Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

BIOS stands for

A. Basic Input Output system
B. Binary Input output system
C. Basic Input Off system
D. all the above
Answer» B. Binary Input output system
2.

Which of the following is a type of network?

A. Ring
B. Bus
C. Star
D. PAN
Answer» E.
3.

Which type of network would use phone lines ?

A. WAN
B. LAN
C. WWAN
D. Wireless
Answer» B. LAN
4.

…………….are used to identify a user who returns to a Website.

A. Cookies
B. Plug-ins
C. Scripts
D. ASPs
Answer» B. Plug-ins
5.

To move a copy of file from one computer to another over a communication channel is called?

A. File transfer
B. File encryption
C. File modification
D. File copying
Answer» B. File encryption
6.

Person who amends and produces computer program is considered as

A. processor
B. programmers
C. managers
D. analysts
Answer» C. managers
7.

Which is the most valuable electronic commerce to the individual customer in long run?

A. Business to Business
B. Customer to Customer
C. Business to Customer
D. None of the above
Answer» B. Customer to Customer
8.

Which of the following code is used in present day computing was developed by IBM corporation?

A. Baudot code
B. EBCDIC code
C. ASCII
D. Hollerith Code
Answer» C. ASCII
9.

A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a-

A. Hacker
B. spammer
C. instant messenger
D. programmer
Answer» B. spammer
10.

Where does most data go first with in a computer memory hierarchy ?

A. RAM
B. ROM
C. BIOS
D. CACHE
Answer» B. ROM
11.

The trend to outsource IT functions to other countries is termed

A. Outer outsourcing
B. Offshore outsourcing
C. Foreign outsourcing
D. External outsourcing
Answer» C. Foreign outsourcing
12.

Completeness and accuracy of data is called its

A. management
B. execution
C. writing
D. integrity
Answer» E.
13.

What is it called when IT specialists within your organization develop the systems?

A. Insourcing
B. Selfsourcing
C. Outsourcing
D. All of the above
Answer» B. Selfsourcing
14.

Order filling activity in the physical system is triggered by the

A. Manufacturing information system
B. Order entry subsystem
C. Account receivable subsystem
D. Billing subsystem
Answer» E.
15.

Coded entries which are used to gain access to a computer system are called …………..

A. Entry codes
B. Passwords
C. security commands
D. code words
Answer» C. security commands
16.

The typical computer criminal is a(n):

A. Young hacker.
B. Trusted employee with no criminal record.
C. Trusted employee with a long, but unknown criminal record.
D. Overseas young cracker.
Answer» C. Trusted employee with a long, but unknown criminal record.
17.

Fields may includes

A. fixed length
B. variable length
C. item length
D. both a and b
Answer» E.
18.

SMPS stands for

A. Switched mode Power Supply
B. Start mode power supply
C. Store mode power supply
D. Single mode power supply
Answer» B. Start mode power supply
19.

Octal number system has a base …………….

A. 2
B. 4
C. 6
D. 8
Answer» E.
20.

A program for viewing web pages is called …………..

A. Word processor
B. Spreadsheet
C. Protocol
D. browser
Answer» E.
21.

The benefit of using computers is that …………….

A. Computers are very fast and can store huge amounts of data
B. Computers provide accurate output even when input is incorrect
C. Computers are designed to be inflexible
D. All of the above
Answer» B. Computers provide accurate output even when input is incorrect
22.

Unwanted repetitious messages, such as unsolicited bulk e-mail is known as

A. Spam
B. Trash
C. Calibri
D. Courier
Answer» B. Trash
23.

LAN stands for……………

A. Limited Area Network
B. Logical Area Network
C. Local Area Network
D. Large Area Network
Answer» D. Large Area Network
24.

The patterns of printed lines on most products are called …………….

A. prices
B. barcodes
C. scanners
D. None of these
Answer» C. scanners
25.

—— refers to electronic trespassing or criminal hacking.

A. Cracking
B. Jacking
C. Spoofing
D. Smarming
Answer» B. Jacking
26.

Cursor is a ____

A. Pixel
B. Pointing device
C. Thin blinking line
D. None of the above
Answer» D. None of the above
27.

NOS stands for

A. Node operating system
B. Non-open software
C. Network Operating system
D. Non-operating software
Answer» D. Non-operating software
28.

Which of the following refers to a small local network?

A. LAN
B. WAN
C. MAN
D. SLN
Answer» B. WAN
29.

Numbers which are not stored, it becomes

A. truncated
B. rounded
C. lost
D. permanently stored
Answer» B. rounded
30.

Personnel who design, program, operate and maintain computer equipment refers to

A. Console-operator
B. Programmer
C. System Analyst
D. Peopleware
Answer» E.
31.

Which of the following are credit based systems?

A. MasterCard Secure Code
B. Verified By Visa
C. Secure Electronic Transaction
D. All of the above
Answer» E.
32.

To prevent the loss of data during power failures, use a(n):

A. Encryption program
B. Surge protector
C. Firewall
D. UPS
Answer» E.
33.

Which of the following is a network topology ?

A. LAN
B. WAN
C. MAN
D. BUS
Answer» E.
34.

File which is created to carry out processing of data is classified as

A. master file
B. transaction file
C. particular file
D. reference file
Answer» C. particular file
35.

Firewalls are used to protect a communication network system against

A. Unauthorized attacks
B. Virus attacks
C. Data-driven attacks
D. Fire-attacks
Answer» B. Virus attacks
36.

Sales figures in the market forecast file are updated by the

A. Market research procedure
B. Sales forecasting
C. Sales analysis procedures
D. All of the above
Answer» D. All of the above
37.

GPS is a system that helps in locating positions with the help of :

A. Microwaves
B. Satellites
C. Police intelligence
D. Wireless communication
Answer» C. Police intelligence
38.

'OS' in computer system means ?

A. Open System
B. Open Software
C. Operating System
D. All of these
Answer» D. All of these
39.

Which number system is commonly used as a shortcut notation for groups of four binary digits?

A. Binary
B. Decimal
C. Octal
D. Hexadecimal
Answer» E.
40.

The process of starting a or restarting a computer system by loading instructions from a secondarystorage device into the computer memory is called

A. Duping
B. Padding
C. CPS
D. Booting
Answer» E.
41.

Group of related data items that can be treated together as a unit is classified as

A. row
B. column
C. record
D. file
Answer» D. file
42.

What are plastic cards the size of a credit card that contains an embedded chip on which digitalinformation can be stored?

A. FEDI cards
B. Smart cards
C. Customer relationship management systems cards
D. E-government identity cards
Answer» C. Customer relationship management systems cards
43.

A computer program designed to perform group of coordinated functions, tasks, or activities for benefit of user is termed as

A. computer application
B. control application
C. punching application
D. peripheral application
Answer» B. control application
44.

The device used to carry digital data on analogue lines is called as

A. Modem
B. Multiplexer
C. Modulator
D. Demodulator
Answer» B. Multiplexer
45.

Who is the inventor of “Difference Engine”?

A. Allen Turing
B. Charles Babbage
C. Simur Cray
D. Augusta Adaming
Answer» C. Simur Cray
46.

Numbers that are written with base 16 are classified as

A. whole numbers
B. hexadecimal
C. exponential integers
D. mantissa
Answer» C. exponential integers
47.

Which are the major levels of convergence?

A. Technologies
B. Industries
C. Both Technologies and Industries
D. None of the above
Answer» D. None of the above
48.

When computer program attempts an impossible operation, it results in

A. overflow
B. loss of accuracy
C. message flow
D. both b and c
Answer» D. both b and c
49.

Response to messages, verification of keyed data, keeping record of data and keying in contents are duties of

A. terminal operator
B. punch operator
C. peripheral operator
D. terminating operator
Answer» C. peripheral operator
50.

File used to update information in computer's master file is classified as

A. transaction file
B. direct file
C. order file
D. sequence file
Answer» B. direct file