Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

How many layers are there in the OSI networking model?

A. 13
B. 11
C. 9
D. 7
Answer» E.
2.

HTML in computer science stands for?

A. HyperText Markup Language
B. HyperText Main Language
C. HyperText Memory Language
D. HyperText Mandatory Language
Answer» B. HyperText Main Language
3.

HTML is a subset of_x005F_x000D_

A. SGMH
B. SGMD
C. SGML
D. None of the above
Answer» D. None of the above
4.

HTTP in computer science stands for?

A. HyperText Transmission Protocol
B. HyperText Transfer Protocol
C. HyperText Technology Protocol
D. HyperText Total Protocol
Answer» C. HyperText Technology Protocol
5.

Hub works on which layer?

A. Network layer
B. Physical layer
C. Data link layer
D. All of the above
Answer» C. Data link layer
6.

How many KB is equal to 1 GB?

A. 1024
B. 256 x 1024
C. 1024 x 1024
D. 1024 x 1024 x 128
Answer» D. 1024 x 1024 x 128
7.

Hard Drive capacity is measured in

A. Newton
B. GB
C. THz
D. Gwallior
Answer» C. THz
8.

Hardware devices that are not part of the main computer system and are often added later to the system are ________

A. clip art
B. highlight
C. execute
D. peripherals
Answer» E.
9.

How many bits does an IP address contain?

A. 64 bits
B. 32 Bits
C. 128 Bits
D. 256 Bits
Answer» C. 128 Bits
10.

How do you display current date and time in MS Excel ?

A. Time ()
B. Now ()
C. Date ()
D. Today ()
Answer» C. Date ()
11.

Hard copy of a document is

A. Printed on printer
B. Stored in floppy
C. Store in CD
D. Store in hard disk
Answer» B. Stored in floppy
12.

Hard disk is coated in both side with

A. Carbon layer
B. Magnetic metallic oxide
C. Optical metallic oxide
D. All of the above
Answer» C. Optical metallic oxide
13.

Google Docs is a type of cloud computing.

A. 1
B.
C.
D.
Answer» B.
14.

Function key ___ in a Windows keyboard can perform several functions, and does not have an assigned Windows default._x005F_x000D_

A. F1
B. F6
C. F8
D. F9
Answer» D. F9
15.

Full form of BIOS is

A. Binary Interchange Operation System
B. Basic Input Output System
C. Beginner's Input Operation Symbol
D. Basic Interface Oriented Service
Answer» C. Beginner's Input Operation Symbol
16.

Font size is measured in

A. pixels
B. points
C. didos
D. percents
Answer» C. didos
17.

FORTRAN is not used for _____._x005F_x000D_ (I) Drawing pictures(II) Carrying out mathematics computations

A. Only (I)
B. Only (II)
C. Both (I) and (II)
D. Neither (I) nor (II)
Answer» D. Neither (I) nor (II)
18.

Formatting a cell in currency you can specify

A. Percentage symbol
B. Currency symbol
C. Decimal places
D. Both B & C
Answer» C. Decimal places
19.

First page of website is termed as

A. Index
B. Home page
C. JAVA Script
D. Bookmark page
Answer» C. JAVA Script
20.

Find the odd statement out in relation to firewall.

A. Firewall can be a software
B. Firewall can be a hardware
C. Firewall can be a combination of software & hardware
D. Firewall protects computer from fire
Answer» D. Firewall protects computer from fire
21.

Fifth generation computer is also known as

A. Very Large Scale Integration (VLSI)
B. Knowledge information processing system
C. Both A & B
D. None of the above
Answer» C. Both A & B
22.

F12 key is known as

A. Company Configuration
B. Accounting Features
C. Company Features
D. All of the above
Answer» B. Accounting Features
23.

Find the "odd one out".

A. Linux
B. Windows 98
C. C++
D. Windows 7
Answer» D. Windows 7
24.

Firewalls are used to protect against

A. Virus Attacks
B. Unauthorized Access
C. Data Driven Attacks
D. Fire Attacks
Answer» C. Data Driven Attacks
25.

Expansion cards are inserted into

A. Peripheral Devices
B. Pegs
C. Slots
D. The back of the computer
Answer» D. The back of the computer
26.

Excel displays the current cell address in the

A. Title Bar
B. Name Box
C. Status Bar
D. Formula bar
Answer» C. Status Bar
27.

Every HTML file is a ___________ file._x005F_x000D_

A. Text
B. Audio
C. Video
D. Image
Answer» B. Audio
28.

Every set in the dotted decimal format of IP address is called

A. Subnet
B. Octet
C. Subset
D. IP set
Answer» C. Subset
29.

Every computer on the internet is known as

A. Client
B. Modem
C. Server
D. Host
Answer» E.
30.

Enumerators are stored by the compiler in

A. integer
B. string
C. float
D. any of above
Answer» B. string
31.

Every component of your computer is either

A. Hardware or CPU
B. RAM/CPU or Hardware
C. Hardware or Software
D. System or Application software
Answer» D. System or Application software
32.

Esc key in a windows keyboard is not used to_x005F_x000D_

A. Close a dialog-box
B. Run a selected command
C. Cancel a command
D. Close a selected drop down list
Answer» C. Cancel a command
33.

EPROM can be used for

A. Erasing and reconstructing the contents of ROM
B. Duplicating ROM
C. Reconstructing the contents of ROM
D. Erasing the contents of ROM
Answer» B. Duplicating ROM
34.

Ethernet system uses which of the following technology?

A. Ring
B. Bus
C. Star
D. Tree
Answer» C. Star
35.

During Processing data, programs, and processed information are held temporarily in _________

A. Secodary stoage
B. ROM
C. RAM
D. None of these
Answer» D. None of these
36.

DSL is an example of what type of internet access?

A. Wireless
B. Network
C. Broadband
D. Slow
Answer» D. Slow
37.

Digital computers use a ......... system to encode date and programs.

A. semiconductor
B. decimal
C. binary
D. RAM
Answer» D. RAM
38.

Documentation of computer programs is impograms is important so that ________

A. users can learn how to use the program
B. other programmers can know how to maintain the program
C. the programer can see why the code is written that way while hunting for sources of error
D. all of above
Answer» E.
39.

Debugging is the process of

A. Rolling out a software program
B. Modifying a software program
C. Checking errors in a software program
D. Changing the design structure of a program
Answer» D. Changing the design structure of a program
40.

Digitized information can be used by computers.

A. 1
B.
C.
D.
Answer» B.
41.

Delayed payload of some viruses is also called as _____

A. Bomb
B. Late - Virus
C. Time
D. Anti-virus
Answer» B. Late - Virus
42.

Data stored in computer in which form?

A. numbers
B. text
C. audio
D. images
Answer» B. text
43.

Data in database at a particular point of time is called as?

A. Intension
B. Extension
C. Back up
D. Application
Answer» C. Back up
44.

Cybercards are most useful for

A. writing to-do lists
B. creating new inventions
C. keeping a personal diary
D. tracking Internet-based research
Answer» E.
45.

Ctrl+F in MS Word for

A. Re do
B. to find the word
C. Select all
D. Center text
Answer» C. Select all
46.

Current search engines function by recognizing keywords.

A. 1
B.
C.
D.
Answer» B.
47.

CTRL + ] is used for

A. Re-do
B. Right align text
C. Increase in font size
D. Expand or collapse the ribbon
Answer» D. Expand or collapse the ribbon
48.

CPU speed of a personal computer is

A. 1 MIPS
B. 100 KIPS
C. 32 KIPS
D. 32 MIPS
Answer» D. 32 MIPS
49.

CPU Scheduler is also known as _____ .

A. Job Scheduler
B. Resource Scheduler
C. Short-­term Scheduler
D. Process Scheduler
Answer» D. Process Scheduler
50.

CPU performance is measured through ________.

A. MHz
B. Throughput
C. Flaps
D. None of the above
Answer» C. Flaps