

MCQOPTIONS
Saved Bookmarks
This section includes 299 Mcqs, each offering curated multiple-choice questions to sharpen your 9th Class knowledge and support exam preparation. Choose a topic below to get started.
151. |
Deliberately modifying the return address on an e-mail such that it seems to be coming from anyone but not the actual sender is called ______. |
A. | Spoofing |
B. | Pharming |
C. | Spamming |
D. | Rootkit |
Answer» B. Pharming | |
152. |
A collection of websites connected with hyperlinks and that forms the part of the internet is referred as _______. |
A. | Browser |
B. | WWW |
C. | DNS |
D. | URL |
Answer» C. DNS | |
153. |
Websites that allows you to edit / modify / create / delete content are called _______________. |
A. | Homepages |
B. | Digicast |
C. | Podcasts |
D. | Blogs |
Answer» E. | |
154. |
To access the internet, the _________ connects your computer to your phone line and provide access to the network. |
A. | Operating system |
B. | Browser |
C. | Modem |
D. | Repeater |
Answer» D. Repeater | |
155. |
It was a computer worm whose primary's target were Internet server and it allowed attackers to have the same access to an infected machine as the current user. It was launched one week after 9/11 attack. Identify it. |
A. | Melissa |
B. | Code Red |
C. | Nimda |
D. | Sapphire |
Answer» D. Sapphire | |
156. |
Identify the following: - It makes changes in a disk's file system. - It creates the illusion that virus has infected every program on the disk. - When a program is run from infected disk, it causes the virus to run as well. |
A. | Cluster Virus |
B. | Trojan horse |
C. | Melissa |
D. | Morris Worm |
Answer» B. Trojan horse | |
157. |
_____ is a software used by attackers to gain administrative rights to a computer. |
A. | Root Kit |
B. | BIOS |
C. | Firmware |
D. | Adware |
Answer» B. BIOS | |
158. |
Which of the following software not only interrupts the normal working of a computer but also steals important data from it? |
A. | Antivirus software |
B. | Operating system |
C. | Antiware |
D. | Malware |
Answer» E. | |
159. |
What are the two important categories of resident virus? |
A. | Fast infectors, slow infectors |
B. | Macro infectors, micro infectors |
C. | Primary infectors, secondary infectors |
D. | File infectors, drive infectors |
Answer» B. Macro infectors, micro infectors | |
160. |
What does the following line of an HTML code will do? |
A. | Sets the visited link color to red |
B. | Sets the displayed link color to red |
C. | Sets the active link color to red |
D. | None of these |
Answer» B. Sets the displayed link color to red | |
161. |
The statement will set the_______. |
A. | Text color to blue |
B. | Color of title text to blue |
C. | Background color to blue |
D. | Link color to blue |
Answer» B. Color of title text to blue | |
162. |
The img tag is used for displaying an image in a webpage. The correct use of the img tag is __________. |
A. | <img src="imagename.format" alt="This is an image" height="45" width="45">" |
B. | </img src="imageurl.html"><alt="This is an image", height="45", width="45"/> |
C. | <image src="imagename.gif,alt="This is an image"><height="45">, <width="45"/> |
D. | <img="imagename.format" height="45", width="45"> |
Answer» B. </img src="imageurl.html"><alt="This is an image", height="45", width="45"/> | |
163. |
To convert the text 'Science Olympiad Foundation', to a hyperlink to www.sofworld.org, use _______. |
A. | <a>http://www.sofworld.org</a> |
B. | <a href="http://www.sofworld.org">Science Olympiad Foundation</a> |
C. | <a name="http://www.sofworld.org">sofworld.org</a> |
D. | <a url="http://www.sofworld.org">Science Olympiad Foundation</a> |
Answer» C. <a name="http://www.sofworld.org">sofworld.org</a> | |
164. |
If you use _______, by default the items will be displayed in bulleted form. |
A. | <bl> and </bl> |
B. | <b> and </b> |
C. | <li>and </li> |
D. | <th> and</th> |
Answer» D. <th> and</th> | |
165. |
______ attribute of tag is used to specify the background color of a table. |
A. | rel |
B. | bgcolor |
C. | tbgcolor |
D. | tablebg |
Answer» C. tbgcolor | |
166. |
The statement given below creates a name to a section "NCO". Which of the following is the CORRECT code, if you want to link the given named section in HTML?NCO |
A. | A href="#NCO">Link to NCO</A> |
B. | <href="#NCO">Link to NCO |
C. | <A href="NCO">LINK to NCO</A> |
D. | <A href="NCO"Link to NCO</A> |
Answer» B. <href="#NCO">Link to NCO | |
167. |
Which of the following is NOT a valid value of frame attribute of tag? |
A. | Void |
B. | hsides |
C. | Box |
D. | around |
Answer» E. | |
168. |
The space between a cell's border and its contents can be controlled when the _______ attribute is used. |
A. | Cellspacing |
B. | Cellpadding |
C. | Colspan |
D. | Rowspan |
Answer» C. Colspan | |
169. |
Which of the following tags can be used inside a tag? |
A. | <p> |
B. | <ul> |
C. | <ol> |
D. | All of these |
Answer» E. | |
170. |
An html table may include ______ element /elements. |
A. | <caption> |
B. | <thead> |
C. | <tbody> |
D. | All of these |
Answer» E. | |
171. |
Which of the following is/are attributes of tag? |
A. | href |
B. | name |
C. | src |
D. | Both [A] and [B] |
Answer» E. | |
172. |
You can use the ______ tags to add rows to your tables. |
A. | <td> and </td> |
B. | <cr> and </cr> |
C. | <th> and </th> |
D. | <tr> and </tr> |
Answer» E. | |
173. |
To add cells in a row of a table use______tag. |
A. | <cell> |
B. | <col> |
C. | <td> |
D. | <val> |
Answer» D. <val> | |
174. |
Consider the statement given here. Which of the parts marked by numbers (1), (2), (3) and (4) would get displayed in the webpage? |
A. | (1) |
B. | (2) |
C. | (3) |
D. | (4) |
Answer» D. (4) | |
175. |
A CMOS can maintain its configuration settings due to ______ present on motherboard. |
A. | The BIOS |
B. | The system board |
C. | The power supply |
D. | The battery |
Answer» E. | |
176. |
Which of the following statements hold (s) true about 'SDIO' card?Statement 1: It enables devices to use SD slot to support bluetooth adapters, GPS receivers, digital cameras, barcode readers, etc.Statement 2: It is DRAM based volatile memory card. |
A. | Only Statement 1 |
B. | Only Statement 2 |
C. | Both Statement 1 and Statement 2 |
D. | Neither Statement 1 nor Statement 2 |
Answer» B. Only Statement 2 | |
177. |
Which of the following hardware device is used for controlling unmanned vehicles, cranes, etc and is also called as control column? |
A. | |
B. | |
C. | |
D. | |
Answer» E. | |
178. |
ICR is one of the technologies used for collecting information from paper documents and saving it into databases. ICR is used for_____. |
A. | Printed text recognition |
B. | Marks recognition |
C. | Handwriting recognition |
D. | Business cards recognition |
Answer» D. Business cards recognition | |
179. |
AIDC refers to the methods of automatically identifying objects, collect data about them and entering that data directly into computer systems without human involvement. AIDC stands for _____. |
A. | Automatic Input by Data Capture |
B. | Automatic Identification and Data Capture |
C. | Automatic Identification by Device Computer |
D. | Automatic Identity of Data Converted |
Answer» C. Automatic Identification by Device Computer | |
180. |
Which of the following statements is CORRECT about the given device? (i) It has slower data rate than internally mounted hard drives.(ii) Its storage capacity ranges from 160 GB to 6 TB.(iii) It uses an interface called EDE. |
A. | Only (i) |
B. | Both (i) and (ii) |
C. | Both (ii) and (iii) |
D. | All (i), (ii) and (iii) |
Answer» C. Both (ii) and (iii) | |
181. |
Which of the following printer uses photocopy technology to print? |
A. | Inkjet printer |
B. | Dot matrix printer |
C. | Laser printer |
D. | All of these |
Answer» D. All of these | |
182. |
Toner is a powder used to form the printed text and images on the paper. Which of the following is an example of toner-based printer? |
A. | Inkjet printer |
B. | Thermal printer |
C. | Laser printer |
D. | Dot-matrix printer |
Answer» D. Dot-matrix printer | |
183. |
_______ is/are example(s) of utility software. |
A. | Disk Defragmenter |
B. | Antivirus Software |
C. | Backup Utility |
D. | All of these |
Answer» E. | |
184. |
______ is closely associated with computer related crimes. |
A. | Word processing software |
B. | Malicious software |
C. | Crimious software |
D. | Cruel software |
Answer» C. Crimious software | |
185. |
______ Storage technology is used to store the information on cheques and credit/debit cards. |
A. | Optical |
B. | Laser |
C. | Magnetic |
D. | None of these |
Answer» D. None of these | |
186. |
Concentric circles on the magnetic surface of the magnetic disks are known as _____. The track on the disk surface are divided into invisible segments known as ________. |
A. | Tracks, Sector |
B. | Platters, Actuator |
C. | Spots, Arms |
D. | Actuator, Spots |
Answer» B. Platters, Actuator | |
187. |
Special encoding schemes are used to ______ files using fewer bits of data than the original to reduce disk space. |
A. | Decode |
B. | Compress |
C. | Scatter |
D. | Fragment |
Answer» C. Scatter | |
188. |
Which of the following statements is CORRECT about ERP systems? |
A. | It is a business management software. |
B. | It integrates several application of a company to collect data from different activities like manufacturing, marketing, sales, etc. |
C. | It falls under the category of processor software. |
D. | Both [A] and [B] |
Answer» E. | |
189. |
Flash CS6 is an example of _____ software. |
A. | Multimedia |
B. | Utility |
C. | Presentation |
D. | Specific Purpose Application |
Answer» B. Utility | |
190. |
________ is NOT a type of internal hard drive. |
A. | IDE |
B. | SCSI |
C. | USB |
D. | EIDE |
Answer» D. EIDE | |
191. |
It is a computer bus which moves information between the internal hardware of a computer system (including the CPU and RAM) and peripheral devices. |
A. | Information Bus |
B. | Descend Bus |
C. | Ascend Bus |
D. | Expansion Bus |
Answer» E. | |
192. |
Which of the following memory can be used for firmware in automatic appliances. |
A. | ROM |
B. | PROM |
C. | EPROM |
D. | All of these |
Answer» E. | |
193. |
Your computer is showing incorrect time every time you start it. This happens even after you have set the computer time several times. What needs to be done? |
A. | The CPU needs to be replaced. |
B. | The UPS needs to be replaced. |
C. | The CMOS battery needs to be replaced. |
D. | The operating system must be reloaded. |
Answer» D. The operating system must be reloaded. | |
194. |
Identify the following. - It acts as a central nervous system for other components of computer. - It manages and coordinates entire computer system. - It obtains instructions from a program stored in main memory, interprets instructions and issues signals that cause other units of system to execute them. |
A. | ALU |
B. | Memory Register |
C. | Control Unit |
D. | ROM |
Answer» D. ROM | |
195. |
A _____ is a small but high speed storage area found in most modern CPUs. |
A. | Instruction set |
B. | Address Bus |
C. | Processor Register |
D. | Printed Circuit Board |
Answer» D. Printed Circuit Board | |
196. |
To slow in and slow out the speed of an object in an animation, use _______. |
A. | Flipping |
B. | Curving |
C. | Tweening |
D. | Easing |
Answer» E. | |
197. |
In _____ layers, you can create strokes that acts as a path for instances, groups or text to be followed. |
A. | Guide |
B. | Flip |
C. | Both [A] and [B] |
D. | None of these |
Answer» B. Flip | |
198. |
Which of the following is NOT a part of the Pen Tool flyout? |
A. | Add Anchor Point Tool |
B. | Delete Anchor Point Tool |
C. | Pin Anchor Point |
D. | Convert Anchor Point Tool |
Answer» D. Convert Anchor Point Tool | |
199. |
You can scale, rotate and change the direction of the gradient fill in an object using the _____ tool. |
A. | Gradient Transform |
B. | Gradient Fill |
C. | Polystar |
D. | Free Transform |
Answer» B. Gradient Fill | |
200. |
Which tool will you use in Flash CS6 to show "Inverse kinematics" effect? |
A. | |
B. | |
C. | |
D. | |
Answer» B. | |