MCQOPTIONS
Saved Bookmarks
This section includes 1439 Mcqs, each offering curated multiple-choice questions to sharpen your Data Mining knowledge and support exam preparation. Choose a topic below to get started.
| 401. |
In order to play and hear sound on a computer, one needs: |
| A. | A microphone, sound card and speakers |
| B. | Only sound card required |
| C. | A sound card and speakers |
| D. | None of these is required |
| Answer» D. None of these is required | |
| 402. |
Program which reads one record at a time from transaction and master file is called the |
| A. | saved program |
| B. | updating program |
| C. | run time program |
| D. | online program |
| Answer» C. run time program | |
| 403. |
Process of creating copy of stored data onto another disc is termed as creating |
| A. | locked files |
| B. | backup files |
| C. | modified file |
| D. | destroyed file |
| Answer» C. modified file | |
| 404. |
Flip flop circuit store ________ of data |
| A. | One bit |
| B. | One byte |
| C. | 8 bit |
| D. | 8 byte |
| Answer» B. One byte | |
| 405. |
What is usually used for displaying information at public places? |
| A. | Monitors |
| B. | Overhead |
| C. | Monitor and overhead projection |
| D. | Touch screen kiosks |
| Answer» E. | |
| 406. |
When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as: |
| A. | A virus |
| B. | A Trojan Horse |
| C. | Cracking |
| D. | A denial of service attack. |
| Answer» E. | |
| 407. |
How did the computer mouse get its name? |
| A. | Its cable looks like a tail. |
| B. | Because it squeaks when moved |
| C. | It has ears. |
| D. | Teeth outside mouth. |
| Answer» B. Because it squeaks when moved | |
| 408. |
Complete set of special characters used by any system is classified as |
| A. | control characters |
| B. | graphics characters |
| C. | character set |
| D. | alphanumeric characters |
| Answer» D. alphanumeric characters | |
| 409. |
Whic one of the following is the founder of Wikileaks |
| A. | Evans Williams |
| B. | Jack Dorsey |
| C. | Julian Assange |
| D. | Noah Glass |
| Answer» D. Noah Glass | |
| 410. |
In computer, the fly-by-wire system is used in |
| A. | medical field |
| B. | airline |
| C. | education field |
| D. | business field |
| Answer» C. education field | |
| 411. |
A set of formal operating rules and procedures to govern a given process are |
| A. | Functions |
| B. | Procedures |
| C. | Formalization |
| D. | Protocols |
| Answer» E. | |
| 412. |
The generic term 'device' refers to any piece of |
| A. | software |
| B. | hardware |
| C. | netware |
| D. | groupware |
| Answer» C. netware | |
| 413. |
Jobs processed in multiprogramming are to be done |
| A. | very quickly |
| B. | very slow |
| C. | very time consuming |
| D. | very systematic |
| Answer» B. very slow | |
| 414. |
The majority of computer crimes are committed by: |
| A. | Hackers |
| B. | Insiders |
| C. | Overseas criminals |
| D. | Young teenage computer geniuses |
| Answer» C. Overseas criminals | |
| 415. |
The _________ interface transmits one bit at a time |
| A. | Parallel |
| B. | SCSI |
| C. | Serial |
| D. | Fiber |
| Answer» D. Fiber | |
| 416. |
Information processing cycle includes |
| A. | input, processing, output, storage |
| B. | input, output, manipulation, arithmetic |
| C. | data, processing, printing, editing |
| D. | storage, display, data, information |
| Answer» B. input, output, manipulation, arithmetic | |
| 417. |
A web browser is a program of kind |
| A. | Server program |
| B. | Slave program |
| C. | Dynamic program |
| D. | Client program |
| Answer» E. | |
| 418. |
HTML viruses infect: |
| A. | Your computer |
| B. | A Web page in the HTML code |
| C. | Both a Web page and the computer that is viewing it. |
| D. | None of these |
| Answer» C. Both a Web page and the computer that is viewing it. | |
| 419. |
The use of computer in education is started in |
| A. | 1960s |
| B. | 1970s |
| C. | 1980s |
| D. | 1990s |
| Answer» C. 1980s | |
| 420. |
Method of scanning of files for a desired record is classified as |
| A. | linear research |
| B. | quadratic search |
| C. | search |
| D. | non linear research |
| Answer» D. non linear research | |
| 421. |
Computer I/O processor is |
| A. | general-purpose |
| B. | special-purpose |
| C. | multi-purpose |
| D. | one-purpose |
| Answer» C. multi-purpose | |
| 422. |
Disc which has diameter of 30cm and have capacity of 1000 megabytes is classified as |
| A. | bubble floppy |
| B. | blocked bubble disc |
| C. | compact disc |
| D. | laser discs |
| Answer» E. | |
| 423. |
Portion of directory which can be accessed separately is classified as |
| A. | directory part |
| B. | sub directory |
| C. | proof directory |
| D. | disc directory |
| Answer» C. proof directory | |
| 424. |
Arrangement of data into a specific order is classified as |
| A. | sorting |
| B. | ordering |
| C. | learning |
| D. | inquiring |
| Answer» B. ordering | |
| 425. |
Way in which nodes of a network are linked together, depicts the |
| A. | Network structure |
| B. | Network definition |
| C. | Network topology |
| D. | Network communication |
| Answer» D. Network communication | |
| 426. |
More manageable type of analog computer is |
| A. | calculator |
| B. | old-fashioned slide rule |
| C. | tabulator |
| D. | analytical engine |
| Answer» C. tabulator | |
| 427. |
Two sequential files with ordered records are combined in single file is considered as |
| A. | searching |
| B. | merging |
| C. | finding |
| D. | file learning |
| Answer» C. finding | |
| 428. |
Logic gate in which output is zero for inputs in which one input is one and other inputs are zero is classified as |
| A. | AND gate |
| B. | NOT gate |
| C. | OR gate |
| D. | OUT gate |
| Answer» B. NOT gate | |
| 429. |
Possible dangers and threats for files are that fie can be |
| A. | destroyed |
| B. | modified |
| C. | accessed |
| D. | all of above |
| Answer» E. | |
| 430. |
Two type of memories 'RAM' and 'ROM' are part of |
| A. | backup memory |
| B. | main memory |
| C. | shorter memory |
| D. | long-term memory |
| Answer» C. shorter memory | |
| 431. |
Now a days many products are designed using |
| A. | ATM |
| B. | ROBOT |
| C. | CAD |
| D. | CAM |
| Answer» D. CAM | |
| 432. |
Which of then following is example of direct access? |
| A. | magnetic disc |
| B. | floppy disc |
| C. | program tape |
| D. | plain disc |
| Answer» B. floppy disc | |
| 433. |
Central Processing Unit (CPU) consists of |
| A. | control unit |
| B. | arithmetic and logic unit |
| C. | main store |
| D. | all of above |
| Answer» E. | |
| 434. |
Speed of a computer is measured in terms of unit |
| A. | Milliseconds |
| B. | Nanoseconds |
| C. | Picoseconds |
| D. | Both b and c |
| Answer» E. | |
| 435. |
In sequential files update, record order keys of transaction and master file are always sorted in |
| A. | descending order |
| B. | left to right order |
| C. | ascending order |
| D. | right to left order |
| Answer» D. right to left order | |
| 436. |
Which Indian IT expert started web-based email service HOTMAIL in 1996? |
| A. | Sabeer Bhatia |
| B. | Vinod Dham |
| C. | Ajim Premji |
| D. | Narayan Murthy |
| Answer» B. Vinod Dham | |
| 437. |
Kind of exchange in which number is compared to next item for possible exchange is called |
| A. | exchange sort |
| B. | selection sort |
| C. | bubble sort |
| D. | possible sort |
| Answer» D. possible sort | |
| 438. |
In 1999, the Melissa virus was a widely publicized: |
| A. | e-mail Virus |
| B. | Macro virus |
| C. | Trojan Horse |
| D. | Time Bomb |
| Answer» B. Macro virus | |
| 439. |
MRI, CT-scan, Ultrasound devices are the examples of use of computer in |
| A. | science |
| B. | education |
| C. | business |
| D. | stock-exchange |
| Answer» B. education | |
| 440. |
In user facilities, copying of all records onto a main store from permanent store is considered as |
| A. | delete file |
| B. | rename file |
| C. | save file |
| D. | load file |
| Answer» E. | |
| 441. |
Measuring unit of capacity of hard drive is- |
| A. | GHz |
| B. | GB |
| C. | Gwatts |
| D. | G Newton |
| Answer» C. Gwatts | |
| 442. |
The ........................ is a box that houses the most important parts of a computer system. |
| A. | software |
| B. | hardware |
| C. | input drive |
| D. | system unit |
| Answer» E. | |
| 443. |
HTTP is used to generate requests of Web servers throughout internet on behalf of |
| A. | Browser administrator |
| B. | Browser user |
| C. | Browser protocol |
| D. | Browser locator |
| Answer» C. Browser protocol | |
| 444. |
In American Standard Code (ASCII), maximum possible characters set size can be |
| A. | character set of 128 |
| B. | character set of 138 |
| C. | character set of 148 |
| D. | character set of 158 |
| Answer» B. character set of 138 | |
| 445. |
Communication links can be established between sender and receiver in a communication network by means of |
| A. | Packet switching |
| B. | Circuit switching |
| C. | Message switching |
| D. | All of the Above |
| Answer» E. | |
| 446. |
The "folders" in an operating system are based on ________ structure |
| A. | Doubly linked |
| B. | Queue |
| C. | Inverted tree |
| D. | Graph |
| Answer» D. Graph | |
| 447. |
C language was developed by |
| A. | IBM |
| B. | Apple Macintosh |
| C. | Microsoft |
| D. | AT&T; |
| Answer» E. | |
| 448. |
In sorting sequential files, data is stored only when it is in |
| A. | main store |
| B. | temporary store |
| C. | complex store |
| D. | simple store |
| Answer» B. temporary store | |
| 449. |
In computer, CAL stands for |
| A. | computer aided learning |
| B. | computer assist learning |
| C. | computer added learning |
| D. | computer and learning |
| Answer» B. computer assist learning | |
| 450. |
On the Internet, moving from one web site to another is known as ________ |
| A. | Uploading |
| B. | Downloading |
| C. | Searching |
| D. | Browsing |
| Answer» E. | |