

MCQOPTIONS
Saved Bookmarks
This section includes 36 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Commerce (B Com) knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following controls the process of interaction between the user and the operating system? |
A. | user interface |
B. | language translator |
C. | platform |
D. | screen saver |
Answer» B. language translator | |
2. |
..........is a combination of hardware and software that facilitates the sharing of information between computing devices. |
A. | network |
B. | peripheral |
C. | expansion board |
D. | digital device |
Answer» B. peripheral | |
3. |
What type of resource is most likely to be a shared common resource in a computer Network? |
A. | printers |
B. | speakers |
C. | floppy disk drives |
D. | keyboards |
Answer» B. speakers | |
4. |
Note book, laptop,palm,hand-held computers are coming under the category of......... computer |
A. | digital computer |
B. | mainframe computer |
C. | portable computer |
D. | hybrid computer |
Answer» D. hybrid computer | |
5. |
Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards? |
A. | daughter board |
B. | motherboard |
C. | father board |
D. | breadboard |
Answer» C. father board | |
6. |
A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a- |
A. | hacker |
B. | spammer |
C. | instant messenger |
D. | programmer |
Answer» B. spammer | |
7. |
Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate |
A. | can |
B. | lan |
C. | dan |
D. | wan |
Answer» E. | |
8. |
The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second |
A. | data migration rate |
B. | data digitizing rate |
C. | data transfer rate |
D. | data access rate |
Answer» D. data access rate | |
9. |
. The process of transferring files from a computer on the Internet to your computer is called |
A. | downloading |
B. | uploading |
C. | ftp |
D. | jpeg |
Answer» B. uploading | |
10. |
Which part of the computer is directly involved in executing the instructions of the computer program? |
A. | the scanner |
B. | the main storage |
C. | the secondary storage |
D. | the processor |
Answer» E. | |
11. |
The instructions that tell a computer how to carry out the processing tasks are referred to as computer......... |
A. | programs |
B. | processors |
C. | input devices |
D. | memory modules |
Answer» B. processors | |
12. |
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n): |
A. | hacker-proof program. |
B. | firewall. |
C. | hacker-resistant server. |
D. | encryption safe wall. |
Answer» C. hacker-resistant server. | |
13. |
The primary function of the ............ is to set up the hardware and load and start an operating system |
A. | system programs |
B. | bios |
C. | cp |
D. | memory |
Answer» C. cp | |
14. |
The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called: |
A. | robotics |
B. | simulation |
C. | computer forensics |
D. | animation |
Answer» D. animation | |
15. |
A ............ is an additional set of commands that the computer displays after you make a selection from the main menu |
A. | dialog box |
B. | submenu |
C. | menu selection |
D. | all of the above |
Answer» B. submenu | |
16. |
Which of the following contains permanent data and gets updated during the processing of transactions? |
A. | operating system file |
B. | transaction file |
C. | software file |
D. | master file |
Answer» E. | |
17. |
Which of the following is NOT one of the four major data processing functions of a computer? |
A. | gathering data |
B. | processing data into information |
C. | analyzing the data or information |
D. | storing the data or information |
Answer» D. storing the data or information | |
18. |
A computer program that converts an entire program into machine language at one time is called a/ an |
A. | interpreter |
B. | simulator |
C. | characters |
D. | compiler |
Answer» E. | |
19. |
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a: |
A. | trojan horse. |
B. | virus. |
C. | time bomb. |
D. | time-related bomb sequence. |
Answer» C. time bomb. | |
20. |
........... is the key to close a selected drop -down list; cancel a command and close a dialog box. |
A. | tab |
B. | shift |
C. | esc |
D. | f10 |
Answer» D. f10 | |
21. |
............... is the science that attempts to produce machines that display the same type of intelligence that humans do |
A. | nanoscience |
B. | nanotechnology |
C. | simulation |
D. | artificial intelligence (al) |
Answer» E. | |
22. |
A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is |
A. | bug |
B. | vice |
C. | lice |
D. | worm |
Answer» E. | |
23. |
Which of the following helps to protect floppy disks from data getting accidentally erased? |
A. | access notch |
B. | write-protect notch |
C. | entry notch |
D. | input notch |
Answer» C. entry notch | |
24. |
What is the name of an application program that gathers user information and sends it to someone through the Internet? |
A. | a virus |
B. | spybot |
C. | logic bomb |
D. | security patch |
Answer» C. logic bomb | |
25. |
To move a copy of file from one computer to another over a communication channel is called? |
A. | file transfer |
B. | file encryption |
C. | file modification |
D. | file copying |
Answer» B. file encryption | |
26. |
Collecting personal information and effectively posing as another individual is known as the crime of: |
A. | spooling. |
B. | identity theft. |
C. | spoofing. |
D. | hacking. |
Answer» C. spoofing. | |
27. |
Codes consisting of lines of varying widths or lengths that are computer-readable are known as- |
A. | an ascii code |
B. | a magnetic tape |
C. | an ocr scanner |
D. | a bar code |
Answer» E. | |
28. |
The term ............. designates equipment that might be added to a computer system to enhance its functionality. |
A. | digital device |
B. | system add-on |
C. | disk pack |
D. | peripheral device |
Answer» E. | |
29. |
Data becomes ................ when it is presented in a format that people can understand and use |
A. | processed |
B. | graphs |
C. | information |
D. | presentation |
Answer» D. presentation | |
30. |
............ Store data or information temporarily and pass it on as directed by the control unit |
A. | address |
B. | register |
C. | number |
D. | memory |
Answer» C. number | |
31. |
A computer program that translates one program instructions at a time into machine language is called a/an |
A. | interpreter |
B. | cpu |
C. | compiler |
D. | simulator |
Answer» B. cpu | |
32. |
The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as |
A. | cisc |
B. | risc |
C. | cd-rom |
D. | wi-fi |
Answer» C. cd-rom | |
33. |
.......... is computer software designed to operate the computer hardware and to provide platform for running application software |
A. | application software |
B. | system software |
C. | software |
D. | operating system |
Answer» C. software | |
34. |
............. provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously |
A. | multitasking |
B. | multithreading |
C. | multiprocessing |
D. | multicomputing |
Answer» B. multithreading | |
35. |
The difference between people with access to computers and the Internet and those without this access is known as the : |
A. | digital divide |
B. | internet divide |
C. | web divide |
D. | e-illiteracy |
Answer» B. internet divide | |
36. |
In most IBM PCs, the CPU, the device drives, memory expansion slots and active components are mounted on a single board. What is the name of this board? |
A. | motherboard |
B. | breadboard |
C. | daughter board |
D. | grandmother board |
Answer» B. breadboard | |