Tech Cuttie Quiz

Tech Cuttie Quizzes
Tech quizzes
0%
2
Created on
download

Tech In General

answer the questions to the best of your ability and kick start your tech career.

1 / 20

1. The full form of BCD is ______________

2 / 20

2. Which of the following is not the function of an Operating System

3 / 20

3. Which web browser is provided default with a Windows machine

4 / 20

4. Who is also know as the father of Indian Supercomputing

5 / 20

5. Basic Interface in ISDN refers to the transmission speed of

6 / 20

6. How many users can access a share folder simultaneously from a Windows 7 machine

7 / 20

7. Which of the following does not work on the principles of magnetization

8 / 20

8. Connection or link to other documents or Web Pages that contain related information is called

9 / 20

9. Who invented mail system and @ symbol for addresses

10 / 20

10. A folder in windows computer can't be made with the name

11 / 20

11. Which key combination is used to permanently delete a file or folder

12 / 20

12. Which activities endanger the sovereignty and integrity of nation?

13 / 20

13. In context of MS-Word let a letter of common contents is to be sent to 100 recipients. If address of individual recipient is to be added in each letter, we will use

14 / 20

14. What do we call a network whose elements may be separated by some distance? It usually involves two or more small networks and dedicated high-speed telephone lines.

15 / 20

15. One Terabyte (1 TB) is equal to

16 / 20

16. ASCII has how many codes

17 / 20

17. Which type of files cannot be navigated using Clip Art browser

18 / 20

18. What is called periodic assessment of security vulnerability in computer system?

19 / 20

19. Which mobile company first introduced the Emoji internationally on their mobile devices

20 / 20

20. Unauthorized copying of software to be used for personal gain of personal backups is called

Your score is

The average score is 17%

0%

0
Created on
image 15

Computer Networking

1 / 10

A single point of access for several networking services is called _____.

2 / 10

To protect the network infrastructure from vulnerability, _____ is setup.

3 / 10

Global telecommunications networks like the internet more data across the national boundaries is example of

4 / 10

What do we call a network whose elements may be separated by some distance? It usually involves two or more small networks and dedicated high-speed telephone lines.

5 / 10

A network designed to allow communication within an organization is called:

6 / 10

With reference to computer network, the exact meaning of the term VPN is

7 / 10

What is the full form of Li-Fi network

8 / 10

802.11 describes ___________ networks

9 / 10

Data moves through the network in a structure called ____________

10 / 10

Network Interface Card (NIC) is generally used for

Your score is

The average score is 0%

0%