Explore topic-wise MCQs in Bachelor of Commerce (B Com).

This section includes 36 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Commerce (B Com) knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following controls the process of interaction between the user and the operating system?

A. user interface
B. language translator
C. platform
D. screen saver
Answer» B. language translator
2.

..........is a combination of hardware and software that facilitates the sharing of information between computing devices.

A. network
B. peripheral
C. expansion board
D. digital device
Answer» B. peripheral
3.

What type of resource is most likely to be a shared common resource in a computer Network?

A. printers
B. speakers
C. floppy disk drives
D. keyboards
Answer» B. speakers
4.

Note book, laptop,palm,hand-held computers are coming under the category of......... computer

A. digital computer
B. mainframe computer
C. portable computer
D. hybrid computer
Answer» D. hybrid computer
5.

Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?

A. daughter board
B. motherboard
C. father board
D. breadboard
Answer» C. father board
6.

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-

A. hacker
B. spammer
C. instant messenger
D. programmer
Answer» B. spammer
7.

Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate

A. can
B. lan
C. dan
D. wan
Answer» E.
8.

The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second

A. data migration rate
B. data digitizing rate
C. data transfer rate
D. data access rate
Answer» D. data access rate
9.

. The process of transferring files from a computer on the Internet to your computer is called

A. downloading
B. uploading
C. ftp
D. jpeg
Answer» B. uploading
10.

Which part of the computer is directly involved in executing the instructions of the computer program?

A. the scanner
B. the main storage
C. the secondary storage
D. the processor
Answer» E.
11.

The instructions that tell a computer how to carry out the processing tasks are referred to as computer.........

A. programs
B. processors
C. input devices
D. memory modules
Answer» B. processors
12.

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.
Answer» C. hacker-resistant server.
13.

The primary function of the ............ is to set up the hardware and load and start an operating system

A. system programs
B. bios
C. cp
D. memory
Answer» C. cp
14.

The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:

A. robotics
B. simulation
C. computer forensics
D. animation
Answer» D. animation
15.

A ............ is an additional set of commands that the computer displays after you make a selection from the main menu

A. dialog box
B. submenu
C. menu selection
D. all of the above
Answer» B. submenu
16.

Which of the following contains permanent data and gets updated during the processing of transactions?

A. operating system file
B. transaction file
C. software file
D. master file
Answer» E.
17.

Which of the following is NOT one of the four major data processing functions of a computer?

A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer» D. storing the data or information
18.

A computer program that converts an entire program into machine language at one time is called a/ an

A. interpreter
B. simulator
C. characters
D. compiler
Answer» E.
19.

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

A. trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer» C. time bomb.
20.

........... is the key to close a selected drop -down list; cancel a command and close a dialog box.

A. tab
B. shift
C. esc
D. f10
Answer» D. f10
21.

............... is the science that attempts to produce machines that display the same type of intelligence that humans do

A. nanoscience
B. nanotechnology
C. simulation
D. artificial intelligence (al)
Answer» E.
22.

A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is

A. bug
B. vice
C. lice
D. worm
Answer» E.
23.

Which of the following helps to protect floppy disks from data getting accidentally erased?

A. access notch
B. write-protect notch
C. entry notch
D. input notch
Answer» C. entry notch
24.

What is the name of an application program that gathers user information and sends it to someone through the Internet?

A. a virus
B. spybot
C. logic bomb
D. security patch
Answer» C. logic bomb
25.

To move a copy of file from one computer to another over a communication channel is called?

A. file transfer
B. file encryption
C. file modification
D. file copying
Answer» B. file encryption
26.

Collecting personal information and effectively posing as another individual is known as the crime of:

A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer» C. spoofing.
27.

Codes consisting of lines of varying widths or lengths that are computer-readable are known as-

A. an ascii code
B. a magnetic tape
C. an ocr scanner
D. a bar code
Answer» E.
28.

The term ............. designates equipment that might be added to a computer system to enhance its functionality.

A. digital device
B. system add-on
C. disk pack
D. peripheral device
Answer» E.
29.

Data becomes ................ when it is presented in a format that people can understand and use

A. processed
B. graphs
C. information
D. presentation
Answer» D. presentation
30.

............ Store data or information temporarily and pass it on as directed by the control unit

A. address
B. register
C. number
D. memory
Answer» C. number
31.

A computer program that translates one program instructions at a time into machine language is called a/an

A. interpreter
B. cpu
C. compiler
D. simulator
Answer» B. cpu
32.

The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as

A. cisc
B. risc
C. cd-rom
D. wi-fi
Answer» C. cd-rom
33.

.......... is computer software designed to operate the computer hardware and to provide platform for running application software

A. application software
B. system software
C. software
D. operating system
Answer» C. software
34.

............. provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously

A. multitasking
B. multithreading
C. multiprocessing
D. multicomputing
Answer» B. multithreading
35.

The difference between people with access to computers and the Internet and those without this access is known as the :

A. digital divide
B. internet divide
C. web divide
D. e-illiteracy
Answer» B. internet divide
36.

In most IBM PCs, the CPU, the device drives, memory expansion slots and active components are mounted on a single board. What is the name of this board?

A. motherboard
B. breadboard
C. daughter board
D. grandmother board
Answer» B. breadboard