MCQOPTIONS
Saved Bookmarks
This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 2851. |
Special program which can detect and remove viruses from computer is called |
| A. | virus |
| B. | anti virus |
| C. | groupware |
| D. | custom |
| Answer» C. groupware | |
| 2852. |
What is a firewall? |
| A. | A program that protects against viruses. |
| B. | A wall that is reinforced and cannot catch on fire. |
| C. | A filter for an internet connection that monitors outgoing and incoming activity. |
| D. | None |
| Answer» D. None | |
| 2853. |
In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk. |
| A. | Execution phase |
| B. | Dormant phase |
| C. | Propagation phase |
| D. | Triggering phase |
| Answer» D. Triggering phase | |
| 2854. |
What is the first boot sector virus? |
| A. | Mind |
| B. | Brain |
| C. | ELK cloner |
| D. | None of the above. |
| Answer» C. ELK cloner | |
| 2855. |
An error in software or hardware is called a bug. What is the alternative computer jargon for it? |
| A. | Slug |
| B. | Glitch |
| C. | Leech |
| D. | Squid |
| Answer» C. Leech | |
| 2856. |
All of the given below are anti virus programs except |
| A. | redlof |
| B. | norton |
| C. | Dr.Solomon |
| D. | McAfee |
| Answer» B. norton | |
| 2857. |
Why might someone break into (hack) your computer? |
| A. | They don't like you |
| B. | To commit a crime |
| C. | To use it to distribute porn, malcious programs, etc. |
| D. | All of the above |
| Answer» E. | |
| 2858. |
A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks |
| A. | Trap doors |
| B. | Zombie |
| C. | Virus |
| D. | Worm |
| Answer» C. Virus | |
| 2859. |
Delayed payload of some viruses is also called as |
| A. | Bomb |
| B. | Time |
| C. | Anti-virus |
| D. | None of the above |
| Answer» B. Time | |
| 2860. |
Program that interferes with the normal routine of the computer is called |
| A. | virus |
| B. | anti virus |
| C. | freeware |
| D. | shareware |
| Answer» B. anti virus | |
| 2861. |
-------- are attempts by individuals to obtain confidential information from you to falsifying their identity. |
| A. | Phishing scams |
| B. | Phishing trips |
| C. | Spyware scams |
| D. | Computer viruses |
| Answer» B. Phishing trips | |
| 2862. |
Which from the following editor is widely used on UNIX systems for C++ programs? |
| A. | vi editor |
| B. | vip editor |
| C. | emacs editor |
| D. | Both a and c |
| Answer» E. | |
| 2863. |
Loop which doesn't executed unless condition is satisfied in beginning is classified as |
| A. | REPEAT loop |
| B. | GO REPEAT loop |
| C. | WHILE loop |
| D. | DO loop |
| Answer» D. DO loop | |
| 2864. |
Assembly language address instruction set to ADD by using code |
| A. | 1110 |
| B. | 14 |
| C. | 1115 |
| D. | ADD |
| Answer» E. | |
| 2865. |
Selection logics are also referred to as |
| A. | Program logic |
| B. | Decision logic |
| C. | Selective logic |
| D. | Basic logic |
| Answer» C. Selective logic | |
| 2866. |
FORTRAN was standardized by ANSI as |
| A. | FORTRAN 68 |
| B. | FORTRAN 77 |
| C. | FORTRAN 84 |
| D. | FORTRAN 89 |
| Answer» C. FORTRAN 84 | |
| 2867. |
_______ converts an assembly language program into machine language. |
| A. | Assembler |
| B. | Interpreter |
| C. | Compiler |
| D. | All of the above |
| Answer» B. Interpreter | |
| 2868. |
____________________ was the first high -level language developed by John Backus at IBM in 1956. |
| A. | FORTRAN |
| B. | COBOL |
| C. | BASIC |
| D. | None of the above |
| Answer» B. COBOL | |
| 2869. |
Computer programs are written in a high level programming language; however, the human-readable version of a program is called …………. |
| A. | cache |
| B. | Instruction set |
| C. | source code |
| D. | word size |
| Answer» D. word size | |
| 2870. |
Which of the following language processors converts a high-level language program line by line into a machine language? |
| A. | Assembler |
| B. | Interpreter |
| C. | Compiler |
| D. | None of the above |
| Answer» D. None of the above | |
| 2871. |
A set of step-by-step procedures for accomplishing a task is known as a(n) ………… |
| A. | algorithm |
| B. | hardware program |
| C. | software bug |
| D. | firmware program |
| Answer» B. hardware program | |
| 2872. |
Errors in computer programs are called |
| A. | Follies |
| B. | Mistakes |
| C. | Bugs |
| D. | Spam |
| Answer» D. Spam | |
| 2873. |
Which of the following is not a computer language? |
| A. | High Level Language |
| B. | Machine Language |
| C. | Low Level Language |
| D. | Medium Level Language |
| Answer» E. | |
| 2874. |
A series of instructions that tells a computer what to do and how to do. It is called a ………… |
| A. | program |
| B. | command |
| C. | user response |
| D. | processor |
| Answer» B. command | |
| 2875. |
Which one of the following is not a type of a language processor? |
| A. | Compiler |
| B. | Interpreter |
| C. | Application software |
| D. | Assembler |
| Answer» D. Assembler | |
| 2876. |
Programming language which is used for scientific purposes and work is to be done in batches is |
| A. | PASCAL |
| B. | FORTRAN |
| C. | LOGO |
| D. | COMAL |
| Answer» C. LOGO | |
| 2877. |
Set of data whose items are organized together is classified as |
| A. | data structure |
| B. | variable structure |
| C. | string structure |
| D. | positive structure |
| Answer» B. variable structure | |
| 2878. |
Program subroutines are |
| A. | called by other programs |
| B. | fixed variable |
| C. | default constants |
| D. | default variables |
| Answer» B. fixed variable | |
| 2879. |
A program which interprets each line of high level program at time of execution is called |
| A. | instructor |
| B. | interpreter |
| C. | translator |
| D. | executor |
| Answer» C. translator | |
| 2880. |
What is a segment of code that executes repeatedly based on a certain condition? |
| A. | Function |
| B. | Array |
| C. | Loop |
| D. | None of the above |
| Answer» D. None of the above | |
| 2881. |
A linked list is a linear collection of similar data elements called_________. |
| A. | Subscript |
| B. | Index |
| C. | Nodes |
| D. | Null |
| Answer» D. Null | |
| 2882. |
____________is the same thing as a variable with one major difference. Its does not change, while the value of a variable can change throughout a program. |
| A. | fixed-Variable |
| B. | Conditional |
| C. | Constant |
| D. | None of the above |
| Answer» D. None of the above | |
| 2883. |
What is defined as a set of code used to carry out specific tasks? |
| A. | Function |
| B. | Class |
| C. | Loop |
| D. | None of the above |
| Answer» B. Class | |
| 2884. |
A C++ program typically go through how many phases? |
| A. | 3 phases |
| B. | 4 phases |
| C. | 6 phases |
| D. | 8 phases |
| Answer» D. 8 phases | |
| 2885. |
Detailed instruction to systems in CLI can be provided by codes in |
| A. | Supported binary language |
| B. | Command language |
| C. | Job control language |
| D. | Job schedule language |
| Answer» D. Job schedule language | |
| 2886. |
For fine tuning of important parts of programs declared in high level language, language used is |
| A. | Assembly language |
| B. | Machine language |
| C. | Python language |
| D. | System language |
| Answer» B. Machine language | |
| 2887. |
What is used for a real world object that is to be used in a program? |
| A. | Program |
| B. | Template |
| C. | Car class |
| D. | None of the above |
| Answer» C. Car class | |
| 2888. |
Initial work on the internet was done in operating system known as |
| A. | UNIX |
| B. | LINUX |
| C. | Mac OS |
| D. | DOS |
| Answer» B. LINUX | |
| 2889. |
A computer translator is best described as |
| A. | application software |
| B. | system software |
| C. | hardware |
| D. | window |
| Answer» C. hardware | |
| 2890. |
Intermediate object program is a |
| A. | Machine language code |
| B. | Assembly code |
| C. | High-level language code |
| D. | Machine independent code |
| Answer» E. | |
| 2891. |
Query language comes under: |
| A. | Third generation |
| B. | Fourth generation |
| C. | Fifth generation |
| D. | None of these |
| Answer» C. Fifth generation | |
| 2892. |
Graphical representation of a program logic is not available in case of |
| A. | Pseudocodes |
| B. | Mapping |
| C. | Flowcharting |
| D. | Aided designs |
| Answer» B. Mapping | |
| 2893. |
Translator program that converts the assembly language into the machine language, is called |
| A. | Program changer |
| B. | Language changer |
| C. | Assembler |
| D. | None of them |
| Answer» D. None of them | |
| 2894. |
Which of the following is machine independence program? |
| A. | Low level language |
| B. | Machine language |
| C. | High level language |
| D. | Assembly language |
| Answer» D. Assembly language | |
| 2895. |
A computer program that converts an entire program into machine language at one time is called a/an |
| A. | Interpreter |
| B. | Simulator |
| C. | Commander |
| D. | Compiler |
| Answer» E. | |
| 2896. |
Language that is developed for business applications is known as |
| A. | PASCAL |
| B. | COBOL |
| C. | C |
| D. | C++ |
| Answer» C. C | |
| 2897. |
PASCAL was designed by |
| A. | Bill Gates |
| B. | Prof. Niklaus Wirth |
| C. | Dennis Ritchie |
| D. | None of them |
| Answer» C. Dennis Ritchie | |
| 2898. |
To speed up the programming process, a language was introduced that is called |
| A. | Assembly language |
| B. | Machine language |
| C. | High-level language |
| D. | All of them |
| Answer» D. All of them | |
| 2899. |
Java variants includes Java Runtime Engine (JRE) and |
| A. | Java Execution Engine |
| B. | Java Developer Mode |
| C. | Java Application Developer Tool |
| D. | Java Software Development Kit |
| Answer» E. | |
| 2900. |
Which language is directly understood by the computer without translation program? |
| A. | Assembly language |
| B. | High level language |
| C. | Machine language |
| D. | None of the above |
| Answer» D. None of the above | |