
Technical-connection Round-1
Authored by Association Bca
Computers
University
Used 45+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Ctrl,shift and alt are called ________ keys.
Modifier
Function
Alphanumeric
Adjustment
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
MS-Word is an example of _________
An operating system
A processing device
Application software
An input device
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A computer cannot "boot" if it does not have the ________
Compiler
Loader
Operating system
Assembler
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
Phishing trips
Computer viruses
Phishing scams
Spyware scams
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
__________ is the process of dividing the disk into tracks and sectors.
Tracking
Formatting
Crashing
Allotting
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Junk e-mail is also called ___________
Spam
Spoof
Sniffer script
Spool
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a popular programming language for developing multimedia webpages.
COBOL
Java
BASIC
Assembler
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?