MCQOPTIONS
Saved Bookmarks
This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1351. |
To ‘maximize’ a window means to………. |
| A. | fill it to capacity |
| B. | expand it to fit the desktop |
| C. | put only like files inside |
| D. | drag it to the Recycle bin |
| E. | None of these |
| Answer» C. put only like files inside | |
| 1352. |
What type of connector is used to plug a telephone line into a modem? |
| A. | COM1 |
| B. | RJ-11 |
| C. | RJ-45 |
| D. | RJ-10 |
| E. | None of these |
| Answer» C. RJ-45 | |
| 1353. |
The operating system that is self-contained in a device and resident in the ROM is………… |
| A. | Batch Operating System |
| B. | Real-time Opearting System |
| C. | Embedded Operating System |
| D. | Multi Operating System |
| E. | None of these |
| Answer» D. Multi Operating System | |
| 1354. |
To specify margins in Word, the user has to select Page Setup option from the……….. menu. |
| A. | Edit |
| B. | Table |
| C. | Autocorrect |
| D. | File |
| E. | Format |
| Answer» F. | |
| 1355. |
The person who writes and tests computer programs is called a………… |
| A. | programmer |
| B. | computer scientist |
| C. | software engineer |
| D. | project developer |
| E. | None of these |
| Answer» D. project developer | |
| 1356. |
In which mode, each user has a local input/output device? |
| A. | Interactive |
| B. | Time sharing mode |
| C. | Batch processing mode |
| D. | All of these |
| E. | None of these |
| Answer» C. Batch processing mode | |
| 1357. |
A language used for expressing program designs is known as |
| A. | APL |
| B. | PDL |
| C. | PL/1 |
| D. | SNOBOL |
| E. | None of these |
| Answer» C. PL/1 | |
| 1358. |
An example of processing device would be……….. |
| A. | a magnetic ink reader |
| B. | a tablet PC |
| C. | special function cards |
| D. | scanners |
| E. | keyboards |
| Answer» E. keyboards | |
| 1359. |
Full form of PC : |
| A. | Personal Computer |
| B. | Process Control |
| C. | Production Computer |
| D. | Painful Creation |
| E. | Permanent Computer |
| Answer» B. Process Control | |
| 1360. |
How many write cycles are allowed to a EEPROM? |
| A. | 1 |
| B. | 10 |
| C. | 100 |
| D. | 1000 |
| E. | None of these |
| Answer» E. None of these | |
| 1361. |
When data changes in multiple lists and all lists are not updated, this causes………. |
| A. | data redundancy |
| B. | information overload |
| C. | duplicate data |
| D. | data inconsistency |
| E. | data repetition |
| Answer» E. data repetition | |
| 1362. |
Documentation while developing a software for a bank is required for : |
| A. | Editing |
| B. | Auditing |
| C. | Correction |
| D. | All of these |
| E. | None of these |
| Answer» C. Correction | |
| 1363. |
What is the transfer rate of a standard USB2.0 Device? |
| A. | 100 Mbit/s |
| B. | 480 Mbit/s |
| C. | 1 Gbit/s |
| D. | 250 Mbit/s |
| E. | None of these |
| Answer» C. 1 Gbit/s | |
| 1364. |
Indicate which of the following is not true about an interpreter |
| A. | Interpreter generates an object program from the source program |
| B. | Interpreter is a kind of translator |
| C. | Interpreter analyses each source statement every time it is to be executed |
| D. | All of these |
| E. | None of these |
| Answer» C. Interpreter analyses each source statement every time it is to be executed | |
| 1365. |
The part of a computer system that enables human operators to communicate with the computer is |
| A. | control unit |
| B. | CPU |
| C. | console |
| D. | ALU |
| E. | None of these |
| Answer» D. ALU | |
| 1366. |
WAIS stands for : |
| A. | Wide Area Intellectual Service |
| B. | Web Access Information System |
| C. | World wide Application of Intelligent System |
| D. | Wide Area Information Service |
| E. | None of these |
| Answer» E. None of these | |
| 1367. |
What happens when you press the Ctrl + V key? |
| A. | A Capital V letter is typed into your document at the cursor point |
| B. | The selected item is pasted from the Clipboard |
| C. | The selected item is pasted to the Clipboard |
| D. | The selected drawing objects are distributed vertically on the page |
| E. | None of these |
| Answer» C. The selected item is pasted to the Clipboard | |
| 1368. |
Which of the following is NOT one of thefour major data processing functions of a computer? |
| A. | gathering data |
| B. | processing data into information |
| C. | analyzing the data or information |
| D. | storing the data or information |
| E. | None of these |
| Answer» D. storing the data or information | |
| 1369. |
Unauthorized copying, of software to be used for personal gain instead of for personal backups is called………. |
| A. | program thievery |
| B. | data snatching |
| C. | software piracy |
| D. | program looting |
| E. | data looting |
| Answer» D. program looting | |
| 1370. |
What does FDISK do? |
| A. | performs low-level formatting of the hard drive |
| B. | fixes bad sectors on the hard drive |
| C. | recovers lost clusters on the hard drive |
| D. | creates partitions on the hard drive |
| E. | None of these |
| Answer» E. None of these | |
| 1371. |
For a computer to recognize and understand analog data, it must first be: |
| A. | sent to a mainframe for interpretation |
| B. | analyzed by the ALU of the CPU |
| C. | decoded |
| D. | analysed for viruses |
| E. | digitized |
| Answer» B. analyzed by the ALU of the CPU | |
| 1372. |
A…………is anything that can cause harm. |
| A. | vulnerability |
| B. | phish |
| C. | threat |
| D. | spoof |
| E. | None of these |
| Answer» D. spoof | |
| 1373. |
Voice recognition is : |
| A. | Ability to input data directly into a computer system by speaking to it |
| B. | Ability to output data directly from a computer system by speaking |
| C. | Processing of voice in computer system |
| D. | Both (a) and (b) |
| E. | None of these |
| Answer» B. Ability to output data directly from a computer system by speaking | |
| 1374. |
A key that must be pressed each time a new command or information is entered……….. |
| A. | esc |
| B. | enter |
| C. | delete |
| D. | home |
| E. | None of these |
| Answer» C. delete | |
| 1375. |
An interface that can be used to connect the microcomputer bus to…………..is called an I/O Port. |
| A. | Flip Flops |
| B. | Memory |
| C. | Peripheral devices |
| D. | Multiplexers |
| E. | None of these |
| Answer» E. None of these | |
| 1376. |
All the instructions and procedures needed to start Up a computer, to the point it can load an operating system are stored in ROM chips. In IBM compatible PCs this is called the |
| A. | RAM BIOS |
| B. | ROM BIOS |
| C. | EPROM |
| D. | POST |
| E. | None of these |
| Answer» C. EPROM | |
| 1377. |
To select or unselect one word to the right. |
| A. | CTRL + SHIFT |
| B. | CTRL + SHIFT + Up Arrow |
| C. | CTRL + SHIFT + Down Arrow |
| D. | CTRL + SHIFT + Right Arrow |
| E. | None of these |
| Answer» E. None of these | |
| 1378. |
A two-or-three character code used in teletypewriter systems to activate a particular machine is known as |
| A. | gray code |
| B. | bar code |
| C. | call-directing code |
| D. | mnemonics |
| E. | None of these |
| Answer» D. mnemonics | |
| 1379. |
What are the two parts of an E-mail address? |
| A. | User name and street address |
| B. | Legal name and phone number |
| C. | User name and domain name |
| D. | Initials and password |
| E. | User Name and Recipient Name |
| Answer» D. Initials and password | |
| 1380. |
The memory stees in mainframe computers and advanced technology micro computers are expressed as |
| A. | bytes |
| B. | kilo-bytes |
| C. | bits |
| D. | megabytes |
| E. | None of these |
| Answer» E. None of these | |
| 1381. |
A computer system that is old and perhapsnot satisfactory is referred to as a(n) _ |
| A. | Ancient system |
| B. | Historical system |
| C. | Age-old system |
| D. | Legacy system |
| E. | Legal system |
| Answer» E. Legal system | |
| 1382. |
You can check the conditions against…….. when applying conditional formatting : |
| A. | Cell value |
| B. | Formula |
| C. | Alignment |
| D. | Both (a) and (b) |
| E. | None of these |
| Answer» E. None of these | |
| 1383. |
A trackball is manipulated by |
| A. | palm |
| B. | foot |
| C. | fingers |
| D. | sound |
| E. | None of these |
| Answer» B. foot | |
| 1384. |
The resolution of the screen is indicated by: |
| A. | pixels |
| B. | dots |
| C. | lines |
| D. | colors |
| E. | None of these |
| Answer» B. dots | |
| 1385. |
An interrupt handler is a(n) : |
| A. | location in memory that keeps track of recently generated interrupts. |
| B. | peripheral device |
| C. | utility program |
| D. | special numeric code that indicates the priority of a request |
| E. | None of these |
| Answer» E. None of these | |
| 1386. |
A group of signal lines used to transmit data in parallel from one element of a computer to another is |
| A. | control bus |
| B. | address bus |
| C. | databus |
| D. | network |
| E. | None of these |
| Answer» D. network | |
| 1387. |
The most common method of entering text and numerical data into a computer system is through the use of a………. |
| A. | keyboard |
| B. | scanner |
| C. | printer |
| D. | plotter |
| E. | None of these |
| Answer» B. scanner | |
| 1388. |
Compartibility in regard to computers refers to : |
| A. | the software doing the right job for the user |
| B. | it being versatile enough to handle the job |
| C. | the software being able to run on the computer |
| D. | software running with other previously installed software |
| E. | None of these |
| Answer» D. software running with other previously installed software | |
| 1389. |
…………is a technique of temporarily removing inactive programs from the memory of computer system |
| A. | Swapping |
| B. | Spooling |
| C. | Semaphore |
| D. | Scheduler |
| E. | None of these |
| Answer» B. Spooling | |
| 1390. |
Virtual memory is typically located : |
| A. | on a floppy disk |
| B. | in the CPU |
| C. | in a flash card |
| D. | on the hard drive |
| E. | None of these |
| Answer» E. None of these | |
| 1391. |
Large transaction processing systems in automated organizations use…………. |
| A. | Online Processing |
| B. | Batch Processing |
| C. | Once-a-Day Processing |
| D. | End-of-a Day Processing |
| E. | Once-a-week Processing |
| Answer» C. Once-a-Day Processing | |
| 1392. |
Basic purpose of the testing of the program is : |
| A. | to detect software failures so that defects may be discovered and corrected |
| B. | to remove the bugs and also to reduce the labour cost |
| C. | to ensure that program is meeting the specified requirements |
| D. | All of these |
| E. | None of these |
| Answer» E. None of these | |
| 1393. |
A(n) -----system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop. |
| A. | PSS |
| B. | POS |
| C. | Inventory |
| D. | data mining |
| E. | None of these |
| Answer» B. POS | |
| 1394. |
How much data can be stored in one CD…………. |
| A. | 100t mb |
| B. | 2.5 mb |
| C. | 700 mb |
| D. | 500 mb |
| E. | None of these |
| Answer» D. 500 mb | |
| 1395. |
Which of the following programs give instructions about operations inside the computer? |
| A. | system |
| B. | Application |
| C. | Utility |
| D. | Compiler |
| E. | None of these |
| Answer» B. Application | |
| 1396. |
IMB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operating system from Microsoft, the printer from Epson and the application software from everywhere. Can you name the country which contributed the video display? |
| A. | India |
| B. | China |
| C. | Germany |
| D. | Taiwan |
| E. | Japan |
| Answer» E. Japan | |
| 1397. |
To identify a document, it is helpful to include the file name on each page as a |
| A. | header/footer |
| B. | bibliography |
| C. | find/search |
| D. | macro |
| E. | None of these |
| Answer» B. bibliography | |
| 1398. |
Single party disk relying on the disk controller for finding out which disk has failed is used by : |
| A. | RAID level 5 |
| B. | RAID level 2 |
| C. | RAID level 4 |
| D. | RAID level 3 |
| E. | RAID level 1 |
| Answer» E. RAID level 1 | |
| 1399. |
What’s considered the “backbone” of the World Wide Web? |
| A. | Uniform resource locator (URL) |
| B. | Hypertext mark-up language (HTML) |
| C. | Hypertext transfer protocol (HTTP) |
| D. | File transfer protocol (FTP) |
| E. | None of these |
| Answer» D. File transfer protocol (FTP) | |
| 1400. |
A key that will erase information from the computer’s memory and characters on the screen………. |
| A. | edit |
| B. | delete key |
| C. | dummy out |
| D. | trust key |
| E. | esc key |
| Answer» C. dummy out | |