Explore topic-wise MCQs in Technical Programming.

This section includes 1088 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

251.

Essentially, computer ______ controls computer ______ . These two components are complementary and cannot act independently of one another. In order for a computer to effectively manipulate data and produce useful output, they must work together

A. hardware, software
B. system software, hard disk drive
C. operating system, hard disk drive
D. software, hardware
Answer» E.
252.

A low level programming language for microprocessor and other programmable devices is known as:

A. Assembly Language
B. High Level Language
C. Machine Language
D. Language Translator
Answer» B. High Level Language
253.

__________ is a technique used by spammers in which spammers generate email addresses by using known email addresses from corporates or ISP

A. Junk Tags
B. Directory Harvesting
C. Domain Spoofing
D. Social Engineering
Answer» C. Domain Spoofing
254.

A computer in a network that cannot be accessed outside of the local network unless given permission is called __________.

A. Intranet
B. Internet
C. Middleware
D. Modern
Answer» B. Internet
255.

In a computer system 4 Bits are equal to_____.

A. 1 Nibble
B. 1 Byte
C. 1 Character
D. 1 Kilo Byte
Answer» B. 1 Byte
256.

MAC address is a _______ bit number.

A. 24
B. 36
C. 48
D. 42
Answer» D. 42
257.

If the 2's complement representation of a number is (011010)2 , what is its equivalent hexadecimal representation?

A. (110 )16
B. (1A)16
C. (16)16
D. (26)16
Answer» C. (16)16
258.

In an 8 bit representation of computer system the decimal number 26 has to be subtracted from 22 and the result in binary 2's complement is _________

A. 00000100
B. 00001100
C. 00000101
D. 00010100
Answer» B. 00001100
259.

In the context of information technology, the process of examining large, pre-existing databases in order to generate new useful information, is referred to as _____.

A. simulating
B. mining
C. resourcing
D. hewing
Answer» C. resourcing
260.

________ is a list of items that appear after clicking on a button or text selection on your computer screen.

A. Pull Down Menu
B. Drop Down Menu
C. Drop Down List
D. Either 2 or 3
E. Any of 1, 2 and 3
Answer» F.
261.

Internet is a/an __________.

A. local computer network
B. worldwide network of computers
C. interconnected network of computers
D. worldwide interconnected network of computers which use a common protocol to communicate with one another
Answer» E.
262.

One who gains unauthorized access, destroys vital data, denies legitimate user's service or causes problems for their targets is called

A. White Hat Hacker
B. Cracker
C. Programmer
D. Database Administrator
Answer» C. Programmer
263.

A Gigabyte equals all of the following, except ________

A. 1000 megabytes
B. Billion kilobytes
C. Million kilobytes
D. 1 thousandth of a terabyte
E. All are correct
Answer» C. Million kilobytes
264.

A computer is a/an _______.

A. mechanical device
B. electronic device
C. electrical device
D. networking tool
Answer» C. electrical device
265.

If there is an application in your mobile that allows you to play Cricket, that is an example of ________.

A. System Software
B. Operating Software
C. Special Purpose Application Software
D. Gaming Software
E. None of the above
Answer» D. Gaming Software
266.

A half byte is called a

A. Byte
B. Nibble
C. Bit
D. Word size
Answer» C. Bit
267.

For a Computer, BIT stands for -

A. Binary Digit
B. Built-in Integer
C. Binary Task
D. Binary Integer Transfer
Answer» B. Built-in Integer
268.

A digital signature:

A. is a scanned signature
B. is same as the email id of a message sender
C. is a public key system
D. can be used to authenticate an electronic record
Answer» E.
269.

Match List I with List IIList IList IIA. Input deviceI. ChromeB. Output deviceII. MS-officeC. SoftwareIII, MouseD. Web browserIV. Monitor Choose the correct answer from the options given below:

A. A - II, B - III, C - I, D - IV
B. A - III, B - IV, C - II, D - I
C. A - I, B - II, C - IV, D - III
D. A - IV, B - III, C - II, D - I
Answer» C. A - I, B - II, C - IV, D - III
270.

_________ is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.

A. Time Bomb
B. Trojan
C. Mellissa virus
D. Worm
E. Macro virus
Answer» E. Macro virus
271.

How many Boolean expressions can be be formed with 3 Boolean variables?

A. 16
B. 1024
C. 32
D. 256
Answer» E.
272.

A feature that automatically corrects common spelling errors is called ________.

A. Auto Fit
B. Auto Format
C. Auto Correct
D. Auto Lock
E. None of these
Answer» D. Auto Lock
273.

An example of an input device is ______.

A. Soundcard
B. Projector
C. Webcam
D. Headphones
Answer» D. Headphones
274.

A terabyte represents _________ bytes.

A. 1 million
B. 1 billion
C. 1 kilobyte
D. 1 trillion
Answer» E.
275.

Convert the Hexadecimal number 5A to Binary :

A. 01011001
B. 01001010
C. 01011010
D. 01000100
Answer» D. 01000100
276.

________ is a display area in the Graphical User Interface that suddenly appears in the foreground of the visual interface.

A. Blockers
B. Pop-up window
C. Ad Blocking Software
D. Dialog Next Box
E. None of the above
Answer» C. Ad Blocking Software
277.

__________option removes text from a document and places it on the clipboard.

A. Cut
B. Format
C. Paste
D. Delete
Answer» B. Format
278.

What is required when more than one person uses a central computer at the same time?

A. Light pen
B. Mouse
C. Digitizer
D. Terminal
Answer» E.
279.

In which area of the primary storage section are the intermediate processing results held temporarily?

A. Input storage area
B. Program storage area
C. Output storage area
D. Working storage space
Answer» E.
280.

One nibble is equal to

A. 4 bits
B. 8 bits
C. 6 bits
D. 16 bits
Answer» B. 8 bits
281.

Which kind of storage device can be carried around?

A. Floppy disk
B. Floppy disk
C. System cabinet
D. Hard disk drive
Answer» B. Floppy disk
282.

The computer industry uses prefixes of Greek origin to measure large amounts of data. Which term describes 1024 bytes.

A. Kilobyte
B. Megabyte
C. Gigabyte
D. Terabyte
Answer» B. Megabyte
283.

Which of the following terms is the most closely related to main memory?

A. nonvolatile
B. permanent
C. control unit
D. temporary
Answer» E.
284.

The original ASCII code used _____ bits of each byte, reserving that last bit for error checking.

A. 5
B. 6
C. 7
D. 8
Answer» D. 8
285.

Output hardware is often categorized according to whether it:

A. is expensive
B. requires a large amount of electricity to work
C. produces hardcopy or softcopy
D. can fit on a desktop
Answer» D. can fit on a desktop
286.

Which of the following terms applies to communication between separate computer systems?

A. Computer literacy
B. Power supply
C. Applications software
D. Connectivity
Answer» E.
287.

Which of the following is used for manufacturing chips?

A. control bus
B. control unit
C. parity unit
D. semiconductor
Answer» E.
288.

Condensing output data to exhibit specific information is

A. Calculating
B. Recording
C. Merging
D. Summarising
Answer» E.
289.

Which of the following is not a factor affecting the processing capability or performance of a PC system?

A. The clock speed of the microprocessor
B. The revolutions per minute of the printer disk
C. The primary storage capacity of the processor
D. The built-in instruction set available to the microprocessor
Answer» C. The primary storage capacity of the processor
290.

Which one of the following is the first second-generation computer?

A. IBM 7090
B. IBM 801
C. IBM 7070
D. IBM 650
Answer» B. IBM 801
291.

A Winchester disk is a

A. Disk Stack
B. Removable disk
C. Flexible disk
D. All of the above
Answer» B. Removable disk
292.

A sizeable geographical area with communication based on the telephone system is though as

A. Local area network
B. Wide area network
C. Modulator-Demodulator
D. All of the above
Answer» C. Modulator-Demodulator
293.

What is the standard code the computer industry created to represent characters?

A. DASI
B. AASH
C. ASCII
D. BASCII
Answer» D. BASCII
294.

A packet switching network that was sponsored by the Commission of the EEC and became operational in 1979 is

A. LAN
B. Broadband network
C. Star network
D. Euronet
Answer» E.
295.

Codes which do not require to be frequently updated also promote user efficiency due to

A. Simplicity
B. Sortability
C. Stability
D. Expansibility
Answer» D. Expansibility
296.

What is the term which represents the use of links between information of all sorts whether text, graphics, video oi audio-based?

A. Hypertext
B. Hypermedia
C. HyperCard
D. Wildcard
Answer» C. HyperCard
297.

The process of fetching and executing instructions, one at a time, in the order of increasing addresses is known as

A. instruction execution
B. straight line sequencing
C. instruction fetch
D. random sequencing
Answer» C. instruction fetch
298.

Offline device is

A. a device which is not connected to CPU
B. a device which is connected to CPU
C. a direct access storage device
D. an I/O device
Answer» B. a device which is connected to CPU
299.

Primary storage is _____ as compared to secondary storage.

A. Slow and inexpensive
B. Fast and inexpensive
C. Fast and expensive
D. Slow and expensive
Answer» D. Slow and expensive
300.

The most popular language used with microcomputers and time-shared mini computers, is an easy-to-use high level language.

A. COBOL
B. ADA
C. PASCAL
D. BASIC
Answer» E.