0% found this document useful (0 votes)
12 views30 pages

75 MCQ Computer

Uploaded by

iammehul297
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views30 pages

75 MCQ Computer

Uploaded by

iammehul297
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

1.

The performance of a hard drive or other storage device,


meaning how long it takes to locate a file is called ?

[A] Response Time


[B] Access Time
[C] Quick Time
[D] None of the above

2. slogan “Write once, run anywhere” is related to which of


the following programming languages?

[A] COBOL
[B] Java
[C] HTML
[D] XML

3.Which of the following device is a volatile storage?

[A] RAM
[B] Hard disk
[C] Magnetic Tape
[D] Floppy disk

4.Which among the following is the time period during which


a computer is malfunctioning or not operating correctly due to
machine failures?

[A] Down time


[B] Up time
[C] Response time
[D] Run time

5.Dynamic Adhoc Wireless Networks (DAWN) usually come


under ___?

[A] 2G
[B] 3G
[C] 4G
[D] 5G

6. was UNIVAC?
[A] A computer
[B] A Super computer
[C] A software Programme
[D] A Computer Manufacturer

7.Which among the following was India’s first Teraflop


supercomputer?

[A] PARAM 10000


[B] PARAM Yuva
[C] PARAM Padma
[D] PARAM 9000/ss

8.Which among the following is NOT a web browser?

[A] SpaceTime
[B] NeoPlanet
[C] Sputnik
[D] MeeGo
9.Modern computers follow a generalised set of instructions
to perform any function. What are these instructions better
known as?

[A] Language
[B] Instructions
[C] Commands
[D] Programs

10.When some unidentified / unknown person / firm sends


you mail in a trustworthy /lucrative way asking for sensitive
banks and online payment information, this is a case of __?

[A] Spam
[B] Hacking
[C] Phishing
[D] Vishing

11.What do we call a storage device where the access time is


effectively independent of the location of the data?
[A] Direct Access Storage Device
[B] Secondary Storage Device
[C] Primary Storage Device
[D] Gateway Device

12.While browsing internet, what do we call the area of


storage that compensates for the different speeds of data
flow or timings of events by temporarily holding a block of
data that is waiting to be processed?

[A] Cache
[B] Buffer
[C] Flash
[D] Trash

13.Which of the following audio / video formats was


developed by Microsoft?

[A] MPEG
[B] ADX
[C] WMA
[D] AVS

14.Which of the following blogging platform was first


launched by Pyra Labs?

[A] WordPress
[B] Blogger
[C] Typepad
[D] Twitter

15.Which of the following is not the basic capability of a


computer?

[A] Speed
[B] Accuracy
[C] Prediction
[D] Processing

16.A communication system which transfers data between


the components inside a computer or even between
computers is known as
[A] Bus
[B] Wire
[C] Knot
[D] Line

17. CPU and Memory are located in which of the following ?

[A] Expansion Board


[B] Mother Board
[C] Storage Device
[D] Output Device

18.What is the storage element for a static RAM ?

[A] Diode
[B] Resistor
[C] Capacitor
[D] Flip-flop
19.Which of the following consist of the computer main
memory?

[A] Hard drive and RAM


[B] CD-ROM and hard drive
[C] RAM and ROM
[D] CMOS and hard drive

20.Which of the following is the use of nano control memory ?

[A] Improve the speed of execution


[B] Reduce the overall control memory size
[C] Reduce the complexity of hardware
[D] None of the Above

21.Which of the following is the ability of a system to jump


directly to the requested data?

[A] Sequential Access


[B] Random Access
[C] Quick Access
[D] All of the Above

22. of the following is responsible for the fixed disk error?

[A] Slow RAM


[B] Slow Processor
[C] Incorrect CMOS settings
[D] None of the Above

23.What is the full form of ESD?

[A] Electric supply Delay


[B] Electrostatic Discharge
[C] Electric Software Duty
[D] None of the Above

24.If your computer is overheating, Which of the following


things you can do about it?

[A] Ensure Proper Ventilation


[B] Clean Out Computer’s Case
[C] Tune Up Heat Sinks
[D] All of the Above
Quiz Bot:
25.The smallest unit in which data can be stored is known by
which of the following names?

[A] Bit
[B] Byte
[C] Kilobyte
[D] Megabyte

26.Which of the following correctly define the meaning of the


word Kernel?

[A] It is the set of primitive functions upon which the rest of


operating system functions are built up.
[B] It is considered as the shell of the operating system.
[C] It is the software which monitors the operating system.
[D] All of the Above
27.Garnet Operating System was developed to be used in
which of the following devices?

[A] Laptops
[B] PDAs
[C] Smartphones
[D] Both b and c

28.Which of the following is necessary for an application


software to be used ?

[A] Money
[B] Antivirus
[C] Software Engineering
[D] Software License

29.Which of the following is the Calendar application


developed by Mozilla Foundation?
[A] Sunbird
[B] Seabird
[C] Thunder
[D] Seamonkey

30.Which of the following are the features of a Spreadsheet?

[A] Layers and Lines


[B] Rows and Columns
[C] Layers and Planes
[D] Height and Width

31. of the following is the form designer software application?

[A] Pendragon Forms


[B] Handbase Designer
[C] Vector Forms
[D] All of the Above
32.Which of the following is the numerical computing
software for scientists and mathematicians?

[A] MATLAB
[B] EDGE
[C] Excel
[D] Arc

33.Which of the following are the other terms used for


Software Decay?

[A] Code Rot


[B] Bit Rot
[C] Software Erosion
[D] All of the Above

34.What is the name given to the program capable of running


on any computer regardless of the operating system?
[A] Applet
[B] Back-end
[C] Open source software
[D] All of the Above

35.Which of the following is the term used for the way in


which multiple teams of developers collaborate on a software
project?

[A] Iterative
[B] Agile
[C] Waterfall
[D] Front End

36.Who among the following developed the LISP


programming language family?

[A] Ken Thompson


[B] Donald Knuth
[C] John McCarthy
[D] Von Belt

37.Which among the following are the basic components of a


relational database model?

[A] Table
[B] Record
[C] Field
[D] All of the Above

38.Which of the following are the objects in Microsoft Access?

[A] Tables
[B] Queries
[C] Reports
[D] All of the Above
39.Data query languages are computer languages used to
make queries in databases and information systems.Which
among the following are the the Query Languages?

[A] Atomese
[B] Cypher
[C] Datalog
[D] All of the Above

40.Which of the following is the term used to describe the


process of forecasting in data?

[A] Data integrity


[B] Data Mining
[C] Data Encryption
[D] PERT Chart

41.What is the name given to the special type of stored


procedure that automatically executes when an event occurs
in the database server?
[A] Deadlock
[B] Trigger
[C] Instance
[D] Rollback

42.What is the full form of DHCP?

[A] Dynamic Host Configuration Protocol


[B] Destined Host Configuration Protocol
[C] Data Hosting Central Protocol
[D] Dynamic Housing Central Protocol

43.Which one of the following is the first scientist to bring the


idea of Personal Area Network?

[A] Nickey Jobs


[B] Hardley Jesley
[C] Thomas Zimmerman
[D] None of the Above

44.Which of the following noise may occur when signals at


different frequencies share the same transmission medium?

[A] White noise


[B] Intermodulation noise
[C] Cross talk
[D] Impulse noise

45.Which of the following cables work on the properties of


light?

[A] Coaxial cables


[B] Twisted pair
[C] Fiber optics
[D] None

46.What role does fibers play in Optical Fiber cables?


[A] Prevent loss of signals
[B] Provide immunity against electromagnetic interference
[C] Both a and b
[D] None

47.What is the full form of GSM?

[A] Geographic System for Mobile


[B] Great System of Mobile
[C] Geographic Special Mobile
[D] Global System for Mobile

48.Which university was connected for the first time with the
Stanford Research Institute under ARPANET?

[A] University of California


[B] University of Michigan
[C] Harvard University
[D] University of New York

49.Which of these provided the first online service to offer


electronic mail capabilities to personal computer users?

[A] APPLE
[B] Microsoft
[C] CompuServe
[D] NPL

50.What is the name of the first computer virus, that affected


ARPANET?

[A] Mayhem
[B] Creeper
[C] Boom
[D] Attack

51.Which of the following is not true about Internet access


through satellites?
[A] Can be used anywhere around the world
[B] Can get affected by rain and snow
[C] Slower than dial up connection
[D] None of the above

52.Which of these network topologies have all the network


nodes connected directly to each other?

[A] Bus
[B] Mesh
[C] Star
[D] Tree

53.Which of the following transmission medium has


categories named as RG-58, RG-59 and RG-11?

[A] Coaxial cables


[B] Twisted pair cables
[C] Fiber Optics
[D] None

54.What is the bandwidth limit for CAT2 cable?

[A] upto 1 Mbps


[B] upto 4 Mbps
[C] upto 10 Mbps
[D] upto 100 Mbps

55.Which of these is not an unguided mode of transmission?

[A] Infrared
[B] Radiowaves
[C] Optical Fiber
[D] Microwaves

56.Where does the bending of EM waves occurs in the


atmosphere?
[A] Troposphere
[B] Mesosphere
[C] Stratosphere
[D] Ionosphere

57.Which of the following IEEE standards ZIGBEE is based on?

[A] IEEE 802.11.4


[B] IEEE 802.13.4
[C] IEEE 802.15.4
[D] IEEE 802.17.4

58.What does UDP stand for?

[A] Uninterrupted Delivery Protocol


[B] User Destination Pairing
[C] Uninterrupted Data Parsing
[D] User Datagram Protocol
59.Which of these network protocol is used to synchronize the
time of a server to another server?

[A] IGMP
[B] ARP
[C] NTP
[D] SSH

60.When was Chrome web browser launched?

[A] 2005
[B] 2008
[C] 2011
[D] 2000

61.What is the default file extension of MS PowerPoint 2003?

[A] .doc
[B] .acs
[C] .xls
[D] .ppt

62.What is motion path in MS PowerPoint?

[A] An animation entrance effect


[B] A tool to narrate the story
[C] Ordering of various slides
[D] None of the above

63.Which of these keys is used to view the slideshow in MS


PowerPoint?

[A] F11
[B] F6
[C] F8
[D] F5
64.What is the best way to add a background image to all the
slides?

[A] By adding a background image to the first slide


[B] By using Autocorrect option
[C] By editing the master slide
[D] It is not possible in MS PowerPoint

65.What is MS Access?

[A] A RDBMS
[B] An OODBMS
[C] An ORDBMS
[D] A Network Database Model

66.What is the use of Cascade Delete option in MS Access?

[A] Deletes all records of a table


[B] Deletes all records with duplicate values
[C] Deletes all records automatically when the record is
deleted in the parent table
[D] Makes a Duplicate table

67.Who invented the first email program?

[A] Tim Berners-Lee


[B] Ray Tomlinson
[C] Ajay Bhatt
[D] Dav Moron

68.Which of these is not an email service provider?

[A] Yahoo
[B] Rediff
[C] WhatsApp
[D] Hotmail
69.Which of the following feature is not available in MS
Word?

[A] Mail Merge


[B] Tables
[C] PHP coding
[D] WYSIWYG editing

70.What is the use of ‘Ctrl + ;’ key combination in MS Excel?

[A] Inserts current date


[B] Inserts current time
[C] Inserts current day
[D] Inserts current timestamp

71.How to insert current time in a cell in MS Excel?

[A] By pressing Ctrl + Shift + T


[B] By pressing Ctrl + Shift + (
[C] By pressing Ctrl + Shift + :
[D] None of the above

72.What is an Outbox in the email service?

[A] Place to keep deleted emails


[B] Emails which are received are kept here
[C] Copies of email are kept here which are to be sent
[D] None

73.What is the name of the attack which happens when a


malefactor executes a SQL query to the database via the input
data from the client to server?

[A] Password attack


[B] Sandboxing
[C] SQL injection attack
[D] None of the above
74.Mobile Money Identifier is a 7 digit number that facilitates
fund transfer in mobile banking. Which of these bodies issues
MMID?

[A] RBI
[B] NPCI
[C] Banks
[D] Telecom Companies

You might also like