Quiznetik

Important Computer MCQs For Competitive Exams part-1 | Set 2

1. In the right setting a thief will steal your information by simply watching what you type.

Correct : D. shoulder surfing

2. A………..is a small program embedded inside of a GIF image.

Correct : A. web bug

3. A hacker contacts you my phone or email and attempts to acquire your password

Correct : B. phishing

4. A hacker that changes or forges information in an electronic resource, is engaging in………

Correct : D. data diddling

5. Hackers often gain entry to a network be pretending to be at a legitimate computer.

Correct : C. IP spoofing

6. The………..of a threat measures its potential impact on a system.

Correct : C. degree of harm

7. The power level drops below 120V.

Correct : C. blackout

8. Which of the following is NOT a Microsoft Internet tool or technology?

Correct : A. Dreamweaver

9. A protocol used to control the secure sending of data on the internet is :

Correct : B. HTTPS

10. Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ………..

Correct : A. software suites

11. ……………terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

Correct : D. Point-of-Sale (POS)

12. The OSI model is divided into …………processes called layers.

Correct : C. seven

13. ………..are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.

Correct : B. Embedded computers

14. In a ring topology, the computer in possession of the………can transmit data

Correct : D. token

15. …………Viruses are often transmitted by a floppy disk left in the floppy drive

Correct : B. Boot sector

16. A database management system (DBMS) is a………..

Correct : D. software system used to create, maintain, and provide controlled access to a database.

17. A Proxy server is used for which of the following?

Correct : B. To process client requests for web pages

18. ……….are words that a programming language has set aside for its own use.

Correct : B. Reserved words

19. What is the primary difference between a virus and a worm?

Correct : C. A virus is very harmful to the computers it infects; a worm is not a serious a problem

20. ………..describe what is database fields.

Correct : D. Field names

21. A goal of normalization is to………….

Correct : D. minimize the numbe of redundancy

22. A(n)………….uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.

Correct : B. GUI

23. Communication using a modulated carrier to apply a data signal to a transmission medium in analog form is

Correct : D. Broad band networking

24. ‘ITS’ stands for

Correct : C. Intelligent Tutoring Systems

25. Any piece of equipment forming an interface to a data communication system is

Correct : B. DTA

26. In the language of the computer profession, one thousand position of main storage is represented with the letter

Correct : A. K

27. The control of the jobs running within a system is

Correct : A. Job monitoring

28. The total number of messages handled by a computerized telephone system on a daily basis is an example of :

Correct : D. All of these

29. A device mounted on a communication satellite which receives, amplifies and re- transmits signals from earth station is

Correct : B. Transponder

30. What is the acronym for Single In-Line Memory Module?

Correct : A. SIMM

31. Which type of processing that produces output results immediately after input data are entered into a computer system

Correct : B. Interactive

32. A computer program that instructs other programs to perform a particular type of operation is

Correct : A. System software

33. The provides a path between the CPU and peripheral devices, which are connected via interface cards

Correct : B. expansion bus

34. Programs prepared by an outside supplier & provided to a user in a machine readable form is known as

Correct : B. Canned program

35. Pictures or drawings, typically displayed on a VDU to allow users to select program options is called

Correct : B. Icons

36. The pieces of equipment which are attached to the CPU of a computer and which it can access are called

Correct : E. peripherals

37. A factor which might cause an individual to consider using a computer in criminal activities is :

Correct : D. All the these

38. The Secure Electronic Transaction (SET) specification

Correct : D. uses a public-key encryption to secure credit-card transaction systems

39. ‘DOS’ floppy disk does not have

Correct : E. BIOS

40. All the information collected during database development is stored in a_

Correct : B. data warehouse

41. The…………component is used by the data analyst to create the queries that access the database.

Correct : B. end-user query tool

42. A polymorphic virus

Correct : A. modifies its program code each time it attaches itself to another program or file

43. Microwave transmission is used in environments where installing physical transmission media is _

Correct : D. easy or promising and where line-of-sight transmission is available

44. Which is NOT a good Web security strategy?

Correct : D. Remove unnecessary compilers and interpreters

45. The word FTP stands for

Correct : D. File Transfer Protocol

46. This…………tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.

Correct : A. Client

47. RSA is

Correct : D. Digital Signature

48. A DVD-RAM is similar to a …………except it has storage capacities upto 5.2 GB.

Correct : C. CD-RW

49. How is power supplied to a low-power USB device?

Correct : D. Through the USB cable

50. The………data mining techniques derives rules from real-world case examples.

Correct : C. Neural nets

51. Which of the following objects is passed to a JavaBean when one of its properties is set via a JSP action?

Correct : C. Servlet Response

52. Graphical diagrams used to represent different multiple perspectives of a system include_

Correct : A. use-case, class, and state diagrams

53. Database redesign is not terribly difficult if the

Correct : E. database is relatively large

54. Which of the following are normally used to initialize a computer system’s hardware?

Correct : A. Bootstrap memory

55. If you wanted to locate the hardware address of a local device, which protocol would you use?

Correct : A. ARP

56. What is Internet 2?

Correct : D. An association to develop advanced Internet technology

57. While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?

Correct : C. Visit a partner site of the organization to see if it is there.

58. Which kind of lock includes a keypad that can be used to control access into areas?

Correct : D. Tumbler

59. Which is not a factor when categorizing a computer?

Correct : E. Where it was purchased

60. Which of the following terms is the most closely related to main memory?

Correct : D. temporary

61. Which of the following is not a factor affecting the processing capability or performance of a PC system?

Correct : B. The revolutions per minute of the printer disk

62. What is the standard code the computer industry created to represent characters?

Correct : C. ASCII

63. Primary storage is………..as compared to secondary storage :

Correct : C. Fast and expensive

64. Offline device is :

Correct : A. a device which is not connected to CPU

65. The most popular language used with microcomputers and time-shared mini computers, is an easy-to-use high level language :

Correct : D. BASIC

66. Which of the following is a communication network that is devoted to carrying computer information :

Correct : C. Data network

67. A half byte is known as :

Correct : D. Nibble

68. With respect to a network interface card the term 10/100 refers to:

Correct : C. megabits per seconds

69. A hard disk is divided into tracks which are further subdivided into :

Correct : B. sectors

70. Which standard govern parallel communications?

Correct : D. IEEE 1284

71. Which peripheral port provides the FASTEST throughput to laser printers?

Correct : C. Parallel

72. Resistance is measured in?

Correct : D. Ohms

73. In Inkjet technology the droplets of ink are deflected by?

Correct : A. multi directional nozzles

74. Which provides the fastest access to large video files?

Correct : C. SCSI hard drives

75. Primary memory stores :

Correct : D. All of these

76. You just installed a new IDE hard drive, but your system BIOS will not recognize the new drive, what should you check first :

Correct : B. jumpers on the hard drive

77. What’s the best way to protect your hard drive data?

Correct : A. regular backups

78. Laser Jet printer speeds are measured in pages per minute (ppm) what do we use to measure dot-matrix printers?

Correct : D. characters per second

79. A modem could be attached to which port?

Correct : A. Parallel port

80. You get a CMOS checksum error during bootup. What is most likely the cause?

Correct : C. CMOS battery is nearing end of life

81. What are the four key functions of a computer system?

Correct : A. input, processing, output, and storage

82. Parity is :

Correct : C. an extra bit stored with data in RAM that is used to check for errors when the data is read back

83. What is different between AT and ATX power supplies?

Correct : C. AT supplies use P8 and P9 power connectors while ATX uses a single P1 connector.

84. What type of connector is used to plug a telephone line into a modem?

Correct : B. RJ-11

85. Which of the following is NOT a type of computer hard drive?

Correct : B. FDD

86. What does FDISK do?

Correct : D. creates partitions on the hard drive

87. Which of the following is NOT a type of motherboard expansion slot?

Correct : D. ATX

88. Copying a process from memory to disk to allow space for other processes is called :

Correct : A. Swapping

89. Which of the following memory unit that processor can access more rapidly :

Correct : C. Cache Memory

90. Which one of the following is not the function of Operating System?

Correct : C. Networking

91. What is the meaning of “Hibernate” in Windows XP/Windows7?

Correct : D. Shutdown the Computer without closing the running applications

92. Unix Operating System is an :

Correct : D. All of these

93. What should be the extension to execute files?

Correct : D. All of these

94. Which of the following memories need refresh?

Correct : B. DRAM

95. RJ45 UTP cable has………Cable :

Correct : C. 4 pair

96. Basic is……….language :

Correct : A. a procedural

97. The file system “NTFS” stands for :

Correct : C. New Technology File System

98. Which Operating System doesn’t support networking between computers?

Correct : A. Windows 3.1

99. In which type of the following OS, the response time is very crucial :

Correct : B. Real Time Operating System

100. Which of the following languages is more suited to structured program?

Correct : D. PASCAL