MCQOPTIONS
Saved Bookmarks
This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 651. |
A device that copies or reproduces text and images is also called a(n) : |
| A. | optical scanner |
| B. | bar code reader |
| C. | character device |
| D. | digital camera |
| E. | Printer |
| Answer» B. bar code reader | |
| 652. |
The proper definition of a modern digital computer is : |
| A. | An electronic automated machine that can solve problems involving words and numbers |
| B. | A more sophistic and modified electronic pocket calculator |
| C. | Any machine that can perform mathematical operations |
| D. | A machine that works on binary code |
| E. | None of these |
| Answer» E. None of these | |
| 653. |
The two basic types of record-access methods are : |
| A. | Sequential and random |
| B. | Sequential and indexed |
| C. | Direct and Immediate |
| D. | On-line and real time |
| E. | None of these |
| Answer» B. Sequential and indexed | |
| 654. |
How many margins are on a page? |
| A. | Two (header and footer) |
| B. | Four (top, bottom, right, left) |
| C. | Two (landscape and Portrait) |
| D. | Two (top and bottom) |
| E. | None of these |
| Answer» C. Two (landscape and Portrait) | |
| 655. |
A device for entering X-Y co-ordinates is known as |
| A. | card reader |
| B. | cassette tape |
| C. | multiplexer |
| D. | joystick |
| E. | None of these |
| Answer» E. None of these | |
| 656. |
A method used to refer to data that is located in an address field of an instruction in addressing |
| A. | indirect |
| B. | implied |
| C. | immediate |
| D. | register indexed |
| E. | None of these |
| Answer» D. register indexed | |
| 657. |
If an Excel Worksheet is to be linked for use in a Power Point presentation, the following should be clicked………… |
| A. | Edit, Paste Special |
| B. | Edit, Paste |
| C. | Edit, Copy |
| D. | File, Copy |
| E. | None of these |
| Answer» B. Edit, Paste | |
| 658. |
A binary digit, which can have a value of 0 to 1 is |
| A. | byte |
| B. | bit |
| C. | decimal |
| D. | octal |
| E. | None of these |
| Answer» C. decimal | |
| 659. |
……….are attempts by individuals to obtain confidential information from you to falsifying their indentity. |
| A. | Phishing trips |
| B. | Computer viruses |
| C. | Spyware scams |
| D. | Viruses |
| E. | Phishing scams |
| Answer» B. Computer viruses | |
| 660. |
Which generation of computer is still under development : |
| A. | Fourth Generation |
| B. | Fifth Generation |
| C. | Sixth Generation |
| D. | Seventh Generation |
| E. | None of these |
| Answer» C. Sixth Generation | |
| 661. |
Which of the following is another name for a chip? |
| A. | Silicon chip |
| B. | Integrated circuit |
| C. | Semi conductor |
| D. | All of these |
| E. | None of these |
| Answer» C. Semi conductor | |
| 662. |
A device used with a computer to display or store data is called |
| A. | instruction |
| B. | operand |
| C. | peripheral |
| D. | All of these |
| E. | None of these |
| Answer» D. All of these | |
| 663. |
A………….shares hardware, software, and data among authorized users. |
| A. | network |
| B. | protocol |
| C. | hyperlink |
| D. | transmitter |
| E. | None of these |
| Answer» B. protocol | |
| 664. |
Charts tips can : |
| A. | Show the formatting of a data label |
| B. | Show the name of a data series |
| C. | Show the value of data point |
| D. | Both (b) and (c) |
| E. | None of these |
| Answer» C. Show the value of data point | |
| 665. |
The Excel feature includes functions tocalculate an Average, Minimum, Maximum and Count. |
| A. | Format |
| B. | Number |
| C. | Auto Sum |
| D. | Calculate |
| E. | MIN |
| Answer» E. MIN | |
| 666. |
A memory device in which a location is identified by its contents rather than by name is known as |
| A. | buffer |
| B. | magnetic tape |
| C. | associative storage |
| D. | punched card |
| E. | None of these |
| Answer» D. punched card | |
| 667. |
When integrating MS-Word and Excel,Word is usually the : |
| A. | Server |
| B. | Source |
| C. | Client |
| D. | All of these |
| E. | None of these |
| Answer» D. All of these | |
| 668. |
MICR is exclusively used in : |
| A. | Libraries |
| B. | Super Markets |
| C. | Stock markets |
| D. | Banking Industry |
| E. | None of these |
| Answer» E. None of these | |
| 669. |
Temporary storage used to compensate for a difference in the speed of data flow is |
| A. | main memory |
| B. | buffer |
| C. | protocol |
| D. | RAM |
| E. | None of these |
| Answer» C. protocol | |
| 670. |
The main job of a CPU is to………… |
| A. | carry out program instructions |
| B. | store data/information for future use |
| C. | process data and information |
| D. | both (a) and (c) |
| E. | None of these |
| Answer» E. None of these | |
| 671. |
The personal computers are also called |
| A. | desk top computers |
| B. | palmtop computers |
| C. | advanced computers |
| D. | portable computers |
| E. | None of these |
| Answer» B. palmtop computers | |
| 672. |
Computers use the………….system toprocess data. |
| A. | processing |
| B. | kilobyte |
| C. | binary |
| D. | representational |
| E. | None of these |
| Answer» D. representational | |
| 673. |
File………..Shrinks the size of a file so itrequires less storage space. |
| A. | scanning |
| B. | synthesizing |
| C. | defragmenting |
| D. | compression |
| E. | None of these |
| Answer» E. None of these | |
| 674. |
The first machine to successfully perform a long series of arithmetic and logical operation was; |
| A. | ENIAC |
| B. | Mark I |
| C. | Analytic engine |
| D. | UNIVAC – I |
| E. | None of these |
| Answer» C. Analytic engine | |
| 675. |
To insert a page break in a WORD document, the following options are used……… |
| A. | Insert and Copy |
| B. | Insert and Enter |
| C. | Insert and Page Layout |
| D. | Insert and Page Layout |
| E. | Insert and Break |
| Answer» F. | |
| 676. |
Which of the following are secondary storage devices? |
| A. | Optical disks |
| B. | RAM |
| C. | Microprocessor |
| D. | All of these |
| E. | None of these |
| Answer» B. RAM | |
| 677. |
What does an electronic spreadsheet consistof?(Choose the best answer) |
| A. | Rows |
| B. | Columns |
| C. | Cells |
| D. | All of these |
| E. | None of these |
| Answer» E. None of these | |
| 678. |
Programs designed specifically to address general-purpose applications and special- purpose applications are called……….. |
| A. | operating system |
| B. | system software |
| C. | application software |
| D. | management information system |
| E. | None of these |
| Answer» D. management information system | |
| 679. |
The word FTP stands for |
| A. | File Translate Protocol |
| B. | File Transit Protocol |
| C. | File Typing Protocol |
| D. | File Transfer Protocol |
| E. | None of these |
| Answer» B. File Transit Protocol | |
| 680. |
Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ……….. |
| A. | software suites |
| B. | integrated software packages |
| C. | software processing packages |
| D. | personal information managers |
| E. | None of these |
| Answer» B. integrated software packages | |
| 681. |
A limitation of software that digitizes voice data is that it : |
| A. | is prohibitively expensive |
| B. | must be trained to recognize individual voices. |
| C. | can only be used on high-end computers |
| D. | cannot be used on laptop computers |
| E. | cannot be used on desktop computers |
| Answer» C. can only be used on high-end computers | |
| 682. |
Passwords enable users to………… |
| A. | get into the system quickly |
| B. | make efficient use of time |
| C. | retain confidentiality of files |
| D. | simplify file structures |
| E. | None of these |
| Answer» D. simplify file structures | |
| 683. |
The effect of the ROLLBACK command in a transaction is the following _ |
| A. | Undo all changes to the data-base resulting from the execution of the transaction |
| B. | Undo the effects of the last UPDATE command |
| C. | Restore the content of the database to its state at the end of the previous day |
| D. | Make sure that all changes to the database are in effect |
| E. | None of these |
| Answer» B. Undo the effects of the last UPDATE command | |
| 684. |
Information that comes from an externalsource and fed into compute software is called………. |
| A. | Output |
| B. | Input |
| C. | Throughput |
| D. | Reports |
| E. | None of these |
| Answer» C. Throughput | |
| 685. |
The purpose of the primary key in a database is to : |
| A. | unlock the database |
| B. | provide a map of the data |
| C. | uniquely identify a record |
| D. | establish constraints on database operations |
| E. | None of these |
| Answer» C. uniquely identify a record | |
| 686. |
………..is the storage area for e-mails. |
| A. | Folder |
| B. | Mail box |
| C. | Directory |
| D. | Hard Disk |
| E. | None of these |
| Answer» C. Directory | |
| 687. |
A computer-controlled device for training exercises that duplicates the work environment is a |
| A. | simulator |
| B. | duplicator |
| C. | trainer |
| D. | COM device |
| E. | None of these |
| Answer» B. duplicator | |
| 688. |
Applications are often referred to as : |
| A. | data files |
| B. | executable files |
| C. | system software |
| D. | the operating system |
| E. | None of these |
| Answer» E. None of these | |
| 689. |
Three types of compact disks include CD- ROM, CD-R, and ………….. |
| A. | CD-W |
| B. | CD-RAM |
| C. | CD-DVD |
| D. | CD-RW |
| E. | None of these |
| Answer» E. None of these | |
| 690. |
A………..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk. |
| A. | system virus |
| B. | Trojan horse virus |
| C. | file virus |
| D. | macro virus |
| E. | None of these |
| Answer» F. | |
| 691. |
What is the function of R cycle Bin? |
| A. | Store deleted file |
| B. | Store temporary file |
| C. | Store corrupted file |
| D. | Store Document file |
| E. | None of these |
| Answer» B. Store temporary file | |
| 692. |
The tracks on a disk which can be accused without repositioning the R/W heads is |
| A. | Surface |
| B. | Cylinder |
| C. | Cluster |
| D. | All of these |
| E. | None of these |
| Answer» C. Cluster | |
| 693. |
The instructions that tell a computer how to carry out the processing tasks are referred to as computer………… |
| A. | programs |
| B. | processors |
| C. | input devices |
| D. | memory modules |
| E. | None of these |
| Answer» B. processors | |
| 694. |
Which is NOT a good Web security strategy? |
| A. | Restrict access to the Web server; keep a minimum number of ports open |
| B. | Limit the users who can load software, edit or add files. |
| C. | Add demo programs, so users can test system without accessing production data. |
| D. | Remove unnecessary compilers and interpreters |
| E. | None of these |
| Answer» E. None of these | |
| 695. |
The mechanical, magnetic, electronic and electrical devices from which a computer is fabricated is called |
| A. | magnetic core |
| B. | firm ware |
| C. | hardware |
| D. | software |
| E. | None of these |
| Answer» B. firm ware | |
| 696. |
How many keys were in keyboard used inearly days……….. |
| A. | 90 |
| B. | 95 |
| C. | 80 |
| D. | 85 |
| E. | 84 |
| Answer» B. 95 | |
| 697. |
Computers designed for specialized work and specific instructions? |
| A. | Mainframe computer |
| B. | Special purpose computer |
| C. | Portable computer |
| D. | Super computer |
| E. | None of these |
| Answer» E. None of these | |
| 698. |
The wheel located between the two standard buttons on a mouse is used to : |
| A. | click on Web pages |
| B. | shutdown |
| C. | click and select items |
| D. | jump to different Web pages |
| E. | scroll |
| Answer» E. scroll | |
| 699. |
Saving is the process of : |
| A. | copying a document from memory to a storage medium |
| B. | making changes to a document’s existing content |
| C. | changing the appearance or overall look, of a document |
| D. | developing a document by entering text using a keyboard |
| E. | None of these |
| Answer» B. making changes to a document’s existing content | |
| 700. |
Encryption decryption are functions of : |
| A. | Transport layer |
| B. | Session layer |
| C. | Presentation layer |
| D. | All of these |
| E. | None of these |
| Answer» C. Presentation layer | |