MCQOPTIONS
Saved Bookmarks
This section includes 751 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 351. |
Ms Word, by default, places a tab stop at every _________ mark on the ruler. |
| A. | .25″ |
| B. | .5″ |
| C. | .75″ |
| D. | 1″ |
| Answer» C. .75″ | |
| 352. |
MS Power Point is a/an example of___________? |
| A. | Multimedia software |
| B. | Graphics software |
| C. | Spread sheet |
| D. | Entertainment software |
| Answer» B. Graphics software | |
| 353. |
MS-Access is program for____________? |
| A. | Presentation |
| B. | Documentation |
| C. | Calculation |
| D. | Data Base |
| Answer» E. | |
| 354. |
‘mpg’ is the extension of__________? |
| A. | Audio |
| B. | Image |
| C. | Video |
| D. | Flash |
| Answer» D. Flash | |
| 355. |
Modern Computer are very reliable but they are not___________? |
| A. | Fast |
| B. | Powerful |
| C. | Infallible |
| D. | Cheap |
| Answer» D. Cheap | |
| 356. |
MODEM stands for ________? |
| A. | Modulation And Demodulation |
| B. | Modulator And Demodulator |
| C. | Modulator And Electronic Demodulator |
| D. | Modulator Or Digital Electronic Demodulator |
| Answer» C. Modulator And Electronic Demodulator | |
| 357. |
Microprocessors can be used to make________________? |
| A. | Computer |
| B. | Digital systems |
| C. | Calculators |
| D. | All of the above |
| Answer» E. | |
| 358. |
Microsoft was founded in________? |
| A. | 1970 |
| B. | 1972 |
| C. | 1975 |
| D. | 1981 |
| Answer» D. 1981 | |
| 359. |
Microsoft Office is an example of a__________? |
| A. | Horizontal market software |
| B. | Open source software |
| C. | Vertical market software |
| D. | Closed source software |
| Answer» B. Open source software | |
| 360. |
Microsoft Excel 2019 files have a default extension of___________? |
| A. | .Xlsx |
| B. | .Xls |
| C. | .excel |
| D. | .123 |
| Answer» B. .Xls | |
| 361. |
Microprocessors as switching devices are for ___________generation computers? |
| A. | First Generation |
| B. | Second Generation |
| C. | Third Generation |
| D. | Fourth Generation |
| Answer» E. | |
| 362. |
MICR stands for_________? |
| A. | Magnetic Ink Character Reader |
| B. | Magnetic Ink Code Reader |
| C. | Magnetic Ink Cases Reader |
| D. | None |
| Answer» B. Magnetic Ink Code Reader | |
| 363. |
Memory unit is one part of____________? |
| A. | Input device |
| B. | Control unit |
| C. | Output device |
| D. | Central Processing Unit |
| Answer» E. | |
| 364. |
Memory is made up of_____________? |
| A. | Set of wires |
| B. | Set of circuits |
| C. | Large number of cells |
| D. | All of these |
| Answer» D. All of these | |
| 365. |
Material consisting of text and numbers is best presented as_____________? |
| A. | A table slide |
| B. | A bullet slide |
| C. | A title slide |
| D. | All of above |
| Answer» B. A bullet slide | |
| 366. |
“MAN” stands for_______________? |
| A. | Maximum Area Network |
| B. | Minimum Area Network |
| C. | Main Area Network |
| D. | Metropolitan Area Network |
| Answer» E. | |
| 367. |
Malicious software is known as____________? |
| A. | Badware |
| B. | Malware |
| C. | Maliciousware |
| D. | Illegalware |
| Answer» C. Maliciousware | |
| 368. |
Main window in a computer spreadsheet is called ___________ ? |
| A. | Work book |
| B. | Work |
| C. | Account book |
| D. | Work sheet |
| Answer» B. Work | |
| 369. |
Magnetic disk is an example of____________? |
| A. | Secondary memory |
| B. | Primary memory |
| C. | Main memory |
| D. | Both (1) and (2) |
| Answer» B. Primary memory | |
| 370. |
Macintosh, a personal computer was developed by________? |
| A. | Microsoft |
| B. | IBM |
| C. | Apple |
| D. | Dell |
| Answer» D. Dell | |
| 371. |
MAC stands for ________? |
| A. | Mass Access Control |
| B. | Media Access Control |
| C. | Mass Access Carraige |
| D. | Media Access Carraige |
| Answer» C. Mass Access Carraige | |
| 372. |
Mac is a__________? |
| A. | Utility Program |
| B. | Multimedia Software |
| C. | Operating system |
| D. | Windows |
| Answer» D. Windows | |
| 373. |
Linus Torvalds developed which of the following systems? |
| A. | LINUX |
| B. | iOS |
| C. | UNIX |
| D. | Windows |
| Answer» B. iOS | |
| 374. |
LCD stands for ________? |
| A. | Liquid Clear Display |
| B. | Light Clear Display |
| C. | Light Crystal Display |
| D. | Liquid Crystal Display |
| Answer» E. | |
| 375. |
Latest MS Windows is__________? |
| A. | Windows 8 |
| B. | Windows 16 |
| C. | Windows 10 |
| D. | Windows 7 |
| Answer» D. Windows 7 | |
| 376. |
Large transaction processing systems in automated organisations use___________? |
| A. | Online processing |
| B. | Batch Processing |
| C. | Once-a-day Processing |
| D. | End-of-day processing |
| Answer» C. Once-a-day Processing | |
| 377. |
LAN stands for______________? |
| A. | Limited Area Network |
| B. | Logical Area Network |
| C. | Local Area Network |
| D. | Large Area Network |
| Answer» D. Large Area Network | |
| 378. |
Keyboard used with personal Computer have___________keys? |
| A. | 84 to 85 keys |
| B. | 101 to 105 keys |
| C. | both a & b |
| D. | none of these |
| Answer» C. both a & b | |
| 379. |
KB stands for ________? |
| A. | Kernel Boot |
| B. | Kit Bit |
| C. | Kilo Byte |
| D. | Key Block |
| Answer» D. Key Block | |
| 380. |
Junk e-mail is also called_________? |
| A. | spam |
| B. | spoof |
| C. | sniffer script |
| D. | spool |
| Answer» B. spoof | |
| 381. |
JPEG stands for ________? |
| A. | Joint Photo Electronic Group |
| B. | Joint Picture Electronic Group |
| C. | Joint photographic experts group |
| D. | Joint Picture Expert Group |
| Answer» D. Joint Picture Expert Group | |
| 382. |
It is possible to __________ a data source before performing a merge in Ms Word?. |
| A. | Modify |
| B. | Sort |
| C. | Create |
| D. | all of the above |
| Answer» E. | |
| 383. |
ISP stands for___________? |
| A. | internet server provider |
| B. | internal server provider |
| C. | internet service provider |
| D. | insta service provider |
| Answer» D. insta service provider | |
| 384. |
______ is widely used for transmitting streaming videos data on the internet. |
| A. | MP3 |
| B. | WMA |
| C. | WAV |
| D. | AVI |
| Answer» E. | |
| 385. |
ISDN stands for ________? |
| A. | Integrated Service Digital Network |
| B. | Intelligent Service Digital Network |
| C. | Integrated Service Double Network |
| D. | Integrated Secure Digital Network |
| Answer» B. Intelligent Service Digital Network | |
| 386. |
_________ is the shortcut key to select the entire row in Excel. |
| A. | Alt + Space bar |
| B. | Shift + Space bar |
| C. | Ctrl + Space bar |
| D. | None |
| Answer» C. Ctrl + Space bar | |
| 387. |
_________ is the shortcut key to select the entire column in Excel. |
| A. | Alt + Space bar |
| B. | Shift + Space bar |
| C. | Ctrl + Space bar |
| D. | None |
| Answer» D. None | |
| 388. |
____________ is the shortcut key to display active cell in Excel. |
| A. | Shift + Backspace |
| B. | Ctrl + Backspace |
| C. | Alt + Backspace |
| D. | None |
| Answer» C. Alt + Backspace | |
| 389. |
______________is the science that attempts to produce machines that display the same type of intelligence that humans do? |
| A. | Nanoscience |
| B. | Nanotechnology |
| C. | Simulation |
| D. | Artificial intelligence (Al) |
| Answer» E. | |
| 390. |
____________is the process of making changes to a document’s existing content. |
| A. | Creating |
| B. | Editing |
| C. | Cutting |
| D. | Forming |
| Answer» C. Cutting | |
| 391. |
___________is the process of dividing the disk into tracks and sectors? |
| A. | Tracking |
| B. | Formatting |
| C. | Crashing |
| D. | Allotting |
| Answer» C. Crashing | |
| 392. |
_______________is the most important/powerful computer in a typical network? |
| A. | Desktop |
| B. | Network client |
| C. | Network server |
| D. | Network station |
| Answer» D. Network station | |
| 393. |
____________is the measurement of things such as fingerprints and retinal scans used for security access? |
| A. | Biometrics |
| B. | Bio measurement |
| C. | Computer security |
| D. | Smart weapon machinery |
| Answer» B. Bio measurement | |
| 394. |
_________ is the largest computer. |
| A. | Mini Computer |
| B. | Micro Computer |
| C. | Mainframe Computer |
| D. | Super Computer |
| Answer» D. Super Computer | |
| 395. |
___________is the key we use to run the selected command? |
| A. | SHIFT |
| B. | TAB |
| C. | ENTER |
| D. | CTRL |
| Answer» D. CTRL | |
| 396. |
___________ is the key to close a selected drop -down list; cancel a command and close a dialog box. |
| A. | TAB |
| B. | SHIFT |
| C. | ESC |
| D. | F10 |
| Answer» D. F10 | |
| 397. |
____________Is the functional key to display save-as box? |
| A. | F5 |
| B. | F6 |
| C. | F9 |
| D. | F12 |
| Answer» E. | |
| 398. |
_______________is the ability of a device to “jump” directly to the requested data? |
| A. | Sequential access |
| B. | Random access |
| C. | Quick access |
| D. | All of the above |
| Answer» C. Quick access | |
| 399. |
___________ is system software to facilitate editing of text and data? |
| A. | MS Word |
| B. | Editors …. |
| C. | PowerPoint |
| D. | MS publisher |
| Answer» C. PowerPoint | |
| 400. |
__________is defined as any crime completed through the use of computer technology? |
| A. | Computer forensics |
| B. | Computer crime |
| C. | Hacking |
| D. | Cracking |
| Answer» C. Hacking | |