MCQOPTIONS
Saved Bookmarks
This section includes 426 Mcqs, each offering curated multiple-choice questions to sharpen your 7th Class knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
What is the full form of ISP in Computers Science? |
| A. | Internet Service Provider |
| B. | Information Service Provider |
| C. | Internet Service Program |
| D. | Information Service Program |
| Answer» B. Information Service Provider | |
| 252. |
Which one of these is an e-mail service provider? |
| A. | www.yahoo.com |
| B. | www.naukri.com |
| C. | www.irctc.com |
| D. | www.aponline.com |
| Answer» B. www.naukri.com | |
| 253. |
In exam @ unifiedcouncil.com, what does '@' symbol stand for? |
| A. | Rounded 'a' |
| B. | At the rate of |
| C. | Hash |
| D. | Ampersand |
| Answer» C. Hash | |
| 254. |
While sending e-mails, what does BCC stand for? |
| A. | Blank Correct Copy |
| B. | Best Combined Copy |
| C. | Blank Copy to Copy |
| D. | Blind Carbon Copy |
| Answer» E. | |
| 255. |
What is the full form of CC In E-mail in Computers Science? |
| A. | Correct Copy |
| B. | Carbon Copy |
| C. | Copy to Copy |
| D. | Combined Copy |
| Answer» C. Copy to Copy | |
| 256. |
When you chat with people or send an e-mail, why should you remember not to type a message in ALL CAPITAL LETTERS? |
| A. | It means that we are shouting or being rude. |
| B. | It will be uneasy for us to type. |
| C. | It will not get displayed in the computer of the recipient. |
| D. | It is impossible to type in capital letters. |
| Answer» B. It will be uneasy for us to type. | |
| 257. |
In the URL http://www.unifiedcouncil.com, which part is the protocol name? |
| A. | .corn |
| B. | www |
| C. | http |
| D. | unified |
| Answer» D. unified | |
| 258. |
Which two characters does an email address contain? |
| A. | @ and Underscore |
| B. | @ and Dot |
| C. | @ and Dash |
| D. | @ and Plus |
| Answer» C. @ and Dash | |
| 259. |
Which of the following is/are the advantage(s) of E-mail? |
| A. | E-mail is quicker than ordinary postage. |
| B. | The message may consist of only few lines of text or several lines. |
| C. | We can receive the message at any time. |
| D. | All of these |
| Answer» E. | |
| 260. |
Which of the following domain names is used for nonprofit institution websites? |
| A. | .gov |
| B. | .org |
| C. | .com |
| D. | .net |
| Answer» C. .com | |
| 261. |
Every page on the internet has a unique address. What is the address called? |
| A. | Website |
| B. | Webpage |
| C. | HTTP:// |
| D. | URL |
| Answer» E. | |
| 262. |
What range of numbers does an IP address contain? |
| A. | 1 to 100 |
| B. | 1 to 1000 |
| C. | 0 to 255 |
| D. | 1 to 500 |
| Answer» D. 1 to 500 | |
| 263. |
What is the address of a website on the internet called? |
| A. | Www. |
| B. | HTTP |
| C. | URL |
| D. | FTP |
| Answer» D. FTP | |
| 264. |
What is the process of sending message from one person to another person via computer called? |
| A. | |
| B. | SMS |
| C. | Advertising |
| D. | Marketing |
| Answer» B. SMS | |
| 265. |
__________ is a public location, that offers Wi-Fi access to the public using a laptop, wireless phone or other suitable portable devices, to access the Internet. |
| A. | Virtual venue |
| B. | Wi-Fi venue |
| C. | Hotspots |
| D. | Wireless spots |
| Answer» D. Wireless spots | |
| 266. |
Broadband connection is provided over _____________. |
| A. | Twisted pair cables |
| B. | Fiber optics cable |
| C. | Coaxial cables |
| D. | All of these |
| Answer» E. | |
| 267. |
Identify the following: - It is one of the services offered by the Internet. - A search query submitted by user is passed to multiple search engines and then their response is merged into a result list. |
| A. | Negative search |
| B. | Root search |
| C. | Metasearch |
| D. | Megasearch |
| Answer» D. Megasearch | |
| 268. |
Match the following.Column-IColumn-II(a) E - Commerce(i) Founder of the World Wide Web(b) FTP(ii) Company that offers Internet services(c) Tim Berners-Lee(iii) Host computer connected to the web that contains data in the form of web pages(d) ISP(iv) Online Trading(e) Web server(v) A protocol used for exchanging files |
| A. | (a) - (iv), (b) - (v), (c) - (i), (d) - (iii), (e) - (ii) |
| B. | (a) - (v), (b) - (iv), (c) - (i), (d) - (iii), (e) - (ii) |
| C. | (a) - (iv), (b) - (v), (c) - (i), (d) - (ii), (e) - (iii) |
| D. | (a) - (v), (b) - (iv), (c) - (i), (d) - (ii), (e) - (iii) |
| Answer» D. (a) - (v), (b) - (iv), (c) - (i), (d) - (ii), (e) - (iii) | |
| 269. |
Identify the following:- It is software program.- It monitors a user's computing habits.- It records user's personal information.- It sends the recorded information to third parties without the user's knowledge. |
| A. | Spyware |
| B. | Keybloggers |
| C. | Archiver |
| D. | None of these |
| Answer» B. Keybloggers | |
| 270. |
Consider the peer-to-peer network architecture shown here and select the statement(s) which is/are true about it. (i) Each workstation has equivalent capabilities and responsibilities. (ii) There is no server. (iii) Files can be shared between workstations. (iv) A printer connected to one workstation can be accessed by it only, not by the other workstations. |
| A. | (i) and (ii) only |
| B. | (ii) and (iii) only |
| C. | (i), (ii) and (iii) |
| D. | (ii), (iii) and (iv) |
| Answer» D. (ii), (iii) and (iv) | |
| 271. |
Two transmission channels are shown here. Select the statement which is CORRECT about them. |
| A. | Cable-1 uses the concept of light for data transmission.Cable-2 uses the concept of radio waves for data transmission. |
| B. | Cable-1 is suitable for transmitting signal of low power over a small distance.Cable-2 is used by older telephone networks. |
| C. | Cable-1 uses electromagnetic radiation.Cable-2 is basically used for short distance communication such as television and remote control. |
| D. | Cable-1 allows for high speed data transmission over a long distance.Cable-2 is made up of optical fibres. |
| Answer» C. Cable-1 uses electromagnetic radiation.Cable-2 is basically used for short distance communication such as television and remote control. | |
| 272. |
Which of the following statements hold(s) true about client-server architecture? Statement 1: In this architecture, the server has more powerful central processor, memory and larger disk drives than clients. Statement 2: A client/server network is utilised by desktop computers only. |
| A. | Only Statement 1 |
| B. | Only Statement 2 |
| C. | Both Statement 1 and Statement 2 |
| D. | Neither Statement 1 nor Statement 2 |
| Answer» B. Only Statement 2 | |
| 273. |
Which of the following is a protocol used on the Internet? |
| A. | IEEE |
| B. | TCP |
| C. | ITU |
| D. | VCP |
| Answer» C. ITU | |
| 274. |
To prevent virus from infecting your computer, you should ______________. |
| A. | Equip your PC with a licensed antivirus program |
| B. | Scan flash drives and optical discs before copying data from them |
| C. | Not install pirated software from unknown sources on your computer |
| D. | All of these |
| Answer» E. | |
| 275. |
Which of the following statements is true for a Boot Sector Virus? |
| A. | It infects boot/master boot records on a hard disk. |
| B. | It is most active while a computer system is booting. |
| C. | Disk Killer is a well-known boot virus. |
| D. | All of these |
| Answer» E. | |
| 276. |
Computer programs that can replicate themselves without any human action and cause harm to the computer by consuming memory or network bandwidth are called _______________. |
| A. | Web Spider |
| B. | Worms |
| C. | Meta search |
| D. | None of these |
| Answer» C. Meta search | |
| 277. |
_______ is a method to acquire sensitive information like usernames, passwords and banking details - like credit card PIN, etc. |
| A. | Phishing |
| B. | Encrypting |
| C. | Infecting |
| D. | Sprucing |
| Answer» B. Encrypting | |
| 278. |
What is Reverse blog? |
| A. | A blog in which older posts appears first. |
| B. | A blog which is composed by a single user. |
| C. | A blog that creates reverse proxy. |
| D. | A blog which is composed by its users rather than a single blogger. |
| Answer» E. | |
| 279. |
Identify the following: - It is used for location information on the Internet. - It matches search terms with indexed pages. |
| A. | Database |
| B. | Deep Web |
| C. | URL |
| D. | Search Engine |
| Answer» E. | |
| 280. |
What is the primary function of a web server? |
| A. | To store, process and deliver web pages |
| B. | To allocate IP address over Internet |
| C. | To provide maintenance services |
| D. | To set default port for emailing |
| Answer» B. To allocate IP address over Internet | |
| 281. |
Which of the following statements hold(s) true about machine language?Statement 1: It comprises of only zeros and ones.Statement 2: It is directly understood by a computer. |
| A. | Only Statement 1 |
| B. | Only Statement 2 |
| C. | Both Statement 1 and Statement 2 |
| D. | Neither Statement 1 nor Statement 2 |
| Answer» D. Neither Statement 1 nor Statement 2 | |
| 282. |
It is a type of printers, in which ink is heated up to a boiling point and then bubbles are formed at nozzle end. The bubble then burst and ink is transferred to the paper as and when required. Identify it. |
| A. | Laser Printer |
| B. | Drum Printer |
| C. | Inkjet Printer |
| D. | Static Printer |
| Answer» D. Static Printer | |
| 283. |
For which of the following reasons an optical mouse is better than ball mouse? |
| A. | It takes less space. |
| B. | It comes fitted in the keyboard. |
| C. | In a ball mouse, the ball can get clogged with dirt and hamper the working, but no such incident can take place in optical mouse. |
| D. | Ball mouse converts the motion of your hands into binary signals, which requires lost of processing to be understood by the user. |
| Answer» D. Ball mouse converts the motion of your hands into binary signals, which requires lost of processing to be understood by the user. | |
| 284. |
Identify the following: - It is a special purpose software. - It plays the role of an intermediary between a peripheral device and the system or application software. - You may need a different version of it for each hardware platform. |
| A. | Device manager |
| B. | Device driver |
| C. | BIOS |
| D. | Network interface |
| Answer» C. BIOS | |
| 285. |
These scanners use photo-multiplier tubes to produce high quality results. They are ______ scanners. |
| A. | Flatbed |
| B. | Sheet-fed |
| C. | Handheld |
| D. | Drum |
| Answer» E. | |
| 286. |
These input devices allow data entry directly from source documents. These devices are called __________. |
| A. | Speech recognition devices |
| B. | Digitizer |
| C. | Point and draw devices |
| D. | Data scanning devices |
| Answer» E. | |
| 287. |
A coding structure in which characters are represented by means of a series of parallel lines is called ___________. |
| A. | Braille code |
| B. | Numeric bar |
| C. | Barcode |
| D. | Sector code |
| Answer» D. Sector code | |
| 288. |
A/An______ is a computer terminal, with specialised hardware and software that displays information for public at airports, metro station or shopping malls. |
| A. | Track pad |
| B. | Kiosk |
| C. | Port |
| D. | Inlet |
| Answer» C. Port | |
| 289. |
It is a device with a specification that facilitates the discovery of a hardware component in a system. It does not need a physical device configuration or user intervention. Such a device is called a ______ device. |
| A. | Plug and play |
| B. | Auto detect |
| C. | POST device |
| D. | Self configuration |
| Answer» B. Auto detect | |
| 290. |
Which of the following statements is INCORRECT about an inkjet printer? |
| A. | It forms characters and images by spraying small drops of ink on paper. |
| B. | It is commonly used in homes for everyday printing. |
| C. | It uses CIJ and Drop-on-Demand printing methods. |
| D. | It produces water proof prints. |
| Answer» E. | |
| 291. |
Using a device you can identify a person by measuring his biological features. Such devices are called ______ devices. |
| A. | Printing |
| B. | Tethering |
| C. | Password |
| D. | Biometric |
| Answer» E. | |
| 292. |
Which of the following is/are the elements of GUI? (i) Menus (ii) Windows (iii) Icons |
| A. | Only (i) |
| B. | Only (ii) |
| C. | Only (iii) |
| D. | All (i), (ii) and (iii) |
| Answer» E. | |
| 293. |
Now-a-days a new interface is adopted by computing devices that allows its users to control games and apps when the controlling device is moved in the air. Which technology is followed by such interfaces? |
| A. | Gesture sensing |
| B. | Air sensing |
| C. | Air manevvering |
| D. | Steering |
| Answer» B. Air sensing | |
| 294. |
Samay has been using his computer for many years. Over the time, performance of the computer has deteriorated. What should he do to improve the performance of his computer? |
| A. | Run backup utility |
| B. | Run the disk defragmenter |
| C. | Run snipping tool |
| D. | Completely format his system |
| Answer» C. Run snipping tool | |
| 295. |
Identify the following: - It is a set of commands, instructions, rules and syntax. - It is used to create a software program. |
| A. | Integrated chip |
| B. | Software package |
| C. | Operating system |
| D. | Programming language |
| Answer» E. | |
| 296. |
The computer language that is directly understandable by a computer CPU and does not need a translator program is called __________. |
| A. | High level language |
| B. | Fourth generation language |
| C. | Machine language |
| D. | Assembly language |
| Answer» D. Assembly language | |
| 297. |
Match the following:Column - IColumn - II(a) OMR(i) Consists of a flat surface and a stylus(b) Touch Screen(ii) Performs the job similar to concept keyboard(c) Graphic Tablet(iv) A technique for inputting text into a computer by means of a document reader |
| A. | (a) - (i), (b) - (iii), (c) - (ii) |
| B. | (a) - (ii), (b) - (i), (c) - (iii) |
| C. | (a) - (iii), (b) - (ii), (c) - (i) |
| D. | (a) - (ii), (b) - (iii), (c) - (i) |
| Answer» D. (a) - (ii), (b) - (iii), (c) - (i) | |
| 298. |
Identify the following: - It is used for reading out text information to blind persons. - It is also used for translation systems that convert entered text into spoken words in a language selected by user. |
| A. | Speech synthesizer |
| B. | Digitiser |
| C. | Equalizer |
| D. | Voice Reproduction System |
| Answer» B. Digitiser | |
| 299. |
Your friend bought a DVD of a recent animated movie. He wants to play it in his computer. Which among the following he might use? (i) (ii) (iii) (iv) |
| A. | Only (i) |
| B. | Only (ii) |
| C. | Both (i) and (ii) |
| D. | Both (iii) and (iv) |
| Answer» D. Both (iii) and (iv) | |
| 300. |
Which of the following statements hold(s) true about working of computer with input and output devices? Statement 1: An input device takes data and converts it into binary form. Statement 2: An output device takes data in binary form and converts it into decimal form for the end users. |
| A. | Only Statement 1 |
| B. | Only Statement 2 |
| C. | Both Statement 1 and Statement 2 |
| D. | Neither Statement 1 nor Statement 2 |
| Answer» B. Only Statement 2 | |