

MCQOPTIONS
This section includes 260 Mcqs, each offering curated multiple-choice questions to sharpen your GK knowledge and support exam preparation. Choose a topic below to get started.
1. |
A single chip processor is also called ____. |
A. | Microprocessor |
B. | Macroprocessor |
C. | valves |
D. | Transistor |
E. | None of these |
Answer» B. Macroprocessor | |
2. |
Which was the first micro processor ? |
A. | Intel 4004 |
B. | Intel 4005 |
C. | Intel 100 |
D. | Intel 200 |
E. | None of these |
Answer» B. Intel 4005 | |
3. |
The 8080 micorprocessor was___bit. |
A. | 16 bit |
B. | 32 bit |
C. | 8 bit |
D. | 4 bit |
E. | None of these |
Answer» D. 4 bit | |
4. |
ALU and CU are the part of whose? |
A. | Central Pump unit |
B. | Central Processing Unit |
C. | Central People Unit |
D. | None of these |
Answer» C. Central People Unit | |
5. |
Trend Micro is a______. |
A. | Anti-Virus |
B. | Firewall |
C. | Spyware Application |
D. | Spamming |
E. | None of the Above |
Answer» B. Firewall | |
6. |
.HTM is used as a file extension for_____________. |
A. | Audio Interchange File Format |
B. | Adobe Photoshop |
C. | PC Application |
D. | Data Interchange format |
E. | Web page source text |
Answer» F. | |
7. |
A compiler means |
A. | A person who compiles source program |
B. | The same thing as a programmer |
C. | The same thing as a programmer Keypunch operator |
D. | A program which translates source program into object program |
E. | None of the above |
Answer» E. None of the above | |
8. |
The term 'B' in COBOL, language used for record keeping and data management stands for _______ . |
A. | Basic |
B. | Business |
C. | Binary |
D. | Beginner |
E. | Bootable |
Answer» C. Binary | |
9. |
WORM stands for? |
A. | Write Once Read Memory |
B. | Wanted Once Read Memory |
C. | Wanted Original Read Memory |
D. | Write Original Read Memory |
E. | None of these |
Answer» B. Wanted Once Read Memory | |
10. |
A person who used his or her expertise to gain access to other people s computers to get information illegally or do damage is a |
A. | hacker |
B. | analyst |
C. | instant messenger |
D. | programmer |
E. | spammer |
Answer» B. analyst | |
11. |
What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications? |
A. | Cracker |
B. | Worm |
C. | Trojan horses |
D. | Keylogger |
E. | Honeypot |
Answer» D. Keylogger | |
12. |
Which of the following is NOT a source of viruses? |
A. | Pendrives |
B. | Internet |
C. | E-mail messages |
D. | Computer networks |
E. | All of the Above |
Answer» E. All of the Above | |
13. |
What is a bug in computer terminology? |
A. | A virus |
B. | A program |
C. | An error in program |
D. | None of these |
Answer» D. None of these | |
14. |
One nibble is equivalent to how many bits? |
A. | 2 |
B. | 4 |
C. | 8 |
D. | 1 |
Answer» C. 8 | |
15. |
Which of the following is correct? |
A. | I and II |
B. | I and III |
C. | Only III |
D. | Only II |
Answer» B. I and III | |
16. |
Which of the following pair is Incorrect? |
A. | 10 MB-1024 KB |
B. | 1 GB-10240 MB |
C. | 1 TB-1024 GB |
D. | 1KB-1024 Bytes |
Answer» C. 1 TB-1024 GB | |
17. |
The resolution of a computer monitor is measured by____. |
A. | Number of pixels |
B. | Number of dots per inch |
C. | Glow |
D. | PPM |
Answer» B. Number of dots per inch | |
18. |
Which of the following is a desktop operating system? |
A. | Mac OS |
B. | MS Office |
C. | DBMS |
D. | Oracle |
Answer» B. MS Office | |
19. |
Which of these features is related to the mouse of the computer? |
A. | Printing device |
B. | Memory device |
C. | Output device |
D. | Pointing device |
Answer» E. | |
20. |
What is an assistive technology or service in buying and selling a product on the Internet? |
A. | Point of sale |
B. | e-banking |
C. | e-commerce |
D. | Cloud service |
Answer» D. Cloud service | |
21. |
Find the odd one in the following options. |
A. | Firmware |
B. | ROM |
C. | Hard disk |
D. | Main memory |
Answer» B. ROM | |
22. |
A computer image is displayed on a white wall. Which output device is being used for this? |
A. | L.C.D |
B. | Monitor |
C. | Data projector |
D. | Flat panel |
Answer» D. Flat panel | |
23. |
What is the full form of PROM? |
A. | Programmable read-only memory |
B. | Program read-output memory |
C. | Program read-only memory |
D. | Primary read-only memory |
Answer» B. Program read-output memory | |
24. |
In the context of computing, a byte is equal to bits. |
A. | 4 |
B. | 24 |
C. | 8 |
D. | 16 |
Answer» D. 16 | |
25. |
The goal of normalization is to _______. |
A. | Minimize the number of relationships |
B. | Minimum number of entities |
C. | Minimize the number of tables |
D. | Minimizing data redundancy |
E. | None of these |
Answer» E. None of these | |
26. |
If you want to share broadband internet connection, you have to install _________ on the network. |
A. | Router |
B. | Modem |
C. | Node |
D. | Cable |
E. | None of these |
Answer» C. Node | |
27. |
______ denotes what is in the data base fields? |
A. | Structures |
B. | Field markers |
C. | Field definitions |
D. | Field name |
E. | None of these |
Answer» C. Field definitions | |
28. |
What is the primary difference between virus and worm? |
A. | A worm has the ability to self-propagate from the infected computer of the user to other computers. |
B. | The worm is usually written by a cracker - script bunnies do not have the skill of worm program development |
C. | Viruses are very harmful for the computers it infects; Worm is not such a serious problem. |
D. | Antivirus is effective for fighting software, not for fighting worms |
E. | None of the above |
Answer» C. Viruses are very harmful for the computers it infects; Worm is not such a serious problem. | |
29. |
___________ are the words which the programming language has introduced in its |
A. | Control Bus |
B. | Reserved Bus |
C. | Control Structures |
D. | Rigid Keys |
E. | None of these |
Answer» C. Control Structures | |
30. |
What happens when the data is changed in multiple lists and all the lists are not updated? |
A. | Data redundancy |
B. | Information overload |
C. | Duplicate data |
D. | Data inconsistency |
E. | None of these |
Answer» E. None of these | |
31. |
Proxy server is used for which of the following? |
A. | To provide protection against unauthorized users. |
B. | Processing client requests for web pages. |
C. | Processing client requests for database access. |
D. | Providing TCP / IP. |
E. | None of the above |
Answer» E. None of the above | |
32. |
Virus usually comes from the floppy disk left in the floppy disk drive. |
A. | Trojan Horse |
B. | Boot Sectors |
C. | Script |
D. | Logic Bomb |
E. | None of these |
Answer» C. Script | |
33. |
This part of the operating system restricts essential peripherals such as the keyboard, screen, disk, and parallel and serial ports |
A. | Basic Input / Output System |
B. | Secondary Input / Output System |
C. | Peripheral Input / Output System |
D. | Marginal Input / Output System |
E. | None of these |
Answer» B. Secondary Input / Output System | |
34. |
Computer can transmit data in the position of _____ in ring topology. |
A. | Packet |
B. | Data |
C. | Access Method |
D. | Token |
E. | None of these |
Answer» E. None of these | |
35. |
All of the following are mobile computing devices except |
A. | Notebook Computer |
B. | Cellular Phone |
C. | Digital Scanner |
D. | Personal Digital Assistant |
E. | None of these |
Answer» D. Personal Digital Assistant | |
36. |
_______ are specially designed computer chips that reside within other designs, such as your car or electronic thermostat. |
A. | Server |
B. | Embedded Computers |
C. | Robotic Computers |
D. | Mainframe |
E. | None of these |
Answer» C. Robotic Computers | |
37. |
System software is a set of programs that enable computer hardware devices and software to work together. |
A. | Management |
B. | Processing |
C. | Utility |
D. | Applications |
E. | None of these |
Answer» E. None of these | |
38. |
What is called the OSI model layer is divided into ____________ processes. |
A. | Five |
B. | Six |
C. | Seven |
D. | Eight |
E. | None of these |
Answer» D. Eight | |
39. |
______ terminals (earlier called cash registers) are often associated with complex inventory and sales computer systems. |
A. | Data |
B. | Sales |
C. | Query |
D. | Point of Sales |
E. | None of these |
Answer» B. Sales | |
40. |
All of the following are examples of real security and privacy risk except _____. |
A. | Hackers |
B. | Spam |
C. | Virus |
D. | Identity Theft |
E. | None of these |
Answer» F. | |
41. |
________ servers store and manage files for network users. |
A. | Authentication |
B. | Main |
C. | web |
D. | File |
E. | None of these |
Answer» E. None of these | |
42. |
Which of the following is a data warehouse? |
A. | It can be updated by the end user. |
B. | There are many naming conventions and formats in it. |
C. | Organize around important subject areas. |
D. | They contain only current data. |
E. | None of these |
Answer» D. They contain only current data. | |
43. |
What is a program called that has only one developer, is sold bundled together and has better intent and features, toolbars and menus in common? |
A. | Software Suite |
B. | Integrated software package |
C. | Software Processing Package |
D. | Personal Information Manager |
E. | None of these |
Answer» C. Software Processing Package | |
44. |
In .. usually by email asking users to click on a link and enter their personal data. |
A. | DOS attack |
B. | Phishing Attack |
C. | Firewall |
D. | SSL |
Answer» C. Firewall | |
45. |
Which software controls the hardware of the computer? |
A. | Application |
B. | Program |
C. | System |
D. | Memory |
Answer» D. Memory | |
46. |
Which of the following are valid minimum and maximum zoom sizes in MS-office? |
A. | 10, 100 |
B. | 10, 1000 |
C. | 20, 250 |
D. | 10, 500 |
E. | None of these |
Answer» E. None of these | |
47. |
What program is used in MS - Word to check the spellings? |
A. | Spell pro |
B. | Spell check |
C. | Outlook express |
D. | All of the above |
E. | None of these |
Answer» C. Outlook express | |
48. |
In which of the following areas, a spreadsheet software is more useful? |
A. | Psychology |
B. | Publishing |
C. | Statistics |
D. | Message sending |
Answer» E. | |
49. |
When a group of computers is connected together in a small area without the help of telephone lines, it is called |
A. | Remote Communication Network ( RCN ) |
B. | Local Area Network ( LAN ) |
C. | Wide Area Network ( WAN ) |
D. | Value Added Network ( VAN ) |
Answer» C. Wide Area Network ( WAN ) | |
50. |
A translator for the assembly language to machine language is |
A. | Assembler |
B. | Compiler |
C. | Linker |
D. | Interpreter |
Answer» D. Interpreter | |