Important Computer MCQs For Competitive Exams part-1 | Set 2
1. In the right setting a thief will steal your
information by simply watching what you type.
Correct : D. shoulder surfing
2. A………..is a small program embedded inside of a GIF image.
Correct : A. web bug
3. A hacker contacts you my phone or email and attempts to acquire your password
Correct : B. phishing
4. A hacker that changes or forges information in an electronic resource, is engaging in………
Correct : D. data diddling
5. Hackers often gain entry to a network be pretending to be at a legitimate computer.
Correct : C. IP spoofing
6. The………..of a threat measures its
potential impact on a system.
Correct : C. degree of harm
7. The power level drops below 120V.
Correct : C. blackout
8. Which of the following is NOT a Microsoft Internet tool or technology?
Correct : A. Dreamweaver
9. A protocol used to control the secure sending of data on the internet is :
Correct : B. HTTPS
10. Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ………..
Correct : A. software suites
11. ……………terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
Correct : D. Point-of-Sale (POS)
12. The OSI model is divided into
…………processes called layers.
Correct : C. seven
13. ………..are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
Correct : B. Embedded computers
14. In a ring topology, the computer in possession of the………can transmit data
Correct : D. token
15. …………Viruses are often transmitted by a floppy disk left in the floppy drive
Correct : B. Boot sector
16. A database management system (DBMS) is a………..
Correct : D. software system used to create, maintain, and provide controlled access to a database.
17. A Proxy server is used for which of the following?
Correct : B. To process client requests for web pages
18. ……….are words that a programming language has set aside for its own use.
Correct : B. Reserved words
19. What is the primary difference between a
virus and a worm?
Correct : C. A virus is very harmful to the computers it infects; a worm is not a serious a problem
20. ………..describe what is database fields.
Correct : D. Field names
21. A goal of normalization is to………….
Correct : D. minimize the numbe of redundancy
22. A(n)………….uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
Correct : B. GUI
23. Communication using a modulated carrier to apply a data signal to a transmission medium in analog form is
Correct : D. Broad band networking
24. ‘ITS’ stands for
Correct : C. Intelligent Tutoring Systems
25. Any piece of equipment forming an interface to a data communication system is
Correct : B. DTA
26. In the language of the computer profession, one thousand position of main storage is represented with the letter
Correct : A. K
27. The control of the jobs running within a system is
Correct : A. Job monitoring
28. The total number of messages handled by a computerized telephone system on a daily basis is an example of :
Correct : D. All of these
29. A device mounted on a communication satellite which receives, amplifies and re- transmits signals from earth station is
Correct : B. Transponder
30. What is the acronym for Single In-Line Memory Module?
Correct : A. SIMM
31. Which type of processing that produces output results immediately after input data are entered into a computer system
Correct : B. Interactive
32. A computer program that instructs other
programs to perform a particular type of operation is
Correct : A. System software
33. The provides a path between the CPU and peripheral devices, which are connected via interface cards
Correct : B. expansion bus
34. Programs prepared by an outside supplier & provided to a user in a machine readable form is known as
Correct : B. Canned program
35. Pictures or drawings, typically displayed on a VDU to allow users to select program options is called
Correct : B. Icons
36. The pieces of equipment which are attached to the CPU of a computer and which it can access are called
Correct : E. peripherals
37. A factor which might cause an individual to consider using a computer in criminal activities is :
Correct : D. All the these
38. The Secure Electronic Transaction (SET) specification
Correct : D. uses a public-key encryption to secure credit-card transaction systems
39. ‘DOS’ floppy disk does not have
Correct : E. BIOS
40. All the information collected during database development is stored in a_
Correct : B. data warehouse
41. The…………component is used by the data analyst to create the queries that access the database.
Correct : B. end-user query tool
42. A polymorphic virus
Correct : A. modifies its program code each time it attaches itself to another program or file
43. Microwave transmission is used in environments where installing physical transmission media is _
Correct : D. easy or promising and where line-of-sight transmission is available
44. Which is NOT a good Web security strategy?
Correct : D. Remove unnecessary compilers and interpreters
45. The word FTP stands for
Correct : D. File Transfer Protocol
46. This…………tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
Correct : A. Client
47. RSA is
Correct : D. Digital Signature
48. A DVD-RAM is similar to a …………except it has storage capacities upto 5.2 GB.
Correct : C. CD-RW
49. How is power supplied to a low-power USB device?
Correct : D. Through the USB cable
50. The………data mining techniques derives rules from real-world case examples.
Correct : C. Neural nets
51. Which of the following objects is passed to a
JavaBean when one of its properties is set via a JSP action?
Correct : C. Servlet Response
52. Graphical diagrams used to represent different multiple perspectives of a system include_
Correct : A. use-case, class, and state diagrams
53. Database redesign is not terribly difficult if the
Correct : E. database is relatively large
54. Which of the following are normally used to initialize a computer system’s hardware?
Correct : A. Bootstrap memory
55. If you wanted to locate the hardware address of a local device, which protocol would you use?
Correct : A. ARP
56. What is Internet 2?
Correct : D. An association to develop advanced Internet technology
57. While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?
Correct : C. Visit a partner site of the organization to see if it is there.
58. Which kind of lock includes a keypad that can be used to control access into areas?
Correct : D. Tumbler
59. Which is not a factor when categorizing a computer?
Correct : E. Where it was purchased
60. Which of the following terms is the most closely related to main memory?
Correct : D. temporary
61. Which of the following is not a factor affecting the processing capability or performance of a PC system?
Correct : B. The revolutions per minute of the printer disk
62. What is the standard code the computer industry created to represent characters?
Correct : C. ASCII
63. Primary storage is………..as compared to secondary storage :
Correct : C. Fast and expensive
64. Offline device is :
Correct : A. a device which is not connected to CPU
65. The most popular language used with microcomputers and time-shared mini computers, is an easy-to-use high level language :
Correct : D. BASIC
66. Which of the following is a communication network that is devoted to carrying computer information :
Correct : C. Data network
67. A half byte is known as :
Correct : D. Nibble
68. With respect to a network interface card the term 10/100 refers to:
Correct : C. megabits per seconds
69. A hard disk is divided into tracks which are further subdivided into :
Correct : B. sectors
70. Which standard govern parallel communications?
Correct : D. IEEE 1284
71. Which peripheral port provides the FASTEST throughput to laser printers?
Correct : C. Parallel
72. Resistance is measured in?
Correct : D. Ohms
73. In Inkjet technology the droplets of ink are deflected by?
Correct : A. multi directional nozzles
74. Which provides the fastest access to large video files?
Correct : C. SCSI hard drives
75. Primary memory stores :
Correct : D. All of these
76. You just installed a new IDE hard drive, but your system BIOS will not recognize the new drive, what should you check first :
Correct : B. jumpers on the hard drive
77. What’s the best way to protect your hard drive data?
Correct : A. regular backups
78. Laser Jet printer speeds are measured in pages per minute (ppm) what do we use to measure dot-matrix printers?
Correct : D. characters per second
79. A modem could be attached to which port?
Correct : A. Parallel port
80. You get a CMOS checksum error during bootup. What is most likely the cause?
Correct : C. CMOS battery is nearing end of life
81. What are the four key functions of a computer system?
Correct : A. input, processing, output, and storage
82. Parity is :
Correct : C. an extra bit stored with data in RAM that is used to check for errors when the data is read back
83. What is different between AT and ATX power supplies?
Correct : C. AT supplies use P8 and P9 power connectors while ATX uses a single P1 connector.
84. What type of connector is used to plug a telephone line into a modem?
Correct : B. RJ-11
85. Which of the following is NOT a type of
computer hard drive?
Correct : B. FDD
86. What does FDISK do?
Correct : D. creates partitions on the hard drive
87. Which of the following is NOT a type of motherboard expansion slot?
Correct : D. ATX
88. Copying a process from memory to disk to allow space for other processes is called :
Correct : A. Swapping
89. Which of the following memory unit that processor can access more rapidly :
Correct : C. Cache Memory
90. Which one of the following is not the function of Operating System?
Correct : C. Networking
91. What is the meaning of “Hibernate” in Windows XP/Windows7?
Correct : D. Shutdown the Computer without closing the running applications
92. Unix Operating System is an :
Correct : D. All of these
93. What should be the extension to execute files?
Correct : D. All of these
94. Which of the following memories need
refresh?
Correct : B. DRAM
95. RJ45 UTP cable has………Cable :
Correct : C. 4 pair
96. Basic is……….language :
Correct : A. a procedural
97. The file system “NTFS” stands for :
Correct : C. New Technology File System
98. Which Operating System doesn’t support networking between computers?
Correct : A. Windows 3.1
99. In which type of the following OS, the response time is very crucial :
Correct : B. Real Time Operating System
100. Which of the following languages is more suited to structured program?