Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

A device that copies or reproduces text and images is also called a(n) :

A. optical scanner
B. bar code reader
C. character device
D. digital camera
E. Printer
Answer» B. bar code reader
2.

The proper definition of a modern digital computer is :

A. An electronic automated machine that can solve problems involving words and numbers
B. A more sophistic and modified electronic pocket calculator
C. Any machine that can perform mathematical operations
D. A machine that works on binary code
E. None of these
Answer» E. None of these
3.

The two basic types of record-access methods are :

A. Sequential and random
B. Sequential and indexed
C. Direct and Immediate
D. On-line and real time
E. None of these
Answer» B. Sequential and indexed
4.

How many margins are on a page?

A. Two (header and footer)
B. Four (top, bottom, right, left)
C. Two (landscape and Portrait)
D. Two (top and bottom)
E. None of these
Answer» C. Two (landscape and Portrait)
5.

A device for entering X-Y co-ordinates is known as

A. card reader
B. cassette tape
C. multiplexer
D. joystick
E. None of these
Answer» E. None of these
6.

A method used to refer to data that is located in an address field of an instruction in addressing

A. indirect
B. implied
C. immediate
D. register indexed
E. None of these
Answer» D. register indexed
7.

If an Excel Worksheet is to be linked for use in a Power Point presentation, the following should be clicked…………

A. Edit, Paste Special
B. Edit, Paste
C. Edit, Copy
D. File, Copy
E. None of these
Answer» B. Edit, Paste
8.

A binary digit, which can have a value of 0 to 1 is

A. byte
B. bit
C. decimal
D. octal
E. None of these
Answer» C. decimal
9.

……….are attempts by individuals to obtain confidential information from you to falsifying their indentity.

A. Phishing trips
B. Computer viruses
C. Spyware scams
D. Viruses
E. Phishing scams
Answer» B. Computer viruses
10.

Which generation of computer is still under development :

A. Fourth Generation
B. Fifth Generation
C. Sixth Generation
D. Seventh Generation
E. None of these
Answer» C. Sixth Generation
11.

Which of the following is another name for a chip?

A. Silicon chip
B. Integrated circuit
C. Semi conductor
D. All of these
E. None of these
Answer» C. Semi conductor
12.

A device used with a computer to display or store data is called

A. instruction
B. operand
C. peripheral
D. All of these
E. None of these
Answer» D. All of these
13.

A………….shares hardware, software, and data among authorized users.

A. network
B. protocol
C. hyperlink
D. transmitter
E. None of these
Answer» B. protocol
14.

Charts tips can :

A. Show the formatting of a data label
B. Show the name of a data series
C. Show the value of data point
D. Both (b) and (c)
E. None of these
Answer» C. Show the value of data point
15.

The Excel feature includes functions tocalculate an Average, Minimum, Maximum and Count.

A. Format
B. Number
C. Auto Sum
D. Calculate
E. MIN
Answer» E. MIN
16.

A memory device in which a location is identified by its contents rather than by name is known as

A. buffer
B. magnetic tape
C. associative storage
D. punched card
E. None of these
Answer» D. punched card
17.

When integrating MS-Word and Excel,Word is usually the :

A. Server
B. Source
C. Client
D. All of these
E. None of these
Answer» D. All of these
18.

MICR is exclusively used in :

A. Libraries
B. Super Markets
C. Stock markets
D. Banking Industry
E. None of these
Answer» E. None of these
19.

Temporary storage used to compensate for a difference in the speed of data flow is

A. main memory
B. buffer
C. protocol
D. RAM
E. None of these
Answer» C. protocol
20.

The main job of a CPU is to…………

A. carry out program instructions
B. store data/information for future use
C. process data and information
D. both (a) and (c)
E. None of these
Answer» E. None of these
21.

The personal computers are also called

A. desk top computers
B. palmtop computers
C. advanced computers
D. portable computers
E. None of these
Answer» B. palmtop computers
22.

Computers use the………….system toprocess data.

A. processing
B. kilobyte
C. binary
D. representational
E. None of these
Answer» D. representational
23.

File………..Shrinks the size of a file so itrequires less storage space.

A. scanning
B. synthesizing
C. defragmenting
D. compression
E. None of these
Answer» E. None of these
24.

The first machine to successfully perform a long series of arithmetic and logical operation was;

A. ENIAC
B. Mark I
C. Analytic engine
D. UNIVAC – I
E. None of these
Answer» C. Analytic engine
25.

To insert a page break in a WORD document, the following options are used………

A. Insert and Copy
B. Insert and Enter
C. Insert and Page Layout
D. Insert and Page Layout
E. Insert and Break
Answer» F.
26.

Which of the following are secondary storage devices?

A. Optical disks
B. RAM
C. Microprocessor
D. All of these
E. None of these
Answer» B. RAM
27.

What does an electronic spreadsheet consistof?(Choose the best answer)

A. Rows
B. Columns
C. Cells
D. All of these
E. None of these
Answer» E. None of these
28.

Programs designed specifically to address general-purpose applications and special- purpose applications are called………..

A. operating system
B. system software
C. application software
D. management information system
E. None of these
Answer» D. management information system
29.

The word FTP stands for

A. File Translate Protocol
B. File Transit Protocol
C. File Typing Protocol
D. File Transfer Protocol
E. None of these
Answer» B. File Transit Protocol
30.

Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ………..

A. software suites
B. integrated software packages
C. software processing packages
D. personal information managers
E. None of these
Answer» B. integrated software packages
31.

A limitation of software that digitizes voice data is that it :

A. is prohibitively expensive
B. must be trained to recognize individual voices.
C. can only be used on high-end computers
D. cannot be used on laptop computers
E. cannot be used on desktop computers
Answer» C. can only be used on high-end computers
32.

Passwords enable users to…………

A. get into the system quickly
B. make efficient use of time
C. retain confidentiality of files
D. simplify file structures
E. None of these
Answer» D. simplify file structures
33.

The effect of the ROLLBACK command in a transaction is the following _

A. Undo all changes to the data-base resulting from the execution of the transaction
B. Undo the effects of the last UPDATE command
C. Restore the content of the database to its state at the end of the previous day
D. Make sure that all changes to the database are in effect
E. None of these
Answer» B. Undo the effects of the last UPDATE command
34.

Information that comes from an externalsource and fed into compute software is called……….

A. Output
B. Input
C. Throughput
D. Reports
E. None of these
Answer» C. Throughput
35.

The purpose of the primary key in a database is to :

A. unlock the database
B. provide a map of the data
C. uniquely identify a record
D. establish constraints on database operations
E. None of these
Answer» C. uniquely identify a record
36.

………..is the storage area for e-mails.

A. Folder
B. Mail box
C. Directory
D. Hard Disk
E. None of these
Answer» C. Directory
37.

A computer-controlled device for training exercises that duplicates the work environment is a

A. simulator
B. duplicator
C. trainer
D. COM device
E. None of these
Answer» B. duplicator
38.

Applications are often referred to as :

A. data files
B. executable files
C. system software
D. the operating system
E. None of these
Answer» E. None of these
39.

Three types of compact disks include CD- ROM, CD-R, and …………..

A. CD-W
B. CD-RAM
C. CD-DVD
D. CD-RW
E. None of these
Answer» E. None of these
40.

A………..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

A. system virus
B. Trojan horse virus
C. file virus
D. macro virus
E. None of these
Answer» F.
41.

What is the function of R cycle Bin?

A. Store deleted file
B. Store temporary file
C. Store corrupted file
D. Store Document file
E. None of these
Answer» B. Store temporary file
42.

The tracks on a disk which can be accused without repositioning the R/W heads is

A. Surface
B. Cylinder
C. Cluster
D. All of these
E. None of these
Answer» C. Cluster
43.

The instructions that tell a computer how to carry out the processing tasks are referred to as computer…………

A. programs
B. processors
C. input devices
D. memory modules
E. None of these
Answer» B. processors
44.

Which is NOT a good Web security strategy?

A. Restrict access to the Web server; keep a minimum number of ports open
B. Limit the users who can load software, edit or add files.
C. Add demo programs, so users can test system without accessing production data.
D. Remove unnecessary compilers and interpreters
E. None of these
Answer» E. None of these
45.

The mechanical, magnetic, electronic and electrical devices from which a computer is fabricated is called

A. magnetic core
B. firm ware
C. hardware
D. software
E. None of these
Answer» B. firm ware
46.

How many keys were in keyboard used inearly days………..

A. 90
B. 95
C. 80
D. 85
E. 84
Answer» B. 95
47.

Computers designed for specialized work and specific instructions?

A. Mainframe computer
B. Special purpose computer
C. Portable computer
D. Super computer
E. None of these
Answer» E. None of these
48.

The wheel located between the two standard buttons on a mouse is used to :

A. click on Web pages
B. shutdown
C. click and select items
D. jump to different Web pages
E. scroll
Answer» E. scroll
49.

Saving is the process of :

A. copying a document from memory to a storage medium
B. making changes to a document’s existing content
C. changing the appearance or overall look, of a document
D. developing a document by entering text using a keyboard
E. None of these
Answer» B. making changes to a document’s existing content
50.

Encryption decryption are functions of :

A. Transport layer
B. Session layer
C. Presentation layer
D. All of these
E. None of these
Answer» C. Presentation layer