Explore topic-wise MCQs in Current Affairs.

This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

2751.

High level languages are said to be

A. Machine dependent
B. Machine independent
C. Application independent
D. Application dependent
Answer» C. Application independent
2752.

Programming language which is extension of 'BASIC' is

A. PASCAL
B. COBOL
C. LOGO
D. COMAL
Answer» E.
2753.

Computer languages are divided into how many groups?

A. 1
B. 2
C. 3
D. 4
Answer» D. 4
2754.

Commands supported by command interpretation module are known to be

A. Machine calls
B. Process calls
C. Function calls
D. System calls
Answer» E.
2755.

Process of converting object files into final executable program is known to be as

A. Load linker
B. Load filing
C. Load module
D. Load program
Answer» D. Load program
2756.

Computer is notified about address of data on which operation is to be performed, by machine language part, named as

A. OPSET
B. OFFSET
C. OPCODE
D. OPERAND
Answer» E.
2757.

When a machine language instruction gets translated to several machine language instructions, then it is called

A. Mnemonic instruction
B. Micro instruction
C. Macro instruction
D. Main instruction
Answer» D. Main instruction
2758.

Errors in a computer program are referred to as

A. Bugs
B. Mistakes
C. Item overlooked
D. Crash
Answer» B. Mistakes
2759.

To distinguish between different data types, a computer uses special__________.

A. Internal codes
B. External codes
C. Compilers
D. None of the above
Answer» B. External codes
2760.

This language was developed by Dennis Ritchie of Bell Laboratories in order to implement the operating system UNIX.

A. C
B. C++
C. Java
D. LISP
Answer» B. C++
2761.

Statement which is used to make choice between two options and only option is to be performed is written as

A. if statement
B. if else statement
C. then else statement
D. else one statement
Answer» B. if else statement
2762.

Comment in COBOL is denoted by ________

A. *
B. /
C. //
D. ;
Answer» B. /
2763.

Which of the following is most oriented to scientific programming?

A. COBOL
B. BASIC
C. PL/1
D. FORTRAN
Answer» E.
2764.

Which of the following is not the way of ensuring that even if the hardware fails, you will still be able to access your data in computer?

A. backup all data
B. run anti-virus software
C. make sure data is password
D. store data on cloud storage
Answer» E.
2765.

In computer, step for maintaining the security of important data is known as

A. data backup
B. data protection
C. data locking
D. data securing
Answer» B. data protection
2766.

Internal security of a system deals with

A. Databases
B. Software
C. Cryptography
D. Authorization
Answer» D. Authorization
2767.

Extension of computer executable file is

A. xls.
B. doc.
C. ext.
D. exe.
Answer» E.
2768.

Virus reaches from one computer to another by

A. exchange of data between computers
B. exchange of display screen
C. exchange of keyboard
D. exchange of printer
Answer» B. exchange of display screen
2769.

Program which can detect and remove viruses from computer is called

A. anti virus
B. virus detecting software
C. freeware
D. Both a and b
Answer» E.
2770.

Security protection for personal computers includes

A. internal components
B. locks and cables
C. software
D. all of these
Answer» E.
2771.

Example of computer anti virus program includes

A. Norton
B. McAfee
C. Dr.Solomon toolkit
D. all of these
Answer» E.
2772.

Another name of free computer software is

A. encrypted software
B. copy protected software
C. public domain software
D. shareware
Answer» D. shareware
2773.

Which of the following is not Computer Hardware?

A. Antivirus
B. Printer
C. Mouse
D. Monitor
Answer» B. Printer
2774.

Computer virus is simply a

A. disease
B. set of computer instructions or code
C. type of bacteria
D. hardware component
Answer» C. type of bacteria
2775.

To “Debug” the System means ________

A. Find the Correct Software
B. Find and Install correct System
C. Find and Correct Errors on System
D. Find the Correct Hardware
Answer» D. Find the Correct Hardware
2776.

A honey pot is an example of what type of software?

A. Intrusion-detection
B. Virus
C. Encryption
D. Security-auditing
Answer» B. Virus
2777.

The acronym of WORM in a Computer System is

A. Write Only Read Only
B. Write Once Read Memory
C. Write Once Read Many
D. Write Only Read Memory
Answer» D. Write Only Read Memory
2778.

What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?

A. Worm
B. Cracker
C. Keylogger
D. Trojan horses
Answer» E.
2779.

What is the virus that spread in computer?

A. It is system software
B. It is a computer program
C. It is a windows tool
D. It is hardware
Answer» C. It is a windows tool
2780.

What is “Trend Micro”?

A. It is virus program
B. It is anti-virus software
C. It is just a program
D. None of the above
Answer» C. It is just a program
2781.

You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately?

A. No
B. Yes
C. Maybe
D. All of the above
Answer» B. Yes
2782.

When does the time bomb occur?

A. During a particular time
B. During a particular logic and data
C. During a particular data or time
D. None of the above
Answer» D. None of the above
2783.

What is the name of the Act that governs internet usage in India?

A. The Internet consumption Act, 1998
B. The Information Technology Act, 2004
C. The IT Gazette of India Act, 2004
D. None of these
Answer» C. The IT Gazette of India Act, 2004
2784.

What is the best way to protect your information when you are away from your computer?

A. Lock the computer with a password
B. Activate the screen saver
C. Turn the monitor off
D. None
Answer» B. Activate the screen saver
2785.

The type(s) of auto executing macros, in Microsoft word is/are

A. Command macro
B. Auto macro
C. Auto execute
D. All of the above
Answer» E.
2786.

-------- software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted.

A. Antivirus
B. Adware
C. Keylogger
D. Firmmware
Answer» B. Adware
2787.

Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase

A. ii, i, iv and iii
B. i, ii, iii, and iv
C. ii, iii, iv and i
D. i, iii, ii and iv
Answer» B. i, ii, iii, and iv
2788.

…………….. are used in denial of service attacks, typically against targeted web sites.

A. Trojan horse
B. Zombie
C. Worm
D. Virus
Answer» C. Worm
2789.

State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code.

A. i-only
B. ii-only
C. Both i and ii
D. Non i and ii
Answer» D. Non i and ii
2790.

Authentication is

A. hard to assure identity of user on a remote system
B. insertion
C. modification
D. none of the above
Answer» B. insertion
2791.

Protecting computers and information they contain against unwanted access, damage, modification or destruction is called

A. computer monitoring
B. electronic policing
C. audit control
D. computer security
Answer» E.
2792.

…………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software.

A. Macro Virus
B. Parasitic Virus
C. Stealth virus
D. Polymorphic Virus
Answer» D. Polymorphic Virus
2793.

Identification of a user must be verified by system by means of

A. Authentication
B. Databases
C. Access control
D. Authorization
Answer» B. Databases
2794.

To protect yourself from computer hacker, you should turn on a

A. Firewall
B. Script
C. Antivirus
D. VLC
Answer» B. Script
2795.

A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.

A. Polymorphic Virus
B. Boot Sector Virus
C. Macro Virus
D. Parasitic Virus
Answer» B. Boot Sector Virus
2796.

Example of a good password is

A. name of a partner or spouse
B. name of a child or pet
C. word related to a job or hobby
D. words contains multiple random digits
Answer» E.
2797.

Another name of computer anti virus is

A. vaccine
B. worm
C. Trojan horse
D. DES
Answer» B. worm
2798.

Measurement of things such as finger prints and retinal scan used for security access is called

A. bio metrics
B. bio measurement
C. computer security
D. smart weapon machinery
Answer» B. bio measurement
2799.

Which of the following is harmful for computer?

A. anti virus
B. virus
C. freeware
D. shareware
Answer» C. freeware
2800.

A strong password should contain:

A. Both uppercase and lowercase letters.
B. A word that is easy to remember, such as the name of a pet.
C. At least 8 characters, and a combination of letters, numbers, and characters.
D. None
Answer» D. None