 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 260 Mcqs, each offering curated multiple-choice questions to sharpen your GK knowledge and support exam preparation. Choose a topic below to get started.
| 1. | A single chip processor is also called ____. | 
| A. | Microprocessor | 
| B. | Macroprocessor | 
| C. | valves | 
| D. | Transistor | 
| E. | None of these | 
| Answer» B. Macroprocessor | |
| 2. | Which was the first micro processor ? | 
| A. | Intel 4004 | 
| B. | Intel 4005 | 
| C. | Intel 100 | 
| D. | Intel 200 | 
| E. | None of these | 
| Answer» B. Intel 4005 | |
| 3. | The 8080 micorprocessor was___bit. | 
| A. | 16 bit | 
| B. | 32 bit | 
| C. | 8 bit | 
| D. | 4 bit | 
| E. | None of these | 
| Answer» D. 4 bit | |
| 4. | ALU and CU are the part of whose? | 
| A. | Central Pump unit | 
| B. | Central Processing Unit | 
| C. | Central People Unit | 
| D. | None of these | 
| Answer» C. Central People Unit | |
| 5. | Trend Micro is a______. | 
| A. | Anti-Virus | 
| B. | Firewall | 
| C. | Spyware Application | 
| D. | Spamming | 
| E. | None of the Above | 
| Answer» B. Firewall | |
| 6. | .HTM is used as a file extension for_____________. | 
| A. | Audio Interchange File Format | 
| B. | Adobe Photoshop | 
| C. | PC Application | 
| D. | Data Interchange format | 
| E. | Web page source text | 
| Answer» F. | |
| 7. | A compiler means | 
| A. | A person who compiles source program | 
| B. | The same thing as a programmer | 
| C. | The same thing as a programmer Keypunch operator | 
| D. | A program which translates source program into object program | 
| E. | None of the above | 
| Answer» E. None of the above | |
| 8. | The term 'B' in COBOL, language used for record keeping and data management stands for _______ . | 
| A. | Basic | 
| B. | Business | 
| C. | Binary | 
| D. | Beginner | 
| E. | Bootable | 
| Answer» C. Binary | |
| 9. | WORM stands for? | 
| A. | Write Once Read Memory | 
| B. | Wanted Once Read Memory | 
| C. | Wanted Original Read Memory | 
| D. | Write Original Read Memory | 
| E. | None of these | 
| Answer» B. Wanted Once Read Memory | |
| 10. | A person who used his or her expertise to gain access to other people s computers to get information illegally or do damage is a | 
| A. | hacker | 
| B. | analyst | 
| C. | instant messenger | 
| D. | programmer | 
| E. | spammer | 
| Answer» B. analyst | |
| 11. | What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications? | 
| A. | Cracker | 
| B. | Worm | 
| C. | Trojan horses | 
| D. | Keylogger | 
| E. | Honeypot | 
| Answer» D. Keylogger | |
| 12. | Which of the following is NOT a source of viruses? | 
| A. | Pendrives | 
| B. | Internet | 
| C. | E-mail messages | 
| D. | Computer networks | 
| E. | All of the Above | 
| Answer» E. All of the Above | |
| 13. | What is a bug in computer terminology? | 
| A. | A virus | 
| B. | A program | 
| C. | An error in program | 
| D. | None of these | 
| Answer» D. None of these | |
| 14. | One nibble is equivalent to how many bits? | 
| A. | 2 | 
| B. | 4 | 
| C. | 8 | 
| D. | 1 | 
| Answer» C. 8 | |
| 15. | Which of the following is correct?I. GUI-Graphical User InterfaceII. VDU-Visual Display UnitIII. ALU-All Logical Unit | 
| A. | I and II | 
| B. | I and III | 
| C. | Only III | 
| D. | Only II | 
| Answer» B. I and III | |
| 16. | Which of the following pair is Incorrect? | 
| A. | 10 MB-1024 KB | 
| B. | 1 GB-10240 MB | 
| C. | 1 TB-1024 GB | 
| D. | 1KB-1024 Bytes | 
| Answer» C. 1 TB-1024 GB | |
| 17. | The resolution of a computer monitor is measured by____. | 
| A. | Number of pixels | 
| B. | Number of dots per inch | 
| C. | Glow | 
| D. | PPM | 
| Answer» B. Number of dots per inch | |
| 18. | Which of the following is a desktop operating system? | 
| A. | Mac OS | 
| B. | MS Office | 
| C. | DBMS | 
| D. | Oracle | 
| Answer» B. MS Office | |
| 19. | Which of these features is related to the mouse of the computer? | 
| A. | Printing device | 
| B. | Memory device | 
| C. | Output device | 
| D. | Pointing device | 
| Answer» E. | |
| 20. | What is an assistive technology or service in buying and selling a product on the Internet? | 
| A. | Point of sale | 
| B. | e-banking | 
| C. | e-commerce | 
| D. | Cloud service | 
| Answer» D. Cloud service | |
| 21. | Find the odd one in the following options. | 
| A. | Firmware | 
| B. | ROM | 
| C. | Hard disk | 
| D. | Main memory | 
| Answer» B. ROM | |
| 22. | A computer image is displayed on a white wall. Which output device is being used for this? | 
| A. | L.C.D | 
| B. | Monitor | 
| C. | Data projector | 
| D. | Flat panel | 
| Answer» D. Flat panel | |
| 23. | What is the full form of PROM? | 
| A. | Programmable read-only memory | 
| B. | Program read-output memory | 
| C. | Program read-only memory | 
| D. | Primary read-only memory | 
| Answer» B. Program read-output memory | |
| 24. | In the context of computing, a byte is equal to bits. | 
| A. | 4 | 
| B. | 24 | 
| C. | 8 | 
| D. | 16 | 
| Answer» D. 16 | |
| 25. | The goal of normalization is to _______. | 
| A. | Minimize the number of relationships | 
| B. | Minimum number of entities | 
| C. | Minimize the number of tables | 
| D. | Minimizing data redundancy | 
| E. | None of these | 
| Answer» E. None of these | |
| 26. | If you want to share broadband internet connection, you have to install _________ on the network. | 
| A. | Router | 
| B. | Modem | 
| C. | Node | 
| D. | Cable | 
| E. | None of these | 
| Answer» C. Node | |
| 27. | ______ denotes what is in the data base fields? | 
| A. | Structures | 
| B. | Field markers | 
| C. | Field definitions | 
| D. | Field name | 
| E. | None of these | 
| Answer» C. Field definitions | |
| 28. | What is the primary difference between virus and worm? | 
| A. | A worm has the ability to self-propagate from the infected computer of the user to other computers. | 
| B. | The worm is usually written by a cracker - script bunnies do not have the skill of worm program development | 
| C. | Viruses are very harmful for the computers it infects; Worm is not such a serious problem. | 
| D. | Antivirus is effective for fighting software, not for fighting worms | 
| E. | None of the above | 
| Answer» C. Viruses are very harmful for the computers it infects; Worm is not such a serious problem. | |
| 29. | ___________ are the words which the programming language has introduced in its | 
| A. | Control Bus | 
| B. | Reserved Bus | 
| C. | Control Structures | 
| D. | Rigid Keys | 
| E. | None of these | 
| Answer» C. Control Structures | |
| 30. | What happens when the data is changed in multiple lists and all the lists are not updated? | 
| A. | Data redundancy | 
| B. | Information overload | 
| C. | Duplicate data | 
| D. | Data inconsistency | 
| E. | None of these | 
| Answer» E. None of these | |
| 31. | Proxy server is used for which of the following? | 
| A. | To provide protection against unauthorized users. | 
| B. | Processing client requests for web pages. | 
| C. | Processing client requests for database access. | 
| D. | Providing TCP / IP. | 
| E. | None of the above | 
| Answer» E. None of the above | |
| 32. | Virus usually comes from the floppy disk left in the floppy disk drive. | 
| A. | Trojan Horse | 
| B. | Boot Sectors | 
| C. | Script | 
| D. | Logic Bomb | 
| E. | None of these | 
| Answer» C. Script | |
| 33. | This part of the operating system restricts essential peripherals such as the keyboard, screen, disk, and parallel and serial ports | 
| A. | Basic Input / Output System | 
| B. | Secondary Input / Output System | 
| C. | Peripheral Input / Output System | 
| D. | Marginal Input / Output System | 
| E. | None of these | 
| Answer» B. Secondary Input / Output System | |
| 34. | Computer can transmit data in the position of _____ in ring topology. | 
| A. | Packet | 
| B. | Data | 
| C. | Access Method | 
| D. | Token | 
| E. | None of these | 
| Answer» E. None of these | |
| 35. | All of the following are mobile computing devices except | 
| A. | Notebook Computer | 
| B. | Cellular Phone | 
| C. | Digital Scanner | 
| D. | Personal Digital Assistant | 
| E. | None of these | 
| Answer» D. Personal Digital Assistant | |
| 36. | _______ are specially designed computer chips that reside within other designs, such as your car or electronic thermostat. | 
| A. | Server | 
| B. | Embedded Computers | 
| C. | Robotic Computers | 
| D. | Mainframe | 
| E. | None of these | 
| Answer» C. Robotic Computers | |
| 37. | System software is a set of programs that enable computer hardware devices and software to work together. | 
| A. | Management | 
| B. | Processing | 
| C. | Utility | 
| D. | Applications | 
| E. | None of these | 
| Answer» E. None of these | |
| 38. | What is called the OSI model layer is divided into ____________ processes. | 
| A. | Five | 
| B. | Six | 
| C. | Seven | 
| D. | Eight | 
| E. | None of these | 
| Answer» D. Eight | |
| 39. | ______ terminals (earlier called cash registers) are often associated with complex inventory and sales computer systems. | 
| A. | Data | 
| B. | Sales | 
| C. | Query | 
| D. | Point of Sales | 
| E. | None of these | 
| Answer» B. Sales | |
| 40. | All of the following are examples of real security and privacy risk except _____. | 
| A. | Hackers | 
| B. | Spam | 
| C. | Virus | 
| D. | Identity Theft | 
| E. | None of these | 
| Answer» F. | |
| 41. | ________ servers store and manage files for network users. | 
| A. | Authentication | 
| B. | Main | 
| C. | web | 
| D. | File | 
| E. | None of these | 
| Answer» E. None of these | |
| 42. | Which of the following is a data warehouse? | 
| A. | It can be updated by the end user. | 
| B. | There are many naming conventions and formats in it. | 
| C. | Organize around important subject areas. | 
| D. | They contain only current data. | 
| E. | None of these | 
| Answer» D. They contain only current data. | |
| 43. | What is a program called that has only one developer, is sold bundled together and has better intent and features, toolbars and menus in common? | 
| A. | Software Suite | 
| B. | Integrated software package | 
| C. | Software Processing Package | 
| D. | Personal Information Manager | 
| E. | None of these | 
| Answer» C. Software Processing Package | |
| 44. | In .. usually by email asking users to click on a link and enter their personal data. | 
| A. | DOS attack | 
| B. | Phishing Attack | 
| C. | Firewall | 
| D. | SSL | 
| Answer» C. Firewall | |
| 45. | Which software controls the hardware of the computer? | 
| A. | Application | 
| B. | Program | 
| C. | System | 
| D. | Memory | 
| Answer» D. Memory | |
| 46. | Which of the following are valid minimum and maximum zoom sizes in MS-office? | 
| A. | 10, 100 | 
| B. | 10, 1000 | 
| C. | 20, 250 | 
| D. | 10, 500 | 
| E. | None of these | 
| Answer» E. None of these | |
| 47. | What program is used in MS - Word to check the spellings? | 
| A. | Spell pro | 
| B. | Spell check | 
| C. | Outlook express | 
| D. | All of the above | 
| E. | None of these | 
| Answer» C. Outlook express | |
| 48. | In which of the following areas, a spreadsheet software is more useful? | 
| A. | Psychology | 
| B. | Publishing | 
| C. | Statistics | 
| D. | Message sending | 
| Answer» E. | |
| 49. | When a group of computers is connected together in a small area without the help of telephone lines, it is called | 
| A. | Remote Communication Network ( RCN ) | 
| B. | Local Area Network ( LAN ) | 
| C. | Wide Area Network ( WAN ) | 
| D. | Value Added Network ( VAN ) | 
| Answer» C. Wide Area Network ( WAN ) | |
| 50. | A translator for the assembly language to machine language is | 
| A. | Assembler | 
| B. | Compiler | 
| C. | Linker | 
| D. | Interpreter | 
| Answer» D. Interpreter | |