Explore topic-wise MCQs in Computer Knowledge.

This section includes 36 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Knowledge knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following function is a type of broadband communication channel?

A. Co-axial Cable
B. Fiber Optic Cable
C. Microwave Circuits
D. All of the Above
E. None of the Above
Answer» E. None of the Above
2.

________ Web service lets the subscriber to broadcast short messages to other subscribers of the same service.

A. Social Engineering
B. Social Networking
C. Microblogging
D. None of the Above
E. All of the Above
Answer» D. None of the Above
3.

______ are set of rules and procedures to control the data transmission over the internet.

A. IP address
B. Domains
C. Protocol
D. Gateway
E. None of the Above
Answer» D. Gateway
4.

Which of the following functions is not performed by servers?

A. Processing Websites
B. Database Sharing
C. Word Processing
D. Email Processing
E. None of the Above
Answer» D. Email Processing
5.

Trend Micro is a______.

A. Anti-Virus
B. Firewall
C. Spyware Application
D. Spamming
E. None of the Above
Answer» B. Firewall
6.

WORM stands for?

A. Write Once Read Memory
B. Wanted Once Read Memory
C. Wanted Original Read Memory
D. Write Original Read Memory
E. None of these
Answer» B. Wanted Once Read Memory
7.

Which of the following is NOT a source of viruses?

A. Pendrives
B. The Internet
C. E-mail messages
D. Computer networks
E. All of the Above
Answer» E. All of the Above
8.

A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a

A. hacker
B. analyst
C. instant messenger
D. programmer
E. spammer
Answer» B. analyst
9.

____________ is a database in which data is organized in the form of trees with nodes.

A. Network Database
B. Hierarchical Database
C. Schema Databases
D. Relational Database
E. None of the Above
Answer» C. Schema Databases
10.

____________ means that the data contained in a database is accurate and reliable.

A. Data redundancy
B. Data integrity
C. Data reliability
D. Data consistency
E. None of the Above
Answer» C. Data reliability
11.

The database language that allows you to access or maintain data in a database:

A. DCL
B. DML
C. DDL
D. DKL
E. None of the Above
Answer» D. DKL
12.

Duplication of data is known as_________.

A. Data Repentance
B. Data Redundancy
C. Data Inconsistency
D. Data base
E. None of the Above
Answer» C. Data Inconsistency
13.

Normalization is a process of restructuring a relation to_________.

A. Maximize duplication of data to ensure reliability in
B. Minimize duplication of data in a database
C. Make it of uniform size
D. Allow addition of data
E. None of the Above
Answer» C. Make it of uniform size
14.

FORTAN is a general-purpose, imperative programming language that is especially suited for _________ computing.

A. Algorithm
B. Scientific
C. Mathematical
D. Commercial
E. Physical
Answer» C. Mathematical
15.

What is Compiler?

A. Part of the digital machine to store information
B. Part of arithmetic logic unit
C. Part of the digital machine to store information
D. Operator of Boolean algebra
E. Translator of source program to object code.
Answer» F.
16.

Open Database Connectivity (ODBC) is based on which of the following language?

A. RDBMS
B. C++ language
C. SQL
D. Dot net language
E. C language
Answer» D. Dot net language
17.

In DOS, the DIR command is used for.

A. To display the contents of the file
B. To delete the files
C. To display files and sub directories
D. Both (A) & (C)
E. None of the Above
Answer» D. Both (A) & (C)
18.

Which out of the following is language used for creating web pages?

A. PHP
B. XML
C. CSS
D. HTML
E. All of the above
Answer» F.
19.

What are the small application program called that ensures form completion and providing of animation on a web page?

A. Cookies
B. Bookmarks
C. Applets
D. Flash
E. None of the Above
Answer» E. None of the Above
20.

The connection between your computer at home and your local ISP is called?

A. The last mile
B. The home stretch
C. The home pages
D. The vital mile
E. None of the Above
Answer» D. The vital mile
21.

In OSI Architecture, the routing is performed by_________.

A. Network layer
B. Datalink layer
C. Protocols
D. Transport layer
E. Buses
Answer» B. Datalink layer
22.

Each IP packet must contain a_________.

A. Source Address
B. Pages
C. Destination address
D. Blog
E. Both (A) & (C)
Answer» F.
23.

________ is a form of software that automatically displays ads such as banners or pop-ups when a user is online.

A. Adware
B. Skyware
C. Scrumware
D. Greyware
E. None of the Above
Answer» B. Skyware
24.

Which of the following is the shortcut used for deleting the Browsing history in all the Web browsers?

A. Ctrl + Alt + Enter
B. Ctrl + Shift +Alt
C. Ctrl + Alt + Delete
D. Ctrl + Alt + F1
E. Ctrl + Shift + Delete
Answer» F.
25.

Software Piracy can be termed as which of the following activity?

A. Soft Loading
B. Hardware Loading
C. Internet Downloading
D. All of the above
E. None of the Above
Answer» E. None of the Above
26.

A malicious act in which a large number of email messages are sent to a single email address in a short period of time.

A. Flash
B. Gopher
C. E-mail Bomb
D. Emoticon
E. None of the Above
Answer» D. Emoticon
27.

The language which has recently become the de facto standard for interfacing application programs with relational database system is

A. Oracle
B. SQL
C. DBase
D. 4GL
E. None of the Above
Answer» C. DBase
28.

ODBC stands for?

A. Object database connectivity
B. Oral database connectivity
C. Oracle database connectivity
D. Open database connectivity
E. None of the Above
Answer» E. None of the Above
29.

The view of total database content is_________

A. Conceptual view
B. Internal View
C. External view
D. Physical view
E. None of the Above
Answer» B. Internal View
30.

Which field type is not a part of SQL?

A. Integer
B. String
C. OLE Object
D. Date and Time
E. None of the Above
Answer» D. Date and Time
31.

A logical schema is defined as a_________

A. Is the entire database
B. A standard way of organising information for business
C. Master fields
D. Queries
E. Tables
Answer» C. Master fields
32.

A compiler means –

A. A person who compiles source program
B. The same thing as a programmer
C. The same thing as a programmerKeypunch operator
D. A program which translates source program into object program
E. None of the above
Answer» E. None of the above
33.

_______________ is the method involving creating written or generated codes that allow information to be kept secret.

A. Debugging
B. Programming
C. Cryptography
D. Open Sourcing
E. Data Mining
Answer» D. Open Sourcing
34.

.HTM is used as a file extension for_____________.

A. Audio Interchange File Format
B. Adobe Photoshop
C. PC Application
D. Data Interchange format
E. Web page source text
Answer» F.
35.

The term 'B' in COBOL, language used for record keeping and data management stands for _______________ .

A. Basic
B. Business
C. Binary
D. Beginner
E. Bootable
Answer» C. Binary
36.

___________ is a compiled English-like computer programming language designed for business use.

A. COBOL
B. FORTRAN
C. PASCAL
D. NEWTON
E. BIZZLER
Answer» B. FORTRAN