Google News
logo
Computers - General Knowledge Questions
A)
Mouse
B)
CPU
C)
Internet
D)
Scanner

Correct Answer : Option (B) - CPU

A)
Vinton Cerf
B)
VA Shiva Ayyadurai
C)
James Gosling
D)
Tim Berners-Lee

Correct Answer : Option (B) - VA Shiva Ayyadurai

V.A. Shiva Ayyadurai, an Indian-born American scientist and entrepreneur, developed a computer program in 1978, which replicated the features of the interoffice, inter-organizational paper mail system. He named his program “EMAIL”. It was the world’s first full-scale electronic emulation of mail system consisting of: Inbox, Outbox, Folders, the Memo, Attachments, etc.The US Copyright Office issued a Certificate of Registration to him on the program in 1982.

A)
CPU and ROM
B)
RAM and ROM
C)
CPU and Hard disk
D)
CPU and RAM

Correct Answer : Option (D) - CPU and RAM

Cache memory is a very high speed semiconductor memory which can speed up the processor or CPU. It acts as a buffer between the CPU and main memory (RAM). It is used to hold those parts of data and program which are most frequently used by CPU. The parts of data and programs are transferred from disk to cache memory by operating system, from where CPU can access them.

A)
Processes
B)
Daemons
C)
Process Block
D)
Process Control Block

Correct Answer : Option (B) - Daemons

In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user. Systems often start daemons at boot time and serve the function of responding to network requests, hardware activity, or other programs by performing some task.

A)
Flip Flop
B)
Vector
C)
Encoder
D)
Register

Correct Answer : Option (A) - Flip Flop

In electronics, a flip-flop or latch is a circuit that has two stable states and can be used to store state information.A flip-flop stores a single bit (binary digit) of data; one of its two states represents a “one” and the other represents a “zero”. Such data storage can be used for storage of state, and such a circuit is described as sequential logic. When used in a finite state machine, the output and next state depend not only on its current input, but also on its current state.

A)
USA
B)
India
C)
China
D)
Russia

Correct Answer : Option (C) - China

* Chaina : 854,000,000 Users
India: 560,000,000 Users
USA : 313,322,868 Users
Russia : 116,353,942 Users

A)
Pathing
B)
Directing
C)
Selecting
D)
Routing

Correct Answer : Option (A) - Routing

In order to transfer packets from a sending host to the destination host, the network layer must determine the path that the packets are to follow. Routing is the process by which systems decide where to send a packet. It directs network packets from their source toward their destination through intermediate network nodes by specific packet forwarding mechanisms.

A)
BCD Number System
B)
Binary Number System
C)
Decimal Number System
D)
Excess 3-Code

Correct Answer : Option (D) - Excess 3-Code

The weighted codes are those that obey the position weighting principle, which states that the position of each number represent a specific weight. In weighted codes, each digit is assigned a specific weight according to its position. Non-weighted or un-weighted codes are those codes in which the digit value does not depend upon their position i.e., each digit position within the number is not assigned fixed value. Examples of non-weighted codes are: Un-weighted BCD code, Excess-3 code and gray code.

A)
Circulatory
B)
Human brain
C)
Computer programs
D)
Chemical storage devices

Correct Answer : Option (B) - Human brain

Wetware is a term drawn from the computer-related idea of hardware or software, but applied to biological life forms. Here the prefix “wet” is a reference to the water found in living creatures. Wetware is used to describe the elements equivalent to hardware and software found in a person, namely the central nervous system (CNS) and the human brain.

A)
Write – back
B)
Cache – write
C)
Write – through
D)
Protected – write

Correct Answer : Option (A) - Write – back

The write-back method involves updating only the cache location and to mark it as updated with an associated flag bit, often called the dirty or modified bit. The main memory location of the word is updated later, when the block containing this marked word is to be removed from the cache to make room for a new block. The reason for the write back method is that during the time a word resides in the cache, it may be updated several times.