MCQOPTIONS
Saved Bookmarks
This section includes 1439 Mcqs, each offering curated multiple-choice questions to sharpen your Data Mining knowledge and support exam preparation. Choose a topic below to get started.
| 201. |
General program that is used to help users and work as an interface between computer and users is called |
| A. | hardware |
| B. | software |
| C. | programs |
| D. | computer peripherals |
| Answer» C. programs | |
| 202. |
CBT software commonly used in |
| A. | education |
| B. | forecasting |
| C. | manufacturing |
| D. | farming |
| Answer» B. forecasting | |
| 203. |
Control unit of computer is |
| A. | general-purpose |
| B. | special-purpose |
| C. | multi-purpose |
| D. | one-purpose |
| Answer» B. special-purpose | |
| 204. |
Which operation is not performed by computer |
| A. | Controlling |
| B. | Understanding |
| C. | Inputting |
| D. | Processing |
| Answer» C. Inputting | |
| 205. |
Previous master file from which 'son file is extracted is classified as |
| A. | grandfather file |
| B. | grandson file |
| C. | father file |
| D. | son file |
| Answer» D. son file | |
| 206. |
C language was developed in |
| A. | 1970 |
| B. | 1972 |
| C. | 1974 |
| D. | 1976 |
| Answer» C. 1974 | |
| 207. |
Standardization of Microsoft programs and the Windows operating system has made the spread of viruses: |
| A. | More complicated |
| B. | More difficult |
| C. | Easier |
| D. | Slower |
| Answer» D. Slower | |
| 208. |
C language was standardized by ANSI as |
| A. | C89 |
| B. | C92 |
| C. | C94 |
| D. | C98 |
| Answer» B. C92 | |
| 209. |
System software is an interface between ____________ |
| A. | Hardware and Application Software |
| B. | Application software and User |
| C. | RAM and ROM |
| D. | CPU and UPS |
| Answer» B. Application software and User | |
| 210. |
Computer based weather forecasting depends on accurate collection of data recorded by |
| A. | television |
| B. | weather station |
| C. | radar |
| D. | antenna |
| Answer» C. radar | |
| 211. |
File code which engineers add to file name and limit access to few users is called |
| A. | limited code |
| B. | access code |
| C. | code protection |
| D. | physical code |
| Answer» C. code protection | |
| 212. |
The Boolean operator which combines search terms so that each search result contains at least one of the terms, is |
| A. | and operator |
| B. | not operator |
| C. | or operator |
| D. | nor operator |
| Answer» D. nor operator | |
| 213. |
All devices and programs work together to perform any particular task are best said to be |
| A. | information system |
| B. | information processing system |
| C. | operating system |
| D. | component classification system |
| Answer» C. operating system | |
| 214. |
Most efficient paths between source and destination nodes of a message can be calculated by |
| A. | Data sequencing |
| B. | Data indexing |
| C. | Data routing |
| D. | Data dandling |
| Answer» D. Data dandling | |
| 215. |
The ____________ protect systems from hackers |
| A. | Antivirus |
| B. | Backup |
| C. | Hard disk |
| D. | Firewall |
| Answer» E. | |
| 216. |
In a binary system, numbers with power of 2 are |
| A. | 1, 2, 4, 8, 16, 32 |
| B. | 1, 2, 3, 4, 5, 6 |
| C. | 1, 2, 16, 32, 64, 81 |
| D. | 1, 3, 5, 7, 9, 11 |
| Answer» B. 1, 2, 3, 4, 5, 6 | |
| 217. |
Education system in which student doesn't need to attend the institute is called |
| A. | distance learning |
| B. | online education |
| C. | virtual class room |
| D. | all of these |
| Answer» E. | |
| 218. |
When you quickly press and release the left mouse button twice, you are : |
| A. | Primary-clicking |
| B. | Pointing |
| C. | Double-clicking |
| D. | Secondary-clicking |
| Answer» D. Secondary-clicking | |
| 219. |
The vast network of computers that connects millions of people all over the world is called. |
| A. | LAN |
| B. | Web |
| C. | Hypertext |
| D. | Internet |
| Answer» E. | |
| 220. |
The amount of data that a disk may contains known as the disk's? |
| A. | Volume |
| B. | Size |
| C. | Tracking Unit |
| D. | Storage capacity |
| Answer» E. | |
| 221. |
Different characters that can be encoded is 2n, where n is representation of |
| A. | number of bits for each character |
| B. | number of bytes for each character |
| C. | number of mega bytes |
| D. | number of gigabytes |
| Answer» B. number of bytes for each character | |
| 222. |
Number with power 2 such as 32, 16, 4, 2, 1 are represented in form of binary integers as |
| A. | 110111 |
| B. | 1.11E+14 |
| C. | e111101 |
| D. | 21110001 |
| Answer» B. 1.11E+14 | |
| 223. |
A logic bomb that was created to erupt on Michelangelo's birthday is an example of a: |
| A. | Time-related bomb sequence |
| B. | Virus |
| C. | Time bomb |
| D. | Trojan horse |
| Answer» D. Trojan horse | |
| 224. |
Errors may occur due to imprecise thinking by |
| A. | Computer |
| B. | Users |
| C. | Programmers |
| D. | Processors |
| Answer» D. Processors | |
| 225. |
In data sorting, searching, selecting and placing smallest set is classified as |
| A. | insertion |
| B. | selection |
| C. | exchange |
| D. | change |
| Answer» C. exchange | |
| 226. |
Early analog computer, created by Vannovar Bush in the late 1920s was called |
| A. | analytical engine |
| B. | clipboard |
| C. | differential analyzer |
| D. | berry computer |
| Answer» D. berry computer | |
| 227. |
Most commonly used codes to represent bits are |
| A. | American Standard Code (ASCII) |
| B. | BCD |
| C. | EBCDIC |
| D. | all of above |
| Answer» E. | |
| 228. |
1 kilobyte consists of |
| A. | 768 bytes |
| B. | 724 bytes |
| C. | 1024 bytes |
| D. | 1078 bytes |
| Answer» D. 1078 bytes | |
| 229. |
Set of 'ordinary numbers' is also called |
| A. | integers |
| B. | whole numbers |
| C. | natural numbers |
| D. | real numbers |
| Answer» E. | |
| 230. |
Last step in running and preparing batch jobs is to |
| A. | printout is return |
| B. | printout is started |
| C. | printout is queued |
| D. | printout is verified |
| Answer» B. printout is started | |
| 231. |
Protection of files is referred to |
| A. | files security |
| B. | files exchange |
| C. | bubble files |
| D. | selected files |
| Answer» B. files exchange | |
| 232. |
Electronic spreadsheets are most useful in a situation where relatively .... data must be input but...... calculations are requied. |
| A. | Little; simple |
| B. | Large; complex |
| C. | Little; complex |
| D. | Large; simple |
| Answer» D. Large; simple | |
| 233. |
Third step in running and preparing batch jobs is to |
| A. | write on printed sheets |
| B. | verify the work |
| C. | input data to computer |
| D. | store output |
| Answer» D. store output | |
| 234. |
A lesser known computer is |
| A. | super computer |
| B. | digital computer |
| C. | analog computer |
| D. | micro computer |
| Answer» D. micro computer | |
| 235. |
All components that work together in form of unit is called |
| A. | system |
| B. | bound |
| C. | baud |
| D. | operator |
| Answer» B. bound | |
| 236. |
Symbols such as letters or any digit are called |
| A. | characters |
| B. | small bits |
| C. | small bytes |
| D. | output characters |
| Answer» B. small bits | |
| 237. |
If master and transaction file have keys in same order then it takes |
| A. | less time |
| B. | more time |
| C. | many hours |
| D. | many days |
| Answer» B. more time | |
| 238. |
Number of bits in 'EBCDIC' code for computing are |
| A. | eight bits |
| B. | eighteen bits |
| C. | twenty eight bits |
| D. | seven bits |
| Answer» B. eighteen bits | |
| 239. |
Which of the following is relevant to office automation? |
| A. | document management system |
| B. | message-handling system |
| C. | office supports system |
| D. | all of these |
| Answer» E. | |
| 240. |
Basically, purpose of multiprogramming is to use processor and peripherals in |
| A. | efficient way |
| B. | bad way |
| C. | systematic way |
| D. | functional way |
| Answer» B. bad way | |
| 241. |
Which of the following is not an example of e-commerce? |
| A. | electronic banking |
| B. | online chatting |
| C. | electronic shopping |
| D. | online education |
| Answer» C. electronic shopping | |
| 242. |
Computer hardwares and softwares are logically |
| A. | different |
| B. | equivalent |
| C. | bit similar |
| D. | bit different |
| Answer» C. bit similar | |
| 243. |
Directory which consists of list of files is classified as |
| A. | list directory |
| B. | directory part |
| C. | catalogue |
| D. | disc directory |
| Answer» D. disc directory | |
| 244. |
One value which is written with mantissa and exponent is called |
| A. | exponent |
| B. | mantissa |
| C. | base power |
| D. | floating point number |
| Answer» E. | |
| 245. |
The measure of the “effort” needed to maintain efficiency while adding processors. |
| A. | Maintainablity |
| B. | Efficiency |
| C. | Scalabilty |
| D. | Effectiveness |
| Answer» D. Effectiveness | |
| 246. |
Once a computer starts a job, it is carried on until job is finished without any assistance, defines its |
| A. | Accuracy |
| B. | Diligence |
| C. | Versatility |
| D. | Automacy |
| Answer» E. | |
| 247. |
Multiprogramming performs jobs ordered by programmers to |
| A. | left in queue |
| B. | switching between jobs |
| C. | switching between function |
| D. | left in batches |
| Answer» C. switching between function | |
| 248. |
Which file organization is allowed by a direct access storage device? |
| A. | Indexed and direct only |
| B. | Sequential, indexed and direct |
| C. | Direct only |
| D. | Sequential and direct only |
| Answer» C. Direct only | |
| 249. |
Mechanical devices that make-up the computer are called |
| A. | software |
| B. | hardware |
| C. | netware |
| D. | groupware |
| Answer» C. netware | |
| 250. |
The operating system determines the manner in which all of the following occur except |
| A. | data displayed on the monitor |
| B. | printer output |
| C. | user interaction with the processor |
| D. | user creating of a document |
| Answer» D. user creating of a document | |