MCQOPTIONS
Saved Bookmarks
This section includes 1088 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
Essentially, computer ______ controls computer ______ . These two components are complementary and cannot act independently of one another. In order for a computer to effectively manipulate data and produce useful output, they must work together |
| A. | hardware, software |
| B. | system software, hard disk drive |
| C. | operating system, hard disk drive |
| D. | software, hardware |
| Answer» E. | |
| 252. |
A low level programming language for microprocessor and other programmable devices is known as: |
| A. | Assembly Language |
| B. | High Level Language |
| C. | Machine Language |
| D. | Language Translator |
| Answer» B. High Level Language | |
| 253. |
__________ is a technique used by spammers in which spammers generate email addresses by using known email addresses from corporates or ISP |
| A. | Junk Tags |
| B. | Directory Harvesting |
| C. | Domain Spoofing |
| D. | Social Engineering |
| Answer» C. Domain Spoofing | |
| 254. |
A computer in a network that cannot be accessed outside of the local network unless given permission is called __________. |
| A. | Intranet |
| B. | Internet |
| C. | Middleware |
| D. | Modern |
| Answer» B. Internet | |
| 255. |
In a computer system 4 Bits are equal to_____. |
| A. | 1 Nibble |
| B. | 1 Byte |
| C. | 1 Character |
| D. | 1 Kilo Byte |
| Answer» B. 1 Byte | |
| 256. |
MAC address is a _______ bit number. |
| A. | 24 |
| B. | 36 |
| C. | 48 |
| D. | 42 |
| Answer» D. 42 | |
| 257. |
If the 2's complement representation of a number is (011010)2 , what is its equivalent hexadecimal representation? |
| A. | (110 )16 |
| B. | (1A)16 |
| C. | (16)16 |
| D. | (26)16 |
| Answer» C. (16)16 | |
| 258. |
In an 8 bit representation of computer system the decimal number 26 has to be subtracted from 22 and the result in binary 2's complement is _________ |
| A. | 00000100 |
| B. | 00001100 |
| C. | 00000101 |
| D. | 00010100 |
| Answer» B. 00001100 | |
| 259. |
In the context of information technology, the process of examining large, pre-existing databases in order to generate new useful information, is referred to as _____. |
| A. | simulating |
| B. | mining |
| C. | resourcing |
| D. | hewing |
| Answer» C. resourcing | |
| 260. |
________ is a list of items that appear after clicking on a button or text selection on your computer screen. |
| A. | Pull Down Menu |
| B. | Drop Down Menu |
| C. | Drop Down List |
| D. | Either 2 or 3 |
| E. | Any of 1, 2 and 3 |
| Answer» F. | |
| 261. |
Internet is a/an __________. |
| A. | local computer network |
| B. | worldwide network of computers |
| C. | interconnected network of computers |
| D. | worldwide interconnected network of computers which use a common protocol to communicate with one another |
| Answer» E. | |
| 262. |
One who gains unauthorized access, destroys vital data, denies legitimate user's service or causes problems for their targets is called |
| A. | White Hat Hacker |
| B. | Cracker |
| C. | Programmer |
| D. | Database Administrator |
| Answer» C. Programmer | |
| 263. |
A Gigabyte equals all of the following, except ________ |
| A. | 1000 megabytes |
| B. | Billion kilobytes |
| C. | Million kilobytes |
| D. | 1 thousandth of a terabyte |
| E. | All are correct |
| Answer» C. Million kilobytes | |
| 264. |
A computer is a/an _______. |
| A. | mechanical device |
| B. | electronic device |
| C. | electrical device |
| D. | networking tool |
| Answer» C. electrical device | |
| 265. |
If there is an application in your mobile that allows you to play Cricket, that is an example of ________. |
| A. | System Software |
| B. | Operating Software |
| C. | Special Purpose Application Software |
| D. | Gaming Software |
| E. | None of the above |
| Answer» D. Gaming Software | |
| 266. |
A half byte is called a |
| A. | Byte |
| B. | Nibble |
| C. | Bit |
| D. | Word size |
| Answer» C. Bit | |
| 267. |
For a Computer, BIT stands for - |
| A. | Binary Digit |
| B. | Built-in Integer |
| C. | Binary Task |
| D. | Binary Integer Transfer |
| Answer» B. Built-in Integer | |
| 268. |
A digital signature: |
| A. | is a scanned signature |
| B. | is same as the email id of a message sender |
| C. | is a public key system |
| D. | can be used to authenticate an electronic record |
| Answer» E. | |
| 269. |
Match List I with List IIList IList IIA. Input deviceI. ChromeB. Output deviceII. MS-officeC. SoftwareIII, MouseD. Web browserIV. Monitor Choose the correct answer from the options given below: |
| A. | A - II, B - III, C - I, D - IV |
| B. | A - III, B - IV, C - II, D - I |
| C. | A - I, B - II, C - IV, D - III |
| D. | A - IV, B - III, C - II, D - I |
| Answer» C. A - I, B - II, C - IV, D - III | |
| 270. |
_________ is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. |
| A. | Time Bomb |
| B. | Trojan |
| C. | Mellissa virus |
| D. | Worm |
| E. | Macro virus |
| Answer» E. Macro virus | |
| 271. |
How many Boolean expressions can be be formed with 3 Boolean variables? |
| A. | 16 |
| B. | 1024 |
| C. | 32 |
| D. | 256 |
| Answer» E. | |
| 272. |
A feature that automatically corrects common spelling errors is called ________. |
| A. | Auto Fit |
| B. | Auto Format |
| C. | Auto Correct |
| D. | Auto Lock |
| E. | None of these |
| Answer» D. Auto Lock | |
| 273. |
An example of an input device is ______. |
| A. | Soundcard |
| B. | Projector |
| C. | Webcam |
| D. | Headphones |
| Answer» D. Headphones | |
| 274. |
A terabyte represents _________ bytes. |
| A. | 1 million |
| B. | 1 billion |
| C. | 1 kilobyte |
| D. | 1 trillion |
| Answer» E. | |
| 275. |
Convert the Hexadecimal number 5A to Binary : |
| A. | 01011001 |
| B. | 01001010 |
| C. | 01011010 |
| D. | 01000100 |
| Answer» D. 01000100 | |
| 276. |
________ is a display area in the Graphical User Interface that suddenly appears in the foreground of the visual interface. |
| A. | Blockers |
| B. | Pop-up window |
| C. | Ad Blocking Software |
| D. | Dialog Next Box |
| E. | None of the above |
| Answer» C. Ad Blocking Software | |
| 277. |
__________option removes text from a document and places it on the clipboard. |
| A. | Cut |
| B. | Format |
| C. | Paste |
| D. | Delete |
| Answer» B. Format | |
| 278. |
What is required when more than one person uses a central computer at the same time? |
| A. | Light pen |
| B. | Mouse |
| C. | Digitizer |
| D. | Terminal |
| Answer» E. | |
| 279. |
In which area of the primary storage section are the intermediate processing results held temporarily? |
| A. | Input storage area |
| B. | Program storage area |
| C. | Output storage area |
| D. | Working storage space |
| Answer» E. | |
| 280. |
One nibble is equal to |
| A. | 4 bits |
| B. | 8 bits |
| C. | 6 bits |
| D. | 16 bits |
| Answer» B. 8 bits | |
| 281. |
Which kind of storage device can be carried around? |
| A. | Floppy disk |
| B. | Floppy disk |
| C. | System cabinet |
| D. | Hard disk drive |
| Answer» B. Floppy disk | |
| 282. |
The computer industry uses prefixes of Greek origin to measure large amounts of data. Which term describes 1024 bytes. |
| A. | Kilobyte |
| B. | Megabyte |
| C. | Gigabyte |
| D. | Terabyte |
| Answer» B. Megabyte | |
| 283. |
Which of the following terms is the most closely related to main memory? |
| A. | nonvolatile |
| B. | permanent |
| C. | control unit |
| D. | temporary |
| Answer» E. | |
| 284. |
The original ASCII code used _____ bits of each byte, reserving that last bit for error checking. |
| A. | 5 |
| B. | 6 |
| C. | 7 |
| D. | 8 |
| Answer» D. 8 | |
| 285. |
Output hardware is often categorized according to whether it: |
| A. | is expensive |
| B. | requires a large amount of electricity to work |
| C. | produces hardcopy or softcopy |
| D. | can fit on a desktop |
| Answer» D. can fit on a desktop | |
| 286. |
Which of the following terms applies to communication between separate computer systems? |
| A. | Computer literacy |
| B. | Power supply |
| C. | Applications software |
| D. | Connectivity |
| Answer» E. | |
| 287. |
Which of the following is used for manufacturing chips? |
| A. | control bus |
| B. | control unit |
| C. | parity unit |
| D. | semiconductor |
| Answer» E. | |
| 288. |
Condensing output data to exhibit specific information is |
| A. | Calculating |
| B. | Recording |
| C. | Merging |
| D. | Summarising |
| Answer» E. | |
| 289. |
Which of the following is not a factor affecting the processing capability or performance of a PC system? |
| A. | The clock speed of the microprocessor |
| B. | The revolutions per minute of the printer disk |
| C. | The primary storage capacity of the processor |
| D. | The built-in instruction set available to the microprocessor |
| Answer» C. The primary storage capacity of the processor | |
| 290. |
Which one of the following is the first second-generation computer? |
| A. | IBM 7090 |
| B. | IBM 801 |
| C. | IBM 7070 |
| D. | IBM 650 |
| Answer» B. IBM 801 | |
| 291. |
A Winchester disk is a |
| A. | Disk Stack |
| B. | Removable disk |
| C. | Flexible disk |
| D. | All of the above |
| Answer» B. Removable disk | |
| 292. |
A sizeable geographical area with communication based on the telephone system is though as |
| A. | Local area network |
| B. | Wide area network |
| C. | Modulator-Demodulator |
| D. | All of the above |
| Answer» C. Modulator-Demodulator | |
| 293. |
What is the standard code the computer industry created to represent characters? |
| A. | DASI |
| B. | AASH |
| C. | ASCII |
| D. | BASCII |
| Answer» D. BASCII | |
| 294. |
A packet switching network that was sponsored by the Commission of the EEC and became operational in 1979 is |
| A. | LAN |
| B. | Broadband network |
| C. | Star network |
| D. | Euronet |
| Answer» E. | |
| 295. |
Codes which do not require to be frequently updated also promote user efficiency due to |
| A. | Simplicity |
| B. | Sortability |
| C. | Stability |
| D. | Expansibility |
| Answer» D. Expansibility | |
| 296. |
What is the term which represents the use of links between information of all sorts whether text, graphics, video oi audio-based? |
| A. | Hypertext |
| B. | Hypermedia |
| C. | HyperCard |
| D. | Wildcard |
| Answer» C. HyperCard | |
| 297. |
The process of fetching and executing instructions, one at a time, in the order of increasing addresses is known as |
| A. | instruction execution |
| B. | straight line sequencing |
| C. | instruction fetch |
| D. | random sequencing |
| Answer» C. instruction fetch | |
| 298. |
Offline device is |
| A. | a device which is not connected to CPU |
| B. | a device which is connected to CPU |
| C. | a direct access storage device |
| D. | an I/O device |
| Answer» B. a device which is connected to CPU | |
| 299. |
Primary storage is _____ as compared to secondary storage. |
| A. | Slow and inexpensive |
| B. | Fast and inexpensive |
| C. | Fast and expensive |
| D. | Slow and expensive |
| Answer» D. Slow and expensive | |
| 300. |
The most popular language used with microcomputers and time-shared mini computers, is an easy-to-use high level language. |
| A. | COBOL |
| B. | ADA |
| C. | PASCAL |
| D. | BASIC |
| Answer» E. | |