0% found this document useful (0 votes)
9 views

SCHW

The document consists of a series of questions and answers related to various topics in IT, including computer security, artificial intelligence, cloud computing, and programming languages. It covers key concepts such as DDoS attacks, reinforcement learning, and the purpose of the CPU cache. Additionally, it addresses current trends in the IT industry and historical milestones in computer science.

Uploaded by

akulbisht0406
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

SCHW

The document consists of a series of questions and answers related to various topics in IT, including computer security, artificial intelligence, cloud computing, and programming languages. It covers key concepts such as DDoS attacks, reinforcement learning, and the purpose of the CPU cache. Additionally, it addresses current trends in the IT industry and historical milestones in computer science.

Uploaded by

akulbisht0406
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

COMPUTER HOLIDAY

HOMEWORK
(IT Geeks)

1. What type of attack involves flooding a network or server with excessive traffic to
make it unavailable?

(a)Phishing (b) Spoofing (c) DDoS (d) SQL Injection


Answer: (c) DDoS0

2. Which of the following is not a programming language?

(a) Python (b) SQL (c) HTML (d)DNS

Answer: (d) DNS


3. Who is the founder of Microsoft?

(a)Bill Gates (b)Steve Jobs (c)Elon Musk (d)Larry Ellison

Answer: (a)Bill Gates

(Artificial Intelligence)

4. Which AI technique is inspired by the structure and function of the human brain?
(a)Artificial Neural Networks (b)Genetic Algorithms
(c)Support Vector Machines (d)Random Forests
Answer: (a) Artificial Neural Networks
5. What is the primary objective of reinforcement learning?
(a)To classify data (b)To optimize a performance criterion
(c)To cluster data points (d)To perform dimensionality reduction
Answer: (b) To optimize a performance criterion

6. Which AI technique involves training a model to make decisions based on


maximizing rewards in a given environment?

(a) Reinforcement Learning (b) Supervised Learning


(c) Unsupervised Learning (d) Transfer Learning
Answer: (a) Reinforcement Learning

(Cloud Computing)

7. Which cloud service model provides the most control and flexibility to users?

(a)Infrastructure as a Service (IaaS) (b)Platform as a Service (PaaS)


(c)Software as a Service (SaaS) (d)Function as a Service (FaaS)

Answer: (a) Infrastructure as a Service (IaaS)

8. Which cloud computing deployment model provides resources to multiple


organizations?

(a)Public Cloud (b)Private Cloud (c)Hybrid Cloud


(d)Community Cloud

Answer:( c) Hybrid Cloud

9. What is the term for the practice of using multiple cloud service providers to host an
organization's workloads?

(a) Cloud Migration (b) Cloud Integration (c) Multi-cloud (d) Hybrid Cloud

Answer: (c) Multi-cloud


(Computer Networks)

10. Which protocol is used for securely transferring files over a network?

(a) FTP (File Transfer Protocol) (b) HTTP (Hypertext Transfer Protocol)
(c) TCP (Transmission Control Protocol) (d) UDP (User Datagram Protocol)

Answer: (a) FTP (File Transfer Protocol)

11. What is the purpose of encryption in cybersecurity?

(a) To authenticate users (b) To prevent unauthorized access


(c) To hide the identity of the sender (d) To detect and remove malware

Answer: (b) To prevent unauthorized access


(Cyber Security)
12. What is a common method of authentication in security?

(a)Biometrics (b)Cookies (c)Captcha (d)Hashtags

Answer: (a) Biometrics

13. Which type of malware spreads by attaching itself to other programs?

(a)Virus (b)Worm (c)Trojan (d)Spyware

Answer: (a) Virus

14. What is phishing in the context of cybersecurity?

(a)Sending malicious emails to gather sensitive information


(b)Encrypting data for ransom (c)Testing network vulnerabilities
(d)Installing backdoors in computer systems

Answer: (a) Sending malicious emails to gather sensitive information

(Computer Hardware)

15. What is the purpose of the CPU cache in a computer system?


(a) To store frequently accessed data and instructions for faster processing
(b) To provide long-term storage of data and files
(c) To facilitate communication between the CPU and other components
(d) To manage input and output operations

Answer: (a) To store frequently accessed data and instructions for faster processing

16. Which computer company introduced the first personal computer, the Altair 8800, in
the mid-1970s?

(a)IBM (b) Apple (c) Microsoft (d) Intel

Answer: (c) Microsoft


(Current Affairs in IT Industry)

17. What is the term for the recent trend of companies allowing employees to work
remotely?

(a)Remote Revolution (b)Telecommuting Trend


(c)Work-from-Home Movement (d)Digital Nomadism

Answer: (c) Work-from-Home Movement

18. Which company recently acquired the software development platform GitHub?

(a) Microsoft (b) Google (c) Facebook (d) Amazon

Answer: (a) Microsoft

19. What is the term for the recent trend of using AI to generate realistic human-like
text?

(a) GPT (Generative Pre-trained Transformer) (b) AI Bias


(c) Deepfake (d) Natural Language Generation (NLG)

Answer: (d) Natural Language Generation (NLG)


(History of Computers)

20. Who is known as the "father of modern computer science"?

(a) Alan Turing (b) Charles Babbage (c) John von Neumann
(d) Ada Lovelace

Answer: (a) Alan Turing

21. What was the name of the first electronic general-purpose computer?

(a)ENIAC (b)UNIVAC (c)EDVAC (d)EDSAC

Answer: (a) ENIAC


(Operating Systems)

22. Which operating system is developed by the Linux community and is free and open-
source?

(a) Ubuntu (b) Windows (c) macOS (d) Android

Answer: (a) Ubuntu

23. What is the purpose of the BIOS (Basic Input/Output System) in a computer
system?

(a) To manage system memory (b) To control peripheral devices


(c) To boot the operating system (d) To perform arithmetic and logical operations

Answer: (c) To boot the operating system


(Programming Languages)

24. Which programming language is known for its simplicity and readability, often used
for teaching beginners?

(a)Python (b)C++ (c)Assembly Language (d)Ruby

Answer: (a) Python

25. Which programming language was developed by Sun Microsystems and is


commonly used for building enterprise-level applications?

(a) Java (b) Python (c) C++ (d) JavaScript

Answer: (a) Java

-THE END

You might also like