Explore topic-wise MCQs in 8th Class.

This section includes 520 Mcqs, each offering curated multiple-choice questions to sharpen your 8th Class knowledge and support exam preparation. Choose a topic below to get started.

351.

_____ is used extensively in the banking sector because magnetic-ink characters are difficult to forge, and are therefore ideal for marking and identifying cheques.

A. OCR                                        
B. MICR
C. OMR                            
D.        Flatbed printer
Answer» C. OMR                            
352.

Which of the following is a digital video interface to connect a video source to a display device such as computer monitor?

A. VGA connector
B.        Display Port
C. DVI                              
D. All of these
Answer» E.
353.

UNIX and open VMS are examples of ________ operating systems.

A. Single-user    
B.        Embedded
C. Inline                            
D. Multi-user
Answer» E.
354.

When I am writing a program in long strings of 0s and 1s, I am using ____.

A. Fourth Generation Language       
B. Middle Level Language
C. High Level Language                  
D. Machine Level Language
Answer» E.
355.

_____ ports connects special types of music instruments to sound cards.

A. BUS                             
B. UPS
C. KBD                             
D. MIDI
Answer» E.
356.

______ produce Braille printouts of computer files. They work in conjunction with software that translate text to Braille.

A. Plotter                          
B. Embossers
C. OCR                            
D. MICR
Answer» C. OCR                            
357.

The computer doesn't need a translator to understand _______ language.

A. High level                     
B. Fourth generation
C. Machine
D. Assembly
Answer» D. Assembly
358.

This is a state in which the computer shuts down to save power. However, before shutting down it saves everything in the memory on the hard disk. When the computer is restarted, the desktop is restored to exactly as it was left.

A. Standby         
B.        Hibernate
C. Sleep                                        
D. Log off
Answer» C. Sleep                                        
359.

Computer video games belong to which of the following category of software?

A. Personal assistance software        
B. Word software
C. Education Software        
D. Entertainment software
Answer» E.
360.

Which of the following is a language best suited for business applications?

A. JAVA   
B. C
C. FORTRAN                    
D. COBOL
Answer» E.
361.

Identify the following. - It is a software. - Products like remote control, digital watches, microwave ovens uses this software. - It is stored in the ROM chips.

A. Firmware          
B. Middleware
C. Net software      
D. Application software
Answer» B. Middleware
362.

_________ Operating system allows multiple users to access a computer system at the same time.

A. Multi-tasking   
B.        Multi-user
C. Single-user    
D. Multi-server
Answer» C. Single-user    
363.

Which part of the computer does an EIDE cable connect to?

A. Keyboard       
B.                    Hard disk drive
C. Sound card       
D. Video card
Answer» C. Sound card       
364.

Which of the following does NOT allow communication with another computer?

A. NIC                              
B. Serial Port
C. VGA Port   
D. Modem
Answer» D. Modem
365.

The digital data is converted to analog format by the modem at ______.

A. The source computer
B. The destination computer
C. Both the source and the destination computers
D. Neither the source nor destination computers
Answer» B. The destination computer
366.

As soon as you connect_______ peripherals to a computer, they can be recognized and installed on it.

A. Click and Eject  
B. Plug and Play
C. Push and Pop
D.        Off and On
Answer» C. Push and Pop
367.

In Flash 8, what is the shortcut key to open library?

A.  Ctrl + L                
B.         Shift + L              
C.         Ctrl + Y                
D.         Shift + Y              
Answer» B.         Shift + L              
368.

When changes are made to a symbol in flash 8 stage, what happens to all the instances of that symbol?

A.  Flash updates all instances of that symbol.
B.  Flash deletes all instances of that symbol.
C.  Flash does not update any instance of that symbol.
D.  Flash saves only the particular edited symbol.
Answer» B.  Flash deletes all instances of that symbol.
369.

What do you call the occurence of a symbol on a stage in Flash 8?

A.  Symbol               
B.         Timeline             
C.         Instance             
D.         Inspector
Answer» D.         Inspector
370.

Which key displays the 'convert to symbol' dialog box?

A.  F5        
B.         F6        
C.         F7        
D.         F8                         
Answer» E.
371.

                                                Where does Flash store symbols?

A.  History                
B.         Libraries             
C.         Tools                   
D.         Properties                         
Answer» C.         Tools                   
372.

In Flash 8, which tool is used for moving, rotating and scaling an object?

A.                        
B.                             
C.             
D.                         
Answer» B.                             
373.

If you want to acquire the color and style of one object to be applied to another object, which tool must be selected?

A.  Pen tool                             
B.  Ink bottle tool                 
C.  Paint Bucket tool
D.        Eye dropper tool
Answer» E.
374.

Which of these is not an advantage of using Flash?

A.  Flash loads fast.
B.  Flash does not require programming skills.
C.  Flash allows interactivity.
D.  Flash requires a plug in for it to be viewed.
Answer» D.  Flash requires a plug in for it to be viewed.
375.

What is the rectangular area where the graphic contents are added while creating a flash document?

A.  Workspace                       
B.  Stage                   
C.  Frame                 
D.         Timeline
Answer» C.  Frame                 
376.

In Flash 8, you are working on layer 1 currently. When you add a new layer, it shall be added ___ layer 1.

A.  above
B.  above for left click, below for right click
C.  below
D.  Both above and below
Answer» B.  above for left click, below for right click
377.

Which type of animation can make a shape change to another?

A.  Frame-by-frame animation
B.  Tweened animation
C.  Shape tweened animation
D.  All the above
Answer» D.  All the above
378.

What does the black dot in the timeline represent?

A.  Frame                                 
B.  Key frame         
C.         Symbol               
D.         Graphic
Answer» C.         Symbol               
379.

Which of the following tools is used for drawing straight lines and smooth curves?

A.                       
B.                                       
C.                       
D.       
Answer» D.       
380.

What are the transparent sheets stacked on top of each other?

A.  Frames               
B.         Key frames       
C.         Layers                 
D.         Symbols
Answer» D.         Symbols
381.

What are the steps to insert a frame?

A.  Modify \[\to \] Timeline \[\to \]Frame
B.  Insert \[\to \]Timeline \[\to \]Frame
C.  Text\[\to \]Timeline\[\to \]Frame
D.  View \[\to \]Timeline -\[\to \]Frame
Answer» C.  Text\[\to \]Timeline\[\to \]Frame
382.

What are the graphics created in Flash called?

A.  Raster graphics   
B.         Vector graphics
C.         Bitmaps               
D.         Special effects 
Answer» C.         Bitmaps               
383.

Which of the following is used to set the sequence of a movie?

A.  Time line             
B.         Stage   
C.         Property Inspector
D.         Frame                 
Answer» B.         Stage   
384.

What is the basic unit of a Flash animation?

A.  Slide                    
B.         Graphic              
C.  Frame                 
D.         Symbol
Answer» D.         Symbol
385.

In the given figure, what does the arrow mark represent?

A.  Layer                   
B.         Frame 
C.         Current rate       
D.        Play head                          
Answer» E.
386.

Which of the following is used to set the attributes of the text?

A.  Libraries        
B.  Property Inspector
C.  Text tool             
D.      Instance
Answer» C.  Text tool             
387.

In Flash 8, what do the hidden features in the programs refer to?

A.  Easter eggs              
B.  Hidden icons
C.         Flash games       
D.        Easter bunny
Answer» B.  Hidden icons
388.

How is a virus transmitted in a computer?

A.  Booting a PC from an infected medium
B.        Executing an infected program
C.        Opening an infected file
D.        All the above
Answer» E.
389.

The viruses that change their appearance to avoid detection are called___.

A.  MBR viruses
B.        DBR viruses
C.        Parasitic viruses              
D.        Polymorphic viruses
Answer» E.
390.

Which of the following is an example of a boot virus?

A.  Alien.298         
B.        Umbrella.3173 
C.        Devil.941          
D.        XM. Yohimbe.A
Answer» D.        XM. Yohimbe.A
391.

Which type of virus infects .SCR, .SYS files?

A.  Program virus                
B.        Boot virus    
C.        Macro virus    
D.        Creeper virus
Answer» B.        Boot virus    
392.

A computer virus can ___.

A.  damage data
B.  render the system slow
C.  copy without any knowledge onto floppies used in infected computer
D.  All the above
Answer» E.
393.

The antivirus softwares that are installed in RAM and continue to operate in the background while other software applications are running are ___.

A.  heuristic detectors        
B.        memory resident
C.        TSR's        
D.        checksum
Answer» C.        TSR's        
394.

What is a software program that has the ability to replicate itself and spread from one computer to another called?   

A.  Computer virus         
B.  Computer memory       
C.  Computer program       
D.  Computer file  
Answer» B.  Computer memory       
395.

Which kind of virus attaches itself to the antivirus program?

A.  Self modifying virus 
B.  Stealth virus     
C.         Boot sector virus
D.         Micro virus
Answer» C.         Boot sector virus
396.

Which is the product of Symantec corporation?

A.  Norton anitvirus          
B.     McAfee        
C.     Avast antivirus      
D.     Kaspersky antivirus       
Answer» B.     McAfee        
397.

Which of the following is used to detect and remove virus from a computer?

A.  Virus software      
B.     Antivirus software
C.     Application software    
D.     System software
Answer» C.     Application software    
398.

What do you call files which have unknown virus that is not listed in its database?

A.  Quarantine files 
B.  Word processor files
C.  Downloaded files
D.    Program files
Answer» B.  Word processor files
399.

If your file is infected by a virus and you are sending that infected file to your friend through e-mail, what happens to your friend's computer?

A.  It will be infected by the virus.
B.     It will not get affected by the virus.
C.     My friend cannot receive the file through e-mail.
D.     You cannot send this file through e-mail.
Answer» B.     It will not get affected by the virus.
400.

Which of the following viruses will damage documents?

A.  Boot virus        
B.     Program virus  
C.           File virus 
D.     Macro virus    
Answer» E.