Explore topic-wise MCQs in Current Affairs.

This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

651.

A device that copies or reproduces text and images is also called a(n) :

A. optical scanner
B. bar code reader
C. character device
D. digital camera
E. Printer
Answer» B. bar code reader
652.

The proper definition of a modern digital computer is :

A. An electronic automated machine that can solve problems involving words and numbers
B. A more sophistic and modified electronic pocket calculator
C. Any machine that can perform mathematical operations
D. A machine that works on binary code
E. None of these
Answer» E. None of these
653.

The two basic types of record-access methods are :

A. Sequential and random
B. Sequential and indexed
C. Direct and Immediate
D. On-line and real time
E. None of these
Answer» B. Sequential and indexed
654.

How many margins are on a page?

A. Two (header and footer)
B. Four (top, bottom, right, left)
C. Two (landscape and Portrait)
D. Two (top and bottom)
E. None of these
Answer» C. Two (landscape and Portrait)
655.

A device for entering X-Y co-ordinates is known as

A. card reader
B. cassette tape
C. multiplexer
D. joystick
E. None of these
Answer» E. None of these
656.

A method used to refer to data that is located in an address field of an instruction in addressing

A. indirect
B. implied
C. immediate
D. register indexed
E. None of these
Answer» D. register indexed
657.

If an Excel Worksheet is to be linked for use in a Power Point presentation, the following should be clicked…………

A. Edit, Paste Special
B. Edit, Paste
C. Edit, Copy
D. File, Copy
E. None of these
Answer» B. Edit, Paste
658.

A binary digit, which can have a value of 0 to 1 is

A. byte
B. bit
C. decimal
D. octal
E. None of these
Answer» C. decimal
659.

……….are attempts by individuals to obtain confidential information from you to falsifying their indentity.

A. Phishing trips
B. Computer viruses
C. Spyware scams
D. Viruses
E. Phishing scams
Answer» B. Computer viruses
660.

Which generation of computer is still under development :

A. Fourth Generation
B. Fifth Generation
C. Sixth Generation
D. Seventh Generation
E. None of these
Answer» C. Sixth Generation
661.

Which of the following is another name for a chip?

A. Silicon chip
B. Integrated circuit
C. Semi conductor
D. All of these
E. None of these
Answer» C. Semi conductor
662.

A device used with a computer to display or store data is called

A. instruction
B. operand
C. peripheral
D. All of these
E. None of these
Answer» D. All of these
663.

A………….shares hardware, software, and data among authorized users.

A. network
B. protocol
C. hyperlink
D. transmitter
E. None of these
Answer» B. protocol
664.

Charts tips can :

A. Show the formatting of a data label
B. Show the name of a data series
C. Show the value of data point
D. Both (b) and (c)
E. None of these
Answer» C. Show the value of data point
665.

The Excel feature includes functions tocalculate an Average, Minimum, Maximum and Count.

A. Format
B. Number
C. Auto Sum
D. Calculate
E. MIN
Answer» E. MIN
666.

A memory device in which a location is identified by its contents rather than by name is known as

A. buffer
B. magnetic tape
C. associative storage
D. punched card
E. None of these
Answer» D. punched card
667.

When integrating MS-Word and Excel,Word is usually the :

A. Server
B. Source
C. Client
D. All of these
E. None of these
Answer» D. All of these
668.

MICR is exclusively used in :

A. Libraries
B. Super Markets
C. Stock markets
D. Banking Industry
E. None of these
Answer» E. None of these
669.

Temporary storage used to compensate for a difference in the speed of data flow is

A. main memory
B. buffer
C. protocol
D. RAM
E. None of these
Answer» C. protocol
670.

The main job of a CPU is to…………

A. carry out program instructions
B. store data/information for future use
C. process data and information
D. both (a) and (c)
E. None of these
Answer» E. None of these
671.

The personal computers are also called

A. desk top computers
B. palmtop computers
C. advanced computers
D. portable computers
E. None of these
Answer» B. palmtop computers
672.

Computers use the………….system toprocess data.

A. processing
B. kilobyte
C. binary
D. representational
E. None of these
Answer» D. representational
673.

File………..Shrinks the size of a file so itrequires less storage space.

A. scanning
B. synthesizing
C. defragmenting
D. compression
E. None of these
Answer» E. None of these
674.

The first machine to successfully perform a long series of arithmetic and logical operation was;

A. ENIAC
B. Mark I
C. Analytic engine
D. UNIVAC – I
E. None of these
Answer» C. Analytic engine
675.

To insert a page break in a WORD document, the following options are used………

A. Insert and Copy
B. Insert and Enter
C. Insert and Page Layout
D. Insert and Page Layout
E. Insert and Break
Answer» F.
676.

Which of the following are secondary storage devices?

A. Optical disks
B. RAM
C. Microprocessor
D. All of these
E. None of these
Answer» B. RAM
677.

What does an electronic spreadsheet consistof?(Choose the best answer)

A. Rows
B. Columns
C. Cells
D. All of these
E. None of these
Answer» E. None of these
678.

Programs designed specifically to address general-purpose applications and special- purpose applications are called………..

A. operating system
B. system software
C. application software
D. management information system
E. None of these
Answer» D. management information system
679.

The word FTP stands for

A. File Translate Protocol
B. File Transit Protocol
C. File Typing Protocol
D. File Transfer Protocol
E. None of these
Answer» B. File Transit Protocol
680.

Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ………..

A. software suites
B. integrated software packages
C. software processing packages
D. personal information managers
E. None of these
Answer» B. integrated software packages
681.

A limitation of software that digitizes voice data is that it :

A. is prohibitively expensive
B. must be trained to recognize individual voices.
C. can only be used on high-end computers
D. cannot be used on laptop computers
E. cannot be used on desktop computers
Answer» C. can only be used on high-end computers
682.

Passwords enable users to…………

A. get into the system quickly
B. make efficient use of time
C. retain confidentiality of files
D. simplify file structures
E. None of these
Answer» D. simplify file structures
683.

The effect of the ROLLBACK command in a transaction is the following _

A. Undo all changes to the data-base resulting from the execution of the transaction
B. Undo the effects of the last UPDATE command
C. Restore the content of the database to its state at the end of the previous day
D. Make sure that all changes to the database are in effect
E. None of these
Answer» B. Undo the effects of the last UPDATE command
684.

Information that comes from an externalsource and fed into compute software is called……….

A. Output
B. Input
C. Throughput
D. Reports
E. None of these
Answer» C. Throughput
685.

The purpose of the primary key in a database is to :

A. unlock the database
B. provide a map of the data
C. uniquely identify a record
D. establish constraints on database operations
E. None of these
Answer» C. uniquely identify a record
686.

………..is the storage area for e-mails.

A. Folder
B. Mail box
C. Directory
D. Hard Disk
E. None of these
Answer» C. Directory
687.

A computer-controlled device for training exercises that duplicates the work environment is a

A. simulator
B. duplicator
C. trainer
D. COM device
E. None of these
Answer» B. duplicator
688.

Applications are often referred to as :

A. data files
B. executable files
C. system software
D. the operating system
E. None of these
Answer» E. None of these
689.

Three types of compact disks include CD- ROM, CD-R, and …………..

A. CD-W
B. CD-RAM
C. CD-DVD
D. CD-RW
E. None of these
Answer» E. None of these
690.

A………..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

A. system virus
B. Trojan horse virus
C. file virus
D. macro virus
E. None of these
Answer» F.
691.

What is the function of R cycle Bin?

A. Store deleted file
B. Store temporary file
C. Store corrupted file
D. Store Document file
E. None of these
Answer» B. Store temporary file
692.

The tracks on a disk which can be accused without repositioning the R/W heads is

A. Surface
B. Cylinder
C. Cluster
D. All of these
E. None of these
Answer» C. Cluster
693.

The instructions that tell a computer how to carry out the processing tasks are referred to as computer…………

A. programs
B. processors
C. input devices
D. memory modules
E. None of these
Answer» B. processors
694.

Which is NOT a good Web security strategy?

A. Restrict access to the Web server; keep a minimum number of ports open
B. Limit the users who can load software, edit or add files.
C. Add demo programs, so users can test system without accessing production data.
D. Remove unnecessary compilers and interpreters
E. None of these
Answer» E. None of these
695.

The mechanical, magnetic, electronic and electrical devices from which a computer is fabricated is called

A. magnetic core
B. firm ware
C. hardware
D. software
E. None of these
Answer» B. firm ware
696.

How many keys were in keyboard used inearly days………..

A. 90
B. 95
C. 80
D. 85
E. 84
Answer» B. 95
697.

Computers designed for specialized work and specific instructions?

A. Mainframe computer
B. Special purpose computer
C. Portable computer
D. Super computer
E. None of these
Answer» E. None of these
698.

The wheel located between the two standard buttons on a mouse is used to :

A. click on Web pages
B. shutdown
C. click and select items
D. jump to different Web pages
E. scroll
Answer» E. scroll
699.

Saving is the process of :

A. copying a document from memory to a storage medium
B. making changes to a document’s existing content
C. changing the appearance or overall look, of a document
D. developing a document by entering text using a keyboard
E. None of these
Answer» B. making changes to a document’s existing content
700.

Encryption decryption are functions of :

A. Transport layer
B. Session layer
C. Presentation layer
D. All of these
E. None of these
Answer» C. Presentation layer