MCQOPTIONS
Saved Bookmarks
This section includes 36 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Knowledge knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following function is a type of broadband communication channel? |
| A. | Co-axial Cable |
| B. | Fiber Optic Cable |
| C. | Microwave Circuits |
| D. | All of the Above |
| E. | None of the Above |
| Answer» E. None of the Above | |
| 2. |
________ Web service lets the subscriber to broadcast short messages to other subscribers of the same service. |
| A. | Social Engineering |
| B. | Social Networking |
| C. | Microblogging |
| D. | None of the Above |
| E. | All of the Above |
| Answer» D. None of the Above | |
| 3. |
______ are set of rules and procedures to control the data transmission over the internet. |
| A. | IP address |
| B. | Domains |
| C. | Protocol |
| D. | Gateway |
| E. | None of the Above |
| Answer» D. Gateway | |
| 4. |
Which of the following functions is not performed by servers? |
| A. | Processing Websites |
| B. | Database Sharing |
| C. | Word Processing |
| D. | Email Processing |
| E. | None of the Above |
| Answer» D. Email Processing | |
| 5. |
Trend Micro is a______. |
| A. | Anti-Virus |
| B. | Firewall |
| C. | Spyware Application |
| D. | Spamming |
| E. | None of the Above |
| Answer» B. Firewall | |
| 6. |
WORM stands for? |
| A. | Write Once Read Memory |
| B. | Wanted Once Read Memory |
| C. | Wanted Original Read Memory |
| D. | Write Original Read Memory |
| E. | None of these |
| Answer» B. Wanted Once Read Memory | |
| 7. |
Which of the following is NOT a source of viruses? |
| A. | Pendrives |
| B. | The Internet |
| C. | E-mail messages |
| D. | Computer networks |
| E. | All of the Above |
| Answer» E. All of the Above | |
| 8. |
A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a |
| A. | hacker |
| B. | analyst |
| C. | instant messenger |
| D. | programmer |
| E. | spammer |
| Answer» B. analyst | |
| 9. |
____________ is a database in which data is organized in the form of trees with nodes. |
| A. | Network Database |
| B. | Hierarchical Database |
| C. | Schema Databases |
| D. | Relational Database |
| E. | None of the Above |
| Answer» C. Schema Databases | |
| 10. |
____________ means that the data contained in a database is accurate and reliable. |
| A. | Data redundancy |
| B. | Data integrity |
| C. | Data reliability |
| D. | Data consistency |
| E. | None of the Above |
| Answer» C. Data reliability | |
| 11. |
The database language that allows you to access or maintain data in a database: |
| A. | DCL |
| B. | DML |
| C. | DDL |
| D. | DKL |
| E. | None of the Above |
| Answer» D. DKL | |
| 12. |
Duplication of data is known as_________. |
| A. | Data Repentance |
| B. | Data Redundancy |
| C. | Data Inconsistency |
| D. | Data base |
| E. | None of the Above |
| Answer» C. Data Inconsistency | |
| 13. |
Normalization is a process of restructuring a relation to_________. |
| A. | Maximize duplication of data to ensure reliability in |
| B. | Minimize duplication of data in a database |
| C. | Make it of uniform size |
| D. | Allow addition of data |
| E. | None of the Above |
| Answer» C. Make it of uniform size | |
| 14. |
FORTAN is a general-purpose, imperative programming language that is especially suited for _________ computing. |
| A. | Algorithm |
| B. | Scientific |
| C. | Mathematical |
| D. | Commercial |
| E. | Physical |
| Answer» C. Mathematical | |
| 15. |
What is Compiler? |
| A. | Part of the digital machine to store information |
| B. | Part of arithmetic logic unit |
| C. | Part of the digital machine to store information |
| D. | Operator of Boolean algebra |
| E. | Translator of source program to object code. |
| Answer» F. | |
| 16. |
Open Database Connectivity (ODBC) is based on which of the following language? |
| A. | RDBMS |
| B. | C++ language |
| C. | SQL |
| D. | Dot net language |
| E. | C language |
| Answer» D. Dot net language | |
| 17. |
In DOS, the DIR command is used for. |
| A. | To display the contents of the file |
| B. | To delete the files |
| C. | To display files and sub directories |
| D. | Both (A) & (C) |
| E. | None of the Above |
| Answer» D. Both (A) & (C) | |
| 18. |
Which out of the following is language used for creating web pages? |
| A. | PHP |
| B. | XML |
| C. | CSS |
| D. | HTML |
| E. | All of the above |
| Answer» F. | |
| 19. |
What are the small application program called that ensures form completion and providing of animation on a web page? |
| A. | Cookies |
| B. | Bookmarks |
| C. | Applets |
| D. | Flash |
| E. | None of the Above |
| Answer» E. None of the Above | |
| 20. |
The connection between your computer at home and your local ISP is called? |
| A. | The last mile |
| B. | The home stretch |
| C. | The home pages |
| D. | The vital mile |
| E. | None of the Above |
| Answer» D. The vital mile | |
| 21. |
In OSI Architecture, the routing is performed by_________. |
| A. | Network layer |
| B. | Datalink layer |
| C. | Protocols |
| D. | Transport layer |
| E. | Buses |
| Answer» B. Datalink layer | |
| 22. |
Each IP packet must contain a_________. |
| A. | Source Address |
| B. | Pages |
| C. | Destination address |
| D. | Blog |
| E. | Both (A) & (C) |
| Answer» F. | |
| 23. |
________ is a form of software that automatically displays ads such as banners or pop-ups when a user is online. |
| A. | Adware |
| B. | Skyware |
| C. | Scrumware |
| D. | Greyware |
| E. | None of the Above |
| Answer» B. Skyware | |
| 24. |
Which of the following is the shortcut used for deleting the Browsing history in all the Web browsers? |
| A. | Ctrl + Alt + Enter |
| B. | Ctrl + Shift +Alt |
| C. | Ctrl + Alt + Delete |
| D. | Ctrl + Alt + F1 |
| E. | Ctrl + Shift + Delete |
| Answer» F. | |
| 25. |
Software Piracy can be termed as which of the following activity? |
| A. | Soft Loading |
| B. | Hardware Loading |
| C. | Internet Downloading |
| D. | All of the above |
| E. | None of the Above |
| Answer» E. None of the Above | |
| 26. |
A malicious act in which a large number of email messages are sent to a single email address in a short period of time. |
| A. | Flash |
| B. | Gopher |
| C. | E-mail Bomb |
| D. | Emoticon |
| E. | None of the Above |
| Answer» D. Emoticon | |
| 27. |
The language which has recently become the de facto standard for interfacing application programs with relational database system is |
| A. | Oracle |
| B. | SQL |
| C. | DBase |
| D. | 4GL |
| E. | None of the Above |
| Answer» C. DBase | |
| 28. |
ODBC stands for? |
| A. | Object database connectivity |
| B. | Oral database connectivity |
| C. | Oracle database connectivity |
| D. | Open database connectivity |
| E. | None of the Above |
| Answer» E. None of the Above | |
| 29. |
The view of total database content is_________ |
| A. | Conceptual view |
| B. | Internal View |
| C. | External view |
| D. | Physical view |
| E. | None of the Above |
| Answer» B. Internal View | |
| 30. |
Which field type is not a part of SQL? |
| A. | Integer |
| B. | String |
| C. | OLE Object |
| D. | Date and Time |
| E. | None of the Above |
| Answer» D. Date and Time | |
| 31. |
A logical schema is defined as a_________ |
| A. | Is the entire database |
| B. | A standard way of organising information for business |
| C. | Master fields |
| D. | Queries |
| E. | Tables |
| Answer» C. Master fields | |
| 32. |
A compiler means – |
| A. | A person who compiles source program |
| B. | The same thing as a programmer |
| C. | The same thing as a programmerKeypunch operator |
| D. | A program which translates source program into object program |
| E. | None of the above |
| Answer» E. None of the above | |
| 33. |
_______________ is the method involving creating written or generated codes that allow information to be kept secret. |
| A. | Debugging |
| B. | Programming |
| C. | Cryptography |
| D. | Open Sourcing |
| E. | Data Mining |
| Answer» D. Open Sourcing | |
| 34. |
.HTM is used as a file extension for_____________. |
| A. | Audio Interchange File Format |
| B. | Adobe Photoshop |
| C. | PC Application |
| D. | Data Interchange format |
| E. | Web page source text |
| Answer» F. | |
| 35. |
The term 'B' in COBOL, language used for record keeping and data management stands for _______________ . |
| A. | Basic |
| B. | Business |
| C. | Binary |
| D. | Beginner |
| E. | Bootable |
| Answer» C. Binary | |
| 36. |
___________ is a compiled English-like computer programming language designed for business use. |
| A. | COBOL |
| B. | FORTRAN |
| C. | PASCAL |
| D. | NEWTON |
| E. | BIZZLER |
| Answer» B. FORTRAN | |