MCQOPTIONS
Saved Bookmarks
This section includes 192 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What kind of memory is both static and non -volatile? |
| A. | ram |
| B. | rom |
| C. | bios |
| D. | cache |
| Answer» C. bios | |
| 2. |
RAM can be treated as the ......... for the computer's processor |
| A. | factory |
| B. | operating room |
| C. | waiting room |
| D. | planning room |
| Answer» D. planning room | |
| 3. |
…………….are used to identify a user who returns to a Website |
| A. | cookies |
| B. | plug-ins |
| C. | scripts |
| D. | asps |
| Answer» B. plug-ins | |
| 4. |
---------- computer is small general purpose micro computer, but larger than portablecomputer |
| A. | hybrid |
| B. | digital |
| C. | desktop |
| D. | laptop |
| Answer» D. laptop | |
| 5. |
.......... is the key we use to run the selected command. |
| A. | shift |
| B. | tab |
| C. | enter |
| D. | ctrl |
| Answer» D. ctrl | |
| 6. |
............. computer is a medium sized computer |
| A. | micro |
| B. | mainframe |
| C. | super |
| D. | mini |
| Answer» E. | |
| 7. |
The term ‘Computer’ is derived from.......... |
| A. | latin |
| B. | german |
| C. | french |
| D. | arabic |
| Answer» B. german | |
| 8. |
The computer abbreviation KB usually means |
| A. | key block |
| B. | kernel boot |
| C. | kilo byte |
| D. | kit bit |
| Answer» D. kit bit | |
| 9. |
is an OOP principle |
| A. | structured programming |
| B. | procedural programming |
| C. | inheritance |
| D. | linking |
| Answer» D. linking | |
| 10. |
Office LANS, which are scattered geographically on large scale, can be connected by the useof corporate |
| A. | can |
| B. | lan |
| C. | dan |
| D. | wan |
| Answer» E. | |
| 11. |
The instructions that tell a computer how to carry out the processing tasks are referredto as computer......... |
| A. | programs |
| B. | processors |
| C. | input devices |
| D. | memory modules |
| Answer» B. processors | |
| 12. |
LAN stands for............... |
| A. | limited area network |
| B. | logical area network |
| C. | local area network |
| D. | large area network |
| Answer» D. large area network | |
| 13. |
.......... are high-end printers |
| A. | inkjet |
| B. | laser |
| C. | thermal |
| D. | dot matrix |
| Answer» C. thermal | |
| 14. |
---------- computers operates essentially by counting |
| A. | portable computer |
| B. | hybrid computer |
| C. | analog computer |
| D. | digital computer |
| Answer» E. | |
| 15. |
A person who used his or her expertise to gain access to other people's computers to getinformation illegally or do damage is a- |
| A. | hacker |
| B. | spammer |
| C. | instant messenger |
| D. | programmer |
| Answer» B. spammer | |
| 16. |
..........is a combination of hardware and software that facilitates the sharing of informationbetween computing devices. |
| A. | network |
| B. | peripheral |
| C. | expansion board |
| D. | digital device |
| Answer» B. peripheral | |
| 17. |
Which of the following is/ are operating systems |
| A. | windows |
| B. | unix |
| C. | os/2 |
| D. | all of these |
| Answer» E. | |
| 18. |
------ refers to electronic trespassing or criminal hacking. |
| A. | cracking |
| B. | jacking |
| C. | spoofing |
| D. | smarming |
| Answer» B. jacking | |
| 19. |
Light pen and joystick are............ |
| A. | algorithm |
| B. | input devices |
| C. | output devices |
| D. | portals |
| Answer» C. output devices | |
| 20. |
The first computers were programmed using |
| A. | assembly language |
| B. | machine language |
| C. | source code |
| D. | object code |
| Answer» C. source code | |
| 21. |
. The process of transferring files from a computer on the Internet to your computer iscalled |
| A. | downloading |
| B. | uploading |
| C. | ftp |
| D. | jpeg |
| Answer» B. uploading | |
| 22. |
RAM is also called as |
| A. | read / write memory |
| B. | long memory |
| C. | permanent memory |
| D. | primary memory |
| Answer» B. long memory | |
| 23. |
Which of the following is not anti- viruses’ software? |
| A. | nav |
| B. | f-prot |
| C. | oracle |
| D. | mcafee |
| Answer» D. mcafee | |
| 24. |
To access properties of an object, the mouse technique to use is- |
| A. | dragging |
| B. | dropping |
| C. | right-clicking |
| D. | shift-clicking |
| Answer» D. shift-clicking | |
| 25. |
The technology that stores only the essential instructions on a microprocessor chip andthus enhances its speed is referred to as |
| A. | cisc |
| B. | risc |
| C. | cd-rom |
| D. | wi-fi |
| Answer» C. cd-rom | |
| 26. |
. ..................... Is the appearance of typed characters? |
| A. | size |
| B. | format |
| C. | point |
| D. | colour |
| Answer» C. point | |
| 27. |
. ............... represents raw facts, where-as................. is data made meaningful. |
| A. | information, reporting |
| B. | data, information |
| C. | information, bits |
| D. | records, bytes |
| Answer» C. information, bits | |
| 28. |
Snowbol is an/a--------- |
| A. | operating system |
| B. | hll |
| C. | software |
| D. | search engine |
| Answer» C. software | |
| 29. |
Trackball is a........... |
| A. | input device |
| B. | output device |
| C. | programming language |
| D. | software |
| Answer» B. output device | |
| 30. |
On-line real time systems become popular in ........... generation |
| A. | first generation |
| B. | second generation |
| C. | third generation |
| D. | fourth generation |
| Answer» D. fourth generation | |
| 31. |
To move a copy of file from one computer to another over a communication channel iscalled? |
| A. | file transfer |
| B. | file encryption |
| C. | file modification |
| D. | file copying |
| Answer» B. file encryption | |
| 32. |
Personal computers use a number of chips mounted on a main circuit board. What is thecommon name for such boards? |
| A. | daughter board |
| B. | motherboard |
| C. | father board |
| D. | breadboard |
| Answer» C. father board | |
| 33. |
You use a(n) ....., such as a keyboard or mouse, to input information |
| A. | output device |
| B. | input device |
| C. | storage device |
| D. | processing device |
| Answer» C. storage device | |
| 34. |
......... are used for plotting graphs and design on papers |
| A. | trackball |
| B. | joystick |
| C. | light pen |
| D. | plotters |
| Answer» E. | |
| 35. |
Which of the following does not store data permanently? |
| A. | rom |
| B. | ram |
| C. | floppy disk |
| D. | hard disk |
| Answer» C. floppy disk | |
| 36. |
------Is defined as any crime completed through the use of computer technology. |
| A. | computer forensics |
| B. | computer crime |
| C. | hacking |
| D. | cracking |
| Answer» C. hacking | |
| 37. |
.......... printer is a non-impact printer and is quite in working |
| A. | inkjet |
| B. | laser |
| C. | thermal |
| D. | dot matrix |
| Answer» B. laser | |
| 38. |
. .......... is the process of dividing the disk into tracks and sectors. |
| A. | tracking |
| B. | formatting |
| C. | crashing |
| D. | allotting |
| Answer» C. crashing | |
| 39. |
A ............ is an additional set of commands that the computer displays after you make aselection from the main menu |
| A. | dialog box |
| B. | submenu |
| C. | menu selection |
| D. | all of the above |
| Answer» B. submenu | |
| 40. |
A DVD is an example of a (n)- |
| A. | hard disk |
| B. | optical disc |
| C. | output device |
| D. | solid-state storage device |
| Answer» C. output device | |
| 41. |
A computer program that converts an entire program into machine language at one timeis called a/ an |
| A. | interpreter |
| B. | simulator |
| C. | characters |
| D. | compiler |
| Answer» D. compiler | |
| 42. |
COBOL is an acronym for............. |
| A. | common business oriented language |
| B. | computer business oriented language |
| C. | common business operated language |
| D. | common business organized language |
| Answer» B. computer business oriented language | |
| 43. |
Daisy wheel, Drum, chain etc are the ............. |
| A. | flow chart |
| B. | mouse |
| C. | key board |
| D. | printers |
| Answer» E. | |
| 44. |
Junk e-mail is also called |
| A. | spam |
| B. | spoof |
| C. | sniffer script |
| D. | spool |
| Answer» B. spoof | |
| 45. |
The first electronic computer was developed by |
| A. | j.v. attansoff |
| B. | bill gates |
| C. | simur cray |
| D. | winton serf |
| Answer» B. bill gates | |
| 46. |
The ability to recover and read deleted or damaged files from a criminal's computer isan example of a law enforcement speciality called: |
| A. | robotics |
| B. | simulation |
| C. | computer forensics |
| D. | animation |
| Answer» D. animation | |
| 47. |
Who is the chief of Microsoft |
| A. | babbage |
| B. | bill gates |
| C. | bill clinton |
| D. | none of these |
| Answer» C. bill clinton | |
| 48. |
What is embedded system? |
| A. | the programme which arrives by being wrapped in box. |
| B. | the programme which is the permanent part of the computer |
| C. | the computer which is the part of a big computer |
| D. | the computer and software system that control the machine |
| Answer» E. | |
| 49. |
Which of the following is the smallest storage? |
| A. | megabyte |
| B. | gigabyte |
| C. | terabyte |
| D. | none of these |
| Answer» E. | |
| 50. |
Which part of the computer is directly involved in executing the instructions of thecomputer program? |
| A. | the scanner |
| B. | the main storage |
| C. | the secondary storage |
| D. | the processor |
| Answer» E. | |