Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Computers process data into information by working exclusively with____________?

A. multimedia
B. word
C. numbers
D. characters
Answer» D. characters
2.

The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called___________?

A. robotics
B. simulation
C. computer forensics
D. animation
Answer» D. animation
3.

A device that connects to a network without the use of cables is said to be___________?

A. Distributed
B. free
C. centralized
D. none of these
Answer» E.
4.

The_____________data mining technique derives rules from real-world case examples?

A. Rule discover
B. Signal processing
C. Neural nets
D. Case-based reasoning
Answer» D. Case-based reasoning
5.

A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a____________?

A. Hacker
B. spammer
C. instant messenger
D. programmer
Answer» B. spammer
6.

The most common type of storage devices are_________?

A. magnetic storage
B. Flash memory
C. optical
D. Both A & B
Answer» E.
7.

Large transaction processing systems in automated organisations use___________?

A. Online processing
B. Batch Processing
C. Once-a-day Processing
D. End-of-day processing
Answer» C. Once-a-day Processing
8.

Which of the following is not a binary number?

A. 001
B. 101
C. 202
D. 110
Answer» D. 110
9.

A computer system that is old and perhaps not satisfactory is referred to as a(n)____________?

A. Ancient system
B. Historical system
C. Age old system
D. Legacy system
Answer» E.
10.

Which of the following is the smallest storage?

A. Megabyte
B. Gigabyte
C. Terabyte
D. None of these
Answer» E.
11.

Which of the following does not store data permanently?

A. ROM
B. RAM
C. Floppy Disk
D. Hard Disk
Answer» C. Floppy Disk
12.

A modem is connected to_____________?

A. a telephone line
B. a keyboard
C. a printer
D. a monitor
Answer» B. a keyboard
13.

Which of the following contains permanent data and gets updated during the processing of transactions?

A. Operating System File
B. Transaction file
C. Software File
D. Master file
Answer» E.
14.

Malicious software is known as____________?

A. Badware
B. Malware
C. Maliciousware
D. Illegalware
Answer» C. Maliciousware
15.

In_______________mode, the communication channel is used in both directions at the same time?

A. Full-duplex
B. Simplex
C. Half-duplex
D. None of the above
Answer» B. Simplex
16.

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?

A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall
Answer» C. Hacker-resistant server
17.

The common name for the crime of stealing passwords is____________?

A. Jacking
B. Identity theft
C. Spoofing
D. Hacking
Answer» D. Hacking
18.

Collecting personal information and effectively posing as another individual is known as the crime of_____________?

A. Spooling
B. Identity theft
C. Spoofing
D. Hacking
Answer» C. Spoofing
19.

____________is the measurement of things such as fingerprints and retinal scans used for security access?

A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery
Answer» B. Bio measurement
20.

To prevent the loss of data during power failures, use a(n)_____________?

A. Encryption program
B. Surge protector
C. Firewall
D. UPS
Answer» E.
21.

___________refers to electronic trespassing or criminal hacking?

A. Cracking
B. Jacking
C. Spoofing
D. Smarming
Answer» B. Jacking
22.

_________computer are of large size?

A. Micro
B. Mainframe
C. Super
D. Mini
Answer» C. Super
23.

The scrambling of code is known as___________?

A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
Answer» B. a firewall
24.

__________is defined as any crime completed through the use of computer technology?

A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer» C. Hacking
25.

The first electronic computer was developed by____________?

A. J.V. Attansoff
B. Bill Gates
C. Simur Cray
D. Winton Serf
Answer» B. Bill Gates
26.

Note book, laptop,palm,hand-held computers are coming under the category of__________computer?

A. Digital computer
B. Mainframe computer
C. Portable computer
D. Hybrid computer
Answer» D. Hybrid computer
27.

LAN stands for______________?

A. Limited Area Network
B. Logical Area Network
C. Local Area Network
D. Large Area Network
Answer» D. Large Area Network
28.

Ctrl + E Shortcut key is used in Ms Word to____________?

A. Exit Application
B. Select All
C. Clear All
D. Align Center
Answer» E.
29.

Directory in a directory is called__________?

A. Sub directory
B. Mini directory
C. Junior Directory
D. Active directory
Answer» B. Mini directory
30.

_____________are set of rules and procedures to control the data transmission over the internet?

A. IP address
B. Domains
C. Protocol
D. Gateway
Answer» D. Gateway
31.

A program that performs a useful task while simultaneously allowing destructive acts is a___________?

A. Worm
B. Trojan horse
C. Virus
D. Macro virus
Answer» C. Virus
32.

To display the contents of a folder in Windows Explorer you should:

A. click on it
B. collapse it
C. name it
D. give it a password
E. None of these
Answer» B. collapse it
33.

_______________are system software to facilitate editing of text and data?

A. MS Word
B. Editors
C. PowerPoint
D. MS publisher
Answer» C. PowerPoint
34.

Serial access memories are useful in applications where:

A. Data consists of numbers
B. Short access time is required
C. Each stored word is processed differently
D. Data naturally needs to flow in and out in serial form
Answer» E.
35.

Which of the following memories must be refreshed many times per second?

A. Static RAM
B. Dynamic RAM
C. EPROM
D. ROM
Answer» C. EPROM
36.

Computers, combine both measuring and counting, are called________________?

A. Analog
B. Digital
C. Hybrid
D. All of these
Answer» D. All of these
37.

In world today, most of the computers are_____________?

A. Digital
B. Hybrid
C. Analog
D. Complex
Answer» B. Hybrid
38.

The CPU comprises of Control, Memory and_______________units?

A. Microprocessor
B. Arithmetic/Logic
C. Output
D. ROM
Answer» C. Output
39.

A(n)_______________appearing on a web page opens another document when clicked.

A. anchor
B. URL
C. hyperlink
D. reference
Answer» D. reference
40.

Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both____________data, including full-motion video, high-speed internet access, and video conferencing.

A. video data and information
B. voice and non-voice
C. music and video
D. video and audio
Answer» C. music and video
41.

_____________is a windows utility program that locates and eliminates unncessary fragments and rearranges filed and unused disk space to optimize operations?

A. Backup
B. Disk cleanup
C. Disk Defragmenter
D. Restore
Answer» D. Restore
42.

A set of rules for telling the computer what operations to perform is called a______________?

A. procedural language
B. structures
C. natural language
D. programming language
Answer» E.
43.

Which of these is a point and draw device?

A. Mouse
B. Scanner
C. Printer
D. CD-ROM
Answer» B. Scanner
44.

A detailed written description of the programming cycle and the program, along with the test results and a printout of the program is called___________?

A. documentation
B. output
C. reporting
D. spec sheets
Answer» B. output
45.

Forms that are used to organize business data into rows and coloumns are called_____________?

A. transaction sheets
B. registers
C. business forms
D. spread sheets
Answer» E.
46.

In power point, the header and footer button can be found on the insert tab in what group?

A. Illustrations group
B. Object group
C. Text group
D. Tables group
Answer» D. Tables group
47.

When entering text within a document, the Enter key is normally pressed at the end of every____________?

A. Line
B. Sentence
C. Paragraph
D. Word
E. None of these
Answer» D. Word
48.

What do you call the translator which takes assembly language program as input & produce machine language code as output?

A. Compiler
B. Interpreter
C. Debugger
D. Assembler
Answer» E.
49.

Which of the following software could assist someone who cannot use their hands for computer input?

A. Video conferencing
B. Speech recognition
C. Audio digitizer
D. Synthesizer
Answer» C. Audio digitizer
50.

IC are classified on the basis of_____________?

A. Manufacturing company
B. Type of computer
C. Number of transistors
D. None of these
Answer» D. None of these