Quiznetik
Important Computer MCQs For Competitive Exams part 2 | Set 3
1. ________ means that the data contained in a database is accurate and reliable.
A. Data redundancy
B. Data integrity
C. Data reliability
D. Data consistency
E. None of these
Correct : B. Data integrity
2. A(n) ________ is a private corporate network used exclusively by company employees.
A. internet
B. local area network
C. peer to peer
D. intranet
E. None of these
Correct : D. intranet
3. Which of the following terms is just the connection of networks that can be joined together ?
A. virtual private network
B. internet
C. intranet
D. extranet
E. None of these
Correct : B. internet
4. An area of a computer that temporarily holds data waiting to be processed is
A. CPU
B. Memory
C. Storage
D. File
E. None of these
Correct : B. Memory
5. A ________ is a microprocessor-based computing device.
A. personal computer
B. mainframe
C. workstation
D. server
E. None of these
Correct : A. personal computer
6. You use a(n) ________, such as a keyboard or mouse, to input information.
A. output device
B. input device
C. storage device
D. processing device
E. None of these
Correct : B. input device
7. The operating system called UNIX is typically used for
A. Desktop computers
B. Laptop computers
C. Super computers
D. Web servers
E. All of these
Correct : E. All of these
8. Press — to move the insertion point to the address box, or to highlight the URL in the address box
A. Alt + D
B. Alt + A
C. Shift + Tab
D. Tab + Ctrl
E. Ctrl + S
Correct : A. Alt + D
9. ________ contain data in Oracle database.
A. Extents
B. Segments
C. Tables
D. Datablocks
E. Records
Correct : D. Datablocks
10. What is a Gigabyte?
A. Flash memory
B. An optical storage medium capable of storing vast amount of information
C. Roughly a trillion bytes
D. Roughly a million bytes
E. Roughly a billion bytes
Correct : E. Roughly a billion bytes
11. Which of the following is a part of session layer?
A. Transports data across the physical link
B. Terminates a session
C. Performs flow control
D. Determines network topology
E. Performs physical addressing
Correct : B. Terminates a session
12. Window registry consists of ________ and ________ files.
A. user.dat, win.ini
B. user.dat, system.dat
C. autoexec.bat, config.sys
D. win.reg, user.dat
E. win.reg, system.dat
Correct : B. user.dat, system.dat
13. In Open System Interconnection (OSI) model IP belongs to ________ layer.
A. session layer
B. physical layer
C. network layer
D. transport layer
E. application layer
Correct : C. network layer
14. ________ technology is typically used by Extranet and Intranet.
A. Protocol
B. SSL
C. Proprietary
D. Internet
E. SET
Correct : D. Internet
15. A program which is in execution is called
A. data
B. job
C. process
D. information
E. None of these
Correct : C. process
16. A computer cannot “boot” without a(n)
A. loader
B. linker
C. OS
D. compiler
E. assembler
Correct : C. OS
17. ________ are loaded into main memory when the computer is booted.
A. Word processing instructions
B. Utility programs
C. Internal commands
D. Intermediate commands
E. External commands
Correct : C. Internal commands
18. A(n)________ is a register or main memory location which contains the effective address of the operand.
A. special location
B. pointer
C. scratch pad
D. indexed register
E. direct indexed register
Correct : B. pointer
19. Resolution of externally defined symbols is performed by
A. OS
B. compiler
C. linker
D. loader
E. interpreter
Correct : C. linker
20. Which major development led to the production of microcomputer?
A. Logic gates
B. Floppy disks
C. Magnetic disks
D. Magnetic tape
E. Integrated circuits
Correct : E. Integrated circuits
21. The arranging of data in a logical sequence is called
A. classifying
B. summarizing
C. reproducing
D. sorting
E. sequencing
Correct : D. sorting
22. ________ company started the personal-computer industry.
A. Compaq
B. Apple
C. HCL
D. IBM
E. Texas instruments
Correct : B. Apple
23. ________ can be programmed one time by either the manufacturer or the computer user: once programmed, it cannot be modified.
A. ROM
B. PROM
C. EPROM
D. EEPROM
E. None of these
Correct : B. PROM
24. In a computer system, ________ device is functionally opposite of a keyboard.
A. joystick
B. mouse
C. trackball
D. printer
E. scanner
Correct : D. printer
25. The silicon chips used in computers are made from
A. copper
B. germanium
C. ordinary sand
D. gallium-arsenide
E. None of these
Correct : C. ordinary sand
26. In modems data transfer rate is measured in
A. bandwidth
B. bits per second
C. bits per minute
D. All the above
E. None of these
Correct : B. bits per second
27. The output of a 2 input and gate is 1 only when its
A. either input is 1
B. both inputs one 0
C. both inputs are 1
D. either input is 0
E. None of these
Correct : C. both inputs are 1
28. ________ printer is a character-at-a time printer.
A. Line
B. Chain
C. Band
D. Daisywheel
E. Drum
Correct : D. Daisywheel
29. A half byte is known as
A. data
B. bit
C. half byte
D. word
E. nibble
Correct : E. nibble
30. A ________ code is used in retail stores to identify merchandise.
A. mnemonics
B. gray code
C. machine code
D. universal product code
E. access-3 code
Correct : D. universal product code
31. Which of the following languages is based on graphics for use in education?
A. COBOL
B. BASIC
C. LOGO
D. PROLOG
E. FORTRAN
Correct : C. LOGO
32. You can activate a cell by
A. pressing the tab key
B. pressing the arrow key
C. pressing the enter key
D. All the above
E. None of these
Correct : D. All the above
33. Which of the following is not an option in the spelling dialog box?
A. Ignore
B. Ignore all
C. Change
D. Change all
E. Edit
Correct : E. Edit
34. ________ layer performs multiplexing and demultiplexing of network connections.
A. Physical
B. Network
C. Transport
D. Data link
E. Application
Correct : C. Transport
35. In which of the following topologies, security and privacy are less of an issue for devices?
A. Mesh
B. Star
C. Ring
D. Bus
E. Tree
Correct : D. Bus
36. A television broadcast uses _________ transmission mode.
A. half-duplex
B. full-duplex
C. simplex
D. automatic
E. None of these
Correct : C. simplex
37. _________ and ________ protocols are defined in transport layer.
A. TCP, UDP
B. TCP, IP
C. UDP, IP
D. UDP, ICMP
E. TCP, ICMP
Correct : A. TCP, UDP
38. Borders can be applied to
A. paragraph
B. text
C. cell
D. All the above
E. None of these
Correct : D. All the above
39. What is the short-cut key to highlight the entire column?
A. Ctrl + Page up
B. Ctrl + Page down
C. Ctrl + Enter
D. Ctrl + Space bar
E. Ctrl + C
Correct : D. Ctrl + Space bar
40. Which command is used to display current date and time in MS Excel?
A. today
B. now ()
C. time ()
D. date ()
E. system ()
Correct : B. now ()
41. ________ language is used to create macros in MS Excel.
A. C
B. C++
C. Visual C++
D. Java
E. Visual Basic
Correct : E. Visual Basic
42. Workspace means
A. Group of worksheets
B. Group of rows
C. Group of columns
D. Group of workbooks
E. Group of cells
Correct : D. Group of workbooks
43. Which of the following graphical models is used to define a database?
A. Organisation model
B. Programming model
C. Flow chart
D. E-R diagram
E. None of these
Correct : D. E-R diagram
44. To refer to a specific record in your library database, for instance, information stored about a specific book ________ term is used.
A. table
B. column
C. relation
D. instance
E. entity
Correct : D. instance
45. The most important advantage of an IC is
A. low power consumption
B. reduced cost
C. easy replacement in case of circuit failure
D. extremely high reliability
E. None of these
Correct : D. extremely high reliability
46. To modify the structure of a created table, which SQL command is used?
A. change
B. alter
C. update
D. modify
E. None of these
Correct : B. alter
47. ________ can be use to send an e-mail to a large group at one time.
A. Group
B. Alias
C. Mail server
D. List server
E. Remote server
Correct : D. List server
48. To save the current document or to open a previously saved document, ________ is used.
A. file menu
B. tools menu
C. view menu
D. edit
E. review menu
Correct : A. file menu
49. Documents of the web that are transported over the Internet are called
A. web sites
B. web link
C. web pages
D. HTML pages
E. hypertext
Correct : C. web pages
50. The ability to convey a message without disclosing your name or identity is called
A. privacy
B. security
C. encryption
D. anonymity
E. authentication
Correct : D. anonymity
51. _________ operating systems are found on ROM chips in portable or dedicated devices.
A. Server
B. Network
C. Embedded
D. Stand-alone
E. Windows
Correct : C. Embedded
52. Identify the odd term among the following groups.
A. Optical fibre
B. Co-axial cable
C. Twisted pair wire
D. Micro waves
E. None of these
Correct : D. Micro waves
53. ________ are tiny charts embedded into the background of an Excel cell.
A. Labels
B. Functions
C. Formulas
D. Sparklines
E. Background
Correct : D. Sparklines
54. A(n) ________ is called an Internet-based online retailer.
A. online tailer
B. net-tailer
C. cybertailer
D. e-tailer
E. None of these
Correct : D. e-tailer
55. For predicting the weather ________ is the best solution.
A. thin clients
B. servers
C. super computer
D. workstations
E. minicomputer
Correct : C. super computer
56. To organise the bookmarks, ________ can be used.
A. containers
B. folders
C. structure
D. menus
E. files
Correct : B. folders
57. Different computers are connected to a LAN by a cable and a(n)
A. interface card
B. special wires
C. modem
D. telephone lines
E. channel
Correct : A. interface card
58. A ________ is a software that measures, monitors, analyses and controls real-world events.
A. real-time software
B. scientific software
C. system software
D. business software
E. None of these
Correct : A. real-time software
59. ________ operating system uses write through catches.
A. DOS
B. VLTRIX
C. UNIX
D. XENIX
E. None of these
Correct : A. DOS
60. When you want to draw a perfect shape ________ should be used.
A. alt-key
B. ctrl-key
C. shift-key
D. space bar
E. backspace
Correct : C. shift-key
61. Which of the following might prevent a program from being modified in future?
A. Pseudocode
B. Logic errors
C. Syntax error
D. Lack of program documentation
E. All the above
Correct : D. Lack of program documentation
62. Which generation is natural language related to?
A. First generation
B. Second generation
C. Third generation
D. Fourth generation
E. Fifth generation
Correct : E. Fifth generation
63. The database environment has all of the following components except
A. database
B. DBA
C. users
D. SQL
E. separate files
Correct : E. separate files
64. A number of related records that are treated as a unit is called a
A. field
B. data
C. file
D. batch
E. group
Correct : C. file
65. Coding and testing are done in a ________ manager.
A. cross-sectional
B. by-sectional
C. ad hoc
D. bottom-up
E. top-down
Correct : E. top-down
66. Computer software is composed of
A. mnemonics
B. symbols
C. statements
D. algorithms
E. data
Correct : D. algorithms
67. Disk checking is associated with
A. debugging a program
B. running a program
C. compiling a program
D. coding a program
E. assembling a program
Correct : A. debugging a program
68. What is the common name given to a program written in any one of the high-level languages?
A. System program
B. Compiler program
C. Object program
D. Source program
E. Data program
Correct : D. Source program
69. ________ is used to produce graphic outputs.
A. VDU
B. Magnetic tape
C. Magnetic disk
D. Plotter
E. None of these
Correct : D. Plotter
70. Binary-Coded Decimal (BCD) often uses ________ bits.
A. 64
B. 128
C. 8
D. 16
E. 32
Correct : C. 8
71. ________ holds microprograms.
A. ROM
B. RAM
C. Core memory
D. Control memory
E. EPROM
Correct : B. RAM
72. A hybrid computer uses a ________ to convert digital signals from a computer into analog signals.
A. modem
B. modulator
C. demodulator
D. decoder
E. None of these
Correct : A. modem
73. ________ program gives instructions regarding operations inside the computer.
A. Application
B. System software
C. Utility
D. Compiler
E. Assembler
Correct : B. System software
74. The first electronic computer was made in the year
A. 1946
B. 1955
C. 1964
D. 1967
E. 1969
Correct : A. 1946
75. The record produced in an audit trail is known as
A. job stream
B. job file
C. journal tape
D. journal stream
E. job tape
Correct : C. journal tape
76. A group of magnetic tapes, videos or terminals usually under the control of one master is called a
A. cluster
B. track
C. cylinder
D. All the above
E. None of these
Correct : A. cluster
77. ________ is an alternative form of binary code.
A. Decoder
B. Bar code
C. Encoder
D. Gray code
E. Excess-3 code
Correct : D. Gray code
78. Which of the following layers is responsible for token management?
A. Physical layer
B. Application layer
C. Transport layer
D. Network layer
E. Session layer
Correct : D. Network layer
79. In a ________ topology, a network that contains multiple hubs is most likely configured.
A. ring
B. star
C. bus
D. mesh
E. tree
Correct : E. tree
80. Communication between a computer and a CPU uses ________ transmission mode.
A. automatic
B. simplex
C. half-duplex
D. full-duplex
E. None of these
Correct : B. simplex
81. ISDN is an acronym for
A. Integrated Standard Digital Network
B. Intelligent Services Digital Network
C. Integrated Services Digital Network
D. Integrated Services Data Network
E. None of these
Correct : C. Integrated Services Digital Network
82. In which of the following networks, irregular topologies are used?
A. LAN
B. WAN
C. MAN
D. CAN
E. Broadcast Networks
Correct : B. WAN
83. ________ standard describes the CSMA/CD protocol.
A. IEEE 802.1
B. IEEE 802.2
C. IEEE 802.3
D. IEEE 802.4
E. IEEE 802.5
Correct : C. IEEE 802.3
84. COBOL is used in ________ applications.
A. scientific
B. space
C. mathematical
D. commercial
E. graphics
Correct : D. commercial
85. In MS Excel, to display current date only ________ is used.
A. date ()
B. now ()
C. today ()
D. time ()
E. current date ()
Correct : C. today ()
86. To rename currently highlighted object ________ is used.
A. F1
B. F2
C. F3
D. F5
E. F6
Correct : B. F2
87. To display the window system properties dialogue, which of the following short cut keys is used?
A. Windows key + P
B. Windows key + D
C. Windows key + Pause
D. Windows key + Shift
E. Windows key + Ctrl
Correct : C. Windows key + Pause
88. A permanent virtual circuit involves
A. Connection establishment
B. Data transfer
C. Connection release
D. All of the above
E. None of these
Correct : B. Data transfer
89. ________ input/output device is not associated with personal computers.
A. Colour monitors
B. Dot-matrix printer
C. Punched cards
D. Mice
E. Optical scanners
Correct : C. Punched cards
90. A computer enthusiast is called
A. a hacker
B. user friendly
C. a computerist
D. All the above
E. None of these
Correct : E. None of these
91. Actual execution of instructions in a computer takes place in
A. control unit
B. storage unit
C. arithmetic logic unit
D. All the above
E. None of these
Correct : C. arithmetic logic unit
92. ________ function displays row data in a column or column data in a row.
A. Index
B. Rows
C. Hyperlink
D. Transpose
E. Columns
Correct : D. Transpose
93. Multiple calculations can be done by a single formula using
A. complex formula
B. array formula
C. smart formula
D. standard formula
E. advanced formula
Correct : B. array formula
94. Which of the following charts can be created in Excel?
A. Line
B. Pie
C. Area
D. All the above
E. None of these
Correct : D. All the above
95. ________ type of commercial Internet service providers are most widely used.
A. Centralised
B. National
C. Regional
D. Decentralise
E. Application
Correct : B. National
96. Moving from one website to another is called
A. moving
B. jumping
C. surfing
D. applying
E. changing
Correct : C. surfing
97. Which of the following is not one of the basic elements of an e-mail message?
A. Header
B. Message
C. Footer
D. Signature
E. None of these
Correct : C. Footer
98. ________ are specialised utility programs that make using the Internet and the web easier and safer.
A. Web utilities
B. Telecom
C. Web firewalls
D. Proxy server
E. Norton Utilities
Correct : A. Web utilities
99. The process that rearranges file fragments into contiguous files is called
A. file filing
B. folder folding
C. unfragging
D. defragmentation
E. file folding
Correct : D. defragmentation
100. ________ virus describes the awful consequences of not acting immediately.
A. Android
B. Spoofing
C. Phishing
D. Misleading e-mail
E. Sabotage
Correct : D. Misleading e-mail