Sunteți pe pagina 1din 55

INTERNET, WEB & E-MAIL BASICS

1. The internet also known simply as --------


Answer: Net

2. What was the first network that planted the seeds of internet? It is the first prototype
of the internet.
Answer: ARPANET (Advanced Research Projects Agency Network)

3. The Internet was originally a project of which agency?


Answer: ARPA

4. An American Internet pioneer, who is recognized as one of "the fathers of the


Internet", sharing this title with TCP/IP co-inventor Bob Kahn.
Answer: Vint Cerf / Vinton Gray Cerf

5. Internet was developed in the


Answer: 1950s

6. A network that links computers around the world is the...?


Answer: Internet

7. It is the standard protocol of the Internet.


Answer: TCP/IP

8. The primary method of communication on the internet uses two sets of rules known
as __________.
Answer: TCP/IP (Transmission Control Protocol/Internet Protocol)

9. It is the common set of rules for all devices to communicate effectively with one
another, over the internet.
Answer: IP (Internet Protocol)

10. Who provides you with a connection to the internet?


Answer: ISP (Internet service provider)

11. Who is the founder of the Internet and the inventor of the World Wide Web?
Answer: Tim Berners-Lee

12. World Wide Web was proposed by __________.


Answer: Bill Rogers

13. The collection of links throughout the Internet creates an interconnected network
called the __________.
Answer: www (World Wide Web)

14. The birth of the www was in which year?


Answer: 1989

15. -------- to transmit information on the World Wide Web.


1
Answer: HTTP (Hyper Text Transfer Protocol)

16. An HTTP request contains ______ parts.


Answer: 3

17. What type of data uses the http port?


Answer: Web Page

18. One area of the www usually an article or paragraph using both text and pictures
(graphics) is the what? It is information from another computer that is designed for
the World Wide Web and is accessible by the use of a web browser.
Answer: Web Page

19. A computer on the Internet that hosts data, that can be accessed by web browsers
using HTTP is known as:
Answer: Web Server

20. What is the webpage that appears and your browser uses when it opens up? It
refers to the main page of a website. It is the first web page that the web browser
will open when the browser is loaded.
Answer: Home Page

21. The name given to an area of the www that is identified by its own Internet address
is a what?
Answer: Website

22. What is the software program that lets you search and see material on the Internet?
It is a computer program that allows one to display and interact with text, images,
music, video, and other resources found on a Website on the World Wide Web.
Answer: Web Browser

23. The World Wide Web address of a certain site is the...?


Answer: URL / Uniform Resource Locator

24. What do you type into the address bar of a web browser to go to a particular
website address? It is the address or location of a website, and the user enters this
information to go to that specific web address.
Answer: URL (uniform reference locator)

25. What is the hosted web domain (suffix) for websites or e-mail hosted by the
government?
Answer: .gov

26. What is the hosted web domain (suffix) for websites or e-mail hosted by the military?
Answer: .mil

27. What is the hosted web domain (suffix) for websites or e-mail hosted by nonprofit
organizations?
Answer: .org

2
28. What is the hosted web domain (suffix) for websites or e-mail hosted by schools?
Answer: .edu

29. What is the hosted web domain (suffix) for websites or e-mail hosted by commercial
businesses?
Answer: .com

30. It stores information about the user’s web activity.


Answer: Cookie

31. What is the name given to the temporary storage area that a web browser uses to
store pages and graphics that it has recently opened?
Answer: Cache

32. Who is the father of e-mail (electronic mail)?


Answer: Ray Tomlinson

33. Which is the standard protocol for sending email? It is an Internet standard for email
transmission. First defined by RFC 821 in 1982, it was updated in 2008 with Extended
SMTP additions by RFC 5321; which is the protocol in widespread use today.
Answer: SMTP (Simple Mail Transfer Protocol)

34. Which is the standard protocol for receiving email? It is an application-layer


Internet standard protocol used by e-mail clients to retrieve e-mail from a mail
server.
Answer: POP3 (Post Office Protocol)

35. It is a type of digital subscriber line (DSL) technology, a data communications


technology that enables faster data transmission over copper telephone lines than
a conventional voice band modem can provide.
Answer: ADSL (Asymmetric Digital Subscriber Line)

36. It is a standard network protocol used for the transfer of computer files between a
client and server on a computer network.
Answer: FTP / File Transfer Protocol

37. It is a hierarchical decentralized naming system for computers, services, or other


resources connected to the Internet or a private network.
Answer: DNS (Domain Name System)

38. It is used to write web pages. It is the coding language used to create documents
for use on the World Wide Web. It is the fundamental language used for formatting
text on web pages.
Answer: HTML / Hypertext markup language

39. Which is required to create an HTML document?


Answer: Text editor

40. In HTML, tags consist of keywords enclosed within


Answer: Angular brackets <>
3
41. It is a markup language that defines a set of rules for encoding documents in a
format that is both human-readable and machine-readable.
Answer: XML (Extensible Markup Language)

42. It is a set of communication standards for simultaneous digital transmission of voice,


video, data, and other network services over the traditional circuits of the public
switched telephone network. It was first defined in 1988 in the CCITT red book.
Answer: ISDN (Integrated Services Digital Network)

43. The speed of your net access is defined in terms of __________. It is a measure of
bandwidth (the amount of data that can flow in a given time) on a data
transmission medium.
Answer: Kbps (kilobits per second)

44. Which is the slowest Internet connection service?


Answer: Cable modem

45. It is the maximum rate of data transfer across a given path.


Answer: Bandwidth

46. It is to send data to a remote system such as a server or another client so that the
remote system can store a copy. To put a file on the internet, it can be as small as
a photo or as big as a full computer program.
Answer: Upload

47. It is process of transferring / getting files from the Internet to your computer. It means
to receive data from a remote system, typically a server such as a web server, an
FTP server, an email server, or other similar systems.
Answer: Download

48. _________ is a protocol used on the Internet or local area network to provide a
bidirectional interactive text-oriented communication facility using a virtual
terminal connection.
Answer: Telnet

49. The secret code that gives you access to some program is __________.
Answer: Password

50. Secret–key encryption is also known as


Answer: Private encryption

DIGITAL MEDIA

1. It is the use of creative design and computer technology to combine forms of


media to reach the audience in various ways. They are any media that are
encoded in machine-readable formats. It can be created, viewed, distributed,
modified and preserved on digital electronics devices.
4
Answer: Digital Media

2. It is the collective communication outlets or tools used to store and deliver


information or data. It is either associated with communication media, or the
specialized mass media communication businesses such as print media and the
press, photography, advertising, cinema, broadcasting, publishing and point of
sale.
Answer: Media

3. Created and controlled by a community of users that interact using the Internet.
They are interactive computer-mediated technologies that facilitate the creation
and sharing of information, ideas, career interests and other forms of expression via
virtual communities and networks.
Answer: Social Media

4. Communication that was well-established before the Internet age; books,


newspapers, magazines, etc.
Answer: Traditional Media

5. It is a diversified collection of media technologies that reach a large audience


via mass communication.
Answer: Mass Media

6. It is an online platform which people use to build social networks or social relations
with other people who share similar personal or career interests, activities,
backgrounds or real-life connections.
Answer: SNS (Social Networking Service)

7. It is what most people think of when they think of advertising. It’s the most traditional
of the three types of digital media—you pay to leverage an existing channel.
Examples include digital display ads, paid search, and native advertising.
Answer: Paid Media

8. It is often referred to as “online word of mouth.” It includes SEO rankings, social


media mentions, and content getting picked up by a third party.
Answer: Earned Media

9. It is perhaps the least understood of the three types of digital media. It’s any media
that is controlled directly by your brand, such as your company website, blog, or
social media account.
Answer: Owned Media

10. It is the name of the hypothetical proto-hypertext system that Vannevar Bush
described in his 1945 The Atlantic Monthly article "As We May Think".
Answer: Memex

11. Itis an ability to use diverse analog and digital technologies, techniques, modes,
and protocols to search for and work with a variety of resources; to collaborate and
participate in social networks; and to communicate meanings and new knowledge
by using different tones, genres, modalities, and media.
Answer: Transliteracy

5
12. It encompasses the practices that allow people to access, critically evaluate, and
create media.
Answer: Media Literacy

13. It refers to an individual's ability to find, evaluate, and compose clear information
through writing and other mediums on various digital platforms.
Answer: Digital Literacy

14. The sequencing of content in a broadcast is called a ___________.


Answer: Schedule

15. A ___________ or generically netcast, is an episodic series of digital audio or video


files which a user can download in order to listen to.
Answer: podcast

16. It is a book publication made available in digital form, consisting of text, images, or
both, readable on the flat-panel display of computers or other electronic devices.
Answer: e-book / eBook / electronic book

17. Starting back in 1971, Michael S. Hart launched Project Gutenberg and digitized
the U.S. ________________, becoming the first eBook in the world.
Answer: Declaration of Independence

18. Intended to persuade the audience to use or buy a product; examples include
commercials, advertisements, and other marketing products.
Answer: Commercial

19. Category of a media product such as comedy, action, drama etc.


Answer: Genre

20. A humorous image with text that is copied (often with slight variations) and spread
rapidly by Internet users.
Answer: Meme

21. When a YouTube video is seen by thousands of people over a short period of time.
Answer: Viral

22. The target audience for broadcast programs such as the news may be described
as a ______________________ audience.
Answer: Mainstream

23. They are standardized means of organizing and storing digital images.
Answer: Image File Formats

24. It is a standard file format for compressing pictures so they can be stored or sent by
email more easily.
Answer: JPEG (Joint Photographic Experts Group)

25. It is a is a common format for exchanging raster graphics (bitmap) images between
application programs, including those used for scanner images
Answer: TIFF (Tag Image File Format)

6
26. It is a bitmap image format animation that was developed by a team at the online
services provider CompuServe led by American computer scientist Steve Wilhite on
June 15, 1987.
Answer: GIF (Graphic Interchange Format)

27. It is an image file format that can be used to create and store computer graphics.
Answer: BMP (Bitmap)

28. It is a raster-graphics file-format that supports lossless data compression.


Answer: PNG (Portable Network Graphics)

29. It is an XML-based vector image format for 2D graphics with support for interactivity
and animation. It is an open standard developed by the W3C, since 1999.
Answer: SVG (Scalable Vector Graphics)

30. Computers reproduce photos by breaking the image up into small squares called
Answer: Pixels

31. The total number of pixels in an image is referred to as the image's __________.
Answer: Resolution

32. In relation to mobile digital devices, what does the term 'app' mean?
Answer: Application

33. These are weblogs with a limit on the amount of information per post.
Answer: Microblogs

34. It is the most commonly used microblog.


Answer: Twitter

35. It is an American online news and social networking service on which users post and
interact with messages known as "tweets".
Answer: Twitter

36. He is an American computer programmer and Internet entrepreneur who is co-


founder and CEO of Twitter, and founder and CEO of Square, a mobile payments
company.
Answer: Jack Patrick Dorsey

37. Who is the founder of Facebook which is currently the no.1 social networking
website in India?
Answer: Mark Zuckerberg

38. What is the term given to the combination of two or more types of information such
as text, video, audio, and pictures (graphics)?
Answer: Multimedia

39. It is a social networking website offering an interactive, user-submitted network of


friends, personal profiles, blogs, groups, photos, music, and videos. It was the largest
social networking site in the world from 2005 to 2009. It is headquartered in Beverly
Hills, California.
Answer: Myspace

7
40. It was a social networking website launched in 2005, that now describes itself as "a
company that dreams up ideas for fun social apps;" Grant Denholm, the man
behind the it relaunch, has confirmed that the site will not be returning as a social
network but as a company that makes social apps.
Answer: Bebo

41. A color pixel needs three numbers to define its color: one number each to indicate
how much
Answer: Red, green, and blue

42. What does CMYK stand for?


Answer: cyan, magenta, yellow, and key (black)

43. The person responsible for overseeing the shooting and assembly of a film is known
as the ___________________.
Answer: Director

44. The person who manages the production of a film, coordinates the filmmaking
process to ensure that everyone involved in the project is working on schedule and
on budget is also known as ____________.
Answer: Producer

45. The person responsible for the sequencing of shots and creating meaning from the
rushes is known as a video _____________________. They take each small clip and put
them together into a continuous sequence.
Answer: Editor

46. The production designer produces ___________________________ which translates


the film script into visual form. It is a graphic organizer in the form of sketches or
images displayed in sequence on paper in order to show what the sequence will
be.
Answer: Storyboards

47. A smaller more focused or specialized format.


Answer: Niche

48. The number of frames captured in a second - TV is usually 24 fps.


Answer: Frame Rate

49. Buttons and image maps to allow users to interact with the site and access
information quickly.
Answer: Graphical User Interface (GUI)

50. Clickable connections that link text or images to other pages of the website, out to
external websites, or to files posted on a website.
Answer: Hyperlinks

51. They are part of a web page's head section and describe a page's content
Answer: Meta Tags

52. Computer programs that "crawl" through the pages of a website to find tags,
keywords, and other information
Answer: Web Crawlers
8
53. Visual representation of your abilities, skills, capabilities, knowledge, qualities - and
it represents your potential. Physically, it's a collection of things - tangible materials
- that represent work-related events in your life.
Answer: Portfolio

e-COMMERCE

1. It is defined as the online exchange of goods, services and money between firms,
and also between firms and their customers. It is the encompassing term that
involves the use of electronic platforms intranets, extranets and the Internet to
conduct a company’s business.
Answer: Electronic Commerce (EC)

2. The Top 3 Ecommerce Sites of 2017


Answer: 1. Walmart.com: The best mobile-optimized ecommerce website
2. Apple.com: The best brand-oriented ecommerce website
3. Amazon.com: The best product-driven ecommerce website

3. It can be seen to be all electronically mediated information exchanges, both within


an organization and with external stakeholders supporting the range of business
processes.
Answer: E-business

4. It is selling products or services between businesses through the internet via an


online sales portal. In general, it is used to improve efficiency for companies. Instead
of processing orders manually – by telephone or e-mail – with e-commerce orders
can be processed digitally. Commercial transactions between an organization
and other organizations.
Answer: B2B e-commerce (business-to-business, electronic commerce)

5. Commercial transactions between an organization and consumers.


Answer: Business-to-consumer (B2C)

6. It is a business model in which consumers (individuals) create value and businesses


consume that value. For example, when a consumer writes reviews or when a
consumer gives a useful idea for new product development then that consumer is
creating value for the business if the business adopts the input. A reverse auction or
demand collection model, enables buyers to name or demand their own price,
which is often binding, for a specific good or service. The roles involved in the
transaction must be established and the consumer must offer something of value
to the business.
Answer: Consumer-to-business (C2B)

7. An innovative way to allow customers to interact with each other. Traditional


markets require business to customer relationships, in which a customer goes to the
business in order to purchase a product or service. The business facilitates an
environment where customers can sell goods or services to each other.
Answer: Customer to customer (C2C)

9
8. It is the process of selling consumer goods or services to customers through
multiple channels of distribution to earn a profit.
Answer: Retail

9. It is the delivery of electronic commerce capabilities directly into the consumer’s


hand, anywhere, via wireless technology.
Answer: Mobile Commerce

10. Who coined the term Mobile Commerce in 1997 at the launch of the Global Mobile
Commerce Forum?
Answer: Kevin Duffey

11. It is a term describing trade via a (smart) digital TV-set which - besides its main
functionality - acts as a channel enabling bidirectional
communication enabling interactive advertising and addressable advertising. It is
part of Electronic Business and e-Commerce which themselves are the most
prominent parts of u-Commerce.
Answer: T-Commerce

12. It refers to a variety of goods and/or services. Sometimes, it is used to refer to the
wireless, continuous communication and exchange of data and information
between and among retailers, customers, and systems (e.g., applications)
regardless of location, devices used, or time of day.
Answer: Ubiquitous Commerce / U-Commerce

13. It is a form of electronic commerce which allows consumers to directly


buy goods or services from a seller over the Internet using a web browser.
Answer: Online Shopping

14. It refers to a physical presence of an organization or business in a building or other


structure.
Answer: Brick and mortar (B&M)

15. Various digital media channels can be used to reach audiences when planning,
for example, online marketing campaigns. Search engine marketing places
messages on a search engine to encourage click-through to a website when the
user types a specific keyword phrase. A key marketing technique involves paid
placements or sponsored links using PPC. What does PPC stand for?
Answer: Pay per click

16. It is the concept of businesses electronically communicating information that was


traditionally communicated on paper, such as purchase orders and invoices.
Answer: Electronic Data Interchange (EDI)

17. Electronic transfer of money from one bank account to another, either within a
single financial institution or across multiple institutions, via computer-based systems,
without the direct intervention of bank staff.
Answer: Electronic Funds Transfer (EFT)

18. It is a method of electronic funds transfer from one person or entity to another. It
can be made from one bank account to another bank account or through a
transfer of cash at a cash office.
Answer: Wire Transfer / Bank Transfer / Credit Transfer
10
19. Also known as internet banking, is an electronic payment system that enables
customers of a bank or other financial institution to conduct a range of financial
transactions through the financial institution's website.
Answer: Online Banking

20. It is a feature of online, mobile and telephone banking, similar in its effect to a giro,
allowing a customer of a financial institution to transfer money from
their transaction or credit card account to a creditor or vendor such as a public
utility, department store or an individual to be credited against a specific account.
Answer: Electronic Bill Payment

21. It is a payment card issued to users (cardholders) to enable the cardholder to pay
a merchant for goods and services based on the cardholder's promise to the card
issuer to pay them for the amounts plus the other agreed charges.
Answer: Credit Card

22. Also known as a bank card, plastic card or check card, is a plastic payment
card that can be used instead of cash when making purchases. It is similar to
a credit card, but unlike a credit card, the money is immediately transferred directly
from the cardholder's bank account when performing a transaction.
Answer: Debit Card

23. What are plastic cards the size of a credit card that contains an embedded chip
on which digital information can be stored?
Answer: Smart Cards

24. It was conceived by David Chaum as an anonymous cryptographic electronic


money or electronic cash system in 1982. It was realized through his
corporation Digicash and used as micropayment system at one US bank from 1995
to 1998.
Answer: Ecash

25. It is one form of e-cash which is a method of transferring money from one person’s
account to another.
Answer: Electronic Check

26. It is where information systems facilitate and manage transaction-oriented


applications, typically for data entry and retrieval transaction processing.
Answer: Online Transaction Processing (OLTP)

27. It refers to transactions involved with selling products to an organization’s customers.


Answer: Sell-side e-commerce

28. Which term represents a count of the number of people who visit one site, click on
an ad, and are taken to the site of the advertiser?
Answer: Click-through

29. What is the percentage of customers who visit a Web Site and actually buy
something called?
Answer: Conversion Rate

11
30. Which term is taken to explain a collection of web services that facilitate interaction
of web users with sites to create user-generated content and encourage behaviors
such as community or social network participation?
Answer: Web 2.0 concept

31. It requires a person submitting a web form such as a comment to enter letters or
numbers from an image to validate that they are a genuine user.
Answer: Captcha (Completely Automated Public Turing test to tell Computers
and Humans Apart)

32. The most common method and traditional form of auctions in which one seller
entertains bids from many buyers is referred to as _______.
Answer: Forward Auctions

33. What is the process in which a buyer posts its interest in buying a certain quantity of
items, and sellers compete for the business by submitting successively lower bids
until there is only one seller left?
Answer: Reverse Auction

34. It is an American multinational e-commerce corporation based in San Jose,


California that facilitates consumer-to-consumer and business-to-consumer sales
through its website.
Answer: eBay

35. Who founded the eBay?


Answer: Pierre Omidyar

36. It is a multinational technology company focusing in e-commerce, cloud


computing, and artificial intelligence in Seattle, Washington. It is one of the Big
Four or "Four Horsemen" of technology along
with Google, Apple and Facebook due to its market capitalization, disruptive
innovation, brand equity and hyper-competitive application process.
Answer: Amazon.com, Inc., / Amazon

37. Amazon.com is well-known for which e-commerce marketing technique?


Answer: Affiliate Programs

38. It is an acronym referred to as Google, Amazon, Facebook, Apple and Microsoft,


the top five multinational technology companies. It is an extended version of GAFA
(also called as The Big Four) coined by Eric Schmidt, Phil Simon, and Scott
Galloway as driving a large amount of growth in technology.
Answer: GAFAM

39. It is shared pools of configurable computer system resources and higher-level


services that can be rapidly provisioned with minimal management effort, often
over the Internet.
Answer: Cloud Computing

40. It is the process of encoding a message or information in such a way that only
authorized parties can access it and those who are not authorized cannot.
Answer: Encryption

41. It is the process of transforming encrypted information so that it is intelligible again.


12
Answer: Decryption

42. A product or service that customers have come to expect from an industry, which
must be offered by new entrants if they wish to compete and survive, is knows as
___________.
Answer: Entry Barriers

43. What is the name given to an interactive business providing a centralized market
where many buyers and suppliers can come together for e-commerce or
commerce-related activities?
Answer: Electronic Marketplace

44. Which form of e-marketplace brings together buyers and sellers from multiple
industries, often for MRP materials?
Answer: Horizontal

45. Which form of e-marketplace brings together buyers and sellers from the same
industry?
Answer: Vertical

46. It is a form of advertising on the World Wide Web delivered by an ad server. This
form of online advertising entails embedding an advertisement into a web page. It
is intended to attract traffic to a website by linking to the website of the advertiser.
Answer: Banner Ad

47. Which type of add appears on a web page?


Answer: Banner Ad

48. Are forms of online advertising on the World Wide Web. It is a graphical user
interface (GUI) display area, usually a small window, that suddenly appears in the
foreground of the visual interface.
Answer: Pop-up Ad /Pop-ups

49. What type of ad appears on top of a web page?


Answer: Pop-Up Ad

50. What type of ad appears under a web page?


Answer: Pop-Under Ad

51. It is an internet-based company that makes it easy for one person to pay another
over the internet.
Answer: Financial Cybermediary

COMPUTER NETWORKS

1. It consists of two or more computers that are linked in order to share resources (such
as printers and CD-ROMs), exchange files, or allow electronic communications. The

13
computers may be linked through cables, telephone lines, radio waves, satellites,
or infrared light beams.
Answer: Network

2. It is network that uses wireless distribution to interconnect digital devices.


Answer: Wireless

3. It is a network that uses cable to interconnect digital devices.


Answer: Ethernet

4. It is a computer network used for communication among computer devices close


to one person.
Answer: Personal Area Network (PAN)

5. A network for residential use for communication among different desktop


computers, mobile phones and printers. There is usually a sharing o a broadband
service through a Digital Subscriber Line or DSL provider.
Answer: Home Area Network (HAN)

6. It is a network that is confined to a relatively small area. It is generally limited to a


geographic area such as a writing lab, school, or building.
Answer: Local Area Network (LAN)

7. It is a network that usually refers to a school or university network.


Answer: Campus Area Network (CAN)

8. It connects larger geographic areas, such as Florida, the United States, or the world.
Dedicated transoceanic cabling or satellite uplinks may be used to connect this
type of network.
Answer: Wide Area Networks (WANs)

9. It is a network that covers an area greater than a LAN but smaller than a WAN. It
may cover an entire city or a municipality. It is usually operated by the local
government units or big business entities.
Answer: Metropolitan Area Network (MAN)

10. Are in development by several groups, and there is no common definition. In


general, it is a model for supporting mobile communications across an arbitrary
number of wireless LANs, satellite coverage areas, etc.
Answer: Global Area Networks (GAN)

11. It is a small, simple, inexpensive device that joins multiple computers together.
Answer: Hub

12. It is a device that gathers the signals from devices that are connected to it, and
then regenerates a new copy of each signal.
Answer: Ethernet Switch

13. It is a device filters data traffic at a network boundary. It reduces the amount of
traffic on a LAN by dividing it into two segments.
Answer: Bridge

14
14. Are small physical devices that join multiple networks together. Also called the
residential gateway. It is a device that is used to connect the home network to the
Internet.
Answer: Routers

15. It is an internetworking system capable of joining together two networks that use
different base protocols. It can be implemented completely in software,
completely in hardware, or as a combination of both.
Answer: Network Gateway

16. It is a contraction of the terms modulator and demodulator. It performs a simple


function: they translate digital signals from a computer into analog signals that can
travel across conventional phone lines. It modulates the signal at the sending end
and demodulates at the receiving end.
Answer: Modem

17. It is a device that connects a client computer, server, printer or other component
to your network. Most often, it consists of a small electronic circuit board that is
inserted into a slot inside a computer or printer.
Answer: Network Interface

18. It protects a computer network from unauthorized access. It may be hardware


devices, software programs, or a combination of the two. It guard san internal
computer network (home, school, business intranet) against malicious access from
the outside.
Answer: Network Firewall

19. It signifies the way in which intelligent devices in the network see their logical
relations to one another.
Answer: Network Topology

20. It is a computer network typology wherein all computer connects to a single cable
or wire.
Answer: Bus Topology

21. In this kind of topology all the cables run from the computers to the central location
where they are all connected by a device called hub or switch.
Answer: Star Topology

22. In this type each computer is connected to the next computer with the last one
connected to the first. It is a local area network where the computers re connected
to a network through a loop or ring.
Answer: Ring Topology

23. It is also known as the hierarchical network. In this topology, the computers are
connected to a single root central machine, and from that single root machine,
additional machines are connected forming the second level of the hierarchy.
Answer: Tree Network

24. It is a network that employs multiple routes to send the signal in a network, where
the signal can have various paths to take from source to destination.
Answer: Mesh Network

15
25. It is where processing is controlled through the main central computer (server).
Answer: Centralized Processing

26. It is a Local Area Network (LAN) or interconnected computers that is designed to


run a program at the same time, distributing the processes among the CPUs in the
network. The computers or CPUs in the network “interact” with each other to
accomplish a common objective.
Answer: Distributed Processing

27. A computer network in which one centralized, powerful computer (called


the server) is a hub to which many less powerful personal computers or workstations
(called clients) are connected. The clients run programs and access data that are
stored on the server.
Answer: Client / Server Network

28. Any computer that makes access to files, printing, communications, or other
services available users of the network.
Answer: Server

29. It is a distributed application architecture that partitions tasks or workloads


between peers. Peers are equally privileged, equipotent participants in the
application.
Answer: P2P / Peer to Peer

30. It is a wireless local area network that links two or more digital devices, equipped
to receive wireless signals, using a wireless distribution method.
Answer: Wireless Network

31. It is wireless communication that utilizes point to point line of sight communication
used to transmit data over long distances.
Answer: Microwave

32. Wireless standards are governed and created by the ___________.


Answer: IEEE (Institute of Electrical and Electronics Engineers

33. Are the most common type of local area network technology. It is a collection of
two or more computers, printers, and other devices linked by Ethernet Cables.
Answer: Wired Networks / Ethernet Networks

34. It is a set of interconnected networks, using the Internet Protocol and uses IP-based
tools such as web browsers and ftp tools, that is under the control of a single
administrative entity.
Answer: Intranet

35. It is a network or internetwork that is limited in scope to a single organization or


entity but which also has limited connections to the networks of one or more other
usually, but not necessarily, trusted organizations or entities.
Answer: Extranet

36. It is a software program that intentionally installed on the computer by the user to
monitor or spy on what the other users of the same computer is doing.
Answer: Spyware

16
37. A software program, macro or script that has been designed to infect, destroy,
modify or cause other problems with computer or software program.
Answer: Virus

38. It is a self-replicating program that is harmful to networks. It uses the network to


duplicate its code to the hosts on a network, often without any user intervention.
Answer: Worm

39. Technically is a worm. It does not need to be attached to other software. Instead,
it is hidden in software that appears to do one thing, and yet behind the scenes it
does another. It often disguised as useful software.
Answer: Trojan Horse

40. Wireless connection used to send and receive messages.


Answer: Bluetooth

41. Abbreviation of facsimile; the electronic transmission of copies of documents for


reproduction at a remote location.
Answer: Fax

42. A command prompt used to test the ability of the source computer to reach a
specified destination computer.
Answer: Ping

43. A type of wire that consists of a center wire surrounded by insulation and then a
grounded shield of braided wire which minimizes electrical interference.
Answer: Coaxial Cable

44. It is a technology that uses glass (or plastic) threads (fibers) to transmit data. Fiber
optics has several advantages over traditional metal communications lines.
Answer: Fiber Optic

45. It is a type of cable that consists of two independently insulated wires twisted
around one another.
Answer: Twisted Pair

46. Short for Registered Jack-45, it is an eight-wire connector used commonly to


connect computers onto a Local-Area Network (LAN).
Answer: RJ45

47. It is a cable used to connect two network devices directly.


Answer: Cross-over

48. It is used in local area network to connect a PC to a network hub and router.
Answer: Straight-through

49. It is a number that is used to identify a device on the network.


Answer: IP Address

50. It is used to determine what subnet an IP address belongs to. An IP address has two
components, the network address and the host address.
Answer: Subnet Mask

17
COMPUTER HISTORY

1. It is an electronic hardware device that operates under the control of instructions


called programs that is stored in its memory.
Answer: Computer

2. An electronic machine that can solve problems, process, store & retrieve data and
calculations.
Answer: Computer

3. The first use of the word “computer” was recorded in _____, referring to a person
who carried our calculations, or computations, and the word continued to be used
in that sense until the middle of the 20th century.
Answer: 1613
4. It was an ancient memory aid device to record and document numbers, quantities,
or even message.
Answer: Tally Stick

5. At the height of their empire, the Incas used this complex chains of knotted twine
to represent a variety of data, including tribute payments, lists of arms and troops,
and notable dates in the kingdom’s chronicles.
Answer: Quipa

6. It is a mechanical device used to aid an individual in performing mathematical


calculations. It was invented in Babylonia in 2400 B.C. It was first used in China
around 500 B.C. It has beads on rods to perform basic arithmetic operations.
Answer: Abacus

7. It was invented by John Napier in 1614 that allowed the operator to multiply, divide
and calculate square and cube roots by moving the rods around and placing them
in specially constructed boards.
Answer: Napier’s Bones

8. It was invented by William Oughtred in 1622 which was used primarily for
multiplication, division, roots, logarithms and trigonometry; but normally used for
addition or subtraction.
Answer: Slide Rule

9. It was invented by Blaise Pascal in 1642 to relieve the tedium of adding up long
columns of tax figures. It was the advent of the mechanical calculator.
Answer: Pascaline

10. Who invented the first calculator?


Answer: Blaise Pascal

11. This person was a 17th century mathematician who invented a mechanical device
that used punch cards to weave complex patterns. A programming language
invented in the 1960s was named after him.
Answer: Blaise Pascal

18
12. Which high-level programming language is named after a mathematician from the
1800's who made a mechanical device that could weave complex patterns in
clothing based on punch card technology?
Answer: Pascal

13. It was invented by Gottfried Wilhelm Leibniz in 1672 that can add, subtract, multiply
and divide automatically.
Answer: Stepped Reckoner

14. It was a mechanical loom controlled by punched cards invented by Joseph-Marie


Jacquard in 1801. It was the first device that stored programs.
Answer: Jacquard Loom

15. _______________ were used by the French weaver Joseph Jacquard which carried
weaving instructions for the looms, later this idea offered a great use for storing
information.
Answer: Punched Cards
16. It was a mechanical calculator invented by Thomas de Colmar in 1820, was the first
reliable, useful and commercially successful calculating machine that could
perform the four basic mathematic functions.
Answer: Arithmometer

17. They were calculating machines made by Charles Babbage to produce table of
numbers that would be used by ship’s navigators.
Answer: Difference Engines

18. It is generally considered the first computer, designed and partly built by the English
inventor Charles Babbage in the 19th century. This was formatted to make many
calculations by process of instructions placed upon a punch card.
Answer: Analytical Engine

19. Who is considered as the “Father of all Computers” who invented two different
engines, one that used metal cards to store data and was powered by a steam
engine?
Answer: Charles Babbage

20. This 19th Century woman was considered the first programmer and was famous for
continuing the legacy of Charles Babbage's work on the Analytical Engine.
Answer: Ada Lovelace

21. Ada Lovelace is considered the world's first what?


Answer: Computer Programmer

22. It was invented by Per Georg Scheutz in 1843 based on Charles Babbage’s
difference engine. It was considered the first printing calculator.
Answer: Scheutzian Calculation Engine

23. He developed a machine in 1890 for tabulating US census which used punched
cards and actually ran on electricity, which led to his formation of the Tabulating
Machine Company, known today as IBM.
Answer: Herman Hollerith

19
24. He is considered the Father of Computer Science, described a theoretical device
called the Turing Machine or “A-Machine.” He also formalized the concepts of
computation and algorithms and later helped crack German military codes during
World War II.
Answer: Alan Turing

25. It was the first programmable computer created by Konrad Zuse in Germancy from
1936 to 1938.
Answer: Zuse’s Z1 / Z1

26. An improved version of Z1, was the world’s first calculator capable of automatic
operation.
Answer: Z3

27. It was the first electronic digital computing device invented by Professor John
Atanasoff and graduate student Clifford Berry at Iowa State University between
1939 and 1942.
Answer: Atanasoff-Berry Computer (ABC)

28. Also known as IBM Automatic Sequence Controlled Calculator (ASCC) invented by
Howard H. Aiken in 1943. It was considered the first electro-mechanical computer.
Answer: Harvard Mark I

29. Who built Mark I Computer?


Answer: Howard Aiken

30. It was the first general purpose, digital electronic computer developed by John
Presper Eckert and John W. Mauchly which was completed in 1946. It could
compute a ballistic firing trajectory in 20 sec. vs 30 min conventional way. The
newspaper reports described it as an “Electronic Brain.”
Answer: ENIAC / Electronic Numerical Integrator and Computer

31. In what year was the first electronic general purpose computer (ENIAC) created?
Answer: 1946

32. It was considered the first computer company founded by John Presper Eckert and
John W. Mauchly in 1949.
Answer: Electronic Controls Company

33. This person was a United States Admiral who programmed the Harvard Mark I
computer system in 1944 and was famously credited with coining the term,
"Computer Bug".
Answer: Grace Hopper

34. Recipient of Computer Science’s first “Man of the Year Award.


Answer: Grace Hopper

35. Grace Hopper found a moth stuck in a relay responsible for a malfunction, and
removed it, calling it __________.
Answer: Debugging

36. The first portable computer released in 1981 by the Osborne Computer Corporation.
Answer: Osborne I
20
37. It was the first commercial computer in 1951 designed by J. Presper Eckert and John
Mauchly. It used the first computer language C10. Its price was $1.25 – 1.5 M.
Answer: UNIVAC I / Universal Automatic Computer I

38. It was the first stored program computer designed by Von Neumann in 1952. It has
a memory to hold both a stored program as well as data.
Answer: EDVAC / Electronic Discrete Variable Automatic Computer

39. The German Navy developed a cipher machined named _______________ that
could automatically encode a message in such a way that only another same kind
of machine could decode it.
Answer: Enigma

40. The British developed a computer named _______________ that could decipher as
many as 2,000 messages per day. That computer used Vacuum Tubes ans was the
world’s first entirely digital computer.
Answer: Colossus

41. Tommy Flowers invented this first electronic, digital, programmable computer
called __________.
Answer: Colossus

42. In what year was 'The Colossus’ developed?


Answer: 1943

43. John Backus and IBM developed the _______________, the first successful high-level
programming language and compiler which was designed for scientific problems
and still widely used today.
Answer: Fortran

44. The first artificial intelligence program written by _______________ mimicked the
problem solving skills of a human by proving math theorems.
Answer: Allen Newell, Herbert Simon and J. C. Shaw

45. The term Artificial Intelligence (AI) would be coined in _____ at the Darmouth
Summer Research Project on Artificial Intelligence.
Answer: 1956

46. _________________________ computers used Vacuum Tubes for circuitry and


Magnetic Drums for memory. They were very expensive to operate and in addition
to using a great deal of electricity, generated a lot of heat, which was often the
cause of malfunctions.
Answer: First Generation

47. It was initially discovered by Thomas Edison in 1880s which formed the building block
for the entire electronic industry. It is a glass tube, emptied of air, in the flow of
electrons that can be controlled in various ways.
Answer: Vacuum Tube

48. What year was the first generation of modern computers started?
Answer: 1939

21
49. _______________Computers used Transistors starting in 1956, replacing vacuum tubes.
Answer: Second Generation

50. What year did the second generation of computing begin?


Answer: 1947

51. This important invention began the development of the second generation
computers, which no longer required vacuum tubes, and were much more efficient
and less expensive.
Answer: Transistor

52. It is an electronic switch made with a small piece of silicon with added impurities. It
is smaller, uses less power, more reliable and cheaper to produce than vacuum
tubes.
Answer: Transistor

53. __________ developed the transistor.


Answer: Bell Labs

54. _____________________ computers used Integrated Circuits (chips).


Answer: Third Generation

55. What year was the third generation of modern computers started?
Answer: 1961

56. This invention replaced the transistor and led to the development of third
generation computers. Processing speed increased to millions of calculations per
second.
Answer: Integrated circuits

57. Jack Kilby invented this, which started the microelectronics revolution and allowed
for smaller, more reliable computers.
Answer: integrated circuits

58. A computer generation that is more on circuits with 5000 transistors in single chip.
Answer: Fourth Generation

59. This allowed a CPU to be built on a single chip, thus allowing computer engineers
to design the first fourth generation computers.
Answer: microprocessor

60. What year was the 4th generation of modern computers started?
Answer: 1970

61. It is the first computer game written by Steve Russell (from MIT) and his small team
for the PDP-1 computer.
Answer: Spacewar!

62. According to this, computers double in power roughly every two years, but cost
only half as much.
Answer: Moore’s Law

22
63. According to this, a network’s social and economic value increases steeply as more
people connect to it.
Answer: Metcalfe’s Law

64. Classification of computers which is the most powerful computer available.


Answer: Supercomputers

65. The Fifth Generation of Computers is based on _______________.


Answer: Artificial Intelligence (AI)

COMPUTER HARDWARE AND SOFTWARE

1. Classification of computers which are less powerful than supercomputers but are
capable of great processing sped, multi-tasking capability, and high data storage.
Answer: Mainframe Computers

2. What type of computer has dumb terminals of keyboards and monitors at user
stations that connect to a centrally located large server that might be as large as
a room?
Answer: Mainframe

3. Classification of computers which are used by medium size companies for specific
purposes.
Answer: Mid-range Computers

4. Classification of computers which are the smallest computers that are designed to
fit into one hand or palm.
Answer: Handheld Computers

5. Classification of computers which is also known as desktop computers and are most
common and widely used computers today that we can see in homes, schools and
in most businesses.
Answer: Microcomputers

6. It is a personal computer in a set up wherein it is located on a desk or table.


Answer: Desktop Computer

7. Which type of computer is designed for one person to use at a time?


Answer: personal computer

8. Or notebook; it is a small personal computer where components, display, keyboard,


pointing device, CPU, and rechargeable battery are packed together in one single
portable unit intended for mobile use.
Answer: Laptop Computer

9. It a computer monitor screen that will allow the interaction of two or more fingers
direction onto the screen to give a command.
Answer: Multi-touch

10. It is a desktop computer which is small size, low voltage, and lower power computer.

23
Answer: Nettop

11. Also called a mini notebook, it was conceived and released to the public in 2007
with the release of Asus Eee PC.
Answer: Netbook

12. It is a notebook equipped with a touchscreen which allows the user to operate the
computer using a digital pen or stylus.
Answer: Tablet PC

13. It is a handheld or pocket size computer with all the features of a modern desktop
PC.
Answer: Pocket PC

14. It is a handheld computer also called palmtop computer. Also known as a


handheld PC, is a mobile device that functions as a personal information manager.
It was largely discontinued in the early 2010s after the widespread adoption of
highly capable smartphones, in particular those based on iOS and Android.
Answer: PDA / Personal Digital Assistant

15. It is a mobile phone which incorporates the features of a pocket PC and PDA.
Answer: Smartphone

16. They are the most important part of the Information Technology. They will operate,
input the data, and use the resulting information to their personal and business lives.
Answer: People

17. Are set of guideline and rules to follow when using hardware, software applications
and data.
Answer: Procedure

18. Or programs; are instructions that tell the computer how it should do its work.
Answer: Software

19. Is the physical equipment that implements the data processing so that useful
information may come as a result.
Answer: Hardware

20. It converts data and instructions into electronic form for input into the computer.
Answer: Input Units

21. It converts electronic data produced by the computer system and display them in
a form that the user can understand.
Answer: Output Units

22. It includes texts, numbers, sounds, images, and video that are still unprocessed.
Answer: Data

23. It allows the computer to access and share data and information that are available
somewhere else.
Answer: Connectivity

24
24. It acts as the pointing device that you can use to choose programs and files to
open, functions to activate, to determine a typing or drawing starting point,
function selection, and to scroll pages up or down.
Answer: Mouse

25. Is a computer input device modeled from the keys of a typewriter.


Answer: Keyboard

26. Is a computer input device that scans and copies images, objects, texts,
handwriting and converts them as a digital image.
Answer: Scanner

27. It allows to create own images using stylus.


Answer: Digitizing Tablet

28. Is an input device that functions like a digital and video camera.
Answer: Web Camera / Webcam

29. Also called joy pad or control pad that functions as handheld game controller for
computer games.
Answer: Game Pad

30. Is a computer input device used as a control device that pivots around so that one
could move in any direction.
Answer: Joystick

31. It is like an upside-down mouse where the use roll the ball directly with their fingers
to play a video game.
Answer: Trackball

32. It is an input device connected to the computer to the sound card via microphone
port. It can be used as voice recorder, VoIP, computer gaming, online chatting,
and recording of songs and musical instruments.
Answer: Microphone

33. It is an output device that functions as a visual display unit for images, text, or
graphics generated by the computer.
Answer: Monitor

34. Kind of monitor which has flat panel and occupies less space.
Answer: LCD / Liquid Crystal Display

35. Kind of monitor which is older and bulkier.


Answer: CRT / Cathode Ray Tube

36. It is computer output device that produces a permanent or hard copy human
readable text and / or graphics of documents stored in the computer.
Answer: Printer

37. A computer printer that prints by hammering or striking an ink-soaked cloth ribbon
against a paper.
Answer: Dot Matrix Printer

25
38. A computer printer that produces high quality prints of text or graphics on plain
paper.
Answer: Laser Jet Printer

39. A computer printer most common for general use at home or at the office.
Answer: Ink Jet Printer

40. A printing device that operates by moving a set of four pens in different colors over
a paper surface and can also have shading features.
Answer: Plotter

41. These are audio output for music, video, and computer alerts.
Answer: Computer Speakers

42. It is a small capacity magnetic storage device inside a plastic case accessible by
a floppy disk drive. It comes in 3 ½ inch size and a capacity of 1.44 MB.
Answer: Floppy Disk

43. Are storage media that use laser technology to store data onto a circular plastic or
metallic disc.
Answer: Optical Disc

44. Also commonly known as the CD, is the most widely used optical disc with a
standard capacity of around 700 MB.
Answer: Compact Disc

45. These are CDs with pre-installed data such as music, movies, and programs. Data
or information could not be altered and are only available for access or reading.
Answer: CD-ROMs / Compact Disc-Read Only Memory

46. It is a CD where one can store or write data using a CD writer and once written into
the CD, it stays there permanently.
Answer: CD-R / Compact Disk Recordable

47. It is a CD where in data stored inside can be altered, erased, and then saved again.
Answer: CR-RW / Rewritable CD

48. It is a high definition, high capacity data and video storage device.
Answer: Blu-ray

49. It is better than CDs in terms of capacity, it looks like a CD but has a capacity of 4.7
GB which is 17 times the capacity of a CD.
Answer: Digital Versatile Disc / DVD

50. It is a flash memory storage device with a USB connector, having capacity of 4GB
to 128 GB.
Answer: USB Flash Drive

51. It is the smallest removable flash memory in the market, almost the size of a fingernail
at 15 mm x 11 mm x 0.7 mm designed for use in cellular phones.
Answer: MicroSD

52. This part is often called the "brain" of the PC


26
Answer: CPU

53. This is the part of the PC that allows all the others to talk to each other
Answer: Motherboard

54. The main circuit board in a computer is called the ________.


Answer: motherboard

55. The "short term memory" of the computer is called the


Answer: RAM

56. The part that keeps the CPU or GPU from overheating is called the:
Answer: Heatsink

57. Instead of a mouse, many laptops use a(n) ________.


Answer: touchpad

58. The most popular operating system for personal computers is ________.
Answer: Microsoft Windows

59. What are the physical components of a computer system called?


Answer: Hardware

60. What are the programs that run on a computer system called?
Answer: Software

61. Any set of instructions that tells the hardware what to do.
Answer: Software

62. What is the name of the chip inside the computer that processes information?
Answer: Central Processing Unit

63. What are the chips inside a computer that temporarily hold all the programs and
data currently being used?
Answer: Random Access Memory (RAM)

64. _______________ are sets of instructions loaded each time a computer is started.
Answer: Operating Systems

65. What type of software is Task Manager?


Answer: Utility Software

66. What type of software uses columns, rows and cells to represent data that can be
manipulated by formulas in other cells?
Answer: Spreadsheet

27
CURRENT IT TRENDS

1. 2018’s best browser.


Answer: Google Chrome

2. Which company is creating ‘Everykey,’ a thumbnail-sized gadget that can replace


a password, logging you into websites, unlocking your phone, and even opening
your digital door locks?
Answer: McAfee

3. It is a seven-digit random number issued by the bank upon registration. The


Remitter (sender) and Beneficiary (receiver) should have this for doing interbank
fund transfer.
Answer: Mobile Money Identifier (MMID)

4. Which non-metallic element’s name was coined in 1817 by British chemist Thomas
Thomson for something that was obtained from a hard-grey rock called Flint?
Answer: Silicon

5. Which web browser was developed by National Center for Supercomputing


Applications in 1993 in USA and is credited for popularizing World Wide Web?
Answer: Mosaic

6. It is an open source operating system based on the Linux kernel and the GNU C
Library implementing the Linux API. It is controlled by Samsung and also backed by
Intel, and works on a wide range of Samsung devices including smartphones,
tablets, in-vehicle infotainment (IVI) devices, smart TVs, PCs, smart cameras,
wearable computing (such as smartwatches), Blu-ray players, printers and smart
home appliances (such as refrigerators, lighting, washing machines, air
conditioners, ovens/microwaves and a robotic vacuum cleaner.
Answer: Tizen

7. What was the First Web Cam Monitor?


Answer: Coffee Pot

8. PC/XT stands for?


Answer: Personal computers extended technology

9. PC/AT stands for?


Answer: Personal computers advanced technology

10. MIPS is?


Answer: million instructions per second

11. Speed of CPU is the case of Microcomputers?


Answer: 1-10 MIPS

12. Speed of CPU in the case of Minicomputer is?


Answer: 20-50 MIPS

13. Speed of CPU in the case of Mainframe computer is?


Answer: 30-100 MIPS

28
14. Speed of CPU in the case of Super computer is?
Answer: 400-10000 MIPS

15. Word length of Microcomputers?


Answer: 8-32 bit

16. EPROM stands for?


Answer: Erasable programmable Read Only Memory

17. UPROM stands for?


Answer: Ultraviolet Programmable Read Only Memory

18. Any software stored in a form of Read Only Memory – ROM, EPROM or EEROM
that maintain its contents when the power is removed is?
Answer: Firmware

19. What is that concept of segmenting Internet known as?


Answer: Splinternet / Cyber-balkanization / Internet balkanization
20. What did users of the First Automatic Teller Machine Access the Machine with?
Answer: Radioactive Paper

21. In the context of 4G wireless technology, expand LTE?


Answer: Long Term Evolution

22. In the context of 4G wireless technology, expand VOLTE?


Answer: Voice Over Long Term Evolution

23. What is NGN in the context of Network? Expand NGN?


Answer: Next Generation Network

24. What was the First Modern Web Search Engine?


Answer: WebCrawler

25. What popular computer game was secretly intended to increase mouse
proficiency?
Answer: Solitaire

26. It is a type of denial of service attack in which a system is flooded with spoofed
ping messages. This creates high computer network traffic on the victim’s network,
which often renders it unresponsive.
Answer: Smurf Attack

27. It is the central part of an operating system. It manages the tasks of the computer
and the hardware – most notably memory and CPU time.
Answer: Kernel

28. Old name of Google?


Answer: BackRub

29. Old name of Black Berry?


Answer: Research in Motion

30. Old name of Motorola?


Answer: Galvin Manufacturing Corporation

29
31. Old name of Paypal?
Answer: Confinity

32. This term is used to indicate a group of former PayPal employees and founders who
have since founded and developed additional technology companies such as
Tesla Motors, LinkedIn, Palantir Technologies, SpaceX, YouTube, Yelp, and Yammer.
Most of the members attended Stanford University or University of Illinois at Urbana–
Champaign at some point in their studies. Five members, Peter Thiel, Elon Musk,
Reid Hoffman, Luke Nosek and Ken Howery have become billionaires.
Answer: PayPal Mafia

33. This company originated as a manufacturers of mechanical pencils but soon the
company’s founder sold his patent and began manufacturing radios. Today, this
company is a giant in the field of consumer electronics. Which company?
Answer: Sharp

34. The X Internet time is a system of time in which instead of hours and minutes, the 24
hours’ day is divided up into 1000 parts called “Beats”. Each beat has 1 minute
and 26.4 seconds. The new time scale is called BMT where the HQ of this watch
company is situated. This was created as a campaign for their beat range of
watches. Find X?
Answer: Swatch

35. Swatch Internet Time (or beat time) is a decimal time concept introduced in 1998
by the Swatch corporation as part of their marketing campaign for their line of
“Beat” watches. Instead of hours and minutes, the mean solar day is divided into
1000 parts called “__________” which is equal to one decimal minute in the French
Revolutionary decimal time system and lasts 1 minute and 26.4 seconds (86.4
seconds) in standard time.
Answer: Beat

36. A pharmaceutical company is developing a glucose sensing contact lens that


helps to monitor glucose levels continuously. Which company?
Answer: Medella Health

37. Which company is designing a bacteria free smart phone for hospital workers since
20% to 30% of bacteria are transferred between a cell phone and a finger?
Answer: Blackberry

38. The tanaka engineering works by Hisashige tanaka and Ichisuke Fujioka’s Shibaura
engineering company merged to form which company that was initially called
Tokyo Shibaura denki?
Answer: Toshiba

39. The fifth estate is a movie based on this Australian publisher and journalist who
started hacking at the age of 16 using the name “Mendex”. Who?
Answer: Julian Assange

40. Discovery of the phenomenon named “Frequency Hopping” is a mile stone in the
establishment of Cellular Mobile Networks. The American lady scientist who filed
patent for this was an Actress too.
Answer: Hedy Lammrr

41. Dimensions of an A4 Sized Paper.


Answer: 210mm*297mm
30
42. Android Variant of Oppo.
Answer: ColorOS

43. Android Variant of Oneplus.


Answer: OxygenOS

44. Android Variant of Apple.


Answer: iOs

45. Android Variant of Nokia.


Answer: Series

46. The Film that Portrays the Founding of Facebook


Answer: The Social Network

47. Terminology for a Printed book that contains or is based on content from a blog.
Answer: Blook

48. _____________ is a computational knowledge engine or answer engine developed


by Wolfram Alpha LLC, a subsidiary of Wolfram Research.
Answer: Wolfram Alpha

49. The day is celebrated in many countries and is officially observed in Russia. In 2009
Russian President Dmitry Medvedev signed a decree for the “Day of the
Programmer” to be celebrated on the 256th day of the year, which is usually
__________, or on __________ in leap years.
Answer: September 13 / September 12

50. _______________ is a Danish-Canadian programmer who created the PHP scripting


language, authoring the first two versions of the language and participated in the
development of later versions led by a group of developers including Jim Winstead,
Stig Bakken, Shane Caraveo, Andi Gutmans, and Zeev Suraski.
Answer: Rasmus Lerdorf

51. _______________ is an American technologist and creator of the JavaScript


programming language. He co-founded the Mozilla project, the Mozilla
Foundation and the Mozilla Corporation, and served as the Mozilla Corporation's
chief technical officer and briefly its chief executive officer. He is the CEO of Brave
Software.
Answer: Brendan Eich

_______________ is an American computer programmer and author. He created


the Perl programming language.
Answer: Larry Wall

52. Terminology for vulnerable holes in Software and programmes.


Answer: Backdoors

53. Full form of ‘PIN’in ATM Transaction


Answer: Personal Identification Number

54. Expand QLED


Answer: Quantom Dot LED

31
55. As of June 2018, the fastest and world’s most powerful supercomputer on the
TOP500 supercomputer list is the __________, in the United States, with a LINPACK
benchmark score of 122.3 PFLOPS, exceeding the previous record holder, Sunway
TaihuLight, by around 29 PFLOPS.
Answer: Summit

56. Famous Web Browser named after Red Panda


Answer: Mozilla Firefox

57. Order of colors in Google Logo


Answer: Blue, Red, Yellow, Blue, Green, Red

58. __________ is a method of providing feedback to voters using a ballotless voting


system.
Answer: Voter verifiable paper audit trail (VVPAT) / verifiable paper record (VPR)

59. While working at Nintendo he created a very famous game. This game is the “Best
Selling video game of all time”. Which game did he create/designed?
Answer: Shigeru Miyamoto

60. This company was founded by Linkabit founders Irwin Jacobs and Andrew
Viterbi.The very first product launched by them was a satellite locating and
messaging service called OmniTRACS. Identify the company.
Answer: Qualcomm

61. __________ is the world's leading subscription service for watching TV episodes and
movies on your favorite device.
Answer: Netflix

62. Who invented USB (Pen Drive)?


Answer: Ajay Bhatt

63. The mouse was invented by __________ in 1964 and consisted of a wooden shell,
circuit board and two metal wheels that came into contact with the surface it was
being used on.
Answer: Douglas Engelbart

64. _______________ is a cryptocurrency, a form of electronic cash. It is a decentralized


digital currency without a central bank or single administrator that can be sent
from user-to-user on the peer-to-peer bitcoin network without the need for
intermediaries.
Answer: Bitcoin

65. Who is the founder of Bitcoin?


Answer: Satoshi Nakamoto

COMPUTER ETHICS

1. _______________ is a part of practical philosophy concerned with how computing


professionals should make decisions regarding professional and social conduct.
Answer: Computer Ethics

2. Who categorized the ethical decisions related to computer technology and usage
into three primary influences?
Answer: Margaret Anne Pierce
32
3. The term computer ethics was first coined by __________.
Answer: Walter Maner

4. The concept of computer ethics originated in the 1940s with MIT


professor __________.
Answer: Norbert Wiener

5. __________ is a transdisciplinary approach for exploring regulatory systems—


their structures, constraints, and possibilities. Norbert Wiener defined it in 1948 as
"the scientific study of control and communication in the animal and the machine.
Answer: Cybernetics

6. __________, or computer-oriented crime, is the crime that involves a computer and


a network.
Answer: Cybercrime

7. The _______________ is an international learned society for computing. It was


founded in 1947, and is the world's largest scientific and
educational computing society.
Answer: Association for Computing Machinery (ACM)

8. The ______________ is an association for information and communications


technology professionals with over 26,000 members Australia-wide.
Answer: Australian Computer Society (ACS)

9. The _______________ is a professional body and a learned society that represents


those working in Information Technology, both in the United Kingdom and
internationally.
Answer: British Computer Society (BCS)

10. The ________________ is a nonprofit research, education, and public policy


organization focused on the issues, dilemmas, and challenges of advancing
information technology within ethical frameworks. It is based in Washington, DC,
USA.
Answer: Computer Ethics Institute (CEI)

11. The _______________ is a professional association with its corporate office in New
York City and its operations center in Piscataway, New Jersey. It was formed in 1963
from the amalgamation of the American Institute of Electrical Engineers and
the Institute of Radio Engineers.
Answer: Institute of Electrical and Electronics Engineers (IEEE)

12. The _______________, founded in 2004, is a professional association for IT


Administrators.
Answer: League of Professional System Administrators (LOPSA)

13. The Ten Commandments of Computer Ethics were created in 1992 by


the Computer Ethics Institute. The commandments were introduced in the paper
"In Pursuit of a 'Ten Commandments' for Computer Ethics" by __________ as a means
to create "a set of standards to guide and instruct people in the ethical use of
computers."
Answer: Ramon C. Barquin

14. The Ten Commandments of Computer Ethics[edit]


Answer:
1. Thou shalt not use a computer to harm other people.
33
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid
(without permission).
7. Thou shalt not use other people's computer resources without authorization
or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for other humans.

15. _______________ is any dishonest misrepresentation of fact intended to let another


to do or refrain from doing something which causes loss.
Answer: Computer Fraud

16. _______________ is the use of the Internet to conduct violent acts that result in, or
threaten, loss of life or significant bodily harm, in order to achieve political or
ideological gains through threat or intimidation.
Answer: Cyberterrorism

17. _______________ occurs when a website, e-mail server, or computer system is


subjected to or threatened with repeated denial of service or other attacks by
malicious hackers. These hackers demand money in return for promising to stop
the attacks and to offer "protection".
Answer: Cyberextortion

18. _______________ is the use or targeting in a battlespace or warfare context


of computers, online control systems and networks. It involves both offensive and
defensive operations pertaining to the threat of cyberattacks, espionage and
sabotage.
Answer: Cyberwarfare

19. __________ is a type of fraud which makes use of the Internet.


Answer: Internet fraud

20. It refers tricking or deceiving computer systems or other computer users. This is
typically done by hiding one's identity or faking the identity of another user on the
Internet.
Answer: Spoofing

21. Unsolicited e-mail is known as ___________. Unwanted emails (usually sent in a large
volume) that advertise products or promote services that were not requested by
the recipient.
Answer: Spam

22. Flooding the Internet with many copies of the same message.
Answer: Spamming

23. It is a method of sending emails used by an attacker to obtain personal information.


It is the fraudulent attempt to obtain sensitive information such as usernames,
passwords and credit card details by disguising as a trustworthy entity in
an electronic communication.
Answer: Phishing

34
24. __________ is a term describing the trafficking of credit card, bank account and
other personal information online as well as related fraud services.
Answer: Carding

25. _______________ is a concept involving the battlespace use and management


of information and communication technology (ICT) in pursuit of a competitive
advantage over an opponent.
Answer: Information Warfare (IW)

26. _______________ is any pornography that is accessible over the Internet, primarily
via websites, peer-to-peer file sharing, or Usenet newsgroups.
Answer: Internet Pornography

27. _______________ is a form of bullying or harassment using electronic means. They


are also known as online bullying. This is when a person is threatened, harassed,
humiliated, tormented, or otherwise targeted using the Internet, mobile phones, or
other digital technology.
Answer: Cyberbullying or Cyberharassment

28. __________ are individuals who commit child sexual abuse that begins or takes
place on the Internet.
Answer: Online predators

29. __________ is the use of the Internet or other electronic means to stalk or harass an
individual, group, or organization.
Answer: Cyberstalking

30. _______________ is the philosophic study of ethics pertaining to computers,


encompassing user behavior and what computers are programmed to do, and
how this affects individuals and society.
Answer: Cyberethics

31. The exclusive legal right to reproduce, publish, sell or distribute the expression of an
intellectual property (literature, design, audio, video, etc.)
Answer: Copyright

32. When personal information (SSN, credit card number, passwords, etc.) is stolen and
used to gain access to financial or personal accounts
Answer: Identity Theft

33. Original creations of the mind that can be protected by law; literary and artistic
works, designs, symbols, images, names, etc. These are ideas put into action, like
writing, music, art, photography, computer programs. These can be protected
under copyright or patent laws.
Answer: Intellectual Property

34. A compulsive disorder that causes an unhealthy obsession with the Internet and
other digital resources; examples include online gambling addiction, cybersex
addiction, social media addiction, etc.
Answer: Internet Addiction

35. Intruding into someone's personal space, using their image or likeness, or revealing
information about them without their permission
Answer: Invasion of Privacy

36. A published (written or printed) false statement that is damaging to a person's


reputation or success.
35
Answer: Libel

37. A false claim that is spread through electronic means (email, social media, blogs,
etc.); examples include chain letters, untrue accusations, etc.
Answer: Online Hoax

38. The practice of taking someone else's work or ideas and passing them off as one's
own.
Answer: Plagiarism

39. An oral (spoken) false statement that is damaging to a person's reputation or


success.
Answer: Slander

40. A mark (logo, symbol, word, phrase, etc.) legally registered or established by a
company to represent a service or product; cannot be used without the permission
of the owner.
Answer: Trademark

41. Software that is distributed at no cost to the user; however, the author maintains
the copyright.
Answer: Freeware

42. Copyrighted software that is distributed at no cost for a trial period.


Answer: Shareware

43. This law restricts people from accessing or modifying data without permission.
Answer: Computer Misuse Act

44. Privacy law to force organizations to protect personal data.


Answer: Data Protection Act

45. An individual who gain unauthorized access to computerized information or


computer systems. The term "cracker" implies there is malicious intent to the access.
Answer: Hacker / Cracker

46. The illegal copying and distribution of software.


Answer: Piracy

47. Programs that are not copyrighted and are free to be shared, copied and used.
Answer: Public Domain

48. A document that governs the use of the computers and networks owned by the
institution. It outlines what types of uses are acceptable and which are prohibited.
Answer: Acceptable Use Policy

49. The correct or acceptable way of communicating on the Internet.


Answer: Netiquette

50. An emotionally, often profane, response to an action or statement in a chat-room,


electronic discussion group, or newsgroup.
Answer: Flame

51. The exclusive right to make, use, or sell a device or processes.


Answer: Patent

36
51. What is m–commerce?
Answer: Machine Commerce

52. A __________ is a networking device that forwards data packets between computer
networks. It performs the traffic directing functions on the Internet.
Answer: router

53. "Lefedettség" in English is signal _____________.


Answer: Coverage

54. It is a web page or series of web pages where the user can post information in the
form of a journal.
Answer: Blog

55. A web page or series of web pages where people can start conversation threads
and respond to the conversation threads of others.
Answer: Forum

56. Which of the following companies is known for manufacturing computer processors?
Answer: Intel

57. In order to connect your computer to the Internet with a modem, your computer will
have to have a(n) ________ port
Answer: Ethernet

58. What is a way to send and receive digital messages over the internet?
Answer: email

59. What is the name with which you choose to identify yourself online with called?
Answer: username

60. An email address is made up of how many parts?


Answer: 3

61. Who did the US Department of Defense join up with to develop the internet?
Answer: RAND Corporation

62. Information is broken down into what before being sent across the internet?
Answer: Data Packets

63. The rules governing how data is handled on the Internet is called:
Answer: Protocols

64. Look at different websites


Answer: browse

65. Put a message, photo, or blog entry online


37
Answer: post

66. To save a website or web page so that you can share it or find it easily another time
Answer: bookmark

67. To add your name and e-mail address to a list of people who want to receive
messages from a website Automatically
Answer: subscribe

54. VECTOR graphics are based on


Answer: Mathematical equations

55. A TIFF image is most often used for work that is printed and saves __________.
Answer: 8 bits per color and 16 bits per color

56. Facebook, MySpace and Bebo are all examples of what type of service?
Answer: Social networking

57. What is the hashtag (#) used for when posting Tweets to Twitter?
Answer: It is used to mark keywords

58. What are the two ways to compress an image?


Answer: lossy and lossless

59. How many bits are in a byte?


Answer: 8 bits = 1 Byte

60. How many pixels are in a Megapixel?


Answer: 1 MILLION PIXELS

61. Designing the workplace to best fit the worker, reducing strain on the body and
enhancing comfort during digital media creation.
Answer: Ergonomics

62. ______________________ uses cross promotion and marketing of brands and products
(Horizontal Integration). It also consists of different parts of an institution working
together to maximize profit (Vertical Integration).
Answer: Synergy

63. Regulates advertising industry in the UK to make sure it is within the law.
Answer: Advertising Standards Authority (ASA)

1. What is the first search engine in internet?


Answer: Archie

1. When was the 1st computer mouse invented?


38
Answer: 1964

2. When did the internet go public?


Answer: 1991

3. This tech-savvy bearded brainiac invented the first floppy diskette drive and a
disk operating system (DOS) in the 1970's for his newest desktop computer, the
second revision, because the first one wasn't enough to keep the doctor away.
Who is he, and what was the name of that computer?
Answer: Steve Wozniak, Apple II

4. VisiCalc was a:
Answer: spreadsheet

5. A tool used to tighten screw with positive sign.


Answer: Phillip screw

6. The first computer game made in 1972 was called...


Answer: Pong

7. Fonts that contain small decorative lines at the end of a stroke is known as what?
Answer: Serif fonts

8. You can thank this person for allowing humans to fly space shuttles:
Answer: Margaret Hamilton

9. In regards to 21st century learning, what do the 4 C's stand for?


Answer: Creativity, critical thinking, communication and collaboration

10. Acronym "MOCC" stands for?


Answer: Massive Online Open Course

11. Computer software sent by attackers to inflict chaos on Computer’s operation


Answer: Malware

12. Excel is a program.


Answer: spreadsheet

13. Steve Jobs and Steve Wozniak developed a more user-friendly computer for their
new company:
Answer: Apple

14. Who used BASIC to program the Altair 8800 PC Computer Kit?
Answer: Paul Allen and William Gates

15. The first mobile phone was created in...

39
Answer: 1973

16. What company did Paul Allen and Bill Gates start?
Answer: Microsoft

17. How many bytes are in one Gigabyte?


Answer: 1 Billion

18. The first laser printer was created in 1967 by


Answer: HP

19. In data logging, physical quantities are measured with what?


Answer: Sensors

20. Where a computer is connected to sensor(s). Over a set period of time their
values are regularly taken in order to build a bigger picture / look for patterns.
Answer: Data Logging

21. To guard against malware, you will need to have ________.


Answer: antivirus software

22. If a Windows program has become unresponsive, which keys do you press to open
the Task Manager?
Answer: Control, Alt, Delete

23. What does MADDIDA stand for?


Answer: Magnetic Drum Digital Differential Analyzer

24. Steve Wozniak developed the...


Answer: Apple 1

25. The Apple Macintosh used which famous book to market itself?
Answer: 1984

26. Jonothan Ive is important to Apple because...


Answer: He is a lead designer for Apple.

27. In Primitive Times counting was done on....


Answer: Fingers

28. When did the modern computer age begin?


Answer: 1944

29. Who is the richest man in the world?


Answer: Bill Gates

30. What does EULA stand for?


Answer: End User Licence Agreement

40
31. What type of software is Productivity Software?
Answer: Application Software

32. A grammar checker, thesaurus or spelling checker are features of what type of
software?
Answer: Word processing software

33. A mobile phone that has a camera, a clock that has a radio, and a PDA that plays
digital music are all examples of what?
Answer: Convergence

34. What key do you press to erase a letter?


Answer: Backspace

35. What does GB stand for?


Answer: Gigabyte

36. How Many Megabytes Are in 1 Gigabyte?


Answer: 1000

37. What enables different parts of the CPU to work on different tasks at the same time
Answer: Cores

38. Processor speed is measured in _______.


Answer: Ghz

39. One megabyte is equal to _____ kilobytes.


Answer: 1,000

40. mobile operating system developed by Apple


Answer: IOS

41. Emails should have a _____________ and __________________ message. This lets the
person getting the email know what it is about.
Answer: clear, concise

42. You should _________ your emails before sending. Once they are sent you cannot
get them back.
Answer: review

43. Typing emails in ALL CAPS is the same as ____________________.


Answer: shouting

44. Basic rules are called _________.


Answer: etiquette

45. Who started the company Google?


Answer: Larry Page and Sergey Brin

41
46. This guy made the operating system for IBM and started a company called
Microsoft.
Answer: Bill Gates

47. This word is a mathematical term for the number 1 followed by 100 zeros.
Answer: googol

48. Howard Aiken invented this ASCC computer, which had 500 miles of wiring and
weighed how much?
Answer: 35 tons

49. The Apple 2 revolutionized the personal computer market with this computer
program that enables a person to communicate with a computer through the use
of symbols, visual metaphors, and pointing devices.
Answer: Graphical User Interface (GUI)

50. Microsoft was told that they needed to change which desktop icon because it was
too similar to an icon used by Apple?
Answer: Trash Can

1. CCTV (Closed-Circuit Television)


 also known as video surveillance, is the use of video cameras to
transmit a signal to a specific place, on a limited set of monitors
2. Dynamic Host Configuration Protocol (DHCP)
 is a network management protocol used on UDP/IP networks whereby
a DHCP server dynamically assigns an IP address and other network
configuration parameters to each device on a network so they can
communicate with other IP networks

3. Cloud Computing
 is shared pools of configurable computer system resources and
higher-level services that can be rapidly provisioned with minimal
management effort, often over the Internet

4. Workplace
 is an enterprise connectivity platform developed by Facebook, Inc. It
uses familiar tools like groups, instant messaging and News Feed to
transform teamwork, communications, and culture.

5. Internet of things (IoT)


 is the network of devices such as vehicles, and home appliances that
contain electronics, software, actuators, and connectivity which allows
these things to connect, interact and exchange data.

6. Blockchain
42
 originally block chain, is a growing list of records, called blocks, which
are linked using cryptography. Each block contains a cryptographic
hash of the previous block,] a timestamp, and transaction data
(generally represented as a merkle tree root hash).

7. Hashtag
 is a type of metadata tag used on social networks such as Twitter and
other microblogging services, allowing users to apply dynamic, user-
generated tagging which makes it possible for others to easily find
messages with a specific theme or content.

8. Emoji
 are ideograms and smileys used in electronic messages and web
pages.

9. Emoticon
 short for "emotion icon", also known simply as an emote, is a pictorial
representation of a facial expression using characters—
usually punctuation marks, numbers, and letters—to express a
person's feelings or mood, or as a time-saving method.

10. Google Play


 is a digital distribution service operated and developed by Google LLC.
It serves as the official app store for the Android operating system,
allowing users to browse and download applications developed with
the Android software development kit and published through Google.

11. Big Four


 is a name used to describe the four multinational technology
companies Google, Amazon, Facebook, and Apple.

12. GAFAM
 is an acronym for the five most popular U.S. tech stocks: Google,
Apple, Facebook, Amazon and Microsoft.
13. Google
 is an American multinational technology company that specializes in
Internet-related services and products, which include online
advertising technologies, search engine, cloud computing, software,
and hardware.
 Founders: Larry Page, Sergey Brin
43
14. Apple
 is an American multinational technology company headquartered in
Cupertino, California, that designs, develops, and sells consumer
electronics, computer software, and online services.
 Founders: Steve Jobs, Steve Wozniak, Ronald Wayne
15. Facebook
 is an American online social media and social networking service
company. It is based in Menlo Park, California. Its was founded by
Mark Zuckerberg, along with fellow Harvard College students and
roommates Eduardo Saverin, Andrew McCollum, Dustin Moskovitz
and Chris Hughes.

16. Amazon
 is a multinational technology company focusing in e-commerce, cloud
computing, and artificial intelligence in Seattle, Washington.
 Founder: Jeff Bezos

17. Microsoft Corporation


 is an American multinational technology company with headquarters
in Redmond, Washington. It develops, manufactures, licenses,
supports and sells computer software, consumer electronics,
personal computers, and related services.
 Founders: Bill Gates, Paul Allen

18. WeChat
 is a Chinese multi-purpose messaging, social media and mobile
payment app developed by Tencent. It was first released in 2011, and
by 2018 it was one of the world's largest standalone mobile apps by
monthly active users, with over 1 billion monthly active users.

19. PicsArt
 is an image editing, collage and drawing application and a social
network.

20. Virtual Assistant


 (typically abbreviated to VA, also called a virtual office assistant) is
generally self-employed and provides professional administrative,
technical, or creative (social) assistance to clients remotely from a
home office.

44
21. Augmented Reality
 is an interactive experience of a real-world environment where the
objects that reside in the real-world are "augmented" by computer-
generated perceptual information, sometimes across multiple sensory
modalities, including visual, auditory, haptic, somatosensory, and
olfactory.

22. Artificial intelligence (AI)


 is an area of computer science that emphasizes the creation
of intelligentmachines that work and react like humans.
23. Machine Learning
 is a type of artificial intelligence (AI) providing computers with the
ability to learn without being explicitly programmed. Machine
learning focuses on the development of computer programs that can
teach themselves to grow and change when exposed to new data.

24. 3D Printing
 is any of various processes in which material is joined or solidified
under computer control to create a three-dimensional object, with
material being added together, typically layer by layer.

25. 5G (from "5th Generation")


 is the latest generation of cellular mobile communications.

26. Chatbot
 is a computer program or an artificial intelligence which conducts a
conversation via auditory or textual methods. Such programs are
often designed to convincingly simulate how a human would behave
as a conversational partner, thereby passing the Turing test.

27. General Data Protection Regulation


 is a regulation in EU law on data protection and privacy for all
individuals within the European Union and the European Economic
Area. It also addresses the export of personal data outside the EU
and EEA areas. It is the most important change in data privacy
regulation in 20 years.
28. MASA
 is a new architectural model introduced by Gartner which stands
for Mesh app and service architecture. It reflects what has emerged
over the last five years, as organizations have experimented several
digital projects.

45
29. Digital Twin
 is the virtual model of an existing or nonexisting physical asset,
product, process, or a service. Every such asset is paired with its
digital counterpart and this pairing allows better data analysis,
predictability, and prevention of business downtime, ensuring smooth
flow of business.
30. Dashcam
 dashboard camera, car DVR, driving recorder, or event data
recorder (EDR), is an onboard camera that continuously records the
view through a vehicle's front windscreen and sometimes rear or other
windows.
31. It was a social networking website launched in 2005, that now
describes itself as "a company that dreams up ideas for fun social apps;"
Grant Denholm, the man behind the it relaunch, has confirmed that the
site will not be returning as a social network but as a company that
makes social apps.
Answer: Bebo

32. A color pixel needs three numbers to define its color: one number
each to indicate how much
Answer: Red, green, and blue

33. What does CMYK stand for?


Answer: cyan, magenta, yellow, and key (black)
34. The person responsible for overseeing the shooting and assembly of
a film is known as the ___________________.
Answer: Director

35. The person who manages the production of a film, coordinates the
filmmaking process to ensure that everyone involved in the project is
working on schedule and on budget is also known as ____________.
Answer: Producer

36. The person responsible for the sequencing of shots and creating
meaning from the rushes is known as a video. They take each small clip
and put them together into a continuous sequence.
Answer: Editor

37. The production designer produces which translates the film script into
visual form. It is a graphic organizer in the form of sketches or images
displayed in sequence on paper in order to show what the sequence will
be.
46
Answer: Storyboards

38. A smaller more focused or specialized format.


Answer: Niche

39. The number of frames captured in a second - TV is usually 24 fps.


Answer: Frame Rate

40. Buttons and image maps to allow users to interact with the site and
access information quickly.
Answer: Graphical User Interface (GUI)

41. Clickable connections that link text or images to other pages of the
website, out to external websites, or to files posted on a website.
Answer: Hyperlinks
42. They are part of a web page's head section and describe a page's
content
Answer: Meta Tags

43. Computer programs that "crawl" through the pages of a website to find
tags, keywords, and other information
Answer: Web Crawlers

44. Visual representation of your abilities, skills, capabilities, knowledge,


qualities - and it represents your potential. Physically, it's a collection of
things - tangible materials - that represent work-related events in your
life.
Answer: Portfolio

45. Anything that will connect to the outside of the computer, they can be
input and output, depending on the device.
Answer: Peripheral

Printed Circuit Board (PCB)


a thin board made of fiberglass or other laminate material on which
conductive pathways are "printed", connecting different components on the
PCB, such as transistors, resistors, and integrated circuits.

Clock Cycle
the time between two adjacent pulses of the oscillator, during which a CPU
can perform a basic operation such as fetching an instruction, accessing
memory, or writing data.

47
Clock Speed
the operating speed of a computer or its microprocessor. It is measured in
a unit called Hertz (Hz), which is the number of clock cycles per second.

Random Access Memory (RAM)


a type of volatile memory that can be accessed randomly.
Read Only Memory (ROM)
a type of non-volatile memory on which data can only be read but not
written to.

Non-Volatile Memory
a computer memory that can retain the stored information even when not
powered.

Volatile Memory
a computer memory that can not retain the stored information when not
powered.

BIOS chip
a read-only memory in which a set of routines is stored, enabling a
computer to start the operating system and to communicate with the
various devices in the system, such as disk drives, keyboard, monitor,
printer, and communications ports.

Solid State Drive (SSD)


a data storage device that does not use any movable parts and consist of
flash memory chips that store your data.

Complex Instruction Set Computer (CISC)


computers designed with a full set of computer instructions that range from
very simple to very complex and specialized to provide needed capabilities
in the most efficient way.
Reduced Instruction Set Computer (RISC)
computers designed with a reduced set of computer instructions that
includes only the most frequently used instructions so that the computer
would get more work done in a shorter amount of time for most applications.

Universal Serial Bus (USB)


a fast serial bus providing a plug-and-play interface that allows a computer
to communicate with peripheral and other devices.
Field Programmable Gate Array (FPGA)
an integrated circuit that can be configured by the user for a specific
application after being manufactured.
48
Digital Video Interface (DVI)
a connection interface used between monitors and computers, which
supports both digital and analog data or only digital data.

High Definition Multimedia Interface (HDMI)


a digital interface for transmitting audio and video data in a single cable.

Graphical Processing Unit (GPU)


A microprocessor designed to handle graphics operations.

3D Printer
a manufacturing process that builds layers to create a three-dimensional
solid object from a digital model.
Double Data Rate (DDR)
an advanced version of SDRAM, which can transfer data twice as fast as
regular SDRAM chips. This is because it can send and receive signals
twice per clock cycle.

Video Graphics Array (VGA)


one of the de facto display standards for PCs, which supports analog
signals rather than digital signals.

Resolution
the number of pixels (individual points of color) on a picture represented on
the screen., expressed in terms of the number of pixels on the horizontal
axis and the number of pixels on the vertical axis.

Pixel
the smallest controllable element of a picture represented on a screen.

On-board
a term used to describe a hardware component that is located on a circuit
board.

External
a hardware device that is installed on an expansion slot or connected to a
port in a computer.

PCI Express
A high-speed serial bus interface made by Intel for connecting peripheral
devices.

SATA
49
Another high speed serial bus interface for connecting hard drives, solid
state drives (SSDs) and CD/DVD drives to the computer.

Bandwidth
the maximum amount of data that can be carried from a communication
bus in a second.
Plug-and-Play
a technology that gives users the ability to plug a device into a computer
and have the computer recognize it without requiring users to manually
install drivers for the device.

Wafer
a thin slice of semiconductor material that serves as the substrate for
microelectronic devices.
Die
a small block of semiconducting material, on which a given functional circuit
is fabricated.

Transistor
the fundamental building block of modern electronic devices, which is used
to control the flow of electricity in electronic circuits.

Integrated Circuits (IC)


the integration of large numbers of tiny electronic circuits into a small chip.

Chipset
a collection of integrated circuits that manages the data flow between the
processor, memory and peripherals.
Cache
a type of memory to store data temporarily in a computing environment
often to shorten data access time, reduce latency and improve input/output
(I/O).

Computer Software
The instructions that tells a computer what to do

Operating System
Tells the computer how to perform the functions of loading, storing, and
executing an application program and how to transfer data.
Booting
When a computer is turned on, the operating system is loaded into the
computer's memory for auxiliary storage.
50
Graphical User Interface
Operating system that provides visual cues such as icon symbols to help
the user

Icon
Representation of where an application such as word, or a file or document
where data is stored.

Application Software
Consists of programs designed to make users more productive and/or
assist them with them with personal tasks.

68. IPV4 address is


Answer: 32 bit

69. The process of trading goods over the Internet is known


as
Answer: E–trading

70. A -------- shares hardware, software and data among


authorized user.
Answer: Network

71. -------- is the exchange of computer stored messages by


telecommunication.
Answer: E-mail

72. Which of the following refers to dangerous programs that


can be ‘caught’ by opening E-mail attachments and
downloading software from the internet?
Answer: Virus

73. Verification of a login name and password is known as:


Answer: authentication

74. AOL stands for __________.


Answer: America Online
51
75. The concept of electronic cash is to execute payment by
Answer: ATM Card

76. An electronic meeting system is known as


Answer: Tele–conferencing

77. _______ is the encompassing term that involves the use


of electronic platforms intranets, extranets and the Internet to
conduct a company’s business.
Answer: E–commerce

78. The collection of links throughout the Internet creates an


interconnected network called the
Answer: Bookmark

79. Free of cost repair of software bug available at Internet is


called ….
Answer: Patch

80. When using email software, how do you send a duplicate


copy of an email to another person at the same time?
Answer: Carbon Copy (CC)

81. In email software, what feature lets you prevent unwanted


emails?
Answer: Spam Filter

82. To gain illegal access to (a computer network, system,


etc.)
Answer: hack

83. to bother online posting irrelevant, or offensive comments


or other disruptive content
Answer: troll

52
84. Spoil a photograph of (a person or thing) by unexpectedly
appearing in the camera’s field of view as the picture is taken
Answer: photobomb

85. Send a private message or an email to (someone,


typically another member of a social networking website or
Internet message board)
Answer: inbox

86. Remove (someone) from a list of friends or contacts on a


social networking website
Answer: unfriend

87. _________________ intended as the third lunar landing


was aborted after an oxygen tank exploded.
Answer: Apollo 13

88. Internet email began on _________________.


Answer: 1971

89. What type of digital footprint does posting photos of doing


work in the community present?
Answer: Positive

90. What are friends on social network sites a part of?


Answer: Community

91. What is a written record of an occurrence over time?


Answer: Log

92. What computer was built over 5000 years ago?


Answer: Stonehenge

93. What does GUI Stand for?


53
Answer: Graphical User Interface

94. What is 1/2 a byte?


Answer: Nibble

95. The Apple computer was founded/created by 3 men.


Who were they?
Answer: Steve Jobs, Steve Wozniak, Ronald Wayne
96. Who are "Inky, Pinky, Blinky, and Clyde"?
Answer: Ghosts

97. The first camera phone was created in...


Answer: 2000

98. Storage on a cloud based server.


Answer: Google Drive

99. Jack Kilby invented the first [ ] in 1959.


Answer: Printed Circuit Board

100. A tool used to loosen or tighten screw with negative sign.


Answer: Flat screw

101. The binary number 010000001 is equivalent to this


decimal number, the ASCII equivalent of this capital letter.
Answer: 65, A

102. The operating system for the first IBM personal


computer was:
Answer: MS-DOS

103. This computer saved Apple from bankruptcy in the late


90's.
Answer: iMac

54
104. When was the Apple I computer first sold?
Answer: 1976

55

S-ar putea să vă placă și