MCQOPTIONS
Saved Bookmarks
This section includes 292 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Mcqs knowledge and support exam preparation. Choose a topic below to get started.
| 201. |
MSI stands for |
| A. | Medium Scale Integrated Circuits |
| B. | Medium System Integrated Circuits |
| C. | Medium Scale Intelligent Circuit |
| D. | Medium System Intelligent Circuit |
| Answer» B. Medium System Integrated Circuits | |
| 202. |
VGA is |
| A. | Video Graphics Array |
| B. | Visual Graphics Array |
| C. | Volatile Graphics Array |
| D. | Video Graphics Adapter |
| Answer» B. Visual Graphics Array | |
| 203. |
Which of the following is a part of the Central Processing Unit? |
| A. | Printer |
| B. | Key board |
| C. | Mouse |
| D. | Arithmetic & Logic unit |
| Answer» E. | |
| 204. |
CAD stands for |
| A. | Computer aided design |
| B. | Computer algorithm for design |
| C. | Computer application in design |
| D. | Computer analogue design |
| Answer» B. Computer algorithm for design | |
| 205. |
When did John Napier develop logarithm? |
| A. | 1416 |
| B. | 1614 |
| C. | 1641 |
| D. | 1804 |
| Answer» C. 1641 | |
| 206. |
When a file is saved for the first time |
| A. | a copy is automatically printed |
| B. | it must be given a name to identify it |
| C. | it does not need a name |
| D. | it only needs a name if it is not going to be printed |
| Answer» C. it does not need a name | |
| 207. |
Hackers |
| A. | all have the same motive |
| B. | break into other people's computers |
| C. | may legally break into computers as long as they do not do any damage |
| D. | are people who are allergic to computers |
| Answer» C. may legally break into computers as long as they do not do any damage | |
| 208. |
What characteristic of read-only memory (ROM) makes it useful? |
| A. | ROM information can be easily updated |
| B. | Data in ROM is non-volatile, that is, it remains there even without electrical power. |
| C. | ROM provides very large amounts of inexpensive data storage. |
| D. | ROM chips are easily swapped between different brands of computers. |
| Answer» C. ROM provides very large amounts of inexpensive data storage. | |
| 209. |
Where are data and programme stored when the processor uses them? |
| A. | Main memory |
| B. | Secondary memory |
| C. | Disk memory |
| D. | Programme memory |
| Answer» B. Secondary memory | |
| 210. |
The primary function of the ________________is to set up the hardware and load and start an operating system |
| A. | System Programs |
| B. | BIOS |
| C. | CP |
| D. | Memory |
| Answer» C. CP | |
| 211. |
MIS is designed to provide information needed for effective decision making by? |
| A. | Consumers |
| B. | Workers |
| C. | Foremen |
| D. | Managers |
| Answer» E. | |
| 212. |
A normal CD- ROM usually can store up to _______data? |
| A. | 680 KB |
| B. | 680 Bytes |
| C. | 680 MB |
| D. | 680 GB |
| Answer» D. 680 GB | |
| 213. |
The computer size was very large in |
| A. | First Generation |
| B. | Second Generation |
| C. | Third Generation |
| D. | Fourth Generation |
| Answer» B. Second Generation | |
| 214. |
What is a light pen? |
| A. | Mechanical Input device |
| B. | Optical input device |
| C. | Electronic input device |
| D. | Optical output device |
| Answer» C. Electronic input device | |
| 215. |
EEPROM stands for |
| A. | Electrically Erasable Programmable Read Only Memory |
| B. | Easily Erasable Programmable Read Only Memory |
| C. | Electronic Erasable Programmable Read Only Memory |
| D. | None of these |
| Answer» D. None of these | |
| 216. |
Second Generation computers were developed during |
| A. | 1949 to 1955 |
| B. | 1956 to 1965 |
| C. | 1965 to 1970 |
| D. | 1970 to 1990 |
| Answer» C. 1965 to 1970 | |
| 217. |
Which of the following is a storage device? |
| A. | Tape |
| B. | Hard Disk |
| C. | Floppy Disk |
| D. | All of the above |
| Answer» E. | |
| 218. |
FORTRAN is |
| A. | File Translation |
| B. | Format Translation |
| C. | Formula Translation |
| D. | Floppy Translation |
| Answer» D. Floppy Translation | |
| 219. |
Which of the following devices can be sued to directly image printed text? |
| A. | OCR |
| B. | OMR |
| C. | MICR |
| D. | All of above |
| Answer» B. OMR | |
| 220. |
A computer program that translates one program instructions at a time into machine language is called a/an |
| A. | Interpreter |
| B. | CPU |
| C. | Compiler |
| D. | Simulator |
| Answer» B. CPU | |
| 221. |
When did arch rivals IBM and Apple Computers Inc. decide to join hands? |
| A. | 1978 |
| B. | 1984 |
| C. | 1990 |
| D. | 1991 |
| Answer» E. | |
| 222. |
Microprocessors as switching devices are for which generation computers |
| A. | First Generation |
| B. | Second Generation |
| C. | Third Generation |
| D. | Fourth Generation |
| Answer» E. | |
| 223. |
Personnel who design, program, operate and maintain computer equipment refers to |
| A. | Console-operator |
| B. | Programmer |
| C. | Peopleware |
| D. | System Analyst |
| Answer» D. System Analyst | |
| 224. |
Human beings are referred to as Homosapinens, which device is called Sillico Sapiens? |
| A. | Monitor |
| B. | Hardware |
| C. | Robot |
| D. | Computer |
| Answer» E. | |
| 225. |
An error in software or hardware is called a bug. What is the alternative computer jargon for it? |
| A. | Leech |
| B. | Squid |
| C. | Slug |
| D. | Glitch |
| Answer» E. | |
| 226. |
Modern Computer are very reliable but they are not |
| A. | Fast |
| B. | Powerful |
| C. | Infallible |
| D. | Cheap |
| Answer» D. Cheap | |
| 227. |
A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is |
| A. | Bug |
| B. | Vice |
| C. | Lice |
| D. | Worm |
| Answer» E. | |
| 228. |
SMPS stands for |
| A. | Switched mode Power Supply |
| B. | Start mode power supply |
| C. | Store mode power supply |
| D. | Single mode power supply |
| Answer» B. Start mode power supply | |
| 229. |
is an OOP principle |
| A. | Structured programming |
| B. | Procedural programming |
| C. | Inheritance |
| D. | Linking |
| Answer» D. Linking | |
| 230. |
A computer program that converts an entire program into machine language is called a/an |
| A. | Interpreter |
| B. | Simulator |
| C. | Compiler |
| D. | Commander |
| Answer» D. Commander | |
| 231. |
is the key to close a selected drop -down list; cancel a command and close a dialog box. |
| A. | TAB |
| B. | SHIFT |
| C. | ESC |
| D. | F10 |
| Answer» D. F10 | |
| 232. |
A fault in a computer program which prevents it from working correctly is known as |
| A. | Boot |
| B. | Bug |
| C. | Biff |
| D. | Strap |
| Answer» C. Biff | |
| 233. |
A small or intelligent device is so called because it contains within it a |
| A. | Computer |
| B. | Microcomputer |
| C. | Programmable |
| D. | Sensor |
| Answer» E. | |
| 234. |
IBM stands for |
| A. | Internal Business Management |
| B. | International Business Management |
| C. | International Business Machines |
| D. | Internal Business Machines |
| Answer» D. Internal Business Machines | |
| 235. |
The device used to carry digital data on analogue lines is called as |
| A. | Modem |
| B. | Multiplexer |
| C. | Modulator |
| D. | Demodulator |
| Answer» B. Multiplexer | |
| 236. |
To move a copy of file from one computer to another over a communication channel is called? |
| A. | File transfer |
| B. | File encryption |
| C. | File modification |
| D. | File copying |
| Answer» B. File encryption | |
| 237. |
The instructions that tell a computer how to carry out the processing tasks are referred to as computer.______________ |
| A. | programs |
| B. | processors |
| C. | input devices |
| D. | memory modules |
| Answer» B. processors | |
| 238. |
Father of “C‘ programming language |
| A. | Dennis Ritchie |
| B. | Prof John Keenly |
| C. | Thomas Kurtz |
| D. | Bill Gates |
| Answer» B. Prof John Keenly | |
| 239. |
BIOS stands for |
| A. | Basic Input Output system |
| B. | Binary Input output system |
| C. | Basic Input Off system |
| D. | all the above |
| Answer» B. Binary Input output system | |
| 240. |
The task of performing operations like arithmetic and logical operations is called.________________ |
| A. | Processing |
| B. | Storing |
| C. | Editing |
| D. | Sorting |
| Answer» B. Storing | |
| 241. |
Reusable optical storage will typically have the acronym- |
| A. | CD |
| B. | DVD |
| C. | ROM |
| D. | RW |
| Answer» E. | |
| 242. |
COBOL is an acronym for__________________ |
| A. | Common Business Oriented Language |
| B. | Computer Business Oriented Language |
| C. | Common Business Operated Language |
| D. | Common Business Organized Language |
| Answer» B. Computer Business Oriented Language | |
| 243. |
An area of a computer that temporarily holds data waiting to be processed is_____________ |
| A. | CPU |
| B. | Memory |
| C. | Storage |
| D. | File |
| Answer» C. Storage | |
| 244. |
You use a(n) ______________such as a keyboard or mouse, to input information |
| A. | output device |
| B. | input device |
| C. | storage device |
| D. | processing device |
| Answer» C. storage device | |
| 245. |
is the ability of a device to "jump" directly to the requested data |
| A. | Sequential access |
| B. | Random access |
| C. | Quick access |
| D. | All of the above |
| Answer» C. Quick access | |
| 246. |
provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously |
| A. | Multitasking |
| B. | Multithreading |
| C. | Multiprocessing |
| D. | Multicomputing |
| Answer» B. Multithreading | |
| 247. |
ALU and Control Unit jointly known as |
| A. | RAM |
| B. | ROM |
| C. | CPU |
| D. | PC |
| Answer» D. PC | |
| 248. |
All of the following are examples of real security and privacy risks EXCEPT |
| A. | hackers |
| B. | Spam |
| C. | Viruses |
| D. | identity theft |
| Answer» C. Viruses | |
| 249. |
A_________________is an additional set of commands that the computer displays after you make a selection from the main menu |
| A. | dialog box |
| B. | submenu |
| C. | menu selection |
| D. | All of the above |
| Answer» B. submenu | |
| 250. |
The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called: |
| A. | robotics |
| B. | simulation |
| C. | computer forensic |
| D. | animation |
| Answer» D. animation | |