MCQOPTIONS
Saved Bookmarks
This section includes 1439 Mcqs, each offering curated multiple-choice questions to sharpen your Data Mining knowledge and support exam preparation. Choose a topic below to get started.
| 1151. |
"Macintosh" operating system was developed by |
| A. | |
| B. | IBM |
| C. | Microsoft |
| D. | Apple |
| Answer» E. | |
| 1152. |
What is the full name of CCTV |
| A. | Closed Contact Television |
| B. | Closed Circuit Television |
| C. | Closed Circuit Transmission |
| D. | Closed Circuit Translation |
| Answer» C. Closed Circuit Transmission | |
| 1153. |
When a packet is lost in transit, it should be handled by __ |
| A. | error control |
| B. | loss control |
| C. | sequence control |
| D. | duplication control |
| Answer» D. duplication control | |
| 1154. |
CentOS and Ubuntu is an example of |
| A. | Types of Computers |
| B. | Application software |
| C. | Operating systems |
| D. | Network software |
| Answer» D. Network software | |
| 1155. |
Who is known as the inventor of email |
| A. | Paul Baran |
| B. | Vint Cerf |
| C. | Ray Tomlinson |
| D. | Shiva Ayyadurai |
| Answer» D. Shiva Ayyadurai | |
| 1156. |
The first message over internet was transmitted in the year |
| A. | 1969 |
| B. | 1972 |
| C. | 1987 |
| D. | 1993 |
| Answer» B. 1972 | |
| 1157. |
RAM (random access memory) was invented in 1968 by |
| A. | John Bardeen |
| B. | Robert Dennard |
| C. | Robert Metcalfe |
| D. | Douglas Engelbart |
| Answer» C. Robert Metcalfe | |
| 1158. |
Which combination of keys forces a complete refresh of the web page, clearing the cache and downloading all contents of the page again |
| A. | Ctrl+F5 |
| B. | Alt+F5 |
| C. | Ctrl+F2 |
| D. | Alt+F2 |
| Answer» B. Alt+F5 | |
| 1159. |
Which function key provide enter and exit fullscreen mode in all modern Internet browsers |
| A. | F8 |
| B. | F10 |
| C. | F11 |
| D. | F12 |
| Answer» D. F12 | |
| 1160. |
Which one is a parent company of Google |
| A. | Calico |
| B. | Alphabet Inc. |
| C. | Gilead Sciences |
| D. | Berkshire Hathaway |
| Answer» C. Gilead Sciences | |
| 1161. |
Who among the following is considered as the 'father of artificial intelligence' |
| A. | John McCarthy |
| B. | Alan Turing |
| C. | Donald Knuth |
| D. | John von Neumann |
| Answer» B. Alan Turing | |
| 1162. |
In the field of computer, VIRUS stands for |
| A. | Very Intelligent Result Until Source |
| B. | Vital Information Resource Under Siege |
| C. | Viral Important Record User Searched |
| D. | Very Interchanged Resource Under Search |
| Answer» C. Viral Important Record User Searched | |
| 1163. |
The first mechanical computer designed by Charles Babbage was called |
| A. | Abacus |
| B. | Process Engine |
| C. | Analytical Engine |
| D. | Digital Engine |
| Answer» D. Digital Engine | |
| 1164. |
A term used to describe the process of reorganizing a hard drive?s data to help increase the proficiency of accessing the data is |
| A. | Defragmentation |
| B. | Deceleration |
| C. | Disk Management |
| D. | Disk Duplexing |
| Answer» B. Deceleration | |
| 1165. |
Which is not a valid join in SQL |
| A. | left outer join |
| B. | partial outer join |
| C. | full outer join |
| D. | natural full outer join |
| Answer» C. full outer join | |
| 1166. |
ISDN is an example of __ network |
| A. | Circuit switched |
| B. | Packet switched |
| C. | Electric switch |
| D. | None |
| Answer» B. Packet switched | |
| 1167. |
The average number of transaction completed in a given time is called as |
| A. | response time |
| B. | throughput |
| C. | commit |
| D. | serial schedule |
| Answer» C. commit | |
| 1168. |
One GHz is one __ cycles per second |
| A. | thousand |
| B. | million |
| C. | billion |
| D. | trillion |
| Answer» D. trillion | |
| 1169. |
What is the register that contains the address of the next instruction |
| A. | Instruction register |
| B. | Accumulator |
| C. | Container |
| D. | Program counter |
| Answer» E. | |
| 1170. |
A group of four bits is also called |
| A. | Nibble |
| B. | Quarted |
| C. | Bit Set |
| D. | Byte |
| Answer» B. Quarted | |
| 1171. |
What is the first computer that used a stored program concept |
| A. | EDSAC |
| B. | ENIAC |
| C. | UNIVAC |
| D. | SPCC |
| Answer» C. UNIVAC | |
| 1172. |
What is the tool for recording the amount of time spent for slide presentation |
| A. | Rehearse timing |
| B. | Slide time setting |
| C. | Slide timer |
| D. | Timing recorder |
| Answer» B. Slide time setting | |
| 1173. |
In a computer, the parity bit is added for the purpose of |
| A. | Coding |
| B. | Error detection |
| C. | Controlling |
| D. | Indexing |
| Answer» C. Controlling | |
| 1174. |
Which of the following acronyms is normally used to describe unsolicited junk e-mails |
| A. | CRAM |
| B. | DRAM |
| C. | JAM |
| D. | SPAM |
| Answer» E. | |
| 1175. |
Where do we find Insert Endnote in MS Word |
| A. | File Menu |
| B. | References Menu |
| C. | Mailings Menu |
| D. | Design Menu |
| Answer» C. Mailings Menu | |
| 1176. |
.tmp extension usually refers to what kind of files |
| A. | System file |
| B. | Archieve file |
| C. | Image file |
| D. | Temorary file |
| Answer» E. | |
| 1177. |
Bandwidth refers to which of the following |
| A. | The amount of information a peer-to-peer network can store |
| B. | Conversion rate of analog signals to digital signals and vice versa |
| C. | The cost of cable required to implement LAN or WAN in an area |
| D. | The amount of information a communication medium can transfer in a given time |
| Answer» E. | |
| 1178. |
Who is the founder of Pascal programming language |
| A. | Grace Hopper |
| B. | Niklaus Wirth |
| C. | Thomas E. Kurtz |
| D. | Michael J. Carey |
| Answer» C. Thomas E. Kurtz | |
| 1179. |
A bootstrap is |
| A. | A memory device |
| B. | A program to start up a computer |
| C. | Hardware of computer used to check memory |
| D. | An assembler |
| Answer» C. Hardware of computer used to check memory | |
| 1180. |
Num Lock + * is the shortcut keys in File explorer to |
| A. | Display all subfolders under the selected folder |
| B. | Change the size and appearance of file and folder icons |
| C. | Open the Properties dialog box for the selected item |
| D. | Select the address bar |
| Answer» B. Change the size and appearance of file and folder icons | |
| 1181. |
Special type of table, which can only be accessed and updated by the database system itself is called |
| A. | Data Storage |
| B. | Data Dictionary |
| C. | DBMS |
| D. | Tuples |
| Answer» C. DBMS | |
| 1182. |
The universal logic gates are |
| A. | AND, OR and NOT |
| B. | EXOR and OR |
| C. | AND and OR |
| D. | NAND and NOR |
| Answer» E. | |
| 1183. |
The Digital Signature Standard (DSS) makes use of __ algorithm |
| A. | Super Hash Algorithm |
| B. | Secure Hash Algorithm |
| C. | Signature Hack Algorithm |
| D. | Signature Hide Algorithm |
| Answer» C. Signature Hack Algorithm | |
| 1184. |
The process of preventing or inhibiting the normal use or management of communication facilities is called as |
| A. | Masquerade |
| B. | Replay |
| C. | Denial of service |
| D. | Blocking |
| Answer» D. Blocking | |
| 1185. |
A file that records information about every HTTP request processed by the server |
| A. | Web Server Log |
| B. | Message Log |
| C. | Directory Log |
| D. | Access Log |
| Answer» E. | |
| 1186. |
Which RAID level represents an Error - correcting codes (ECC) can be used directly in disk arrays by striping bytes across disks |
| A. | RAID level1 |
| B. | RAID level2 |
| C. | RAID level3 |
| D. | RAID level5 |
| Answer» C. RAID level3 | |
| 1187. |
A cloud environment available via the internet to any one willing to pay is |
| A. | Public cloud |
| B. | Remote cloud |
| C. | Hybrid cloud |
| D. | Private cloud |
| Answer» B. Remote cloud | |
| 1188. |
__ consists of all processes residing on disk awaiting allocation of main memory |
| A. | Job Pool |
| B. | CPU Pool |
| C. | Memory Pool |
| D. | Interrupt Pool |
| Answer» B. CPU Pool | |
| 1189. |
Which one access allows a user to transfer files without having an account on the remote system |
| A. | Main Memory |
| B. | Arbitrary |
| C. | Anonymous |
| D. | Remote |
| Answer» D. Remote | |
| 1190. |
__ is the separation of user logical memory from physical memory |
| A. | Main Memory |
| B. | Cache Memory |
| C. | Virtual Memory |
| D. | External Memory |
| Answer» D. External Memory | |
| 1191. |
A flip-flop whose state changes on the rising or falling edge of a clock pulse is said to be |
| A. | Edge triggered flip flop |
| B. | Level triggered flip flop |
| C. | Edge and Level triggered flip flop |
| D. | Triggering |
| Answer» B. Level triggered flip flop | |
| 1192. |
Which OSPF message is used to discover who the neighbors are |
| A. | Link state update |
| B. | Database description |
| C. | Link state request |
| D. | Hello |
| Answer» E. | |
| 1193. |
Which of the following is the desirable property of a module |
| A. | Independency |
| B. | low cohesiveness |
| C. | high coupling |
| D. | multifunctional |
| Answer» B. low cohesiveness | |
| 1194. |
To create your application on a remote server which option you will choose in ASP.NET |
| A. | FTP |
| B. | HTTPS |
| C. | File System |
| D. | none of these |
| Answer» B. HTTPS | |
| 1195. |
Cache memory acts as a buffer between |
| A. | RAM and ROM |
| B. | RAM and CPU |
| C. | ROM and CPU |
| D. | CPU and Hard disk |
| Answer» C. ROM and CPU | |
| 1196. |
Which of the following is a tool in design phase |
| A. | Abstraction |
| B. | refinement |
| C. | information hiding |
| D. | all of these |
| Answer» E. | |
| 1197. |
The tags elements in XML are |
| A. | case-insensitive |
| B. | case-sensitive |
| C. | browser dependent |
| D. | none of these |
| Answer» C. browser dependent | |
| 1198. |
In a compiler , grouping of characters into tokens is done by the |
| A. | Scanner |
| B. | Parser |
| C. | Code generator |
| D. | Code Optimizer |
| Answer» B. Parser | |
| 1199. |
A bottom ? up Parser generates |
| A. | left most derivation |
| B. | right most derivation |
| C. | right most derivation in reverse |
| D. | left most derivation in reverse |
| Answer» D. left most derivation in reverse | |
| 1200. |
Which one of the following is a high-level data model |
| A. | Network model |
| B. | Hierarchical model |
| C. | ER model |
| D. | None of the above |
| Answer» D. None of the above | |