0% found this document useful (0 votes)
37 views2 pages

N 3

Poy

Uploaded by

Prakash Gke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views2 pages

N 3

Poy

Uploaded by

Prakash Gke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

B) Executing multiple threads simultaneously within a single process

C) Using multiple CPUs for a single task


D) Increasing the clock speed of a CPU

26. What is the function of the BIOS (Basic Input/Output System)?

A) To manage network connections


B) To initialize hardware during the boot process
C) To store user data
D) To execute applications

27. Which of the following is a key feature of cloud computing?

A) Local data storage


B) On-demand resource availability
C) Limited accessibility
D) High maintenance costs

28. What does the term "bandwidth" refer to in networking?

A) The amount of data that can be transmitted in a given time


B) The physical distance between devices
C) The type of network protocol used
D) The number of connected devices

29. Which of the following is a common output device?

A) Scanner
B) Mouse
C) Monitor
D) Keyboard

30. What is the primary role of an operating system?

A) To execute hardware instructions


B) To manage computer hardware and software resources
C) To store user data
D) To provide internet connectivity

31. Which of the following describes the function of a network interface card (NIC)?

A) To connect a computer to a network


B) To store data
C) To manage power supply
D) To execute software applications

32. What is the purpose of a firewall in a computer network?

A) To increase data transfer speed


B) To protect the network from unauthorized access
C) To manage hardware resources
D) To store user data

33. Which of the following is a characteristic of a server?

A) Designed for personal use


B) High processing power and storage capacity
C) Limited connectivity options
D) Low power consumption

34. What does the acronym "HTTP" stand for?

A) Hypertext Transfer Protocol


B) High Transfer Text Protocol
C) Hyperlink Text Transfer Protocol
D) High Throughput Transfer Protocol

35. Which of the following is a common programming language used for web development?

A) Python
B) Assembly
C) C++
D) HTML

36. What is the primary function of a database management system (DBMS)?

A) To execute applications
B) To manage and organize data
C) To connect to the internet
D) To perform calculations

37. Which of the following is a benefit of using virtualization technology?

A) Increased hardware costs


B) Improved resource utilization
C) Limited scalability
D) Higher power consumption

38. What does the term "open source" refer to in software development?

A) Software that is free to use and modify


B) Software that is only available for purchase
C) Software that is proprietary and closed to modifications
D) Software that requires a subscription

39. Which of the following is a common type of network topology?

A) Linear
B) Circular
C) Star
D) Random

40. What is the primary purpose of encryption in data security?

A) To increase data transfer speed


B) To protect data from unauthorized access
C) To store data efficiently
D) To manage network traffic

41. Which of the following is a characteristic of a relational database?

A) Data is stored in a flat file


B) Data is organized in tables with relationships
C) Data is unstructured

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy