MCQOPTIONS
Saved Bookmarks
This section includes 621 Mcqs, each offering curated multiple-choice questions to sharpen your General Knowledge knowledge and support exam preparation. Choose a topic below to get started.
| 451. |
What are two example of freeware? |
| A. | WinZip and Linux |
| B. | Shareware and file sharing |
| C. | Microsoft word and the Google toolbar |
| D. | Instant messaging and the Google toolbar |
| Answer» E. | |
| 452. |
What command is used to count the total number of lines, words, and characters contained in a file ? |
| A. | wc |
| B. | count p |
| C. | wcount |
| D. | countw |
| Answer» B. count p | |
| 453. |
What cannot be performed from the windows task manager? |
| A. | Open a program |
| B. | Check recent CPU usage |
| C. | Delete a program from the hard drive |
| D. | View what applications are running in the background |
| Answer» D. View what applications are running in the background | |
| 454. |
What are the four things needed to connect to the internet? |
| A. | telephone line, modem, computer, and an ISP |
| B. | modem, computer, PDA, and ISP |
| C. | telephone line, modem, computer, and PDA |
| D. | computer, ISP, modem, and communication software |
| Answer» E. | |
| 455. |
What are the four main functions of a computer? |
| A. | Data, information, bits and bytes |
| B. | Hardware, software, modeling and operations |
| C. | Input, processing, output and storage |
| D. | Learning, thinking, intelligence and virtuosity |
| Answer» D. Learning, thinking, intelligence and virtuosity | |
| 456. |
Website address is a unique name that identifies a specific ___ on the web. |
| A. | Link |
| B. | Web browser |
| C. | PDA |
| D. | Web site |
| Answer» E. | |
| 457. |
Web pages are created by using which of the following? |
| A. | HTTP |
| B. | SMTP |
| C. | HTML |
| D. | SGML |
| Answer» D. SGML | |
| 458. |
Web applications are designed to interpret _____________ to display text, images etc._x005F_x000D_ |
| A. | HTML |
| B. | Hyperlinks |
| C. | Computers |
| D. | World Wide Web |
| Answer» B. Hyperlinks | |
| 459. |
VPN's are implemented to provide |
| A. | A secure connection through public networks |
| B. | Additional security for selected computers |
| C. | A secure connection within a private network |
| D. | Additional encryption by using IPSec |
| Answer» B. Additional security for selected computers | |
| 460. |
VoIP in computer science stands for? |
| A. | Virtual over Identifier Protocol |
| B. | Voice over Internet Protocol |
| C. | Voice over Interface Protocol |
| D. | Voice over Instruction Protocol |
| Answer» C. Voice over Interface Protocol | |
| 461. |
Verification of a login name and password is known as |
| A. | Trouble shooting |
| B. | Logging in |
| C. | Configuration |
| D. | Authentication |
| Answer» E. | |
| 462. |
Vacuum Tubes were used by _________ Generation of Computers. |
| A. | First |
| B. | Second |
| C. | Third |
| D. | Fourth |
| Answer» B. Second | |
| 463. |
V-RAM is used for access of the following ? |
| A. | Programs |
| B. | Video & Graphics |
| C. | Text & Images |
| D. | All |
| Answer» C. Text & Images | |
| 464. |
Using _________ one can resize, tag digital images, organise pictures into albums by drag and drop, can export the pictures for external use (by e-mail or print). |
| A. | Data Organiser |
| B. | Facebook Organiser |
| C. | Image Organiser |
| D. | Media Organiser |
| Answer» D. Media Organiser | |
| 465. |
USB is which type of storage device? |
| A. | Tertiary |
| B. | Secondary |
| C. | Primary |
| D. | Auxillary |
| Answer» C. Primary | |
| 466. |
Ubiquitous computing is also called |
| A. | Pervasive computing |
| B. | Sensor networks |
| C. | Trails |
| D. | None |
| Answer» B. Sensor networks | |
| 467. |
UDP is a |
| A. | connection  oriented protocol |
| B. | connectionless protocol |
| C. | user-Âdefined protocol |
| D. | security protocol |
| Answer» C. user-Âdefined protocol | |
| 468. |
UNIVACÂ is |
| A. | Universal Automatic Computer |
| B. | Universal Array Computer |
| C. | Unvalued Automatic Computer |
| D. | Unique Automatic Computer |
| Answer» B. Universal Array Computer | |
| 469. |
Unsolicited e-mail is called a ______ |
| A. | Newsgroup |
| B. | Usenet |
| C. | Backbane |
| D. | Spam |
| Answer» E. | |
| 470. |
Type of a file in a computer can be identified by the ___. |
| A. | Folder name |
| B. | File size |
| C. | File path |
| D. | File extension |
| Answer» E. | |
| 471. |
Two versions of the Internet Protocol (IP) are in use |
| A. | IP Version 4 & IP Version 6 |
| B. | IP Version 2 & IP Version 3 |
| C. | IP Version 4 & IP Version 8 |
| D. | IP Version 2 & IP Version 4 |
| Answer» B. IP Version 2 & IP Version 3 | |
| 472. |
Translator program used in assembly language |
| A. | Assembler |
| B. | Interpreter |
| C. | Compiler |
| D. | Operating system |
| Answer» B. Interpreter | |
| 473. |
Transformation of input into output is performed by |
| A. | CPU |
| B. | The input-output unit |
| C. | Memory unit |
| D. | Peripherals |
| Answer» B. The input-output unit | |
| 474. |
Today __________ are seen as personal accessory - portable, powerful and simple to operate._x005F_x000D_ |
| A. | |
| B. | e-business_x005F_x000D_ |
| C. | e-content_x005F_x000D_ |
| D. | Computers |
| Answer» E. | |
| 475. |
To make the number pad act as a directional arrow, we press |
| A. | Num lock |
| B. | Caps lock |
| C. | Arrow lock |
| D. | Shift |
| Answer» E. | |
| 476. |
To exit the PowerPoint application, you should |
| A. | Double click the application control menu icon |
| B. | Click the application minimize button |
| C. | Double click the document control menu icon |
| D. | Click the document close button |
| Answer» B. Click the application minimize button | |
| 477. |
To delete columns or rows we can use the delete option under the ______________ in Microsoft Word. |
| A. | Menu |
| B. | Standard toolbar |
| C. | Table Menu |
| D. | Drawing toolbar |
| Answer» D. Drawing toolbar | |
| 478. |
Thesaurus tool in MS word is used for |
| A. | Translate |
| B. | Synonyms and Antonyms words |
| C. | Spelling suggestions |
| D. | None of the above |
| Answer» C. Spelling suggestions | |
| 479. |
To copy cell contents using drag and drop press the |
| A. | Shift key |
| B. | Alt key |
| C. | End key |
| D. | Ctrl key |
| Answer» E. | |
| 480. |
To change the date shortcut used |
| A. | Alt + F3 |
| B. | Alt + F2 |
| C. | F2 |
| D. | F1 |
| Answer» D. F1 | |
| 481. |
There is a network that can connect networks ranging from small location or area to a bigger range including public packet network and large corporate networks. That networks enterprise allows users to share access to applications,services and other centrally located resources. Its ability for a huge geographical access has transformed networking.Which among the following is that network? |
| A. | SAN |
| B. | CAN |
| C. | LAN |
| D. | WAN |
| Answer» E. | |
| 482. |
The word length of a computer is measured in |
| A. | centimeters |
| B. | millimeters |
| C. | bytes |
| D. | bits |
| Answer» E. | |
| 483. |
The unit of measurement of a word length is |
| A. | Meter |
| B. | Byte |
| C. | Bit |
| D. | Millimetre |
| Answer» C. Bit | |
| 484. |
The web uses the __________ to request and serve web pages and programs. |
| A. | Hyper Text Marketing Language |
| B. | Hyper Text Markup Language |
| C. | Hotmail Text Markup Language |
| D. | Home Text Markup Language |
| Answer» C. Hotmail Text Markup Language | |
| 485. |
The __________ uses an addressing scheme known as URL to indicate the location of files on the web. |
| A. | JavaScript |
| B. | World Wide Web |
| C. | SQL |
| D. | String |
| Answer» C. SQL | |
| 486. |
The two  types of output devices are |
| A. | Monitor and Printer |
| B. | Floppy disc and CD |
| C. | Keyboard and Mouse |
| D. | None of these |
| Answer» B. Floppy disc and CD | |
| 487. |
The unit MIPS is used to measure the speed of a___. |
| A. | Disk drive |
| B. | Tape drive |
| C. | Printer |
| D. | Processor |
| Answer» E. | |
| 488. |
The two major types of computer chips are |
| A. | Microprocessor |
| B. | Primary memory |
| C. | Both A & B |
| D. | External memory |
| Answer» D. External memory | |
| 489. |
The two kinds of Main Memory are |
| A. | Random and sequential |
| B. | ROM and RAM |
| C. | Primary and secondary |
| D. | All the above |
| Answer» C. Primary and secondary | |
| 490. |
The transfer of data from one application to another in a computer system is known as |
| A. | Dynamic Data Exchange |
| B. | Dodgy Data Exchange |
| C. | Dogmatic Data Exchange |
| D. | Dynamic Disk Exchange |
| Answer» B. Dodgy Data Exchange | |
| 491. |
The term computer is derived from |
| A. | Latin language |
| B. | Sanskrit language |
| C. | Greek language |
| D. | German language |
| Answer» B. Sanskrit language | |
| 492. |
The tag line "Do no Evil" is owned by |
| A. | Yahoo |
| B. | Bing |
| C. | |
| D. | Start page |
| Answer» D. Start page | |
| 493. |
The system unit of a personal computer typically contains all except |
| A. | Modem |
| B. | Serial interface |
| C. | Microprocessor |
| D. | Disk controller |
| Answer» B. Serial interface | |
| 494. |
The system board is also known as the |
| A. | Mother board |
| B. | Main circuit board |
| C. | Baseboard |
| D. | All of the above |
| Answer» E. | |
| 495. |
The symbols used in an assembly language are called ? |
| A. | Assembler |
| B. | Mnemonics |
| C. | Codes |
| D. | All of the above |
| Answer» C. Codes | |
| 496. |
The size of yes no field is always |
| A. | 1 byte |
| B. | 1 character |
| C. | 1GB |
| D. | 1 bit |
| Answer» E. | |
| 497. |
The resolution of a printer is measured in |
| A. | DPI |
| B. | Megabits |
| C. | Hertz |
| D. | Inches |
| Answer» B. Megabits | |
| 498. |
The quickest and easiest way in word, to locate a particular word or phase in a document is to use the command |
| A. | Replace |
| B. | Find |
| C. | Lookup |
| D. | Search |
| Answer» C. Lookup | |
| 499. |
The process when the computer is switched on and the operating system gets loaded from hard disk to main memory is called |
| A. | Booting |
| B. | Fetching |
| C. | Processing |
| D. | Multi-Processing |
| Answer» B. Fetching | |
| 500. |
The primary tool used in structured design is a |
| A. | module |
| B. | structure chart |
| C. | program flowchart |
| D. | data-flow diagram |
| Answer» C. program flowchart | |