11
ROM stands for _____________ .
A.
B.
C.
D.
Answer & Solution
Read-only memory (ROM) is a type of non-volatile memory used
in computers and other electronic devices in order to store data that can't be
electronically modified.
12
RAM belongs to which kind of memory?
A.
B.
C.
D.
Answer & Solution
RAM (Random Access Memory) is a part of the computer's Main
Memory or primary memory which is directly accessible by the CPU whenever needs
to retrieve data.
13
The memory is for short term storage and is lost when the computer is turned off _________ .
A.
B.
C.
D.
Answer & Solution
RAM (Random Access Memory) is a part of the computer's Main
Memory which is directly accessible by the CPU whenever needs to retrieve data.
RAM contains data only as long as the computer is switched on. Hence, it is
also called Volatile memory.
14
Which of the following is an example of a non-volatile computer memory?
A.
B.
C.
D.
Answer & Solution
ROM is non-volatile memory as it doesn't erase data even
after reboot.
15
Which semiconductor memory stored data will remain permanently stored as long as power provide is?
A.
B.
C.
D.
Answer & Solution
Static memory devices are semiconductor memory devices
in which stored data is retained as long as power is applied. SRAM (static RAM)
is a type of such random access memory (RAM) that retains data bits in its
memory as long as power is being supplied.
16
Which one is external Cache Memory?
A.
B.
C.
D.
Answer & Solution
The external cache memory is an
area between the CPU and the system bus where some very high-speed memory is
located to store frequently requested instructions. Integrated Circuit (IC) is
a such hardware component that stores frequently-used data outside the main
memory (RAM) of a computer to ensure faster access to stored data and reduces
processing times by minimizing the need for the CPU to access the memory.
17
Phishing Attack is related to fake______ .
A.
B.
C.
D.
Answer & Solution
Phishing is a malicious attack through e-mail setting a bug with an enticing request or lures with an attempt to
steal sensitive information.
18
Which device is mainly related to providing security of a network?
A.
B.
C.
D.
Answer & Solution
Firewalls are one of the most
fundamental network security appliances. Like many other security devices,
firewalls can come in hardware or software forms.
19
Firewall protects which of the following attack?
A.
B.
C.
D.
Answer & Solution
Firewalls protect computers, websites and web applications
from unauthorized access by blocking incoming traffic that is not associated
with a known website or web application.
20
When you start your computer, then which component works first?
A.
B.
C.
D.
Answer & Solution
When your computer is started, then BIOS works first. The
BIOS starts the monitor and keyboard, and does some basic checks to make sure
the computer is working properly.
