Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

The rules for exchanging data between computers are called as

A. Programs
B. Procedures
C. Protocols
D. Hyperlinks
Answer» D. Hyperlinks
2.

What is the full form of The Acronym ISDN in IT Basics?

A. Indian Standard Digital Network
B. Integrated Services Digital Network
C. Intelligent Services Digital Network
D. Integrated Services Data Network
Answer» C. Intelligent Services Digital Network
3.

An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the keyboard. ASCII is an acronym for

A. American Standard Code for Information Interchange
B. American Standard Code for Intelligent Information
C. American Standard Code for Information Integrity
D. American Standard Code for Isolated Information
Answer» B. American Standard Code for Intelligent Information
4.

The act of unauthorized copying or downloading of a program from a network and making multiple copies of it is

A. Plagiarism
B. Network piracy
C. Software piracy
D. Site-license piracy
Answer» D. Site-license piracy
5.

In basic operations of computer, process of storing takes place after

A. Inputting
B. Processing
C. Controlling
D. Access arrangement
Answer» B. Processing
6.

Sequencing manner in which all computer operations are performed is process of

A. Storing
B. Access arrangement
C. Processing
D. Controlling
Answer» E.
7.

Process of feeding instructions into computer system is called

A. Processing
B. Accessing
C. Inputting
D. Outputting
Answer» D. Outputting
8.

Process of controlling in basic operations of computer, is made after

A. Processing
B. Inputting
C. Storing
D. Outputting
Answer» E.
9.

............. is the brain of a computer.

A. Keyboard
B. Central Processing Unit
C. Monitor
D. Printer
Answer» C. Monitor
10.

The most common smart card application is ________.

A. credit card
B. atm card
C. business card
D. system card
Answer» B. atm card
11.

The space in your computer that loads and works with data

A. Cache memory
B. CPU
C. ROM memory
D. RAM memory
Answer» E.
12.

The full form of PIN in a ATM card is

A. Permanent Information Number
B. Personal Identification Number
C. Personal Index Number
D. Permanent Identification Number
Answer» C. Personal Index Number
13.

Computer uses the ................ number system to store data and perform calculations.

A. Binary
B. Octal
C. Decimal
D. Hexadecimal
Answer» B. Octal
14.

When is World Computer Literacy Day celebrated?

A. January 22nd
B. March 5th
C. May 20th
D. December 2nd
Answer» E.
15.

What is the function of Firewall?

A. Organizes the software installed in your computer
B. Does complex calculations
C. Edits complex documents
D. Monitors and controls incoming and outgoing data traffic
Answer» E.
16.

An application suitable for sequential processing is

A. Payroll processing
B. Processing of grades
C. Both Processing of grades and Payroll processing
D. All of the above
Answer» C. Both Processing of grades and Payroll processing
17.

If a quantity in device is treated as different set of separate values, device is said to be

A. digital
B. analogues
C. signals
D. computer
Answer» B. analogues
18.

Methods of paying an employee for his particular work includes

A. salary
B. hourly based rate
C. bank payments
D. both a and b
Answer» E.
19.

Servers are computers that provide resources to other computers connected to a :

A. networked
B. mainframe
C. supercomputer
D. client
Answer» C. supercomputer
20.

A program that performs a useful task while simultaneously allowing destructive acts is

A. Worm
B. Trojan horse
C. Virus
D. Macro virus
Answer» C. Virus
21.

Bit string parity depends mainly on number of

A. zero's
B. one's
C. two's
D. three's
Answer» C. two's
22.

File that contains suppliers data such as name, address and status of supplier is considered as

A. peripheral control file
B. suppliers master file
C. master control file
D. punching control file
Answer» C. master control file
23.

Office LANS, which are scattered geographically on large scale, can be connected by the use

A. CAN
B. LAN
C. DAN
D. WAN
Answer» E.
24.

When a file is saved for the first time

A. a copy is automatically printed
B. it must be given a name to identify it
C. it does not need a name
D. it only needs a name if it is not going to be printed
Answer» C. it does not need a name
25.

In a Computer, a byte generally consists of:

A. 4 bits
B. 8 bits
C. 16 bits
D. 10 bits
Answer» C. 16 bits
26.

BCD can represent only __________distinct character.

A. 24
B. 54
C. 34
D. 64
Answer» E.
27.

What do you call the programs that are used to find out possible faults and their causes?

A. Operating system extensions
B. Boot diskettes
C. Diagnostic software
D. Cookies
Answer» D. Cookies
28.

Condensing output data to exhibit specific information is

A. Calculating
B. Merging
C. Summarizing
D. Recording
Answer» D. Recording
29.

An email account includes a storage area, often called a/an

A. Attachment
B. Hyperlink
C. Mailbox
D. IP address
Answer» D. IP address
30.

Computer follows a simple principle called ‘GIGO’ which means:

A. Good Input Good Output
B. Garbage Input Good output
C. Garbage In, Garbage Out
D. Greater Instruction Great Output
Answer» D. Greater Instruction Great Output
31.

The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called:

A. robotics
B. simulation
C. computer forensics
D. animation
Answer» D. animation
32.

'credit cards' and 'bank cards' are examples of

A. inked stripe
B. coded stripe
C. magnetic stripe
D. tagged stripe
Answer» D. tagged stripe
33.

Useful processed information is produced as a report or usual in process named as

A. Controlling
B. Evaluation
C. Outputting
D. Processing
Answer» D. Processing
34.

A CPU contains

A. a card reader and a printing device
B. an analytical engine and a control unit
C. a control unit and an arithmetic logic unit
D. an arithmetic logic unit and a card reader
Answer» D. an arithmetic logic unit and a card reader
35.

The best products to sell in B2C e-commerce are

A. Fresh products
B. Digital products
C. Small products
D. Specialty products
Answer» C. Small products
36.

If (y)x represents a number y in base x, then which of the following numbers is smallest of all ?

A. (1111)2
B. (1111)8
C. (1111)10
D. (1111)16
Answer» B. (1111)8
37.

A characteristic of card systems is:

A. Needing a larger DP staff
B. Using cards as records of transactions
C. Slowness in processing data
D. All of the above
Answer» E.
38.

When you are working on a document on PC, where is the document temporarily stored?

A. RAM
B. ROM
C. CPU
D. Flash Memory
Answer» B. ROM
39.

The term ‘Computer’ is derived from……….

A. Latin
B. German
C. French
D. Arabic
Answer» B. German
40.

Who is the father of Computer science?

A. Allen Turing
B. Charles Babbage
C. Simur Cray
D. Augusta Adaming
Answer» B. Charles Babbage
41.

Which of the following methods of channelisation are used for mobile data internet working?

A. Frequency Division Multiple Access
B. Code Division Multiple Access
C. Time Division Multiple Acces
D. All of the above
Answer» E.
42.

VAN refers to ……………….

A. Virtual Analog Network
B. Value Added Network
C. Variable Address Network
D. Virtual Additional Network
Answer» C. Variable Address Network
43.

Which of the following refers to loading two or more programs in the computer main memory and executing them concurrently?

A. Multitasking
B. Multiprogramming
C. Time sharing
D. Batch processing
Answer» C. Time sharing
44.

Which of the following are the applications of mobile computing?

A. For legal purposes
B. Location awareness services
C. Travelling salesman
D. All of the above
Answer» E.
45.

Who is the father of personal computer?

A. Edward Robert
B. Allen Turing
C. Charles Babbage
D. None of these
Answer» B. Allen Turing
46.

Actual equipment of computer system that can be touched are

A. hardware
B. software
C. applications
D. bugs
Answer» B. software
47.

Extra digit used to detect error and ensures that number is changed by mistake is classified as

A. check digit
B. extra digit
C. mistake digit
D. parity digits
Answer» B. extra digit
48.

Method used to store integers is classified as

A. sign and magnitude method
B. twos complement method
C. ones complement method
D. threes complement method
Answer» C. ones complement method
49.

Person who keeps disc and tape files up to date for computer installation is called

A. file librarian
B. punch librarian
C. peripheral librarian
D. terminal librarian
Answer» B. punch librarian
50.

A device that connects to a network without the use of cables is said to be-

A. Distributed
B. free
C. centralized
D. none of these
Answer» E.