Explore topic-wise MCQs in Bachelor of Computer Applications (BCA).

This section includes 68 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Computer Applications (BCA) knowledge and support exam preparation. Choose a topic below to get started.

1.

The ___________is responsible for transferring data and instructions from the external environment into the computer system

A. Output unit
B. Program control register
C. Input unit
D. Memory address register
Answer» D. Memory address register
2.

The _____________ processes the set of instructions along with any calculations and comparisons to complete the task.

A. Keyboard
B. Motherboard
C. CPU
D. Either (A) or (C)
Answer» D. Either (A) or (C)
3.

The process of recording data and information so that it can be retrieved for use whenever required.

A. Inputting
B. Processing
C. Storing
D. None of the above
Answer» C. Storing
4.

Storage and retrieval of instructions and data in a computer system is the responsibility of the __________________.

A. Memory
B. Secondary Memory
C. Primary Memory
D. Both (B) and (C)
Answer» E.
5.

A small set of high-speed registers placed inside a processor and used for storing temporary data while processing.

A. Internal Processor Memory
B. Secondary Storage Memory
C. Primary Storage Memory
D. None of the above
Answer» B. Secondary Storage Memory
6.

These types of computers are primarily involved in data processing and problem solving for specific programs.

A. Compact Computers
B. Digital computers
C. Hybrid Computers
D. Analog Computers
Answer» C. Hybrid Computers
7.

Software that resides on a single computer and does not interact with any other software installed in a different computer.

A. Stand- Alone Software
B. Embedded Software
C. Real- Time Software
D. Network Software
Answer» B. Embedded Software
8.

A type of OS that permits multiple programs to be run simultaneously by the same computer.

A. Multithreading
B. Multiuser
C. Multitasking
D. All of the above
Answer» D. All of the above
9.

A ____________is the main control program for handling all other programs in a computer.

A. MS DOS
B. API
C. OS
D. DDR4
Answer» D. DDR4
10.

_____________ was one of the most widely used systems software for IBM compatible microcomputers.

A. API
B. OS
C. MS DOS
D. None of the above
Answer» D. None of the above
11.

____________________ is a presentation tool that helps create eye-catching and effective presentations in a matter of minutes.

A. Spreadsheet
B. Word Processing
C. Bits
D. PowerPoint
Answer» E.
12.

____________________ was the first high -level language developed by John Backus at IBM in 1956.

A. FORTRAN
B. COBOL
C. BASIC
D. None of the above
Answer» B. COBOL
13.

This language was developed by Dennis Ritchie of Bell Laboratories in order to implement the operating system UNIX.

A. C
B. C++
C. Java
D. LISP
Answer» B. C++
14.

In ________ topology, each device connects to a central point through cables in a network.

A. Bus topology
B. Star topology
C. Ring topology
D. Hybrid topology
Answer» C. Ring topology
15.

_______refer to the LANs connected through high-speed, seamless inter-connection within a metropolitan area.

A. Remote LAN
B. WAN
C. MAN
D. None of the above
Answer» D. None of the above
16.

_________ is the lower part of TCP/IP whose function is to handle the address part of each packet to enable it to be delivered to the right destination.

A. IP
B. TCP
C. FTP
D. Telnet
Answer» B. TCP
17.

________is the simplest and most commonly used protocol for downloading/uploading a file from/to a server.

A. IP
B. TCP
C. FTP
D. Telnet
Answer» D. Telnet
18.

_________ is a unique number associated with each computer making it uniquely identifiable amongst all the computers connected to the Internet.

A. IP address
B. MAC address
C. Inode
D. None of the above
Answer» B. MAC address
19.

Inserting spurious data or information into an organization s system to disrupt or overload services is called

A. Interruption
B. Interception
C. Modification
D. Fabrication
Answer» E.
20.

Which of the following language processors converts a high-level language program line by line into a machine language?

A. Assembler
B. Interpreter
C. Compiler
D. None of the above
Answer» D. None of the above
21.

________ is a function in router that allows dumping of invalid packet for a specific network instead of forwarding.

A. Forwarding
B. Filtering
C. Selecting
D. None of the above
Answer» C. Selecting
22.

___________ forms the highest layer of TCP/IP and divides a message over file into smaller packets which are transmitted over the Internet.

A. TCP
B. IP
C. Telnet
D. FTP
Answer» B. IP
23.

A ________ is typically a database containing information about domain names and their correspondence IP address.

A. Telnet
B. FTP
C. TCP
D. DNS
Answer» E.
24.

The ability of the computer to handle several application programs concurrently so that the idle time of the processor is reduced is called

A. Multitasking
B. Multiprogramming
C. Batch processing
D. Time sharing
Answer» B. Multiprogramming
25.

__________ is a process of executing programs one after the other using a batch file program.

A. Multitasking
B. Multiprogramming
C. Time sharing
D. Batch processing
Answer» E.
26.

The joystick is a ____________ stick that moves the graphic cursor in the direction the stick is moved.

A. Parallel
B. Horizontal
C. Straight
D. Vertical
Answer» E.
27.

The user moves the ball with the help of the stick that can be moved _________________________, to move and position the cursor in the desired location.

A. Left
B. Right
C. Forward or Backward
D. All of the above
Answer» E.
28.

________________ devices allow input into the computer system by pressing a set of keys mounted on a board, connected to the computer system

A. Mouse
B. Keyboard
C. Pen
D. Screen
Answer» C. Pen
29.

The computer system is a dumb and a useless machine if it is not capable of communicating with the________________.

A. Outside World
B. Inside World
C. Specific Locations
D. None of the above
Answer» B. Inside World
30.

___________________ printers are the oldest print technologies still in active production.

A. Impact
B. Ink
C. Laser
D. Dot-matrix
Answer» B. Ink
31.

Scanning devices are input devices used for direct data entry from the source document into the ______________________ .

A. Keyboard
B. Screen
C. Computer System
D. None of the above
Answer» D. None of the above
32.

_______________ contact scanners make contact as they are brushed over the printed matter to be read.

A. Laser
B. Digital
C. Hand-held
D. None of the above
Answer» D. None of the above
33.

Another type of impact printer somewhat similar to the daisy-wheel is the _________ printer.

A. Line
B. Dot-matrix
C. Inkjet
D. Either (A) or (B)
Answer» B. Dot-matrix
34.

The function of _______ is to get the computer software operating when the power is turned on.

A. Bootstrap Loader
B. Cache memory
C. RAM
D. ROM
Answer» B. Cache memory
35.

In ___________stored information is erased by exposing the chip for a while to ultraviolet light.

A. EPROM
B. ROM
C. PROM
D. UVEROM
Answer» E.
36.

________________ is ideal for a task that needs a number of lists, tables, financial calculations, analysis and graphs.

A. PowerPoint
B. Word
C. VB
D. Excel
Answer» E.
37.

If the storage unit can retain the data even after the power is turned off or interrupted, it is termed as

A. Volatile storage
B. Non-volatile storage
C. Temporary storage
D. None of the above
Answer» C. Temporary storage
38.

The role of semiconductor layer is to add polysilicon layer whose electron mobility is_____________times higher than that of an amorphous silicon layer.

A. One-Third
B. 100
C. 110
D. One-Fourth
Answer» C. 110
39.

The professionals involved in the study and prediction of weather are called ____________.

A. Seer
B. Doomsayer
C. Meteorologists
D. None of the above
Answer» D. None of the above
40.

_________ stores binary information in the form of electric charges that are applied to capacitors inside the chip.

A. RAM
B. SRAM
C. DRAM
D. ROM
Answer» D. ROM
41.

Daisy-wheel printer comes in the category of output device and quite similar to ______________ .

A. Keyboards
B. Typewriters
C. Lasers
D. None of the above
Answer» C. Lasers
42.

The term __________________ is important primarily in that it distinguishes quiet printers from noisy and impact types of printers.

A. Impact
B. Non Impact
C. Force
D. None of the above
Answer» C. Force
43.

With the help of the _______________ you can capture your images and documents and convert it into digital formats for easy storage

A. Scanner
B. Web Camera
C. Camera Phone
D. Videography
Answer» B. Web Camera
44.

The storage and rapid access to electronic medical records and its instant transmission over the Internet in large amounts is called ____________________

A. Teleconsulting
B. Accumulator (AC)
C. Instruction Register (IR)
D. Program Counter (PC)
Answer» B. Accumulator (AC)
45.

Another popular _______________ arrangement, called Dvorak system, was designed for easy learning and use.

A. Key
B. Line
C. Group
D. Numeric
Answer» B. Line
46.

If there are 100 tracks on each disk surface, there are ________ cylinders in the disk pack.

A. 99
B. 101
C. 100
D. 1000
Answer» D. 1000
47.

Early computers like ENIAC, EDVAC, and UNIVAC I all can be classified as _____________.

A. Third Generation Computers
B. Second Generation Computers
C. First Generation Computers
D. None of the above
Answer» D. None of the above
48.

The primary storage also temporarily stores any intermediate result generated by the ___________.

A. The CPU
B. The motherboard
C. The hard disk drive
D. The ALU
Answer» E.
49.

________ devices are also called random-access devices because information is literally available at random or in any order.

A. Direct- access
B. Sequential-access
C. Permanent-access
D. All of the above
Answer» B. Sequential-access
50.

An __________ printer would be non-impact as they work through spraying ink or toner and fusing it to the paper.

A. Inkjet
B. Wax
C. Laser or LED
D. All of the above
Answer» E.