Sunteți pe pagina 1din 24

The term ‘Computer’ is derived C.

OMR
from__________? D. None of these

A. Latin WWW stands for___________?


B. German
C. French A. World Whole Web
D. Arabic B. Wide World Web
C. Web World Wide
Who is the father of Computer? D. World Wide Web

A. Allen Turing A collection of system programs


B. Charles Babbage that controls and co-ordinates the
C. Simur Cray overall operations of a computer
D. Augusta Adaming system is called____________?

The basic operations performed A. System software


by a computer are__________? B. Operating system
C. Utility program
A. Arithmetic operation D. Device driver
B. Logical operation
C. Storage and relative What type of operating system
D. All the above MS-DOS is?

Who is the father of Internet ? A. Command Line Interface


B. Graphical User Interface
A. Chares Babbage C. Multitasking
B. Vint Cerf D. Menu Driven Interface
C. Denis Riche
D. Martin Cooper Which technology is used in
compact disks?
If a computer has more than one
processor then it is known A. Mechanical
as__________? B. Electrical
C. Electro Magnetic
A. Uni-process D. Laser
B. Multiprocessor
C. Multi-threaded 1 Gigabyte is equal to
D. Multi-programming ____________?

A light sensitive device that A. 1024 bits


converts drawing, printed text or B. 1000 megabytes
other images into digital form C. 1024 kilobytes
is___________? D. 1024 megabytes

A. Keyboard The brain of any computer system


B. Scanner is___________?
A. ALU CD-ROM stands for____________?
B. Memory
C. CPU A. Compactable Read Only Memory
D. Control unit B. Compact Data Read Only Memory
C. Compactable Disk Read Only
Which of the following are Memory
components of Central Processing D. Compact Disk Read Only
Unit (CPU) ? Memory

A. Arithmetic logic unit, Mouse ALU is____________?


B. Arithmetic logic unit, Control
unit A. Arithmetic Logic Unit
C. Arithmetic logic unit, Integrated B. Array Logic Unit
Circuits C. Application Logic Unit
D. Control Unit, Monitor D. None of above

Analog computer works on the VGA is____________?


supply of ____________?
A. Video Graphics Array
A.Continuous electrical pulses B. Visual Graphics Array
B.Electrical pulses but not C. Volatile Graphics Array
continuous D. Video Graphics Adapter
C.Magnetic strength
D.None of the above MSI stands for___________?

Read More about this Mcq A. Medium Scale Integrated


Circuits
which one is Digital device, select B. Medium System Integrated
from the choices below? Circuits
C. Medium Scale Intelligent Circuit
A.Digital Clock D. Medium System Intelligent
B.Automobile speed meter Circuit
C.Clock with a dial and two hands
D.All of them WAN stands for_____________?

The computer that process both A. Wap Area Network


analog and digital is B. Wide Area Network
called____________? C. Wide Array Net
D. Wireless Area Network
A.Analog computer Read More about this Mcq
B.Digital computer
C.Hybrid computer What is the main difference
D.Mainframe computer between a mainframe and a super
computer?
Read more about this Mcq
A. Super computer is much larger A. User interface
than mainframe computers B. Language translator
B. Super computers are much C. Platform
smaller than mainframe computers D. Screen saver
C. Supercomputers are focused to
execute few programs as fast as The first computers were
possible while mainframe uses its programmed using___________?
power to execute as many
programs concurrently A. Assembly language
D. Supercomputers are focused to B. Machine language
execute as many programs as C. Source code
possible while mainframe uses its D. Object code
power to execute few programs as
fast as possible. __________is a combination of
hardware and software that
_________ is called the father of facilitates the sharing of
modern digital computer? information between computing
devices.
A. Leibnitz
B. Blaise Pascal A. Network
C. Charles Babbage B. Peripheral
D. J.H Muller C. Expansion board
D. Digital device
Who is the father of Computer
science? Coded entries which are used to
gain access to a computer system
A. Allen Turing are called__________?
B. Charles Babbage
C. Simur Cray A. Entry codes
D. Augusta Adaming B. Passwords
C. Security commands
A CPU contains___________? D. Code words

A. a card reader and a printing Which of the following statements


device is true about Minicomputer and
B. an analytical engine and a Microcomputer?
control unit
C. a control unit and an A. Minicomputer works faster
arithmetic logic unit than Microcomputer
D. an arithmetic logic unit and a B. Microcomputer works faster than
card reader Minicomputer
C. Speed of both the computers is
Which of the following controls the same
the process of interaction D. The speeds of both these
between the user and the computers cannot be compared with
operating system? the speed of advanced
You can organize files by storing MICR stands for_________?
them in__________?
A. Magnetic Ink Character Reader
A. archives B. Magnetic Ink Code Reader
B. folders C. Magnetic Ink Cases Reader
C. indexes D. None
D. lists
EBCDIC stands for__________?
What type of resource is most
likely to be a shared common A. Extended Binary Coded
resource in a computer Network? Decimal Interchange Code
B. Extended Bit Code Decimal
A. Printers Interchange Code
B. Speakers C. Extended Bit Case Decimal
C. Floppy disk drives Interchange Code
D. Keyboards D. Extended Binary Case Decimal
Interchange Code
Which device is required for the
Internet connection? Which of the following is a part of
the Central Processing Unit?
A. Joystick
B. Modem A. Printer
C. CD Drive B. Key board
D. NIC Card C. Mouse
D. Arithmetic & Logic unit
What is a light pen?
CAD stands for_________?
A. A Mechanical Input device
B. Optical input device A. Computer aided design
C. Electronic input device B. Computer algorithm for design
D. Optical output device C. Computer application in design
D. Computer analogue design
UNIVAC is___________?
Junk e-mail is also
A. Universal Automatic Computer called_________?
B. Universal Array Computer
C. Unique Automatic Computer A. spam
D. Unvalued Automatic Computer B. spoof
C. sniffer script
The capacity of 3.5 inch floppy D. spool
disk was__________?
which statement describe
A. 1.40 MB “Hackers”?
B. 1.44 GB
C. 1.40 GB
D. 1.44 MB
A. all have the same motive A. The programme which arrives by
B. break into other people’s being wrapped in box.
computers B. The programme which is the
C. may legally break into computers permanent part of the computer
as long as they do not do any C. The computer which is the part of
damage a big computer
D. are people who are allergic to D. The computer and software
computers system that control the machine

What type of computers are client First page of Website is termed


computers (most of the time) in a as__________?
client-server system?
A. Homepage
A. Mainframe B. Index
B. Mini-computer C. JAVA script
C. Microcomputer D. Bookmark
D. PDA
When a file is saved for the first
A computer cannot ‘boot’ if it does time?
not have the__________?
A. a copy is automatically printed
A. Compiler B. it must be given a name to
B. Loader identify it
C. Operating System C. it does not need a name
D. Assembler D. it only needs a name if it is not
going to be printed
The amount of vertical space
between lines of text in a Where are data and programme
document is called___________? stored when the processor uses
them?
A. double-space
B. line spacing A. Main memory
C. single space B. Secondary memory
D. vertical spacing C. Disk memory
D. Programme memory
Example of non-numeric data
is_________? __________represents raw facts,
where-as__________is data made
A. Employee address meaningful?
B. Examination score
C. Bank balance A. Information, reporting
D. All of these B. Data, information
C. Information, bits
What is embedded system? D. Records, bytes
What characteristic of read-only Which of the following is a storage
memory (ROM) makes it useful? device?

A. ROM information can be easily A. Tape


updated. B. Hard Disk
B. Data in ROM is non-volatile, C. Floppy Disk
that is, it remains there even D. All of the above
without electrical power.
C. ROM provides very large amounts When did John Napier develop
of inexpensive data storage. logarithm?
D. ROM chips are easily swapped
between different brands of A. 1416
computers. B. 1614
C. 1641
What do you call the programs D. 1804
that are used to find out possible
faults and their causes? MIS is designed to provide
information needed for effective
A. operating system extensions decision making by?
B. cookies
C. diagnostic software A. Consumers
D. boot diskettes B. Workers
C. Foremen
Which programming languages are D. Managers
classified as low level languages?
ASCII stands for__________?
A. BASIC, COBOL, Fortran
B. Prolog A. American Stable Code for
C. C, C++ International Interchange
D. Assembly languages B. American Standard Case for
Institutional Interchange
Which of the following is not anti- C. American Standard Code for
viruses software? Information Interchange
D. American Standard Code for
A. Avira Interchange Information
B. Kaspersky
C. Oracle Which of the following is first
D. McAfee generation of computer?

What does DMA stand for? A. EDSAC


B. IBM-1401
A . Distinct Memory Access C. CDC-1604
B. Direct Memory Access D. ICL-2900
C. Direct Module Access
D. Direct Memory Allocation IBM 1401 is_________?
A. First Generation Computer C. MICR
B. Second Generation Computer D. All of above
C. Third Generation Computer
D . Fourth Generation Computer The output quality of a printer is
measured by____________?
Chief component of first
generation computer A. Dot per inch
was__________? B. Dot per sq. inch
C. Dots printed per unit time
A. Transistors D. All of above
B. Vacuum Tubes and Valves
C. Integrated Circuits In analogue
D. None of above computer_____________?

Second Generation computers A. Input is first converted to digital


were developed during___________? form
B. Input is never converted to
A. 1949 to 1955 digital form
B. 1956 to 1965 C. Output is displayed in digital
C. 1965 to 1970 form
D. 1970 to 1990 D. All of above

The computer size was very large In latest generation computers,


in__________? the instructions are
executed___________?
a. First Generation
b. Second Generation A. Parallel only
c. Third Generation B. Sequentially only
d. Fourth Generation C. Both sequentially and parallel
D. All of above
Microprocessors as switching
devices are for Who designed the first electronics
___________generation computers? computer – ENIAC?

A. First Generation A. Van-Neumann


B. Second Generation B. Joseph M. Jacquard
C. Third Generation C. J. Presper Eckert and John W
D. Fourth Generation Mauchly
D. All of above
Which of the following devices can
be sued to directly image printed Who invented the high level
text? language “C”?

A. OCR A. Dennis M. Ritchie


B. OMR B. Niklaus Writh
C. Seymour Papert C. Father board
D. Donald Kunth D. Breadboard

Personnel who design, program, What is meant by a dedicated


operate and maintain computer computer?
equipment refers to__________?
A. Which is used by one person only
A. Console-operator B. Which is assigned one and only
B. Programmer one task
C. Peopleware C. Which uses one kind of software
D. System Analyst D. Which is meant for application
software
Human beings are referred to as
Homosapinens, which device is The system unit of a personal
called Sillico Sapiens? computer typically contains all of
the following except:
A. Monitor
B. Hardware A. Microprocessor
C. Robot B. Disk controller
D. Computer C. Serial interface
D. Modem
An error in software or hardware is
called a bug. What is the A computer program that converts
alternative computer jargon for it? an entire program into machine
language is called a/an
A. Leech
B. Squid A. Interpreter
C. Slug B. Simulator
D. Glitch C. Compiler
D. Commander
Modern Computer are very reliable
but they are not___________? A computer program that
translates one program
A. Fast instructions at a time into
B. Powerful machine language is called
C. Infallible a/an___________?
D. Cheap
A. Interpreter
Personal computers use a number B. CPU
of chips mounted on a main C. Compiler
circuit board. What is the common D. Simulator
name for such boards?
A small or intelligent device is so
A. Daughter board called because it contains within it
B. Motherboard a________?
A. Computer A. Babbage
B. Microcomputer B. Bill Gates
C. Programmable C. Bill Clinton
D. Sensor D. Satya Nadella

A fault in a computer program Which of the following are input


which prevents it from working devices?
correctly is known as___________?
A. Keyboard
A. Boot B. Mouse
B. Bug C. Card reader
C. Biff D. Any of these
D. Strap
Examples of output devices are?
A self replicating program, similar
to a virus which was taken from a A. Screen
1970s science fiction novel by B. Printer
John Bruner entitled the C. Speaker
Shockwave Rider is__________? D. All of these

A. Bug Which of the following is also


B. Vice known as brain of computer?
C. Lice
D. Worm A. Control unit
B. Central Processing unit
Unwanted repetitious messages, C. Arithmetic and language unit
such as unsolicited bulk e-mail is D. Monitor
known as_________?
____________translates and executes
A. Spam program at run time line by line?
B. Trash
C. Calibri A. Compiler
D. Courier B. Interpreter
C. Linker
DOS stands for____________? D. Loader

A. Disk Operating System RAM stands for___________?


B. Disk operating session
C. Digital Operating System A. Random origin money
D. Digital Open system B. Random only memory
C. Read only memory
Who is the Current CEO of D. Random access memory
Microsoft?
1 Byte =___________?
A. 8 bits C. Storage
B. 4 bits D. File
C. 2 bits
D. 9 bits ___________ is the key to close a
selected drop -down list; cancel a
The device used to carry digital command and close a dialog box.
data on analogue lines is called
as_________? A. TAB
B. SHIFT
A. Modem C. ESC
B. Multiplexer D. F10
C. Modulator
D. Demodulator ___________is the key we use to run
the selected command?
BIOS stands for__________?
A. SHIFT
A. Basic Input Output system B. TAB
B. Binary Input output system C. ENTER
C. Basic Input Off system D. CTRL
D. all the above
____________Is the functional key to
Father of “C‘ programming display save-as box?
language?
A. F5
A. Dennis Ritchie B. F6
B. Prof John Keenly C. F9
C. Thomas Kurtz D. F12
D. Bill Gates
Data becomes____________when it
The instructions that tell a is presented in a format that
computer how to carry out the people can understand and use.
processing tasks are referred to as
computer___________? A. processed
B. graphs
A. programs C. information
B. processors D. presentation
C. input devices
D. memory modules The term___________designates
equipment that might be added to
An area of a computer that a computer system to enhance its
temporarily holds data waiting to functionality.
be processed is___________?
A. digital device
A. CPU B. system add-on
B. Memory
C. disk pack C. CP
D. peripheral device D. Memory

A ____________is a microprocessor - What kind of memory is both


based computing device? static and non -volatile?

A. personal computer A. RAM


B. mainframe B. ROM
C. workstation C. BIOS
D. server D. CACHE

RAM can be treated as _____________is computer software


the____________for the computer’s designed to operate the computer
processor? hardware and to provide platform
for running application software?
A. factory
B. operating room A. Application software
C. waiting room B. System software
D. planning room C. Software
D. Operating system
Which of the following are the
functions of a operating system? The______________is the amount of
data that a storage device can
A. Allocates resources move from the storage medium to
B. Monitors Activities the Computer per second?
C. Manages disks and files
D. All of the above A. data migration rate
B. data digitizing rate
To move a copy of file from one C. data transfer rate
computer to another over a D. data access rate
communication channel is called?
A device, which is not connected
A. File transfer to CPU, is called as___________?
B. File encryption
C. File modification A. land-line device
D. File copying B. On-line device
C. Off-line device
The primary function of D. Device
the__________is to set up the
hardware and load and start an What is the other name for
operating system? programmed chip?

A. System Programs A. RAM


B. BIOS B. ROM
C. LSIC
D. PROM A. Processing
(more…) B. Storing
C. Editing
On-line real time systems become D. Sorting
popular
in______________generation? ALU and Control Unit jointly
known as__________?
A. First Generation
B. Second Generation A. RAM
C. Third Generation B. ROM
D. Fourth Generation C. CPU
D. PC
You use a(n)___________such as a
keyboard or mouse, to input RAM is an example of___________?
information?
A. Secondary memory
A. output device B. Primary memory
B. input device C. Main memory
C. storage device D. Both (1) and (2)
D. processing device
Magnetic disk is an example
_______________is the ability of a of____________?
device to “jump” directly to the
requested data? A. Secondary memory
B. Primary memory
A. Sequential access C. Main memory
B. Random access D. Both (1) and (2)
C. Quick access
D. All of the above Which one of the following is NOT
a computer language?
_________________provides process
and memory management services A. MS-Excel
that allow two or more tasks, jobs, B. BASIC
or programs to run C. COBOL
simultaneously? D. C++

___________Store data or
A. Multitasking
B. Multithreading information temporarily and pass
C. Multiprocessing it on as directed by the control
D. Multicomputing unit?

The task of performing operations A. Address


like arithmetic and logical B. Register
operations is called____________? C. Number
D. Memory
Select the Odd one from the C. analyzing the data or
following information
D. storing the data or information
A. Operating system
B. Interpreter All of the following are examples
C. Compiler of storage devices
D. Assembler EXCEPT____________?

A________________is an additional A. hard disk drives


set of commands that the B. printers
computer displays after you make C. floppy disk drives
a selection from the main menu? D. CD drives

A. dialog box The CPU and memory are located


B. submenu on the__________?
C. menu selection
D. All of the above A. expansion board
B. motherboard
COBOL is an acronym C. storage device
for________________? D. output device

A. Common Business Oriented ______________is the science that


Language attempts to produce machines
B. Computer Business Oriented that display the same type of
Language intelligence that humans do?
C. Common Business Operated
Language A. Nanoscience
D. Common Business Organized B. Nanotechnology
Language C. Simulation
D. Artificial intelligence (Al)
All of the following are examples
of real security and privacy risks Servers are computers that
EXCEPT____________? provide resources to other
computers connected to
A. hackers a___________?
B. Spam
C. Viruses A. networked
D. identity theft B. mainframe
C. supercomputer
Which of the following is NOT one D. client
of the four major data processing
functions of a computer? When creating a computer
program, the____________designs
A. gathering data the structure of the program?
B. processing data into information
A. End user A. Rule discover
B. System Analyst B. Signal processing
C. Programmer C. Neural nets
D. All of the above D. Case-based reasoning

Computers process data into _____________are used to identify a


information by working user who returns to a Website?
exclusively with____________?
A. Cookies
A. multimedia B. Plug-ins
B. word C. Scripts
C. numbers D. ASPs
D. characters
Codes consisting of lines of
Computers manipulate data in varying widths or lengths that are
many ways, and this manipulation computer-readable are known
is called___________? as__________?

A. upgrading A. an ASCII code


B. processing B. a magnetic tape
C. batching C. an OCR scanner
D. utilizing D. a bar code

The ability to recover and read Why is it unethical to share


deleted or damaged files from a copyrighted files with your
criminal’s computer is an example friends?
of a law enforcement speciality
called___________? A. It is not unethical, because it is
legal.
A. robotics B. It is unethical because the files
B. simulation are being given for free.
C. computer forensics C. Sharing copyrighted files
D. animation without permission breaks
copyright laws.
Where does most data go first with D. It is not unethical because the
in a computer memory hierarchy ? files are being given for free.

A. RAM Reusable optical storage will


B. ROM typically have the
C. BIOS acronym________?
D. CACHE
A. CD
The_____________data mining B. DVD
technique derives rules from real- C. ROM
world case examples? D. RW
The most common type of storage The process of transferring files
devices are_________? from a computer on the Internet
to your computer is
A. Steel called_____________?
B. optical
C. magnetic A. Downloading
D. flash B. uploading
C. FTP
A device that connects to a D. JPEG
network without the use of cables
is said to be___________? ___________is the process of
dividing the disk into tracks and
A. Distributed sectors?
B. free
C. centralized A. Tracking
D. none of these B. Formatting
C. Crashing
A person who used his or her D. Allotting
expertise to gain access to other
people’s computers to get ASCII is a coding system that
information illegally or do damage provides_____________?
is a____________?
A. 256 different characters
A. Hacker B. 512 different characters
B. spammer C. 1024 different characters
C. instant messenger D. 128 different characters
D. programmer
Which part of the computer is
To access properties of an object, directly involved in executing the
the mouse technique to use instructions of the computer
is_____________? program?

A. Dragging A. The scanner


B. dropping B. The main storage
C. right-clicking C. The secondary storage
D. shift-clicking D. The processor

A DVD is an example of a When a computer is switched on,


(n)___________? the booting process
performs___________?
A. hard disk
B. optical disc A. Integrity Test
C. output device B. Power-On Self-Test
D. solid-state storage device C. Correct Functioning Test
D. Reliability Test
A computer system that is old and A modem is connected
perhaps not satisfactory is to_____________?
referred to as a(n)____________?
A. a telephone line
A. Ancient system B. a keyboard
B. Historical system C. a printer
C. Age old system D. a monitor
D. Legacy system
Large transaction processing
Which of the following is not a systems in automated
binary number? organisations use___________?

A. 001 A. Online processing


B. 101 B. Batch Processing
C. 202 C. Once-a-day Processing
D. 110 D. End-of-day processing

Which of the following does not Which of the following is not a


store data permanently? storage medium?

A. ROM A. Hard disk


B. RAM B. Flash drive
C. Floppy Disk C. DVD
D. Hard Disk D. scanner

Which of the following is the The computer abbreviation KB


smallest storage? usually means____________?

A. Megabyte A. Key Block


B. Gigabyte B. Kernel Boot
C. Terabyte C. Kilo Byte
D. None of these D. Kit Bit
Read More about this mcq
The typical computer criminal is
Which of the following contains a(n)____________?
permanent data and gets updated
during the processing of A. Young hacker.
transactions? B. Trusted employee with no
criminal record.
A. Operating System File C. Trusted employee with a long,
B. Transaction file but unknown criminal record.
C. Software File D. Overseas young cracker.
D. Master file
The common name for the crime In 1999, the Melissa virus was a
of stealing passwords widely publicised:____________?
is____________?
A. E-mail virus.
A. Jacking. B. Macro virus.
B. Identity theft. C. Trojan horse.
C. Spoofing. D. Time bomb.
D. Hacking.
What type of virus uses computer
Collecting personal information hosts to reproduce itself?
and effectively posing as another
individual is known as the crime A. Time bomb
of_____________? B. Worm
C. Melissa virus
A. Spooling. D. Macro virus
B. Identity theft.
C. Spoofing. The thing that eventually
D. Hacking. terminates a worm virus is a lack
of:
Malicious software is known
as____________? A. Memory or disk space.
B. Time.
A. Badware. C. CD drives space.
B. Malware. D. CD-RW.
C. Maliciousware.
D. Illegalware When a logic bomb is activated by
a time-related event, it is known
A program that performs a useful as a____________?
task while simultaneously allowing
destructive acts is a___________? A. Time-related bomb sequence.
B. Virus.
A. Worm. C. Time bomb.
B. Trojan horse. D. Trojan horse.
C. Virus.
D. Macro virus What is the name of an application
program that gathers user
An intentionally disruptive information and sends it to
program that spreads from someone through the Internet?
program to program or from disk
to disk is known as a_____________? A. A virus
B. Spybot
A. Trojan horse. C. Logic bomb
B. Virus. D. Security patch
C. Time bomb.
D. Time-related bomb sequence.
____________is the measurement of __________is defined as any crime
things such as fingerprints and completed through the use of
retinal scans used for security computer technology?
access?
A. Computer forensics
A. Biometrics B. Computer crime
B. Bio measurement C. Hacking
C. Computer security D. Cracking
D. Smart weapon machinery
___________refers to electronic
What is the most common tool trespassing or criminal hacking?
used to restrict access to a
computer system? A. Cracking
B. Jacking
A. User logins C. Spoofing
B. Passwords D. Smarming
C. Computer keys
D. Access-control software The first electronic computer was
developed by____________?
Hardware or software designed to
guard against unauthorized access A. J.V. Attansoff
to a computer network is known B. Bill Gates
as a(n)___________? C. Simur Cray
D. Winton Serf
A. Hacker-proof program
B. Firewall _____________computers operates
C. Hacker-resistant server essentially by counting?
D. Encryption safe wall
A. Portable computer
The scrambling of code is known B. Hybrid computer
as___________? C. Analog computer
D. Digital computer
A. Encryption
B. a firewall ____________computer is small
C. Scrambling general purpose micro computer,
D. Password proofing but larger than portable
computer?
To prevent the loss of data during
power failures, use A. Hybrid
a(n)_____________? B. Digital
C. Desktop
A. Encryption program D. Laptop
B. Surge protector
C. Firewall Cathode Ray Tube is a form
D. UPS of__________?
A. Keyboard _______________are specific to users’
B. Mouse needs?
C. Monitor
D. Mother board A. System software
Read More about this mcq B. Application software
C. Assemblers
____________computer is a medium D. Compilers
sized computer?
“MAN” stands for_______________?
A. Micro
B. Mainframe A. Maximum Area Network
C. Super B. Minimum Area Network
D. Mini C. Main Area Network
D. Metropolitan Area Network
_________computer are of large
size? Which of the following is a
network topology?
A. Micro
B. Mainframe A. LAN
C. Super B. WAN
D. Mini C. MAN
D. BUS
Note book, laptop,palm,hand-held
computers are coming under the VOIP stands for___________?
category of__________computer?
A. Voice over IP
A. Digital computer B. Video over IP
B. Mainframe computer C. Viruses over IP
C. Portable computer D. Virtual over IP
D. Hybrid computer
LAN stands for______________?
Touch Screen is___________?
A. Limited Area Network
A. Input device B. Logical Area Network
B. Output device C. Local Area Network
C. Both A & B above D. Large Area Network
D. None of these
_____________are set of rules and
____________are used for plotting procedures to control the data
graphs and design on papers? transmission over the internet?

A. Trackball A. IP address
B. Joystick B. Domains
C. Light pen C. Protocol
D. Plotters D. Gateway
NOS stands for______________? A. Analog computer
B. Digital computer
A. Node operating system C. both
B. Non-open software D. Hybrid Computer
C. Network Operating system
D. Non-operating software C’ in CPU denotes___________?

_______________are system software A. Central


to facilitate editing of text and B. Common
data? C. Convenient
D. Computer
A. MS Word E. None of these
B. Editors
C. PowerPoint Which of the following uses a
D. MS publisher handheld operating system?

Computers, combine both A. supercomputer


measuring and counting, are B. personal computer
called________________? C. Laptop
D. PDA
A. Analog
B. Digital Read more about this mcq
C. Hybrid
D. All of these To display the contents of a folder
in Windows Explorer you should:
In world today, most of the
computers are_____________? A. click on it
B. collapse it
A. Digital C. name it
B. Hybrid D. give it a password
C. Analog E. None of these
D. Complex
The CPU comprises of Control,
physical structure of computer is Memory and_______________units?
called____________?
A. Microprocessor
A. Software B. Arithmetic/Logic
B. Hardware C. Output
C. Human ware D. ROM
D. All of these
A(n)_______________appearing on a
In which type of computer, data web page opens another document
are represented as discrete when clicked.
signals?
A. anchor What feature adjusts the top and
B. URL bottom margins so that the text is
C. hyperlink centered vertically on the printed
D. reference page?

_____________is a windows utility A. Vertical justifying


program that locates and B. Vertical adjusting
eliminates unncessary fragments C. Dual centering
and rearranges filed and unused D. Horizontal centering
disk space to optimize operations?
Which of these is not a means of
A. Backup personal communication on the
B. Disk cleanup internet?
C. Disk Defragmenter
D. Restore A. Chat
B. Instant messaging
_______________is the most C. Insta notes
important/powerful computer in a D. Electronic mail
typical network?
What is the overall term for
A. Desktop creating editing, formatting,
B. Network client storing, retrieving and printing a
C. Network server text document?
D. Network station
A. Word processing
The software that is used to create B. Spreadsheet design
text-based documents are referred C. Web design
to as_________________? D. Database management

A. DBMS Fourth generation mobile


B. Suites technology provides enhanced
C. Spreadsheets capabilities allowing the transfer
D. Word processors of both____________data, including
full-motion video, high-speed
_______________devices convert internet access, and video
human understandable data and conferencing.
programs into a form that the
computer can process? A. video data and information
B. voice and non-voice
A. Printing C. music and video
B. Output D. video and audio
C. Solid state
D. Input Which of these is a point and draw
device?
A. Mouse resources of a computer, including
B. Scanner starting the computer, managing
C. Printer programs, managing memory and
D. CD-ROM coordinating tasks between input
and output devices?
A set of rules for telling the
computer what operations to A. application suite
perform is called a______________? B.compiler
C. input/output system
A. procedural language D. Operating system
B. structures E. None of these
C. natural language
D. programming language A(n)_____________program is one
that is ready to run and does not
A detailed written description of need to be altered in any way.
the programming cycle and the
program, along with the test A. Interpreter
results and a printout of the B. High level
program is called___________? C. Compiler
D. Executable
A. documentation
B. output What is the name given to those
C. reporting applications that combine text,
D. spec sheets sound, graphics, motion video,
and/or animation?
Forms that are used to organize
business data into rows and A. Motionware
coloumns are called_____________? B. Anigraphics
C. Videoscapes
A. transaction sheets D. Multimedia
B. registers E. None of these
C. business forms
D. spread sheets A(n)____________language reflects
the way people think
In power point, the header and mathematically.
footer button can be found on the
insert tab in what group? A. cross-platform programming
B. 3GL business programming
A. Illustrations group C. event driven programming
B. Object group D. functional
C. Text group
D. Tables group When entering text within a
document, the Enter key is
A(n)_____________is a set of normally pressed at the end of
programs designed to manage the every____________?
A. Line By programmable machine we
B. Sentence mean_____________?
C. Paragraph
D. Word A. computers
E. None of these B. modern television
C. washing machines
Which of the following software D. anything that can be set to
could assist someone who cannot perform different tasks with suitable
use their hands for computer programs
input?
Which of the following is a
A. Video conferencing secondary memory device?
B. Speech recognition
C. Audio digitizer A. Keyboard
D. Synthesizer B. Disk
C. ALU
Memory unit is one part D. All of the above
of____________?
One of the popular mass storage
A. Input device device is CD ROM. What does CD
B. Control unit ROM stand for?
C. Output device
D. Central Processing Unit A. Compactable Read Only Memory
B. Compact Data Read Only Memory
Microprocessors can be used to C. Compactable Disk Read Only
make________________? Memory
D. Compact Disk Read Only
A. Computer Memory
B. Digital systems
C. Calculators Identify the true statement about
D. All of the above computer.

Which statement is valid about A. Computers are 100% accurate


computer program? but it can suffer from GIGO
(Garbage In Garbage Out)
A. High level languages must be B. Computers are reliable because
converted into machine language they use electronic component
to execute which have very low failure rate
B. High level language programs are C. Computer is never tired and does
more efficient and faster to execute not suffer from boredom
C. It is more difficult to identify D. All of above
errors in high level language
program than in low level programs The programs which are as
D. All of above permanent as hardware and stored
in ROM is known as___________?
A. Hardware A. John Napier
B. Software B. William Oughtred
C. Firmware C. Gottfried Leibnitz
D. ROM ware D. Blaise Pascal

Which of the following memories The proper definition of a modern


must be refreshed many times per digital computer is____________?
second?
A. An electronic automated
A. Static RAM machine that can solve problems
B. Dynamic RAM involving words and numbers
C. EPROM B. A more sophistic and modified
D. ROM electronic pocket calculator
C. Any machine that can perform
What do you call the translator mathematical operations
which takes assembly language D. A machine that works on binary
program as input & produce code
machine language code as output?
Memory is made up
A. Compiler of_____________?
B. Interpreter
C. Debugger A. Set of wires
D. Assembler B. Set of circuits
C. Large number of cells
Serial access memories are useful D. All of these
in applications where:
Which of the following is the most
A. Data consists of numbers powerful computers?
B. Short access time is required
C. Each stored word is processed A. Mainframe Computer
differently B. Mini Computers
D. Data naturally needs to flow in C. Micro Computers
and out in serial form D. Super Computers

In_______________mode, the Which of the printers used in


communication channel is used in conjunction with computers uses
both directions at the same time? dry ink powder?

A. Full-duplex A. Daisy wheel printer


B. Simplex B. Line printer
C. Half-duplex C. Laser printer
D. None of the above D. Thermal printer

Who invented Slide Rules?

S-ar putea să vă placă și