Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

To ‘maximize’ a window means to……….

A. fill it to capacity
B. expand it to fit the desktop
C. put only like files inside
D. drag it to the Recycle bin
E. None of these
Answer» C. put only like files inside
2.

What type of connector is used to plug a telephone line into a modem?

A. COM1
B. RJ-11
C. RJ-45
D. RJ-10
E. None of these
Answer» C. RJ-45
3.

The operating system that is self-contained in a device and resident in the ROM is…………

A. Batch Operating System
B. Real-time Opearting System
C. Embedded Operating System
D. Multi Operating System
E. None of these
Answer» D. Multi Operating System
4.

To specify margins in Word, the user has to select Page Setup option from the……….. menu.

A. Edit
B. Table
C. Autocorrect
D. File
E. Format
Answer» F.
5.

The person who writes and tests computer programs is called a…………

A. programmer
B. computer scientist
C. software engineer
D. project developer
E. None of these
Answer» D. project developer
6.

In which mode, each user has a local input/output device?

A. Interactive
B. Time sharing mode
C. Batch processing mode
D. All of these
E. None of these
Answer» C. Batch processing mode
7.

A language used for expressing program designs is known as

A. APL
B. PDL
C. PL/1
D. SNOBOL
E. None of these
Answer» C. PL/1
8.

An example of processing device would be………..

A. a magnetic ink reader
B. a tablet PC
C. special function cards
D. scanners
E. keyboards
Answer» E. keyboards
9.

Full form of PC :

A. Personal Computer
B. Process Control
C. Production Computer
D. Painful Creation
E. Permanent Computer
Answer» B. Process Control
10.

How many write cycles are allowed to a EEPROM?

A. 1
B. 10
C. 100
D. 1000
E. None of these
Answer» E. None of these
11.

When data changes in multiple lists and all lists are not updated, this causes……….

A. data redundancy
B. information overload
C. duplicate data
D. data inconsistency
E. data repetition
Answer» E. data repetition
12.

Documentation while developing a software for a bank is required for :

A. Editing
B. Auditing
C. Correction
D. All of these
E. None of these
Answer» C. Correction
13.

What is the transfer rate of a standard USB2.0 Device?

A. 100 Mbit/s
B. 480 Mbit/s
C. 1 Gbit/s
D. 250 Mbit/s
E. None of these
Answer» C. 1 Gbit/s
14.

Indicate which of the following is not true about an interpreter

A. Interpreter generates an object program from the source program
B. Interpreter is a kind of translator
C. Interpreter analyses each source statement every time it is to be executed
D. All of these
E. None of these
Answer» C. Interpreter analyses each source statement every time it is to be executed
15.

The part of a computer system that enables human operators to communicate with the computer is

A. control unit
B. CPU
C. console
D. ALU
E. None of these
Answer» D. ALU
16.

WAIS stands for :

A. Wide Area Intellectual Service
B. Web Access Information System
C. World wide Application of Intelligent System
D. Wide Area Information Service
E. None of these
Answer» E. None of these
17.

What happens when you press the Ctrl + V key?

A. A Capital V letter is typed into your document at the cursor point
B. The selected item is pasted from the Clipboard
C. The selected item is pasted to the Clipboard
D. The selected drawing objects are distributed vertically on the page
E. None of these
Answer» C. The selected item is pasted to the Clipboard
18.

Which of the following is NOT one of thefour major data processing functions of a computer?

A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
E. None of these
Answer» D. storing the data or information
19.

Unauthorized copying, of software to be used for personal gain instead of for personal backups is called……….

A. program thievery
B. data snatching
C. software piracy
D. program looting
E. data looting
Answer» D. program looting
20.

What does FDISK do?

A. performs low-level formatting of the hard drive
B. fixes bad sectors on the hard drive
C. recovers lost clusters on the hard drive
D. creates partitions on the hard drive
E. None of these
Answer» E. None of these
21.

For a computer to recognize and understand analog data, it must first be:

A. sent to a mainframe for interpretation
B. analyzed by the ALU of the CPU
C. decoded
D. analysed for viruses
E. digitized
Answer» B. analyzed by the ALU of the CPU
22.

A…………is anything that can cause harm.

A. vulnerability
B. phish
C. threat
D. spoof
E. None of these
Answer» D. spoof
23.

Voice recognition is :

A. Ability to input data directly into a computer system by speaking to it
B. Ability to output data directly from a computer system by speaking
C. Processing of voice in computer system
D. Both (a) and (b)
E. None of these
Answer» B. Ability to output data directly from a computer system by speaking
24.

A key that must be pressed each time a new command or information is entered………..

A. esc
B. enter
C. delete
D. home
E. None of these
Answer» C. delete
25.

An interface that can be used to connect the microcomputer bus to…………..is called an I/O Port.

A. Flip Flops
B. Memory
C. Peripheral devices
D. Multiplexers
E. None of these
Answer» E. None of these
26.

All the instructions and procedures needed to start Up a computer, to the point it can load an operating system are stored in ROM chips. In IBM compatible PCs this is called the

A. RAM BIOS
B. ROM BIOS
C. EPROM
D. POST
E. None of these
Answer» C. EPROM
27.

To select or unselect one word to the right.

A. CTRL + SHIFT
B. CTRL + SHIFT + Up Arrow
C. CTRL + SHIFT + Down Arrow
D. CTRL + SHIFT + Right Arrow
E. None of these
Answer» E. None of these
28.

A two-or-three character code used in teletypewriter systems to activate a particular machine is known as

A. gray code
B. bar code
C. call-directing code
D. mnemonics
E. None of these
Answer» D. mnemonics
29.

What are the two parts of an E-mail address?

A. User name and street address
B. Legal name and phone number
C. User name and domain name
D. Initials and password
E. User Name and Recipient Name
Answer» D. Initials and password
30.

The memory stees in mainframe computers and advanced technology micro computers are expressed as

A. bytes
B. kilo-bytes
C. bits
D. megabytes
E. None of these
Answer» E. None of these
31.

A computer system that is old and perhapsnot satisfactory is referred to as a(n) _

A. Ancient system
B. Historical system
C. Age-old system
D. Legacy system
E. Legal system
Answer» E. Legal system
32.

You can check the conditions against…….. when applying conditional formatting :

A. Cell value
B. Formula
C. Alignment
D. Both (a) and (b)
E. None of these
Answer» E. None of these
33.

A trackball is manipulated by

A. palm
B. foot
C. fingers
D. sound
E. None of these
Answer» B. foot
34.

The resolution of the screen is indicated by:

A. pixels
B. dots
C. lines
D. colors
E. None of these
Answer» B. dots
35.

An interrupt handler is a(n) :

A. location in memory that keeps track of recently generated interrupts.
B. peripheral device
C. utility program
D. special numeric code that indicates the priority of a request
E. None of these
Answer» E. None of these
36.

A group of signal lines used to transmit data in parallel from one element of a computer to another is

A. control bus
B. address bus
C. databus
D. network
E. None of these
Answer» D. network
37.

The most common method of entering text and numerical data into a computer system is through the use of a……….

A. keyboard
B. scanner
C. printer
D. plotter
E. None of these
Answer» B. scanner
38.

Compartibility in regard to computers refers to :

A. the software doing the right job for the user
B. it being versatile enough to handle the job
C. the software being able to run on the computer
D. software running with other previously installed software
E. None of these
Answer» D. software running with other previously installed software
39.

…………is a technique of temporarily removing inactive programs from the memory of computer system

A. Swapping
B. Spooling
C. Semaphore
D. Scheduler
E. None of these
Answer» B. Spooling
40.

Virtual memory is typically located :

A. on a floppy disk
B. in the CPU
C. in a flash card
D. on the hard drive
E. None of these
Answer» E. None of these
41.

Large transaction processing systems in automated organizations use………….

A. Online Processing
B. Batch Processing
C. Once-a-Day Processing
D. End-of-a Day Processing
E. Once-a-week Processing
Answer» C. Once-a-Day Processing
42.

Basic purpose of the testing of the program is :

A. to detect software failures so that defects may be discovered and corrected
B. to remove the bugs and also to reduce the labour cost
C. to ensure that program is meeting the specified requirements
D. All of these
E. None of these
Answer» E. None of these
43.

A(n) -----system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.

A. PSS
B. POS
C. Inventory
D. data mining
E. None of these
Answer» B. POS
44.

How much data can be stored in one CD………….

A. 100t mb
B. 2.5 mb
C. 700 mb
D. 500 mb
E. None of these
Answer» D. 500 mb
45.

Which of the following programs give instructions about operations inside the computer?

A. system
B. Application
C. Utility
D. Compiler
E. None of these
Answer» B. Application
46.

IMB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operating system from Microsoft, the printer from Epson and the application software from everywhere. Can you name the country which contributed the video display?

A. India
B. China
C. Germany
D. Taiwan
E. Japan
Answer» E. Japan
47.

To identify a document, it is helpful to include the file name on each page as a

A. header/footer
B. bibliography
C. find/search
D. macro
E. None of these
Answer» B. bibliography
48.

Single party disk relying on the disk controller for finding out which disk has failed is used by :

A. RAID level 5
B. RAID level 2
C. RAID level 4
D. RAID level 3
E. RAID level 1
Answer» E. RAID level 1
49.

What’s considered the “backbone” of the World Wide Web?

A. Uniform resource locator (URL)
B. Hypertext mark-up language (HTML)
C. Hypertext transfer protocol (HTTP)
D. File transfer protocol (FTP)
E. None of these
Answer» D. File transfer protocol (FTP)
50.

A key that will erase information from the computer’s memory and characters on the screen……….

A. edit
B. delete key
C. dummy out
D. trust key
E. esc key
Answer» C. dummy out