MCQOPTIONS
Saved Bookmarks
This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 801. |
Which of the following is the largest and most powerful computer manufacturer in the world? |
| A. | IBM |
| B. | Intel |
| C. | Novel |
| D. | Microsoft |
| E. | None of these |
| Answer» B. Intel | |
| 802. |
Which types of charts can excel produce? |
| A. | Line graphs and pie charts only |
| B. | Only line graphs |
| C. | Bar charts, line graphs and pie charts |
| D. | Bar charts and line graphs only |
| E. | None of these |
| Answer» D. Bar charts and line graphs only | |
| 803. |
A multiuser super micro system |
| A. | uses 6-bit data buses |
| B. | can not use the same type of microprocessor chips found in single user systems. |
| C. | can handle a number of processing tasks concurrently |
| D. | All of these |
| E. | None of these |
| Answer» D. All of these | |
| 804. |
Until a computer can recognize handwriting, an input device must : |
| A. | store the information in secondary storage |
| B. | optimise the information |
| C. | digitise the information |
| D. | show the information on a screen |
| E. | become an output device also |
| Answer» C. digitise the information | |
| 805. |
Which of the following is Not acharacteristic of E-mail? |
| A. | Low cost |
| B. | Record maintenance in database |
| C. | High speed |
| D. | Waste reduction |
| E. | None of these |
| Answer» C. High speed | |
| 806. |
Use this when you want to make all letters capital without having to use the shift key for each character……….. |
| A. | shifter |
| B. | upper case |
| C. | caps lock key |
| D. | icon |
| E. | None of these |
| Answer» D. icon | |
| 807. |
A computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as : |
| A. | Super computer |
| B. | Mini computer |
| C. | Micro computer |
| D. | Macro computer |
| E. | Mainframe computer |
| Answer» B. Mini computer | |
| 808. |
The key F12 opens a : |
| A. | Save As dialog box |
| B. | Open dialog box |
| C. | Save dialog box |
| D. | Close dialog box |
| E. | None of these |
| Answer» B. Open dialog box | |
| 809. |
In the third generation of computers : |
| A. | Distributed data processing first became popular |
| B. | An operating system was first developed |
| C. | High-level procedural languages were first used |
| D. | On-line, real time systems first became popular |
| E. | None of these |
| Answer» E. None of these | |
| 810. |
A computer virus normally attaches itself to another computer program known as a……. |
| A. | backdoor program |
| B. | target program |
| C. | trojan horse |
| D. | host program |
| E. | Bluetooth |
| Answer» D. host program | |
| 811. |
The amount of time that is taken up in getting data from a disk is |
| A. | delay time |
| B. | access time |
| C. | real time |
| D. | latency |
| E. | None of these |
| Answer» E. None of these | |
| 812. |
By default, your documents print in……..……mode. |
| A. | Landscape |
| B. | Portrait |
| C. | Page setup |
| D. | Print preview |
| E. | None of these |
| Answer» C. Page setup | |
| 813. |
There are several security devices used tostop individuals from exploiting your system. Which of the following is used in conjunction with a firewall? |
| A. | Proxy server |
| B. | Intrusion-detection system |
| C. | Terminal Server |
| D. | Web server |
| E. | None of these |
| Answer» B. Intrusion-detection system | |
| 814. |
Specialized programs that allow particular input or output devices to communicate with1569.Storage that retains its data after the power is turned off is referred to as………… |
| A. | volatile storage |
| B. | sequential storage |
| C. | direct storage |
| D. | nonvolatile storage |
| E. | Mobile storage |
| Answer» E. Mobile storage | |
| 815. |
A polymorphic virus |
| A. | modifies its program code each time it attaches itself to another program or file |
| B. | is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains. |
| C. | a malicious-logic program that hides within or looks like a legitimate program |
| D. | infects a program file, but still reports the size and creation date of the original uninfected program |
| E. | None of these |
| Answer» B. is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains. | |
| 816. |
Smart Card is |
| A. | Special purpose Cards |
| B. | Microprocessor Cards |
| C. | Processing unit contains memory for storing data |
| D. | Processing unit for software handling |
| E. | None of these |
| Answer» C. Processing unit contains memory for storing data | |
| 817. |
Which of the following is a group of related characters that are treated as a single unit? |
| A. | Array |
| B. | File |
| C. | Field |
| D. | Block |
| E. | None of these |
| Answer» D. Block | |
| 818. |
The portion of the application that you work with in an application software package is the |
| A. | user interface |
| B. | utility interface |
| C. | processing interface |
| D. | analytical interface |
| E. | None of these |
| Answer» B. utility interface | |
| 819. |
If you want to secure a message, use a(n) : |
| A. | cryptology source |
| B. | encryption key |
| C. | encryption software package |
| D. | cryptosystem |
| E. | None of these |
| Answer» E. None of these | |
| 820. |
……….this is the act of copying or downloading a program from a network and making multiple copies of it. |
| A. | Network piracy |
| B. | Plagiarism |
| C. | Software p racy |
| D. | Site-license piracy |
| E. | None of these |
| Answer» D. Site-license piracy | |
| 821. |
A modern electronic computer is a machine that is meant for : |
| A. | Doing quick mathematical calculations |
| B. | Input, storage, manipulation and outputting of data |
| C. | Electronic data processing |
| D. | Performing repetitive tasks accurately |
| E. | None of these |
| Answer» C. Electronic data processing | |
| 822. |
A computer based system for the storage, cataloging and retrieval of documents is |
| A. | electronic filling |
| B. | polynomial |
| C. | effective enumeration |
| D. | All of these |
| E. | None of these |
| Answer» B. polynomial | |
| 823. |
When you insert a picture and adjust the height, Word automatically adjusts the…….to maintain the correct proportion. |
| A. | pixel size |
| B. | resolution |
| C. | screen size |
| D. | width |
| E. | None of these |
| Answer» E. None of these | |
| 824. |
Borders can be applied to : |
| A. | Cells |
| B. | Paragraph |
| C. | Text |
| D. | All of these |
| E. | None of these |
| Answer» E. None of these | |
| 825. |
Offline device is : |
| A. | a device which is not connected to CPU |
| B. | a device which i connected to CPU |
| C. | a direct access storage device |
| D. | an I/O device |
| E. | None of these |
| Answer» B. a device which i connected to CPU | |
| 826. |
Digital computer consumes electric power as compare to analog computer. |
| A. | Equal |
| B. | More |
| C. | Less |
| D. | Alike |
| E. | None of these |
| Answer» B. More | |
| 827. |
The design of the network is called the network : |
| A. | architecture |
| B. | server |
| C. | transmission |
| D. | type |
| E. | None of these |
| Answer» B. server | |
| 828. |
Which circular transparent disk has a pattern of a radial bars printed on it? |
| A. | Milk disk |
| B. | Optical disk |
| C. | Hard disk |
| D. | Mini disk |
| E. | None of these |
| Answer» B. Optical disk | |
| 829. |
The toolbar in which you can type a web address is the………..Bar? |
| A. | Address |
| B. | Format |
| C. | Status |
| D. | Navigation |
| E. | None |
| Answer» B. Format | |
| 830. |
What type of devices are CDs or DVDs? |
| A. | Input |
| B. | Output |
| C. | Software |
| D. | Storage |
| E. | Input/Output |
| Answer» E. Input/Output | |
| 831. |
The advantage of a LAN is………. |
| A. | Sharing peripherals |
| B. | Backing up your data |
| C. | Saving all your data |
| D. | Accessing the Web |
| E. | Automatic printing of data |
| Answer» B. Backing up your data | |
| 832. |
Older network often use another type of cable, called……….. |
| A. | Twisted-pair cable |
| B. | Unshielded twisted-pair cable |
| C. | Coaxial cable |
| D. | Optical Fiber |
| E. | None of these |
| Answer» D. Optical Fiber | |
| 833. |
The information you put into the computer is called……….. |
| A. | facts |
| B. | data |
| C. | files |
| D. | directory |
| E. | None of these |
| Answer» C. files | |
| 834. |
Which of the following is the earliest calculating device? |
| A. | Abacus |
| B. | Clock |
| C. | Difference Engine |
| D. | Calculator |
| E. | None of these |
| Answer» B. Clock | |
| 835. |
In concern of databases, what does OLTP stands for? |
| A. | On-Line Transfer Process |
| B. | On-Line Transfer Protocol |
| C. | On-Line Transaction Protocol |
| D. | On-Line Transaction Processing |
| E. | None of the above |
| Answer» E. None of the above | |
| 836. |
In order to save an existing document with a different name you need to……….. |
| A. | Retype the document and give it a different name |
| B. | Use the Save As Command |
| C. | Copy and paste the original document to a new document and then save |
| D. | Use Windows Explorer to copy the document to a different location and then rename it. |
| E. | None of these |
| Answer» C. Copy and paste the original document to a new document and then save | |
| 837. |
RJ45 UTP cable has………Cable : |
| A. | 2 pair |
| B. | 3 pair |
| C. | 4 pair |
| D. | 5 pair |
| E. | None of these |
| Answer» D. 5 pair | |
| 838. |
What is the function of a router? |
| A. | To connect your computer to another computer. |
| B. | To connect two servers to increase transmission speed. |
| C. | To connect two different networks. |
| D. | To connect very distant segments from the same network. |
| E. | None of these |
| Answer» D. To connect very distant segments from the same network. | |
| 839. |
A half byte is known as : |
| A. | Data |
| B. | Bit |
| C. | Half byte |
| D. | Nibble |
| E. | None of these |
| Answer» E. None of these | |
| 840. |
All of the following are steps involved in the boot process EXCEPT : |
| A. | load the operating system to RAM |
| B. | the power-on self-test |
| C. | activate the basic input/output system (BIOS) |
| D. | load application programs |
| E. | None of these |
| Answer» E. None of these | |
| 841. |
Cloud computing means |
| A. | Computing using the satellite |
| B. | Computing using cloud chamber technology |
| C. | Computing which results in errors |
| D. | Shifting computing power from offline PCs and Laptops onto the Web |
| E. | None of these |
| Answer» E. None of these | |
| 842. |
The geometric arrangement of devices on the network is called……….. |
| A. | Topology |
| B. | Media |
| C. | URL |
| D. | Protocol |
| E. | Pipelining |
| Answer» B. Media | |
| 843. |
The spacing between character pairs iscalled : |
| A. | Kerning |
| B. | x-height |
| C. | intercap |
| D. | serif |
| E. | None of these |
| Answer» B. x-height | |
| 844. |
Each memory cell has a unique number, assigned to it is called as the……….of the cell |
| A. | Address |
| B. | Register |
| C. | Number |
| D. | Path |
| E. | None of these |
| Answer» B. Register | |
| 845. |
The computer’s capability of distinguishingspoken words is called…………. |
| A. | voice analysis |
| B. | speech acknowledgement |
| C. | voice recognition |
| D. | speech interpretation |
| E. | vocalization |
| Answer» F. | |
| 846. |
A popular way to learn about computers without ever going to a classroom is called…….. |
| A. | i-learning |
| B. | isolated learning |
| C. | e-learning |
| D. | close learning |
| E. | Distance learning |
| Answer» D. close learning | |
| 847. |
To reverse the effect of your last action in word,…………. |
| A. | Use the cut command |
| B. | Use the Undo command |
| C. | Press the delete key |
| D. | Use the Redo command |
| E. | None of these |
| Answer» C. Press the delete key | |
| 848. |
Which of the following is not one of the syntax rules? |
| A. | The order in which you list the function’s arguments |
| B. | The precedence of the arguments |
| C. | Whether or not the function has arguments |
| D. | Properly spelling the function’s name |
| E. | None of these |
| Answer» B. The precedence of the arguments | |
| 849. |
To keep files organized, related documents are often stored in……….(also called directories) located on the storage medium. |
| A. | indexes |
| B. | labels |
| C. | folders |
| D. | programs |
| E. | cabinets |
| Answer» D. programs | |
| 850. |
What is the meaning of “Hibernate” in Windows XP/Windows7? |
| A. | Restart the Computer is safe mode |
| B. | Restart the Computer in hibernate mode |
| C. | Shutdown the Computer terminating all the running applications |
| D. | Shutdown the Computer without closing the running applications |
| E. | None of these |
| Answer» E. None of these | |