Explore topic-wise MCQs in Data Mining.

This section includes 1439 Mcqs, each offering curated multiple-choice questions to sharpen your Data Mining knowledge and support exam preparation. Choose a topic below to get started.

1151.

"Macintosh" operating system was developed by

A. Google
B. IBM
C. Microsoft
D. Apple
Answer» E.
1152.

What is the full name of CCTV

A. Closed Contact Television
B. Closed Circuit Television
C. Closed Circuit Transmission
D. Closed Circuit Translation
Answer» C. Closed Circuit Transmission
1153.

When a packet is lost in transit, it should be handled by __

A. error control
B. loss control
C. sequence control
D. duplication control
Answer» D. duplication control
1154.

CentOS and Ubuntu is an example of

A. Types of Computers
B. Application software
C. Operating systems
D. Network software
Answer» D. Network software
1155.

Who is known as the inventor of email

A. Paul Baran
B. Vint Cerf
C. Ray Tomlinson
D. Shiva Ayyadurai
Answer» D. Shiva Ayyadurai
1156.

The first message over internet was transmitted in the year

A. 1969
B. 1972
C. 1987
D. 1993
Answer» B. 1972
1157.

RAM (random access memory) was invented in 1968 by

A. John Bardeen
B. Robert Dennard
C. Robert Metcalfe
D. Douglas Engelbart
Answer» C. Robert Metcalfe
1158.

Which combination of keys forces a complete refresh of the web page, clearing the cache and downloading all contents of the page again

A. Ctrl+F5
B. Alt+F5
C. Ctrl+F2
D. Alt+F2
Answer» B. Alt+F5
1159.

Which function key provide enter and exit fullscreen mode in all modern Internet browsers

A. F8
B. F10
C. F11
D. F12
Answer» D. F12
1160.

Which one is a parent company of Google

A. Calico
B. Alphabet Inc.
C. Gilead Sciences
D. Berkshire Hathaway
Answer» C. Gilead Sciences
1161.

Who among the following is considered as the 'father of artificial intelligence'

A. John McCarthy
B. Alan Turing
C. Donald Knuth
D. John von Neumann
Answer» B. Alan Turing
1162.

In the field of computer, VIRUS stands for

A. Very Intelligent Result Until Source
B. Vital Information Resource Under Siege
C. Viral Important Record User Searched
D. Very Interchanged Resource Under Search
Answer» C. Viral Important Record User Searched
1163.

The first mechanical computer designed by Charles Babbage was called

A. Abacus
B. Process Engine
C. Analytical Engine
D. Digital Engine
Answer» D. Digital Engine
1164.

A term used to describe the process of reorganizing a hard drive?s data to help increase the proficiency of accessing the data is

A. Defragmentation
B. Deceleration
C. Disk Management
D. Disk Duplexing
Answer» B. Deceleration
1165.

Which is not a valid join in SQL

A. left outer join
B. partial outer join
C. full outer join
D. natural full outer join
Answer» C. full outer join
1166.

ISDN is an example of __ network

A. Circuit switched
B. Packet switched
C. Electric switch
D. None
Answer» B. Packet switched
1167.

The average number of transaction completed in a given time is called as

A. response time
B. throughput
C. commit
D. serial schedule
Answer» C. commit
1168.

One GHz is one __ cycles per second

A. thousand
B. million
C. billion
D. trillion
Answer» D. trillion
1169.

What is the register that contains the address of the next instruction

A. Instruction register
B. Accumulator
C. Container
D. Program counter
Answer» E.
1170.

A group of four bits is also called

A. Nibble
B. Quarted
C. Bit Set
D. Byte
Answer» B. Quarted
1171.

What is the first computer that used a stored program concept

A. EDSAC
B. ENIAC
C. UNIVAC
D. SPCC
Answer» C. UNIVAC
1172.

What is the tool for recording the amount of time spent for slide presentation

A. Rehearse timing
B. Slide time setting
C. Slide timer
D. Timing recorder
Answer» B. Slide time setting
1173.

In a computer, the parity bit is added for the purpose of

A. Coding
B. Error detection
C. Controlling
D. Indexing
Answer» C. Controlling
1174.

Which of the following acronyms is normally used to describe unsolicited junk e-mails

A. CRAM
B. DRAM
C. JAM
D. SPAM
Answer» E.
1175.

Where do we find Insert Endnote in MS Word

A. File Menu
B. References Menu
C. Mailings Menu
D. Design Menu
Answer» C. Mailings Menu
1176.

.tmp extension usually refers to what kind of files

A. System file
B. Archieve file
C. Image file
D. Temorary file
Answer» E.
1177.

Bandwidth refers to which of the following

A. The amount of information a peer-to-peer network can store
B. Conversion rate of analog signals to digital signals and vice versa
C. The cost of cable required to implement LAN or WAN in an area
D. The amount of information a communication medium can transfer in a given time
Answer» E.
1178.

Who is the founder of Pascal programming language

A. Grace Hopper
B. Niklaus Wirth
C. Thomas E. Kurtz
D. Michael J. Carey
Answer» C. Thomas E. Kurtz
1179.

A bootstrap is

A. A memory device
B. A program to start up a computer
C. Hardware of computer used to check memory
D. An assembler
Answer» C. Hardware of computer used to check memory
1180.

Num Lock + * is the shortcut keys in File explorer to

A. Display all subfolders under the selected folder
B. Change the size and appearance of file and folder icons
C. Open the Properties dialog box for the selected item
D. Select the address bar
Answer» B. Change the size and appearance of file and folder icons
1181.

Special type of table, which can only be accessed and updated by the database system itself is called

A. Data Storage
B. Data Dictionary
C. DBMS
D. Tuples
Answer» C. DBMS
1182.

The universal logic gates are

A. AND, OR and NOT
B. EXOR and OR
C. AND and OR
D. NAND and NOR
Answer» E.
1183.

The Digital Signature Standard (DSS) makes use of __ algorithm

A. Super Hash Algorithm
B. Secure Hash Algorithm
C. Signature Hack Algorithm
D. Signature Hide Algorithm
Answer» C. Signature Hack Algorithm
1184.

The process of preventing or inhibiting the normal use or management of communication facilities is called as

A. Masquerade
B. Replay
C. Denial of service
D. Blocking
Answer» D. Blocking
1185.

A file that records information about every HTTP request processed by the server

A. Web Server Log
B. Message Log
C. Directory Log
D. Access Log
Answer» E.
1186.

Which RAID level represents an Error - correcting codes (ECC) can be used directly in disk arrays by striping bytes across disks

A. RAID level1
B. RAID level2
C. RAID level3
D. RAID level5
Answer» C. RAID level3
1187.

A cloud environment available via the internet to any one willing to pay is

A. Public cloud
B. Remote cloud
C. Hybrid cloud
D. Private cloud
Answer» B. Remote cloud
1188.

__ consists of all processes residing on disk awaiting allocation of main memory

A. Job Pool
B. CPU Pool
C. Memory Pool
D. Interrupt Pool
Answer» B. CPU Pool
1189.

Which one access allows a user to transfer files without having an account on the remote system

A. Main Memory
B. Arbitrary
C. Anonymous
D. Remote
Answer» D. Remote
1190.

__ is the separation of user logical memory from physical memory

A. Main Memory
B. Cache Memory
C. Virtual Memory
D. External Memory
Answer» D. External Memory
1191.

A flip-flop whose state changes on the rising or falling edge of a clock pulse is said to be

A. Edge triggered flip flop
B. Level triggered flip flop
C. Edge and Level triggered flip flop
D. Triggering
Answer» B. Level triggered flip flop
1192.

Which OSPF message is used to discover who the neighbors are

A. Link state update
B. Database description
C. Link state request
D. Hello
Answer» E.
1193.

Which of the following is the desirable property of a module

A. Independency
B. low cohesiveness
C. high coupling
D. multifunctional
Answer» B. low cohesiveness
1194.

To create your application on a remote server which option you will choose in ASP.NET

A. FTP
B. HTTPS
C. File System
D. none of these
Answer» B. HTTPS
1195.

Cache memory acts as a buffer between

A. RAM and ROM
B. RAM and CPU
C. ROM and CPU
D. CPU and Hard disk
Answer» C. ROM and CPU
1196.

Which of the following is a tool in design phase

A. Abstraction
B. refinement
C. information hiding
D. all of these
Answer» E.
1197.

The tags elements in XML are

A. case-insensitive
B. case-sensitive
C. browser dependent
D. none of these
Answer» C. browser dependent
1198.

In a compiler , grouping of characters into tokens is done by the

A. Scanner
B. Parser
C. Code generator
D. Code Optimizer
Answer» B. Parser
1199.

A bottom ? up Parser generates

A. left most derivation
B. right most derivation
C. right most derivation in reverse
D. left most derivation in reverse
Answer» D. left most derivation in reverse
1200.

Which one of the following is a high-level data model

A. Network model
B. Hierarchical model
C. ER model
D. None of the above
Answer» D. None of the above