Quiznetik

Important Computer MCQs For Competitive Exams part 2 | Set 4

1. A computer infected with a malware bot is called

Correct : B. zombie

2. POS data entry system is used most extensively by the

Correct : A. grocery industry

3. A ________ is a non-impact printer that can produce very high-quality, letter-perfect printing.

Correct : B. laser printer

4. A computer can do nothing without a

Correct : B. program

5. RAM chip was invented by ________ company.

Correct : A. Intel

6. The first item defined for a new system is its

Correct : C. outputs

7. The language that the computer can understand and execute is

Correct : C. Machine language

8. The number used to identify a storage location is called

Correct : C. an address

9. A CD-ROM is

Correct : A. an optical ROM

10. The computer device used primarily to provide hard copy is

Correct : A. line printer

11. Which of the following devices can be used directly to input printed text?

Correct : B. OCR

12. The best graphics reproduction is produced by

Correct : B. laser printer

13. AND and NOT logical operations are performed in

Correct : A. ALU

14. Ethernet uses

Correct : B. bus topology

15. The single user operating system does not have

Correct : C. CPU scheduling module

16. Computers send data to peripherals with the help of

Correct : C. parallel I/O interface

17. Integrated Service Digital Network (ISDN) lines provide

Correct : C. Both data and voice circuits

18. A transaction file is a type of

Correct : A. data file

19. Which of the following programs is not a utility?

Correct : A. spooler

20. The operating system manages

Correct : D. All of these

21. A network consists of interconnected

Correct : A. workstations

22. Which is not true for LAN?

Correct : B. It is a public network.

23. Which of the following is not a transmission medium?

Correct : A. modem

24. Faster data communication is possible using

Correct : A. optical fibre

25. The operation of a digital computer is based on ________ principle.

Correct : C. logical

26. HTML viruses infect

Correct : E. Neither 1) nor 2)

27. The scrambling of code is known as

Correct : A. encryption

28. Which of the following moves the cursor one space to the right to put spaces in between words?

Correct : B. Space bar

29. When your computer suddenly stops working, it is referred to as

Correct : A. crash

30. A program that works like a calculator for keeping track of money and making budgets, is called

Correct : B. Spreadsheet

31. The most frequently used instructions of a computer program are likely to be fetched from

Correct : B. cache memory

32. Verification of a login name and password is known as

Correct : C. authentication

33. In a ring topology, the computer in possession of the ________ can transmit data.

Correct : D. token

34. You must install a/an ________ on a network if you want to share an Internet connection.

Correct : A. router

35. The system unit of a personal computer typically contains all of the following except

Correct : D. modem

36. A small or intelligent device is so called because it contains within it a

Correct : D. sensor

37. EPROM can be used for

Correct : C. 1) and 2)

38. The 16-bit microprocessor means that it has

Correct : C. 16 data lines

39. What does SNMP stand for?

Correct : D. Simple Network Management Protocol

40. ________ temporarily holds program instructions, data and output until they are no longer needed by the computer.

Correct : D. RAM

41. Basic Input Output System (BIOS) is necessary for

Correct : A. boot-up

42. SQL stands for

Correct : A. Structured Query Language

43. A hard drive consists of spinning ________ made up of aluminum or ceramic that is coated with magnetic media.

Correct : E. platters

44. POST stands for

Correct : C. Power-On Self-Test

45. Which of the following is not an example of a virus?

Correct : D. Tartan

46. A database that spreads information across different tables while maintaining links between them is referred to as

Correct : A. Relational database

47. ________ is a method of storing data on two or more hard drives that work in combination to do the job for a larger drive.

Correct : B. RAID

48. C is a programming language developed for developing

Correct : C. UNIX Operating system

49. First RAM chip was introduced by which of the following?

Correct : B. Intel

50. A specialised network device that determines the next network point to which it can forward a data packet towards the destination of the packet is commonly known as

Correct : B. router

51. Timing and control unit is a part of a(n)

Correct : B. Processor

52. Chip is the common name for a(n)

Correct : C. integrated circuit

53. Malicious software is known as

Correct : B. malware

54. Name the key that will erase information from the computer memory and characters on the screen.

Correct : B. Delete key

55. ________ determines the appearance of your desktop and controls the performance of your hardware.

Correct : D. Control Panel

56. The processing capability of a microcomputer can be enhanced with the help of

Correct : C. expansion card

57. Which view is not available in Microsoft Word 2007?

Correct : C. Page Break

58. The collection of commands is called

Correct : B. program

59. Recycle Bin enables you to restore a file which was deleted from

Correct : B. Drive C

60. ________ bar appears immediately below the title bar and provides access to pull-down menus.

Correct : B. Menu

61. By default, number entries are

Correct : A. rightied aligned

62. ________ process rearranges file fragments into contiguous files.

Correct : B. Defragmentation

63. The memory card which is conceptually related to the smart card but is similar to the video disk, is

Correct : D. Laser card

64. The main advantage of magnetic disk compared to magnetic tape is

Correct : C. direct access

65. Which of the following printers is used in conjunction with computers and uses dry ink powder?

Correct : D. Laser printer

66. Another term for the Internet is

Correct : C. cyberspace

67. Which of the following topologies is not of broadcast type?

Correct : C. Ring

68. Enterprise storage unit that uses DVD and CD discs as the storage medium is

Correct : C. jukebox

69. The function of the ‘home key’ in a microcomputer is

Correct : B. to reposition the cursor

70. A computer user obsessed with gaining entry into highly secured computer system is called a(n)

Correct : D. Cracker

71. The programming team fixes program errors discovered by users during

Correct : A. program maintenance

72. A data type used for nontextual data like pictures, sound and videos is called

Correct : B. OLE object data type

73. A(n) ________ is a system that is used for capturing knowledge from books and experienced individuals making it available where needed.

Correct : D. knowledge management system

74. Computer’s language consisting of binary numbers that directly corresponds to its electrical state is called

Correct : C. Machine language

75. ________ is a type of computer crime in which knowledgeable thieves remove some of the computer’s RAM chips but leave enough to start the computer.

Correct : A. Memory shaving

76. The ________ is a portion of Internet that contains billions of documents.

Correct : C. www

77. Which of the following is not a program command?

Correct : E. GO TO

78. GDI represents

Correct : C. Graphics Device Interface

79. A robot consists of three basic components: power supply, memory and

Correct : B. arm

80. Status indicators are located on the

Correct : C. formula bar

81. What is the acronym for Dual-In-Line Memory Module?

Correct : A. DIMM

82. Data division is the third division of a ________ program.

Correct : D. BASIC

83. ________ file is created in Microsoft Excel.

Correct : C. Data

84. The view that shows the maximum amount of information about each file in My Computer is called

Correct : D. details

85. Error messages in an Excel sheet starts with _______ sign/symbol.

Correct : C. #

86. In SIO2 the figure 2 appears lowered. Which effect has been applied?

Correct : E. Subscript

87. Dvorak is used with reference to

Correct : D. Keyboard

88. Which of the following codes is written into serially accessed memory?

Correct : A. EOD code

89. ________ program is used to detect overall system malfunction.

Correct : D. System diagnostics

90. To separate mechanism from policy ________ is used in operating system.

Correct : B. two-level implementation

91. ________ is the combination of keys to cut the selected text.

Correct : A. CTRL + X

92. A portion of disk that is unable to store data reliably is a

Correct : C. bad section

93. A unit of measurement, ________ is equal to approximately 1 septillion bytes.

Correct : B. Yotta byte

94. Which of the following is used for broadband communications?

Correct : D. All the above

95. ________ a document means the file is transferred from your computer to another computer.

Correct : E. Uploading

96. A(n) ________ allows you to communicate over the internet similar to a newsgroup but is easier to use.

Correct : C. message board

97. A computer program used by search engine to roam the World Wide Web via the Internet, is

Correct : B. spider

98. A simple automated program that scans the web for specific data and insert into a designated database.

Correct : C. Web crawler

99. In web searching a symbol or keyword that instructs the search software to make sure that any retrieved records contain a certain word, is called

Correct : D. Inclusion operator

100. Which of the following is a characterstic(s) of education software?

Correct : D. All the above