Loading of Operating System in Personal Computer is called?
Processing
Installation
Booting
None of these
Parallel Port is called?
Male Connector
Female Connector
Joint Connector
None of these
In Computer, Bus is set of?
Circuits
Wires
Registers
Bulbs
Which is known as temporary memory?
ROM
Hard Disk
Registers
Circuits
Which mechanism is used by the computer virus ‘worm’ to duplicate itself?
Swap
Spawn
Increment
Swarm
Temporary storage place for information in a computer is called:
Back Up
Buffer
Binary file
Data recorder
Which is the largest hardware company of computers?
Microsoft
Dell
HP
My Space
in RAM memory, DDR stands for ?
Double sided RIMM
Double data rate
Digital data rate
Dynamic data rate
How many pins in DDR3 Memory?
240
128
195
228
Which protocol is used to automatically assign TCP/IP configuration information?
DNS
DHCP
NetBIOS
NetLink
In database table, what does a column represent?
Attributes
Index
Entity
Relation
The unit of measurement of a word length is?
Metre
Byte
Bits
Millimetre
_________ is a type of computing that performs computation, storage and even applications as a service across a network.
Cloud Computing
Distributed Computing
Parallel Computing
Virtual Computing
Programs that duplicate the functionality of one system on another system is known as
Emulators
Simulators
Evaluators
PCB
Cache memory works on the principle of ___________ .
Locality of data
Locality of reference
Locality of Memory
Locality of Memory and refer
Money transfer through mobile is called
IFSC
IMPS
ATM
IFS
Which algorithm is used to decide the path to transfer the packets from source to destination?
Routing
Selecting
Pathing
Directing
In the following list of devices, which device is used in datalink layer?
Repeaters
Routers
Application gateway
Bridge
_________ changes each time it is installed to avoid detection by antivirus software.
Polymorphic virus
Worm
Logic bomb
Trojan horse
In which mode can the computers that are associated send frames directly to each other?
Adhoc mode
Infrastructure mode
Structured mode
Anonymous mode
The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ .
Access control
Congestion
Error propagation
Deadlock
Related to computers, what is ‘Wetware’ ?
Computer programs
Circuitory
Human brain
Chemical storage devices
In the memory hierarchy the fastest memory is?
Cache
SRAM
Registers
DRAM
In IT networking, which of the following device is used in physical layer?
Repeater
Router
Transport Gateway
Bridge
In IT terminology failure in the kernel is called as: