

MCQOPTIONS
Saved Bookmarks
This section includes 621 Mcqs, each offering curated multiple-choice questions to sharpen your General Knowledge knowledge and support exam preparation. Choose a topic below to get started.
451. |
What are two example of freeware? |
A. | WinZip and Linux |
B. | Shareware and file sharing |
C. | Microsoft word and the Google toolbar |
D. | Instant messaging and the Google toolbar |
Answer» E. | |
452. |
What command is used to count the total number of lines, words, and characters contained in a file ? |
A. | wc |
B. | count p |
C. | wcount |
D. | countw |
Answer» B. count p | |
453. |
What cannot be performed from the windows task manager? |
A. | Open a program |
B. | Check recent CPU usage |
C. | Delete a program from the hard drive |
D. | View what applications are running in the background |
Answer» D. View what applications are running in the background | |
454. |
What are the four things needed to connect to the internet? |
A. | telephone line, modem, computer, and an ISP |
B. | modem, computer, PDA, and ISP |
C. | telephone line, modem, computer, and PDA |
D. | computer, ISP, modem, and communication software |
Answer» E. | |
455. |
What are the four main functions of a computer? |
A. | Data, information, bits and bytes |
B. | Hardware, software, modeling and operations |
C. | Input, processing, output and storage |
D. | Learning, thinking, intelligence and virtuosity |
Answer» D. Learning, thinking, intelligence and virtuosity | |
456. |
Website address is a unique name that identifies a specific ___ on the web. |
A. | Link |
B. | Web browser |
C. | PDA |
D. | Web site |
Answer» E. | |
457. |
Web pages are created by using which of the following? |
A. | HTTP |
B. | SMTP |
C. | HTML |
D. | SGML |
Answer» D. SGML | |
458. |
Web applications are designed to interpret _____________ to display text, images etc._x005F_x000D_ |
A. | HTML |
B. | Hyperlinks |
C. | Computers |
D. | World Wide Web |
Answer» B. Hyperlinks | |
459. |
VPN's are implemented to provide |
A. | A secure connection through public networks |
B. | Additional security for selected computers |
C. | A secure connection within a private network |
D. | Additional encryption by using IPSec |
Answer» B. Additional security for selected computers | |
460. |
VoIP in computer science stands for? |
A. | Virtual over Identifier Protocol |
B. | Voice over Internet Protocol |
C. | Voice over Interface Protocol |
D. | Voice over Instruction Protocol |
Answer» C. Voice over Interface Protocol | |
461. |
Verification of a login name and password is known as |
A. | Trouble shooting |
B. | Logging in |
C. | Configuration |
D. | Authentication |
Answer» E. | |
462. |
Vacuum Tubes were used by _________ Generation of Computers. |
A. | First |
B. | Second |
C. | Third |
D. | Fourth |
Answer» B. Second | |
463. |
V-RAM is used for access of the following ? |
A. | Programs |
B. | Video & Graphics |
C. | Text & Images |
D. | All |
Answer» C. Text & Images | |
464. |
Using _________ one can resize, tag digital images, organise pictures into albums by drag and drop, can export the pictures for external use (by e-mail or print). |
A. | Data Organiser |
B. | Facebook Organiser |
C. | Image Organiser |
D. | Media Organiser |
Answer» D. Media Organiser | |
465. |
USB is which type of storage device? |
A. | Tertiary |
B. | Secondary |
C. | Primary |
D. | Auxillary |
Answer» C. Primary | |
466. |
Ubiquitous computing is also called |
A. | Pervasive computing |
B. | Sensor networks |
C. | Trails |
D. | None |
Answer» B. Sensor networks | |
467. |
UDP is a |
A. | connection  oriented protocol |
B. | connectionless protocol |
C. | user-Âdefined protocol |
D. | security protocol |
Answer» C. user-Âdefined protocol | |
468. |
UNIVACÂ is |
A. | Universal Automatic Computer |
B. | Universal Array Computer |
C. | Unvalued Automatic Computer |
D. | Unique Automatic Computer |
Answer» B. Universal Array Computer | |
469. |
Unsolicited e-mail is called a ______ |
A. | Newsgroup |
B. | Usenet |
C. | Backbane |
D. | Spam |
Answer» E. | |
470. |
Type of a file in a computer can be identified by the ___. |
A. | Folder name |
B. | File size |
C. | File path |
D. | File extension |
Answer» E. | |
471. |
Two versions of the Internet Protocol (IP) are in use |
A. | IP Version 4 & IP Version 6 |
B. | IP Version 2 & IP Version 3 |
C. | IP Version 4 & IP Version 8 |
D. | IP Version 2 & IP Version 4 |
Answer» B. IP Version 2 & IP Version 3 | |
472. |
Translator program used in assembly language |
A. | Assembler |
B. | Interpreter |
C. | Compiler |
D. | Operating system |
Answer» B. Interpreter | |
473. |
Transformation of input into output is performed by |
A. | CPU |
B. | The input-output unit |
C. | Memory unit |
D. | Peripherals |
Answer» B. The input-output unit | |
474. |
Today __________ are seen as personal accessory - portable, powerful and simple to operate._x005F_x000D_ |
A. | |
B. | e-business_x005F_x000D_ |
C. | e-content_x005F_x000D_ |
D. | Computers |
Answer» E. | |
475. |
To make the number pad act as a directional arrow, we press |
A. | Num lock |
B. | Caps lock |
C. | Arrow lock |
D. | Shift |
Answer» E. | |
476. |
To exit the PowerPoint application, you should |
A. | Double click the application control menu icon |
B. | Click the application minimize button |
C. | Double click the document control menu icon |
D. | Click the document close button |
Answer» B. Click the application minimize button | |
477. |
To delete columns or rows we can use the delete option under the ______________ in Microsoft Word. |
A. | Menu |
B. | Standard toolbar |
C. | Table Menu |
D. | Drawing toolbar |
Answer» D. Drawing toolbar | |
478. |
Thesaurus tool in MS word is used for |
A. | Translate |
B. | Synonyms and Antonyms words |
C. | Spelling suggestions |
D. | None of the above |
Answer» C. Spelling suggestions | |
479. |
To copy cell contents using drag and drop press the |
A. | Shift key |
B. | Alt key |
C. | End key |
D. | Ctrl key |
Answer» E. | |
480. |
To change the date shortcut used |
A. | Alt + F3 |
B. | Alt + F2 |
C. | F2 |
D. | F1 |
Answer» D. F1 | |
481. |
There is a network that can connect networks ranging from small location or area to a bigger range including public packet network and large corporate networks. That networks enterprise allows users to share access to applications,services and other centrally located resources. Its ability for a huge geographical access has transformed networking.Which among the following is that network? |
A. | SAN |
B. | CAN |
C. | LAN |
D. | WAN |
Answer» E. | |
482. |
The word length of a computer is measured in |
A. | centimeters |
B. | millimeters |
C. | bytes |
D. | bits |
Answer» E. | |
483. |
The unit of measurement of a word length is |
A. | Meter |
B. | Byte |
C. | Bit |
D. | Millimetre |
Answer» C. Bit | |
484. |
The web uses the __________ to request and serve web pages and programs. |
A. | Hyper Text Marketing Language |
B. | Hyper Text Markup Language |
C. | Hotmail Text Markup Language |
D. | Home Text Markup Language |
Answer» C. Hotmail Text Markup Language | |
485. |
The __________ uses an addressing scheme known as URL to indicate the location of files on the web. |
A. | JavaScript |
B. | World Wide Web |
C. | SQL |
D. | String |
Answer» C. SQL | |
486. |
The two  types of output devices are |
A. | Monitor and Printer |
B. | Floppy disc and CD |
C. | Keyboard and Mouse |
D. | None of these |
Answer» B. Floppy disc and CD | |
487. |
The unit MIPS is used to measure the speed of a___. |
A. | Disk drive |
B. | Tape drive |
C. | Printer |
D. | Processor |
Answer» E. | |
488. |
The two major types of computer chips are |
A. | Microprocessor |
B. | Primary memory |
C. | Both A & B |
D. | External memory |
Answer» D. External memory | |
489. |
The two kinds of Main Memory are |
A. | Random and sequential |
B. | ROM and RAM |
C. | Primary and secondary |
D. | All the above |
Answer» C. Primary and secondary | |
490. |
The transfer of data from one application to another in a computer system is known as |
A. | Dynamic Data Exchange |
B. | Dodgy Data Exchange |
C. | Dogmatic Data Exchange |
D. | Dynamic Disk Exchange |
Answer» B. Dodgy Data Exchange | |
491. |
The term computer is derived from |
A. | Latin language |
B. | Sanskrit language |
C. | Greek language |
D. | German language |
Answer» B. Sanskrit language | |
492. |
The tag line "Do no Evil" is owned by |
A. | Yahoo |
B. | Bing |
C. | |
D. | Start page |
Answer» D. Start page | |
493. |
The system unit of a personal computer typically contains all except |
A. | Modem |
B. | Serial interface |
C. | Microprocessor |
D. | Disk controller |
Answer» B. Serial interface | |
494. |
The system board is also known as the |
A. | Mother board |
B. | Main circuit board |
C. | Baseboard |
D. | All of the above |
Answer» E. | |
495. |
The symbols used in an assembly language are called ? |
A. | Assembler |
B. | Mnemonics |
C. | Codes |
D. | All of the above |
Answer» C. Codes | |
496. |
The size of yes no field is always |
A. | 1 byte |
B. | 1 character |
C. | 1GB |
D. | 1 bit |
Answer» E. | |
497. |
The resolution of a printer is measured in |
A. | DPI |
B. | Megabits |
C. | Hertz |
D. | Inches |
Answer» B. Megabits | |
498. |
The quickest and easiest way in word, to locate a particular word or phase in a document is to use the command |
A. | Replace |
B. | Find |
C. | Lookup |
D. | Search |
Answer» C. Lookup | |
499. |
The process when the computer is switched on and the operating system gets loaded from hard disk to main memory is called |
A. | Booting |
B. | Fetching |
C. | Processing |
D. | Multi-Processing |
Answer» B. Fetching | |
500. |
The primary tool used in structured design is a |
A. | module |
B. | structure chart |
C. | program flowchart |
D. | data-flow diagram |
Answer» C. program flowchart | |