MCQOPTIONS
Saved Bookmarks
This section includes 260 Mcqs, each offering curated multiple-choice questions to sharpen your GK knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
A single chip processor is also called ____. |
| A. | Microprocessor |
| B. | Macroprocessor |
| C. | valves |
| D. | Transistor |
| E. | None of these |
| Answer» B. Macroprocessor | |
| 2. |
Which was the first micro processor ? |
| A. | Intel 4004 |
| B. | Intel 4005 |
| C. | Intel 100 |
| D. | Intel 200 |
| E. | None of these |
| Answer» B. Intel 4005 | |
| 3. |
The 8080 micorprocessor was___bit. |
| A. | 16 bit |
| B. | 32 bit |
| C. | 8 bit |
| D. | 4 bit |
| E. | None of these |
| Answer» D. 4 bit | |
| 4. |
ALU and CU are the part of whose? |
| A. | Central Pump unit |
| B. | Central Processing Unit |
| C. | Central People Unit |
| D. | None of these |
| Answer» C. Central People Unit | |
| 5. |
Trend Micro is a______. |
| A. | Anti-Virus |
| B. | Firewall |
| C. | Spyware Application |
| D. | Spamming |
| E. | None of the Above |
| Answer» B. Firewall | |
| 6. |
.HTM is used as a file extension for_____________. |
| A. | Audio Interchange File Format |
| B. | Adobe Photoshop |
| C. | PC Application |
| D. | Data Interchange format |
| E. | Web page source text |
| Answer» F. | |
| 7. |
A compiler means |
| A. | A person who compiles source program |
| B. | The same thing as a programmer |
| C. | The same thing as a programmer Keypunch operator |
| D. | A program which translates source program into object program |
| E. | None of the above |
| Answer» E. None of the above | |
| 8. |
The term 'B' in COBOL, language used for record keeping and data management stands for _______ . |
| A. | Basic |
| B. | Business |
| C. | Binary |
| D. | Beginner |
| E. | Bootable |
| Answer» C. Binary | |
| 9. |
WORM stands for? |
| A. | Write Once Read Memory |
| B. | Wanted Once Read Memory |
| C. | Wanted Original Read Memory |
| D. | Write Original Read Memory |
| E. | None of these |
| Answer» B. Wanted Once Read Memory | |
| 10. |
A person who used his or her expertise to gain access to other people s computers to get information illegally or do damage is a |
| A. | hacker |
| B. | analyst |
| C. | instant messenger |
| D. | programmer |
| E. | spammer |
| Answer» B. analyst | |
| 11. |
What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications? |
| A. | Cracker |
| B. | Worm |
| C. | Trojan horses |
| D. | Keylogger |
| E. | Honeypot |
| Answer» D. Keylogger | |
| 12. |
Which of the following is NOT a source of viruses? |
| A. | Pendrives |
| B. | Internet |
| C. | E-mail messages |
| D. | Computer networks |
| E. | All of the Above |
| Answer» E. All of the Above | |
| 13. |
What is a bug in computer terminology? |
| A. | A virus |
| B. | A program |
| C. | An error in program |
| D. | None of these |
| Answer» D. None of these | |
| 14. |
One nibble is equivalent to how many bits? |
| A. | 2 |
| B. | 4 |
| C. | 8 |
| D. | 1 |
| Answer» C. 8 | |
| 15. |
Which of the following is correct?I. GUI-Graphical User InterfaceII. VDU-Visual Display UnitIII. ALU-All Logical Unit |
| A. | I and II |
| B. | I and III |
| C. | Only III |
| D. | Only II |
| Answer» B. I and III | |
| 16. |
Which of the following pair is Incorrect? |
| A. | 10 MB-1024 KB |
| B. | 1 GB-10240 MB |
| C. | 1 TB-1024 GB |
| D. | 1KB-1024 Bytes |
| Answer» C. 1 TB-1024 GB | |
| 17. |
The resolution of a computer monitor is measured by____. |
| A. | Number of pixels |
| B. | Number of dots per inch |
| C. | Glow |
| D. | PPM |
| Answer» B. Number of dots per inch | |
| 18. |
Which of the following is a desktop operating system? |
| A. | Mac OS |
| B. | MS Office |
| C. | DBMS |
| D. | Oracle |
| Answer» B. MS Office | |
| 19. |
Which of these features is related to the mouse of the computer? |
| A. | Printing device |
| B. | Memory device |
| C. | Output device |
| D. | Pointing device |
| Answer» E. | |
| 20. |
What is an assistive technology or service in buying and selling a product on the Internet? |
| A. | Point of sale |
| B. | e-banking |
| C. | e-commerce |
| D. | Cloud service |
| Answer» D. Cloud service | |
| 21. |
Find the odd one in the following options. |
| A. | Firmware |
| B. | ROM |
| C. | Hard disk |
| D. | Main memory |
| Answer» B. ROM | |
| 22. |
A computer image is displayed on a white wall. Which output device is being used for this? |
| A. | L.C.D |
| B. | Monitor |
| C. | Data projector |
| D. | Flat panel |
| Answer» D. Flat panel | |
| 23. |
What is the full form of PROM? |
| A. | Programmable read-only memory |
| B. | Program read-output memory |
| C. | Program read-only memory |
| D. | Primary read-only memory |
| Answer» B. Program read-output memory | |
| 24. |
In the context of computing, a byte is equal to bits. |
| A. | 4 |
| B. | 24 |
| C. | 8 |
| D. | 16 |
| Answer» D. 16 | |
| 25. |
The goal of normalization is to _______. |
| A. | Minimize the number of relationships |
| B. | Minimum number of entities |
| C. | Minimize the number of tables |
| D. | Minimizing data redundancy |
| E. | None of these |
| Answer» E. None of these | |
| 26. |
If you want to share broadband internet connection, you have to install _________ on the network. |
| A. | Router |
| B. | Modem |
| C. | Node |
| D. | Cable |
| E. | None of these |
| Answer» C. Node | |
| 27. |
______ denotes what is in the data base fields? |
| A. | Structures |
| B. | Field markers |
| C. | Field definitions |
| D. | Field name |
| E. | None of these |
| Answer» C. Field definitions | |
| 28. |
What is the primary difference between virus and worm? |
| A. | A worm has the ability to self-propagate from the infected computer of the user to other computers. |
| B. | The worm is usually written by a cracker - script bunnies do not have the skill of worm program development |
| C. | Viruses are very harmful for the computers it infects; Worm is not such a serious problem. |
| D. | Antivirus is effective for fighting software, not for fighting worms |
| E. | None of the above |
| Answer» C. Viruses are very harmful for the computers it infects; Worm is not such a serious problem. | |
| 29. |
___________ are the words which the programming language has introduced in its |
| A. | Control Bus |
| B. | Reserved Bus |
| C. | Control Structures |
| D. | Rigid Keys |
| E. | None of these |
| Answer» C. Control Structures | |
| 30. |
What happens when the data is changed in multiple lists and all the lists are not updated? |
| A. | Data redundancy |
| B. | Information overload |
| C. | Duplicate data |
| D. | Data inconsistency |
| E. | None of these |
| Answer» E. None of these | |
| 31. |
Proxy server is used for which of the following? |
| A. | To provide protection against unauthorized users. |
| B. | Processing client requests for web pages. |
| C. | Processing client requests for database access. |
| D. | Providing TCP / IP. |
| E. | None of the above |
| Answer» E. None of the above | |
| 32. |
Virus usually comes from the floppy disk left in the floppy disk drive. |
| A. | Trojan Horse |
| B. | Boot Sectors |
| C. | Script |
| D. | Logic Bomb |
| E. | None of these |
| Answer» C. Script | |
| 33. |
This part of the operating system restricts essential peripherals such as the keyboard, screen, disk, and parallel and serial ports |
| A. | Basic Input / Output System |
| B. | Secondary Input / Output System |
| C. | Peripheral Input / Output System |
| D. | Marginal Input / Output System |
| E. | None of these |
| Answer» B. Secondary Input / Output System | |
| 34. |
Computer can transmit data in the position of _____ in ring topology. |
| A. | Packet |
| B. | Data |
| C. | Access Method |
| D. | Token |
| E. | None of these |
| Answer» E. None of these | |
| 35. |
All of the following are mobile computing devices except |
| A. | Notebook Computer |
| B. | Cellular Phone |
| C. | Digital Scanner |
| D. | Personal Digital Assistant |
| E. | None of these |
| Answer» D. Personal Digital Assistant | |
| 36. |
_______ are specially designed computer chips that reside within other designs, such as your car or electronic thermostat. |
| A. | Server |
| B. | Embedded Computers |
| C. | Robotic Computers |
| D. | Mainframe |
| E. | None of these |
| Answer» C. Robotic Computers | |
| 37. |
System software is a set of programs that enable computer hardware devices and software to work together. |
| A. | Management |
| B. | Processing |
| C. | Utility |
| D. | Applications |
| E. | None of these |
| Answer» E. None of these | |
| 38. |
What is called the OSI model layer is divided into ____________ processes. |
| A. | Five |
| B. | Six |
| C. | Seven |
| D. | Eight |
| E. | None of these |
| Answer» D. Eight | |
| 39. |
______ terminals (earlier called cash registers) are often associated with complex inventory and sales computer systems. |
| A. | Data |
| B. | Sales |
| C. | Query |
| D. | Point of Sales |
| E. | None of these |
| Answer» B. Sales | |
| 40. |
All of the following are examples of real security and privacy risk except _____. |
| A. | Hackers |
| B. | Spam |
| C. | Virus |
| D. | Identity Theft |
| E. | None of these |
| Answer» F. | |
| 41. |
________ servers store and manage files for network users. |
| A. | Authentication |
| B. | Main |
| C. | web |
| D. | File |
| E. | None of these |
| Answer» E. None of these | |
| 42. |
Which of the following is a data warehouse? |
| A. | It can be updated by the end user. |
| B. | There are many naming conventions and formats in it. |
| C. | Organize around important subject areas. |
| D. | They contain only current data. |
| E. | None of these |
| Answer» D. They contain only current data. | |
| 43. |
What is a program called that has only one developer, is sold bundled together and has better intent and features, toolbars and menus in common? |
| A. | Software Suite |
| B. | Integrated software package |
| C. | Software Processing Package |
| D. | Personal Information Manager |
| E. | None of these |
| Answer» C. Software Processing Package | |
| 44. |
In .. usually by email asking users to click on a link and enter their personal data. |
| A. | DOS attack |
| B. | Phishing Attack |
| C. | Firewall |
| D. | SSL |
| Answer» C. Firewall | |
| 45. |
Which software controls the hardware of the computer? |
| A. | Application |
| B. | Program |
| C. | System |
| D. | Memory |
| Answer» D. Memory | |
| 46. |
Which of the following are valid minimum and maximum zoom sizes in MS-office? |
| A. | 10, 100 |
| B. | 10, 1000 |
| C. | 20, 250 |
| D. | 10, 500 |
| E. | None of these |
| Answer» E. None of these | |
| 47. |
What program is used in MS - Word to check the spellings? |
| A. | Spell pro |
| B. | Spell check |
| C. | Outlook express |
| D. | All of the above |
| E. | None of these |
| Answer» C. Outlook express | |
| 48. |
In which of the following areas, a spreadsheet software is more useful? |
| A. | Psychology |
| B. | Publishing |
| C. | Statistics |
| D. | Message sending |
| Answer» E. | |
| 49. |
When a group of computers is connected together in a small area without the help of telephone lines, it is called |
| A. | Remote Communication Network ( RCN ) |
| B. | Local Area Network ( LAN ) |
| C. | Wide Area Network ( WAN ) |
| D. | Value Added Network ( VAN ) |
| Answer» C. Wide Area Network ( WAN ) | |
| 50. |
A translator for the assembly language to machine language is |
| A. | Assembler |
| B. | Compiler |
| C. | Linker |
| D. | Interpreter |
| Answer» D. Interpreter | |