Computer science is the study of processes that interact with data and that can be represented as data in the form of programs. It enables the use of algorithms to manipulate, store, and communicate digital information. A computer scientist studies the theory of computation and the design of software systems.
Q. ‘Swift’ Programming Language developed by:
⇒ Swift is a general-purpose, multi-paradigm, compiled programming language developed by Apple Inc. for Apple Product. Swift is designed to work with Apple’s Cocoa and Cocoa Touch frameworks and the large body of existing Objective-C code written for Apple products. It is built with the open source LLVM compiler framework and has been included in Xcode since version 6, released in 2014.
Q. Software which are freely available and can be edited and customized by anyone is known as:
Ans: Open Source
⇒ Open-source software is a type of computer software in which source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner.
Q. _______is a collection of data values of same types having a common name.
⇒ In computer science, an array type is a data type that represents a collection of elements (values or variables), each selected by one or more indices (identifying keys) that can be computed at run time during program execution. Such a collection is usually called an array variable, array value, or simply array.
Q. What controls communications for the entire computer system?
⇒ The motherboard is a printed circuit board and foundation of a computer that is the biggest board in a computer chassis. It allocates power and allows communication to and between the CPU, RAM, and all other computer hardware components.
Q. The first completely 64-bit compatible version of Android:
Ans: Android 5.0 ‘Lollipop’
⇒ Android “Lollipop” is the fifth major version of the Android mobile operating system developed by Google and the 12th version of Android, spanning versions between 5.0 and 5.1.1. Unveiled on June 25, 2014 at the Google I/O 2014 conference, it became available through official over-the-air (OTA) updates on November 12, 2014, for select devices that run distributions of Android serviced by Google (such as Nexus and Google Play edition devices).
Q. Codes consisting of bars or lines of varying widths or lengths that are computer readable are known as:
Ans: A Bar code
⇒ A barcode or bar code is a method of representing data in a visual, machine-readable form. Initially, barcodes represented data by varying the widths and spacing of parallel lines. These barcodes, now commonly referred to as linear or one-dimensional (1D), can be scanned by special optical scanners, called barcode readers.
Q. A prescribed set of well-defined instructions for solving mathematical problems is called:
Ans: An algorithm
⇒ Prescribed set of well-defined instructions for solving mathematical problems is called an algorithm. algorithm can be defined as any well defined procedure for solving problem. algorithm is used for step to step solution. algorithm can be written to solve any mathematical problems.
Q. When you cut or copy information it gets place in the:
⇒ The clipboard is a buffer that some operating systems provide for short-term storage and transfer within and between application programs. The clipboard is usually temporary and unnamed, and its contents reside in the computer’s RAM. The clipboard is sometimes called the paste buffer.
Q. A removable magnetic disc that holds information:
Ans: Floppy disk
⇒ A floppy disk, also known as a floppy, diskette, or simply disk, is a type of disk storage composed of a disk of thin and flexible magnetic storage medium, sealed in a rectangular plastic enclosure lined with fabric that removes dust particles. Floppy disks are read and written by a floppy disk drive (FDD).
Q. Which of the following virus overtake computer system, when it boots and destroy information?
Ans: Stealth virus
⇒ A stealth virus is a hidden computer virus that attacks operating system processes and averts typical anti-virus or anti-malware scans. Stealth viruses hide in files, partitions and boot sectors and are adept at deliberately avoiding detection.