Computer science is the study of processes that interact with data and that can be represented as data in the form of programs. It enables the use of algorithms to manipulate, store, and communicate digital information. A computer scientist studies the theory of computation and the design of software systems.
Q.A button that makes characters either upper or lower case and numbers to symbols:
Ans: Shift Key
⇒ The shift key ⇧ Shift is a modifier key on a keyboard, used to type capital letters and other alternate “upper” characters. There are typically two shift keys, on the left and right sides of the row below the home row.
Q. Properly arranged data is called:
⇒ Properly arranged data is called Information. Sorting is the process of arranging data into meaningful order so that you can analyze it more effectively. For example, you might want to order sales data by calendar month so that you can produce a graph of sales performance.
Q. The common name for the crime of stealing passwords is:
⇒ In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. It may use for stealing password or IP addresses.
Q. A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a:
⇒ A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or to evaluate system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the “computer underground”.
Q. Chief component of first generation computer was:
Ans: Vacuum tubes
⇒ A vacuum tube, an electron tube, or valve or, colloquially, a tube, is a device that controls electric current flow in a high vacuum between electrodes to which an electric potential difference has been applied.
Q. Who is the father of email?
Ans: Ray Tomlinson
⇒ Raymond Samuel Tomlinson was a pioneering American computer programmer who implemented the first email program on the ARPANET system, the precursor to the Internet, in 1971; he is internationally known and credited as the inventor of email.
Q. USB is which type of storage device?
Ans: Secondary Storage Device
⇒ USB – Universal Serial Bus is a secondary type of storage device which is used in all computers, laptops, mobiles. It is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
Q. Programs stored in ROM are called:
⇒ The programs which are as permanent as hardware and stored in ROM are known as Firmware.Data stored in ROM can only be modified slowly, with difficulty, or not at all, so it is mainly used to store firmware (software that is closely tied to specific hardware, and unlikely to need frequent updates) or application software in plug-in cartridges.
Q. WWW stands for ?
Ans: World Wide Web
⇒ The World Wide Web, commonly known as the Web, is an information system where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hypertext, and are accessible over the Internet.
Q. If a computer has more than one processor then it is known as?
⇒ A Multiprocessor is a computer system with two or more central processing units (CPUs) share full access to a common RAM. The main objective of using a multiprocessor is to boost the system’s execution speed, with other objectives being fault tolerance and application matching.