Computer Fundamentals Question 1
The basic architecture of the computer was developed by ______.
- John Von Neumann
- Charles Babbage
- Blaise Pascal
- Garden Moore
Answer: A. John Von Neumann
Solution
In 1945, Professor J. von Neumann, who was then employed at the Moore School of Engineering in Philadelphia, where the E.N.I.A.C. had been constructed, published a study on the logical architecture of digital computers on behalf of a number of his co-workers.
Computer Fundamentals Question 2
In how many generations a computer can be classified?
- 3
- 4
- 5
- 6
Answer: C. 5
Solution
There are currently 5 generations of computers available.
- The first generation of computers was produced between 1946–1959, which was based on vacuum tubes.
- The second generation of computers was produced between 1959 to 1965, which is based on transistors.
- The third generation of a computer refers to the year 1965–1971, which is based on integrated circuits.
- The fourth generation of computers refers to the years 1971 to 1980, which is based on a VLSI microprocessor.
- Computers in their fifth generation came into existence from 1980 onwards which are based on a ULSI microprocessor.
Computer Fundamentals Question 3
A program that performs a useful task while simultaneously allowing destructive acts is _____.
- Worm
- Trojan Horse
- Virus
- Macro Virus
Answer: B. Trojan horse
Solution
Trojan horses are computer programmers that pretend to be common applications like games, disk utilities, and even antivirus software. However, if they are run, these apps have the potential to harm your computer.
For instance, a Trojan horse may look like a computer game, but when you double-click it, the malware destroys your data by writing over specific regions of your hard drive. Although you should avoid doing this, it's important to understand that these malicious apps only pose a threat if given the opportunity to run. Additionally, most antivirus applications can detect Trojan horses when checking for viruses. Trojan horses do not, however, self-replicate as viruses do. However, a Trojan horse that spreads to numerous computers could be bundled with a viral file.
Computer Fundamentals Question 4
How did the computer mouse get its name?
- Its cable looks like a tail.
- Because it squeaks when moved
- It has ears
- Teeth outside mouth
Answer: A. Its cable looks like a tail
Solution
This unique gadget was developed in 1968 by a man Douglas Engelbart to assist users in controlling their computers. A lengthy cable protruded from the back of the small wooden block, which served as sort of its tail. The device was referred to as a mouse by one of the scientists who worked with Mr Douglas Engelbart to develop it.
Computer Fundamentals Question 5
A computer program that converts assembly language to machine language is ____.
- Compiler
- Interpreter
- Assembler
- Comparator
Answer: C. Assembler
Solution
Machine language is transformed into assembly language by the assembler. It cannot be a compiler or an interpreter because both translate high-level languages into machine code; the difference is that a compiler translates the entire programme before running it, whereas an interpreter does it line by line before running it. Since a comparator compares binary numbers, the correct answer is C.
☛ Related Questions:
Comments
write a comment