Correct answer: driver
A driver is a software interface to hardware devices that allows operating systems and other computer programs to access hardware functions without knowing the exact details of the hardware being used.
Correct answer: Processor
The logic circuitry that responds to and processes the basic instructions that drive a computer is known as a processor. It is directly invoked when the computer program's instructions are executed.
Correct answer: Protocol
When computers communicate with one another, there needs to be a common set of rules and instructions. A protocol is a specific set of communication rules.There are numerous protocols due to the numerous ways in which computers can communicate with one another.
Correct answer: Glass box testing
White Box testing focuses on the code's internal logic and structure. White Box testing is also known as structural, glass box testing, open box and clear box testing.
Correct answer: artificial intelligence
Fifth-generation computing devices based on artificial intelligence are still in the works, though some applications, such as voice recognition, are already in use. The use of parallel processing and superconductors is assisting in the realization of artificial intelligence.
Correct answer: Data design
The process of creating a detailed data model of a database is known as database design. This logical data model includes all of the necessary logical and physical design options.
Correct answer: Open System Interconnection
The Open Systems Interconnection (OSI) model is a conceptual model that characterizes and standardizes computing system communication functions regardless of their underlying internal structure as well as technology.
Correct answer: Loader
The program is loaded into memory and prepared for execution by the loader. Loading a program entails reading the contents of an executable file into memory and then performing any necessary preparatory tasks to prepare the executable for execution. When the loading is finished, the operating system begins the program by passing control to the loaded program code.
Correct answer: authentication
Authentication is the process of comparing the credentials provided to those stored in a database of authorized users' information on a local operating system or within an authentication server.
Correct answer: abcd@gmail.com
An address is made up of two parts. The part before the @ sign (local part) identifies a mailbox's name.
Correct answer: DuckDuckGo
DuckDuckGo is an internet search engine that prioritizes privacy and avoiding the filter bubble of personalized search results. It distinguishes itself from other search engines by not profiling its users and by displaying the same search results to all users for a given search term.
Correct answer: Transmission Control Protocol
Transmission Control Protocol (TCP) is a popular communication protocol that is used for network communication. It divides any message into a series of packets that are sent from source to destination, where they are reassembled.
Correct answer: Compound Keys
A Composite Key is a table column combination that can be used to uniquely identify each record. It is also referred to as a Compound Key.
Correct answer: Turing
CAPTCHA is a security measure that distinguishes humans from computers. CAPTCHA stands for Completely Automated Public Turing Test to Distinguish Between Computers and Humans. A CAPTCHA is frequently an image of text that has been distorted so that humans can read it but most automated computer vision systems cannot.
Correct answer: Screen
BSoD is an abbreviation for Blue Screen of Death.It is also referred to as Bluescreen or Bug Check. BSoD is an error screen that appears on Windows computers after a fatal system error. It denotes a system crash, which occurs when the operating system has reached a point where it can no longer operate safely. This can be caused by a variety of issues, such as a general hardware failure or a critical process terminating unexpectedly.
Correct answer: Syntax
When referring to a programming language, syntax is a set of grammar and spelling rules. In other words, it refers to the use of character structures that a computer can understand. For example, if a user attempts to execute a command without the proper syntax, a syntax error is generated, causing the program to fail.
Correct answer: I, II, III and IV
Computer hardware refers to the mechanical and electronic components of a computer. Without hardware, a computer cannot function properly. Monitor, case, keyboard, mouse, printer, CPU, RAM, and persistent storage, for example.
Correct answer: Charles Babbage
The first analytical engine, or difference engine, was invented by Charles Babbage, a British mathematician at Cambridge University. This machine could be programmed using punch card instructions and had mechanical memory to store the results. Charles Babbage is known as the "Father of the Modern Digital Computer" for his contributions in this field.
Correct answer: Firmware
Firmware is software that is permanently installed in electronic devices and controls the basic hardware functions. A firmware example is BIOS.
Correct answer: Scanner
A scanner is a type of input device that scans documents such as photographs and text pages. When you scan a document, it is converted into a digital format.This results in the creation of an electronic version of the document that can be viewed and edited on a computer.
Correct answer: Domain
The Domain Name System (DNS) is a naming system that is both hierarchical and decentralized for computers, services, and other resources that are connected to the Internet or a private network. It connects various pieces of information to the domain names assigned to each of the participating entities.
Correct answer: Numbers
Apple Inc.'s Numbers spreadsheet application is part of the iWork productivity suite.
Correct answer: 100 Mbps
Local Area Networks (LAN) are designed for small geographical areas of 1-5 km in size, such as offices, schools, colleges, small industries, or a group of buildings. It is widely used in design and troubleshooting. LAN transmission rates range from 4Mbps to 16Mbps and can reach 100Mbps (Mbps stands for megabits per second).
Correct answer: Amount of data transferred
In computing, bandwidth is defined as the bit rate of available or consumed information capacity, typically expressed in metric multiples of bits per second. Bandwidth is variously referred to as network bandwidth, data bandwidth, or digital bandwidth. In the field of signal processing, wireless communications, modern data transmission, digital communications, and electronics, bandwidth is used to refer to analog signal bandwidth measured in hertz, which means the frequency range between the lowest and highest attainable frequency while meeting a well-defined impairment level in signal power. The actual bit rate that can be achieved, however, is determined not only by the signal bandwidth, but also by the noise on the channel.
Correct answer: Catfish
A Catfish is someone who creates a fake online profile in order to deceive someone else. The practice may be used for financial gain, to compromise a victim in some way, to deliberately upset a victim, or to fulfill a wish.