MCQS

Computer Science

The correct answer is 'B. Malware' because malware is a term used to describe any type of malicious software designed to cause harm to a computer, server, or network. It encompasses a wide range of malicious programs such as viruses, worms, trojans, ransomware, and spyware. Therefore, 'malware' is the most appropriate term to describe malicious software in general.

The correct answer is 'B. WIN Ctrl Esc' because this specific key combination directly opens the Task Manager in Windows 10. Pressing the Windows key, along with Ctrl and Esc keys simultaneously, is a quick and efficient way to access the Task Manager without having to navigate through menus or search for it in the system.

The correct answer is 'C. Desktop' because a desktop computer is a small general-purpose microcomputer that is larger than a portable computer. Desktop computers are typically larger and have more components than portable computers, making them suitable for more intensive tasks and offering more customization options. Therefore, a desktop computer fits the description of being small and general-purpose while also being larger than a portable computer.

The correct answer is 'C. Protocol' because protocols are indeed a set of rules and procedures that govern the way data is transmitted over the internet. Protocols ensure that data is sent and received correctly, efficiently, and securely. Therefore, in the context of controlling data transmission over the internet, protocols play a crucial role in ensuring smooth communication between devices.

The correct answer is 'A. Trojan horse' because a Trojan horse is a type of malware that appears to be harmless or even beneficial, but actually contains malicious code that can disrupt a computer system. Unlike viruses or worms, Trojan horses do not replicate themselves but instead rely on users to unknowingly install them. Therefore, a Trojan horse fits the description of an intentionally disruptive program that spreads from program to program or from disk to disk.

The correct answer is 'B. 2nd' because it was during the second generation of computers that operating systems were first introduced. In the first generation, computers were operated without an operating system, while in the second generation, operating systems like IBM's OS/360 and CTSS were developed and used for the first time.

The correct answer is 'B. Memory' because memory is specifically designed to temporarily hold data waiting to be processed in a computer system. Memory, also known as RAM (Random Access Memory), stores data that is actively being used by the computer's processor, allowing for quick access and retrieval of information. This distinguishes it from other components like the hard drive, which stores data for long-term use.

The correct answer is 'B. WIN Esc' because pressing the Windows key (WIN) along with the Esc key opens the Start menu in Windows 10. This shortcut allows users to quickly access the startup button on their computer without having to navigate through menus or use the mouse.

The correct answer is 'C. Disk Defragmenter' because this utility program specifically focuses on rearranging files and optimizing disk space on a Windows system. Disk Defragmenter is designed to eliminate unnecessary fragments and improve the overall performance of the computer by organizing data more efficiently. This makes it the most suitable option for the given description.