Computer Science MCQs by General knowledge Solutions
Computer Science MCQs by General knowledge Solutions
1. What is Wired Equivalent Privacy (WEP) ?
a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
d) none of the mentioned View Answer
Answer:b Explanation:None.
2. What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access View
Answer Answer:a Explanation:None.
3. WiMAX stands for
a) wireless maximum communication
b) worldwide interoperability for microwave access
c) worldwide international standard for microwave access
d) none of the mentioned View Answer
Answer:b Explanation:None.
4. WiMAX provides
a) simplex communication
b) half duplex communication
c) full duplex communication
d) none of the mentioned View Answer
Answer:c Explanation:None
5. WiMAX uses the
a) orthogonal frequency division multiplexing
b) time division multiplexing
c) space division multiplexing
d) all of the mentioned View Answer
Answer:a Explanation:None.
6. Which one of the following modulation scheme is supported by WiMAX?
a) binary phase shift keying modulation
b) quadrature phase shift keying modulation
c) quadrature amplitude modulation
d) all of the mentioned View Answer
Answer:d Explanation:None.
7. WiMAX MAC layer provides an interface between
a) higher transport layers and physical layer
b) application layer and network layer
c) data link layer and network layer
d) none of the mentioned View Answer
Answer:a Explanation:None.
8. For encryption, WiMAX supports
a) advanced encryption standard
b) triple data encryption standard
c) both (a) and (b)
d) none of the mentioned View Answer
Answer:c Explanation:None.
9. WiMAX provides
a) VoIP services
b) IPTV services
c) both (a) and (b)
d) none of these
Answer:c Explanation:None.
10. Devices that provide the connectivity to a WiMAX network are known as
a) subscriber stations
b) base stations
c) gateway
d) none of these
Answer:a Explanation:None.
11. WiMAX is mostly used for
a) local area network
b) metropolitan area network
c) personal area network
d) none of these
Answer:b Explanation:None.
12. Which one of the following frequency is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
Answer:b Explanation:None.
a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
d) none of the mentioned View Answer
Answer:b Explanation:None.
2. What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access View
Answer Answer:a Explanation:None.
3. WiMAX stands for
a) wireless maximum communication
b) worldwide interoperability for microwave access
c) worldwide international standard for microwave access
d) none of the mentioned View Answer
Answer:b Explanation:None.
4. WiMAX provides
a) simplex communication
b) half duplex communication
c) full duplex communication
d) none of the mentioned View Answer
Answer:c Explanation:None
5. WiMAX uses the
a) orthogonal frequency division multiplexing
b) time division multiplexing
c) space division multiplexing
d) all of the mentioned View Answer
Answer:a Explanation:None.
6. Which one of the following modulation scheme is supported by WiMAX?
a) binary phase shift keying modulation
b) quadrature phase shift keying modulation
c) quadrature amplitude modulation
d) all of the mentioned View Answer
Answer:d Explanation:None.
7. WiMAX MAC layer provides an interface between
a) higher transport layers and physical layer
b) application layer and network layer
c) data link layer and network layer
d) none of the mentioned View Answer
Answer:a Explanation:None.
8. For encryption, WiMAX supports
a) advanced encryption standard
b) triple data encryption standard
c) both (a) and (b)
d) none of the mentioned View Answer
Answer:c Explanation:None.
9. WiMAX provides
a) VoIP services
b) IPTV services
c) both (a) and (b)
d) none of these
Answer:c Explanation:None.
10. Devices that provide the connectivity to a WiMAX network are known as
a) subscriber stations
b) base stations
c) gateway
d) none of these
Answer:a Explanation:None.
11. WiMAX is mostly used for
a) local area network
b) metropolitan area network
c) personal area network
d) none of these
Answer:b Explanation:None.
12. Which one of the following frequency is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
Answer:b Explanation:None.
13. The operating system is an example of a computer C.
a. object
b. file system
c. program
d. desktop
14. Most operating systems are comprised of three main components: the B, the file system, and the shell.
a. desktop
b. kernel
c. user interface
d. code
15. The B keeps track of directories and files.
a. kernel
b. file system
c. shell
d. user interface
16. Most often, you click with the B button when you want to select something.
a. middle
b. left
c. right
d. all of the above
17. Before the days of Windows, users interfaced with the operating system through a D interface.
a. graphical
b. object oriented
c. command utility
d. command line
18. The C is often used as part of a path.
a. comma
b. forward slash
c. backslash
d. semicolon
19. The B is often used in a switch.
a. comma
b. forward slash
c. backslash
d. semicolon
20. The C is the entire window that fills your computer screen and its contents.
a. System Tray
b. Taskbar
c. Desktop
d. Quick Launch Toolbar
21. A quicker way to launch a program is to click on it in the D.
a. System Tray
b. Taskbar
c. Desktop
d. Quick Launch Toolbar
22. The B lets you move between applications without having to open and close them all the time.
a. System Tray
b. Taskbar
c. Desktop
d. Quick Launch Toolbar
23. You will find the clock and icons for certain applications in the A.
a. System Tray
b. Taskbar
c. Desktop
d. Quick Launch Toolbar
24. B allow(s) us to organize our files so we can more easily
find them
a. Navigation
b. Folders
c. Desktop
d. None of the above
25. The D folder is the default place that most applications want to store your data files in.
a. Start menu
b. Recycle Bin
c. Program Files
d. My Documents
26. C is referred to as a path using the proper syntax.
a. c;windows/desktop
b. c:> c.
c:\windows\desktop\My Documents
d. c:winnt/system32
27. The Recycle Bin is configured automatically to be able to store files equal to C of the size of your hard disk.
a. 1 percent
b. 5 percent
c. 10 percent
d. 15 percent
28. The A was really designed for users who also have a notebook computer and often work in files in two different places.
a. Briefcase
b. Suitcase
c. Desktop
d. Start menu
29. D keeps track of the computers around you in a networked environment.
a. My Computers
b. FTP
c. Add Network Place
d. My Network Places
30. If you right click on a file or folder, one of the context menu options is B.
a. remote
b. send to
c. copy to
d. rename to
31. You can drop a file onto the start button to add it to the C.
a. Quick Launch Toolbar
b. Taskbar
c. Start menu
d. Recycle Bin
32. Many operating system directory structures are D.
a. discrete
b. disparate
c. virtual
d. hierarchical
33. The A of a directory structure is the topmost directory on the disk.
a. root
b. tree
c. subdirectory
d. base
34. If you prefer to A on a file versus A, you can configure that setting by going into Tools, Folder Options.
a. single click/double click
b. double click/ single click
c. both of the above
d. none of the above
35. C Explorer is a Web browser that allows to more easily navigate the Internet.
a. Windows
b. Netscape
c. Internet
d. Microsoft
36. A Explorer is a tool that lets you more easily navigate the files and folders on your computer.
a. Windows
b. Netscape
c. Internet
d. Microsoft
37. A floppy disk can hold C when it is formatted.
a. 2.0 MB
b. 1.44 KB
c. 1.44 MB
d. 2.0KB
38. Examples of file C are read only, hidden, and archive.
a. types
b. sizes
c. attributes
d. formats
39. If you C a file you now have more than one instance of it; if you C a file, you only have one instance of it.
a. borrow/delete
b. move/copy
c. copy/move
d. none of the above
40. Each copy of the file is referred to as a different C of the file.
a. attribute
b. element
c. version
d. facet
41. The C wildcard is used to replace an infinite number of characters.
a. !
b. ?
c. *
d. &
42. The B wildcard is used to replace a single character.
a. !
b. ?
c. *
d. &
43. To select noncontiguous files, hold down the B key when selecting the files.
a. Alt
b. Ctrl
c. Shift
d. Space Bar
a. Navigation
b. Folders
c. Desktop
d. None of the above
25. The D folder is the default place that most applications want to store your data files in.
a. Start menu
b. Recycle Bin
c. Program Files
d. My Documents
26. C is referred to as a path using the proper syntax.
a. c;windows/desktop
b. c:> c.
c:\windows\desktop\My Documents
d. c:winnt/system32
27. The Recycle Bin is configured automatically to be able to store files equal to C of the size of your hard disk.
a. 1 percent
b. 5 percent
c. 10 percent
d. 15 percent
28. The A was really designed for users who also have a notebook computer and often work in files in two different places.
a. Briefcase
b. Suitcase
c. Desktop
d. Start menu
29. D keeps track of the computers around you in a networked environment.
a. My Computers
b. FTP
c. Add Network Place
d. My Network Places
30. If you right click on a file or folder, one of the context menu options is B.
a. remote
b. send to
c. copy to
d. rename to
31. You can drop a file onto the start button to add it to the C.
a. Quick Launch Toolbar
b. Taskbar
c. Start menu
d. Recycle Bin
32. Many operating system directory structures are D.
a. discrete
b. disparate
c. virtual
d. hierarchical
33. The A of a directory structure is the topmost directory on the disk.
a. root
b. tree
c. subdirectory
d. base
34. If you prefer to A on a file versus A, you can configure that setting by going into Tools, Folder Options.
a. single click/double click
b. double click/ single click
c. both of the above
d. none of the above
35. C Explorer is a Web browser that allows to more easily navigate the Internet.
a. Windows
b. Netscape
c. Internet
d. Microsoft
36. A Explorer is a tool that lets you more easily navigate the files and folders on your computer.
a. Windows
b. Netscape
c. Internet
d. Microsoft
37. A floppy disk can hold C when it is formatted.
a. 2.0 MB
b. 1.44 KB
c. 1.44 MB
d. 2.0KB
38. Examples of file C are read only, hidden, and archive.
a. types
b. sizes
c. attributes
d. formats
39. If you C a file you now have more than one instance of it; if you C a file, you only have one instance of it.
a. borrow/delete
b. move/copy
c. copy/move
d. none of the above
40. Each copy of the file is referred to as a different C of the file.
a. attribute
b. element
c. version
d. facet
41. The C wildcard is used to replace an infinite number of characters.
a. !
b. ?
c. *
d. &
42. The B wildcard is used to replace a single character.
a. !
b. ?
c. *
d. &
43. To select noncontiguous files, hold down the B key when selecting the files.
a. Alt
b. Ctrl
c. Shift
d. Space Bar
No comments