CATEGORY: GENERAL KNOWLEDGE Flashcards
(50 cards)
What does CPU stand for?
Answer: Central Processing Unit
Who is known as the father of the computer?
Answer: Charles Babbage
What is the full form of URL?
Answer: Uniform Resource Locator
What does HTTP stand for in web addresses?
Answer: HyperText Transfer Protocol
Which company developed the Windows operating system?
Answer: Microsoft
What is the most widely used programming language for web development?
Answer: JavaScript
What does AI stand for?
Answer: Artificial Intelligence
What is the binary number system based on?
Answer: 0s and 1s
Which search engine was created by Larry Page and Sergey Brin?
Answer: Google
What is the primary function of RAM in a computer?
Answer: Temporary storage for quick data access
What is the name of the first electronic general-purpose computer?
Answer: ENIAC (Electronic Numerical Integrator and Computer)
In which year was the World Wide Web (WWW) invented?
Answer: 1989
Who is the founder of Linux?
Answer: Linus Torvalds
Which company manufactured the first commercial microprocessor, the Intel 4004?
Answer: Intel
What is the Turing Test used for?
Answer: To determine if a machine can exhibit human-like intelligence
What is the main purpose of an IP address?
Answer: Identifies devices on a network
What does SQL stand for?
Answer: Structured Query Language
What is the name of the malicious software that locks users out of their own files until they pay a ransom?
Answer: Ransomware
What type of database model is commonly used for large-scale applications, such as NoSQL databases?
Answer: Document-based model
What is the primary purpose of a firewall in a network?
Answer: To filter and monitor incoming and outgoing network traffic for security
What sorting algorithm has the best worst-case time complexity of O(n log n)?
Answer: Merge Sort
What is the difference between IPv4 and IPv6?
Answer: IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses
What does DNS stand for in networking?
Answer: Domain Name System
What cybersecurity term describes an attack where a hacker intercepts communication between two parties?
Answer: Man-in-the-Middle (MITM) Attack