CK 2 Flashcards

1
Q

MARK-1, a milestone in comp dev, was by?

A

Konrad Zuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

World Wide Web was created by?

A

Tim Berners Lee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

National Supercomputing Mission was announced by MeiTY in the yr?

A

2015

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The 1st supercomputer of India under NSM 2015, is? it was installed in?

National Supercomputing Mission

A

PARAM Shivay
IIT BHU in 2020

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following supercomputer from Indiawas ranked 75?

A

AIRAWAT - PSAI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name the Modifier Keys?

A

Shift
Alt
Ctr
Fn
Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which is the highest memory unit in computers?

A

Geop Byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who stores instructions that are used to start a comp operation referred to as bootstrap?

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A language that follows a sequence of statements or commands in order to achieve a desired output is called?

A

Procedural Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FORTRAN, COBOL, BASIC, C, Pascal are what kind of comp language?

A

Procedural Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ruby, Scala, JADE, C++ and Java are what kind of comp languages?

A

Object Oriented Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • A network that mainly uses FDDI, CDDI & ATM as tech with a range of 5-50km
  • Avg transmission speed
  • Difficult to maintain and it comes with a high cost

Identify the networking technology

A

MAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Common Port Number used for Hypertext Transfer Protocol (HTTP)?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The primary mechanism for providing context for data (data for data)

A

Metadata

Eg: info on creation of data, purpose of data, time & date of creation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Quality of MP3 file depends on?

A

bit rate used for compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Full form of VoIP?

A

Voice over Internet Protocol

Allows making voice calls over broadband rather than regular analog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Topology used in ethernet?

A

Bus & Start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A combination of keys assigned ona keyboard when pressed together, performs a task, like starting an application, quicker than manually done with a mouse

A

Hot Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network component connected to the same cable is called?

A

Bus topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

All network nodes are individually connected to most other nodes present in?

A

Mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In ring topology, computer in possesion of ____ can transmit data

A

Token

22
Q

Full form of COMPUTER

A

Commonly Operated Machines Purposefully Used in Technical & Educational Research

23
Q

Inkless printer example?

A

Thermal Printer

24
Q

BIOS is stored in?

Basic Input Output System

A

ROM

25
Q

Through ____ an admin or user can access someone else’s comp remotely

A

Telnet

A user command and underlying TCP/IP protocol for access

26
Q

Batch Processing was used in ____ gen comp

A

1st gen

27
Q

The practice of buying a domain name as cheaply as possible then without doing anything with the domain, sell it to an interested party for more than you originally paid?

A

Domain Flipping

28
Q

A cyber attack aims to make a device or network resource unavailable to its intended users, with the goal to overload the target with requests or traffic, making it difficult or impossible for the intended users to access the resource

A

Denial-of-service (DoS) Attack

29
Q

What means Data-of-Data?

A

Meta Data

30
Q

Example of a half-duplex and a full-duplex system?

A

Half: Walkie-Talkie
Full: Telephone

31
Q

What tech allows robots to identify materials, understand shapes and recognise objects by ‘listening’ to vibrations?

A

VibroSense

32
Q

1st computer language was?

A

FORTRAN

33
Q

What material is used in the new photonic memory cells for high-performance optical computing?

A

Ce:YIG
Cerium-substituted yttrium iron garnet

34
Q

JSP file extension stands for?

A

Java Server Pages

35
Q

Which university developed the SonicSense system that gives robots a sense of touch similar to humans?

A

Duke University

36
Q

What is ISA?

A

Instruction Set Architecture

37
Q

1st Programmable Computer?

A

Z1

ENIAC - 1st programmable general purpose comp

38
Q

Tech used in the Smart Sensor Patch to process data? Health Condition it can detect is?

A

Edge Computing
Arrhythmia

39
Q

URL fullform and definition

A

Uniform Resource Locator
Address of a webpage on the internet

40
Q

Language predominantly used for artificial intelligence?

A

Python

41
Q

Which university developed a large-scale optical programmable logic array (PLA) capable of handling complex computations?

A

Huazhong University of Sc & Tech
Wuhan National Lab for Optoelectronics

42
Q

Max font size you can apply for any character?

A

1638

43
Q

1st successful electronic computer by JP Eckert & JW Mauchly?

A

ENIAC

44
Q

1st website launched in 1991 - that was a mere text page?

A

Tim Berners Lee

45
Q

Which of the following correctly describes the performance metric used for supercomputers?

A

Floating Point Operations Per Second (FLOPS)

46
Q

Rectangles in a flow chart represent?

A

Task, action or operation

rect + wave = doc produced at this point in the flow

47
Q

Cache memory is faster than ____ but slower than ____

Cache - buffer between CPU & main memory

A

Primary memory
Secondary memory

48
Q

Fullf orm of PNG & Jpg?

A

Portable Network Graphics
Joint Photographic Expert Group

49
Q

Protocol used to securely transmit files over the internet using ecryption?

A

SFTP

by IETF

50
Q

Printer that uses electrostatic digital printing and a drum to produce high-quality text and graphics on paper?

A

Laser printing