Published On: Thu, Mar 17th, 2011

Computer Knowledge Question and Answer Series Continues

1. The port number used by SMTP is:

25

2. A packet filter is a type of

Firewall

3. Which among the following utilities can detect a bad sector?

CHKDSK and SCANDISK

4. In 100BASE-T, ‘T’ stands for:

Twisted pair

5. A head crash is said to occur when the read-write head of a hard disk drive:

Touches the magnetic media

6. Category 5 cable includes —twisted pairs in a single cable jacket.

4

7. The port number used by the HTTP protocol is

80

8. In PowerPoint presentations, individual pages are called:

Slides

9. _________ is a powder used in laser printers to form the images on a paper.

Toner

10. Worms and Trojan Horses are examples of:

Malware

11. ___________ Printers work by selectively heating regions of special heat-sensitive paper.

Thermal

12.The ISI mark is given by:

BIS

13. The laser printer was invented at:

Xerox

14. A flaw in a system whereby the output is unexpectedly dependent on the sequence or timing of other events is called a:

Race condition

15. A 56k modem can transfer data at up to bits per second over the phone line.

56000

16. The original implementation of the C programming language was standardized by :

ANSI

17. ________Is a signaling method that handles a relatively wide range of frequencies.

Broadband

18. Power-on-self-test is built into the:

BIOS

19. PowerPoint can embed content from other applications through:

OLE

20. The latest release of Microsoft Windows is called:

Vista

21. GRUB is an:

Boot loader

22. __________Is a family of programmable interrupt controller chips.

8259

23.card allows television signals to be received by a computer.

TV tuner

24. ________Is an IEEE 1394 implementation.

Fire Wire

25 ‘Windows protection error’ messages may result from:

Damage to the system registry

26 Sound Blaster line of audio cards were made by :

Creative Technology Ltd.

27 Indiscriminate sending of unsolicited bulk messages is known as :

Spamming.

28. The ‘blue screen of death’ may occur due to:

All the above

29. FAT manages files in contiguous groups of sectors called:

Clusters

30. The utility which can be used to clean the windows registry is:

regedit

Share This:

Post your Comments

Kerala's Own Handicraft Online Store

Leave a comment

XHTML: You can use these html tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

official website of GKTODAY-General Knowledge Today