MCQOPTIONS
Saved Bookmarks
This section includes 990 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Mcqs knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
Computers process data into information by working exclusively with____________? |
| A. | multimedia |
| B. | word |
| C. | numbers |
| D. | characters |
| Answer» D. characters | |
| 152. |
The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called___________? |
| A. | robotics |
| B. | simulation |
| C. | computer forensics |
| D. | animation |
| Answer» D. animation | |
| 153. |
A device that connects to a network without the use of cables is said to be___________? |
| A. | Distributed |
| B. | free |
| C. | centralized |
| D. | none of these |
| Answer» E. | |
| 154. |
The_____________data mining technique derives rules from real-world case examples? |
| A. | Rule discover |
| B. | Signal processing |
| C. | Neural nets |
| D. | Case-based reasoning |
| Answer» D. Case-based reasoning | |
| 155. |
A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a____________? |
| A. | Hacker |
| B. | spammer |
| C. | instant messenger |
| D. | programmer |
| Answer» B. spammer | |
| 156. |
The most common type of storage devices are_________? |
| A. | magnetic storage |
| B. | Flash memory |
| C. | optical |
| D. | Both A & B |
| Answer» E. | |
| 157. |
Large transaction processing systems in automated organisations use___________? |
| A. | Online processing |
| B. | Batch Processing |
| C. | Once-a-day Processing |
| D. | End-of-day processing |
| Answer» C. Once-a-day Processing | |
| 158. |
Which of the following is not a binary number? |
| A. | 001 |
| B. | 101 |
| C. | 202 |
| D. | 110 |
| Answer» D. 110 | |
| 159. |
A computer system that is old and perhaps not satisfactory is referred to as a(n)____________? |
| A. | Ancient system |
| B. | Historical system |
| C. | Age old system |
| D. | Legacy system |
| Answer» E. | |
| 160. |
Which of the following is the smallest storage? |
| A. | Megabyte |
| B. | Gigabyte |
| C. | Terabyte |
| D. | None of these |
| Answer» E. | |
| 161. |
Which of the following does not store data permanently? |
| A. | ROM |
| B. | RAM |
| C. | Floppy Disk |
| D. | Hard Disk |
| Answer» C. Floppy Disk | |
| 162. |
A modem is connected to_____________? |
| A. | a telephone line |
| B. | a keyboard |
| C. | a printer |
| D. | a monitor |
| Answer» B. a keyboard | |
| 163. |
Which of the following contains permanent data and gets updated during the processing of transactions? |
| A. | Operating System File |
| B. | Transaction file |
| C. | Software File |
| D. | Master file |
| Answer» E. | |
| 164. |
Malicious software is known as____________? |
| A. | Badware |
| B. | Malware |
| C. | Maliciousware |
| D. | Illegalware |
| Answer» C. Maliciousware | |
| 165. |
In_______________mode, the communication channel is used in both directions at the same time? |
| A. | Full-duplex |
| B. | Simplex |
| C. | Half-duplex |
| D. | None of the above |
| Answer» B. Simplex | |
| 166. |
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________? |
| A. | Hacker-proof program |
| B. | Firewall |
| C. | Hacker-resistant server |
| D. | Encryption safe wall |
| Answer» C. Hacker-resistant server | |
| 167. |
The common name for the crime of stealing passwords is____________? |
| A. | Jacking |
| B. | Identity theft |
| C. | Spoofing |
| D. | Hacking |
| Answer» D. Hacking | |
| 168. |
Collecting personal information and effectively posing as another individual is known as the crime of_____________? |
| A. | Spooling |
| B. | Identity theft |
| C. | Spoofing |
| D. | Hacking |
| Answer» C. Spoofing | |
| 169. |
____________is the measurement of things such as fingerprints and retinal scans used for security access? |
| A. | Biometrics |
| B. | Bio measurement |
| C. | Computer security |
| D. | Smart weapon machinery |
| Answer» B. Bio measurement | |
| 170. |
To prevent the loss of data during power failures, use a(n)_____________? |
| A. | Encryption program |
| B. | Surge protector |
| C. | Firewall |
| D. | UPS |
| Answer» E. | |
| 171. |
___________refers to electronic trespassing or criminal hacking? |
| A. | Cracking |
| B. | Jacking |
| C. | Spoofing |
| D. | Smarming |
| Answer» B. Jacking | |
| 172. |
_________computer are of large size? |
| A. | Micro |
| B. | Mainframe |
| C. | Super |
| D. | Mini |
| Answer» C. Super | |
| 173. |
The scrambling of code is known as___________? |
| A. | Encryption |
| B. | a firewall |
| C. | Scrambling |
| D. | Password proofing |
| Answer» B. a firewall | |
| 174. |
__________is defined as any crime completed through the use of computer technology? |
| A. | Computer forensics |
| B. | Computer crime |
| C. | Hacking |
| D. | Cracking |
| Answer» C. Hacking | |
| 175. |
The first electronic computer was developed by____________? |
| A. | J.V. Attansoff |
| B. | Bill Gates |
| C. | Simur Cray |
| D. | Winton Serf |
| Answer» B. Bill Gates | |
| 176. |
Note book, laptop,palm,hand-held computers are coming under the category of__________computer? |
| A. | Digital computer |
| B. | Mainframe computer |
| C. | Portable computer |
| D. | Hybrid computer |
| Answer» D. Hybrid computer | |
| 177. |
LAN stands for______________? |
| A. | Limited Area Network |
| B. | Logical Area Network |
| C. | Local Area Network |
| D. | Large Area Network |
| Answer» D. Large Area Network | |
| 178. |
Ctrl + E Shortcut key is used in Ms Word to____________? |
| A. | Exit Application |
| B. | Select All |
| C. | Clear All |
| D. | Align Center |
| Answer» E. | |
| 179. |
Directory in a directory is called__________? |
| A. | Sub directory |
| B. | Mini directory |
| C. | Junior Directory |
| D. | Active directory |
| Answer» B. Mini directory | |
| 180. |
_____________are set of rules and procedures to control the data transmission over the internet? |
| A. | IP address |
| B. | Domains |
| C. | Protocol |
| D. | Gateway |
| Answer» D. Gateway | |
| 181. |
A program that performs a useful task while simultaneously allowing destructive acts is a___________? |
| A. | Worm |
| B. | Trojan horse |
| C. | Virus |
| D. | Macro virus |
| Answer» C. Virus | |
| 182. |
To display the contents of a folder in Windows Explorer you should: |
| A. | click on it |
| B. | collapse it |
| C. | name it |
| D. | give it a password |
| E. | None of these |
| Answer» B. collapse it | |
| 183. |
_______________are system software to facilitate editing of text and data? |
| A. | MS Word |
| B. | Editors |
| C. | PowerPoint |
| D. | MS publisher |
| Answer» C. PowerPoint | |
| 184. |
Serial access memories are useful in applications where: |
| A. | Data consists of numbers |
| B. | Short access time is required |
| C. | Each stored word is processed differently |
| D. | Data naturally needs to flow in and out in serial form |
| Answer» E. | |
| 185. |
Which of the following memories must be refreshed many times per second? |
| A. | Static RAM |
| B. | Dynamic RAM |
| C. | EPROM |
| D. | ROM |
| Answer» C. EPROM | |
| 186. |
Computers, combine both measuring and counting, are called________________? |
| A. | Analog |
| B. | Digital |
| C. | Hybrid |
| D. | All of these |
| Answer» D. All of these | |
| 187. |
In world today, most of the computers are_____________? |
| A. | Digital |
| B. | Hybrid |
| C. | Analog |
| D. | Complex |
| Answer» B. Hybrid | |
| 188. |
The CPU comprises of Control, Memory and_______________units? |
| A. | Microprocessor |
| B. | Arithmetic/Logic |
| C. | Output |
| D. | ROM |
| Answer» C. Output | |
| 189. |
A(n)_______________appearing on a web page opens another document when clicked. |
| A. | anchor |
| B. | URL |
| C. | hyperlink |
| D. | reference |
| Answer» D. reference | |
| 190. |
Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both____________data, including full-motion video, high-speed internet access, and video conferencing. |
| A. | video data and information |
| B. | voice and non-voice |
| C. | music and video |
| D. | video and audio |
| Answer» C. music and video | |
| 191. |
_____________is a windows utility program that locates and eliminates unncessary fragments and rearranges filed and unused disk space to optimize operations? |
| A. | Backup |
| B. | Disk cleanup |
| C. | Disk Defragmenter |
| D. | Restore |
| Answer» D. Restore | |
| 192. |
A set of rules for telling the computer what operations to perform is called a______________? |
| A. | procedural language |
| B. | structures |
| C. | natural language |
| D. | programming language |
| Answer» E. | |
| 193. |
Which of these is a point and draw device? |
| A. | Mouse |
| B. | Scanner |
| C. | Printer |
| D. | CD-ROM |
| Answer» B. Scanner | |
| 194. |
A detailed written description of the programming cycle and the program, along with the test results and a printout of the program is called___________? |
| A. | documentation |
| B. | output |
| C. | reporting |
| D. | spec sheets |
| Answer» B. output | |
| 195. |
Forms that are used to organize business data into rows and coloumns are called_____________? |
| A. | transaction sheets |
| B. | registers |
| C. | business forms |
| D. | spread sheets |
| Answer» E. | |
| 196. |
In power point, the header and footer button can be found on the insert tab in what group? |
| A. | Illustrations group |
| B. | Object group |
| C. | Text group |
| D. | Tables group |
| Answer» D. Tables group | |
| 197. |
When entering text within a document, the Enter key is normally pressed at the end of every____________? |
| A. | Line |
| B. | Sentence |
| C. | Paragraph |
| D. | Word |
| E. | None of these |
| Answer» D. Word | |
| 198. |
What do you call the translator which takes assembly language program as input & produce machine language code as output? |
| A. | Compiler |
| B. | Interpreter |
| C. | Debugger |
| D. | Assembler |
| Answer» E. | |
| 199. |
Which of the following software could assist someone who cannot use their hands for computer input? |
| A. | Video conferencing |
| B. | Speech recognition |
| C. | Audio digitizer |
| D. | Synthesizer |
| Answer» C. Audio digitizer | |
| 200. |
IC are classified on the basis of_____________? |
| A. | Manufacturing company |
| B. | Type of computer |
| C. | Number of transistors |
| D. | None of these |
| Answer» D. None of these | |