Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is the largest manufacturer of Hard Disk Drives?

A. IBM
B. Seagate
C. Microsoft
D. 3M
Answer» C. Microsoft
2.

Which is a valid program to access the Internet?

A. Access
B. Front Page
C. Windows Explorer
D. Netscape
Answer» E.
3.

Through which device the main components of the computer communicate with each other?

A. Keyboard
B. System Bus
C. Monitor
D. Memory
Answer» C. Monitor
4.

Which device is used to process data?

A. CPU
B. RAM
C. DCU
D. VDU
Answer» B. RAM
5.

Which statement is valid?

A. 1 KB = 8 bytes
B. 1 MB = 8 KB
C. 1 KB = 1024 bytes
D. 1 MB = 1024 bytes
Answer» D. 1 MB = 1024 bytes
6.

Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate

A. CAN
B. LAN
C. DAN
D. WAN
Answer» E.
7.

A computer cannot 'boot' if it does not have the

A. Compiler
B. Loader
C. Operating System
D. Assembler
Answer» D. Assembler
8.

Junk e-mail is also called

A. spam
B. spoof
C. sniffer script
D. spool
Answer» B. spoof
9.

_______________represents raw facts, where-as. is data made meaningful.

A. Information, reporting
B. Data, information
C. Information, bits
D. Records, bytes
Answer» C. Information, bits
10.

What does DMA stand for?

A. Distinct Memory Access
B. Direct Memory Access
C. Direct Module Access
D. Direct Memory Allocation
Answer» C. Direct Module Access
11.

LAN stands for.________________

A. Limited Area Network
B. Logical Area Network
C. Local Area Network
D. Large Area Network
Answer» D. Large Area Network
12.

Cathode Ray Tube is a form of.____________

A. Keyboard
B. Mouse
C. Monitor
D. Mother board
Answer» D. Mother board
13.

Switching device of fifth generation computer is________________

A. Vacuum tubes
B. Transistors
C. IC
D. VLSI
Answer» E.
14.

computers operates essentially by counting

A. Portable computer
B. Hybrid computer
C. Analog computer
D. Digital computer
Answer» E.
15.

computer is small general purpose micro computer, but larger than portable computer

A. Hybrid
B. Digital
C. Desktop
D. Laptop
Answer» D. Laptop
16.

Trackball is a._______________________

A. Input device
B. Output device
C. Programming language
D. Software
Answer» B. Output device
17.

computer is a medium sized computer

A. Micro
B. Mainframec
C. Super
D. Mini
Answer» E.
18.

Light pen and joystick are____________________

A. Algorithm
B. Input devices
C. Output devices
D. Portals
Answer» C. Output devices
19.

is the measurement of things such as fingerprints and retinal scans used for security access.

A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery
Answer» B. Bio measurement
20.

Note book, laptop, palm, hand-held computers are coming under the category of.____________________computer

A. Digital computer
B. Mainframe computer
C. Portable computer
D. Digital computer
Answer» D. Digital computer
21.

computer are of large size

A. Micro
B. Mainframe
C. Super
D. Mini
Answer» C. Super
22.

What is the most common tool used to restrict access to a computer system?

A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer» C. Computer keys
23.

The scrambling of code is known as:

A. Encryption
B. a firewall
C. Scrambling
D. Password proofing.
Answer» B. a firewall
24.

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

A. Hacker-proof program
B. Firewall
C. Hacker-resistant server.
D. Encryption safe wall.
Answer» C. Hacker-resistant server.
25.

What is the name of an application program that gathers user information and sends it to someone through the Internet?

A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer» C. Logic bomb
26.

Which part of the computer is directly involved in executing the instructions of the computer program?

A. The scanner
B. The main storage
C. The secondary storage
D. The processor
Answer» E.
27.

ASCII is a coding system that provides

A. 256 different characters
B. 512 different characters
C. 1024 different characters
D. 128 different characters
Answer» D. 128 different characters
28.

To prevent the loss of data during power failures, use a(n):

A. Encryption program.
B. Surge protector
C. Firewall
D. UPS
Answer» E.
29.

printer is the cheapest in terms of price and operating cost

A. Inkjet
B. Laser
C. Thermal
D. Dot matrix
Answer» E.
30.

printer is a non-impact printer and is quite in working

A. Inkjet
B. Laser
C. Thermal
D. Dot matrix
Answer» B. Laser
31.

are high-end printers

A. Inkjet
B. Laser
C. Thermal
D. Dot matrix
Answer» C. Thermal
32.

The common name for the crime of stealing passwords is;

A. Jacking
B. Identity theft
C. Spoofing
D. Hacking
Answer» D. Hacking
33.

Collecting personal information and effectively posing as another individual is known as the crime of:

A. Spooling
B. Identity theft.
C. Spoofing
D. Hacking
Answer» C. Spoofing
34.

Malicious software is known as:

A. Badware
B. Malware
C. Maliciousware
D. Illegalware
Answer» C. Maliciousware
35.

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

A. Trojan horse
B. Virus
C. Time bomb
D. Time-related bomb sequence.
Answer» C. Time bomb
36.

is the process of dividing the disk into tracks and sectors.

A. Tracking
B. Formatting
C. Crashing
D. Allotting
Answer» C. Crashing
37.

A program that performs a useful task while simultaneously allowing destructive acts is a:

A. Worm
B. Trojan horse
C. Virus
D. Macro virus.
Answer» C. Virus
38.

The thing that eventually terminates a worm virus is a lack of:

A. Memory or disk space
B. Time
C. CD drives space
D. CD-RW.
Answer» B. Time
39.

In 1999, the Melissa virus was a widely publicised:

A. E-mail virus.
B. Macro virus
C. Trojan horse.
D. Time bomb.
Answer» B. Macro virus
40.

The process of transferring files from a computer on the Internet to your computer is called

A. Downloading
B. uploading
C. FTP
D. JPEG
Answer» B. uploading
41.

Which of the following does not store data permanently?

A. ROM
B. RAM
C. Floppy Disk
D. Hard Disk
Answer» C. Floppy Disk
42.

Help Menu is available at which button?

A. End
B. Start
C. Turnoff
D. Restart
Answer» C. Turnoff
43.

The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as

A. CISC
B. RISC
C. CD-ROM
D. Wi-Fi
Answer» C. CD-ROM
44.

Which is not a basic function of a computer?

A. Store data
B. Accept input
C. Process data
D. Copy text
Answer» E.
45.

are used to identify a user who returns to a website.

A. Cookies
B. Plug-ins
C. Scripts
D. ASPs
Answer» B. Plug-ins
46.

is the science that attempts to produce machines that display the same type of intelligence that humans do

A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (Al)
Answer» E.
47.

The ________________data mining technique derives rules from real-world case examples.

A. Rule discover
B. Signal processing
C. Neural nets
D. Case- based reasoning
Answer» D. Case- based reasoning
48.

The CPU and memory are located on the :

A. expansion board
B. motherboard
C. storage device
D. output device
Answer» C. storage device
49.

When creating a computer program, the designs the structure of the program

A. End user
B. System Analyst
C. Programmer
D. All of the above
Answer» C. Programmer
50.

Codes consisting of lines of varying widths or lengths that are computer-readable are known as-

A. an ASCII code
B. a magnetic tape
C. an OCR scanner
D. a bar code
Answer» E.