Explore topic-wise MCQs in 8th Class.

This section includes 520 Mcqs, each offering curated multiple-choice questions to sharpen your 8th Class knowledge and support exam preparation. Choose a topic below to get started.

251.

The number 1001012 is equivalent to octal:

A.  54                               
B.  45
C.  37                               
D.  25
E.  None of these
Answer» C.  37                               
252.

The number 128 is equivalent to decimal:

A.  12                               
B.  20
C.  10            
D.  4
E.  None of these
Answer» D.  4
253.

Find out the one's complement of 1100111?

A.  0011000  
B.  0011111
C.  1100110                      
D.  0100110
E.  None of these
Answer» B.  0011111
254.

Steve wants to convert 10111 in to decimal number. Which one of the following is the correct conversion?

A.  48                   
B.  23
C.  29                   
D.  3000
E.  None of these
Answer» C.  29                   
255.

Which one of the following devices contains BIOS (Basic Input Output System)?

A.  RAM                           
B.  ROM
C.  CPU                            
D.  Motherboard
E.  None of these
Answer» C.  CPU                            
256.

Which of the following statements are true about SRAM?

A.  SRAM storage is based on the logic circuit known as a flip-flop.
B.  A static RAM chip can store only about one-fourth as much data as a DRAM chip.
C.  SRAMs are not usually reserved to use in caches.
D.  Both [a] and [b]
E.  None of these
Answer» E.  None of these
257.

Which one of the following does not require any expansion card or device driver to connect any peripheral to the computer?

A.  Hard disk                     
B.  Floppy disk
C.  USB drive
D.  All of these
E.  None of these
Answer» D.  All of these
258.

The data transfer speed of ATA between hard disk and system is up to _________ per second.

A.  100 KB            
B.  100 MB
C.  600MB            
D.  500 MB
E.  None of these
Answer» C.  600MB            
259.

Match the following:                         A B 1. Non-volatile memory (i) Increased data reliability 2. Volatile memory (i) Portable storage device 3. RAID (iii) ROM 4. Pen drive (iv) Hard disk (v) SRAM

A.  1 \[\to \]iii, 2 \[\to \]v, 3 \[\to \]i, 4 \[\to \]ii
B.  1 \[\to \]iv, 2 \[\to \]iii, 3 \[\to \]v, 4   \[\to \]i
C.  1 \[\to \]ii, 2 \[\to \]iii, 3 \[\to \]iv, 4 \[\to \]v
D.  1 \[\to \]i, 2 \[\to \]iv, 3 \[\to \]ii, 4 \[\to \]v
E.  None of these   
Answer» B.  1 \[\to \]iv, 2 \[\to \]iii, 3 \[\to \]v, 4   \[\to \]i
260.

Which of the following statements are true about RAM?

A.  RAM is a permanent memory    
B.  RAM allows only read permission.
C.  RAM is not volatile by nature.    
D.  All of these
E.  None of these
Answer» F.
261.

The storage devices are of two types: primary and secondary. Which of the following are secondary storage devices?

A.  RAM                           
B.  Hard disk
C.  Pen drive                     
D.  Both [b] and [c]
E.  None of these
Answer» E.  None of these
262.

Online textual talk is commonly known as ___.

A.  Video conference          
B.  Telephony        
C.         Text phone         
D.        Chatting                             
Answer» E.
263.

While surfing the internet, bookmark is used to refer to the site that you like. What is the other name of bookmark on the internet?

A.  Marker                               
B.  History                
C.         Favorite             
D.         Page style
Answer» D.         Page style
264.

Which of the following is used to browse internet?

A.  Internet explorer
B.            My document
C.  Network neighborhood    
D.  Recycle bin
Answer» B.            My document
265.

'World Wide Web' contains which kind of information?

A.  Only text             
B.     Text and Audio
C.  Text, Graphic and Audio   
D.  Text and Graphic
Answer» D.  Text and Graphic
266.

Which of the following software?s are used for internet surfing?

A.  Netscape navigator, MS-Office
B.  Internet explorer, Netscape navigator
C.  Internet explorer, Yahoo
D.  Google, Altavista
Answer» C.  Internet explorer, Yahoo
267.

Which software is required for web surfing?

A.  Google                
B.         Yahoo 
C.         Both (a) and (b)
D.         Internet Explorer           
Answer» E.
268.

Which program helps us search for related pages or documents on the internet?

A.  Search Guide      
B.         Search Result
C.         Search Engine    
D.          Surfer Helper                   
Answer» D.          Surfer Helper                   
269.

What does the talk category in newsgroup describe?

A.  Scientific topics 
B.            Miscellaneous topics
C.  Politics - related topics    
D.  Computer - related topics
Answer» D.  Computer - related topics
270.

To which category of newsgroup do business and commerce topics belong?

A.  alt        
B.         sd        
C.         soc       
D.         biz
Answer» E.
271.

What is the set of rules for interacting with other people over internet called?

A.  Protocol             
B.         Netiquette       
C.         Guidelines        
D.         Browser
Answer» C.         Guidelines        
272.

Obtaining unauthorized access to another person's system in a network or internet through skills, tactics or detailed knowledge is called ___.

A.  hacking               
B.         cracking              
C.         mailing                
D.         sharing               
Answer» B.         cracking              
273.

Observe the given window. What does X refer to?

A.  Status bar           
B.      Menu bar          
C.         Searching bar     
D.         Location bar                     
Answer» B.      Menu bar          
274.

What do you call moving from one site to another on internet?

A.  Searching          
B.         Surfing                
C.         Playing                
D.         Displaying
Answer» C.         Playing                
275.

Net surfing is a term used for which of the following tasks?

A.  Sending mails    
B.          Posting messages
C.                         Exploring web    
D.          Deleting messages        
Answer» D.          Deleting messages        
276.

What is the content on web which is not found in search engine but stored in database with a complex URL?

A.  Browser              
B.         URL                      
C.         Search engine    
D.                         Deep web                         
Answer» E.
277.

Which software allows the user to surf the net?

A.  Browser             
B.         Search engine
C.         ISP                        
D.         Website                             
Answer» B.         Search engine
278.

Which is the first web browser?

A.  World wide web
B.        Netscape navigator
C.  Internet explorer
D.            Safari
Answer» B.        Netscape navigator
279.

Which of the following is used to explore the Internet?

A.  Browser             
B.         Spreadsheet
C.         Clipboard           
D.         Draw
Answer» B.         Spreadsheet
280.

Lata wants to send her friend birthday wishes. Which of the following is the best service to create her own greeting?

A.  Google                
B.         e-mail 
C.  e-greetings   
D.  Yahoo messenger          
Answer» D.  Yahoo messenger          
281.

Which of the following is the most popular software for video conferencing?

A.  CU-Seeme           
B.         ICQ                                       
C.  Rediff Bol            
D.         Gtalk
Answer» B.         ICQ                                       
282.

Which of the following is used for people to hold discussions on any topic?

A.  Chat rooms        
B.        Video conferencing
C.                         News groups      
D.         e-greetings       
Answer» D.         e-greetings       
283.

What kind of programs are Rediff Bol and Yahoo! Messenger?

A.  Video conferencing      
B.  Chatting             
C.         Searching            
D.         Surfing                
Answer» C.         Searching            
284.

Which of the following functions just like an answering machine and allows callers to have a voice message for the called party?

A.  e-mail                 
B.         Voice mail         
C.         Internet             
D.         LAN                      
Answer» C.         Internet             
285.

What does the word 'cyberspace' describe?

A.  Program                             
B.  Internet             
C.         Algorithm          
D.         Flowchart                          
Answer» C.         Algorithm          
286.

The process of buying and selling of goods and services through wireless handheld devices is called ______.

A. M-Commerce
B. H-Commerce
C. Short-commerce
D.        Metro-commerce
Answer» B. H-Commerce
287.

Which of the following is a type of blog?

A. Video blogs or vlogs                   
B. Photoblogs
C. Microblogs        
D. All of these
Answer» E.
288.

Which of the following protocols is a standard for managing devices on IP networks such as routers, switches, servers, printers, etc?

A. SMTP                          
B. FTP
C. SNMP       
D.        IMAP
Answer» D.        IMAP
289.

Social networking can be harmful or confusing if _______.              

A. You accidentally post sensitive information that will be seen by many different people
B. You need to set numerous options to protect your privacy
C. It becomes addictive and you tend to spend more than required time on social networks and make them an alternative for "real-life" communication
D. All of these
Answer» E.
290.

______is the extent to which a search engine indexes pages within a website.

A. Crawl depth
B. Search depth
C. Crawl index   
D.        Depth search
Answer» B. Search depth
291.

_________is considered to be the first computer virus for MS-DOS. It was a boot-sector virus.

A. Creeper             
B. Brain
C. Ghostball      
D. Cascade
Answer» C. Ghostball      
292.

Web 3.0 is also called ______.

A. The Semantic Web         
B. The Interwebs
C. Wimax 
D. All of these
Answer» B. The Interwebs
293.

To use an e-mail system, you should first ___________.

A. Navigate and get to know e-mail window
B. Sign up for an e-mail account with a unique user name and password
C. Perform the tasks of composing, responding to and managing e-mail
D. Type the recipient's email-ID in 'To' field box
Answer» C. Perform the tasks of composing, responding to and managing e-mail
294.

Which of the following is a use of telnet service?  

A. For using computing power of a remote computer. 
B. For accessing information from a database or archive on a remote computer.
C. For logging into one's own computer from another computer.
D. All of these
Answer» E.
295.

What is Flaming?

A. An act of posting and sending offensive messages over the Internet.
B. A program that contacts a remote server for instructions and then steals files or captures screen shots of the infected computer system.
C. A program that secretly and maliciously integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run.
D. All of these
Answer» B. A program that contacts a remote server for instructions and then steals files or captures screen shots of the infected computer system.
296.

Identify the type of virus from the given symptoms: - It attempts to attack both the boot sector and the executable or program files at the same time. - This virus may also take different actions on an infected computer. - This type of virus spreads in multiple ways. - It may also depend on the existence of certain files on the PC.

A. Multipartite virus
B.        Sabotage virus
C. Web scripting virus         
D. Direct action virus
Answer» B.        Sabotage virus
297.

A ________ is a person who breaks into computer through a network without authorization with a mischievous intent.

A. Crasher                         
B. Gopher
C. Cracker                         
D. Shareware
Answer» D. Shareware
298.

To erase cookies, you should delete the ______ on your PC.

A. Temporary Internet Files
B. Web Activity folder.
C. Drivers folder     
D.        All of these
Answer» B. Web Activity folder.
299.

Which of the following terms is used for an unskilled hacker who breaks into computer system by using automated tools written by others?

A. Script kiddie
B. Elite cracker
C. Grey hat           
D. Phenophyte Diddlr
Answer» B. Elite cracker
300.

It is possible to communicate online with friends using ________.

A. Free e-mail services like Outlook, Yahoo, etc
B. Social networking sites like Facebook, MySpace, etc
C. Instant Messaging softwares like WhatsApp, Skype, etc
D. All of these
Answer» E.