

MCQOPTIONS
Saved Bookmarks
This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
251. |
If a processor has a word size of 32 bits,compared to a processor with a word size of 16 bits, it can process……….at a time. |
A. | thrice as much |
B. | half as much |
C. | a fourth as much |
D. | the same amount |
E. | twice as much |
Answer» F. | |
252. |
A file with extension “jpeg” stores which type of files? |
A. | Data document |
B. | Pictures |
C. | Movies |
D. | Music |
E. | None of these |
Answer» C. Movies | |
253. |
Rules for exchanging data between computersare called |
A. | programs |
B. | procedures |
C. | protocols |
D. | hyperlinks |
E. | None of these |
Answer» D. hyperlinks | |
254. |
The Title and Page number of a document can be displayed using which of the following options? |
A. | Insert table |
B. | Spelling and Grammar |
C. | Header and Footer |
D. | Thesaurus |
E. | File |
Answer» D. Thesaurus | |
255. |
This type of memory improves processingby acting as a temporary high-speed holding area between the memory and the CPU. |
A. | RAM |
B. | ROM |
C. | cache memory |
D. | flash memory |
E. | EPROM |
Answer» D. flash memory | |
256. |
Which of the following is not a method to preserve the security and integrity of information? |
A. | Antivirus software |
B. | Firewall |
C. | Phishing |
D. | Disk Encryption |
E. | Backup |
Answer» D. Disk Encryption | |
257. |
A characteristic of card system is : |
A. | Slowness in processing data |
B. | Using cards as records of transactions |
C. | Needing a larger DP staff |
D. | All of these |
E. | None of these |
Answer» E. None of these | |
258. |
Which of the following is a hardware not a software? |
A. | Excel |
B. | Printer Driver |
C. | Operating System |
D. | Power Point |
E. | Mouse |
Answer» F. | |
259. |
Assembly language is……………… |
A. | Machine language |
B. | High-level programming language |
C. | A low-level programming language |
D. | Language for assembling computers |
E. | None of these |
Answer» D. Language for assembling computers | |
260. |
The default opening/beginning webpage of a website is called……….. |
A. | Index page |
B. | Search page |
C. | Homepage |
D. | Feedback |
E. | None of these |
Answer» D. Feedback | |
261. |
“Zipping” a file means |
A. | Encrypting the message |
B. | Compressing th message |
C. | Transfer the message |
D. | All of these |
E. | None of these |
Answer» C. Transfer the message | |
262. |
Which of the following is hardware and notsoftware? |
A. | Power Point |
B. | Printer Driver |
C. | ALU |
D. | Excel |
E. | Operating System |
Answer» D. Excel | |
263. |
The communication line between the CPU, memory and peripherals is called a : |
A. | Bus |
B. | line |
C. | media |
D. | cable |
E. | None of these |
Answer» B. line | |
264. |
In acquiring new mainframe hardware, anorganization |
A. | may choose to rent a machine since this is the least expensive acquisition method |
B. | may buy the equipment to reduce the risk of technological obsolescence |
C. | may lease a machine in order to avoid a large purchase price |
D. | may choose to build its own system from bins of integrated circuits |
E. | None of these |
Answer» D. may choose to build its own system from bins of integrated circuits | |
265. |
What is the function of the ‘home key1in amicrocomputer qwerty keyboard? |
A. | To capitalize letters |
B. | To reposition the cursor |
C. | To interrupt executions |
D. | To cancel the entry |
E. | None of these |
Answer» C. To interrupt executions | |
266. |
To make the numeric pad act as directional arrows, you press the……….key. |
A. | num lock |
B. | caps lock |
C. | arrow lock |
D. | shift |
E. | None of these |
Answer» B. caps lock | |
267. |
The only language understood by a digital computer is called |
A. | assembly language |
B. | high level language |
C. | low level |
D. | Binary language |
E. | None of these |
Answer» E. None of these | |
268. |
To start a computer system, which memory is optional? |
A. | RAM |
B. | ROM |
C. | Cache |
D. | Secondary memory |
E. | RAM and ROM |
Answer» C. Cache | |
269. |
The storage within the addressing scheme of the computer but exceeding the physical capacity is called |
A. | address space |
B. | overlay storage |
C. | secondary storage |
D. | scratchpad memory |
E. | None of these |
Answer» B. overlay storage | |
270. |
The term ‘baud’ is a measure of the : |
A. | speed at which data travels over the communication line |
B. | memory capacity |
C. | instruction execution time |
D. | All of these |
E. | None of these |
Answer» B. memory capacity | |
271. |
Network operating systems from Novell is….…….. |
A. | NOS |
B. | UNIX |
C. | NetWare |
D. | Solaris |
E. | None of these |
Answer» D. Solaris | |
272. |
ADSL data communications technology uses which of the following for faster data transmission? |
A. | Voiceband modem |
B. | Wireless Modem |
C. | Copper telephone Lines |
D. | Sockets |
E. | None of these |
Answer» D. Sockets | |
273. |
Electronic telecommunications system joining many thousands of computers together. |
A. | |
B. | chatting |
C. | internet |
D. | WAN |
E. | None of these |
Answer» D. WAN | |
274. |
Which of the following uses computers and data communication to transmit data electronically between computers? |
A. | EDI |
B. | Physical Media |
C. | Printing a paper |
D. | DTE |
E. | None of these |
Answer» B. Physical Media | |
275. |
…………is known as unauthorized access into others system. |
A. | Hacking |
B. | Encryption |
C. | Decryption |
D. | Trafficking |
E. | None of these |
Answer» B. Encryption | |
276. |
Operating systems and utility programs are in a class of software known as : |
A. | application software |
B. | sequential software |
C. | software suites |
D. | BIOS software |
E. | system software |
Answer» F. | |
277. |
Which keys can be used together with other keys for special tasks? |
A. | Insert, Delete |
B. | Ctrl, Shift |
C. | Left Arrow, |
D. | Page up, Page Down |
E. | None of these |
Answer» C. Left Arrow, | |
278. |
A term relating to sending data to a satellite is………. |
A. | downlink |
B. | modulate |
C. | demodulate |
D. | uplink |
E. | interrelate |
Answer» E. interrelate | |
279. |
The octal equivalent of 111010 is : |
A. | 81 |
B. | 72 |
C. | 71 |
D. | All of these |
E. | None of these |
Answer» D. All of these | |
280. |
In the right setting a thief will steal yourinformation by simply watching what you type. |
A. | snagging |
B. | spying |
C. | social engineering |
D. | shoulder surfing |
E. | None of these |
Answer» E. None of these | |
281. |
A screen element of MS Word that is usually located below the title bar that provides categorized options is : |
A. | Menu bar |
B. | Tool bar |
C. | Status bar |
D. | All of these |
E. | None of these |
Answer» B. Tool bar | |
282. |
In word, when you indent a paragraph, you……. |
A. | push the text in with respect to the margin |
B. | change the margins on the page |
C. | move the text up by one line |
D. | move the text down by one line |
E. | None of these |
Answer» B. change the margins on the page | |
283. |
A hard copy of a document is……….. |
A. | printed on the paper |
B. | stored on a floppy |
C. | stored on a CD |
D. | stored in the hard disk |
E. | None of these |
Answer» B. stored on a floppy | |
284. |
Which key is used to delete one character to the left of the current position of the cursor? |
A. | Backspace |
B. | Delete |
C. | Insert |
D. | Esc |
E. | Ctrl |
Answer» B. Delete | |
285. |
Macros are “run” or executed from the…………..menu. |
A. | Insert |
B. | Format |
C. | Tools |
D. | Data |
E. | None of these |
Answer» D. Data | |
286. |
The file that is linked with an e-mail and sent to the receiver of the e-mail is referred to as…………. |
A. | annexure |
B. | appendage |
C. | add-on |
D. | attachment |
E. | article |
Answer» E. article | |
287. |
A specific part of an arithmetic and logic unit that is used to perform the operation of multiplication is |
A. | multiplier |
B. | multiplener |
C. | multivibrator |
D. | quantization |
E. | None of these |
Answer» B. multiplener | |
288. |
When a chart is placed on this, it is much larger and there is no other data on it…….. |
A. | Chart sheet |
B. | Exclusive sheet |
C. | Primary sheet |
D. | Reference sheet |
E. | None of these |
Answer» E. None of these | |
289. |
A series of instruction that tells a computer what to do and how to do it called a……….. |
A. | program |
B. | command |
C. | user response |
D. | processor |
E. | None of these |
Answer» E. None of these | |
290. |
Which of the following is an acceptable way to shut down the computer? |
A. | press the reset button |
B. | turn the computer off at the power point |
C. | select the ‘Shut down’ option from a menu |
D. | pull the power card from the back of the computer |
E. | None of these |
Answer» D. pull the power card from the back of the computer | |
291. |
Is the layer of a computer system between the hardware and the user program : |
A. | Operating environment |
B. | Operating system |
C. | System environment |
D. | All of these |
E. | None of these |
Answer» C. System environment | |
292. |
Choose the odd one out………. |
A. | Micro Computer |
B. | Mini Computer |
C. | Super Computer |
D. | Notebook Computer |
E. | Digital Computer |
Answer» D. Notebook Computer | |
293. |
A copy of the contents of all the work space associated with a process is |
A. | dump |
B. | dyadic |
C. | dual processor |
D. | dump check |
E. | None of these |
Answer» E. None of these | |
294. |
The capacity of a machine to perform tasks, normally requiring human intelligence, is |
A. | KIPS |
B. | artificial |
C. | super computer |
D. | micro computer |
E. | None of these |
Answer» C. super computer | |
295. |
………..is a tool to browse all disks connected to the computer. |
A. | Internet Explorer |
B. | Windows Explorer |
C. | My Computer |
D. | Control Panel |
E. | None of these |
Answer» C. My Computer | |
296. |
Which of the following is a storage medium to copy stored data onto another? |
A. | Drum |
B. | Dump |
C. | Critical path |
D. | Cybernetics |
E. | None of these |
Answer» C. Critical path | |
297. |
The computer abbreviation KB usually means…………. |
A. | Key Block |
B. | Kernel Boot |
C. | Kilo Byte |
D. | Kit Bit |
E. | None of these |
Answer» D. Kit Bit | |
298. |
Before you stored anything on a disk, it has to be |
A. | cleansed |
B. | formatted |
C. | initialized |
D. | either (a) or (b) |
E. | None of these |
Answer» C. initialized | |
299. |
You Tube service of streaming videos online in provided by |
A. | |
B. | Microsoft |
C. | IBM |
D. | Apple |
E. | Sony |
Answer» B. Microsoft | |
300. |
A device that provides emergency power to your computer, conditions the voltage, and protects against powers out is called a : |
A. | PSU = Power Supply Unit |
B. | USP = Universal Surge Protector |
C. | UPPS = Universal Power Protection and Supply |
D. | UPS = Uninterruptible Power Supply |
E. | None of these |
Answer» E. None of these | |