

MCQOPTIONS
Saved Bookmarks
This section includes 1088 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
251. |
Essentially, computer ______ controls computer ______ . These two components are complementary and cannot act independently of one another. In order for a computer to effectively manipulate data and produce useful output, they must work together |
A. | hardware, software |
B. | system software, hard disk drive |
C. | operating system, hard disk drive |
D. | software, hardware |
Answer» E. | |
252. |
A low level programming language for microprocessor and other programmable devices is known as: |
A. | Assembly Language |
B. | High Level Language |
C. | Machine Language |
D. | Language Translator |
Answer» B. High Level Language | |
253. |
__________ is a technique used by spammers in which spammers generate email addresses by using known email addresses from corporates or ISP |
A. | Junk Tags |
B. | Directory Harvesting |
C. | Domain Spoofing |
D. | Social Engineering |
Answer» C. Domain Spoofing | |
254. |
A computer in a network that cannot be accessed outside of the local network unless given permission is called __________. |
A. | Intranet |
B. | Internet |
C. | Middleware |
D. | Modern |
Answer» B. Internet | |
255. |
In a computer system 4 Bits are equal to_____. |
A. | 1 Nibble |
B. | 1 Byte |
C. | 1 Character |
D. | 1 Kilo Byte |
Answer» B. 1 Byte | |
256. |
MAC address is a _______ bit number. |
A. | 24 |
B. | 36 |
C. | 48 |
D. | 42 |
Answer» D. 42 | |
257. |
If the 2's complement representation of a number is (011010)2 , what is its equivalent hexadecimal representation? |
A. | (110 )16 |
B. | (1A)16 |
C. | (16)16 |
D. | (26)16 |
Answer» C. (16)16 | |
258. |
In an 8 bit representation of computer system the decimal number 26 has to be subtracted from 22 and the result in binary 2's complement is _________ |
A. | 00000100 |
B. | 00001100 |
C. | 00000101 |
D. | 00010100 |
Answer» B. 00001100 | |
259. |
In the context of information technology, the process of examining large, pre-existing databases in order to generate new useful information, is referred to as _____. |
A. | simulating |
B. | mining |
C. | resourcing |
D. | hewing |
Answer» C. resourcing | |
260. |
________ is a list of items that appear after clicking on a button or text selection on your computer screen. |
A. | Pull Down Menu |
B. | Drop Down Menu |
C. | Drop Down List |
D. | Either 2 or 3 |
E. | Any of 1, 2 and 3 |
Answer» F. | |
261. |
Internet is a/an __________. |
A. | local computer network |
B. | worldwide network of computers |
C. | interconnected network of computers |
D. | worldwide interconnected network of computers which use a common protocol to communicate with one another |
Answer» E. | |
262. |
One who gains unauthorized access, destroys vital data, denies legitimate user's service or causes problems for their targets is called |
A. | White Hat Hacker |
B. | Cracker |
C. | Programmer |
D. | Database Administrator |
Answer» C. Programmer | |
263. |
A Gigabyte equals all of the following, except ________ |
A. | 1000 megabytes |
B. | Billion kilobytes |
C. | Million kilobytes |
D. | 1 thousandth of a terabyte |
E. | All are correct |
Answer» C. Million kilobytes | |
264. |
A computer is a/an _______. |
A. | mechanical device |
B. | electronic device |
C. | electrical device |
D. | networking tool |
Answer» C. electrical device | |
265. |
If there is an application in your mobile that allows you to play Cricket, that is an example of ________. |
A. | System Software |
B. | Operating Software |
C. | Special Purpose Application Software |
D. | Gaming Software |
E. | None of the above |
Answer» D. Gaming Software | |
266. |
A half byte is called a |
A. | Byte |
B. | Nibble |
C. | Bit |
D. | Word size |
Answer» C. Bit | |
267. |
For a Computer, BIT stands for - |
A. | Binary Digit |
B. | Built-in Integer |
C. | Binary Task |
D. | Binary Integer Transfer |
Answer» B. Built-in Integer | |
268. |
A digital signature: |
A. | is a scanned signature |
B. | is same as the email id of a message sender |
C. | is a public key system |
D. | can be used to authenticate an electronic record |
Answer» E. | |
269. |
Match List I with List IIList IList IIA. Input deviceI. ChromeB. Output deviceII. MS-officeC. SoftwareIII, MouseD. Web browserIV. Monitor Choose the correct answer from the options given below: |
A. | A - II, B - III, C - I, D - IV |
B. | A - III, B - IV, C - II, D - I |
C. | A - I, B - II, C - IV, D - III |
D. | A - IV, B - III, C - II, D - I |
Answer» C. A - I, B - II, C - IV, D - III | |
270. |
_________ is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. |
A. | Time Bomb |
B. | Trojan |
C. | Mellissa virus |
D. | Worm |
E. | Macro virus |
Answer» E. Macro virus | |
271. |
How many Boolean expressions can be be formed with 3 Boolean variables? |
A. | 16 |
B. | 1024 |
C. | 32 |
D. | 256 |
Answer» E. | |
272. |
A feature that automatically corrects common spelling errors is called ________. |
A. | Auto Fit |
B. | Auto Format |
C. | Auto Correct |
D. | Auto Lock |
E. | None of these |
Answer» D. Auto Lock | |
273. |
An example of an input device is ______. |
A. | Soundcard |
B. | Projector |
C. | Webcam |
D. | Headphones |
Answer» D. Headphones | |
274. |
A terabyte represents _________ bytes. |
A. | 1 million |
B. | 1 billion |
C. | 1 kilobyte |
D. | 1 trillion |
Answer» E. | |
275. |
Convert the Hexadecimal number 5A to Binary : |
A. | 01011001 |
B. | 01001010 |
C. | 01011010 |
D. | 01000100 |
Answer» D. 01000100 | |
276. |
________ is a display area in the Graphical User Interface that suddenly appears in the foreground of the visual interface. |
A. | Blockers |
B. | Pop-up window |
C. | Ad Blocking Software |
D. | Dialog Next Box |
E. | None of the above |
Answer» C. Ad Blocking Software | |
277. |
__________option removes text from a document and places it on the clipboard. |
A. | Cut |
B. | Format |
C. | Paste |
D. | Delete |
Answer» B. Format | |
278. |
What is required when more than one person uses a central computer at the same time? |
A. | Light pen |
B. | Mouse |
C. | Digitizer |
D. | Terminal |
Answer» E. | |
279. |
In which area of the primary storage section are the intermediate processing results held temporarily? |
A. | Input storage area |
B. | Program storage area |
C. | Output storage area |
D. | Working storage space |
Answer» E. | |
280. |
One nibble is equal to |
A. | 4 bits |
B. | 8 bits |
C. | 6 bits |
D. | 16 bits |
Answer» B. 8 bits | |
281. |
Which kind of storage device can be carried around? |
A. | Floppy disk |
B. | Floppy disk |
C. | System cabinet |
D. | Hard disk drive |
Answer» B. Floppy disk | |
282. |
The computer industry uses prefixes of Greek origin to measure large amounts of data. Which term describes 1024 bytes. |
A. | Kilobyte |
B. | Megabyte |
C. | Gigabyte |
D. | Terabyte |
Answer» B. Megabyte | |
283. |
Which of the following terms is the most closely related to main memory? |
A. | nonvolatile |
B. | permanent |
C. | control unit |
D. | temporary |
Answer» E. | |
284. |
The original ASCII code used _____ bits of each byte, reserving that last bit for error checking. |
A. | 5 |
B. | 6 |
C. | 7 |
D. | 8 |
Answer» D. 8 | |
285. |
Output hardware is often categorized according to whether it: |
A. | is expensive |
B. | requires a large amount of electricity to work |
C. | produces hardcopy or softcopy |
D. | can fit on a desktop |
Answer» D. can fit on a desktop | |
286. |
Which of the following terms applies to communication between separate computer systems? |
A. | Computer literacy |
B. | Power supply |
C. | Applications software |
D. | Connectivity |
Answer» E. | |
287. |
Which of the following is used for manufacturing chips? |
A. | control bus |
B. | control unit |
C. | parity unit |
D. | semiconductor |
Answer» E. | |
288. |
Condensing output data to exhibit specific information is |
A. | Calculating |
B. | Recording |
C. | Merging |
D. | Summarising |
Answer» E. | |
289. |
Which of the following is not a factor affecting the processing capability or performance of a PC system? |
A. | The clock speed of the microprocessor |
B. | The revolutions per minute of the printer disk |
C. | The primary storage capacity of the processor |
D. | The built-in instruction set available to the microprocessor |
Answer» C. The primary storage capacity of the processor | |
290. |
Which one of the following is the first second-generation computer? |
A. | IBM 7090 |
B. | IBM 801 |
C. | IBM 7070 |
D. | IBM 650 |
Answer» B. IBM 801 | |
291. |
A Winchester disk is a |
A. | Disk Stack |
B. | Removable disk |
C. | Flexible disk |
D. | All of the above |
Answer» B. Removable disk | |
292. |
A sizeable geographical area with communication based on the telephone system is though as |
A. | Local area network |
B. | Wide area network |
C. | Modulator-Demodulator |
D. | All of the above |
Answer» C. Modulator-Demodulator | |
293. |
What is the standard code the computer industry created to represent characters? |
A. | DASI |
B. | AASH |
C. | ASCII |
D. | BASCII |
Answer» D. BASCII | |
294. |
A packet switching network that was sponsored by the Commission of the EEC and became operational in 1979 is |
A. | LAN |
B. | Broadband network |
C. | Star network |
D. | Euronet |
Answer» E. | |
295. |
Codes which do not require to be frequently updated also promote user efficiency due to |
A. | Simplicity |
B. | Sortability |
C. | Stability |
D. | Expansibility |
Answer» D. Expansibility | |
296. |
What is the term which represents the use of links between information of all sorts whether text, graphics, video oi audio-based? |
A. | Hypertext |
B. | Hypermedia |
C. | HyperCard |
D. | Wildcard |
Answer» C. HyperCard | |
297. |
The process of fetching and executing instructions, one at a time, in the order of increasing addresses is known as |
A. | instruction execution |
B. | straight line sequencing |
C. | instruction fetch |
D. | random sequencing |
Answer» C. instruction fetch | |
298. |
Offline device is |
A. | a device which is not connected to CPU |
B. | a device which is connected to CPU |
C. | a direct access storage device |
D. | an I/O device |
Answer» B. a device which is connected to CPU | |
299. |
Primary storage is _____ as compared to secondary storage. |
A. | Slow and inexpensive |
B. | Fast and inexpensive |
C. | Fast and expensive |
D. | Slow and expensive |
Answer» D. Slow and expensive | |
300. |
The most popular language used with microcomputers and time-shared mini computers, is an easy-to-use high level language. |
A. | COBOL |
B. | ADA |
C. | PASCAL |
D. | BASIC |
Answer» E. | |