interpreter
Compiler
Assembler
Q: 126
A________________is an additional set of commands that the computer displays after you make a selection from the main menu?
dialog box
submenu
menu selection
All of the above
Q: 127
COBOL is an acronym for________________?
Common Business Oriented Language
Computer Business Oriented Language
Common Business Operated Language
Common Business Organized Language
Q: 128
All of the following are examples of real security and privacy risks EXCEPT____________?
hackers
Spam
Viruses
identity theft
Q: 129
Which of the following is NOT one of the four major data processing functions of a computer?
gathering data
processing data into information
analyzing the data or information
storing the data or information
Q: 130
All of the following are examples of storage devices EXCEPT____________?
hard disk drives
printers
floppy disk drives
CD drives
Q: 131
The CPU and memory are located on the__________?
expansion board
motherboard
storage device
output device
Q: 132
______________is the science that attempts to produce machines that display the same type of intelligence that humans do?
Nanoscience
Nanotechnology
Simulation
Artificial intelligence (Al)
Q: 133
When creating a computer program, the____________designs the structure of the program?
End user
System Analyst
Programmer
All of the above
Q: 134
Computers process data into information by working exclusively with____________?
multimedia
word
numbers
characters
Q: 135
Computers manipulate data in many ways, and this manipulation is called___________?
upgrading
processing
batching
utilizing
Q: 136
The ability to recover and read deleted or damaged files from a criminal';s computer is an example of a law enforcement speciality called___________?
robotics
simulation
computer forensics
animation
Q: 137
Where does most data go first with in a computer memory hierarchy ?
RAM
ROM
BIOS
CACHE
Q: 138
The_____________data mining technique derives rules from real-world case examples?
Rule discover
Signal processing
Neural nets
Case-based reasoning
Q: 139
_____________are used to identify a user who returns to a Website?
Cookies
Plug-ins
Scripts
ASPs
Q: 140
Codes consisting of lines of varying widths or lengths that are computer-readable are known as__________?