Computer Test 2
Switching device of fifth generation computer is——–
  • VLSI
Explanation:
 

Very Large Scale Integration (VLSI) technology is crucial for fifth-generation computers because it allows for the integration of millions of transistors onto a single chip. This capability is essential for the complex and powerful computing required for artificial intelligence (AI), parallel processing, and natural language processing, key features of fifth-generation computing.

Trackball is a……
  • Input device
  • Output device
  • Programming language
  • Software
Explanation:
 

A trackball is indeed classified as an input device because it allows users to control the movement of the cursor on a computer screen by rotating a ball with their fingers or palm. This movement is detected by sensors in the device, translating it into commands that interact with software and graphical user interfaces (GUIs).

Snowbol is an/a———
  • Operating system
  • HLL
  • Software
  • Search engine
Explanation:

Snowball, also known as SNOBOL, is indeed categorized as a High-Level Programming Language (HLL). Developed in the 1960s, Snowball specializes in text and string manipulation tasks, particularly adept at pattern matching and processing textual data. Its focus on powerful string handling capabilities makes it valuable for applications involving text editing, data parsing, and language processing.

———- computer is small general purpose micro computer, but larger than portable computer
  • Hybrid
  • Digital
  • Desktop
  • Laptop
Explanation:
 

The term "Desktop" specifically refers to a type of personal computer (PC) that is larger than a laptop and designed for use on a desk or table. It includes separate components such as a monitor, keyboard, mouse, and system unit (CPU), distinguishing it from laptops which are smaller and portable.

Malicious software is known as
  • Badware
  • Malware
  • Maliciousware
  • Illegalware
Explanation:
 

Malware is the comprehensive term used to describe malicious software that poses threats to computers, networks, and devices. It encompasses a wide range of harmful programs like viruses, worms, trojans, ransomware, and spyware. This term is universally recognized and preferred in the cybersecurity field for describing various types of harmful software.

When a computer is switched on, the booting process performs
  • Integrity Test
  • Power-On Self-Test
  • Correct Functioning Test
  • Reliability Test
Explanation:
 

The Power-On Self-Test (POST) is an essential diagnostic process conducted by a computer's firmware upon startup. It verifies hardware components like the CPU, RAM, and peripherals to ensure they are operational. This ensures a stable environment for loading the operating system, facilitated by the bootstrap loader after successful POST completion.

A program that performs a useful task while simultaneously allowing destructive acts is
  • Worm
  • Trojan horse
  • Virus
  • Macro virus
  • Explanation:

    A Trojan horse is a type of malicious software that deceives users by masquerading as a legitimate program or file. It performs seemingly useful tasks while secretly executing destructive actions, such as stealing data, damaging files, or allowing unauthorized access. This distinguishes it from viruses, worms, and macro viruses which have different methods of propagation and behavior.