Explore topic-wise MCQs in Computer Science Mcqs.

This section includes 990 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Mcqs knowledge and support exam preparation. Choose a topic below to get started.

151.

Computers process data into information by working exclusively with____________?

A. multimedia
B. word
C. numbers
D. characters
Answer» D. characters
152.

The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called___________?

A. robotics
B. simulation
C. computer forensics
D. animation
Answer» D. animation
153.

A device that connects to a network without the use of cables is said to be___________?

A. Distributed
B. free
C. centralized
D. none of these
Answer» E.
154.

The_____________data mining technique derives rules from real-world case examples?

A. Rule discover
B. Signal processing
C. Neural nets
D. Case-based reasoning
Answer» D. Case-based reasoning
155.

A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a____________?

A. Hacker
B. spammer
C. instant messenger
D. programmer
Answer» B. spammer
156.

The most common type of storage devices are_________?

A. magnetic storage
B. Flash memory
C. optical
D. Both A & B
Answer» E.
157.

Large transaction processing systems in automated organisations use___________?

A. Online processing
B. Batch Processing
C. Once-a-day Processing
D. End-of-day processing
Answer» C. Once-a-day Processing
158.

Which of the following is not a binary number?

A. 001
B. 101
C. 202
D. 110
Answer» D. 110
159.

A computer system that is old and perhaps not satisfactory is referred to as a(n)____________?

A. Ancient system
B. Historical system
C. Age old system
D. Legacy system
Answer» E.
160.

Which of the following is the smallest storage?

A. Megabyte
B. Gigabyte
C. Terabyte
D. None of these
Answer» E.
161.

Which of the following does not store data permanently?

A. ROM
B. RAM
C. Floppy Disk
D. Hard Disk
Answer» C. Floppy Disk
162.

A modem is connected to_____________?

A. a telephone line
B. a keyboard
C. a printer
D. a monitor
Answer» B. a keyboard
163.

Which of the following contains permanent data and gets updated during the processing of transactions?

A. Operating System File
B. Transaction file
C. Software File
D. Master file
Answer» E.
164.

Malicious software is known as____________?

A. Badware
B. Malware
C. Maliciousware
D. Illegalware
Answer» C. Maliciousware
165.

In_______________mode, the communication channel is used in both directions at the same time?

A. Full-duplex
B. Simplex
C. Half-duplex
D. None of the above
Answer» B. Simplex
166.

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?

A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall
Answer» C. Hacker-resistant server
167.

The common name for the crime of stealing passwords is____________?

A. Jacking
B. Identity theft
C. Spoofing
D. Hacking
Answer» D. Hacking
168.

Collecting personal information and effectively posing as another individual is known as the crime of_____________?

A. Spooling
B. Identity theft
C. Spoofing
D. Hacking
Answer» C. Spoofing
169.

____________is the measurement of things such as fingerprints and retinal scans used for security access?

A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery
Answer» B. Bio measurement
170.

To prevent the loss of data during power failures, use a(n)_____________?

A. Encryption program
B. Surge protector
C. Firewall
D. UPS
Answer» E.
171.

___________refers to electronic trespassing or criminal hacking?

A. Cracking
B. Jacking
C. Spoofing
D. Smarming
Answer» B. Jacking
172.

_________computer are of large size?

A. Micro
B. Mainframe
C. Super
D. Mini
Answer» C. Super
173.

The scrambling of code is known as___________?

A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
Answer» B. a firewall
174.

__________is defined as any crime completed through the use of computer technology?

A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer» C. Hacking
175.

The first electronic computer was developed by____________?

A. J.V. Attansoff
B. Bill Gates
C. Simur Cray
D. Winton Serf
Answer» B. Bill Gates
176.

Note book, laptop,palm,hand-held computers are coming under the category of__________computer?

A. Digital computer
B. Mainframe computer
C. Portable computer
D. Hybrid computer
Answer» D. Hybrid computer
177.

LAN stands for______________?

A. Limited Area Network
B. Logical Area Network
C. Local Area Network
D. Large Area Network
Answer» D. Large Area Network
178.

Ctrl + E Shortcut key is used in Ms Word to____________?

A. Exit Application
B. Select All
C. Clear All
D. Align Center
Answer» E.
179.

Directory in a directory is called__________?

A. Sub directory
B. Mini directory
C. Junior Directory
D. Active directory
Answer» B. Mini directory
180.

_____________are set of rules and procedures to control the data transmission over the internet?

A. IP address
B. Domains
C. Protocol
D. Gateway
Answer» D. Gateway
181.

A program that performs a useful task while simultaneously allowing destructive acts is a___________?

A. Worm
B. Trojan horse
C. Virus
D. Macro virus
Answer» C. Virus
182.

To display the contents of a folder in Windows Explorer you should:

A. click on it
B. collapse it
C. name it
D. give it a password
E. None of these
Answer» B. collapse it
183.

_______________are system software to facilitate editing of text and data?

A. MS Word
B. Editors
C. PowerPoint
D. MS publisher
Answer» C. PowerPoint
184.

Serial access memories are useful in applications where:

A. Data consists of numbers
B. Short access time is required
C. Each stored word is processed differently
D. Data naturally needs to flow in and out in serial form
Answer» E.
185.

Which of the following memories must be refreshed many times per second?

A. Static RAM
B. Dynamic RAM
C. EPROM
D. ROM
Answer» C. EPROM
186.

Computers, combine both measuring and counting, are called________________?

A. Analog
B. Digital
C. Hybrid
D. All of these
Answer» D. All of these
187.

In world today, most of the computers are_____________?

A. Digital
B. Hybrid
C. Analog
D. Complex
Answer» B. Hybrid
188.

The CPU comprises of Control, Memory and_______________units?

A. Microprocessor
B. Arithmetic/Logic
C. Output
D. ROM
Answer» C. Output
189.

A(n)_______________appearing on a web page opens another document when clicked.

A. anchor
B. URL
C. hyperlink
D. reference
Answer» D. reference
190.

Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both____________data, including full-motion video, high-speed internet access, and video conferencing.

A. video data and information
B. voice and non-voice
C. music and video
D. video and audio
Answer» C. music and video
191.

_____________is a windows utility program that locates and eliminates unncessary fragments and rearranges filed and unused disk space to optimize operations?

A. Backup
B. Disk cleanup
C. Disk Defragmenter
D. Restore
Answer» D. Restore
192.

A set of rules for telling the computer what operations to perform is called a______________?

A. procedural language
B. structures
C. natural language
D. programming language
Answer» E.
193.

Which of these is a point and draw device?

A. Mouse
B. Scanner
C. Printer
D. CD-ROM
Answer» B. Scanner
194.

A detailed written description of the programming cycle and the program, along with the test results and a printout of the program is called___________?

A. documentation
B. output
C. reporting
D. spec sheets
Answer» B. output
195.

Forms that are used to organize business data into rows and coloumns are called_____________?

A. transaction sheets
B. registers
C. business forms
D. spread sheets
Answer» E.
196.

In power point, the header and footer button can be found on the insert tab in what group?

A. Illustrations group
B. Object group
C. Text group
D. Tables group
Answer» D. Tables group
197.

When entering text within a document, the Enter key is normally pressed at the end of every____________?

A. Line
B. Sentence
C. Paragraph
D. Word
E. None of these
Answer» D. Word
198.

What do you call the translator which takes assembly language program as input & produce machine language code as output?

A. Compiler
B. Interpreter
C. Debugger
D. Assembler
Answer» E.
199.

Which of the following software could assist someone who cannot use their hands for computer input?

A. Video conferencing
B. Speech recognition
C. Audio digitizer
D. Synthesizer
Answer» C. Audio digitizer
200.

IC are classified on the basis of_____________?

A. Manufacturing company
B. Type of computer
C. Number of transistors
D. None of these
Answer» D. None of these