

MCQOPTIONS
Saved Bookmarks
This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
2951. |
A Compiler is ____ |
A. | A combination of computer hardware |
B. | A program which translates from one high-level language to another< |
C. | A program which translates from one high-level to a machine level language |
D. | None of the above |
Answer» D. None of the above | |
2952. |
What are the stages in the compilation process? |
A. | Lexical Analysis, syntax analysis, and code generation |
B. | Implementation and documentation |
C. | Feasibility study, system design and testing |
D. | None of the above |
Answer» C. Feasibility study, system design and testing | |
2953. |
Loop statement which is repeated to some given number of times is classified as |
A. | FOR loop |
B. | GO loop |
C. | REPEAT loop |
D. | GO REPEAT loop |
Answer» B. GO loop | |
2954. |
A factor in the selection of a source language is |
A. | Program compatibility with other software |
B. | Language availability |
C. | Programmer skill |
D. | All of the above |
Answer» E. | |
2955. |
Machine language generally consists of |
A. | English like words |
B. | Boolean |
C. | Strings of numbers |
D. | None of them |
Answer» D. None of them | |
2956. |
A program is a sequence of ________________ written in a programming language. |
A. | Lines |
B. | Functions |
C. | Instructions |
D. | Code Word |
Answer» D. Code Word | |
2957. |
-------- are often delivered to a PC through an email attachment and are often designed to do harm. |
A. | Virus |
B. | |
C. | Portals |
D. | Spam |
Answer» B. Email | |
2958. |
The altering of data so that it is not usable unless the changes are undone is |
A. | biometrics |
B. | encryption |
C. | ergonomics |
D. | compression |
Answer» C. ergonomics | |
2959. |
What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)? |
A. | Malisoft |
B. | Malairasoft |
C. | Moleculewar |
D. | Malware |
Answer» E. | |
2960. |
When a logic bomb is activated by a time related event, it is known as ------- |
A. | trojan horse |
B. | time bomb |
C. | virus |
D. | time related bomb sequence |
Answer» C. virus | |
2961. |
MCAfee is an example of |
A. | Virus |
B. | Quick Heal |
C. | Antivirus |
D. | Photo Editing Software |
Answer» D. Photo Editing Software | |
2962. |
A ------- is a computer program that can invade computer and perform a variety of functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files) |
A. | Computer Virus |
B. | Antivirus |
C. | Ms Word |
D. | Ms Access |
Answer» B. Antivirus | |
2963. |
The first computer virus is -------- |
A. | Sasser |
B. | Creeper |
C. | Blaster |
D. | I Love You |
Answer» C. Blaster | |
2964. |
To protect a computer from virus, you should install -------- in your computer. |
A. | antivirus |
B. | disk defragmenter |
C. | disk cleanup |
D. | backup wizard |
Answer» B. disk defragmenter | |
2965. |
Which of the following is known as Malicious software? |
A. | maliciousware |
B. | illegalware |
C. | badware |
D. | malware |
Answer» E. | |
2966. |
What is a default file extension for all word documents? |
A. | TXT |
B. | WRD |
C. | FIL |
D. | DOC |
Answer» E. | |
2967. |
C, BASIC, COBOL, and Java are examples of ............language |
A. | low-level |
B. | programming |
C. | computer |
D. | high-level |
Answer» E. | |
2968. |
What are the four things needed to connect to the internet? |
A. | telephone line, modem, computer, and an ISP |
B. | modem, computer, PDA, and ISP |
C. | telephone line, modem, computer, and PDA |
D. | computer, ISP, modem, and communication software |
Answer» E. | |
2969. |
Microcomputer hardware consists of three basic categories of physical equipment ____ |
A. | Keyboard, monitor, hard drive |
B. | system unit, input/output, memory |
C. | system unit, input/output, secondary storage |
D. | system unit, primary storage, secondary storage |
Answer» D. system unit, primary storage, secondary storage | |
2970. |
The operating system called UNIX is typically used for_______ |
A. | Desktop computers |
B. | Laptop computers |
C. | Super computers |
D. | All of these |
Answer» E. | |
2971. |
Which of the following is an example of an optical disk? |
A. | Digital versatile disks |
B. | Magnetic disks |
C. | Memory disks |
D. | Data bus disks |
Answer» B. Magnetic disks | |
2972. |
Vendor-created program modifications are called ________ |
A. | patches |
B. | antiviruses |
C. | holes |
D. | fixes |
Answer» B. antiviruses | |
2973. |
The basic operations performed by a computer are |
A. | Logical operation |
B. | Storage and relative |
C. | Arithmetic operation |
D. | All the above |
Answer» E. | |
2974. |
The term _____ designates equipment that might be added to a computer system to enhance its functionality |
A. | digital device |
B. | system add-on |
C. | disk pack |
D. | peripheral device |
Answer» E. | |
2975. |
A ........ is approximately one billion bytes |
A. | Megabyte |
B. | Gigabyte |
C. | Terabyte |
D. | None of these |
Answer» C. Terabyte | |
2976. |
which file starts ms word |
A. | word.exe |
B. | msword.exe |
C. | word2003.exe |
D. | winword.exe |
Answer» E. | |
2977. |
What characteristic of read-only memory (ROM ) makes it useful? |
A. | ROM informationcan be easily updated |
B. | Data in ROM is non volatile, that is, it remains there even without electrical power |
C. | ROM provides very large amounts of inexpensive data storage |
D. | ROM chips are easily swapped between different brands of computers |
Answer» C. ROM provides very large amounts of inexpensive data storage | |
2978. |
The smallest unit in a digital system is a......... |
A. | Bit |
B. | Byte |
C. | Character |
D. | Kilobyte |
Answer» B. Byte | |
2979. |
In MICR, C stands for........... |
A. | Code |
B. | Colour |
C. | Computer |
D. | Character |
Answer» E. | |
2980. |
Which of the following refers to a small, single-site network ? |
A. | LAN |
B. | DSL |
C. | RAM |
D. | USB |
Answer» B. DSL | |
2981. |
The box that contains the central electronic components of the computer is the .............. |
A. | Motherboard |
B. | System Unit |
C. | Peripheral |
D. | RAM |
Answer» C. Peripheral | |
2982. |
The First Mechanical Computer Designed by Charles Babbage was called? |
A. | Super Computer |
B. | Abacus |
C. | Calculator |
D. | Analytical Engine |
Answer» E. | |
2983. |
Which key is used in combination with another key to perform a specific task? |
A. | Function |
B. | Spacebar |
C. | Arrow |
D. | Control |
Answer» E. | |
2984. |
A _______ is a software program used to view Web pages. |
A. | site |
B. | host |
C. | link |
D. | browser |
Answer» E. | |
2985. |
Storage capacity of magnetic disk depends on |
A. | disk pack in disk surface |
B. | tracks per inch of surface |
C. | bits per inch of tracks |
D. | All of the above |
Answer» E. | |
2986. |
The computer's processor consists of the following parts |
A. | CPU and Main Memory |
B. | Hard Disk and Floppy Drive |
C. | Control Unit and ALU |
D. | Operating System and Application |
Answer» D. Operating System and Application | |
2987. |
The first computer was programmed using ....... |
A. | Assembly language |
B. | Machine language |
C. | Spaghetti code |
D. | Source code |
Answer» C. Spaghetti code | |
2988. |
Which of the following is a popular programming language for developing multimedia webpages. |
A. | COBOL |
B. | Java |
C. | BASIC |
D. | Assembler |
Answer» C. BASIC | |
2989. |
By default, your documents print in ________ mode |
A. | Landscape |
B. | Portrait |
C. | Page Setup |
D. | Print View |
Answer» C. Page Setup | |
2990. |
Microsoft Office is an example of a |
A. | Closed source software |
B. | Open source software |
C. | Horizontal market software |
D. | vertical market software |
Answer» D. vertical market software | |
2991. |
Junk e-mail is also called ______ |
A. | Spam |
B. | Spoof |
C. | Sniffer script |
D. | Spool |
Answer» B. Spoof | |
2992. |
_____are attempts by individuals to obtain confidential information from you by falsifying their identity |
A. | Phishing trips |
B. | Computer viruses |
C. | Phishing scams |
D. | Spyware scams |
Answer» D. Spyware scams | |
2993. |
A computer cannot "boot" if it does not have the _____ |
A. | Compiler |
B. | Loader |
C. | Operating system |
D. | Assembler |
Answer» D. Assembler | |
2994. |
MS-Word is an example of _____ |
A. | An operating system |
B. | A processing device |
C. | Application software |
D. | An input device |
Answer» D. An input device | |
2995. |
Ctrl, Shift and Alt are called .......... keys. |
A. | modifier |
B. | function |
C. | alphanumeric |
D. | adjustment |
Answer» B. function | |