MCQOPTIONS
 Saved Bookmarks
				This section includes 990 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Mcqs knowledge and support exam preparation. Choose a topic below to get started.
| 151. | 
                                    Computers process data into information by working exclusively with____________? | 
                            
| A. | multimedia | 
| B. | word | 
| C. | numbers | 
| D. | characters | 
| Answer» D. characters | |
| 152. | 
                                    The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called___________? | 
                            
| A. | robotics | 
| B. | simulation | 
| C. | computer forensics | 
| D. | animation | 
| Answer» D. animation | |
| 153. | 
                                    A device that connects to a network without the use of cables is said to be___________? | 
                            
| A. | Distributed | 
| B. | free | 
| C. | centralized | 
| D. | none of these | 
| Answer» E. | |
| 154. | 
                                    The_____________data mining technique derives rules from real-world case examples? | 
                            
| A. | Rule discover | 
| B. | Signal processing | 
| C. | Neural nets | 
| D. | Case-based reasoning | 
| Answer» D. Case-based reasoning | |
| 155. | 
                                    A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a____________? | 
                            
| A. | Hacker | 
| B. | spammer | 
| C. | instant messenger | 
| D. | programmer | 
| Answer» B. spammer | |
| 156. | 
                                    The most common type of storage devices are_________? | 
                            
| A. | magnetic storage | 
| B. | Flash memory | 
| C. | optical | 
| D. | Both A & B | 
| Answer» E. | |
| 157. | 
                                    Large transaction processing systems in automated organisations use___________? | 
                            
| A. | Online processing | 
| B. | Batch Processing | 
| C. | Once-a-day Processing | 
| D. | End-of-day processing | 
| Answer» C. Once-a-day Processing | |
| 158. | 
                                    Which of the following is not a binary number? | 
                            
| A. | 001 | 
| B. | 101 | 
| C. | 202 | 
| D. | 110 | 
| Answer» D. 110 | |
| 159. | 
                                    A computer system that is old and perhaps not satisfactory is referred to as a(n)____________? | 
                            
| A. | Ancient system | 
| B. | Historical system | 
| C. | Age old system | 
| D. | Legacy system | 
| Answer» E. | |
| 160. | 
                                    Which of the following is the smallest storage? | 
                            
| A. | Megabyte | 
| B. | Gigabyte | 
| C. | Terabyte | 
| D. | None of these | 
| Answer» E. | |
| 161. | 
                                    Which of the following does not store data permanently? | 
                            
| A. | ROM | 
| B. | RAM | 
| C. | Floppy Disk | 
| D. | Hard Disk | 
| Answer» C. Floppy Disk | |
| 162. | 
                                    A modem is connected to_____________? | 
                            
| A. | a telephone line | 
| B. | a keyboard | 
| C. | a printer | 
| D. | a monitor | 
| Answer» B. a keyboard | |
| 163. | 
                                    Which of the following contains permanent data and gets updated during the processing of transactions? | 
                            
| A. | Operating System File | 
| B. | Transaction file | 
| C. | Software File | 
| D. | Master file | 
| Answer» E. | |
| 164. | 
                                    Malicious software is known as____________? | 
                            
| A. | Badware | 
| B. | Malware | 
| C. | Maliciousware | 
| D. | Illegalware | 
| Answer» C. Maliciousware | |
| 165. | 
                                    In_______________mode, the communication channel is used in both directions at the same time? | 
                            
| A. | Full-duplex | 
| B. | Simplex | 
| C. | Half-duplex | 
| D. | None of the above | 
| Answer» B. Simplex | |
| 166. | 
                                    Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________? | 
                            
| A. | Hacker-proof program | 
| B. | Firewall | 
| C. | Hacker-resistant server | 
| D. | Encryption safe wall | 
| Answer» C. Hacker-resistant server | |
| 167. | 
                                    The common name for the crime of stealing passwords is____________? | 
                            
| A. | Jacking | 
| B. | Identity theft | 
| C. | Spoofing | 
| D. | Hacking | 
| Answer» D. Hacking | |
| 168. | 
                                    Collecting personal information and effectively posing as another individual is known as the crime of_____________? | 
                            
| A. | Spooling | 
| B. | Identity theft | 
| C. | Spoofing | 
| D. | Hacking | 
| Answer» C. Spoofing | |
| 169. | 
                                    ____________is the measurement of things such as fingerprints and retinal scans used for security access? | 
                            
| A. | Biometrics | 
| B. | Bio measurement | 
| C. | Computer security | 
| D. | Smart weapon machinery | 
| Answer» B. Bio measurement | |
| 170. | 
                                    To prevent the loss of data during power failures, use a(n)_____________? | 
                            
| A. | Encryption program | 
| B. | Surge protector | 
| C. | Firewall | 
| D. | UPS | 
| Answer» E. | |
| 171. | 
                                    ___________refers to electronic trespassing or criminal hacking? | 
                            
| A. | Cracking | 
| B. | Jacking | 
| C. | Spoofing | 
| D. | Smarming | 
| Answer» B. Jacking | |
| 172. | 
                                    _________computer are of large size? | 
                            
| A. | Micro | 
| B. | Mainframe | 
| C. | Super | 
| D. | Mini | 
| Answer» C. Super | |
| 173. | 
                                    The scrambling of code is known as___________? | 
                            
| A. | Encryption | 
| B. | a firewall | 
| C. | Scrambling | 
| D. | Password proofing | 
| Answer» B. a firewall | |
| 174. | 
                                    __________is defined as any crime completed through the use of computer technology? | 
                            
| A. | Computer forensics | 
| B. | Computer crime | 
| C. | Hacking | 
| D. | Cracking | 
| Answer» C. Hacking | |
| 175. | 
                                    The first electronic computer was developed by____________? | 
                            
| A. | J.V. Attansoff | 
| B. | Bill Gates | 
| C. | Simur Cray | 
| D. | Winton Serf | 
| Answer» B. Bill Gates | |
| 176. | 
                                    Note book, laptop,palm,hand-held computers are coming under the category of__________computer? | 
                            
| A. | Digital computer | 
| B. | Mainframe computer | 
| C. | Portable computer | 
| D. | Hybrid computer | 
| Answer» D. Hybrid computer | |
| 177. | 
                                    LAN stands for______________? | 
                            
| A. | Limited Area Network | 
| B. | Logical Area Network | 
| C. | Local Area Network | 
| D. | Large Area Network | 
| Answer» D. Large Area Network | |
| 178. | 
                                    Ctrl + E Shortcut key is used in Ms Word to____________? | 
                            
| A. | Exit Application | 
| B. | Select All | 
| C. | Clear All | 
| D. | Align Center | 
| Answer» E. | |
| 179. | 
                                    Directory in a directory is called__________? | 
                            
| A. | Sub directory | 
| B. | Mini directory | 
| C. | Junior Directory | 
| D. | Active directory | 
| Answer» B. Mini directory | |
| 180. | 
                                    _____________are set of rules and procedures to control the data transmission over the internet? | 
                            
| A. | IP address | 
| B. | Domains | 
| C. | Protocol | 
| D. | Gateway | 
| Answer» D. Gateway | |
| 181. | 
                                    A program that performs a useful task while simultaneously allowing destructive acts is a___________? | 
                            
| A. | Worm | 
| B. | Trojan horse | 
| C. | Virus | 
| D. | Macro virus | 
| Answer» C. Virus | |
| 182. | 
                                    To display the contents of a folder in Windows Explorer you should: | 
                            
| A. | click on it | 
| B. | collapse it | 
| C. | name it | 
| D. | give it a password | 
| E. | None of these | 
| Answer» B. collapse it | |
| 183. | 
                                    _______________are system software to facilitate editing of text and data? | 
                            
| A. | MS Word | 
| B. | Editors | 
| C. | PowerPoint | 
| D. | MS publisher | 
| Answer» C. PowerPoint | |
| 184. | 
                                    Serial access memories are useful in applications where: | 
                            
| A. | Data consists of numbers | 
| B. | Short access time is required | 
| C. | Each stored word is processed differently | 
| D. | Data naturally needs to flow in and out in serial form | 
| Answer» E. | |
| 185. | 
                                    Which of the following memories must be refreshed many times per second? | 
                            
| A. | Static RAM | 
| B. | Dynamic RAM | 
| C. | EPROM | 
| D. | ROM | 
| Answer» C. EPROM | |
| 186. | 
                                    Computers, combine both measuring and counting, are called________________? | 
                            
| A. | Analog | 
| B. | Digital | 
| C. | Hybrid | 
| D. | All of these | 
| Answer» D. All of these | |
| 187. | 
                                    In world today, most of the computers are_____________? | 
                            
| A. | Digital | 
| B. | Hybrid | 
| C. | Analog | 
| D. | Complex | 
| Answer» B. Hybrid | |
| 188. | 
                                    The CPU comprises of Control, Memory and_______________units? | 
                            
| A. | Microprocessor | 
| B. | Arithmetic/Logic | 
| C. | Output | 
| D. | ROM | 
| Answer» C. Output | |
| 189. | 
                                    A(n)_______________appearing on a web page opens another document when clicked. | 
                            
| A. | anchor | 
| B. | URL | 
| C. | hyperlink | 
| D. | reference | 
| Answer» D. reference | |
| 190. | 
                                    Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both____________data, including full-motion video, high-speed internet access, and video conferencing. | 
                            
| A. | video data and information | 
| B. | voice and non-voice | 
| C. | music and video | 
| D. | video and audio | 
| Answer» C. music and video | |
| 191. | 
                                    _____________is a windows utility program that locates and eliminates unncessary fragments and rearranges filed and unused disk space to optimize operations? | 
                            
| A. | Backup | 
| B. | Disk cleanup | 
| C. | Disk Defragmenter | 
| D. | Restore | 
| Answer» D. Restore | |
| 192. | 
                                    A set of rules for telling the computer what operations to perform is called a______________? | 
                            
| A. | procedural language | 
| B. | structures | 
| C. | natural language | 
| D. | programming language | 
| Answer» E. | |
| 193. | 
                                    Which of these is a point and draw device? | 
                            
| A. | Mouse | 
| B. | Scanner | 
| C. | Printer | 
| D. | CD-ROM | 
| Answer» B. Scanner | |
| 194. | 
                                    A detailed written description of the programming cycle and the program, along with the test results and a printout of the program is called___________? | 
                            
| A. | documentation | 
| B. | output | 
| C. | reporting | 
| D. | spec sheets | 
| Answer» B. output | |
| 195. | 
                                    Forms that are used to organize business data into rows and coloumns are called_____________? | 
                            
| A. | transaction sheets | 
| B. | registers | 
| C. | business forms | 
| D. | spread sheets | 
| Answer» E. | |
| 196. | 
                                    In power point, the header and footer button can be found on the insert tab in what group? | 
                            
| A. | Illustrations group | 
| B. | Object group | 
| C. | Text group | 
| D. | Tables group | 
| Answer» D. Tables group | |
| 197. | 
                                    When entering text within a document, the Enter key is normally pressed at the end of every____________? | 
                            
| A. | Line | 
| B. | Sentence | 
| C. | Paragraph | 
| D. | Word | 
| E. | None of these | 
| Answer» D. Word | |
| 198. | 
                                    What do you call the translator which takes assembly language program as input & produce machine language code as output? | 
                            
| A. | Compiler | 
| B. | Interpreter | 
| C. | Debugger | 
| D. | Assembler | 
| Answer» E. | |
| 199. | 
                                    Which of the following software could assist someone who cannot use their hands for computer input? | 
                            
| A. | Video conferencing | 
| B. | Speech recognition | 
| C. | Audio digitizer | 
| D. | Synthesizer | 
| Answer» C. Audio digitizer | |
| 200. | 
                                    IC are classified on the basis of_____________? | 
                            
| A. | Manufacturing company | 
| B. | Type of computer | 
| C. | Number of transistors | 
| D. | None of these | 
| Answer» D. None of these | |