Quiznetik

Important Computer MCQs For Competitive Exams part-1 | Set 17

1. Which of the following is not a type of computer software which can be bought?

Correct : E. All of these can be purchased

2. You can use………….to copy selected text, and………….to paste it in a document.

Correct : A. CTRL + C, CTRL + V

3. Video processors consists of………and ………..which store and process images.

Correct : D. VGI and DVI

4. Hard disk drives are considered……… storage.

Correct : B. nonvolatile

5. A(n)……….uses laser technology to store large amounts of information

Correct : B. compact disk read-only memory (CD- ROM)

6. A(n)………is a combination of hardware and software that facilitates the sharing of information between computing devices.

Correct : A. network

7. When sending an e-mail the………the describes the contents of the message.

Correct : B. subject

8. A program designed to destroy data on your computer which can travel to ‘infect’ other computers is called a…………

Correct : D. virus

9. What are bas, xis, and htm examples of?

Correct : C. Extensions

10. The side bar in a window or word processor that has an arrow on both ends and a box in the middle that you use your mouse to move the pages up or down……….

Correct : A. scroll bar

11. A(n)………is a device that electronically processes data, converting it to information.

Correct : B. computer

12. The place where the computer stores programs and data is called…………

Correct : A. Memory

13. Why is the Caps Lock key refered to as a toggle key?

Correct : A. Because its function goes back and forth every time it is pressed

14. One puts information into the computer by pressing this key……….

Correct : C. enter

15. To add or put into your document such as a picture or text use………..

Correct : B. insert

16. A key that must be pressed each time a new command or information is entered………..

Correct : B. enter

17. Computers use the………….system to process data.

Correct : C. binary

18. These provide expansion capability for a computer system.

Correct : B. slots

19. A(n)………..allows sharing of a broadband internet connection.

Correct : C. router

20. The clock rate of a processor is measured in………..

Correct : E. megahertz or gigahertz

21. A computer virus normally attaches itself to another computer program known as a…….

Correct : C. trojan horse

22. These devices translate data and programs that humans can understand into a form that the computer can process.

Correct : B. input

23. The amount of time required by a storage device to retrieve data and programs is its……

Correct : E. access speed

24. A 32-bit word computer can access bytes at a time.

Correct : A. 4

25. A megabyte is actually equal to………. kilobytes.

Correct : C. 1024

26. The main memory of a computer must be large enough to contain the active parts of……..

Correct : C. input/output storage & working storage

27. This type of memory improves processing by acting as a temporary high-speed holding area between the memory and the CPU.

Correct : C. cache memory

28. The smallest unit in a digital system is a………

Correct : C. Word

29. ……….ports connect special types of music instruments to sound cards.

Correct : D. MIDI

30. Software you can use to create a budget is called……….

Correct : D. spreadsheet software

31. The mouse …………usually appears in the shape of an arrow.

Correct : D. pointer

32. If a processor has a word size of 32 bits, compared to a processor with a word size of 16 bits, it can process……….at a time.

Correct : E. twice as much

33. The most common storage device for the personal computer is the………

Correct : D. hard disk drive

34. Numbers and formulae entered in a cell are called……….

Correct : B. numeric entries

35. What is software?

Correct : C. A set of instructions for your computer

36. Thick, rigid metal platters that are capable of storing and retrieving information at a high rate of speed are known as……….

Correct : A. hard disks

37. What is windows explorer?

Correct : E. A file manager

38. ………is the most popular internet activity.

Correct : C. Searching

39. Computers process binary numbers, which are composed of…………

Correct : C. 1s and 10s

40. A DVD is an example of a(n)…………

Correct : B. optical disc

41. URL stands for…………

Correct : E. Uniform Resource Locator

42. When data changes in multiple lists and all lists are not updated, this causes……….

Correct : D. data inconsistency

43. What is a backup?

Correct : B. An exact copy of a sys em’s information

44. The Internet is…………

Correct : A. a large network of networks

45. What is the storage area for email messages called?

Correct : B. A mailbox

46. One advantage of dial-up Internet access is………….

Correct : E. it utilizes existing telephone service

47. An error in a computer program……….

Correct : C. bug

48. Access control based on a person’s fingerprints is an example of………..

Correct : A. biometric identification

49. The patterns of printed lines on most products are called…………

Correct : E. barcodes

50. Most mail programs automatically complete the following two parts in an e-mail…………

Correct : B. From : and Date :

51. The computer’s capability of distinguishing spoken words is called………….

Correct : E. vocalization

52. Which of the following is an advantage of mounting an application on the Web?

Correct : D. All of these

53. ERP is an acronym for…………..

Correct : C. Enterprise Resource Planning

54. The software that allows users to surf the Internet is called a/an………..

Correct : D. Browser

55. The issues that deal with the collection and use of data about individuals is………….

Correct : E. privacy

56. A term relating to sending data to a satellite is……….

Correct : D. uplink

57. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current documents or to other documents with related information are called………….

Correct : B. hypertext

58. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and……… security is concerned with protecting software from unauthorized tampering or damage.

Correct : B. cyber

59. Unauthorized copying, of software to be used for personal gain instead of for personal backups is called……….

Correct : C. software piracy

60. What is usually used for displaying information at public places?

Correct : D. Touch Screen Kiosks

61. What is MP3?

Correct : C. A Sound format

62. What is the most popular hardware for multimedia creations?

Correct : A. PCs

63. For sound recording, what is necessary?

Correct : B. Microphone

64. The…………..settings are automatic and standard.

Correct : A. default

65. What are the two parts of an E-mail address?

Correct : C. User name and domain name

66. Participants can see and hear each other in a……….

Correct : E. Video

67. Magnetic tape is not practical for applications where data must be quickly recalled because tape is………..

Correct : B. Expensive

68. Which of the following will you require to hear music on your computer?

Correct : E. Sound Card

69. The signal that a computer is waiting for a command from the user………….

Correct : A. prompt

70. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page……….

Correct : A. Web browser

71. For viewing video CDs, you would use …………

Correct : B. Windows Media Player

72. Executing more than one program concurrently by one user on one computer is known as…………..

Correct : B. multiprocessing

73. You can keep your personal files/folders in ………….

Correct : B. My Documents

74. Three types of compact disks include CD- ROM, CD-R, and …………..

Correct : D. CD-RW

75. All computers must have…………

Correct : B. An operating system

76. Collecting personal information and effectively posing as another individual is known as the crime of …………

Correct : D. identify theft

77. Computers manipulate data in many ways, and this manipulation is called…………

Correct : B. processing

78. Creating a…………means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.

Correct : E. backup

79. The main system board of a computer is called the………….

Correct : B. motherboard

80. Peripheral devices such as printers and monitors are considered to be…………

Correct : A. hardware

81. In a computer most processing takes place in………………

Correct : C. CPU

82. Tangible parts of computer are called :

Correct : D. Memory

83. Collection of programs that control the computer system and process the information is called :

Correct : E. Operating system

84. ………….is an unit of measurement that is equal to 1,048,576 bytes or one million byte :

Correct : D. megabyte

85. Which of the following is permanent memory?

Correct : B. ROM

86. A round, shiny and portable disk that can store software and information in large quantity is………….

Correct : A. CD-ROM

87. Tape drive offer…………..access to data :

Correct : D. sequential

88. How many values can be represented by a single byte?

Correct : D. 256

89. A………device can connect to a network without cable.

Correct : D. wireless

90. You can………..with the help of CD.

Correct : C. read and write

91. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of…………….

Correct : D. 8 bits

92. The result of the computer processing your input is referred to as :

Correct : A. output

93. An equipment that holds the screen is called:

Correct : D. monitor

94. A…….is a device attached to a host computer through cable.

Correct : E. peripheral

95. To keep files organized, related documents are often stored in……….(also called directories) located on the storage medium.

Correct : C. folders

96. Keyboards, scanners, and microphones are examples of………….

Correct : B. input devices

97. You use a(n)………such as keyboard or mouse, to input information.

Correct : E. input device

98. A………is a collection of information saved as a unit.

Correct : E. file

99. An electronic component that can be programmed to perform tasks is a………….

Correct : B. microprocessor

100. A……….is a long, rubber-coated bundle of wires, with plugs on either end, that connects computer parts.

Correct : B. Cable