Explore topic-wise MCQs in Computer Science Mcqs.

This section includes 990 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Mcqs knowledge and support exam preparation. Choose a topic below to get started.

101.

Main window in a computer spreadsheet is called ___________ ?

A. Work book
B. Work
C. Account book
D. Work sheet
Answer» B. Work
102.

BIOS stands for__________?

A. Basic Input Output system
B. Binary Input output system
C. Basic Input Off system
D. all the above
Answer» B. Binary Input output system
103.

Communication between a computer and a keyboard involves ______________ transmission.

A. Automatic
B. Half-duplex
C. Full-duplex
D. Simplex
Answer» E.
104.

Which basic colors are used in computer graphics?

A. GOB
B. RWG
C. RGB
D. BGB
Answer» D. BGB
105.

In a computer spreadsheet, function which is used to count numbers of entries in given range is called __________ ?

A. Length
B. Counter
C. Counting
D. Count
Answer» D. Count
106.

Which file is responsible to start MS Power point?

A. ppt.exe
B. Powerpnt.exe
C. Mspoint.exe
D. None of these
Answer» C. Mspoint.exe
107.

Which of the following format you can decide to apply or not in AutoFormat dialog box?

A. Number format
B. Border format
C. Font format
D. All of above
Answer» E.
108.

What characteristic of read-only memory (ROM) makes it useful?

A. ROM information can be easily updated.
B. Data in ROM is non-volatile, that is, it remains there even without electrical power.
C. ROM provides very large amounts of inexpensive data storage.
D. ROM chips are easily swapped between different brands of computers.
Answer» C. ROM provides very large amounts of inexpensive data storage.
109.

Title bar in MS-Excel displays name of the __________ ?

A. Worksheet
B. Workbook
C. Formula
D. Location
Answer» C. Formula
110.

What does DMA stand for?

A. Distinct Memory Access
B. Direct Memory Access
C. Direct Module Access
D. Direct Memory Allocation
Answer» C. Direct Module Access
111.

Which programming languages are classified as low level languages?

A. BASIC, COBOL, Fortran
B. Prolog
C. C, C++
D. Assembly languages
Answer» E.
112.

Following combination of keys is used to maximize or restore a selected window:

A. CTRL+F1
B. CTRL+F5
C. CTRL+F10
D. CTRL+F12
Answer» D. CTRL+F12
113.

In a computer spreadsheet, which is true if current or active cell is B4 and you pressed Enter key?

A. you will be in the cell A1
B. you will be in the cell B5
C. you will be in the cell B3
D. you will be in the cell B6
Answer» C. you will be in the cell B3
114.

Modern Computer are very reliable but they are not___________?

A. Fast
B. Powerful
C. Infallible
D. Cheap
Answer» D. Cheap
115.

What do you call the programs that are used to find out possible faults and their causes?

A. operating system extensions
B. cookies
C. diagnostic software
D. boot diskettes
Answer» D. boot diskettes
116.

Which of the following is a storage device?

A. Tape
B. Hard Disk
C. Floppy Disk
D. All of the above
Answer» E.
117.

Which of the following is not anti- viruses software?

A. Avira
B. Kaspersky
C. Oracle
D. McAfee
Answer» D. McAfee
118.

Who invented the high level language “C”?

A. Dennis M. Ritchie
B. Niklaus Writh
C. Seymour Papert
D. Donald Kunth
Answer» B. Niklaus Writh
119.

Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?

A. Daughter board
B. Motherboard
C. Father board
D. Breadboard
Answer» C. Father board
120.

Personnel who design, program, operate and maintain computer equipment refers to__________?

A. Console-operator
B. Programmer
C. Peopleware
D. System Analyst
Answer» D. System Analyst
121.

The proper definition of a modern digital computer is____________?

A. An electronic automated machine that can solve problems involving words and numbers
B. A more sophistic and modified electronic pocket calculator
C. Any machine that can perform mathematical operations
D. A machine that works on binary code
Answer» B. A more sophistic and modified electronic pocket calculator
122.

An error in software or hardware is called a bug. What is the alternative computer jargon for it?

A. Leech
B. Squid
C. Slug
D. Glitch
Answer» E.
123.

A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is__________?

A. Bug
B. Vice
C. Lice
D. Worm
Answer» E.
124.

1 Byte =___________?

A. 8 bits
B. 4 bits
C. 2 bits
D. 9 bits
Answer» B. 4 bits
125.

Father of “C‘ programming language?

A. Dennis Ritchie
B. Prof John Keenly
C. Thomas Kurtz
D. Bill Gates
Answer» B. Prof John Keenly
126.

A fault in a computer program which prevents it from working correctly is known as___________?

A. Boot
B. Bug
C. Biff
D. Strap
Answer» C. Biff
127.

Unwanted repetitious messages, such as unsolicited bulk e-mail is known as_________?

A. Spam
B. Trash
C. Calibri
D. Courier
Answer» B. Trash
128.

The device used to carry digital data on analogue lines is called as_________?

A. Modem
B. Multiplexer
C. Modulator
D. Demodulator
Answer» B. Multiplexer
129.

DOS stands for____________?

A. Disk Operating System
B. Disk operating session
C. Digital Operating System
D. Digital Open system
Answer» B. Disk operating session
130.

An area of a computer that temporarily holds data waiting to be processed is___________?

A. CPU
B. Memory
C. Storage
D. File
Answer» C. Storage
131.

On-line real time systems become popular in______________generation?

A. First Generation
B. Second Generation
C. Third Generation
D. Fourth Generation
Answer» D. Fourth Generation
132.

What is the other name for programmed chip?

A. RAM
B. ROM
C. LSIC
D. PROM
Answer» C. LSIC
133.

Select the Odd one from the following

A. Operating system
B. Interpreter
C. Compiler
D. Assembler
Answer» B. Interpreter
134.

The instructions that tell a computer how to carry out the processing tasks are referred to as computer___________?

A. programs
B. processors
C. input devices
D. memory modules
Answer» B. processors
135.

___________ is the key to close a selected drop -down list; cancel a command and close a dialog box.

A. TAB
B. SHIFT
C. ESC
D. F10
Answer» D. F10
136.

___________is the key we use to run the selected command?

A. SHIFT
B. TAB
C. ENTER
D. CTRL
Answer» D. CTRL
137.

The system unit of a personal computer typically contains all of the following except:

A. Microprocessor
B. Disk controller
C. Serial interface
D. Modem
Answer» E.
138.

A________________is an additional set of commands that the computer displays after you make a selection from the main menu?

A. dialog box
B. submenu
C. menu selection
D. All of the above
Answer» B. submenu
139.

COBOL is an acronym for________________?

A. Common Business Oriented Language
B. Computer Business Oriented Language
C. Common Business Operated Language
D. Common Business Organized Language
Answer» B. Computer Business Oriented Language
140.

You use a(n)___________such as a keyboard or mouse, to input information?

A. output device
B. input device
C. storage device
D. processing device
Answer» C. storage device
141.

_______________is the ability of a device to “jump” directly to the requested data?

A. Sequential access
B. Random access
C. Quick access
D. All of the above
Answer» C. Quick access
142.

The computer size was very large in__________?

A. First Generation
B. Second Generation
C. Third Generation
D. Fourth Generation
Answer» B. Second Generation
143.

Cathode Ray Tube is a form of__________?

A. Keyboard
B. Mouse
C. Monitor
D. Mother board
Answer» D. Mother board
144.

What is the most common tool used to restrict access to a computer system?

A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer» C. Computer keys
145.

___________Store data or information temporarily and pass it on as directed by the control unit?

A. Address
B. Register
C. Number
D. Memory
Answer» C. Number
146.

When creating a computer program, the____________designs the structure of the program?

A. End user
B. System Analyst
C. Programmer
D. All of the above
Answer» C. Programmer
147.

To access properties of an object, the mouse technique to use is_____________?

A. Dragging
B. dropping
C. right-clicking
D. shift-clicking
Answer» D. shift-clicking
148.

All of the following are examples of real security and privacy risks EXCEPT____________?

A. hackers
B. Spam
C. Viruses
D. identity theft
Answer» C. Viruses
149.

Which of the following is NOT one of the four major data processing functions of a computer?

A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer» D. storing the data or information
150.

Where does most data go first with in a computer memory hierarchy ?

A. RAM
B. ROM
C. BIOS
D. CACHE
Answer» B. ROM