Explore topic-wise MCQs in Common Topics in Competitive and Entrance exams.

This section includes 182 Mcqs, each offering curated multiple-choice questions to sharpen your Common Topics in Competitive and Entrance exams knowledge and support exam preparation. Choose a topic below to get started.

1.

What is the ultimate purpose of Defragmentation?

A. Make the PC faster
B. Create More Free Space
C. Delete temporary files
D. Reduce Power consumption
E. All of these
Answer» C. Delete temporary files
2.

Firewalls are used to protect against ..

A. Unauthorized Attacks
B. Virus Attacks
C. Data Driven Attacks
D. Fire Attacks
E. All of these
Answer» B. Virus Attacks
3.

For viewing video CDs, you would use

A. CD Player
B. Windows Media Player
C. Windows Video Player
D. Windows Movie Player
E. None of these
Answer» C. Windows Video Player
4.

An example of processing device would be ..

A. a magnetic ink reader
B. a tablet PC
C. special function cards
D. scanners
E. keyboards
Answer» E. keyboards
5.

Main memory works in conjunction with .

A. special function cards
B. RAM
C. CPU
D. Intel
E. All of these
Answer» D. Intel
6.

The benefits of using computers is that ..

A. Computers are very fast and can store huge amounts of data
B. Computers provide accurate output even when input is incorrect
C. Computers are designed to be inflexible
D. All of these
E. None of these
Answer» B. Computers provide accurate output even when input is incorrect
7.

Which of the following does not affect the resolution of a video display image?

A. Bandwidth
B. Raster scan rage
C. Vertical and horizontal lines of resolution
D. Screen Size
E. None of these
Answer» B. Raster scan rage
8.

Which of the following is used for manufacturing chips?

A. Control bus
B. Control unit
C. Parity unit
D. Semiconductor
E. None of these
Answer» E. None of these
9.

Which of the following is not a transmission medium?

A. telephone lines
B. coaxial cables
C. modem
D. microwave systems
E. None of these
Answer» D. microwave systems
10.

Which of the following objects is passed to a JavaBean when one of its properties is set via a JSP action?

A. Servlet Request
B. Http Servlet Request
C. Servlet Response
D. Http Servlet Response
E. None of these
Answer» D. Http Servlet Response
11.

In the right setting a thief will steal your information by simply watching what you type.

A. snagging
B. spying
C. social engineering
D. shoulder surfing
E. None of these
Answer» E. None of these
12.

The ..of a threat measures its potential impact on a system.

A. vulnerabilities
B. countermeasures
C. degree of harm
D. susceptibility
E. None of these
Answer» D. susceptibility
13.

The OSI model is divided into processes called layers.

A. five
B. six
C. seven
D. eight
E. None of these
Answer» D. eight
14.

What is the primary difference between a virus and a worm?

A. A worm has the ability to self-propagate from an infected user s computer to other computers
B. A worm is usually written by a cracker : Script bunnies do not have the skills to develop worm program
C. A virus is very harmful to the computers it infects; a worm is not a serious a problem
D. Anti-virus software is effective in fighting viruses but not worms
E. None of these
Answer» D. Anti-virus software is effective in fighting viruses but not worms
15.

A computer program that instructs other programs to perform a particular type of operation is

A. System software
B. Application program
C. Compiler
D. Interpreter
E. None of these
Answer» B. Application program
16.

The code that relational database management systems use to perform their database task is referred to as :

A. QBE
B. SQL
C. OLAP
D. Sequel Server
E. None of these
Answer» C. OLAP
17.

Rules for exchanging data between computers are called

A. programs
B. procedures
C. protocols
D. hyperlinks
E. None of these
Answer» D. hyperlinks
18.

Data Encryption Techniques are particularly used for

A. protecting data in Data Communication System.
B. reduce Storage Space Requirement
C. enhances Data Integrity.
D. decreases Data Integrity
E. None of these
Answer» B. reduce Storage Space Requirement
19.

Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called

A. instructions
B. programs
C. commands
D. application
E. None of these
Answer» B. programs
20.

In Excel, this is a prerecorded formula that provides a shortcut for complex calculations ..

A. Value
B. Data Series
C. Function
D. Field
E. None of these
Answer» D. Field
21.

..is the part of the computer that does the arithmetical calculations.

A. Memory
B. OS
C. CPU
D. ALU
E. None of these
Answer» E. None of these
22.

What is the transfer rate of a standard USB 2.0 Device?

A. 100 Mbit/s
B. 480 Mbit/s
C. 1 Gbit/s
D. 250 Mbit/s
E. None of these
Answer» C. 1 Gbit/s
23.

The barcode which is used on all types of items is read by a scanning device directly into the computer. What is the name of this scanning device?

A. Laser Scanner
B. Wand
C. OCR
D. MICR
E. None of these
Answer» B. Wand
24.

A ..is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.

A. surge strip
B. USB
C. UPS
D. battery strip
E. None of these
Answer» D. battery strip
25.

An input device used to read text and bar codes or a device to input pictures into a computer.

A. printer
B. scanner
C. reader
D. hardware
E. None of these
Answer» C. reader
26.

A piece of hardware that is used to enter information into the computer by using keys ..

A. keyboard
B. monitor
C. hard disk
D. icon
E. None of these
Answer» B. monitor
27.

Any hardware component that allows you to enter data or instructions into a computer is called a(n) ..

A. printer
B. storage device
C. output device
D. system unit
E. input device
Answer» F.
28.

What does an electronic spreadsheet consist of?(Choose the best answer)

A. Rows
B. Columns
C. Cells
D. All of these
E. None of these
Answer» E. None of these
29.

This part of the operating system manages the essential peripherals, such as the keyboard, screen, disk drives, and parallel and serial posts

A. Basic input/output system
B. Secondary input/output system
C. Peripheral input/output system
D. Marginal input/output system
E. None of these
Answer» B. Secondary input/output system
30.

A file name has two parts ie; Primary name and Extension name, which are separated by a:

A. space
B. comma
C. dot
D. colon
E. None of these
Answer» D. colon
31.

Letters, numbers and symbols found on a keyboards are .

A. Icon
B. Screen
C. Keys
D. Menu
E. None of these
Answer» D. Menu
32.

Video processors consists of and ..which store and process images.

A. CPU and VGA
B. CPU and memory
C. VGA and memory
D. VGI and DVI
E. VGA and VGI
Answer» E. VGA and VGI
33.

Processors contain a control unit and a(n) . .

A. adapter card
B. arithmetic logic unit (ALU)
C. expansion slot
D. port
E. CD drive
Answer» C. expansion slot
34.

A memory that does not change its contents without external causes is known as

A. dynamic memory
B. static memory
C. RAM
D. EEPROM
E. None of these
Answer» C. RAM
35.

A lever used to control the movement of a cursor on a video screen is

A. keyboard
B. Joy stick
C. light pen
D. plotter
E. None of these
Answer» C. light pen
36.

When you insert a picture and adjust the height, Word automatically adjusts the .to maintain the correct proportion.

A. pixel size
B. resolution
C. screen size
D. width
E. None of these
Answer» E. None of these
37.

When creating a computer program, the designs the structure of the program

A. End user
B. System Analyst
C. Programmer
D. All of these
E. None of these
Answer» C. Programmer
38.

The piece of hardware that converts your computer s digital signal to an analog signal that can travel over telephone lines is called a .

A. red wire
B. blue cord
C. tower
D. modem
E. None of these
Answer» E. None of these
39.

Which of the following is (are) secondary memory(ies)?

A. Magnetic tape
B. Floppy disk
C. Cassette tape
D. All of these
E. None of these
Answer» E. None of these
40.

A computer system that is old and perhaps not satisfactory is referred to as a(n) _

A. Ancient system
B. Historical system
C. Age-old system
D. Legacy system
E. Legal system
Answer» E. Legal system
41.

Restarting a computer which is already running is referred to as

A. booting
B. starting
C. rebooting
D. second-starting
E. None of these
Answer» D. second-starting
42.

The facility to reduce the Taskbar to thin line when the taskbar or Start button is not in use is called as :

A. Hide
B. Disable
C. Auto Hide
D. Disappear
E. None of these
Answer» D. Disappear
43.

Each cell in Microsoft Office Excel documents is referred to by its cell address, which is the ..

A. cell s column label
B. cell s column label and worksheet tab name
C. cell s row and column labels
D. cell s row label
E. None of these
Answer» D. cell s row label
44.

System software is the set of programs that enables your computer hardware devices and ..software to work together.

A. management
B. processing
C. utility
D. application
E. None of these
Answer» E. None of these
45.

There are several security devices used to stop individuals from exploiting your system. Which of the following is used in conjunction with a firewall?

A. Proxy server
B. Intrusion-detection system
C. Terminal Server
D. Web server
E. None of these
Answer» B. Intrusion-detection system
46.

Several computers linked to a server to share programs and storage space

A. Network
B. Grouping
C. library
D. integrated system
E. None of these
Answer» B. Grouping
47.

The ..button on the quick access Toolbar allows you to cancel your recent commands or actions.

A. Search
B. Cut
C. Document
D. Undo
E. None of these
Answer» E. None of these
48.

The permanently etched program in ROM that automatically begins executing the computer s instructions is the :

A. BIOS
B. ROM
C. CMOS
D. RAM
E. None of these
Answer» B. ROM
49.

If you open a menu and then decide you don t want to select an option after all, click the many title again or press the key to close the menu.

A. Shift
B. Tab
C. F1
D. Esc
E. None of these
Answer» E. None of these
50.

You would use .software to create spreadsheets, type documents, and edit photos.

A. application
B. system
C. windows
D. designing
E. None of these
Answer» B. system