

MCQOPTIONS
Saved Bookmarks
This section includes 621 Mcqs, each offering curated multiple-choice questions to sharpen your General Knowledge knowledge and support exam preparation. Choose a topic below to get started.
101. |
How many layers are there in the OSI networking model? |
A. | 13 |
B. | 11 |
C. | 9 |
D. | 7 |
Answer» E. | |
102. |
HTML in computer science stands for? |
A. | HyperText Markup Language |
B. | HyperText Main Language |
C. | HyperText Memory Language |
D. | HyperText Mandatory Language |
Answer» B. HyperText Main Language | |
103. |
HTML is a subset of_x005F_x000D_ |
A. | SGMH |
B. | SGMD |
C. | SGML |
D. | None of the above |
Answer» D. None of the above | |
104. |
HTTP in computer science stands for? |
A. | HyperText Transmission Protocol |
B. | HyperText Transfer Protocol |
C. | HyperText Technology Protocol |
D. | HyperText Total Protocol |
Answer» C. HyperText Technology Protocol | |
105. |
Hub works on which layer? |
A. | Network layer |
B. | Physical layer |
C. | Data link layer |
D. | All of the above |
Answer» C. Data link layer | |
106. |
How many KB is equal to 1 GB? |
A. | 1024 |
B. | 256 x 1024 |
C. | 1024 x 1024 |
D. | 1024 x 1024 x 128 |
Answer» D. 1024 x 1024 x 128 | |
107. |
Hard Drive capacity is measured in |
A. | Newton |
B. | GB |
C. | THz |
D. | Gwallior |
Answer» C. THz | |
108. |
Hardware devices that are not part of the main computer system and are often added later to the system are ________ |
A. | clip art |
B. | highlight |
C. | execute |
D. | peripherals |
Answer» E. | |
109. |
How many bits does an IP address contain? |
A. | 64 bits |
B. | 32 Bits |
C. | 128 Bits |
D. | 256 Bits |
Answer» C. 128 Bits | |
110. |
How do you display current date and time in MS Excel ? |
A. | Time () |
B. | Now () |
C. | Date () |
D. | Today () |
Answer» C. Date () | |
111. |
Hard copy of a document is |
A. | Printed on printer |
B. | Stored in floppy |
C. | Store in CD |
D. | Store in hard disk |
Answer» B. Stored in floppy | |
112. |
Hard disk is coated in both side with |
A. | Carbon layer |
B. | Magnetic metallic oxide |
C. | Optical metallic oxide |
D. | All of the above |
Answer» C. Optical metallic oxide | |
113. |
Google Docs is a type of cloud computing. |
A. | 1 |
B. | |
C. | |
D. | |
Answer» B. | |
114. |
Function key ___ in a Windows keyboard can perform several functions, and does not have an assigned Windows default._x005F_x000D_ |
A. | F1 |
B. | F6 |
C. | F8 |
D. | F9 |
Answer» D. F9 | |
115. |
Full form of BIOS is |
A. | Binary Interchange Operation System |
B. | Basic Input Output System |
C. | Beginner's Input Operation Symbol |
D. | Basic Interface Oriented Service |
Answer» C. Beginner's Input Operation Symbol | |
116. |
Font size is measured in |
A. | pixels |
B. | points |
C. | didos |
D. | percents |
Answer» C. didos | |
117. |
FORTRAN is not used for _____._x005F_x000D_ (I) Drawing pictures(II) Carrying out mathematics computations |
A. | Only (I) |
B. | Only (II) |
C. | Both (I) and (II) |
D. | Neither (I) nor (II) |
Answer» D. Neither (I) nor (II) | |
118. |
Formatting a cell in currency you can specify |
A. | Percentage symbol |
B. | Currency symbol |
C. | Decimal places |
D. | Both B & C |
Answer» C. Decimal places | |
119. |
First page of website is termed as |
A. | Index |
B. | Home page |
C. | JAVA Script |
D. | Bookmark page |
Answer» C. JAVA Script | |
120. |
Find the odd statement out in relation to firewall. |
A. | Firewall can be a software |
B. | Firewall can be a hardware |
C. | Firewall can be a combination of software & hardware |
D. | Firewall protects computer from fire |
Answer» D. Firewall protects computer from fire | |
121. |
Fifth generation computer is also known as |
A. | Very Large Scale Integration (VLSI) |
B. | Knowledge information processing system |
C. | Both A & B |
D. | None of the above |
Answer» C. Both A & B | |
122. |
F12 key is known as |
A. | Company Configuration |
B. | Accounting Features |
C. | Company Features |
D. | All of the above |
Answer» B. Accounting Features | |
123. |
Find the "odd one out". |
A. | Linux |
B. | Windows 98 |
C. | C++ |
D. | Windows 7 |
Answer» D. Windows 7 | |
124. |
Firewalls are used to protect against |
A. | Virus Attacks |
B. | Unauthorized Access |
C. | Data Driven Attacks |
D. | Fire Attacks |
Answer» C. Data Driven Attacks | |
125. |
Expansion cards are inserted into |
A. | Peripheral Devices |
B. | Pegs |
C. | Slots |
D. | The back of the computer |
Answer» D. The back of the computer | |
126. |
Excel displays the current cell address in the |
A. | Title Bar |
B. | Name Box |
C. | Status Bar |
D. | Formula bar |
Answer» C. Status Bar | |
127. |
Every HTML file is a ___________ file._x005F_x000D_ |
A. | Text |
B. | Audio |
C. | Video |
D. | Image |
Answer» B. Audio | |
128. |
Every set in the dotted decimal format of IP address is called |
A. | Subnet |
B. | Octet |
C. | Subset |
D. | IP set |
Answer» C. Subset | |
129. |
Every computer on the internet is known as |
A. | Client |
B. | Modem |
C. | Server |
D. | Host |
Answer» E. | |
130. |
Enumerators are stored by the compiler in |
A. | integer |
B. | string |
C. | float |
D. | any of above |
Answer» B. string | |
131. |
Every component of your computer is either |
A. | Hardware or CPU |
B. | RAM/CPU or Hardware |
C. | Hardware or Software |
D. | System or Application software |
Answer» D. System or Application software | |
132. |
Esc key in a windows keyboard is not used to_x005F_x000D_ |
A. | Close a dialog-box |
B. | Run a selected command |
C. | Cancel a command |
D. | Close a selected drop down list |
Answer» C. Cancel a command | |
133. |
EPROMÂ can be used for |
A. | Erasing and reconstructing the contents of ROM |
B. | Duplicating ROM |
C. | Reconstructing the contents of ROM |
D. | Erasing the contents of ROM |
Answer» B. Duplicating ROM | |
134. |
Ethernet system uses which of the following technology? |
A. | Ring |
B. | Bus |
C. | Star |
D. | Tree |
Answer» C. Star | |
135. |
During Processing data, programs, and processed information are held temporarily in _________ |
A. | Secodary stoage |
B. | ROM |
C. | RAM |
D. | None of these |
Answer» D. None of these | |
136. |
DSL is an example of what type of internet access? |
A. | Wireless |
B. | Network |
C. | Broadband |
D. | Slow |
Answer» D. Slow | |
137. |
Digital computers use a ......... system to encode date and programs. |
A. | semiconductor |
B. | decimal |
C. | binary |
D. | RAM |
Answer» D. RAM | |
138. |
Documentation of computer programs is impograms is important so that ________ |
A. | users can learn how to use the program |
B. | other programmers can know how to maintain the program |
C. | the programer can see why the code is written that way while hunting for sources of error |
D. | all of above |
Answer» E. | |
139. |
Debugging is the process of |
A. | Rolling out a software program |
B. | Modifying a software program |
C. | Checking errors in a software program |
D. | Changing the design structure of a program |
Answer» D. Changing the design structure of a program | |
140. |
Digitized information can be used by computers. |
A. | 1 |
B. | |
C. | |
D. | |
Answer» B. | |
141. |
Delayed payload of some viruses is also called as _____ |
A. | Bomb |
B. | Late - Virus |
C. | Time |
D. | Anti-virus |
Answer» B. Late - Virus | |
142. |
Data stored in computer in which form? |
A. | numbers |
B. | text |
C. | audio |
D. | images |
Answer» B. text | |
143. |
Data in database at a particular point of time is called as? |
A. | Intension |
B. | Extension |
C. | Back up |
D. | Application |
Answer» C. Back up | |
144. |
Cybercards are most useful for |
A. | writing to-do lists |
B. | creating new inventions |
C. | keeping a personal diary |
D. | tracking Internet-based research |
Answer» E. | |
145. |
Ctrl+F in MS Word for |
A. | Re do |
B. | to find the word |
C. | Select all |
D. | Center text |
Answer» C. Select all | |
146. |
Current search engines function by recognizing keywords. |
A. | 1 |
B. | |
C. | |
D. | |
Answer» B. | |
147. |
CTRL + ] is used for |
A. | Re-do |
B. | Right align text |
C. | Increase in font size |
D. | Expand or collapse the ribbon |
Answer» D. Expand or collapse the ribbon | |
148. |
CPU speed of a personal computer is |
A. | 1 MIPS |
B. | 100 KIPS |
C. | 32 KIPS |
D. | 32 MIPS |
Answer» D. 32 MIPS | |
149. |
CPU Scheduler is also known as _____ . |
A. | Job Scheduler |
B. | Resource Scheduler |
C. | Short-Âterm Scheduler |
D. | Process Scheduler |
Answer» D. Process Scheduler | |
150. |
CPU performance is measured through ________. |
A. | MHz |
B. | Throughput |
C. | Flaps |
D. | None of the above |
Answer» C. Flaps | |