Explore topic-wise MCQs in Current Affairs.

This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

2951.

A Compiler is ____

A. A combination of computer hardware
B. A program which translates from one high-level language to another<
C. A program which translates from one high-level to a machine level language
D. None of the above
Answer» D. None of the above
2952.

What are the stages in the compilation process?

A. Lexical Analysis, syntax analysis, and code generation
B. Implementation and documentation
C. Feasibility study, system design and testing
D. None of the above
Answer» C. Feasibility study, system design and testing
2953.

Loop statement which is repeated to some given number of times is classified as

A. FOR loop
B. GO loop
C. REPEAT loop
D. GO REPEAT loop
Answer» B. GO loop
2954.

A factor in the selection of a source language is

A. Program compatibility with other software
B. Language availability
C. Programmer skill
D. All of the above
Answer» E.
2955.

Machine language generally consists of

A. English like words
B. Boolean
C. Strings of numbers
D. None of them
Answer» D. None of them
2956.

A program is a sequence of ________________ written in a programming language.

A. Lines
B. Functions
C. Instructions
D. Code Word
Answer» D. Code Word
2957.

-------- are often delivered to a PC through an email attachment and are often designed to do harm.

A. Virus
B. Email
C. Portals
D. Spam
Answer» B. Email
2958.

The altering of data so that it is not usable unless the changes are undone is

A. biometrics
B. encryption
C. ergonomics
D. compression
Answer» C. ergonomics
2959.

What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?

A. Malisoft
B. Malairasoft
C. Moleculewar
D. Malware
Answer» E.
2960.

When a logic bomb is activated by a time related event, it is known as -------

A. trojan horse
B. time bomb
C. virus
D. time related bomb sequence
Answer» C. virus
2961.

MCAfee is an example of

A. Virus
B. Quick Heal
C. Antivirus
D. Photo Editing Software
Answer» D. Photo Editing Software
2962.

A ------- is a computer program that can invade computer and perform a variety of functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files)

A. Computer Virus
B. Antivirus
C. Ms Word
D. Ms Access
Answer» B. Antivirus
2963.

The first computer virus is --------

A. Sasser
B. Creeper
C. Blaster
D. I Love You
Answer» C. Blaster
2964.

To protect a computer from virus, you should install -------- in your computer.

A. antivirus
B. disk defragmenter
C. disk cleanup
D. backup wizard
Answer» B. disk defragmenter
2965.

Which of the following is known as Malicious software?

A. maliciousware
B. illegalware
C. badware
D. malware
Answer» E.
2966.

What is a default file extension for all word documents?

A. TXT
B. WRD
C. FIL
D. DOC
Answer» E.
2967.

C, BASIC, COBOL, and Java are examples of ............language

A. low-level
B. programming
C. computer
D. high-level
Answer» E.
2968.

What are the four things needed to connect to the internet?

A. telephone line, modem, computer, and an ISP
B. modem, computer, PDA, and ISP
C. telephone line, modem, computer, and PDA
D. computer, ISP, modem, and communication software
Answer» E.
2969.

Microcomputer hardware consists of three basic categories of physical equipment ____

A. Keyboard, monitor, hard drive
B. system unit, input/output, memory
C. system unit, input/output, secondary storage
D. system unit, primary storage, secondary storage
Answer» D. system unit, primary storage, secondary storage
2970.

The operating system called UNIX is typically used for_______

A. Desktop computers
B. Laptop computers
C. Super computers
D. All of these
Answer» E.
2971.

Which of the following is an example of an optical disk?

A. Digital versatile disks
B. Magnetic disks
C. Memory disks
D. Data bus disks
Answer» B. Magnetic disks
2972.

Vendor-created program modifications are called ________

A. patches
B. antiviruses
C. holes
D. fixes
Answer» B. antiviruses
2973.

The basic operations performed by a computer are

A. Logical operation
B. Storage and relative
C. Arithmetic operation
D. All the above
Answer» E.
2974.

The term _____ designates equipment that might be added to a computer system to enhance its functionality

A. digital device
B. system add-on
C. disk pack
D. peripheral device
Answer» E.
2975.

A ........ is approximately one billion bytes

A. Megabyte
B. Gigabyte
C. Terabyte
D. None of these
Answer» C. Terabyte
2976.

which file starts ms word

A. word.exe
B. msword.exe
C. word2003.exe
D. winword.exe
Answer» E.
2977.

What characteristic of read-only memory (ROM ) makes it useful?

A. ROM informationcan be easily updated
B. Data in ROM is non volatile, that is, it remains there even without electrical power
C. ROM provides very large amounts of inexpensive data storage
D. ROM chips are easily swapped between different brands of computers
Answer» C. ROM provides very large amounts of inexpensive data storage
2978.

The smallest unit in a digital system is a.........

A. Bit
B. Byte
C. Character
D. Kilobyte
Answer» B. Byte
2979.

In MICR, C stands for...........

A. Code
B. Colour
C. Computer
D. Character
Answer» E.
2980.

Which of the following refers to a small, single-site network ?

A. LAN
B. DSL
C. RAM
D. USB
Answer» B. DSL
2981.

The box that contains the central electronic components of the computer is the ..............

A. Motherboard
B. System Unit
C. Peripheral
D. RAM
Answer» C. Peripheral
2982.

The First Mechanical Computer Designed by Charles Babbage was called?

A. Super Computer
B. Abacus
C. Calculator
D. Analytical Engine
Answer» E.
2983.

Which key is used in combination with another key to perform a specific task?

A. Function
B. Spacebar
C. Arrow
D. Control
Answer» E.
2984.

A _______ is a software program used to view Web pages.

A. site
B. host
C. link
D. browser
Answer» E.
2985.

Storage capacity of magnetic disk depends on

A. disk pack in disk surface
B. tracks per inch of surface
C. bits per inch of tracks
D. All of the above
Answer» E.
2986.

The computer's processor consists of the following parts

A. CPU and Main Memory
B. Hard Disk and Floppy Drive
C. Control Unit and ALU
D. Operating System and Application
Answer» D. Operating System and Application
2987.

The first computer was programmed using .......

A. Assembly language
B. Machine language
C. Spaghetti code
D. Source code
Answer» C. Spaghetti code
2988.

Which of the following is a popular programming language for developing multimedia webpages.

A. COBOL
B. Java
C. BASIC
D. Assembler
Answer» C. BASIC
2989.

By default, your documents print in ________ mode

A. Landscape
B. Portrait
C. Page Setup
D. Print View
Answer» C. Page Setup
2990.

Microsoft Office is an example of a

A. Closed source software
B. Open source software
C. Horizontal market software
D. vertical market software
Answer» D. vertical market software
2991.

Junk e-mail is also called ______

A. Spam
B. Spoof
C. Sniffer script
D. Spool
Answer» B. Spoof
2992.

_____are attempts by individuals to obtain confidential information from you by falsifying their identity

A. Phishing trips
B. Computer viruses
C. Phishing scams
D. Spyware scams
Answer» D. Spyware scams
2993.

A computer cannot "boot" if it does not have the _____

A. Compiler
B. Loader
C. Operating system
D. Assembler
Answer» D. Assembler
2994.

MS-Word is an example of _____

A. An operating system
B. A processing device
C. Application software
D. An input device
Answer» D. An input device
2995.

Ctrl, Shift and Alt are called .......... keys.

A. modifier
B. function
C. alphanumeric
D. adjustment
Answer» B. function