Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

"Macintosh" operating system was developed by

A. Google
B. IBM
C. Microsoft
D. Apple
Answer» E.
2.

What is the full name of CCTV

A. Closed Contact Television
B. Closed Circuit Television
C. Closed Circuit Transmission
D. Closed Circuit Translation
Answer» C. Closed Circuit Transmission
3.

When a packet is lost in transit, it should be handled by __

A. error control
B. loss control
C. sequence control
D. duplication control
Answer» D. duplication control
4.

CentOS and Ubuntu is an example of

A. Types of Computers
B. Application software
C. Operating systems
D. Network software
Answer» D. Network software
5.

Who is known as the inventor of email

A. Paul Baran
B. Vint Cerf
C. Ray Tomlinson
D. Shiva Ayyadurai
Answer» D. Shiva Ayyadurai
6.

The first message over internet was transmitted in the year

A. 1969
B. 1972
C. 1987
D. 1993
Answer» B. 1972
7.

RAM (random access memory) was invented in 1968 by

A. John Bardeen
B. Robert Dennard
C. Robert Metcalfe
D. Douglas Engelbart
Answer» C. Robert Metcalfe
8.

Which combination of keys forces a complete refresh of the web page, clearing the cache and downloading all contents of the page again

A. Ctrl+F5
B. Alt+F5
C. Ctrl+F2
D. Alt+F2
Answer» B. Alt+F5
9.

Which function key provide enter and exit fullscreen mode in all modern Internet browsers

A. F8
B. F10
C. F11
D. F12
Answer» D. F12
10.

Which one is a parent company of Google

A. Calico
B. Alphabet Inc.
C. Gilead Sciences
D. Berkshire Hathaway
Answer» C. Gilead Sciences
11.

Who among the following is considered as the 'father of artificial intelligence'

A. John McCarthy
B. Alan Turing
C. Donald Knuth
D. John von Neumann
Answer» B. Alan Turing
12.

In the field of computer, VIRUS stands for

A. Very Intelligent Result Until Source
B. Vital Information Resource Under Siege
C. Viral Important Record User Searched
D. Very Interchanged Resource Under Search
Answer» C. Viral Important Record User Searched
13.

The first mechanical computer designed by Charles Babbage was called

A. Abacus
B. Process Engine
C. Analytical Engine
D. Digital Engine
Answer» D. Digital Engine
14.

A term used to describe the process of reorganizing a hard drive?s data to help increase the proficiency of accessing the data is

A. Defragmentation
B. Deceleration
C. Disk Management
D. Disk Duplexing
Answer» B. Deceleration
15.

Which is not a valid join in SQL

A. left outer join
B. partial outer join
C. full outer join
D. natural full outer join
Answer» C. full outer join
16.

ISDN is an example of __ network

A. Circuit switched
B. Packet switched
C. Electric switch
D. None
Answer» B. Packet switched
17.

The average number of transaction completed in a given time is called as

A. response time
B. throughput
C. commit
D. serial schedule
Answer» C. commit
18.

One GHz is one __ cycles per second

A. thousand
B. million
C. billion
D. trillion
Answer» D. trillion
19.

What is the register that contains the address of the next instruction

A. Instruction register
B. Accumulator
C. Container
D. Program counter
Answer» E.
20.

A group of four bits is also called

A. Nibble
B. Quarted
C. Bit Set
D. Byte
Answer» B. Quarted
21.

What is the first computer that used a stored program concept

A. EDSAC
B. ENIAC
C. UNIVAC
D. SPCC
Answer» C. UNIVAC
22.

What is the tool for recording the amount of time spent for slide presentation

A. Rehearse timing
B. Slide time setting
C. Slide timer
D. Timing recorder
Answer» B. Slide time setting
23.

In a computer, the parity bit is added for the purpose of

A. Coding
B. Error detection
C. Controlling
D. Indexing
Answer» C. Controlling
24.

Which of the following acronyms is normally used to describe unsolicited junk e-mails

A. CRAM
B. DRAM
C. JAM
D. SPAM
Answer» E.
25.

Where do we find Insert Endnote in MS Word

A. File Menu
B. References Menu
C. Mailings Menu
D. Design Menu
Answer» C. Mailings Menu
26.

.tmp extension usually refers to what kind of files

A. System file
B. Archieve file
C. Image file
D. Temorary file
Answer» E.
27.

Bandwidth refers to which of the following

A. The amount of information a peer-to-peer network can store
B. Conversion rate of analog signals to digital signals and vice versa
C. The cost of cable required to implement LAN or WAN in an area
D. The amount of information a communication medium can transfer in a given time
Answer» E.
28.

Who is the founder of Pascal programming language

A. Grace Hopper
B. Niklaus Wirth
C. Thomas E. Kurtz
D. Michael J. Carey
Answer» C. Thomas E. Kurtz
29.

A bootstrap is

A. A memory device
B. A program to start up a computer
C. Hardware of computer used to check memory
D. An assembler
Answer» C. Hardware of computer used to check memory
30.

Num Lock + * is the shortcut keys in File explorer to

A. Display all subfolders under the selected folder
B. Change the size and appearance of file and folder icons
C. Open the Properties dialog box for the selected item
D. Select the address bar
Answer» B. Change the size and appearance of file and folder icons
31.

Special type of table, which can only be accessed and updated by the database system itself is called

A. Data Storage
B. Data Dictionary
C. DBMS
D. Tuples
Answer» C. DBMS
32.

The universal logic gates are

A. AND, OR and NOT
B. EXOR and OR
C. AND and OR
D. NAND and NOR
Answer» E.
33.

The Digital Signature Standard (DSS) makes use of __ algorithm

A. Super Hash Algorithm
B. Secure Hash Algorithm
C. Signature Hack Algorithm
D. Signature Hide Algorithm
Answer» C. Signature Hack Algorithm
34.

The process of preventing or inhibiting the normal use or management of communication facilities is called as

A. Masquerade
B. Replay
C. Denial of service
D. Blocking
Answer» D. Blocking
35.

A file that records information about every HTTP request processed by the server

A. Web Server Log
B. Message Log
C. Directory Log
D. Access Log
Answer» E.
36.

Which RAID level represents an Error - correcting codes (ECC) can be used directly in disk arrays by striping bytes across disks

A. RAID level1
B. RAID level2
C. RAID level3
D. RAID level5
Answer» C. RAID level3
37.

A cloud environment available via the internet to any one willing to pay is

A. Public cloud
B. Remote cloud
C. Hybrid cloud
D. Private cloud
Answer» B. Remote cloud
38.

__ consists of all processes residing on disk awaiting allocation of main memory

A. Job Pool
B. CPU Pool
C. Memory Pool
D. Interrupt Pool
Answer» B. CPU Pool
39.

Which one access allows a user to transfer files without having an account on the remote system

A. Main Memory
B. Arbitrary
C. Anonymous
D. Remote
Answer» D. Remote
40.

__ is the separation of user logical memory from physical memory

A. Main Memory
B. Cache Memory
C. Virtual Memory
D. External Memory
Answer» D. External Memory
41.

A flip-flop whose state changes on the rising or falling edge of a clock pulse is said to be

A. Edge triggered flip flop
B. Level triggered flip flop
C. Edge and Level triggered flip flop
D. Triggering
Answer» B. Level triggered flip flop
42.

Which OSPF message is used to discover who the neighbors are

A. Link state update
B. Database description
C. Link state request
D. Hello
Answer» E.
43.

Which of the following is the desirable property of a module

A. Independency
B. low cohesiveness
C. high coupling
D. multifunctional
Answer» B. low cohesiveness
44.

To create your application on a remote server which option you will choose in ASP.NET

A. FTP
B. HTTPS
C. File System
D. none of these
Answer» B. HTTPS
45.

Cache memory acts as a buffer between

A. RAM and ROM
B. RAM and CPU
C. ROM and CPU
D. CPU and Hard disk
Answer» C. ROM and CPU
46.

Which of the following is a tool in design phase

A. Abstraction
B. refinement
C. information hiding
D. all of these
Answer» E.
47.

The tags elements in XML are

A. case-insensitive
B. case-sensitive
C. browser dependent
D. none of these
Answer» C. browser dependent
48.

In a compiler , grouping of characters into tokens is done by the

A. Scanner
B. Parser
C. Code generator
D. Code Optimizer
Answer» B. Parser
49.

A bottom ? up Parser generates

A. left most derivation
B. right most derivation
C. right most derivation in reverse
D. left most derivation in reverse
Answer» D. left most derivation in reverse
50.

Which one of the following is a high-level data model

A. Network model
B. Hierarchical model
C. ER model
D. None of the above
Answer» D. None of the above