Breaking News

Computer MCQs with Answer (part 1 ) by General knowledge Solutions

Computer MCQs with Answer (part 1) by General knowledge Solutions 

                                                                                       






Q.1.The metal or plastic case that holds all the physical parts of the computer is the:  
 (A)System Unit. (correct)·
 (B)CPU.·
 (C)Mainframe·
 (D)Platform.·

 Q.2.------------- controls the way in which the computer system functions and provides a means by which users can interact with the computer.
  (A) The Platform·
  (B)The Operating System (correct)·
  (C)Application Software·
  (D)The Motherboard·

Q.3.--------------is the science revolving around the use of Nano Structures to build devices on an extremely small scale.
 (A)Nanotechnology (correct)·  
 (B)Micro-technology·  
 (C)Computer forensics·
 (D)Artificial intelligence·

Q.4.Servers are computers that provide resources to other computers connected to a  
(A)Network. (correct)·  
(B)Mainframe.·  
(C)Super Computer.·  
(D)Client.·


Q.5.Word processing, spreadsheet, and photo-editing are examples of:
(A) Application software. (correct)·
(B)System software.·  
(C)Operating system software.·
(D)Platform software.·

Q.6.Which one is not an examples of input devices :
(A) Scanner.·  
(B)Mouse.·  
(C)Keyboard.·  
(D)Printer. (correct)·

Q.7.A string of eight 0's Or 1's is called a:
 (A) Megabyte.·
 (B)Byte. (correct)·
 (C)Kilobyte.·
 (D)Gigabyte.·

Q.8.After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered
   (A) Data.·
   (B)Output (correct)·
   (C)Input.·
   (D)Process·

 Q.9.-------- is the study of molecules & structures whose size ranges from 1 to 100 Nanometers  (A)Nanoscience (correct)·  
 (B)Microelectrodes·
 (C)cComputer forensics·
 (D)Artificial intelligence·

Q.10.The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
 (A)Robotics.·  
 (B)Simulation.·  
 (C)Computer forensics (correct)·
 (D)Animation.·

 Q.11.The _______states that a foreign key must either match a primary key value in another relation or it must be null.
(A)Entity integrity rule (correct)·
(B)Referential integrity constraint·  
(C)Action assertion·  
(D)Composite attribute·

 Q.12.An applet _______  Is an interpreted program that
(A)runs on·
(B)the client  Tracks the number of visitors to a·
(C)Is a compiled program that usually runs·
(D)on the client  Collects data from visitors to a Website·

 Q.13.A ________sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk orthe master boot record of a hard disk.  
(A)System virus·  
(B)Trojan horse virus·
(C)File virus·
 (D)None of these (correct)·

 Q.14.Which error detection method uses one's complement arithmetic?
 (A)Simply parity check·  
(B)Check sum (correct)·  
(C)Two-dimensional parity check·
 (D)CRC·

 Q.15.A result of a computer virus can NOT lead to ________ .
 (A)Disk Crash·
 (B)Mother Board Crash (correct)·
 (C)Corruption of program·  
 (D)Deletion of files·

Q.16.The network interface card of LAN is related to following layer of OSIModel  
(A)Transport·
 (B)Network·  
(C)Data Link·
(D)& Physical  All of these (correct)·

 Q.17.Which of the following does NOT describe a data warehouse?  
(A)Subject-oriented·
 (B)Integrated·  
(C)Time-variant·  
(D)Updateable (correct)·

 Q.18.Which of the following is TRUE ?
  (A)Logical design is software-dependent· (correct)
 (B)In a distributed database, database is·
(C)stored in one physical location  Conceptual design translates the logical·
 (D)design into internal model  Logical design is software independent·

 Q.19.A range check ________  
(A)Ensures that only the correct data type·
 (B)is entered into a field  Verifies that all required data is present·
 (C)Determines whether a number is·
(D)within a specified limit (correct)
 Tests if the data in two or more· associated fields is logical

Q.20.The total set of
  (A)interlinked ·
  (B)hypertext documents worldwide is HTTP (correct)  Browser·
  (C)WWW·
  (D)B2B·


21. The software tools that enable a user to interact with a computer for specific purposes are known as—
(A) Hardware
(B) Networked Software
(C) Shareware
(D) Applications
(E) None of these Ans : (D)

 22. A………shares hardware, software, and data among authorized users.

(A)   network
(B) protocol
 (C) hyperlink
(D) transmitter
(E) None of these Ans : (A)

2 3. Computer programs are written in a high-level programming language; however, the humanreadable version of a program is called—
(A) cache
(B) instruction set
(C) source code
(D) word size
(E) None of these Ans : (C)

 24. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is—
(A) copy and paste
(B) copy, cut and paste
(C) cut, copy and paste
(D) cut and paste
(E) None of these Ans : (D)

25. Which of the following is not a function of the control unit ?
(A) Read instructions
 (B) Execute instructions
(C) Interpret instructions
(D) Direct operations
(E) None of these Ans : (D)

 26. Software for organizing storage and retrieval of information is a(n)—
(A) operating system
(B) database
(C) database program
(D) data warehouse
(E) None of these Ans : (C)

27. A set of step-by-step procedures for accomplishing a task is known as a(n)—
(A) algorithm
(B) hardware program
(C) software bug
(D) firmware program
(E) None of these Ans : (A)

 28. Which of the following is not true about RAM ?
 (A) RAM is a temporary storage area
(B) RAM is the same as hard disk storage
(C) RAM is volatile
(D) Information stored in RAM is gone when you turn the computer off
(E) None of these Ans : (B)

 29. The main directory of a disk is called the………directory.
(A) root
(B) sub
(C) folder
 (D) network
(E) None of these Ans : (A)

 30. The physical arrangement of elements on a page is referred to as a document’s……
(A) features
(B) format
(C) pagination
(D) grid
(E) None of these Ans : (B)

31. =SUM (B1 : B8) is an example of a—
(A) function
(B) formula
(C) cell address
(D) value
(E) None of these Ans : (B)

32. Which of the following storage media provides sequential access only ?
(A) Floppy disk
(B) Magnetic disk
(C) Magnetic tape
(D) Optical disk
(E) None of these Ans : (B)

33. Compilers and translators are one form of—
(A) ROM
(B) RAM
(C) Hard disk
(D) Software
(E) None of these Ans : (D)

34. Data representation is based on the………number system, which uses two numbers to represent all data.
(A) binary
(B) biometric
(C) bicentennial
(D) byte
(E) None of these Ans : (A)


35. The most common input devices include—
(A) Monitor and keyboard
(B) Monitor and mouse
(C) Mouse and keyboard
(D) Printer and mouse
(E) None of these Ans : (C)

36. www means—
(A) world wide wonder
(B) world wide wizard
(C) world wide web
(D) wide world web
(E) None of these Ans : (C)

No comments