Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

In order to play and hear sound on a computer, one needs:

A. A microphone, sound card and speakers
B. Only sound card required
C. A sound card and speakers
D. None of these is required
Answer» D. None of these is required
2.

Program which reads one record at a time from transaction and master file is called the

A. saved program
B. updating program
C. run time program
D. online program
Answer» C. run time program
3.

Process of creating copy of stored data onto another disc is termed as creating

A. locked files
B. backup files
C. modified file
D. destroyed file
Answer» C. modified file
4.

Flip flop circuit store ________ of data

A. One bit
B. One byte
C. 8 bit
D. 8 byte
Answer» B. One byte
5.

What is usually used for displaying information at public places?

A. Monitors
B. Overhead
C. Monitor and overhead projection
D. Touch screen kiosks
Answer» E.
6.

When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

A. A virus
B. A Trojan Horse
C. Cracking
D. A denial of service attack.
Answer» E.
7.

How did the computer mouse get its name?

A. Its cable looks like a tail.
B. Because it squeaks when moved
C. It has ears.
D. Teeth outside mouth.
Answer» B. Because it squeaks when moved
8.

Complete set of special characters used by any system is classified as

A. control characters
B. graphics characters
C. character set
D. alphanumeric characters
Answer» D. alphanumeric characters
9.

Whic one of the following is the founder of €˜Wikileaks

A. Evans Williams
B. Jack Dorsey
C. Julian Assange
D. Noah Glass
Answer» D. Noah Glass
10.

In computer, the fly-by-wire system is used in

A. medical field
B. airline
C. education field
D. business field
Answer» C. education field
11.

A set of formal operating rules and procedures to govern a given process are

A. Functions
B. Procedures
C. Formalization
D. Protocols
Answer» E.
12.

The generic term 'device' refers to any piece of

A. software
B. hardware
C. netware
D. groupware
Answer» C. netware
13.

Jobs processed in multiprogramming are to be done

A. very quickly
B. very slow
C. very time consuming
D. very systematic
Answer» B. very slow
14.

The majority of computer crimes are committed by:

A. Hackers
B. Insiders
C. Overseas criminals
D. Young teenage computer geniuses
Answer» C. Overseas criminals
15.

The _________ interface transmits one bit at a time

A. Parallel
B. SCSI
C. Serial
D. Fiber
Answer» D. Fiber
16.

Information processing cycle includes

A. input, processing, output, storage
B. input, output, manipulation, arithmetic
C. data, processing, printing, editing
D. storage, display, data, information
Answer» B. input, output, manipulation, arithmetic
17.

A web browser is a program of kind

A. Server program
B. Slave program
C. Dynamic program
D. Client program
Answer» E.
18.

HTML viruses infect:

A. Your computer
B. A Web page in the HTML code
C. Both a Web page and the computer that is viewing it.
D. None of these
Answer» C. Both a Web page and the computer that is viewing it.
19.

The use of computer in education is started in

A. 1960s
B. 1970s
C. 1980s
D. 1990s
Answer» C. 1980s
20.

Method of scanning of files for a desired record is classified as

A. linear research
B. quadratic search
C. search
D. non linear research
Answer» D. non linear research
21.

Computer I/O processor is

A. general-purpose
B. special-purpose
C. multi-purpose
D. one-purpose
Answer» C. multi-purpose
22.

Disc which has diameter of 30cm and have capacity of 1000 megabytes is classified as

A. bubble floppy
B. blocked bubble disc
C. compact disc
D. laser discs
Answer» E.
23.

Portion of directory which can be accessed separately is classified as

A. directory part
B. sub directory
C. proof directory
D. disc directory
Answer» C. proof directory
24.

Arrangement of data into a specific order is classified as

A. sorting
B. ordering
C. learning
D. inquiring
Answer» B. ordering
25.

Way in which nodes of a network are linked together, depicts the

A. Network structure
B. Network definition
C. Network topology
D. Network communication
Answer» D. Network communication
26.

More manageable type of analog computer is

A. calculator
B. old-fashioned slide rule
C. tabulator
D. analytical engine
Answer» C. tabulator
27.

Two sequential files with ordered records are combined in single file is considered as

A. searching
B. merging
C. finding
D. file learning
Answer» C. finding
28.

Logic gate in which output is zero for inputs in which one input is one and other inputs are zero is classified as

A. AND gate
B. NOT gate
C. OR gate
D. OUT gate
Answer» B. NOT gate
29.

Possible dangers and threats for files are that fie can be

A. destroyed
B. modified
C. accessed
D. all of above
Answer» E.
30.

Two type of memories 'RAM' and 'ROM' are part of

A. backup memory
B. main memory
C. shorter memory
D. long-term memory
Answer» C. shorter memory
31.

Now a days many products are designed using

A. ATM
B. ROBOT
C. CAD
D. CAM
Answer» D. CAM
32.

Which of then following is example of direct access?

A. magnetic disc
B. floppy disc
C. program tape
D. plain disc
Answer» B. floppy disc
33.

Central Processing Unit (CPU) consists of

A. control unit
B. arithmetic and logic unit
C. main store
D. all of above
Answer» E.
34.

Speed of a computer is measured in terms of unit

A. Milliseconds
B. Nanoseconds
C. Picoseconds
D. Both b and c
Answer» E.
35.

In sequential files update, record order keys of transaction and master file are always sorted in

A. descending order
B. left to right order
C. ascending order
D. right to left order
Answer» D. right to left order
36.

Which Indian IT expert started web-based email service HOTMAIL in 1996?

A. Sabeer Bhatia
B. Vinod Dham
C. Ajim Premji
D. Narayan Murthy
Answer» B. Vinod Dham
37.

Kind of exchange in which number is compared to next item for possible exchange is called

A. exchange sort
B. selection sort
C. bubble sort
D. possible sort
Answer» D. possible sort
38.

In 1999, the Melissa virus was a widely publicized:

A. e-mail Virus
B. Macro virus
C. Trojan Horse
D. Time Bomb
Answer» B. Macro virus
39.

MRI, CT-scan, Ultrasound devices are the examples of use of computer in

A. science
B. education
C. business
D. stock-exchange
Answer» B. education
40.

In user facilities, copying of all records onto a main store from permanent store is considered as

A. delete file
B. rename file
C. save file
D. load file
Answer» E.
41.

Measuring unit of capacity of hard drive is-

A. GHz
B. GB
C. Gwatts
D. G Newton
Answer» C. Gwatts
42.

The ........................ is a box that houses the most important parts of a computer system.

A. software
B. hardware
C. input drive
D. system unit
Answer» E.
43.

HTTP is used to generate requests of Web servers throughout internet on behalf of

A. Browser administrator
B. Browser user
C. Browser protocol
D. Browser locator
Answer» C. Browser protocol
44.

In American Standard Code (ASCII), maximum possible characters set size can be

A. character set of 128
B. character set of 138
C. character set of 148
D. character set of 158
Answer» B. character set of 138
45.

Communication links can be established between sender and receiver in a communication network by means of

A. Packet switching
B. Circuit switching
C. Message switching
D. All of the Above
Answer» E.
46.

The "folders" in an operating system are based on ________ structure

A. Doubly linked
B. Queue
C. Inverted tree
D. Graph
Answer» D. Graph
47.

C language was developed by

A. IBM
B. Apple Macintosh
C. Microsoft
D. AT&T;
Answer» E.
48.

In sorting sequential files, data is stored only when it is in

A. main store
B. temporary store
C. complex store
D. simple store
Answer» B. temporary store
49.

In computer, CAL stands for

A. computer aided learning
B. computer assist learning
C. computer added learning
D. computer and learning
Answer» B. computer assist learning
50.

On the Internet, moving from one web site to another is known as ________

A. Uploading
B. Downloading
C. Searching
D. Browsing
Answer» E.