Professional Documents
Culture Documents
Basic Computer Knowledge PDF
Basic Computer Knowledge PDF
Portalforjobs.com
Portalforjobs.com
Page 2
8. Which of the following is not an example of real security and privacy risk?
A) Hackers
B) Virus
C) Spam
D) Identity Theft
9. The ---- is the term used to describe the window that is currently being used.
A) Web Window
B) Display Area
C) Active Window
D) Monitor
10. BIND stands for
A) Binary Internet Domain
B) Binary Intranet Domain
C) Berkeley Internet Name Domain
D) None of the above
Portalforjobs.com
Page 3
11. The time required to complete a single, continuous execution of a object program is
called
A) Runtime
B) Access time
C) Random time
D) Response time
Page 4
16. Device which allows your computer to connect to another computer via a phone line
A) server
B) modem
C) jack
D) hard disk
Portalforjobs.com
Page 5
Portalforjobs.com
Ans
B
A
C
A
D
B
A
C
C
C
Q.No
11
12
13
14
15
16
17
18
19
20
Ans
A
C
B
B
D
B
A
C
A
A
Page 6