0% found this document useful (0 votes)
13 views4 pages

100 Fill in The Blank Questions With Answers

The document contains 100 fill-in-the-blank questions related to computer science, covering topics such as computer hardware, software, data processing, and networking. Each question is followed by its corresponding answer, providing a comprehensive overview of fundamental concepts in computing. This resource serves as a study guide for individuals seeking to enhance their knowledge in the field of computers.

Uploaded by

yisayisa222
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views4 pages

100 Fill in The Blank Questions With Answers

The document contains 100 fill-in-the-blank questions related to computer science, covering topics such as computer hardware, software, data processing, and networking. Each question is followed by its corresponding answer, providing a comprehensive overview of fundamental concepts in computing. This resource serves as a study guide for individuals seeking to enhance their knowledge in the field of computers.

Uploaded by

yisayisa222
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

100 Fill in the Blank Questions with Answers

1. A computer is an electronic device that processes __________ to produce information. (data)

2. The two primary types of computer software are __________ and __________. (system
software, application software)

3. Data that has been processed into a meaningful form is called __________. (information)

4. The three methods of data processing are __________, __________, and __________. (manual,
mechanical, computer-based)

5. The first generation of computers used __________ tubes for circuitry. (vacuum)

6. The main component of the computer that performs calculations and processing is the
__________. (CPU (Central Processing Unit))

7. The full meaning of CPU is __________. (Central Processing Unit)

8. The stored program concept was introduced by __________. (John Von Neumann)

9. A computing system consists of __________, __________, and __________. (hardware, software,


users)

10. The physical parts of a computer are called __________. (hardware)

11. The first electronic general-purpose computer was called __________. (ENIAC)

12. The second generation of computers used __________ instead of vacuum tubes.
(transistors)

13. The __________ generation of computers introduced integrated circuits (ICs). (third)

14. The first supercomputer was designed by __________. (Seymour Cray)

15. The fifth generation of computers is characterized by __________ and __________. (artificial
intelligence, parallel processing)

16. The father of modern computing is __________. (Charles Babbage)

17. The first programming language developed for computers was __________. (FORTRAN)

18. The major advantage of third-generation computers was the use of __________. (integrated
circuits)

19. The first digital computers were built in the year __________. (1940s)

20. The development of __________ led to modern artificial intelligence. (machine learning)
21. Computers can be classified based on __________, __________, and __________. (size, purpose,
type of signal)

22. A computer that processes continuous data is called a(n) __________ computer. (analog)

23. A hybrid computer combines features of both __________ and __________ computers. (analog,
digital)

24. A computer designed for a specific task is called a __________ computer. (special-purpose)

25. A microcomputer is also known as a __________. (personal computer (PC))

26. The smallest type of computer based on size is the __________. (microcomputer)

27. A mainframe computer is primarily used for __________. (large-scale processing)

28. The brain of the computer is called the __________. (CPU)

29. A computer designed for multiple users at the same time is called a __________.
(mainframe)

30. An example of a personal computer is the __________. (laptop)

31. The input device that allows users to enter text is called a __________. (keyboard)

32. The main function of a mouse is __________. (pointing and selecting)

33. A device used to store data permanently is called a __________. (hard disk)

34. The main circuit board of a computer is known as the __________. (motherboard)

35. ROM stands for __________. (Read-Only Memory)

36. RAM stands for __________. (Random Access Memory)

37. A device that converts digital signals to analog and vice versa is called a __________.
(modem)

38. The two types of computer memory are __________ and __________. (primary, secondary)

39. A __________ is an example of an output device. (monitor)

40. The operating system is an example of __________ software. (system)

41. The software that directly manages hardware is called __________. (operating system)

42. A set of instructions that tells a computer what to do is called a __________. (program)

43. The most popular operating system for personal computers is __________. (Windows)

44. Software that allows users to browse the internet is called a __________. (web browser)
45. A program that detects and removes viruses is called __________. (antivirus software)

46. The language used to communicate with a computer is called __________. (programming
language)

47. An example of a word processing software is __________. (Microsoft Word)

48. The process of starting a computer is called __________. (booting)

49. The process of installing software on a computer is called __________. (installation)

50. The GUI stands for __________. (Graphical User Interface)

51. A __________ is a malicious program that spreads by copying itself. (computer virus)

52. A program that disguises itself as useful software but is harmful is called a __________.
(Trojan horse)

53. The process of removing a virus from a computer is called __________. (virus removal)

54. A program that steals information from a computer is called __________. (spyware)

55. A computer virus spreads through __________ and __________. (email attachments, infected
software)

56. A program that replicates itself but does not harm a computer is called a __________.
(worm)

57. A __________ virus modifies itself to avoid detection. (polymorphic)

58. The best way to prevent a virus infection is to use __________. (antivirus software)

59. A file infected by a virus may show __________ errors. (corruption)

60. The type of virus that infects the master boot record is called a __________ virus. (boot
sector)

61. The largest computer network in the world is called the __________. (Internet)

62. The full meaning of HTTP is __________. (HyperText Transfer Protocol)

63. A network that connects computers over a large geographical area is called a __________.
(WAN (Wide Area Network))

64. The process of transferring files from the internet to a computer is called __________.
(downloading)

65. A website address is also known as a __________. (URL (Uniform Resource Locator))

66. The unique identifier of a computer on a network is called an __________. (IP address)
67. The protocol used for sending emails is called __________. (SMTP (Simple Mail Transfer
Protocol))

68. A __________ is a program that helps users access the internet. (web browser)

69. Wi-Fi is a wireless networking technology that uses __________ signals. (radio)

70. The full meaning of URL is __________. (Uniform Resource Locator)

71. The smallest unit of data storage is a __________. (bit)

72. One gigabyte (GB) is equal to __________ megabytes. (1024)

73. The process of protecting data from unauthorized access is called __________. (data
security)

74. A device that provides backup power to a computer is called a __________. (UPS
(Uninterruptible Power Supply))

75. The full meaning of SSD is __________. (Solid State Drive)

76. A system that prevents unauthorized access to a network is called a __________. (firewall)

77. The process of converting data into a secret code is called __________. (encryption)

78. A backup is a copy of __________. (important files and data)

79. A storage device that uses optical technology is called a __________. (CD/DVD)

80. A CD-ROM can store up to __________ MB of data. (700)

You might also like