Explore topic-wise MCQs in Current Affairs.

This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

1351.

To ‘maximize’ a window means to……….

A. fill it to capacity
B. expand it to fit the desktop
C. put only like files inside
D. drag it to the Recycle bin
E. None of these
Answer» C. put only like files inside
1352.

What type of connector is used to plug a telephone line into a modem?

A. COM1
B. RJ-11
C. RJ-45
D. RJ-10
E. None of these
Answer» C. RJ-45
1353.

The operating system that is self-contained in a device and resident in the ROM is…………

A. Batch Operating System
B. Real-time Opearting System
C. Embedded Operating System
D. Multi Operating System
E. None of these
Answer» D. Multi Operating System
1354.

To specify margins in Word, the user has to select Page Setup option from the……….. menu.

A. Edit
B. Table
C. Autocorrect
D. File
E. Format
Answer» F.
1355.

The person who writes and tests computer programs is called a…………

A. programmer
B. computer scientist
C. software engineer
D. project developer
E. None of these
Answer» D. project developer
1356.

In which mode, each user has a local input/output device?

A. Interactive
B. Time sharing mode
C. Batch processing mode
D. All of these
E. None of these
Answer» C. Batch processing mode
1357.

A language used for expressing program designs is known as

A. APL
B. PDL
C. PL/1
D. SNOBOL
E. None of these
Answer» C. PL/1
1358.

An example of processing device would be………..

A. a magnetic ink reader
B. a tablet PC
C. special function cards
D. scanners
E. keyboards
Answer» E. keyboards
1359.

Full form of PC :

A. Personal Computer
B. Process Control
C. Production Computer
D. Painful Creation
E. Permanent Computer
Answer» B. Process Control
1360.

How many write cycles are allowed to a EEPROM?

A. 1
B. 10
C. 100
D. 1000
E. None of these
Answer» E. None of these
1361.

When data changes in multiple lists and all lists are not updated, this causes……….

A. data redundancy
B. information overload
C. duplicate data
D. data inconsistency
E. data repetition
Answer» E. data repetition
1362.

Documentation while developing a software for a bank is required for :

A. Editing
B. Auditing
C. Correction
D. All of these
E. None of these
Answer» C. Correction
1363.

What is the transfer rate of a standard USB2.0 Device?

A. 100 Mbit/s
B. 480 Mbit/s
C. 1 Gbit/s
D. 250 Mbit/s
E. None of these
Answer» C. 1 Gbit/s
1364.

Indicate which of the following is not true about an interpreter

A. Interpreter generates an object program from the source program
B. Interpreter is a kind of translator
C. Interpreter analyses each source statement every time it is to be executed
D. All of these
E. None of these
Answer» C. Interpreter analyses each source statement every time it is to be executed
1365.

The part of a computer system that enables human operators to communicate with the computer is

A. control unit
B. CPU
C. console
D. ALU
E. None of these
Answer» D. ALU
1366.

WAIS stands for :

A. Wide Area Intellectual Service
B. Web Access Information System
C. World wide Application of Intelligent System
D. Wide Area Information Service
E. None of these
Answer» E. None of these
1367.

What happens when you press the Ctrl + V key?

A. A Capital V letter is typed into your document at the cursor point
B. The selected item is pasted from the Clipboard
C. The selected item is pasted to the Clipboard
D. The selected drawing objects are distributed vertically on the page
E. None of these
Answer» C. The selected item is pasted to the Clipboard
1368.

Which of the following is NOT one of thefour major data processing functions of a computer?

A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
E. None of these
Answer» D. storing the data or information
1369.

Unauthorized copying, of software to be used for personal gain instead of for personal backups is called……….

A. program thievery
B. data snatching
C. software piracy
D. program looting
E. data looting
Answer» D. program looting
1370.

What does FDISK do?

A. performs low-level formatting of the hard drive
B. fixes bad sectors on the hard drive
C. recovers lost clusters on the hard drive
D. creates partitions on the hard drive
E. None of these
Answer» E. None of these
1371.

For a computer to recognize and understand analog data, it must first be:

A. sent to a mainframe for interpretation
B. analyzed by the ALU of the CPU
C. decoded
D. analysed for viruses
E. digitized
Answer» B. analyzed by the ALU of the CPU
1372.

A…………is anything that can cause harm.

A. vulnerability
B. phish
C. threat
D. spoof
E. None of these
Answer» D. spoof
1373.

Voice recognition is :

A. Ability to input data directly into a computer system by speaking to it
B. Ability to output data directly from a computer system by speaking
C. Processing of voice in computer system
D. Both (a) and (b)
E. None of these
Answer» B. Ability to output data directly from a computer system by speaking
1374.

A key that must be pressed each time a new command or information is entered………..

A. esc
B. enter
C. delete
D. home
E. None of these
Answer» C. delete
1375.

An interface that can be used to connect the microcomputer bus to…………..is called an I/O Port.

A. Flip Flops
B. Memory
C. Peripheral devices
D. Multiplexers
E. None of these
Answer» E. None of these
1376.

All the instructions and procedures needed to start Up a computer, to the point it can load an operating system are stored in ROM chips. In IBM compatible PCs this is called the

A. RAM BIOS
B. ROM BIOS
C. EPROM
D. POST
E. None of these
Answer» C. EPROM
1377.

To select or unselect one word to the right.

A. CTRL + SHIFT
B. CTRL + SHIFT + Up Arrow
C. CTRL + SHIFT + Down Arrow
D. CTRL + SHIFT + Right Arrow
E. None of these
Answer» E. None of these
1378.

A two-or-three character code used in teletypewriter systems to activate a particular machine is known as

A. gray code
B. bar code
C. call-directing code
D. mnemonics
E. None of these
Answer» D. mnemonics
1379.

What are the two parts of an E-mail address?

A. User name and street address
B. Legal name and phone number
C. User name and domain name
D. Initials and password
E. User Name and Recipient Name
Answer» D. Initials and password
1380.

The memory stees in mainframe computers and advanced technology micro computers are expressed as

A. bytes
B. kilo-bytes
C. bits
D. megabytes
E. None of these
Answer» E. None of these
1381.

A computer system that is old and perhapsnot satisfactory is referred to as a(n) _

A. Ancient system
B. Historical system
C. Age-old system
D. Legacy system
E. Legal system
Answer» E. Legal system
1382.

You can check the conditions against…….. when applying conditional formatting :

A. Cell value
B. Formula
C. Alignment
D. Both (a) and (b)
E. None of these
Answer» E. None of these
1383.

A trackball is manipulated by

A. palm
B. foot
C. fingers
D. sound
E. None of these
Answer» B. foot
1384.

The resolution of the screen is indicated by:

A. pixels
B. dots
C. lines
D. colors
E. None of these
Answer» B. dots
1385.

An interrupt handler is a(n) :

A. location in memory that keeps track of recently generated interrupts.
B. peripheral device
C. utility program
D. special numeric code that indicates the priority of a request
E. None of these
Answer» E. None of these
1386.

A group of signal lines used to transmit data in parallel from one element of a computer to another is

A. control bus
B. address bus
C. databus
D. network
E. None of these
Answer» D. network
1387.

The most common method of entering text and numerical data into a computer system is through the use of a……….

A. keyboard
B. scanner
C. printer
D. plotter
E. None of these
Answer» B. scanner
1388.

Compartibility in regard to computers refers to :

A. the software doing the right job for the user
B. it being versatile enough to handle the job
C. the software being able to run on the computer
D. software running with other previously installed software
E. None of these
Answer» D. software running with other previously installed software
1389.

…………is a technique of temporarily removing inactive programs from the memory of computer system

A. Swapping
B. Spooling
C. Semaphore
D. Scheduler
E. None of these
Answer» B. Spooling
1390.

Virtual memory is typically located :

A. on a floppy disk
B. in the CPU
C. in a flash card
D. on the hard drive
E. None of these
Answer» E. None of these
1391.

Large transaction processing systems in automated organizations use………….

A. Online Processing
B. Batch Processing
C. Once-a-Day Processing
D. End-of-a Day Processing
E. Once-a-week Processing
Answer» C. Once-a-Day Processing
1392.

Basic purpose of the testing of the program is :

A. to detect software failures so that defects may be discovered and corrected
B. to remove the bugs and also to reduce the labour cost
C. to ensure that program is meeting the specified requirements
D. All of these
E. None of these
Answer» E. None of these
1393.

A(n) -----system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.

A. PSS
B. POS
C. Inventory
D. data mining
E. None of these
Answer» B. POS
1394.

How much data can be stored in one CD………….

A. 100t mb
B. 2.5 mb
C. 700 mb
D. 500 mb
E. None of these
Answer» D. 500 mb
1395.

Which of the following programs give instructions about operations inside the computer?

A. system
B. Application
C. Utility
D. Compiler
E. None of these
Answer» B. Application
1396.

IMB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operating system from Microsoft, the printer from Epson and the application software from everywhere. Can you name the country which contributed the video display?

A. India
B. China
C. Germany
D. Taiwan
E. Japan
Answer» E. Japan
1397.

To identify a document, it is helpful to include the file name on each page as a

A. header/footer
B. bibliography
C. find/search
D. macro
E. None of these
Answer» B. bibliography
1398.

Single party disk relying on the disk controller for finding out which disk has failed is used by :

A. RAID level 5
B. RAID level 2
C. RAID level 4
D. RAID level 3
E. RAID level 1
Answer» E. RAID level 1
1399.

What’s considered the “backbone” of the World Wide Web?

A. Uniform resource locator (URL)
B. Hypertext mark-up language (HTML)
C. Hypertext transfer protocol (HTTP)
D. File transfer protocol (FTP)
E. None of these
Answer» D. File transfer protocol (FTP)
1400.

A key that will erase information from the computer’s memory and characters on the screen……….

A. edit
B. delete key
C. dummy out
D. trust key
E. esc key
Answer» C. dummy out