MCQOPTIONS
Saved Bookmarks
This section includes 520 Mcqs, each offering curated multiple-choice questions to sharpen your 8th Class knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
The number 1001012 is equivalent to octal: |
| A. | 54 |
| B. | 45 |
| C. | 37 |
| D. | 25 |
| E. | None of these |
| Answer» C. 37 | |
| 252. |
The number 128 is equivalent to decimal: |
| A. | 12 |
| B. | 20 |
| C. | 10 |
| D. | 4 |
| E. | None of these |
| Answer» D. 4 | |
| 253. |
Find out the one's complement of 1100111? |
| A. | 0011000 |
| B. | 0011111 |
| C. | 1100110 |
| D. | 0100110 |
| E. | None of these |
| Answer» B. 0011111 | |
| 254. |
Steve wants to convert 10111 in to decimal number. Which one of the following is the correct conversion? |
| A. | 48 |
| B. | 23 |
| C. | 29 |
| D. | 3000 |
| E. | None of these |
| Answer» C. 29 | |
| 255. |
Which one of the following devices contains BIOS (Basic Input Output System)? |
| A. | RAM |
| B. | ROM |
| C. | CPU |
| D. | Motherboard |
| E. | None of these |
| Answer» C. CPU | |
| 256. |
Which of the following statements are true about SRAM? |
| A. | SRAM storage is based on the logic circuit known as a flip-flop. |
| B. | A static RAM chip can store only about one-fourth as much data as a DRAM chip. |
| C. | SRAMs are not usually reserved to use in caches. |
| D. | Both [a] and [b] |
| E. | None of these |
| Answer» E. None of these | |
| 257. |
Which one of the following does not require any expansion card or device driver to connect any peripheral to the computer? |
| A. | Hard disk |
| B. | Floppy disk |
| C. | USB drive |
| D. | All of these |
| E. | None of these |
| Answer» D. All of these | |
| 258. |
The data transfer speed of ATA between hard disk and system is up to _________ per second. |
| A. | 100 KB |
| B. | 100 MB |
| C. | 600MB |
| D. | 500 MB |
| E. | None of these |
| Answer» C. 600MB | |
| 259. |
Match the following: A B 1. Non-volatile memory (i) Increased data reliability 2. Volatile memory (i) Portable storage device 3. RAID (iii) ROM 4. Pen drive (iv) Hard disk (v) SRAM |
| A. | 1 \[\to \]iii, 2 \[\to \]v, 3 \[\to \]i, 4 \[\to \]ii |
| B. | 1 \[\to \]iv, 2 \[\to \]iii, 3 \[\to \]v, 4 \[\to \]i |
| C. | 1 \[\to \]ii, 2 \[\to \]iii, 3 \[\to \]iv, 4 \[\to \]v |
| D. | 1 \[\to \]i, 2 \[\to \]iv, 3 \[\to \]ii, 4 \[\to \]v |
| E. | None of these |
| Answer» B. 1 \[\to \]iv, 2 \[\to \]iii, 3 \[\to \]v, 4 \[\to \]i | |
| 260. |
Which of the following statements are true about RAM? |
| A. | RAM is a permanent memory |
| B. | RAM allows only read permission. |
| C. | RAM is not volatile by nature. |
| D. | All of these |
| E. | None of these |
| Answer» F. | |
| 261. |
The storage devices are of two types: primary and secondary. Which of the following are secondary storage devices? |
| A. | RAM |
| B. | Hard disk |
| C. | Pen drive |
| D. | Both [b] and [c] |
| E. | None of these |
| Answer» E. None of these | |
| 262. |
Online textual talk is commonly known as ___. |
| A. | Video conference |
| B. | Telephony |
| C. | Text phone |
| D. | Chatting |
| Answer» E. | |
| 263. |
While surfing the internet, bookmark is used to refer to the site that you like. What is the other name of bookmark on the internet? |
| A. | Marker |
| B. | History |
| C. | Favorite |
| D. | Page style |
| Answer» D. Page style | |
| 264. |
Which of the following is used to browse internet? |
| A. | Internet explorer |
| B. | My document |
| C. | Network neighborhood |
| D. | Recycle bin |
| Answer» B. My document | |
| 265. |
'World Wide Web' contains which kind of information? |
| A. | Only text |
| B. | Text and Audio |
| C. | Text, Graphic and Audio |
| D. | Text and Graphic |
| Answer» D. Text and Graphic | |
| 266. |
Which of the following software?s are used for internet surfing? |
| A. | Netscape navigator, MS-Office |
| B. | Internet explorer, Netscape navigator |
| C. | Internet explorer, Yahoo |
| D. | Google, Altavista |
| Answer» C. Internet explorer, Yahoo | |
| 267. |
Which software is required for web surfing? |
| A. | |
| B. | Yahoo |
| C. | Both (a) and (b) |
| D. | Internet Explorer |
| Answer» E. | |
| 268. |
Which program helps us search for related pages or documents on the internet? |
| A. | Search Guide |
| B. | Search Result |
| C. | Search Engine |
| D. | Surfer Helper |
| Answer» D. Surfer Helper | |
| 269. |
What does the talk category in newsgroup describe? |
| A. | Scientific topics |
| B. | Miscellaneous topics |
| C. | Politics - related topics |
| D. | Computer - related topics |
| Answer» D. Computer - related topics | |
| 270. |
To which category of newsgroup do business and commerce topics belong? |
| A. | alt |
| B. | sd |
| C. | soc |
| D. | biz |
| Answer» E. | |
| 271. |
What is the set of rules for interacting with other people over internet called? |
| A. | Protocol |
| B. | Netiquette |
| C. | Guidelines |
| D. | Browser |
| Answer» C. Guidelines | |
| 272. |
Obtaining unauthorized access to another person's system in a network or internet through skills, tactics or detailed knowledge is called ___. |
| A. | hacking |
| B. | cracking |
| C. | mailing |
| D. | sharing |
| Answer» B. cracking | |
| 273. |
Observe the given window. What does X refer to? |
| A. | Status bar |
| B. | Menu bar |
| C. | Searching bar |
| D. | Location bar |
| Answer» B. Menu bar | |
| 274. |
What do you call moving from one site to another on internet? |
| A. | Searching |
| B. | Surfing |
| C. | Playing |
| D. | Displaying |
| Answer» C. Playing | |
| 275. |
Net surfing is a term used for which of the following tasks? |
| A. | Sending mails |
| B. | Posting messages |
| C. | Exploring web |
| D. | Deleting messages |
| Answer» D. Deleting messages | |
| 276. |
What is the content on web which is not found in search engine but stored in database with a complex URL? |
| A. | Browser |
| B. | URL |
| C. | Search engine |
| D. | Deep web |
| Answer» E. | |
| 277. |
Which software allows the user to surf the net? |
| A. | Browser |
| B. | Search engine |
| C. | ISP |
| D. | Website |
| Answer» B. Search engine | |
| 278. |
Which is the first web browser? |
| A. | World wide web |
| B. | Netscape navigator |
| C. | Internet explorer |
| D. | Safari |
| Answer» B. Netscape navigator | |
| 279. |
Which of the following is used to explore the Internet? |
| A. | Browser |
| B. | Spreadsheet |
| C. | Clipboard |
| D. | Draw |
| Answer» B. Spreadsheet | |
| 280. |
Lata wants to send her friend birthday wishes. Which of the following is the best service to create her own greeting? |
| A. | |
| B. | |
| C. | e-greetings |
| D. | Yahoo messenger |
| Answer» D. Yahoo messenger | |
| 281. |
Which of the following is the most popular software for video conferencing? |
| A. | CU-Seeme |
| B. | ICQ |
| C. | Rediff Bol |
| D. | Gtalk |
| Answer» B. ICQ | |
| 282. |
Which of the following is used for people to hold discussions on any topic? |
| A. | Chat rooms |
| B. | Video conferencing |
| C. | News groups |
| D. | e-greetings |
| Answer» D. e-greetings | |
| 283. |
What kind of programs are Rediff Bol and Yahoo! Messenger? |
| A. | Video conferencing |
| B. | Chatting |
| C. | Searching |
| D. | Surfing |
| Answer» C. Searching | |
| 284. |
Which of the following functions just like an answering machine and allows callers to have a voice message for the called party? |
| A. | |
| B. | Voice mail |
| C. | Internet |
| D. | LAN |
| Answer» C. Internet | |
| 285. |
What does the word 'cyberspace' describe? |
| A. | Program |
| B. | Internet |
| C. | Algorithm |
| D. | Flowchart |
| Answer» C. Algorithm | |
| 286. |
The process of buying and selling of goods and services through wireless handheld devices is called ______. |
| A. | M-Commerce |
| B. | H-Commerce |
| C. | Short-commerce |
| D. | Metro-commerce |
| Answer» B. H-Commerce | |
| 287. |
Which of the following is a type of blog? |
| A. | Video blogs or vlogs |
| B. | Photoblogs |
| C. | Microblogs |
| D. | All of these |
| Answer» E. | |
| 288. |
Which of the following protocols is a standard for managing devices on IP networks such as routers, switches, servers, printers, etc? |
| A. | SMTP |
| B. | FTP |
| C. | SNMP |
| D. | IMAP |
| Answer» D. IMAP | |
| 289. |
Social networking can be harmful or confusing if _______. |
| A. | You accidentally post sensitive information that will be seen by many different people |
| B. | You need to set numerous options to protect your privacy |
| C. | It becomes addictive and you tend to spend more than required time on social networks and make them an alternative for "real-life" communication |
| D. | All of these |
| Answer» E. | |
| 290. |
______is the extent to which a search engine indexes pages within a website. |
| A. | Crawl depth |
| B. | Search depth |
| C. | Crawl index |
| D. | Depth search |
| Answer» B. Search depth | |
| 291. |
_________is considered to be the first computer virus for MS-DOS. It was a boot-sector virus. |
| A. | Creeper |
| B. | Brain |
| C. | Ghostball |
| D. | Cascade |
| Answer» C. Ghostball | |
| 292. |
Web 3.0 is also called ______. |
| A. | The Semantic Web |
| B. | The Interwebs |
| C. | Wimax |
| D. | All of these |
| Answer» B. The Interwebs | |
| 293. |
To use an e-mail system, you should first ___________. |
| A. | Navigate and get to know e-mail window |
| B. | Sign up for an e-mail account with a unique user name and password |
| C. | Perform the tasks of composing, responding to and managing e-mail |
| D. | Type the recipient's email-ID in 'To' field box |
| Answer» C. Perform the tasks of composing, responding to and managing e-mail | |
| 294. |
Which of the following is a use of telnet service? |
| A. | For using computing power of a remote computer. |
| B. | For accessing information from a database or archive on a remote computer. |
| C. | For logging into one's own computer from another computer. |
| D. | All of these |
| Answer» E. | |
| 295. |
What is Flaming? |
| A. | An act of posting and sending offensive messages over the Internet. |
| B. | A program that contacts a remote server for instructions and then steals files or captures screen shots of the infected computer system. |
| C. | A program that secretly and maliciously integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run. |
| D. | All of these |
| Answer» B. A program that contacts a remote server for instructions and then steals files or captures screen shots of the infected computer system. | |
| 296. |
Identify the type of virus from the given symptoms: - It attempts to attack both the boot sector and the executable or program files at the same time. - This virus may also take different actions on an infected computer. - This type of virus spreads in multiple ways. - It may also depend on the existence of certain files on the PC. |
| A. | Multipartite virus |
| B. | Sabotage virus |
| C. | Web scripting virus |
| D. | Direct action virus |
| Answer» B. Sabotage virus | |
| 297. |
A ________ is a person who breaks into computer through a network without authorization with a mischievous intent. |
| A. | Crasher |
| B. | Gopher |
| C. | Cracker |
| D. | Shareware |
| Answer» D. Shareware | |
| 298. |
To erase cookies, you should delete the ______ on your PC. |
| A. | Temporary Internet Files |
| B. | Web Activity folder. |
| C. | Drivers folder |
| D. | All of these |
| Answer» B. Web Activity folder. | |
| 299. |
Which of the following terms is used for an unskilled hacker who breaks into computer system by using automated tools written by others? |
| A. | Script kiddie |
| B. | Elite cracker |
| C. | Grey hat |
| D. | Phenophyte Diddlr |
| Answer» B. Elite cracker | |
| 300. |
It is possible to communicate online with friends using ________. |
| A. | Free e-mail services like Outlook, Yahoo, etc |
| B. | Social networking sites like Facebook, MySpace, etc |
| C. | Instant Messaging softwares like WhatsApp, Skype, etc |
| D. | All of these |
| Answer» E. | |