MCQOPTIONS
Saved Bookmarks
This section includes 292 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Mcqs knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
Where does most data go first with in a computer memory hierarchy ? |
| A. | RAM |
| B. | ROM |
| C. | BIOS |
| D. | CACHE |
| Answer» B. ROM | |
| 252. |
Which of the following is NOT one of the four major data processing functions of a computer? |
| A. | gathering data |
| B. | processing data into information |
| C. | analyzing the data or information |
| D. | storing the data or information |
| Answer» D. storing the data or information | |
| 253. |
All of the following are examples of storage devices EXCEPT : |
| A. | hard disk drives |
| B. | printers |
| C. | floppy disk drives |
| D. | CD drives |
| Answer» C. floppy disk drives | |
| 254. |
Computers process data into information by working exclusively with : |
| A. | multimedia |
| B. | word |
| C. | numbers |
| D. | characters |
| Answer» D. characters | |
| 255. |
The difference between people with access to computers and the Internet and those without this access is known as the : |
| A. | digital divide |
| B. | Internet divide |
| C. | Web divide |
| D. | E-illiteracy |
| Answer» B. Internet divide | |
| 256. |
Computers manipulate data in many ways, and this manipulation is called.____________________ |
| A. | upgrading |
| B. | processing |
| C. | batching |
| D. | utilizing |
| Answer» C. batching | |
| 257. |
A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a- |
| A. | Hacker |
| B. | spammer |
| C. | instant messenger |
| D. | programmer |
| Answer» B. spammer | |
| 258. |
Which of the following helps to protect floppy disks from data getting accidentally erased? |
| A. | Access notch |
| B. | Write-protect notch |
| C. | Entry notch |
| D. | Input notch |
| Answer» C. Entry notch | |
| 259. |
When a computer is switched on, the booting process performs |
| A. | Integrity Test |
| B. | Power-On Self-Test |
| C. | Correct Functioning Test |
| D. | Reliability Test |
| Answer» C. Correct Functioning Test | |
| 260. |
Large transaction processing systems in automated organisations use |
| A. | Online processing |
| B. | Batch processing |
| C. | Once a day processing |
| D. | End of day processing |
| Answer» C. Once a day processing | |
| 261. |
A modem is connected to |
| A. | telephone line |
| B. | a keyboard |
| C. | a printer |
| D. | a monitor |
| Answer» B. a keyboard | |
| 262. |
Which of the following contains permanent data and gets updated during the processing of transactions? |
| A. | Operating System File |
| B. | Transaction file |
| C. | Software File |
| D. | Master file |
| Answer» E. | |
| 263. |
Which of the following is the smallest storage? |
| A. | Megabyte |
| B. | Gigabyte |
| C. | Terabyte |
| D. | None of these |
| Answer» E. | |
| 264. |
The typical computer criminal is a |
| A. | a Young hacker |
| B. | Trusted employee with no criminal record |
| C. | Trusted employee with a long, but unknown criminal record. |
| D. | Overseas young cracker. |
| Answer» C. Trusted employee with a long, but unknown criminal record. | |
| 265. |
A computer system that is old and perhaps not satisfactory is referred to as a(n) |
| A. | Ancient system |
| B. | Historical system |
| C. | Age old system |
| D. | Legacy system |
| Answer» E. | |
| 266. |
In a computer most processing takes place in |
| A. | Memory |
| B. | RAM |
| C. | Motherboard |
| D. | CPU |
| Answer» E. | |
| 267. |
The computer abbreviation KB usually means |
| A. | Key Block |
| B. | Kernel Boot |
| C. | Kilo Byte |
| D. | Kit bit |
| Answer» D. Kit bit | |
| 268. |
Which of the following is/are operating systems |
| A. | Windows |
| B. | Unix |
| C. | OS/2 |
| D. | All of these |
| Answer» E. | |
| 269. |
When a logic bomb is activated by a time-related event, it is known as a: |
| A. | Time-related bomb sequence |
| B. | Virus |
| C. | Time bomb |
| D. | Trojan horse. |
| Answer» D. Trojan horse. | |
| 270. |
Which of the following is not a storage medium? |
| A. | Hard disk |
| B. | Flash Drive |
| C. | DVD |
| D. | Scanner |
| Answer» E. | |
| 271. |
Touch Screen is______________________ |
| A. | Input device |
| B. | Output device |
| C. | Both a & b above |
| D. | None of these |
| Answer» D. None of these | |
| 272. |
The first electronic computer was developed by |
| A. | J.V. Attansoff |
| B. | Bill Gates |
| C. | Simur Cray |
| D. | Winton Serf |
| Answer» B. Bill Gates | |
| 273. |
A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a: |
| A. | Time-related bomb sequence |
| B. | Virus |
| C. | Time bomb. |
| D. | Trojan horse. |
| Answer» D. Trojan horse. | |
| 274. |
Daisy wheel, Drum, chain etc are the________________ |
| A. | Flow chart |
| B. | Mouse |
| C. | Key board |
| D. | Printers |
| Answer» E. | |
| 275. |
Joshy, Perfumes are examples of |
| A. | Operating system |
| B. | Computer languages |
| C. | Computer viruses |
| D. | Web portals |
| Answer» D. Web portals | |
| 276. |
Is defined as any crime completed through the use of computer technology. |
| A. | Computer forensics |
| B. | Computer crime |
| C. | Hacking |
| D. | Cracking |
| Answer» C. Hacking | |
| 277. |
are specific to users’ needs |
| A. | System software |
| B. | Application software |
| C. | Assemblers |
| D. | Compilers |
| Answer» C. Assemblers | |
| 278. |
are used for plotting graphs and design on papers |
| A. | Trackball |
| B. | Joystick |
| C. | Light pen |
| D. | Plotters |
| Answer» E. | |
| 279. |
Which of the following is a network topoloty |
| A. | LAN |
| B. | WAN |
| C. | MAN |
| D. | BUS |
| Answer» E. | |
| 280. |
MAN stand for |
| A. | Maximum Area Network |
| B. | Minimum Area network |
| C. | Main Area Network |
| D. | Metropolitan Area Network |
| Answer» E. | |
| 281. |
refers to electronic trespassing or criminal hacking. |
| A. | Cracking |
| B. | Jacking |
| C. | Spoofing |
| D. | Smarming |
| Answer» B. Jacking | |
| 282. |
Snowbol is an/a--------- |
| A. | Operating system |
| B. | HLL |
| C. | Software |
| D. | Search engine |
| Answer» C. Software | |
| 283. |
The first web browser is |
| A. | Mosaic |
| B. | Netscape |
| C. | Internet explorer |
| D. | Collabra |
| Answer» B. Netscape | |
| 284. |
Which of the following is a type of network |
| A. | Ring |
| B. | Bus |
| C. | Star |
| D. | PAN |
| Answer» E. | |
| 285. |
NOS stands for |
| A. | Node operating system |
| B. | Non-open software |
| C. | Network Operating system |
| D. | Non-operating software |
| Answer» D. Non-operating software | |
| 286. |
are system software to facilitate editing of text and data |
| A. | MS Word |
| B. | Editors |
| C. | PowerPoint |
| D. | MS publisher |
| Answer» C. PowerPoint | |
| 287. |
VOIP stands for__________________ |
| A. | Voice over IP |
| B. | Video over IP |
| C. | Viruses over IP |
| D. | Virtual over IP |
| Answer» B. Video over IP | |
| 288. |
PARAM is an example of: |
| A. | Super computer |
| B. | PC |
| C. | Laptop |
| D. | PDA |
| Answer» B. PC | |
| 289. |
Which of the following is available in the form of a PC now? |
| A. | Mainframe |
| B. | Microcomputer |
| C. | Minicomputer |
| D. | Both (B) & (C) |
| Answer» C. Minicomputer | |
| 290. |
Computers, combine both measuring and counting, are called : |
| A. | Analog |
| B. | Digital |
| C. | Hybrid |
| D. | All of these |
| Answer» D. All of these | |
| 291. |
In world today, most of the computers are : |
| A. | Digital |
| B. | Hybrid |
| C. | Analog |
| D. | Complex |
| Answer» B. Hybrid | |
| 292. |
Physical structure of computer is called : |
| A. | Software |
| B. | Hardware |
| C. | Human ware |
| D. | All of these |
| Answer» C. Human ware | |