MCQOPTIONS
Saved Bookmarks
This section includes 621 Mcqs, each offering curated multiple-choice questions to sharpen your General Knowledge knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
How many layers are there in the OSI networking model? |
| A. | 13 |
| B. | 11 |
| C. | 9 |
| D. | 7 |
| Answer» E. | |
| 102. |
HTML in computer science stands for? |
| A. | HyperText Markup Language |
| B. | HyperText Main Language |
| C. | HyperText Memory Language |
| D. | HyperText Mandatory Language |
| Answer» B. HyperText Main Language | |
| 103. |
HTML is a subset of_x005F_x000D_ |
| A. | SGMH |
| B. | SGMD |
| C. | SGML |
| D. | None of the above |
| Answer» D. None of the above | |
| 104. |
HTTP in computer science stands for? |
| A. | HyperText Transmission Protocol |
| B. | HyperText Transfer Protocol |
| C. | HyperText Technology Protocol |
| D. | HyperText Total Protocol |
| Answer» C. HyperText Technology Protocol | |
| 105. |
Hub works on which layer? |
| A. | Network layer |
| B. | Physical layer |
| C. | Data link layer |
| D. | All of the above |
| Answer» C. Data link layer | |
| 106. |
How many KB is equal to 1 GB? |
| A. | 1024 |
| B. | 256 x 1024 |
| C. | 1024 x 1024 |
| D. | 1024 x 1024 x 128 |
| Answer» D. 1024 x 1024 x 128 | |
| 107. |
Hard Drive capacity is measured in |
| A. | Newton |
| B. | GB |
| C. | THz |
| D. | Gwallior |
| Answer» C. THz | |
| 108. |
Hardware devices that are not part of the main computer system and are often added later to the system are ________ |
| A. | clip art |
| B. | highlight |
| C. | execute |
| D. | peripherals |
| Answer» E. | |
| 109. |
How many bits does an IP address contain? |
| A. | 64 bits |
| B. | 32 Bits |
| C. | 128 Bits |
| D. | 256 Bits |
| Answer» C. 128 Bits | |
| 110. |
How do you display current date and time in MS Excel ? |
| A. | Time () |
| B. | Now () |
| C. | Date () |
| D. | Today () |
| Answer» C. Date () | |
| 111. |
Hard copy of a document is |
| A. | Printed on printer |
| B. | Stored in floppy |
| C. | Store in CD |
| D. | Store in hard disk |
| Answer» B. Stored in floppy | |
| 112. |
Hard disk is coated in both side with |
| A. | Carbon layer |
| B. | Magnetic metallic oxide |
| C. | Optical metallic oxide |
| D. | All of the above |
| Answer» C. Optical metallic oxide | |
| 113. |
Google Docs is a type of cloud computing. |
| A. | 1 |
| B. | |
| C. | |
| D. | |
| Answer» B. | |
| 114. |
Function key ___ in a Windows keyboard can perform several functions, and does not have an assigned Windows default._x005F_x000D_ |
| A. | F1 |
| B. | F6 |
| C. | F8 |
| D. | F9 |
| Answer» D. F9 | |
| 115. |
Full form of BIOS is |
| A. | Binary Interchange Operation System |
| B. | Basic Input Output System |
| C. | Beginner's Input Operation Symbol |
| D. | Basic Interface Oriented Service |
| Answer» C. Beginner's Input Operation Symbol | |
| 116. |
Font size is measured in |
| A. | pixels |
| B. | points |
| C. | didos |
| D. | percents |
| Answer» C. didos | |
| 117. |
FORTRAN is not used for _____._x005F_x000D_ (I) Drawing pictures(II) Carrying out mathematics computations |
| A. | Only (I) |
| B. | Only (II) |
| C. | Both (I) and (II) |
| D. | Neither (I) nor (II) |
| Answer» D. Neither (I) nor (II) | |
| 118. |
Formatting a cell in currency you can specify |
| A. | Percentage symbol |
| B. | Currency symbol |
| C. | Decimal places |
| D. | Both B & C |
| Answer» C. Decimal places | |
| 119. |
First page of website is termed as |
| A. | Index |
| B. | Home page |
| C. | JAVA Script |
| D. | Bookmark page |
| Answer» C. JAVA Script | |
| 120. |
Find the odd statement out in relation to firewall. |
| A. | Firewall can be a software |
| B. | Firewall can be a hardware |
| C. | Firewall can be a combination of software & hardware |
| D. | Firewall protects computer from fire |
| Answer» D. Firewall protects computer from fire | |
| 121. |
Fifth generation computer is also known as |
| A. | Very Large Scale Integration (VLSI) |
| B. | Knowledge information processing system |
| C. | Both A & B |
| D. | None of the above |
| Answer» C. Both A & B | |
| 122. |
F12 key is known as |
| A. | Company Configuration |
| B. | Accounting Features |
| C. | Company Features |
| D. | All of the above |
| Answer» B. Accounting Features | |
| 123. |
Find the "odd one out". |
| A. | Linux |
| B. | Windows 98 |
| C. | C++ |
| D. | Windows 7 |
| Answer» D. Windows 7 | |
| 124. |
Firewalls are used to protect against |
| A. | Virus Attacks |
| B. | Unauthorized Access |
| C. | Data Driven Attacks |
| D. | Fire Attacks |
| Answer» C. Data Driven Attacks | |
| 125. |
Expansion cards are inserted into |
| A. | Peripheral Devices |
| B. | Pegs |
| C. | Slots |
| D. | The back of the computer |
| Answer» D. The back of the computer | |
| 126. |
Excel displays the current cell address in the |
| A. | Title Bar |
| B. | Name Box |
| C. | Status Bar |
| D. | Formula bar |
| Answer» C. Status Bar | |
| 127. |
Every HTML file is a ___________ file._x005F_x000D_ |
| A. | Text |
| B. | Audio |
| C. | Video |
| D. | Image |
| Answer» B. Audio | |
| 128. |
Every set in the dotted decimal format of IP address is called |
| A. | Subnet |
| B. | Octet |
| C. | Subset |
| D. | IP set |
| Answer» C. Subset | |
| 129. |
Every computer on the internet is known as |
| A. | Client |
| B. | Modem |
| C. | Server |
| D. | Host |
| Answer» E. | |
| 130. |
Enumerators are stored by the compiler in |
| A. | integer |
| B. | string |
| C. | float |
| D. | any of above |
| Answer» B. string | |
| 131. |
Every component of your computer is either |
| A. | Hardware or CPU |
| B. | RAM/CPU or Hardware |
| C. | Hardware or Software |
| D. | System or Application software |
| Answer» D. System or Application software | |
| 132. |
Esc key in a windows keyboard is not used to_x005F_x000D_ |
| A. | Close a dialog-box |
| B. | Run a selected command |
| C. | Cancel a command |
| D. | Close a selected drop down list |
| Answer» C. Cancel a command | |
| 133. |
EPROMÂ can be used for |
| A. | Erasing and reconstructing the contents of ROM |
| B. | Duplicating ROM |
| C. | Reconstructing the contents of ROM |
| D. | Erasing the contents of ROM |
| Answer» B. Duplicating ROM | |
| 134. |
Ethernet system uses which of the following technology? |
| A. | Ring |
| B. | Bus |
| C. | Star |
| D. | Tree |
| Answer» C. Star | |
| 135. |
During Processing data, programs, and processed information are held temporarily in _________ |
| A. | Secodary stoage |
| B. | ROM |
| C. | RAM |
| D. | None of these |
| Answer» D. None of these | |
| 136. |
DSL is an example of what type of internet access? |
| A. | Wireless |
| B. | Network |
| C. | Broadband |
| D. | Slow |
| Answer» D. Slow | |
| 137. |
Digital computers use a ......... system to encode date and programs. |
| A. | semiconductor |
| B. | decimal |
| C. | binary |
| D. | RAM |
| Answer» D. RAM | |
| 138. |
Documentation of computer programs is impograms is important so that ________ |
| A. | users can learn how to use the program |
| B. | other programmers can know how to maintain the program |
| C. | the programer can see why the code is written that way while hunting for sources of error |
| D. | all of above |
| Answer» E. | |
| 139. |
Debugging is the process of |
| A. | Rolling out a software program |
| B. | Modifying a software program |
| C. | Checking errors in a software program |
| D. | Changing the design structure of a program |
| Answer» D. Changing the design structure of a program | |
| 140. |
Digitized information can be used by computers. |
| A. | 1 |
| B. | |
| C. | |
| D. | |
| Answer» B. | |
| 141. |
Delayed payload of some viruses is also called as _____ |
| A. | Bomb |
| B. | Late - Virus |
| C. | Time |
| D. | Anti-virus |
| Answer» B. Late - Virus | |
| 142. |
Data stored in computer in which form? |
| A. | numbers |
| B. | text |
| C. | audio |
| D. | images |
| Answer» B. text | |
| 143. |
Data in database at a particular point of time is called as? |
| A. | Intension |
| B. | Extension |
| C. | Back up |
| D. | Application |
| Answer» C. Back up | |
| 144. |
Cybercards are most useful for |
| A. | writing to-do lists |
| B. | creating new inventions |
| C. | keeping a personal diary |
| D. | tracking Internet-based research |
| Answer» E. | |
| 145. |
Ctrl+F in MS Word for |
| A. | Re do |
| B. | to find the word |
| C. | Select all |
| D. | Center text |
| Answer» C. Select all | |
| 146. |
Current search engines function by recognizing keywords. |
| A. | 1 |
| B. | |
| C. | |
| D. | |
| Answer» B. | |
| 147. |
CTRL + ] is used for |
| A. | Re-do |
| B. | Right align text |
| C. | Increase in font size |
| D. | Expand or collapse the ribbon |
| Answer» D. Expand or collapse the ribbon | |
| 148. |
CPU speed of a personal computer is |
| A. | 1 MIPS |
| B. | 100 KIPS |
| C. | 32 KIPS |
| D. | 32 MIPS |
| Answer» D. 32 MIPS | |
| 149. |
CPU Scheduler is also known as _____ . |
| A. | Job Scheduler |
| B. | Resource Scheduler |
| C. | Short-Âterm Scheduler |
| D. | Process Scheduler |
| Answer» D. Process Scheduler | |
| 150. |
CPU performance is measured through ________. |
| A. | MHz |
| B. | Throughput |
| C. | Flaps |
| D. | None of the above |
| Answer» C. Flaps | |