

MCQOPTIONS
Saved Bookmarks
This section includes 109 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which one is the Low Level Language? |
A. | Assembly |
B. | Visual Basic |
C. | Java |
D. | C++ |
Answer» B. Visual Basic | |
2. |
Which program can be used for email? |
A. | Internet Explorer |
B. | Outlook Express |
C. | NetMeeting |
D. | FrontPage |
Answer» C. NetMeeting | |
3. |
Which technology is used in a CDROM Drive? |
A. | Mechanical |
B. | Electromechanical |
C. | Optical |
D. | Fiber Optica |
Answer» D. Fiber Optica | |
4. |
Who is known as the father of Computer Science? |
A. | Charles Babbage |
B. | Dr. Herman Hollerith |
C. | Howard Aiken |
D. | Blaise Pascal |
Answer» B. Dr. Herman Hollerith | |
5. |
You use a(n) ______________such as a keyboard or mouse, to input information |
A. | output device |
B. | input device |
C. | storage device |
D. | processing device |
Answer» C. storage device | |
6. |
Which of the following is/are operating systems |
A. | Windows |
B. | Unix |
C. | OS/2 |
D. | All of these |
Answer» E. | |
7. |
Which of the following is a network topoloty |
A. | LAN |
B. | WAN |
C. | MAN |
D. | BUS |
Answer» E. | |
8. |
Which of the following contains permanent data and gets updated during the processing of transactions? |
A. | Operating System File |
B. | Transaction file |
C. | Software File |
D. | Master file |
Answer» E. | |
9. |
Which is a volatile memory? |
A. | ROM |
B. | BIOS |
C. | PROM |
D. | RAM |
Answer» E. | |
10. |
Which is a valid program to access the Internet? |
A. | Access |
B. | Front Page |
C. | Windows Explorer |
D. | Netscape |
Answer» E. | |
11. |
Which device is used to process data? |
A. | CPU |
B. | RAM |
C. | DCU |
D. | VDU |
Answer» B. RAM | |
12. |
Which computer peripheral manufacturer quotes “Empowering your PC”? |
A. | Canon |
B. | Epson |
C. | Mercury |
D. | Samsung |
Answer» D. Samsung | |
13. |
When creating a computer program, the designs the structure of the program |
A. | End user |
B. | System Analyst |
C. | Programmer |
D. | All of the above |
Answer» C. Programmer | |
14. |
When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits? |
A. | ANSI |
B. | ASCII |
C. | EBCDIC |
D. | ISO |
Answer» B. ASCII | |
15. |
What type of printers are Dot Matrix Printers? |
A. | Laser |
B. | Inkjet |
C. | Impact |
D. | Drum |
Answer» D. Drum | |
16. |
What is the full form of RAM? |
A. | Read Access Memory |
B. | Random Access Memory |
C. | Rapid access Memory |
D. | None of these |
Answer» C. Rapid access Memory | |
17. |
What is the capacity of a 3.5” Floppy Disk? |
A. | 360KB |
B. | 720KB |
C. | 1.2MB |
D. | 1.44MB |
Answer» E. | |
18. |
What do you call a single point on a computer screen |
A. | Cell |
B. | Element |
C. | Pixel |
D. | Bit |
Answer» D. Bit | |
19. |
VOIP stands for__________________ |
A. | Voice over IP |
B. | Video over IP |
C. | Viruses over IP |
D. | Virtual over IP |
Answer» B. Video over IP | |
20. |
UNIVAC is . |
A. | Universal Automatic Computer |
B. | Universal Array Computer |
C. | Unique Automatic Computer |
D. | Unvalued Automatic Computer |
Answer» B. Universal Array Computer | |
21. |
translates and executes program at run time line by line |
A. | Compiler |
B. | Interpreter |
C. | Linker |
D. | Loader |
Answer» C. Linker | |
22. |
______________transforms one interface into another interface |
A. | Program |
B. | Software |
C. | Data |
D. | None of these |
Answer» C. Data | |
23. |
Trackball is a._______________________ |
A. | Input device |
B. | Output device |
C. | Programming language |
D. | Software |
Answer» B. Output device | |
24. |
Touch Screen is______________________ |
A. | Input device |
B. | Output device |
C. | Both a & b above |
D. | None of these |
Answer» D. None of these | |
25. |
The_______________is the amount of data that a storage device can move from the storage medium to the Computer per second |
A. | data migration rate |
B. | data digitizing rate |
C. | data transfer rate |
D. | data access rate |
Answer» D. data access rate | |
26. |
The typical computer criminal is a |
A. | a Young hacker |
B. | Trusted employee with no criminal record |
C. | Trusted employee with a long, but unknown criminal record. |
D. | Overseas young cracker. |
Answer» C. Trusted employee with a long, but unknown criminal record. | |
27. |
The Third Generation Computer was made with______________. |
A. | Vacuum Tube |
B. | Discrete Components |
C. | IC |
D. | Bio Chips |
Answer» D. Bio Chips | |
28. |
The term designates equipment that might be added to a computer system to enhance its functionality. |
A. | digital device |
B. | system add-on |
C. | disk pack |
D. | peripheral device |
Answer» E. | |
29. |
The term ‘Computer’ is derived from______________ |
A. | Latin |
B. | German |
C. | French |
D. | Arabic |
Answer» B. German | |
30. |
The task of performing operations like arithmetic and logical operations is called.________________ |
A. | Processing |
B. | Storing |
C. | Editing |
D. | Sorting |
Answer» B. Storing | |
31. |
The Second Generation Computer was based on_____________ |
A. | Vacuum Tube |
B. | Silicon Chips |
C. | Transistor |
D. | Bio Chips |
Answer» D. Bio Chips | |
32. |
The processing of an application takes place between a client and a __________processor. |
A. | Front end |
B. | Back end |
C. | Both A and B |
D. | None of these |
Answer» D. None of these | |
33. |
The process of transferring files from a computer on the Internet to your computer is called |
A. | Downloading |
B. | uploading |
C. | FTP |
D. | JPEG |
Answer» B. uploading | |
34. |
The primary function of the ________________is to set up the hardware and load and start an operating system |
A. | System Programs |
B. | BIOS |
C. | CP |
D. | Memory |
Answer» C. CP | |
35. |
The instructions that tell a computer how to carry out the processing tasks are referred to as computer.______________ |
A. | programs |
B. | processors |
C. | input devices |
D. | memory modules |
Answer» B. processors | |
36. |
The digital signals can be represented by |
A. | Binary Codes |
B. | 0 and 1 |
C. | High and Low |
D. | all of the above |
Answer» E. | |
37. |
The ________________data mining technique derives rules from real-world case examples. |
A. | Rule discover |
B. | Signal processing |
C. | Neural nets |
D. | Case- based reasoning |
Answer» D. Case- based reasoning | |
38. |
The common name for the crime of stealing passwords is; |
A. | Jacking |
B. | Identity theft |
C. | Spoofing |
D. | Hacking |
Answer» D. Hacking | |
39. |
The Analytical Engine developed during First Generation of computers used ________as a memory unit |
A. | RAM |
B. | Floppies |
C. | Cards |
D. | Counter Wheels |
Answer» E. | |
40. |
_______________represents raw facts, where-as. is data made meaningful. |
A. | Information, reporting |
B. | Data, information |
C. | Information, bits |
D. | Records, bytes |
Answer» C. Information, bits | |
41. |
refers to electronic trespassing or criminal hacking. |
A. | Cracking |
B. | Jacking |
C. | Spoofing |
D. | Smarming |
Answer» B. Jacking | |
42. |
RAM can be treated as the _______________ for the computer's processor |
A. | factory |
B. | operating room |
C. | waiting room |
D. | planning room |
Answer» D. planning room | |
43. |
provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously |
A. | Multitasking |
B. | Multithreading |
C. | Multiprocessing |
D. | Multicomputing |
Answer» B. Multithreading | |
44. |
printer is the cheapest in terms of price and operating cost |
A. | Inkjet |
B. | Laser |
C. | Thermal |
D. | Dot matrix |
Answer» E. | |
45. |
printer is a non-impact printer and is quite in working |
A. | Inkjet |
B. | Laser |
C. | Thermal |
D. | Dot matrix |
Answer» B. Laser | |
46. |
On-line real time systems become popular in_____________generation |
A. | First Generation |
B. | Second Generation |
C. | Third Generation |
D. | Fourth Generation |
Answer» D. Fourth Generation | |
47. |
Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate |
A. | CAN |
B. | LAN |
C. | DAN |
D. | WAN |
Answer» E. | |
48. |
Note book, laptop, palm, hand-held computers are coming under the category of.____________________computer |
A. | Digital computer |
B. | Mainframe computer |
C. | Portable computer |
D. | Digital computer |
Answer» D. Digital computer | |
49. |
Nortel is a company which manufactures: |
A. | Software |
B. | Processors |
C. | Cables |
D. | Network equipment |
Answer» E. | |
50. |
MOS stands for __________ |
A. | Metal Oxide Semiconductor |
B. | Most Often Store |
C. | Method Organized Stack |
D. | None of these |
Answer» B. Most Often Store | |