Breaking News

Computer Science MCQs by General knowledge Solutions

Computer Science MCQs by General knowledge Solutions

                                                                                             




1. What is Wired Equivalent Privacy (WEP) ?
a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
d) none of the mentioned View Answer

Answer:b Explanation:None.

2. What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access View

Answer Answer:a Explanation:None.



3. WiMAX stands for
a) wireless maximum communication
b) worldwide interoperability for microwave access
c) worldwide international standard for microwave access
d) none of the mentioned View Answer

Answer:b Explanation:None.

4. WiMAX provides
a) simplex communication
b) half duplex communication
c) full duplex communication
d) none of the mentioned View Answer

 Answer:c Explanation:None

5. WiMAX uses the
a) orthogonal frequency division multiplexing
b) time division multiplexing
c) space division multiplexing
d) all of the mentioned View Answer

Answer:a Explanation:None.

6. Which one of the following modulation scheme is supported by WiMAX?
a) binary phase shift keying modulation
b) quadrature phase shift keying modulation
c) quadrature amplitude modulation
d) all of the mentioned View Answer

Answer:d Explanation:None.

7. WiMAX MAC layer provides an interface between
a) higher transport layers and physical layer
b) application layer and network layer
c) data link layer and network layer
d) none of the mentioned View Answer

 Answer:a Explanation:None.

8. For encryption, WiMAX supports
a) advanced encryption standard
b) triple data encryption standard
c) both (a) and (b)
d) none of the mentioned View Answer

 Answer:c Explanation:None.

9. WiMAX provides
a) VoIP services
b) IPTV services
c) both (a) and (b)
d) none of these

Answer:c Explanation:None.

10. Devices that provide the connectivity to a WiMAX network are known as
a) subscriber stations
b) base stations
c) gateway
d) none of these

 Answer:a Explanation:None.

11. WiMAX is mostly used for
a) local area network
b) metropolitan area network
c) personal area network
d) none of these
Answer:b Explanation:None.

12. Which one of the following frequency is not used in WiMAX for communication?
 a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz

 Answer:b Explanation:None.

13. The operating system is an example of a computer C.
 a. object
b. file system
c. program
d. desktop

14. Most operating systems are comprised of three main components: the B, the file system, and the shell.
a. desktop
b. kernel
c. user interface
d. code

15. The B keeps track of directories and files.
a. kernel
b. file system
c. shell
d. user interface

16. Most often, you click with the B button when you want to select something.
a. middle
b. left
c. right
d. all of the above

17. Before the days of Windows, users interfaced with the operating system through a D interface.
a. graphical
b. object oriented
c. command utility
d. command line

18. The C is often used as part of a path.
a. comma
b. forward slash
c. backslash
d. semicolon

19. The B is often used in a switch.
a. comma
b. forward slash
c. backslash
d. semicolon

20. The C is the entire window that fills your computer screen and its contents.
a. System Tray
b. Taskbar
c. Desktop
d. Quick Launch Toolbar

21. A quicker way to launch a program is to click on it in the D.
a. System Tray
b. Taskbar
c. Desktop
d. Quick Launch Toolbar

22. The B lets you move between applications without having to open and close them all the time.
a. System Tray
b. Taskbar
c. Desktop
d. Quick Launch Toolbar

23. You will find the clock and icons for certain applications in the A.
a. System Tray
b. Taskbar
c. Desktop
d. Quick Launch Toolbar

24. B allow(s) us to organize our files so we can more easily find them
a. Navigation
b. Folders
c. Desktop
d. None of the above

25. The D folder is the default place that most applications want to store your data files in.
a. Start menu
b. Recycle Bin
c. Program Files
d. My Documents

26. C is referred to as a path using the proper syntax.
a. c;windows/desktop
b. c:> c.
c:\windows\desktop\My Documents
d. c:winnt/system32

27. The Recycle Bin is configured automatically to be able to store files equal to C of the size of your hard disk.
a. 1 percent
b. 5 percent
c. 10 percent
d. 15 percent

28. The A was really designed for users who also have a notebook computer and often work in files in two different places.
a. Briefcase
b. Suitcase
c. Desktop
d. Start menu

29. D keeps track of the computers around you in a networked environment.
a. My Computers
b. FTP
c. Add Network Place
d. My Network Places

30. If you right click on a file or folder, one of the context menu options is B.
a. remote
b. send to
c. copy to
d. rename to

31. You can drop a file onto the start button to add it to the C.
a. Quick Launch Toolbar
b. Taskbar
c. Start menu
d. Recycle Bin

32. Many operating system directory structures are D.
a. discrete
b. disparate
c. virtual
d. hierarchical

33. The A of a directory structure is the topmost directory on the disk.
a. root
b. tree
c. subdirectory
d. base

34. If you prefer to A on a file versus A, you can configure that setting by going into Tools, Folder Options.
a. single click/double click
b. double click/ single click
c. both of the above
d. none of the above

35. C Explorer is a Web browser that allows to more easily navigate the Internet.
a. Windows
b. Netscape
c. Internet
d. Microsoft

36. A Explorer is a tool that lets you more easily navigate the files and folders on your computer.
a. Windows
b. Netscape
c. Internet
d. Microsoft

37. A floppy disk can hold C when it is formatted.
a. 2.0 MB
b. 1.44 KB
c. 1.44 MB
d. 2.0KB

38. Examples of file C are read only, hidden, and archive.
a. types
b. sizes
c. attributes
d. formats

39. If you C a file you now have more than one instance of it; if you C a file, you only have one instance of it.
 a. borrow/delete
 b. move/copy
 c. copy/move
 d. none of the above

40. Each copy of the file is referred to as a different C of the file.
a. attribute
b. element
c. version
d. facet

41. The C wildcard is used to replace an infinite number of characters.
a. !
b. ?
c. *
d. &

42. The B wildcard is used to replace a single character.
a. !
b. ?
c. *
d. &

43. To select noncontiguous files, hold down the B key when selecting the files.
a. Alt
b. Ctrl
c. Shift
d. Space Bar

No comments