Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Though several programmers can be opened simultaneously yet only…………programmed can be active.

A. four
B. three
C. two
D. one
Answer» C. two
2.

P1 cloning vector allow cloning of DNA of the length of

A. 50 kbp
B. 100 kbp
C. 10 kbp
D. 20 kbp
Answer» C. 10 kbp
3.

वेब पेज में वह कौन-सा शब्द है जिसे क्लिक किया जाये तो दूसरा डाक्यूमेंट खुलता हैं ?

A. हाइपरलिंक
B. एंकर
C. रेफरेंस
D. URL
Answer» B. एंकर
4.

The systematic way of determining the worth of all the jobs within any organization is called

A. compensable evaluation
B. job evaluation
C. benchmark job
D. job promotion structure
Answer» C. benchmark job
5.

सेल फोनों में किस प्रकार के स्टोरेज डिवाइसों का उपयोग किया जाता है ?

A. flash
B. rom
C. cache
D. इनमें से कोई नहीं
Answer» B. rom
6.

Dendron is also called as

A. nerve fiber
B. nerve tissue
C. neuron
D. nerve impulse
Answer» B. nerve tissue
7.

The innermost layer of the eyeball is

A. retina
B. iris
C. XX
D. ciliary body
Answer» B. iris
8.

माउस का कौन-सा बटन सामान्यतया ok के लिए उपयोग में लाया जाया हैं ?

A. बीच वाला
B. दायॉं
C. बायॉं
D. व्हील
Answer» D. व्हील
9.

What is backup ?

A. Adding more components to your network
B. Protecting data by copying it from the original source to a different destination
C. Filtering old data from the new data
D. Accessing data on tape
Answer» C. Filtering old data from the new data
10.

The idea of instituting HR policies to support and encourage senior workers is part of

A. promotions
B. transfers
C. reality shock
D. managing retirements
Answer» E.
11.

The key issues related to internal equity are

A. distributive justice
B. procedural justice
C. primacy justice
D. both a and b
Answer» E.
12.

Ensuring that the essential peripheral devices are attached and operational is the ____________ process.

A. configuration
B. CMOS
C. POST
D. ROM
Answer» D. ROM
13.

The marketing attack in which the attacker matches its product, price and distribution is classified as

A. flank attack
B. frontal attack
C. bypass attack
D. guerilla attack
Answer» C. bypass attack
14.

Video processors consist of ……… and ……, which store and process images.

A. CPU and VGA
B. CPU and memory
C. VGA and memory
D. VGI and DVI
E. VGA and VGI
Answer» D. VGI and DVI
15.

The low share-penetration index includes

A. low brand awareness
B. low availability
C. high price
D. all of above
Answer» E.
16.

The Work streams talent management system includes

A. industry leading compensation
B. performance applications
C. knowledge management applications
D. All of the above
Answer» E.
17.

____________ bits equal one byte.

A. Eight
B. Two
C. One thousand
D. One million
Answer» B. Two
18.

The copy made of the market leader's product but differentiates its pricing and distribution strategies is classified as

A. counterfeiter
B. cloner
C. imitator
D. adapter
Answer» D. adapter
19.

वर्कशीट के .....वर्टिकली एपीयर होते हैं और वर्कशीट विंडो के ऊपर अक्षर द्वारा आइडेंटिफाई होते हैं |

A. कालम
B. रो
C. हेडिंग
D. सेल
Answer» B. रो
20.

What menu is selected to print ?

A. Edit
B. Special
C. File
D. Tools
Answer» D. Tools
21.

डाक्यूमेंट की हार्ड कॉपी ......की जाती हैं |

A. CD पर स्टोर
B. फ्लापी पर स्टोर
C. प्रिन्टर पर प्रिंट
D. हार्ड डिक्स में स्टोर
Answer» D. हार्ड डिक्स में स्टोर
22.

A set of instructions telling the computer what to do is called………

A. mentor
B. instructor
C. compiler
D. program
E. None of these
Answer» E. None of these
23.

The people who are of artistic personality often chose careers of

A. advertising executives
B. school administrators
C. investment managers
D. credit managers
Answer» B. school administrators
24.

In career development, providing training and development workshops is part of

A. individual role
B. manager role
C. employer role
D. line manager
Answer» D. line manager
25.

Networks are monitored by security personnel and supervised by ………who set(s) up accounts and passwords for authorized network users.

A. IT managers
B. the government
C. network administrators
D. password administrators
E. None of these
Answer» D. password administrators
26.

सॉफ्टवेयर कोड में त्रुटिया ढ़ूंढने की एक प्रक्रिया कौनसी हैं ?

A. टेस्टिंग
B. कम्पाइलिंग
C. डीबगिंग
D. रनिंग
Answer» D. रनिंग
27.

A(n)……is composed of several computers connected together to share resources and data.

A. Internet
B. network
C. backbone
D. hyperlink
E. protocol
Answer» C. backbone
28.

A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.

A. PSS
B. POS
C. inventory
D. data mining
Answer» B. POS
29.

निम्न मे से दो प्रकार के आउटपुट डिवाइस कौनसे है ?

A. की बोर्ड और माउस
B. विंडोज 2000 विंडोज NT
C. मानीटर और प्रिन्टर
D. इनमें से कोई नहीं
Answer» D. इनमें से कोई नहीं
30.

कम्प्यूटर प्रोसेस का मूल लक्ष्य है डाटा को ..... में परिवर्तित करना |

A. इनफॉर्मेशन
B. टेबल्स
C. ग्राफ
D. फाइल्स
Answer» B. टेबल्स
31.

In career development, assessing your own skills is included in

A. individual role
B. manager role
C. employer role
D. line manager
Answer» B. manager role
32.

In a certain language, MADRAS is coded as NBESBT, how is BOMBAY coded in that code ?

A. CPNCBZ
B. CPNCBX
C. DPNCBZ
D. DPNCBX
Answer» B. CPNCBX
33.

Storage and memory differ with respect to which of the following characteristics ?

A. Price
B. Reliability
C. Speed
D. All of these
E. None of these
Answer» E. None of these
34.

IRM के घटक है -

A. Tetecommunication
B. data processing
C. office information
D. उपरोक्त सभी
Answer» E.
35.

रेज्यूम बनाने के लिए किस सॉफ्टवेयर का उपयोग किया जाता हैं ?

A. Pagemaker
B. Ms-Word
C. उपरोक्त दोनों
D. java
Answer» D. java
36.

CDs are of which shape ?

A. Square
B. Rectangular
C. Round
D. Hexagonal
E. None of these
Answer» D. Hexagonal
37.

……….are 'attempts by individuals to obtain confidential information from you by falsifying their identity.

A. Phishing
B. Computer viruses
C. Spyware scams
D. Viruses
E. None of the above
Answer» B. Computer viruses
38.

A byte can hold one ____________ of data.

A. bit
B. binary digit
C. character
D. kilobyte
Answer» D. kilobyte
39.

In the talent management end to end process, the workforce compensation management leads to

A. succession planning
B. performance management
C. learning management systems
D. e-recruiting
Answer» C. learning management systems
40.

In Word you can force a page break–

A. By positioning your cursor at the appropriate place and pressing the F1 key
B. By positioning your cursor at the appropriate place and pressing Ctrl+Enter
C. By using the Insert/Section Break
D. By changing the font size of your document
E. None of these
Answer» C. By using the Insert/Section Break
41.

इन्टीग्रेटेड सर्किट चिप पर किसकी परत होती है ?

A. कॉपर
B. निकिल
C. सिलिकॉन
D. आयरन
Answer» D. आयरन
42.

The eye is nourished through

A. choroid coat
B. sclerotic coat
C. pupil
D. iris
Answer» B. sclerotic coat
43.

In table in excel, there are typical labels alongwith……

A. Letters
B. Numbers
C. Names
D. Formulae
Answer» C. Names
44.

Seeking guidance from experienced people for advising and counseling is called

A. mentoring
B. employee's performance
C. career interests
D. developmental needs
Answer» B. employee's performance
45.

बोले हुए शब्दों को टाइप में लिखने का यंत्र क्या कहलाता है ?

A. आडियोफोन
B. ग्रामोफोन
C. डिक्टाफोन
D. माइक्रोफोन
Answer» D. माइक्रोफोन
46.

इंटरनेट एक्सप्लोर जैसे प्रौग्रामों को क्या कहते हैं जो वेब में नेविगेबल विंडो का काम देते हैं ?

A. हाइपरटेक्स्ट
B. नेटवर्क
C. वेब ब्राउजर
D. इंटरनेट
Answer» D. इंटरनेट
47.

सेलेक्ट या हाईलाइट करने के लिए अक्सर ...... का प्रयोग किया जाता है ?

A. की-बोर्ड
B. माउस
C. आइकन
D. इनमें से कोई नहीं
Answer» C. आइकन
48.

एम. एस. डॉस आधारित पर्सनल कम्प्यूटरों पर निम्न में से कौनसा पैकेज डाटाबेस के रूप में अधिक पाया गया हैं ?

A. डोबेस-3
B. आटोकैड
C. कोरल
D. वर्ड -स्टार
Answer» B. आटोकैड
49.

To access properties of an object, the mouse technique to use is–

A. dragging
B. dropping
C. right-clicking
D. shift-clicking
E. None of these
Answer» D. shift-clicking
50.

The comparison of potential and current levels of market demand is called

A. market penetration index
B. target market index
C. potential market index
D. available market index
Answer» B. target market index