Explore topic-wise MCQs in Computer.

This section includes 233 Mcqs, each offering curated multiple-choice questions to sharpen your Computer knowledge and support exam preparation. Choose a topic below to get started.

101.

Both the ALU and Control Section have special purpose storage locations called :

A. Registers
B. Accumulators
C. Bus
D. Address
Answer» B. Accumulators
102.

Which of the following is in the ascending order of Data hierarchy?

A. Byte Bit File Record Database Field
B. Field Byte Bit Record File Database
C. Bit Byte Record Field Database File
D. Bit Byte Field Record File Database
Answer» E.
103.

The term ODBC stands for:

A. Object Database Communication.
B. Open Database Communication.
C. Open Database Connectivity.
D. Object Database Connectivity.
Answer» D. Object Database Connectivity.
104.

_______ is a type of computing that performs computation, storage and even applications as a service across a network.

A. Cloud Computing
B. Distributed Computing
C. Parallel Computing
D. Virtual Computing
Answer» B. Distributed Computing
105.

The two specific heats of gases are related by :

A. Cp + Cv = RJ
B. Cp Cv = R/J
C. Cp Cv = RJ
D. Cp /Cv = R
Answer» C. Cp Cv = RJ
106.

Telnet is a :

A. browser
B. protocol
C. gateway
D. search engine
Answer» C. gateway
107.

In a Database Management System (DBMS), the content and the location of the data is defined by the ____.

A. Multi-Dimensional data
B. Sequence data
C. Metadata
D. Sub data
Answer» D. Sub data
108.

The rate at which scanning is repeated in a CRT is called :

A. refresh rate
B. resolution
C. pitch
D. bandwidth
Answer» B. resolution
109.

What is the speciality of WINDOWS NT?

A. supports real-time processing
B. supports LAN and WAN
C. supports Batch processing
D. supports multiprocessing
Answer» E.
110.

When does a Page fault occur?

A. There is an error in a specific page
B. A program accesses a page not currently in main memory
C. A program accesses a page of main memory
D. A program accesses a page belonging to another program
Answer» C. A program accesses a page of main memory
111.

After PROM is programmed, we can only ____ the information.

A. read
B. write
C. read and write
D. remove
Answer» B. write
112.

A Floppy Disc can store _____ data.

A. 1.44 bytes
B. 1.44 MB
C. 1.44 KB
D. 1.44 GB
Answer» C. 1.44 KB
113.

In IT the technique that is used to increase the bandwidth is

A. Memory Management
B. Memory Interleaving
C. Memory Interleaving
D. Memory Leaving
Answer» C. Memory Interleaving
114.

The term API refers to

A. Application Program Interface
B. Application Program Interaction
C. Applied Program Interaction
D. Application Process Interface
Answer» B. Application Program Interaction
115.

The term URL used in Internet technology stands for :

A. Uniform Resource Locator
B. Unique Resource Locator
C. Uniform Remote Locator
D. Unique Remote Locator
Answer» B. Unique Resource Locator
116.

Which one of the following is odd?

A. IMAP
B. POP
C. SNMP
D. SMTP
Answer» D. SMTP
117.

Which of the following is the operation executed on data stored in registers?

A. Bit operations
B. Macro operation
C. Micro operation
D. Byte operation
Answer» D. Byte operation
118.

The act of writing new data into register

A. is possible only when the register is an accumulator
B. is possible only when the register is an accumulator or instruction register
C. erases the previous contents of the register
D. is non-destructive to existing contents
Answer» C. erases the previous contents of the register
119.

USB is _____ type of storage device.

A. Auxillary
B. Primary
C. Secondary
D. Tertiary
Answer» D. Tertiary
120.

_______ allows users to access accounts and pay bills

A. Distance Learning
B. Online Banking
C. E-Commerce
D. Multimedia
Answer» D. Multimedia
121.

A Bit refers to

A. Binary informatics
B. Bilingual information
C. Binary terminator
D. Binary digit
Answer» E.
122.

Alta Vista is a

A. Programme
B. Software
C. Browser
D. Search Engine
Answer» E.
123.

All forms of ROM are also known as _____.

A. Freeware
B. Middleware
C. Firmware
D. Shareware
Answer» D. Shareware
124.

Virus in a computer is a

A. Chemical that attacks silicon
B. Micro-organism that disturbs integrated circuits
C. Programme that damages the computer software
D. None of the above
Answer» D. None of the above
125.

In IT, the technique of delaying outgoing acknowledgements temporarily is known as

A. AR Acknowledgement
B. AR request
C. Piggybacking
D. Piggyframing
Answer» D. Piggyframing
126.

The Simplest CPU scheduling algorithm is ______.

A. SJF scheduling algorithm
B. Round-robin scheduling algorithm
C. Multilevel scheduling algorithm
D. FCFS scheduling algorithm
Answer» E.
127.

Constantly running system program processes are known as

A. Daemons
B. Processes
C. Process Block
D. Process Control Block
Answer» B. Processes
128.

Which type of switching is used in Internet?

A. Circuit
B. Telephone
C. Packet
D. Telex
Answer» D. Telex
129.

Breaking physical memory into fixed-sized blocks called as:

A. Packets
B. Page
C. Frames
D. Segments
Answer» D. Segments
130.

Network of a series of vertical and horizontal lines constructed perpendicular to each other is known as:

A. Grid system
B. Latitudes
C. Geographic coordinates
D. Longitude
Answer» B. Latitudes
131.

What are the signals that inform the operating system that some activity has taken place, called?

A. Informers
B. Interrupts
C. Events
D. Handlers
Answer» E.
132.

Which of the following is an example of a database manager?

A. Organizer
B. Paradox
C. Quattro Pro
D. Corel Draw
Answer» B. Paradox
133.

Cache memory works on the principle of __________ .

A. Locality of data
B. Locality of reference
C. Locality of Memory
D. Locality of Memory & reference
Answer» C. Locality of Memory
134.

What is the process of defining tables called?

A. Data definition
B. Data Normalisation
C. Index definition
D. Data administration
Answer» D. Data administration
135.

Small and cheap computers built into several home appliances are of which type?

A. Mainframes
B. Minicomputers
C. Microcomputers
D. None of the above
Answer» D. None of the above
136.

In operating system, Round Robin Scheduling means :

A. A kind of scheduling
B. Repetition policy
C. A memory allocation policy
D. A process allocation policy
Answer» B. Repetition policy
137.

______ involves traversing the entire file system, marking everything that can be accessed.

A. Index pointer
B. Garbage collection
C. File system
D. Stack Pointer
Answer» C. File system
138.

FORTRAN is called :

A. Formula Translator
B. Format Translator
C. File Translator
D. Floppy Translator
Answer» B. Format Translator
139.

DOS is a

A. Direct Operating System
B. Dual Operating System
C. Disk Operating System
D. Dial-up Operating System
Answer» D. Dial-up Operating System
140.

The process of arranging data in logical sequence is called

A. Classifying
B. Reproducing
C. Summarizing
D. Sorting
Answer» E.
141.

In which of the following areas, spreadsheet software is more useful?

A. Psychology
B. Publishing
C. Statistics
D. Message sending
Answer» B. Publishing
142.

A bug in a programme is a

A. Statement
B. Error
C. Signature
D. both (2) and (3)
Answer» C. Signature
143.

A GroupWare is a

A. Hardware
B. Network
C. Software
D. Firmware
Answer» D. Firmware
144.

The device that converts computer output for transmission over telephone lines is called

A. interface
B. interpreter
C. modem
D. I/O port
Answer» D. I/O port
145.

Which of the following computer memories is non-volatile?

A. DRAM
B. SRAM
C. ROM
D. RAM
Answer» D. RAM
146.

Find the odd one out .

A. Linux
B. Windows 98
C. C++
D. Windows 7
Answer» D. Windows 7
147.

Where was India s first computer installed?

A. Indian Institute of Technology, Delhi
B. Indian Institute of Science, Bangalore
C. Indian Iron & Steel Co. Ltd., Burnpur
D. Indian Statistical Institute, Calcutta
Answer» E.
148.

In present-day computing, which code is used and is accepted worldwide?

A. ASCII
B. Hollerith Code
C. EBCDIC
D. ISCII
Answer» B. Hollerith Code
149.

Which of the following uses the spawn mechanism to duplicate itself?

A. Trojan horse
B. Worm
C. Keystroke logger
D. Logic bomb
Answer» C. Keystroke logger
150.

As announced by the Finance Minister in his Budget speech on 28th February, 2011, with a view to assist States in modernising their stamp and registration administration, E-stamping is expected to be rolled out in all the districts of different States in a period of

A. one year
B. two years
C. three years
D. five years
Answer» D. five years