Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is the largest and most powerful computer manufacturer in the world?

A. IBM
B. Intel
C. Novel
D. Microsoft
E. None of these
Answer» B. Intel
2.

Which types of charts can excel produce?

A. Line graphs and pie charts only
B. Only line graphs
C. Bar charts, line graphs and pie charts
D. Bar charts and line graphs only
E. None of these
Answer» D. Bar charts and line graphs only
3.

A multiuser super micro system

A. uses 6-bit data buses
B. can not use the same type of microprocessor chips found in single user systems.
C. can handle a number of processing tasks concurrently
D. All of these
E. None of these
Answer» D. All of these
4.

Until a computer can recognize handwriting, an input device must :

A. store the information in secondary storage
B. optimise the information
C. digitise the information
D. show the information on a screen
E. become an output device also
Answer» C. digitise the information
5.

Which of the following is Not acharacteristic of E-mail?

A. Low cost
B. Record maintenance in database
C. High speed
D. Waste reduction
E. None of these
Answer» C. High speed
6.

Use this when you want to make all letters capital without having to use the shift key for each character………..

A. shifter
B. upper case
C. caps lock key
D. icon
E. None of these
Answer» D. icon
7.

A computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as :

A. Super computer
B. Mini computer
C. Micro computer
D. Macro computer
E. Mainframe computer
Answer» B. Mini computer
8.

The key F12 opens a :

A. Save As dialog box
B. Open dialog box
C. Save dialog box
D. Close dialog box
E. None of these
Answer» B. Open dialog box
9.

In the third generation of computers :

A. Distributed data processing first became popular
B. An operating system was first developed
C. High-level procedural languages were first used
D. On-line, real time systems first became popular
E. None of these
Answer» E. None of these
10.

A computer virus normally attaches itself to another computer program known as a…….

A. backdoor program
B. target program
C. trojan horse
D. host program
E. Bluetooth
Answer» D. host program
11.

The amount of time that is taken up in getting data from a disk is

A. delay time
B. access time
C. real time
D. latency
E. None of these
Answer» E. None of these
12.

By default, your documents print in……..……mode.

A. Landscape
B. Portrait
C. Page setup
D. Print preview
E. None of these
Answer» C. Page setup
13.

There are several security devices used tostop individuals from exploiting your system. Which of the following is used in conjunction with a firewall?

A. Proxy server
B. Intrusion-detection system
C. Terminal Server
D. Web server
E. None of these
Answer» B. Intrusion-detection system
14.

Specialized programs that allow particular input or output devices to communicate with1569.Storage that retains its data after the power is turned off is referred to as…………

A. volatile storage
B. sequential storage
C. direct storage
D. nonvolatile storage
E. Mobile storage
Answer» E. Mobile storage
15.

A polymorphic virus

A. modifies its program code each time it attaches itself to another program or file
B. is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains.
C. a malicious-logic program that hides within or looks like a legitimate program
D. infects a program file, but still reports the size and creation date of the original uninfected program
E. None of these
Answer» B. is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains.
16.

Smart Card is

A. Special purpose Cards
B. Microprocessor Cards
C. Processing unit contains memory for storing data
D. Processing unit for software handling
E. None of these
Answer» C. Processing unit contains memory for storing data
17.

Which of the following is a group of related characters that are treated as a single unit?

A. Array
B. File
C. Field
D. Block
E. None of these
Answer» D. Block
18.

The portion of the application that you work with in an application software package is the

A. user interface
B. utility interface
C. processing interface
D. analytical interface
E. None of these
Answer» B. utility interface
19.

If you want to secure a message, use a(n) :

A. cryptology source
B. encryption key
C. encryption software package
D. cryptosystem
E. None of these
Answer» E. None of these
20.

……….this is the act of copying or downloading a program from a network and making multiple copies of it.

A. Network piracy
B. Plagiarism
C. Software p racy
D. Site-license piracy
E. None of these
Answer» D. Site-license piracy
21.

A modern electronic computer is a machine that is meant for :

A. Doing quick mathematical calculations
B. Input, storage, manipulation and outputting of data
C. Electronic data processing
D. Performing repetitive tasks accurately
E. None of these
Answer» C. Electronic data processing
22.

A computer based system for the storage, cataloging and retrieval of documents is

A. electronic filling
B. polynomial
C. effective enumeration
D. All of these
E. None of these
Answer» B. polynomial
23.

When you insert a picture and adjust the height, Word automatically adjusts the…….to maintain the correct proportion.

A. pixel size
B. resolution
C. screen size
D. width
E. None of these
Answer» E. None of these
24.

Borders can be applied to :

A. Cells
B. Paragraph
C. Text
D. All of these
E. None of these
Answer» E. None of these
25.

Offline device is :

A. a device which is not connected to CPU
B. a device which i connected to CPU
C. a direct access storage device
D. an I/O device
E. None of these
Answer» B. a device which i connected to CPU
26.

Digital computer consumes electric power as compare to analog computer.

A. Equal
B. More
C. Less
D. Alike
E. None of these
Answer» B. More
27.

The design of the network is called the network :

A. architecture
B. server
C. transmission
D. type
E. None of these
Answer» B. server
28.

Which circular transparent disk has a pattern of a radial bars printed on it?

A. Milk disk
B. Optical disk
C. Hard disk
D. Mini disk
E. None of these
Answer» B. Optical disk
29.

The toolbar in which you can type a web address is the………..Bar?

A. Address
B. Format
C. Status
D. Navigation
E. None
Answer» B. Format
30.

What type of devices are CDs or DVDs?

A. Input
B. Output
C. Software
D. Storage
E. Input/Output
Answer» E. Input/Output
31.

The advantage of a LAN is……….

A. Sharing peripherals
B. Backing up your data
C. Saving all your data
D. Accessing the Web
E. Automatic printing of data
Answer» B. Backing up your data
32.

Older network often use another type of cable, called………..

A. Twisted-pair cable
B. Unshielded twisted-pair cable
C. Coaxial cable
D. Optical Fiber
E. None of these
Answer» D. Optical Fiber
33.

The information you put into the computer is called………..

A. facts
B. data
C. files
D. directory
E. None of these
Answer» C. files
34.

Which of the following is the earliest calculating device?

A. Abacus
B. Clock
C. Difference Engine
D. Calculator
E. None of these
Answer» B. Clock
35.

In concern of databases, what does OLTP stands for?

A. On-Line Transfer Process
B. On-Line Transfer Protocol
C. On-Line Transaction Protocol
D. On-Line Transaction Processing
E. None of the above
Answer» E. None of the above
36.

In order to save an existing document with a different name you need to………..

A. Retype the document and give it a different name
B. Use the Save As Command
C. Copy and paste the original document to a new document and then save
D. Use Windows Explorer to copy the document to a different location and then rename it.
E. None of these
Answer» C. Copy and paste the original document to a new document and then save
37.

RJ45 UTP cable has………Cable :

A. 2 pair
B. 3 pair
C. 4 pair
D. 5 pair
E. None of these
Answer» D. 5 pair
38.

What is the function of a router?

A. To connect your computer to another computer.
B. To connect two servers to increase transmission speed.
C. To connect two different networks.
D. To connect very distant segments from the same network.
E. None of these
Answer» D. To connect very distant segments from the same network.
39.

A half byte is known as :

A. Data
B. Bit
C. Half byte
D. Nibble
E. None of these
Answer» E. None of these
40.

All of the following are steps involved in the boot process EXCEPT :

A. load the operating system to RAM
B. the power-on self-test
C. activate the basic input/output system (BIOS)
D. load application programs
E. None of these
Answer» E. None of these
41.

Cloud computing means

A. Computing using the satellite
B. Computing using cloud chamber technology
C. Computing which results in errors
D. Shifting computing power from offline PCs and Laptops onto the Web
E. None of these
Answer» E. None of these
42.

The geometric arrangement of devices on the network is called………..

A. Topology
B. Media
C. URL
D. Protocol
E. Pipelining
Answer» B. Media
43.

The spacing between character pairs iscalled :

A. Kerning
B. x-height
C. intercap
D. serif
E. None of these
Answer» B. x-height
44.

Each memory cell has a unique number, assigned to it is called as the……….of the cell

A. Address
B. Register
C. Number
D. Path
E. None of these
Answer» B. Register
45.

The computer’s capability of distinguishingspoken words is called………….

A. voice analysis
B. speech acknowledgement
C. voice recognition
D. speech interpretation
E. vocalization
Answer» F.
46.

A popular way to learn about computers without ever going to a classroom is called……..

A. i-learning
B. isolated learning
C. e-learning
D. close learning
E. Distance learning
Answer» D. close learning
47.

To reverse the effect of your last action in word,………….

A. Use the cut command
B. Use the Undo command
C. Press the delete key
D. Use the Redo command
E. None of these
Answer» C. Press the delete key
48.

Which of the following is not one of the syntax rules?

A. The order in which you list the function’s arguments
B. The precedence of the arguments
C. Whether or not the function has arguments
D. Properly spelling the function’s name
E. None of these
Answer» B. The precedence of the arguments
49.

To keep files organized, related documents are often stored in……….(also called directories) located on the storage medium.

A. indexes
B. labels
C. folders
D. programs
E. cabinets
Answer» D. programs
50.

What is the meaning of “Hibernate” in Windows XP/Windows7?

A. Restart the Computer is safe mode
B. Restart the Computer in hibernate mode
C. Shutdown the Computer terminating all the running applications
D. Shutdown the Computer without closing the running applications
E. None of these
Answer» E. None of these