0% found this document useful (0 votes)
13 views5 pages

COMPUTERHHW

The document contains a series of questions and answers related to computer hardware, artificial intelligence, operating systems, cybersecurity, IT industry current affairs, programming languages, and the history of computers. Each section includes multiple-choice questions with the correct answers provided. The document serves as a homework assignment for students in a computer science class.

Uploaded by

akulbisht0406
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views5 pages

COMPUTERHHW

The document contains a series of questions and answers related to computer hardware, artificial intelligence, operating systems, cybersecurity, IT industry current affairs, programming languages, and the history of computers. Each section includes multiple-choice questions with the correct answers provided. The document serves as a homework assignment for students in a computer science class.

Uploaded by

akulbisht0406
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Computer Holiday

Homework
(Computer Hardware)

1. What is the purpose of the BIOS (Basic Input/Output System) in a computer system?

(a)To manage system memory (b) To control peripheral devices


(c) To boot the operating system (d) To perform arithmetic and logical operations

Answer : (c) To boot the operating system

2. Which component of a computer system stores data permanently and retains it even when the
power is turned off?

(a) Hard Disk Drive (HDD) (b) Random Access Memory (RAM)
(c) Central Processing Unit (CPU) (d) Solid State Drive (SSD)

Answer: (a) Hard Disk Drive (HDD)

3. Which component of a computer system stores the BIOS (Basic Input/Output System)?

(a) ROM (Read-Only Memory) (b) RAM (Random Access Memory)


(c) CPU (Central Processing Unit) (d) HDD (Hard Disk Drive)

Answer: (a) ROM (Read-Only Memory)

(Artificial Intelligence)

4. Which AI technique involves training a model to make decisions based on maximizing rewards
in a given environment?

(a)Reinforcement Learning (b) Supervised Learning


(c) Unsupervised Learning (d) Transfer Learning

Answer: (a) Reinforcement Learning

5. What is the term for the process of reducing the dimensionality of feature vectors?

(a) Dimensionality Expansion (b) Dimensionality Reduction


(c) Dimensionality Transformation (d) Dimensionality Normalization

Answer: b) Dimensionality Reduction

(Operating Systems)
6. What is the core component of the Linux operating system?
(a) Linux Kernel (b) Command Prompt (c) GUI Interface (d) Device Manager
Answer: (a) Linux Kernel

7. What is the main function of the operating system's shell?

(a) Provides a user interface (b) Manages hardware resources


(c) Allocates memory (d) Controls access to the system

Answer: (a) Provides a user interface

(Cyber Security)
8. What is a common method of authentication in cybersecurity?
(a) Biometrics (b) Cookies (c) Captcha (d) Hashtags
Answer: (a) Biometrics

9. What is the purpose of a firewall in cybersecurity?


(a) Detecting and preventing unauthorized access (b) Encrypting data transmissions
(c) Managing network connections (d) Filtering spam emails
Answer: (a) Detecting and preventing unauthorized access

10. Which cryptographic technique is used to verify the integrity and authenticity of data
transmitted over a network?
(a) Hashing (b) Encryption (c) Steganography (d) Salting
Answer: (a) Hashing

(IT Geeks)

11. Who is the co-founder of the social media platform Twitter?

(a) Jack Dorsey (b) Mark Zuckerberg (c) Evan Spiegel (d) Biz Stone

Answer: (a) Jack Dorsey

12. What does "VPN" stand for?

(a) Virtual Private Network (b) Very Private Network

(c) Virtual Public Network (d) Virtual Personal Network

Answer: (a) Virtual Private Network

13. What is the protocol used for sending emails?


(a) SMTP (b) HTTP (c) FTP (d) TCP

Answer: (a) SMTP

(Cloud Computing)

14. Which cloud computing service model provides users with virtualized hardware resources over
the internet?

(a) Infrastructure as a Service (IaaS) (b) Platform as a Service (PaaS)

(c) Software as a Service (SaaS) (d) Function as a Service (FaaS)

Answer: (a) Infrastructure as a Service (IaaS)

15. What does S3 stand for in Amazon Web Services (AWS)?

(a) Simple Storage Service (b) Secure Storage Service

(c) System Storage Service (d) Structured Storage Service

Answer: (a) Simple Storage Service

(Computer Networks)

16. What is the purpose of an IP address in computer networking?

(a) To identify a device on a network (b) To establish a secure connection


(c) To encrypt data transmissions (d) To translate domain names into numerical addresses

Answer: (a) To identify a device on a network

17. Which type of cyber attack involves tricking individuals into revealing sensitive information
such as passwords or credit card numbers?

(a) Phishing (b) DDoS (Distributed Denial of Service)


(c) Ransomware (d) Spoofing

Answer: (a) Phishing

(Current Affairs in IT Industry)


18. What is the name of the recent cybersecurity breach involving a widely used software supply
chain management tool?
(a) SolarWinds Hack (b) Equifax Breach
(c) WannaCry Ransomware Attack (d) Petya Malware Attack
Answer: (a) SolarWinds Hack
19. What is the term for the recent trend of using blockchain technology to create digital assets
such as artwork or collectibles?

(a) NFTs (Non-Fungible Tokens) (b) DeFi (Decentralized Finance)


(c) Smart Contracts (d) Cryptocurrency

Answer: (a) NFTs (Non-Fungible Tokens)

(Programming Languages)

20. Which programming language is known for its simplicity and readability, often used for
teaching beginners?

(a) Python (b) C++ (c) Java (d)Html

Answer: (a) Python

21. What is the language developed by Guido Van Rossum in 1991?


(a)Python (b) Java (c) C++ (d) Javascript
Answer : (a)Python

22. What is the term for a programming paradigm where programs are composed of interactions
between objects?

(a) Object-Oriented Programming (OOP) (b) Functional Programming


(c) Procedural Programming (d) Imperative Programming

Answer: (a) Object-Oriented Programming (OOP)

(History of Computers)

23. Which computer scientist is credited with the invention of the World Wide Web?

(a) Tim Berners-Lee (b) Vint Cerf (c) Alan Turing (d) Ray Tomlinson

Answer: (a) Tim Berners-Lee

24. Who is considered the first computer programmer for her work on Charles Babbage's
Analytical Engine?

(a) Ada Lovelace (b) Grace Hopper (c) Alan Turing (d) John von Neumann

Answer: (a) Ada Lovelace

25. Which computer scientist is credited with inventing the first mechanical computer?

(a) Charles Babbage (b) Alan Turing (c) John von Neumann (d) Ada Lovelace

Answer: (a) Charles Babbage

-AKUL BISHT
XI-F

You might also like