Loading

Sunday, November 20, 2011

Computer Quiz - 4

1. Which of the following is the correct sequence of actions that take place during the boot-up process?
[A]Load Operating System ? Activate Bios ? Perform Post ? Check Configuration Settings
[B]Activate Bios ? Perform Post ? Load Operating System ? Check Configuration Settings
[C]Perform Post ? Load Operating System ? Activate Bios ? Check Configuration Settings
[D]Activate Bios ? Check Configuration Settings ? Perform Post ? Load Operating System



2. The program that is responsible for loading the operating system into RAM is the:
[A]BIOS
[B]Bootstrap Program.
[C]Device Driver.
[D]Supervisor Program.



3. The Basic Input/Output system resides in:
[A]RAM
[B]ROM
[C]The CPU
[D]Memory Cache.



4. When you start up the computer, the boot-up stage at which the BIOS version, manufacturer, and data are displayed on the monitor is called:
[A]Bootstrap.
[B]Power-On Self Test.
[C]System Configuration.
[D]Kernel Loading.



5. Part of the POST process is to ensure that the test of essential peripheral devices coincides with the hardware configurations that are stored in:
[A]ROM
[B]The Hard Drive.
[C]CMOS
[D]Cache Memory.



6. Programs that automatically submit your search request to several search engines simultaneously are called—
[A]Metasearch engines
[B]Webcrawlers
[C]Spiders
[D]Hits



7. Graphical diagrams used to represent different multiple perspectives of a system include—
[A]use-case, class, and state diagrams
[B]state, interaction, derivative diagrams
[C]interaction, relationship, and class diagrams
[D]deployment, relationship, and use-case diagrams



8. Database redesign is not terribly difficult if the—
[A]database is structured
[B]database is well-designed
[C]database has no data
[D]database is relatively small



9. Which of the following are normally used to initialize a computer system's hardware?
[A]Bootstrap memory
[B]Volatile memory
[C]Random access memory
[D]Static memory



10. If you wanted to locate the hardware address of a local device, which protocol would you use?
[A]ARP
[B]RARP
[C]ICMP
[D]PING



11. What is Internet 2?
[A]A new type of cabling system for Wide Area Networks
[B]A second local area network that can connect with another online LAN to share access
[C]A new standard for Internet browsers
[D]An association to develop advanced Internet technology



12. The term, "hypertext", means—
[A]Non-sequential writing
[B]Hypermedia
[C]Blinking text
[D]Text with heavy formatting



13. While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?
[A]Visit Google's cached page to view the older copy.
[B]Forget about it, as there is no way to find this information.
[C]Visit a partner site of the organization to see if it is there.
[D]Use the wayback machine.



14. Which kind of lock includes a keypad that can be used to control access into areas?
[A]Cipher
[B]Warded
[C]Device
[D]Tumbler



15. A……………..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
[A]system virus
[B]trojan horse virus
[C]file virus
[D]macro virus



0 comments: