100 Fill in The Blank Questions With Answers
100 Fill in The Blank Questions With Answers
2. The two primary types of computer software are __________ and __________. (system
software, application software)
3. Data that has been processed into a meaningful form is called __________. (information)
4. The three methods of data processing are __________, __________, and __________. (manual,
mechanical, computer-based)
5. The first generation of computers used __________ tubes for circuitry. (vacuum)
6. The main component of the computer that performs calculations and processing is the
__________. (CPU (Central Processing Unit))
8. The stored program concept was introduced by __________. (John Von Neumann)
11. The first electronic general-purpose computer was called __________. (ENIAC)
12. The second generation of computers used __________ instead of vacuum tubes.
(transistors)
13. The __________ generation of computers introduced integrated circuits (ICs). (third)
15. The fifth generation of computers is characterized by __________ and __________. (artificial
intelligence, parallel processing)
17. The first programming language developed for computers was __________. (FORTRAN)
18. The major advantage of third-generation computers was the use of __________. (integrated
circuits)
19. The first digital computers were built in the year __________. (1940s)
20. The development of __________ led to modern artificial intelligence. (machine learning)
21. Computers can be classified based on __________, __________, and __________. (size, purpose,
type of signal)
22. A computer that processes continuous data is called a(n) __________ computer. (analog)
23. A hybrid computer combines features of both __________ and __________ computers. (analog,
digital)
24. A computer designed for a specific task is called a __________ computer. (special-purpose)
26. The smallest type of computer based on size is the __________. (microcomputer)
29. A computer designed for multiple users at the same time is called a __________.
(mainframe)
31. The input device that allows users to enter text is called a __________. (keyboard)
33. A device used to store data permanently is called a __________. (hard disk)
34. The main circuit board of a computer is known as the __________. (motherboard)
37. A device that converts digital signals to analog and vice versa is called a __________.
(modem)
38. The two types of computer memory are __________ and __________. (primary, secondary)
41. The software that directly manages hardware is called __________. (operating system)
42. A set of instructions that tells a computer what to do is called a __________. (program)
43. The most popular operating system for personal computers is __________. (Windows)
44. Software that allows users to browse the internet is called a __________. (web browser)
45. A program that detects and removes viruses is called __________. (antivirus software)
46. The language used to communicate with a computer is called __________. (programming
language)
51. A __________ is a malicious program that spreads by copying itself. (computer virus)
52. A program that disguises itself as useful software but is harmful is called a __________.
(Trojan horse)
53. The process of removing a virus from a computer is called __________. (virus removal)
54. A program that steals information from a computer is called __________. (spyware)
55. A computer virus spreads through __________ and __________. (email attachments, infected
software)
56. A program that replicates itself but does not harm a computer is called a __________.
(worm)
58. The best way to prevent a virus infection is to use __________. (antivirus software)
60. The type of virus that infects the master boot record is called a __________ virus. (boot
sector)
61. The largest computer network in the world is called the __________. (Internet)
63. A network that connects computers over a large geographical area is called a __________.
(WAN (Wide Area Network))
64. The process of transferring files from the internet to a computer is called __________.
(downloading)
65. A website address is also known as a __________. (URL (Uniform Resource Locator))
66. The unique identifier of a computer on a network is called an __________. (IP address)
67. The protocol used for sending emails is called __________. (SMTP (Simple Mail Transfer
Protocol))
68. A __________ is a program that helps users access the internet. (web browser)
69. Wi-Fi is a wireless networking technology that uses __________ signals. (radio)
73. The process of protecting data from unauthorized access is called __________. (data
security)
74. A device that provides backup power to a computer is called a __________. (UPS
(Uninterruptible Power Supply))
76. A system that prevents unauthorized access to a network is called a __________. (firewall)
77. The process of converting data into a secret code is called __________. (encryption)
79. A storage device that uses optical technology is called a __________. (CD/DVD)