11
ROM stands for _____________ .
A.
B.
C.
D.
Answer & Solution
Solution:

Read-only memory (ROM) is a type of non-volatile memory used in computers and other electronic devices in order to store data that can't be electronically modified.

12
RAM belongs to which kind of memory?
A.
B.
C.
D.
Answer & Solution
Solution:

RAM (Random Access Memory) is a part of the computer's Main Memory or primary memory which is directly accessible by the CPU whenever needs to retrieve data.

13
The memory is for short term storage and is lost when the computer is turned off _________ .
A.
B.
C.
D.
Answer & Solution
Solution:

RAM (Random Access Memory) is a part of the computer's Main Memory which is directly accessible by the CPU whenever needs to retrieve data. RAM contains data only as long as the computer is switched on. Hence, it is also called Volatile memory.

14
Which of the following is an example of a non-volatile computer memory?
Answer & Solution
Solution:

ROM is non-volatile memory as it doesn't erase data even after reboot.

15
Which semiconductor memory stored data will remain permanently stored as long as power provide is?
A.
B.
C.
D.
Answer & Solution
Solution:

Static memory devices are semiconductor memory devices in which stored data is retained as long as power is applied. SRAM (static RAM) is a type of such random access memory (RAM) that retains data bits in its memory as long as power is being supplied.

16
Which one is external Cache Memory?
A.
B.
C.
D.
Answer & Solution
Solution:

The external cache memory is an area between the CPU and the system bus where some very high-speed memory is located to store frequently requested instructions. Integrated Circuit (IC) is a such hardware component that stores frequently-used data outside the main memory (RAM) of a computer to ensure faster access to stored data and reduces processing times by minimizing the need for the CPU to access the memory.

17
Phishing Attack is related to fake______ .
A.
B.
C.
D.
Answer & Solution
Solution:

Phishing is a malicious attack through e-mail setting a bug with an enticing request or lures with an attempt to steal sensitive information.

18
Which device is mainly related to providing security of a network?
A.
B.
C.
D.
Answer & Solution
Solution:

Firewalls are one of the most fundamental network security appliances. Like many other security devices, firewalls can come in hardware or software forms.

19
Firewall protects which of the following attack?
A.
B.
C.
D.
Answer & Solution
Solution:

Firewalls protect computers, websites and web applications from unauthorized access by blocking incoming traffic that is not associated with a known website or web application.

20
When you start your computer, then which component works first?
A.
B.
C.
D.
Answer & Solution
Solution:

When your computer is started, then BIOS works first. The BIOS starts the monitor and keyboard, and does some basic checks to make sure the computer is working properly.