

MCQOPTIONS
Saved Bookmarks
This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
2751. |
High level languages are said to be |
A. | Machine dependent |
B. | Machine independent |
C. | Application independent |
D. | Application dependent |
Answer» C. Application independent | |
2752. |
Programming language which is extension of 'BASIC' is |
A. | PASCAL |
B. | COBOL |
C. | LOGO |
D. | COMAL |
Answer» E. | |
2753. |
Computer languages are divided into how many groups? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» D. 4 | |
2754. |
Commands supported by command interpretation module are known to be |
A. | Machine calls |
B. | Process calls |
C. | Function calls |
D. | System calls |
Answer» E. | |
2755. |
Process of converting object files into final executable program is known to be as |
A. | Load linker |
B. | Load filing |
C. | Load module |
D. | Load program |
Answer» D. Load program | |
2756. |
Computer is notified about address of data on which operation is to be performed, by machine language part, named as |
A. | OPSET |
B. | OFFSET |
C. | OPCODE |
D. | OPERAND |
Answer» E. | |
2757. |
When a machine language instruction gets translated to several machine language instructions, then it is called |
A. | Mnemonic instruction |
B. | Micro instruction |
C. | Macro instruction |
D. | Main instruction |
Answer» D. Main instruction | |
2758. |
Errors in a computer program are referred to as |
A. | Bugs |
B. | Mistakes |
C. | Item overlooked |
D. | Crash |
Answer» B. Mistakes | |
2759. |
To distinguish between different data types, a computer uses special__________. |
A. | Internal codes |
B. | External codes |
C. | Compilers |
D. | None of the above |
Answer» B. External codes | |
2760. |
This language was developed by Dennis Ritchie of Bell Laboratories in order to implement the operating system UNIX. |
A. | C |
B. | C++ |
C. | Java |
D. | LISP |
Answer» B. C++ | |
2761. |
Statement which is used to make choice between two options and only option is to be performed is written as |
A. | if statement |
B. | if else statement |
C. | then else statement |
D. | else one statement |
Answer» B. if else statement | |
2762. |
Comment in COBOL is denoted by ________ |
A. | * |
B. | / |
C. | // |
D. | ; |
Answer» B. / | |
2763. |
Which of the following is most oriented to scientific programming? |
A. | COBOL |
B. | BASIC |
C. | PL/1 |
D. | FORTRAN |
Answer» E. | |
2764. |
Which of the following is not the way of ensuring that even if the hardware fails, you will still be able to access your data in computer? |
A. | backup all data |
B. | run anti-virus software |
C. | make sure data is password |
D. | store data on cloud storage |
Answer» E. | |
2765. |
In computer, step for maintaining the security of important data is known as |
A. | data backup |
B. | data protection |
C. | data locking |
D. | data securing |
Answer» B. data protection | |
2766. |
Internal security of a system deals with |
A. | Databases |
B. | Software |
C. | Cryptography |
D. | Authorization |
Answer» D. Authorization | |
2767. |
Extension of computer executable file is |
A. | xls. |
B. | doc. |
C. | ext. |
D. | exe. |
Answer» E. | |
2768. |
Virus reaches from one computer to another by |
A. | exchange of data between computers |
B. | exchange of display screen |
C. | exchange of keyboard |
D. | exchange of printer |
Answer» B. exchange of display screen | |
2769. |
Program which can detect and remove viruses from computer is called |
A. | anti virus |
B. | virus detecting software |
C. | freeware |
D. | Both a and b |
Answer» E. | |
2770. |
Security protection for personal computers includes |
A. | internal components |
B. | locks and cables |
C. | software |
D. | all of these |
Answer» E. | |
2771. |
Example of computer anti virus program includes |
A. | Norton |
B. | McAfee |
C. | Dr.Solomon toolkit |
D. | all of these |
Answer» E. | |
2772. |
Another name of free computer software is |
A. | encrypted software |
B. | copy protected software |
C. | public domain software |
D. | shareware |
Answer» D. shareware | |
2773. |
Which of the following is not Computer Hardware? |
A. | Antivirus |
B. | Printer |
C. | Mouse |
D. | Monitor |
Answer» B. Printer | |
2774. |
Computer virus is simply a |
A. | disease |
B. | set of computer instructions or code |
C. | type of bacteria |
D. | hardware component |
Answer» C. type of bacteria | |
2775. |
To “Debug” the System means ________ |
A. | Find the Correct Software |
B. | Find and Install correct System |
C. | Find and Correct Errors on System |
D. | Find the Correct Hardware |
Answer» D. Find the Correct Hardware | |
2776. |
A honey pot is an example of what type of software? |
A. | Intrusion-detection |
B. | Virus |
C. | Encryption |
D. | Security-auditing |
Answer» B. Virus | |
2777. |
The acronym of WORM in a Computer System is |
A. | Write Only Read Only |
B. | Write Once Read Memory |
C. | Write Once Read Many |
D. | Write Only Read Memory |
Answer» D. Write Only Read Memory | |
2778. |
What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications? |
A. | Worm |
B. | Cracker |
C. | Keylogger |
D. | Trojan horses |
Answer» E. | |
2779. |
What is the virus that spread in computer? |
A. | It is system software |
B. | It is a computer program |
C. | It is a windows tool |
D. | It is hardware |
Answer» C. It is a windows tool | |
2780. |
What is “Trend Micro”? |
A. | It is virus program |
B. | It is anti-virus software |
C. | It is just a program |
D. | None of the above |
Answer» C. It is just a program | |
2781. |
You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately? |
A. | No |
B. | Yes |
C. | Maybe |
D. | All of the above |
Answer» B. Yes | |
2782. |
When does the time bomb occur? |
A. | During a particular time |
B. | During a particular logic and data |
C. | During a particular data or time |
D. | None of the above |
Answer» D. None of the above | |
2783. |
What is the name of the Act that governs internet usage in India? |
A. | The Internet consumption Act, 1998 |
B. | The Information Technology Act, 2004 |
C. | The IT Gazette of India Act, 2004 |
D. | None of these |
Answer» C. The IT Gazette of India Act, 2004 | |
2784. |
What is the best way to protect your information when you are away from your computer? |
A. | Lock the computer with a password |
B. | Activate the screen saver |
C. | Turn the monitor off |
D. | None |
Answer» B. Activate the screen saver | |
2785. |
The type(s) of auto executing macros, in Microsoft word is/are |
A. | Command macro |
B. | Auto macro |
C. | Auto execute |
D. | All of the above |
Answer» E. | |
2786. |
-------- software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted. |
A. | Antivirus |
B. | Adware |
C. | Keylogger |
D. | Firmmware |
Answer» B. Adware | |
2787. |
Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase |
A. | ii, i, iv and iii |
B. | i, ii, iii, and iv |
C. | ii, iii, iv and i |
D. | i, iii, ii and iv |
Answer» B. i, ii, iii, and iv | |
2788. |
…………….. are used in denial of service attacks, typically against targeted web sites. |
A. | Trojan horse |
B. | Zombie |
C. | Worm |
D. | Virus |
Answer» C. Worm | |
2789. |
State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. |
A. | i-only |
B. | ii-only |
C. | Both i and ii |
D. | Non i and ii |
Answer» D. Non i and ii | |
2790. |
Authentication is |
A. | hard to assure identity of user on a remote system |
B. | insertion |
C. | modification |
D. | none of the above |
Answer» B. insertion | |
2791. |
Protecting computers and information they contain against unwanted access, damage, modification or destruction is called |
A. | computer monitoring |
B. | electronic policing |
C. | audit control |
D. | computer security |
Answer» E. | |
2792. |
…………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. |
A. | Macro Virus |
B. | Parasitic Virus |
C. | Stealth virus |
D. | Polymorphic Virus |
Answer» D. Polymorphic Virus | |
2793. |
Identification of a user must be verified by system by means of |
A. | Authentication |
B. | Databases |
C. | Access control |
D. | Authorization |
Answer» B. Databases | |
2794. |
To protect yourself from computer hacker, you should turn on a |
A. | Firewall |
B. | Script |
C. | Antivirus |
D. | VLC |
Answer» B. Script | |
2795. |
A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns. |
A. | Polymorphic Virus |
B. | Boot Sector Virus |
C. | Macro Virus |
D. | Parasitic Virus |
Answer» B. Boot Sector Virus | |
2796. |
Example of a good password is |
A. | name of a partner or spouse |
B. | name of a child or pet |
C. | word related to a job or hobby |
D. | words contains multiple random digits |
Answer» E. | |
2797. |
Another name of computer anti virus is |
A. | vaccine |
B. | worm |
C. | Trojan horse |
D. | DES |
Answer» B. worm | |
2798. |
Measurement of things such as finger prints and retinal scan used for security access is called |
A. | bio metrics |
B. | bio measurement |
C. | computer security |
D. | smart weapon machinery |
Answer» B. bio measurement | |
2799. |
Which of the following is harmful for computer? |
A. | anti virus |
B. | virus |
C. | freeware |
D. | shareware |
Answer» C. freeware | |
2800. |
A strong password should contain: |
A. | Both uppercase and lowercase letters. |
B. | A word that is easy to remember, such as the name of a pet. |
C. | At least 8 characters, and a combination of letters, numbers, and characters. |
D. | None |
Answer» D. None | |