Explore topic-wise MCQs in Computer Science Mcqs.

This section includes 292 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Mcqs knowledge and support exam preparation. Choose a topic below to get started.

51.

Which of the following is the largest manufacturer of Hard Disk Drives?

A. IBM
B. Seagate
C. Microsoft
D. 3M
Answer» C. Microsoft
52.

Which is a valid program to access the Internet?

A. Access
B. Front Page
C. Windows Explorer
D. Netscape
Answer» E.
53.

Through which device the main components of the computer communicate with each other?

A. Keyboard
B. System Bus
C. Monitor
D. Memory
Answer» C. Monitor
54.

Which device is used to process data?

A. CPU
B. RAM
C. DCU
D. VDU
Answer» B. RAM
55.

Which statement is valid?

A. 1 KB = 8 bytes
B. 1 MB = 8 KB
C. 1 KB = 1024 bytes
D. 1 MB = 1024 bytes
Answer» D. 1 MB = 1024 bytes
56.

Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate

A. CAN
B. LAN
C. DAN
D. WAN
Answer» E.
57.

A computer cannot 'boot' if it does not have the

A. Compiler
B. Loader
C. Operating System
D. Assembler
Answer» D. Assembler
58.

Junk e-mail is also called

A. spam
B. spoof
C. sniffer script
D. spool
Answer» B. spoof
59.

_______________represents raw facts, where-as. is data made meaningful.

A. Information, reporting
B. Data, information
C. Information, bits
D. Records, bytes
Answer» C. Information, bits
60.

What does DMA stand for?

A. Distinct Memory Access
B. Direct Memory Access
C. Direct Module Access
D. Direct Memory Allocation
Answer» C. Direct Module Access
61.

LAN stands for.________________

A. Limited Area Network
B. Logical Area Network
C. Local Area Network
D. Large Area Network
Answer» D. Large Area Network
62.

Cathode Ray Tube is a form of.____________

A. Keyboard
B. Mouse
C. Monitor
D. Mother board
Answer» D. Mother board
63.

Switching device of fifth generation computer is________________

A. Vacuum tubes
B. Transistors
C. IC
D. VLSI
Answer» E.
64.

computers operates essentially by counting

A. Portable computer
B. Hybrid computer
C. Analog computer
D. Digital computer
Answer» E.
65.

computer is small general purpose micro computer, but larger than portable computer

A. Hybrid
B. Digital
C. Desktop
D. Laptop
Answer» D. Laptop
66.

Trackball is a._______________________

A. Input device
B. Output device
C. Programming language
D. Software
Answer» B. Output device
67.

computer is a medium sized computer

A. Micro
B. Mainframec
C. Super
D. Mini
Answer» E.
68.

Light pen and joystick are____________________

A. Algorithm
B. Input devices
C. Output devices
D. Portals
Answer» C. Output devices
69.

is the measurement of things such as fingerprints and retinal scans used for security access.

A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery
Answer» B. Bio measurement
70.

Note book, laptop, palm, hand-held computers are coming under the category of.____________________computer

A. Digital computer
B. Mainframe computer
C. Portable computer
D. Digital computer
Answer» D. Digital computer
71.

computer are of large size

A. Micro
B. Mainframe
C. Super
D. Mini
Answer» C. Super
72.

What is the most common tool used to restrict access to a computer system?

A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer» C. Computer keys
73.

The scrambling of code is known as:

A. Encryption
B. a firewall
C. Scrambling
D. Password proofing.
Answer» B. a firewall
74.

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

A. Hacker-proof program
B. Firewall
C. Hacker-resistant server.
D. Encryption safe wall.
Answer» C. Hacker-resistant server.
75.

What is the name of an application program that gathers user information and sends it to someone through the Internet?

A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer» C. Logic bomb
76.

Which part of the computer is directly involved in executing the instructions of the computer program?

A. The scanner
B. The main storage
C. The secondary storage
D. The processor
Answer» E.
77.

ASCII is a coding system that provides

A. 256 different characters
B. 512 different characters
C. 1024 different characters
D. 128 different characters
Answer» D. 128 different characters
78.

To prevent the loss of data during power failures, use a(n):

A. Encryption program.
B. Surge protector
C. Firewall
D. UPS
Answer» E.
79.

printer is the cheapest in terms of price and operating cost

A. Inkjet
B. Laser
C. Thermal
D. Dot matrix
Answer» E.
80.

printer is a non-impact printer and is quite in working

A. Inkjet
B. Laser
C. Thermal
D. Dot matrix
Answer» B. Laser
81.

are high-end printers

A. Inkjet
B. Laser
C. Thermal
D. Dot matrix
Answer» C. Thermal
82.

The common name for the crime of stealing passwords is;

A. Jacking
B. Identity theft
C. Spoofing
D. Hacking
Answer» D. Hacking
83.

Collecting personal information and effectively posing as another individual is known as the crime of:

A. Spooling
B. Identity theft.
C. Spoofing
D. Hacking
Answer» C. Spoofing
84.

Malicious software is known as:

A. Badware
B. Malware
C. Maliciousware
D. Illegalware
Answer» C. Maliciousware
85.

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

A. Trojan horse
B. Virus
C. Time bomb
D. Time-related bomb sequence.
Answer» C. Time bomb
86.

is the process of dividing the disk into tracks and sectors.

A. Tracking
B. Formatting
C. Crashing
D. Allotting
Answer» C. Crashing
87.

A program that performs a useful task while simultaneously allowing destructive acts is a:

A. Worm
B. Trojan horse
C. Virus
D. Macro virus.
Answer» C. Virus
88.

The thing that eventually terminates a worm virus is a lack of:

A. Memory or disk space
B. Time
C. CD drives space
D. CD-RW.
Answer» B. Time
89.

In 1999, the Melissa virus was a widely publicised:

A. E-mail virus.
B. Macro virus
C. Trojan horse.
D. Time bomb.
Answer» B. Macro virus
90.

The process of transferring files from a computer on the Internet to your computer is called

A. Downloading
B. uploading
C. FTP
D. JPEG
Answer» B. uploading
91.

Which of the following does not store data permanently?

A. ROM
B. RAM
C. Floppy Disk
D. Hard Disk
Answer» C. Floppy Disk
92.

Help Menu is available at which button?

A. End
B. Start
C. Turnoff
D. Restart
Answer» C. Turnoff
93.

The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as

A. CISC
B. RISC
C. CD-ROM
D. Wi-Fi
Answer» C. CD-ROM
94.

Which is not a basic function of a computer?

A. Store data
B. Accept input
C. Process data
D. Copy text
Answer» E.
95.

are used to identify a user who returns to a website.

A. Cookies
B. Plug-ins
C. Scripts
D. ASPs
Answer» B. Plug-ins
96.

is the science that attempts to produce machines that display the same type of intelligence that humans do

A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (Al)
Answer» E.
97.

The ________________data mining technique derives rules from real-world case examples.

A. Rule discover
B. Signal processing
C. Neural nets
D. Case- based reasoning
Answer» D. Case- based reasoning
98.

The CPU and memory are located on the :

A. expansion board
B. motherboard
C. storage device
D. output device
Answer» C. storage device
99.

When creating a computer program, the designs the structure of the program

A. End user
B. System Analyst
C. Programmer
D. All of the above
Answer» C. Programmer
100.

Codes consisting of lines of varying widths or lengths that are computer-readable are known as-

A. an ASCII code
B. a magnetic tape
C. an OCR scanner
D. a bar code
Answer» E.