2. Which computer bus connects the main memory to the memory controller in computer systems?
Data Bus
Memory Bus
I/O Bus
Both (b) and (c)
None of the above
3. Which among the following is not legitimate type of computer virus?
Boot Virus
File infector Virus
Resident Virus
Hangout Virus
Macro Virus
4. DBMS ensures data integrity by managing transactions through ACID test. What does ACID stands for in computer science?
Artistic, collaborative, inference, durability
Analytic, consistency, inference, duration
Atomicity, consistency, isolation, durability
Atomicity, collaborative, inference duration
Adherence, consistency, isolation, durability
5. Which of the following is not true about Hotspot (Wi Fi)?
A hotspot is a physical location where people may obtain Internet access.
Security is a serious concern in connection with Hotspots.
Hotspot 2.0, also known as HS2 and Wi-Fi Certified Passpoint.
Using an open public network is the easiest way to create a free hotspot.
All of the above are true
6. Which of the following is/are audio output device?
Subwoofer
Speakers
Scanner
Both (a) and (b)
None of the above
7. __________ is a self-contained step-by-step set of operations to be performed.
Algorithm
Application software
Network topology
System Software
Utility software
8.___________is designed to communicate instructions to a machine, particularly a computer. It can be used to create programs to control the behavior of a machine or to express algorithms.
PROM
Programming language
Microcontrollers
EPROM
None of the above
9. What is the keyboard shortcut to close the current window?
Alt+F5
Alt+F8
Alt+F4
Alt+F9
None of the above
10. Domain names are formed by the rules and procedures of the __________.