Important Computer MCQs For Competitive Exams part 2 | Set 4
1. A computer infected with a malware bot is called
Correct : B. zombie
2. POS data entry system is used most extensively by the
Correct : A. grocery industry
3. A ________ is a non-impact printer that can produce very high-quality, letter-perfect printing.
Correct : B. laser printer
4. A computer can do nothing without a
Correct : B. program
5. RAM chip was invented by ________ company.
Correct : A. Intel
6. The first item defined for a new system is its
Correct : C. outputs
7. The language that the computer can understand and execute is
Correct : C. Machine language
8. The number used to identify a storage location is called
Correct : C. an address
9. A CD-ROM is
Correct : A. an optical ROM
10. The computer device used primarily to provide hard copy is
Correct : A. line printer
11. Which of the following devices can be used directly to input printed text?
Correct : B. OCR
12. The best graphics reproduction is produced by
Correct : B. laser printer
13. AND and NOT logical operations are performed in
Correct : A. ALU
14. Ethernet uses
Correct : B. bus topology
15. The single user operating system does not have
Correct : C. CPU scheduling module
16. Computers send data to peripherals with the help of
Correct : C. parallel I/O interface
17. Integrated Service Digital Network (ISDN) lines provide
Correct : C. Both data and voice circuits
18. A transaction file is a type of
Correct : A. data file
19. Which of the following programs is not a utility?
Correct : A. spooler
20. The operating system manages
Correct : D. All of these
21. A network consists of interconnected
Correct : A. workstations
22. Which is not true for LAN?
Correct : B. It is a public network.
23. Which of the following is not a transmission medium?
Correct : A. modem
24. Faster data communication is possible using
Correct : A. optical fibre
25. The operation of a digital computer is based on ________ principle.
Correct : C. logical
26. HTML viruses infect
Correct : E. Neither 1) nor 2)
27. The scrambling of code is known as
Correct : A. encryption
28. Which of the following moves the cursor one space to the right to put spaces in between words?
Correct : B. Space bar
29. When your computer suddenly stops working, it is referred to as
Correct : A. crash
30. A program that works like a calculator for keeping track of money and making budgets, is called
Correct : B. Spreadsheet
31. The most frequently used instructions of a computer program are likely to be fetched from
Correct : B. cache memory
32. Verification of a login name and password is known as
Correct : C. authentication
33. In a ring topology, the computer in possession of the ________ can transmit data.
Correct : D. token
34. You must install a/an ________ on a network if you want to share an Internet connection.
Correct : A. router
35. The system unit of a personal computer typically contains all of the following except
Correct : D. modem
36. A small or intelligent device is so called because it contains within it a
Correct : D. sensor
37. EPROM can be used for
Correct : C. 1) and 2)
38. The 16-bit microprocessor means that it has
Correct : C. 16 data lines
39. What does SNMP stand for?
Correct : D. Simple Network Management Protocol
40. ________ temporarily holds program instructions, data and output until they are no longer needed
by the computer.
Correct : D. RAM
41. Basic Input Output System (BIOS) is necessary for
Correct : A. boot-up
42. SQL stands for
Correct : A. Structured Query Language
43. A hard drive consists of spinning ________ made up of aluminum or ceramic that is coated with
magnetic media.
Correct : E. platters
44. POST stands for
Correct : C. Power-On Self-Test
45. Which of the following is not an example of a virus?
Correct : D. Tartan
46. A database that spreads information across different tables while maintaining links between them is
referred to as
Correct : A. Relational database
47. ________ is a method of storing data on two or more hard drives that work in combination to do the
job for a larger drive.
Correct : B. RAID
48. C is a programming language developed for developing
Correct : C. UNIX Operating system
49. First RAM chip was introduced by which of the following?
Correct : B. Intel
50. A specialised network device that determines the next network point to which it can forward a data
packet towards the destination of the packet is commonly known as
Correct : B. router
51. Timing and control unit is a part of a(n)
Correct : B. Processor
52. Chip is the common name for a(n)
Correct : C. integrated circuit
53. Malicious software is known as
Correct : B. malware
54. Name the key that will erase information from the computer memory and characters on the screen.
Correct : B. Delete key
55. ________ determines the appearance of your desktop and controls the performance of your hardware.
Correct : D. Control Panel
56. The processing capability of a microcomputer can be enhanced with the help of
Correct : C. expansion card
57. Which view is not available in Microsoft Word 2007?
Correct : C. Page Break
58. The collection of commands is called
Correct : B. program
59. Recycle Bin enables you to restore a file which was deleted from
Correct : B. Drive C
60. ________ bar appears immediately below the title bar and provides access to pull-down menus.
Correct : B. Menu
61. By default, number entries are
Correct : A. rightied aligned
62. ________ process rearranges file fragments into contiguous files.
Correct : B. Defragmentation
63. The memory card which is conceptually related to the smart card but is similar to the video disk, is
Correct : D. Laser card
64. The main advantage of magnetic disk compared to magnetic tape is
Correct : C. direct access
65. Which of the following printers is used in conjunction with computers and uses dry ink powder?
Correct : D. Laser printer
66. Another term for the Internet is
Correct : C. cyberspace
67. Which of the following topologies is not of broadcast type?
Correct : C. Ring
68. Enterprise storage unit that uses DVD and CD discs as the storage medium is
Correct : C. jukebox
69. The function of the ‘home key’ in a microcomputer is
Correct : B. to reposition the cursor
70. A computer user obsessed with gaining entry into highly secured computer system is
called a(n)
Correct : D. Cracker
71. The programming team fixes program errors discovered by users during
Correct : A. program maintenance
72. A data type used for nontextual data like pictures, sound and videos is called
Correct : B. OLE object data type
73. A(n) ________ is a system that is used for capturing knowledge from books and experienced
individuals making it available where needed.
Correct : D. knowledge management system
74. Computer’s language consisting of binary numbers that directly corresponds to its electrical state is
called
Correct : C. Machine language
75. ________ is a type of computer crime in which knowledgeable thieves remove some of the computer’s
RAM chips but leave enough to start the computer.
Correct : A. Memory shaving
76. The ________ is a portion of Internet that contains billions of documents.
Correct : C. www
77. Which of the following is not a program command?
Correct : E. GO TO
78. GDI represents
Correct : C. Graphics Device Interface
79. A robot consists of three basic components: power supply, memory and
Correct : B. arm
80. Status indicators are located on the
Correct : C. formula bar
81. What is the acronym for Dual-In-Line Memory Module?
Correct : A. DIMM
82. Data division is the third division of a ________ program.
Correct : D. BASIC
83. ________ file is created in Microsoft Excel.
Correct : C. Data
84. The view that shows the maximum amount of information about each file in My Computer is called
Correct : D. details
85. Error messages in an Excel sheet starts with _______ sign/symbol.
Correct : C. #
86. In SIO2
the figure 2 appears lowered. Which effect has been applied?
Correct : E. Subscript
87. Dvorak is used with reference to
Correct : D. Keyboard
88. Which of the following codes is written into serially accessed memory?
Correct : A. EOD code
89. ________ program is used to detect overall system malfunction.
Correct : D. System diagnostics
90. To separate mechanism from policy ________ is used in operating system.
Correct : B. two-level implementation
91. ________ is the combination of keys to cut the selected text.
Correct : A. CTRL + X
92. A portion of disk that is unable to store data reliably is a
Correct : C. bad section
93. A unit of measurement, ________ is equal to approximately 1 septillion bytes.
Correct : B. Yotta byte
94. Which of the following is used for broadband communications?
Correct : D. All the above
95. ________ a document means the file is transferred from your computer to another computer.
Correct : E. Uploading
96. A(n) ________ allows you to communicate over the internet similar to a newsgroup but is easier to
use.
Correct : C. message board
97. A computer program used by search engine to roam the World Wide Web via the Internet, is
Correct : B. spider
98. A simple automated program that scans the web for specific data and insert into a designated
database.
Correct : C. Web crawler
99. In web searching a symbol or keyword that instructs the search software to make sure that any
retrieved records contain a certain word, is called
Correct : D. Inclusion operator
100. Which of the following is a characterstic(s) of education software?