computer mcq

44
1. Which of the following statements is FALSE concerning file names? (A) Files may share the same name or the same extension but not both (B) Every file in the same folder must have a unique name (C) File extension is another name for file type (D) The file extension comes before the dot (.) followed by the file name (E) None of these Ans : (D) 2. Verification of a login name and password is known as: (A) configuration (B) accessibility (C) authentication (D) logging in (E) None of these Ans : (C) 3. Which of the following would most likely NOT be a symptom of a virus? (A) Existing program files and icons disappear. (B) The CD-ROM stops functioning. (C) The Web browser opens to an unusual home page. (D) Odd messages or images are displayed on the screen. (E) None of these Ans : (B) 4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop. A. PSS B. POS C. inventory D. data mining Ans : A 5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called: A. robotics. B. simulation. C. computer forensics. D. animation. Ans : C 6. Which of the following is NOT one of the four major data processing functions of a computer? A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information Ans : C 7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements. A. POS B. RFID Object 1 Object 2 Object 3

Upload: montu-yadav

Post on 21-Jul-2016

111 views

Category:

Documents


2 download

DESCRIPTION

computer awareness ..so many question about computer .

TRANSCRIPT

Page 1: Computer Mcq

1. Which of the following statements is FALSE concerning file names?(A) Files may share the same name or the same extension but not both(B) Every file in the same folder must have a unique name(C) File extension is another name for file type(D) The file extension comes before the dot (.) followed by the file name(E) None of theseAns : (D)

2. Verification of a login name and password is known as:(A) configuration(B) accessibility(C) authentication(D) logging in(E) None of theseAns : (C)

3. Which of the following would most likely NOT be a symptom of a virus?(A) Existing program files and icons disappear.(B) The CD-ROM stops functioning.(C) The Web browser opens to an unusual home page.(D) Odd messages or images are displayed on the screen.(E) None of theseAns : (B)

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’stag and pulls up the current price (and any special offers) as you shop.A. PSSB. POSC. inventoryD. data miningAns : A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is anexample of a law enforcement specialty called:A. robotics.B. simulation.C. computer forensics.D. animation.Ans : C

6. Which of the following is NOT one of the four major data processing functions of a computer?A. gathering dataB. processing data into informationC. analyzing the data or informationD. storing the data or informationAns : C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.A. POSB. RFID

Object 1Object 2Object 3

Page 2: Computer Mcq

C. PPSD. GPSAns : B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:A. robotics.B. computer forensics.C. simulation.D. forecasting.Ans : A

9. Technology no longer protected by copyright, available to everyone, is considered to be:A. proprietary.B. open.C. experimental.D. in the public domain.Ans : A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.A. NanoscienceB. MicroelectrodesC. Computer forensicsD. Artificial intelligenceAns : A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.A. NanoscienceB. NanotechnologyC. SimulationD. Artificial intelligence (AI)Ans : D

12. ____________ is data that has been organized or presented in a meaningful fashion.A. A processB. SoftwareC. StorageD. InformationAns : D13. The name for the way that computers manipulate data into information is called:A. programming.B. processing.C. storing.D. organizing.Ans : B

14. Computers gather data, which means that they allow users to ____________ data.A. presentB. inputC. output

Page 3: Computer Mcq

D. storeAns : B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:A. data.B. output.C. input.D. the process.Ans : B

16. Computers use the ____________ language to process data.A. processingB. kilobyteC. binaryD. representationalAns : C

17. Computers process data into information by working exclusively with:A. multimedia.B. words.C. characters.D. numbers.Ans : D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:A. eight bytes.B. eight kilobytes.C. eight characters.D. eight bits.Ans : D

19. The term bit is short for:A. megabyte.B. binary language.C. binary digit.D. binary number.Ans : C

20. A string of eight 0s and 1s is called a:A. megabyte.B. byte.C. kilobyte.D. gigabyte.Ans : B

21. A ____________ is approximately one billion bytes.A. kilobyteB. bitC. gigabyteD. megabyte

Page 4: Computer Mcq

Ans : C

22. A ____________ is approximately a million bytes.A. gigabyteB. kilobyteC. megabyteD. terabyteAns : C

23. ____________ is any part of the computer that you can physically touch.A. HardwareB. A deviceC. A peripheralD. An applicationAns : A

24. The components that process data are located in the:A. input devices.B. output devices.C. system unit.D. storage component.Ans : C

25. All of the following are examples of input devices EXCEPT a:A. scanner.B. mouse.C. keyboard.D. printer.Ans : D

26. Which of the following is an example of an input device?A. scannerB. speakerC. CDD. printerAns : A

27. All of the following are examples of storage devices EXCEPT:A. hard disk drives.B. printers.C. floppy disk drives.D. CD drives.Ans : B

28. The ____________, also called the “brains” of the computer, is responsible for processing data.A. motherboardB. memoryC. RAMD. central processing unit (CPU)Ans : D

29. The CPU and memory are located on the:

Page 5: Computer Mcq

A. expansion board.B. motherboard.C. storage device.D. output device.Ans : B

30. Word processing, spreadsheet, and photo-editing are examples of:A. application software.B. system software.C. operating system software.D. platform software.Ans : A

31. ____________ is a set of computer programs used on a computer to help perform tasks.A. An instructionB. SoftwareC. MemoryD. A processorAns : B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.A. managementB. processingC. utilityD. applicationAns : D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:A. platforms.B. applications.C. programs.D. storage devices.Ans : A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.A. languagesB. methodsC. CPUsD. storage devicesAns : C

35. Servers are computers that provide resources to other computers connected to a:A. network.B. mainframe.C. supercomputer.D. client.Ans : A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.

Page 6: Computer Mcq

A. supercomputersB. clientsC. laptopsD. mainframesAns : D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.A. ServersB. SupercomputersC. LaptopsD. MainframesAns : B

38. DSL is an example of a(n) ____________ connection.A. networkB. wirelessC. slowD. broadbandAns : D

39. The difference between people with access to computers and the Internet and those without this access is known as the:A. digital divide.B. Internet divide.C. Web divide.D. broadband divide.Ans : A

40. ____________ is the science revolving around the use of nanostructures to build deviceson an extremely small scale.A. NanotechnologyB. Micro-technologyC. Computer forensicsD. Artificial intelligenceAns : A

41. Which of the following is the correct order of the four major functions of a computer?A. Process à Output à Input à StorageB. Input à Outputà Process à StorageC. Process à Storage à Input à OutputD. Input à Process à Output à StorageAns : D

42. ____________ bits equal one byte.A. EightB. TwoC. One thousandD. One millionAns : A

43. The binary language consists of ____________ digit(s).

Page 7: Computer Mcq

A. 8B. 2C. 1,000D. 1Ans : B

44. A byte can hold one ____________ of data.A. bitB. binary digitC. characterD. kilobyteAns : C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.A. The platformB. The operating systemC. Application softwareD. The motherboardAns : B

46. The operating system is the most common type of ____________ software.A. communicationB. applicationC. systemD. word-processing softwareAns : C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.A. ServersB. Embedded computersC. Robotic computersD. MainframesAns : B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:A. instructions.B. the operating system.C. application software.D. the system unit.<

49.

Page 8: Computer Mcq

1. Programs from the same developer , sold bundled together , that provide betterintegration and share common features , toolbars and menus are known as ….(A)software-suites(B)integrated software packages(C)software processing packages(D)personal information managers(E)none of theseAns : (A)

2. A data warehouse is which of the following ?(A) Can be updated by the end users(B) Contains numerous naming conventions and formats(C) Organized around important subject areas(D) Contains only current data(E) None of theseAns : (C)

3. ______________ servers store and manages files for network users.(A) Authentication(B) Main(C) Web(D) File(E) None of theseAns : (D)

4. All of the following are examples of real security and privacy risks Except _____(A) hackers(B) spam(C) viruses(D) identify theft(E) None of theseAns : (B)

5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .(A) Data(B) Sales(C) Query(D) (Point-of-sale (POS)(E) None of theseAns : (B)

6. The OSI model is divided into _______ processes called layers.(A) five(B) six(C) seven(D) eight(E) None of theseAns : ©

Page 9: Computer Mcq

7. System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.(A) management(B) processing(C) utility(D) application(E) None of theseAns : (D)

8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.(A) Servers(B) Embedded computers(C) Robotic computers(D) Mainframes(E) None of theseAns : (B)

9. The following are all computing devices , except………(A) notebook computers(B) cellular telephones(C) digital scanners(D) personal digital assistants(E) None of theseAns : (C)

10. in a ring topology , the the computer in possession of the ______ can trasmit data(A) packet(B) data(C) access method(D) token(E) None of theseAns : (D)

11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____(A) basic input/output system(B) secondary input/output system(C) peripheral input/output system(D) marginal input/output system(E) None of theseAns : (A)

12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive(A) Trojan horse(B) Boot sector(C) Script(D) Logic bomb(E) None of theseAns : (B)

Page 10: Computer Mcq

13. ________ controls the way in which the computer system functions and provides a meAns : by which users can interact with the computer(A) The platform(B) Application software(C) Operating system(D) The motherboard(E) None of theseAns : (C)

14. Servers are computers that provide resources to other computers connected to a ___________(A) mainframe(B) network(C) supercomputer(D) client(E) None of theseAns : (B)

15. A goal of data mining includes which of the following?(A) To explain some observed event or condition(B) To confirm that data exists(C) To analyze data for expected relationships(D) To create a new data warehouse(E) None of theseAns : (A)

16. URL stands for ……..(A) Universal Research List(B) Universal Resource List(C) Uniform Resource Locator(D) Uniform Research Locator(E) None of theseAns : (C)

17. A database management system (DBMS) is a …………(A) hardware system used to create , maintain and provide controlled access to a database(B) hardware system used to create, maintain, and provide uncontrolled access to a database.(C) software system used to create, maintain, and provide uncontrolled access to a database.(D) software system used to create, maintain, and provide controlled access to a database.(E) None of theseAns : (D)

18. Which of the following is NOT a goal of transaction processing system ?(A) Capture , process and store transactions(B) Produce a variety of documents related to routine business activities(C) Reduce manual effort associated with processing business transactions(D) Produce standard reports used for management decision making(E) None of theseAns : ()

Page 11: Computer Mcq

19. A Proxy server is used for which of the following?(A) To provide security against unauthorized users(B) To process client requests for web pages(C) To process client requests for database access(D) To provide TCP/IP(E) None of theseAns : (B)

20. When data changes in multiple lists and all lists are not updated, this causes:(A) data redundancy(B) information overload(C) duplicate data(D) data inconsistency(E) None of theseAns : (D)

21. _____________ are words that a programming language has set aside for its own use.(A) Control worlds(B) Reserved words(C) Control structures(D) Reserved keys(E) None of theseAns : (B)

22. What is the primary difference between a virus and a worm?(A) A worm has the ability to self-propagate from an infected user’s computer to other computers(B) A worm is usually written by a cracker: Script bunnies do not have the skills to develop aworm program(C) A virus is very harmful to the computers it infects : a worm is not a serious a problem(D) Anti-virus software is effective in fighting viruses but not worms(E) None of theseAns : ()

23. ______ describe what is database fields.(A) Structures(B) Field markers(C) Field definition(D) Field names(E) None of theseAns : (D)

24. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.(A) router(B) modem(C) node(D) cable(E) None of theseAns : (A)

Page 12: Computer Mcq

25. A goal of normalization is to __________(A) minimize the number of relationships(B) minimize the number of entities(C) minimize the number of tables(D) minimize the number of redundancy(E) None of theseAns : (D)

26. Granting an outside organization access to internet web pages is often implemented using a (n) ____(A) extranet(B) intranet(C) internet(D) hacker(E) None of theseAns : (A)

27. Which term identifies a specific computer on the web and the main page of the entire site(A) URL(B) Web site address(C) Hyperlink(D) Domain name(E) None of theseAns : (A)

28. The code that relational database management systems use to perform their database task is referred to as …..(A) QBE(B) SQL(C) OLAP(D) Sequel Server(E) None of theseAns : (B)

29. Chip is a common nickname for a (n):(A) transistor(B) resistor(C) integrated circuit(D) semiconductor(E) None of theseAns : (C)

30. The purpose of the primary key in a database is to:(A) unlock the database(B) provide a map of the data(C) uniquely identify a record(D) establish constraints on database operations.(E) None of theseAns : (B)

31.

Page 13: Computer Mcq

31. A _________ contains specific rules and words that express the logical steps of an algorithm.(A) programming language(B) syntax(C) programming structure(D) logic chart(E) None of theseAns : ()

32. The design of the network is called the network:(A) architecture(B) server(C) transmission(D) type(E) None of theseAns : (A)

33. The most frequently used instructions of a computer program are likely to be fetched from:(A) the hard disk(B) cache memory(C) RAM(D) registers(E) None of theseAns : (B)

34. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.(A) data dictionary(B) data table(C) data record(D) data field(E) None of theseAns : (A)

35. Personal logs or journal entries posted on the Web are known as:(A) listservs(B) Webcasts(C) blogs(D) subject directories(E) None of theseAns : (C)

36. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.(A) command – based user interface(B) GUI(C) system utility(D) API(E) None of theseAns : (B)

Page 14: Computer Mcq

37. The _____ manual tells you how to use a software program.(A) documentation(B) programming(C) technical(D) user(E) None of theseAns : ()

38. Which of the following is NOT a type of broadband Internet connection?(A) Cable(B) DSL(C) Dial-up(D) Satellite(E) None of theseAns : (C)

39. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:(A) spyware(B) adware(C) spam(D) malware(E) None of theseAns : (D)

40. Making a field ______ meAns : that it cannot be left blank.(A) numeric(B) required(C) calculated(D) validated(E) None of theseAns : (B)

41. _________ is the process of finding errors in software code.(A) Debugging(B) Compiling(C) Testing(D) Running(E) None pf theseAns : ()

42. ____________ are viruses that are triggered by the passage of time or on a certain date.(A) Boot-sector viruses(B) Macro viruses(C) Time bombs(D) Worms(E) None of theseAns : ©

Page 15: Computer Mcq

43. Linux is a (n) ____________ operating system.(A) open-source(B) Microsoft(C) Windows(D) Mac(E) None of theseAns : (A)

44. What is a backup?(A) Restoring the information backup(B) An exact copy of a system’s information(C) The ability to get a system up and running in the event of a system crash or failure(D) All of these(E) None of theseAns : (D)

45. Which of the following places the common data elements in order from smallest to largest(A) character, file, record, field, database(B) character, record, field, database, file(C) character, field, record, file, database(D) Bit, byte, character, record, field, file, database,(E) None of theseAns : (C)

46. The internet is ……(A) a large network of networks(B) an internal communication system for a business(C) a communication system for the Indian government(D) All of these(E) None of theseAns : (D)

47. ____________ are lists of commands that appear on the screen.(A) GUIs(B) Icons(C) Menus(D) Windows(E) None of theseAns : (C)

48. All of the following are examples of real security and privacy risks EXCEPT:A. hackers.B. spam.C. viruses.D. identity theft.Ans : B

49.

Page 16: Computer Mcq

49. A process known as ____________ is used by large retailers to study trends.A. data miningB. data selectionC. POSD. data conversionAns : A

50. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.A. DataB. Point-of-sale (POS)C. SalesD. QueryAns : B

51.

Page 17: Computer Mcq

1. All of the following are examples of storage devices EXCEPT:A. hard disk drives.B. printers.C. floppy disk drives.D. CD drives.Answer: B

2. which of the following is responsible for processing data in computer ?A. motherboardB. memoryC. RAMD. central processing unit (CPU)Answer: D

3. The CPU and memory are located on the:A. expansion board.B. motherboard.C. storage device.D. output device.Answer: B

4. Word processing, spreadsheet, and photo-editing are examples of:A. application software.B. system software.C. operating system software.D. platform software.Answer: A

5. ____________ is a set of computer programs used on a computer to help perform tasks.A. An instructionB. SoftwareC. MemoryD. A processorAnswer: B

6. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.A. managementB. processingC. utilityD. applicationAnswer: D

7. The PC (personal computer) and the Apple Macintosh are examples of two different:A. platforms.B. applications.C. programs.D. storage devices.Answer: A

Page 18: Computer Mcq

8. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.A. languagesB. methodsC. CPUsD. storage devicesAnswer: C

9. Servers are computers that provide resources to other computers connected to a:A. network.B. mainframe.C. supercomputer.D. client.Answer: A

10. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.A. supercomputersB. clientsC. laptopsD. mainframesAnswer: D

11. ____________ are specially designed computers that perform complex calculations extremely rapidly.A. ServersB. SupercomputersC. LaptopsD. MainframesAnswer: B

12. DSL is an example of a(n) ____________ connection.A. networkB. wirelessC. slowD. broadbandAnswer: D

13. The difference between people with access to computers and the Internet and those without this access is known as the:A. digital divide.B. Internet divide.C. Web divide.D. broadband divide.Answer: A

Page 19: Computer Mcq

14. ____________ is the science revolving around the use of nanostructures to build deviceson an extremely small scale.A. NanotechnologyB. Micro-technologyC. Computer forensicsD. Artificial intelligenceAnswer: A

15. Which of the following is the correct order of the four major functions of a computer?A. Process à Output à Input à Storage B. Input à Outputà Process à StorageC. Process à Storage à Input à OutputD. Input à Process à Output à StorageAnswer: D

16. ____________ bits equal one byte.A. EightB. TwoC. One thousandD. One millionAnswer: A

17. The binary language consists of ____________ digit(s).A. 8B. 2C. 1,000D. 1Answer: B

18. A byte can hold one ____________ of data.A. bitB. binary digitC. characterD. kilobyteAnswer: C

19. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.A. The platformB. The operating systemC. Application softwareD. The motherboardAnswer: B

20. The operating system is the most common type of ____________ software.A. communicationB. applicationC. systemD. word-processing softwareAnswer: C

21.

Page 20: Computer Mcq

21. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.A. ServersB. Embedded computersC. Robotic computersD. MainframesAnswer: B

22. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:A. instructions.B. the operating system.C. application software.D. the system unit.Answer: A

23. The two broad categories of software are:A. word processing and spreadsheet.B. transaction and application.C. Windows and Mac OS.D. system and application.Answer: D

24. The metal or plastic case that holds all the physical parts of the computer is the:A. system unit.B. CPU.C. mainframe.D. platform.Answer: A

25.

Page 21: Computer Mcq

1. Which device can understand the difference between data and programs?(1) Input device (2) Output device(3) Memory (4) Microprocessor(5) None of these

2. Which command is used to open (open) dialogue box?(1) F12(2) Shift+F12(3) Alt+F12(4) Ctrl+F12(5) None of these

3. The pattern of printed lines on most products are called-(1) prices (2)OCR(3) scanners (4)barcodes(5)None of these

4. The main advantage of magnetic disk compared to magnetic tape is(1) low cost (2) rigidity(3) direct access(4) high packet density(5) sequential access

5. To copy cell contents using drag and drop, press the:(1)End key (2) Shift key(3) Esc key (4) All of above(5) None of these

6. To add two cells (A1 and A2) together you use which of the formula?(1) = A1+ A2 (2) = Add (A1 + A2)(3) = together (A1:A2) (4) A1 + A2(5) None of these

7. Which one is NOT shared by the threads of the same process?(1) Message Queue(2) Address Space(3) Stack(4) Database(5) None of these

Page 22: Computer Mcq

8. The updating of master files to reflect the effects of current transactions is called?(1) Direct processing(2) File processing(3) Flow chart(4) Front-end Processor(5) None of these

9. One or more operations performed on data to achieve a desired objective is called?(1) Database(2) Data processing(3) Data collection(4) Data communication(5) None of these

10. The total set of interlinked hypertext documents worldwide is(1) HTTP(2) Browser(3) WWW(4) B2B(5) None of these

ANSWERS:

1. 4

2. 4

3. 4

4. 3

5. 5

6. 1

7. 3

8. 2

9. 2

10. 3

Page 23: Computer Mcq

1.First digital computer with magnetic core RAM and real-time graphics –(1) ENIAC(2) Whirlwind machine(3) UNIVAC(4) IBM-360(5) None of these2.In hospital department for patient treatment which computer is used-(1) Analog computer(2) Digital computer(3) Super computer(4) Hybrid computer(5) None of these3.Process of obtaining program instruction or item from memory-(1) Recording(2) Executing(3) Fetching(4) Storing(5) None of these

4.Keys when pressed change their status from one state to another(1) Modifier keys (2) Hot keys(3) Function keys (4) Toggle keys(5) None of these

5.Which type of software are also known as customized software?(1) Special purpose application software(2) System software(3) General Purpose application software(4) Only 1 & 2(5) None of these

6.Disk defragmentation is done by- (1) Application software (2) Utility software (3) Customized software (4) Only 2 & 3

5) None of these

7.A public switched telephone network (PSTN) uses __ switching technique.(1) Packet(2) Message(3) Circuit (4) Transport(5) None of these

8.An instruction cycle refers to :(1) fetching an instruction(2) clock speed(3) fetching, decoding and executing an instruction(4) Executing an instruction(5) None of these

9.A hardware interrupt is:(1) also called an internal interrupt(2) also called an external interrupt(3) an Input Output interrupt(4) a clock interrupt(5) None of these

Page 24: Computer Mcq

10. __ is a piece of hardware that executes a set of machine language instructions.(1) Controller (2) Bus(3) Processor (4) Motherboard(5) None of these

11. Which of the following lists memory types from highest to lowest access speed?(1) Secondary storage, main memory, cache, registers(2) Registers, cache, secondary storage, main memory(3) registers, cache, main memory, secondary storage(4) cache, registers, main memory, secondary storage(5) None of these

12. A network that requires human interventions to route signals is –(1) bus network(2) ring network(3) star network(4) T-switched network(5) None of these

13. Which of the following is true?(1) Plotters are not available for microcomputer systems(2) Micro-computer are not programmed like conventional computers(3) Mini-computers are task-oriented(4) The contents of ROM are easily changed(5) None of these

14. ROM is composed of(1) Magnetic cores(2) Micro-processors (3) Photoelectric cells (4) Floppy disks(5) None of these

15. Consider the following statements about Internet facility:I. It serves as the largest one-line information system.II. It provides the most dependable and latest mode for sending E-mail.III. Recurring expenditure on communication E-mail is very high.IV. It is often misused and has triggered cyber-crimes.Which of these statements are correct?(1) I, II and IV (2) I and IV (3) II, III and IV(4) II and III(5) All are correct

Page 25: Computer Mcq

Answers:

1 2 9 2

2 4 10 3

3 3 11 3

4 4 12 4

5 1 13 3

6 2 14 2

7 3 15 1

8 3

COMPUTER QUIZ FOR IBPS CLERK - III

1. Which of the following refers to a small, single-site network?(1) LAN (2) DSL (3) RAM (4) USB (5) CPU

2. A set of instructions telling the computer what to do is called(1) mentor (2) instructor (3) compiler (4) program (5) debugger

3. Which of the following can handle most system functions that aren’t handled directly by the operating system?(1) Vertical market applications (2) Utilities (3) Algorithms(4) Integrated software (5) Compilers

4. How many options does a binary choice offer?(1) None (2) One (3) Two (4) It depends on the amount of memory in the computer(5) it depends on the speed of the computer’s processor

Page 26: Computer Mcq

5. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as(1) Spam(2) Trash(3) Calibri(4) Courier(5) None

6. …………….are used to identify a user who returns to a Website.(1) Cookies (2) Plug-ins(3) Scripts (4) ASPs(5) None of these

7. When a computer runs a program, the ____ progresses through the program’s sequence ofinstructions.(1) AMD (2) ASCII(3) CPU (4) transistor(5) None of these

8. The computer needs additional components called ___ to accomplish its input, output, and storage functions.(1) Mice (2) specifications(3) architecture (4) peripherals(5) None of these

9. The internet allows you to :(1) send electronic mail (2) view web pages (3) connect to server all around the world (4) All of the above (5) None of these

10.To contact people using the Internet, you most often use their(1) Domain names(2) e-mail addresses(3) usernames (4) passwords(5) None of these

Page 27: Computer Mcq

ANSWERS:

1 1

2 4

3 2

4 3

5 1

6 1

7 3

8 4

9 4

10 2

1. The type of memory that uses in circuit writing to erase the content by applying electric fieldis ----(1) PROM(2) Flash memory (3) EAROM (4) EEPROM (5) None of these

2. The secondary storage device that following the sequentional mode of access is –(1) Optical Disk (2) Hard Disk (3) Magnetic Disk(4) Floppy disk (5) None of these

3. FPI stand for -------(1) Faults Per inch (2) Frames per inch (3) Figure per inch (4) Film per inch (5) Flash per inch

4. A sprit shape track formatting is present in -----(1) Floppy Disk (2) Optical Disk (3) Hard disk (4) Half inch Tape Cartridge(5) Magnetic Disk

5. Hard Disk is a kind of -----(1) Floppy Disk (2) Optical Disk (3) Magnetic Disk(4) Temproary Memory(5) None of these

Page 28: Computer Mcq

6. The ---- data base can be a choice for the SFMS use ---(1) Oracle (2) My SQL(3) Both (1) & (2) (4) D Base (5) None of these

7. In SFMS message are ------ with receiving node public key to protect confidentially of massage while in transit.(1) Shown(2) hided(3) Encrypted (4) Decrypted (5) None of these

8. Various kinds of user in SFMS are namely : (1) Creator and verifier (2) Authorizer (3) Super user (4) All of above (5) None of these

9. In dial –up remote access a client uses the ---- to create a physical connection to a part on a remote access server of the private network.(1) Public local network (2) Public telephone network (3) Bank’s branch network (4) Private telephone network (5) Private network

10. The expansion of CCA under the IT Act is -----(1) Computer communication Authority (2) Computer controlling Adjudication (3) Controller of certifying Authority (4) Controller of CertifyingAct. (5) None of these

Answers:

1 4 6 3

2 3 7 3

3 2 8 4

4 2 9 2

5 3 10 3

Page 29: Computer Mcq

1. Virtual memory is –(1) an extremely large main memory(2) an extremely large secondary memory(3) an illusion of an extremely large memory(4) a type of memory used in super computers(5) None of these

2. Fragmentation is -(1) dividing the secondary memory into equal sized fragments(2) dividing the main memory into equal size fragments(3) fragments of memory words used in a page(4) fragments of memory words unused in a page(5) None of these

3. Which of the following are real time systems?(A) an on-line real reservation system(B) a process control system(C) Aircraft control system(D) Payroll processing system(1) A and B (2) C and D(3) B and C (4) A, B, C and D(5) None of these

4. Which of the following is a service not supported by the operating system?(1) Protection (2) Accounting(3) Compilation (4) I/O Operation(5) None of these

5. Which of the following are Single-use operating system?(A) MS DOS (B) UNIX (C) XENIX (D)D OS2(1)A and B (2) B and D(3) A and C (4) All A, B, C and D(5) None of these

6. Bootstrap loader is always stored in-(1) Cache (2) ROM(3) RAM (4) Disk(5) None of these

7. Which memory unit has lowest access time?(1) Cache (2) Registers(3) Magnetic Disk (4) Main Memory(5) Pen drive

8. Copying computer program / software without permission of its author is called-(1) High way robbery (2) Larcency(3) Software piracy (4) Embezzlement(5) None of these

Page 30: Computer Mcq

9. Cache memory-(1) has greater capacity than RAM(2) is faster to access than CPU Registers(3) is permanent storage(4) faster to access than RAM(5) None of these

10. When more than one processes are running concurrently on a system-(1) batched system (2) real-time system(3) multi programming system (4) multiprocessing system(5) None of these

Answers:

1 3 6 2

2 2 7 2

3 3 8 3

4 3 9 4

5 3 10 3

1.The ____ specifies the operation to be performed and the operands provide the data on which the operation is to be performed(1) source code (2) opcode (3) object code (4) program code (5) None of these

2.____ is responsible for overall control and co-ordination of instruction execution.(1)CPU (2) ALU (3)RAM (4) Control UNIT (5) None of these

3. ____ is a high speed memory ,that can be used in between CPU and main memory(1)CPU (2) buffer (3)Spooling (4) Cache (5) None of these

4. Storage capacity are frequently measured in-(1)Hz (2)Byte (3)MIPS (4) bps (5) None of these

5. (1024)3 is equivalent to-(1) approx I million (2) Approx 1 billion (3) approx 10 thousand (4) 3096 (5) None of these

Page 31: Computer Mcq

6. PROM is a is a ____ memory i.e. the stored information remain even if power is switched off.(1) Volatile memory (2) Buffer memory (3) Spooling (4) Non-volatile (5) None of these

7. ____ is the example of magnetic disk.(1) Hard-disk (2) DVD (3)RAM (4) Pen drive (5) None of these

8. Format command is used to create…..(1) Sector (2) memory (3) Tracks (4) Tracks and sector (5) None of these

9. Time required by a sector to reach below the head is known as-(1) seek time (2) Latency time (3) Access time (4) Disk time (5) None of these

10. Disk access time is-(1) seek time (2) Latency time (3) Seek time +Latency time(4) Disk time (5) None of these

11. A set of corresponding track in all surface of a disk pack is known as-(1) Surface (2) Cylinder (3) Track (4) platter (5) None of these

12. In DVD, V stands for-(1) Video (2) Versatile (3) both a and b (4) Volatile (5) None of these

13. ____ transmits one bit of a byte, one at a time as a single bit stream of bit.(1) Serial port (2) USB port (3) Parallel port (4) address bus (5) None of these

14. A ____ port is primarily used to connect printers to a computer .(1) Serial port (2) USB port (3) Parallel port (4) address bus (5) None of these

15. ____ port are the interfaces through which computer communicate with external devices such as printer, modem, joystick, terminal etc.(1) Serial port (2) USB port (3) Parallel port (4) I/O port (5) None of these

Answer:QUE

ANS

QUE

ANS

QUE

ANS

1 2 6 4 11 4

2 4 7 1 12 3

3 4 8 4 13 1

4 2 9 2 14 3

5 2 10 3 15 4

Page 32: Computer Mcq

1. To connect a computer with a device in the same room, you might be likely to use- (1) Coaxial cable (2) coaxial cable(3) dedicated line (4) microwave(5) None of these2. Internet-like networks within an enterprise known as- (1) Intranet (2) Internet(3) Extranet (4) Network(5)None of these3. How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host? (1) 32 bit (2) 64 bit (3) 128 bit (4) 256 bit (5) None of these4. Which of the following types of channels moves data relatively slowly? (1) wideband channel (2) voice-band channel(3) narrowband channel (4) broadband channel(5) None of these5. Which of the following is required to communicate between two computers? (1) communications software(2) protocol(3) communications hardware (4) access to transmission medium(5) All of the above6. ____ devices is used to connect two similar LAN with same protocols (1) Bridges (2) Router(3) Gateway (4) switch(5) None of these7. DSL is an example of a(n) ____connection.(1) network (2) wireless(3) slow (4) broadband(5) None of these8. FTP is- (1) used to send email (2) used to browse the Web (3) is part of Netscape (4) is a protocol for the transfer of files between computers(5) None of these9. Telnet is- (1) used to send email (2) uses telephone lines (3) is part of Netscape (4) is a protocol that allows for remote login(5) None of these10. A firewall is- (1) used to protect a computer from unauthorized user (2) a form of virus (3) a screen saver program (4) all of the above (5) None of these11. A proxy server is- (1) a backup server (2) an email server (3) a poor file server (4) all of the above

Page 33: Computer Mcq

(5) None of the above12. A nanosecond is - (1) 10- 6 sec (2) 10-3 sec (3) 10-12 sec (4) 10-9sec(5) None of these13. The resolution of an SVGA screen is -(1) 1024 x 768 (2) 512 x 512 (3) 640 x 480 (4)800 x 800(5)None of these14. What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?(1) Memory resident package (2) Project management package (3) Data communication package(4) Electronic mail package(5) None of these 15. The communication mode that supports two-way traffic but only one direction at a time is- (1) simplex (2) duplex(3) half duplex (4) all(5) None of these

Answer

QUE ANS QUE ANS QUE ANS

1 2 6 1 11 1

2 1 7 3 12 1

3 3 8 4 13 1

4 3 9 4 14 3

5 5 10 1 15 3

1.Data going into the computer is called(1) output (2) algorithm (3) input (4) calculations (5) flowchart

2.How many values can be represented by a single byte?(1) 4 (2) 16 (3) 64 (4) 256 (5) 512

3.Transformation of input into output is performed by(1) Peripherals (2) Memory (3) Storage (4) The input-output unit (5) The CPU

4.Device drivers are(1) tiny power cords for external storage devices (2) experts who know to maximize the

Page 34: Computer Mcq

performance of device(3) small, special-purpose programs (4) the innermost part of the operating system(5) substitutes for operating system

5.A collection of programs that controls how your computer system runs and processes information is called(1) operating system (2) computer (3) office (4) compiler (5) interpreter

6.which of the following refers to a small, single-site network?(1) LAN (2) DSL (3) RAM (4) USB (5) CPU

7.A set of instructions telling the computer what to do is called(1) mentor (2) instructor (3) compiler (4) program (5) debugger

8.If you receive an e-mail from someone you don’t know, what should you do?(1) Forward it to the police immediately (2) Delete it without opening it(3) Open it and respond to them saying you don’t know them (4) Reply and ask them for their personal information(5) Reply and tell them you want to keep in touch with them

9.Which of the following can handle most system functions that aren’t handled directly by the operation system?(1) Vertical market applications (2) Utilities (3) Algorithms (4) Integrated software (5) Compilers

10.How many options does a binary choice offer?(1) None (2) One (3) Two (4) It depends on the amount of memory in the computer(5) it depends on the speed of the computer’s processor

11.What menu is selected to cut, copy, and paste?(1) File (2) Tools (3) Special (4) Edit (5) None of these

12.The most important or powerful computer in a typical network is(1) desktop (2) network client (3) network server (4) network station (5) None of these

13.The primary purpose of software is to turn data into(1) Web sites (2) information (3) programs (4) objects (5) None of these

14. The ability to find an individual item in a file immediately ___ is used.

Page 35: Computer Mcq

(1) File allocation table (2) directory (3) sequential access (4) direct access (5) None of these

15. To make a notebook act as a desktop model, the notebook can be connected to a ___ which is connected to a monitor and other devices.(1) bay (2) docking station (3) port (4) network (5) None of these

Answer

Qns. Ans. Qns. Ans. Qns. Ans.

1 3 6 1 11 4

2 4 7 4 12 3

3 4 8 2 13 2

4 3 9 2 14 4

5 1 10 3 15 2

1.You can use the tab key to___(1) move a cursor across the screen(2) indent a paragraph(3) move the cursor down the screen(4) Only 1 and 2 (5) None of these

2.A collection of related files is called a(1) character (2) field(3) database (4) record(5) None of these3.Storage that retains its data after the power is turned off is referred to as(1) volatile storage(2) non-volatile storage(3) sequential storage(4) direct storage(5) None of these4.Which of the following is an example of connectivity?(1) Internet (2) floppy disk(3) power cord (4) data(5) None of these5.___ is the process of finding errors in software code.(1) Compiling (2) Testing(3) Running (4) Debugging(5) None of these6.A ___ contains specific rules and words that express the logical steps of an algorithm.(1) syntax (2) programming structure(3) programming language (4) Logic chart

Page 36: Computer Mcq

(5) None of these7.Changing an existing document is called ___ the document.(1) creating (2) editing(3) modifying (4) adjusting(5) None of these8.Virtual memory is(1) memory on the hard disk that the CPU uses as an extended RAM(2) in RAM(3) only necessary if you do not have any RAM in your computer(4) a back up device for floppy disks(5) None of these9.Computers use the ___ number system to store data and perform calculations.(1) decimal (2) hexadecimal (3) octal (4) binary (5) None of these10.The ___ key will launch the start buttons.(1) esc (2) shift(3) windows (4) shortcut(5) None of these11.The term ‘user interface’ refers to ___(1) what the user sees on the screen and how they can interact with it(2) how the operating system responds to user commands(3) the means by which the user interacts with the peripheral devices on the computer(4) the monitor that is available for the computer(5) none of these12.the background of any Word document __(1) is always white colour(2) is the colour you preset under the Options menu(3) is always the same for the entire document(4) can have any colour you choose(5) none of these13.Reusable optical storage will typically have the acronym ___(1) CD (2) DVD(3) ROM (4) RW(5) None of these14.For creating a document, you use ___ command at File Menu.(1) Open (2) Close(3) New (4) Save(5) None of these15.The contents of ___ are lost when the computer is turn off.(1) storage (2) input(3) output (4) memory(5) None of these

Page 37: Computer Mcq

Answer:

Qns. Ans. Qns. Ans. Qns. Ans.

1 4 6 3 11 1

2 4 7 2 12 2

3 2 8 1 13 4

4 1 9 4 14 3

5 2 10 3 15 4

1.____ means to enlarge a window to its maximum area so that it will fill entire desktop(1) maximize (2) zoom (3) enlarge(4) extend (5) None of these 2.The full step wise process of closing a computer is called ___(1) shutting (2) closing (3) log off(4) shut down (5) None of these 3.Capability of computer to perform more than one task at the same time is ___(1) batch processing (2) real time processing(3) Multitasking (4) scheduled processing(5) None of these 4.The operating system is the most common type of ____ software(1) communication (2) application (3) system(4) word-processing (5) None of these 5.The number of pixels displayed on a screen is known as-(1) resolution (2) colour depth (3) refresh rate (4) viewing size(5) None of these 6.Language which can easily interact with the hardware are called-(1) High Level Language (2) Low Level Language(3) Middle Level Language (4) they are not normally used computer languages(5) None of these 7.Which among the following is/are interpreted language?(1) C (2) C++ (3) JAVA(4) Visual Basic (5) both 3 & 48.In a database, a field is a-(1) label (2) table of information(3) group of related records

(4) category of information (5) None of these

Page 38: Computer Mcq

9.A byte can hold one ____of data.(1) bit (2) binary digit (3) character(4) kilobyte (5) None of these 10.A normal compiler takes source code as input and produces this as output ___(1) assembly code (2) object code (3) machine code(4) All of the above (5) None of these

Answer

QUE ANS QUE ANS

1 1 6 2

2 4 7 5

3 3 8 3

4 3 9 3

5 1 10 3

1. The output quality of a printer is measured by-(1) Dot per inch (2) Dot per sq. Inch (3) Dots printed per unit tune (4) All of above (5) None of these 2. In analog computer -(1) Input is first converted to digital form (2) Input is never converted to digital form (3) Output is displayed in digital form (4) All of above (5) None of these 3. In latest generation computers, the instructions are executed (1) Parallel only (2) Sequentially only (3) Both sequentially and parallel (4) All of above (5) None of these 4. Who designed the first electronic computer - ENIAC? (1) Van-Neumann (2) Joseph M. Jacquard (3) Presper Eckert and John W Mauchly (4) All of above (5) None of these 5. Who invented the high level language ‘C’? (1) Dennis M. Ritchie (2) Niklaus Writh (3) Seymour Papert (4) Donald Kunth (5) None of these 6. A Person who designs program, operate and maintain computer equipment refers to- (1) Console-operator (2) Programmer (3) People-ware (4) System Analyst

(5) None of these

Page 39: Computer Mcq

7. When did arch rivals IBM and Apple Computers Inc. decided to join hands? (1) 1978 (2) 1984 (3)1990 (4) 1991 (5) None of these 8. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens? (1) Monitor (2) Hardware (3) Robot (4) Computer (5) None of these 9. An error in software or hardware is called a bug. What is the alternative computer jargon forit? (1) Leech (2) Squid (3) Slug (4) Glitch (5) None of these 10. Modern Computer are very reliable but they are not (1) Fast (2) Powerful (3) Infallible (4) Cheap (5) None of these 11. ‘Most Advanced form of ROM is- (1) PROM (2) Cache Memory (3) EPROM (4) EEPROM (5) None of these 12. Laptops was invented by- (1) Dennis Ritchie (2) Blaise Pascal (3) Donald Kunth (4) Charles Babbage (5) Adam Osborne 13. Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards? (1) Daughter board (2) Motherboard (3) Father board (4)Breadboard (5) None of these 14. Granting an outside organization access to internet web pages is often implemented usinga(n)- (1) Extranet (2) Intranet (3) Internet(4) Wirenet (5) None of these 15. What is meant by a dedicated computer? (1) Which is used by one person only (2) Which is assigned one and only one task (3) Which uses one kind of software (4) Which is meant for application software (5) None of theseAnswer

QUN ANS QUN ANS QUN ANS

1 1 6 2 11 4

2 2 7 4 12 5

3 3 8 4 13 2

4 3 9 4 14 1

5 1 10 3 15 2

Page 40: Computer Mcq

1.Data going into the computer is called(1) output (2) algorithm (3) input (4) calculations (5) flowchart

2.How many values can be represented by a single byte?(1) 4 (2) 16 (3) 64 (4) 256 (5) 512

3.Transformation of input into output is performed by(1) Peripherals (2) Memory (3) Storage (4) The input-output unit (5) The CPU

4.Device drivers are(1) tiny power cords for external storage devices (2) experts who know to maximize the performance ofdevice(3) small, special-purpose programs (4) the innermost part of the operating system(5) substitutes for operating system

5.A collection of programs that controls how your computer system runs and processes information is called(1) operating system (2) computer (3) office (4) compiler (5) interpreter

6.which of the following refers to a small, single-site network?(1) LAN (2) DSL (3) RAM (4) USB (5) CPU

7.A set of instructions telling the computer what to do is called(1) mentor (2) instructor (3) compiler (4) program (5) debugger

8.If you receive an e-mail from someone you don’t know, what should you do?(1) Forward it to the police immediately (2) Delete it without opening it(3) Open it and respond to them saying you don’t know them (4) Reply and ask them for their personal information(5) Reply and tell them you want to keep in touch with them

9.Which of the following can handle most system functions that aren’t handled directly by the operation system?(1) Vertical market applications (2) Utilities (3) Algorithms (4) Integrated software (5) Compilers

10.How many options does a binary choice offer?(1) None (2) One (3) Two (4) It depends on the amount of memory in the computer(5) it depends on the speed of the computer’s processor

11.What menu is selected to cut, copy, and paste?(1) File (2) Tools (3) Special (4) Edit (5) None of these

12.The most important or powerful computer in a typical network is(1) desktop (2) network client (3) network server (4) network station (5) None of these

13.The primary purpose of software is to turn data into(1) Web sites (2) information (3) programs (4) objects (5) None of these

Page 41: Computer Mcq

14.The ability to find an individual item in a file immediately ___ is used.(1) File allocation table (2) directory (3) sequential access (4) direct access (5) None of these

15.To make a notebook act as a desktop model, the notebook can be connected to a ___ which is connected to a monitor and other devices.(1) bay (2) docking station (3) port (4) network (5) None of these

Answers:Qns. Ans. Qns. Ans. Qns. Ans.

1 3 6 1 11 4

2 5 7 4 12 3

3 5 8 2 13 2

4 3 9 2 14 4

5 1 10 3 15 2

Daily Computer Quiz-18 1. Second Generation computers were developed during-(1) 1949 to 1955 (2) 1956 to 1965(3) 1965 to 1970 (4) 1970 to 1990(5) None of these2. Microprocessors as switching devices was used for which generation computers-(1) First Generation (2) Second Generation(3) Third Generation (4) Fourth Generation(5) None of these3. Which of the following devices can be sued to directly image printed text?(1) OCR (2) OMR(3) MICR (4) All of above(5) None of these4. In analog computer(1) Input is first converted to digital form(2) Input is never converted to digital form(3) Output is displayed in digital form(4) All of above (5) None of these5. An error in software or hardware is called a bug. What is the alternative computer jargon for it?(1) Leech (2) Squid(3) Slug (4) Glitch(5) None of these6. The system unit of a personal computer typically contains all of the following except:(1) Microprocessor (2) Disk controller(3) Serial interface (4) Modem(5) None of these

Page 42: Computer Mcq

7. The ALU of a computer responds to the commands coming from-(1) Primary memory (2) Control section(3) External memory (4) Cache memory(5) None of these8. The act of retrieving existing data from memory is called-(1) Read-out (2) Read from(3) Read (4) All of above(5) None of these9. Instructions and memory address are represented by(1) Character code (2) Binary codes(3) Binary word (4) Parity bit(5) None of these10. Which of the following code used in present day computing, was developed by IBM Corporation?(1) ASCII (2) Hollerith Code(3) Baudot Code (4) EBCDIC Code(5) None of these11. What is the latest ‘write-once’ optical storage media?(1) Digital paper (2) Magneto-optical disk(3) WORM disk (4) CD-ROM disk(5) None of these12. Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify?(1) Tracknumber (2) Sector number(3) Surfacenumber (4) All of above(5) None of these13. A kind of serial dot-matrix printer that forms characters with magnetically-charged ink sprayed dotsis called-(1) Laser printer (2) Ink-jet printer(3) Drum printer (4) Chan printer(5) None of these14. Which of the following will happen when data isenteredinto a memory location?(1) It will add to the content of the location(2) It will change the address of the memory location(3) It will erase the previous content(4) It will not be fruitful if there is already some data at the location(5) None of these15. A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is(1) Memory (2) Buffer(3) Accumulator (4) Address(5) None of these

Page 43: Computer Mcq

AnswerQUE ANS QUE ANS QUE ANS

1 2 6 4 11 4

2 4 7 2 12 4

3 1 8 4 13 2

4 2 9 2 14 3

5 4 10 4 15 2

1.Ethernet is the example of-(1)LAN (2) MAN (3) WAN (4) Wi-FI (5) None of these2.In CSMA/CD, CD means-(1) Communication device(2) Collision Detection (3) Collision device (4) Communication Detection(5) None of these

3.____is when more power hungry components, such as the monitor and the hard drive, are put in idle.(1) Hibernation (2) Power down (3) Standby mode (4) shutdown (5) None of these

4.A ____ is a combination of hardware and software that facilities the sharing of information between computing devices.(1) network (2) peripheral (3) expansion board (4) digital device (5) None of these

5.____ are device used to transmit data over telecommunication lines.(1) Drives (2) Drive bays(3) Modems (4) Platforms (5) None of these

6.Servers are computers that provide resources to other computers connected to a -(1) Network (2) mainframe (3) Supercomputer (4) client (5) None of these

7.Network components are connected to the same cable in the ____ topology.(1) Star (2) Ring (3) Bus (4) Mesh (5) None of these

8.Office LANs that are spread geographically apart on a large scale can be connected using a corporate-(1) LAN (2) MAN (3) CAN (4) WAN (5) None of these

9.The most powerful computer in a typical network-(1) desktop (2) network client (3) server (4) network station (5) None of these

10.A flow in a program that causes it to produce incorrect or inappropriate results is called a-(1) bug (2) byte (3) case (4) stylus(5) None of these

11.Personal computer can be connected together to form a-(1) server (2) super computer (3) network (4) enterprise (5) None of these

12.The process of computer receiving information from a server in the internet is known as-(1) Pulling (2) pushing(3) Downloading (4) transferring (5) None of these

Page 44: Computer Mcq

13.Which is the network operating system?(1) Unix (2) DOS (3) WIN95 (4) WIN98(5)NONE OF THESE

14.The network connecting several computers all over the world is -(1) Arpanet (2) Internet(3) Network (4) Intranet(5) None of these

15.What are the most commonly used transmission speeds in BPS used in data communication?(1) 300 (2) 9600 (3) 1200 (4)2600 (5) None of these

Answer

Qns. Ans. Qns. Ans. Qns. Ans.

1 1 6 1 11 3

2 2 7 3 12 3

3 3 8 4 13 1

4 1 9 3 14 2

5 3 10 1 15 2