MCQOPTIONS
Saved Bookmarks
This section includes 292 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Mcqs knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Which of the following is the largest manufacturer of Hard Disk Drives? |
| A. | IBM |
| B. | Seagate |
| C. | Microsoft |
| D. | 3M |
| Answer» C. Microsoft | |
| 52. |
Which is a valid program to access the Internet? |
| A. | Access |
| B. | Front Page |
| C. | Windows Explorer |
| D. | Netscape |
| Answer» E. | |
| 53. |
Through which device the main components of the computer communicate with each other? |
| A. | Keyboard |
| B. | System Bus |
| C. | Monitor |
| D. | Memory |
| Answer» C. Monitor | |
| 54. |
Which device is used to process data? |
| A. | CPU |
| B. | RAM |
| C. | DCU |
| D. | VDU |
| Answer» B. RAM | |
| 55. |
Which statement is valid? |
| A. | 1 KB = 8 bytes |
| B. | 1 MB = 8 KB |
| C. | 1 KB = 1024 bytes |
| D. | 1 MB = 1024 bytes |
| Answer» D. 1 MB = 1024 bytes | |
| 56. |
Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate |
| A. | CAN |
| B. | LAN |
| C. | DAN |
| D. | WAN |
| Answer» E. | |
| 57. |
A computer cannot 'boot' if it does not have the |
| A. | Compiler |
| B. | Loader |
| C. | Operating System |
| D. | Assembler |
| Answer» D. Assembler | |
| 58. |
Junk e-mail is also called |
| A. | spam |
| B. | spoof |
| C. | sniffer script |
| D. | spool |
| Answer» B. spoof | |
| 59. |
_______________represents raw facts, where-as. is data made meaningful. |
| A. | Information, reporting |
| B. | Data, information |
| C. | Information, bits |
| D. | Records, bytes |
| Answer» C. Information, bits | |
| 60. |
What does DMA stand for? |
| A. | Distinct Memory Access |
| B. | Direct Memory Access |
| C. | Direct Module Access |
| D. | Direct Memory Allocation |
| Answer» C. Direct Module Access | |
| 61. |
LAN stands for.________________ |
| A. | Limited Area Network |
| B. | Logical Area Network |
| C. | Local Area Network |
| D. | Large Area Network |
| Answer» D. Large Area Network | |
| 62. |
Cathode Ray Tube is a form of.____________ |
| A. | Keyboard |
| B. | Mouse |
| C. | Monitor |
| D. | Mother board |
| Answer» D. Mother board | |
| 63. |
Switching device of fifth generation computer is________________ |
| A. | Vacuum tubes |
| B. | Transistors |
| C. | IC |
| D. | VLSI |
| Answer» E. | |
| 64. |
computers operates essentially by counting |
| A. | Portable computer |
| B. | Hybrid computer |
| C. | Analog computer |
| D. | Digital computer |
| Answer» E. | |
| 65. |
computer is small general purpose micro computer, but larger than portable computer |
| A. | Hybrid |
| B. | Digital |
| C. | Desktop |
| D. | Laptop |
| Answer» D. Laptop | |
| 66. |
Trackball is a._______________________ |
| A. | Input device |
| B. | Output device |
| C. | Programming language |
| D. | Software |
| Answer» B. Output device | |
| 67. |
computer is a medium sized computer |
| A. | Micro |
| B. | Mainframec |
| C. | Super |
| D. | Mini |
| Answer» E. | |
| 68. |
Light pen and joystick are____________________ |
| A. | Algorithm |
| B. | Input devices |
| C. | Output devices |
| D. | Portals |
| Answer» C. Output devices | |
| 69. |
is the measurement of things such as fingerprints and retinal scans used for security access. |
| A. | Biometrics |
| B. | Bio measurement |
| C. | Computer security |
| D. | Smart weapon machinery |
| Answer» B. Bio measurement | |
| 70. |
Note book, laptop, palm, hand-held computers are coming under the category of.____________________computer |
| A. | Digital computer |
| B. | Mainframe computer |
| C. | Portable computer |
| D. | Digital computer |
| Answer» D. Digital computer | |
| 71. |
computer are of large size |
| A. | Micro |
| B. | Mainframe |
| C. | Super |
| D. | Mini |
| Answer» C. Super | |
| 72. |
What is the most common tool used to restrict access to a computer system? |
| A. | User logins |
| B. | Passwords |
| C. | Computer keys |
| D. | Access-control software |
| Answer» C. Computer keys | |
| 73. |
The scrambling of code is known as: |
| A. | Encryption |
| B. | a firewall |
| C. | Scrambling |
| D. | Password proofing. |
| Answer» B. a firewall | |
| 74. |
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n): |
| A. | Hacker-proof program |
| B. | Firewall |
| C. | Hacker-resistant server. |
| D. | Encryption safe wall. |
| Answer» C. Hacker-resistant server. | |
| 75. |
What is the name of an application program that gathers user information and sends it to someone through the Internet? |
| A. | A virus |
| B. | Spybot |
| C. | Logic bomb |
| D. | Security patch |
| Answer» C. Logic bomb | |
| 76. |
Which part of the computer is directly involved in executing the instructions of the computer program? |
| A. | The scanner |
| B. | The main storage |
| C. | The secondary storage |
| D. | The processor |
| Answer» E. | |
| 77. |
ASCII is a coding system that provides |
| A. | 256 different characters |
| B. | 512 different characters |
| C. | 1024 different characters |
| D. | 128 different characters |
| Answer» D. 128 different characters | |
| 78. |
To prevent the loss of data during power failures, use a(n): |
| A. | Encryption program. |
| B. | Surge protector |
| C. | Firewall |
| D. | UPS |
| Answer» E. | |
| 79. |
printer is the cheapest in terms of price and operating cost |
| A. | Inkjet |
| B. | Laser |
| C. | Thermal |
| D. | Dot matrix |
| Answer» E. | |
| 80. |
printer is a non-impact printer and is quite in working |
| A. | Inkjet |
| B. | Laser |
| C. | Thermal |
| D. | Dot matrix |
| Answer» B. Laser | |
| 81. |
are high-end printers |
| A. | Inkjet |
| B. | Laser |
| C. | Thermal |
| D. | Dot matrix |
| Answer» C. Thermal | |
| 82. |
The common name for the crime of stealing passwords is; |
| A. | Jacking |
| B. | Identity theft |
| C. | Spoofing |
| D. | Hacking |
| Answer» D. Hacking | |
| 83. |
Collecting personal information and effectively posing as another individual is known as the crime of: |
| A. | Spooling |
| B. | Identity theft. |
| C. | Spoofing |
| D. | Hacking |
| Answer» C. Spoofing | |
| 84. |
Malicious software is known as: |
| A. | Badware |
| B. | Malware |
| C. | Maliciousware |
| D. | Illegalware |
| Answer» C. Maliciousware | |
| 85. |
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a: |
| A. | Trojan horse |
| B. | Virus |
| C. | Time bomb |
| D. | Time-related bomb sequence. |
| Answer» C. Time bomb | |
| 86. |
is the process of dividing the disk into tracks and sectors. |
| A. | Tracking |
| B. | Formatting |
| C. | Crashing |
| D. | Allotting |
| Answer» C. Crashing | |
| 87. |
A program that performs a useful task while simultaneously allowing destructive acts is a: |
| A. | Worm |
| B. | Trojan horse |
| C. | Virus |
| D. | Macro virus. |
| Answer» C. Virus | |
| 88. |
The thing that eventually terminates a worm virus is a lack of: |
| A. | Memory or disk space |
| B. | Time |
| C. | CD drives space |
| D. | CD-RW. |
| Answer» B. Time | |
| 89. |
In 1999, the Melissa virus was a widely publicised: |
| A. | E-mail virus. |
| B. | Macro virus |
| C. | Trojan horse. |
| D. | Time bomb. |
| Answer» B. Macro virus | |
| 90. |
The process of transferring files from a computer on the Internet to your computer is called |
| A. | Downloading |
| B. | uploading |
| C. | FTP |
| D. | JPEG |
| Answer» B. uploading | |
| 91. |
Which of the following does not store data permanently? |
| A. | ROM |
| B. | RAM |
| C. | Floppy Disk |
| D. | Hard Disk |
| Answer» C. Floppy Disk | |
| 92. |
Help Menu is available at which button? |
| A. | End |
| B. | Start |
| C. | Turnoff |
| D. | Restart |
| Answer» C. Turnoff | |
| 93. |
The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as |
| A. | CISC |
| B. | RISC |
| C. | CD-ROM |
| D. | Wi-Fi |
| Answer» C. CD-ROM | |
| 94. |
Which is not a basic function of a computer? |
| A. | Store data |
| B. | Accept input |
| C. | Process data |
| D. | Copy text |
| Answer» E. | |
| 95. |
are used to identify a user who returns to a website. |
| A. | Cookies |
| B. | Plug-ins |
| C. | Scripts |
| D. | ASPs |
| Answer» B. Plug-ins | |
| 96. |
is the science that attempts to produce machines that display the same type of intelligence that humans do |
| A. | Nanoscience |
| B. | Nanotechnology |
| C. | Simulation |
| D. | Artificial intelligence (Al) |
| Answer» E. | |
| 97. |
The ________________data mining technique derives rules from real-world case examples. |
| A. | Rule discover |
| B. | Signal processing |
| C. | Neural nets |
| D. | Case- based reasoning |
| Answer» D. Case- based reasoning | |
| 98. |
The CPU and memory are located on the : |
| A. | expansion board |
| B. | motherboard |
| C. | storage device |
| D. | output device |
| Answer» C. storage device | |
| 99. |
When creating a computer program, the designs the structure of the program |
| A. | End user |
| B. | System Analyst |
| C. | Programmer |
| D. | All of the above |
| Answer» C. Programmer | |
| 100. |
Codes consisting of lines of varying widths or lengths that are computer-readable are known as- |
| A. | an ASCII code |
| B. | a magnetic tape |
| C. | an OCR scanner |
| D. | a bar code |
| Answer» E. | |