If Any request contact us :techtanu17@gmail.com << Catch on Facebook << If any link broken, Plz tell. we try to fix them.

Friday 25 October 2013

COMPUTER FUNDAMENTAL QUESTIONS FREE DOWNLOAD

UGC NET JUNE 2013 SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS. 
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTET, CTET, TET, UGC-NET, IBPS CLERK, IBPS PO, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.

IF YOU KNOW ANSWER OF ANY QUESTIONS PLEASE TELL ME. THAT ANSWER HELP THE OTHER STUDENT IN FUTURE. THANKS. PLEASE REPLY RIGHT ANSWER.

General knowledge for Kendriya Vidyalaya Sangathan Post Graduate Teacher PGT Preliminary Exam.
General knowledge for Kendriya Vidyalaya Sangathan Post Graduate Teacher PGT Preliminary Exam.

KVS Online vacancy for Post Graduate Teachers (PGTs) model paper GK
KVS PGT Examination practice GK

Current General Knowledge for endriya Vidyalaya Sangathan Post Graduate Teacher Preliminary Exam.

GK Objective General Knowledge Computer Quiz Questions
GK Objective General Knowledge Computer Quiz Questions
Computer Knowledge Objective Type Questions
Computer GK Computer Awareness objective Questions for Exams

CTET Solved Previous Year Question Papers | Free Download


Central Teacher Eligiblity Test (CTET) Solved Previous Year Question Papers, Free to Download, last year question Papers, Practice Papers, CTET exam Result 2013

COMPUTER ARCHITECTURE OBJECTIVE  QUESTIONS WITH SOLUTIONS FREE DOWNLOAD


COMPUTER FUNDAMENTAL QUESTIONS THAT WIDELY ASK OR HELPFULL  IN MANY COMPETITION EXAMS. SOME EXAMPLES ARE BELOW.


1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A






IF YOU FIND ANY ANSWER WRONG,COMMENT ME, SO THAT I RIGHT THAT ANSWER

IF YOU HAVE ANY STOCK OF QUESTION, THEN PLEASE SEND ME FOR OTHER HELP FULL STUDENTS.
THANK 


0 comments:

Post a Comment