Computer MCQs with Answer (part 1 ) by General knowledge Solutions
Computer MCQs with Answer (part 1) by General knowledge Solutions
Q.1.The metal or
plastic case that holds all the physical parts of the computer is the:
(A)System Unit. (correct)·
(B)CPU.·
(C)Mainframe·
(D)Platform.·
Q.2.------------- controls the way in which the computer system
functions and provides a means by which users can interact with the computer.
(A) The
Platform·
(B)The Operating System (correct)·
(C)Application Software·
(D)The Motherboard·
Q.3.--------------is
the science revolving around the use of Nano Structures to build devices on an
extremely small scale.
(A)Nanotechnology (correct)·
(B)Micro-technology·
(C)Computer forensics·
(D)Artificial
intelligence·
Q.4.Servers are
computers that provide resources to other computers connected to a
(A)Network. (correct)·
(B)Mainframe.·
(C)Super Computer.·
(D)Client.·
Q.5.Word processing, spreadsheet, and photo-editing are examples of:
(A) Application software. (correct)·
(B)System software.·
(C)Operating system software.·
(D)Platform software.·
Q.6.Which one is not
an examples of input devices :
(A) Scanner.·
(B)Mouse.·
(C)Keyboard.·
(D)Printer. (correct)·
Q.7.A string of eight
0's Or 1's is called a:
(A) Megabyte.·
(B)Byte. (correct)·
(C)Kilobyte.·
(D)Gigabyte.·
Q.8.After a picture
has been taken with a digital camera and processed appropriately, the actual
print of the picture is considered
(A) Data.·
(B)Output (correct)·
(C)Input.·
(D)Process·
Q.9.-------- is the study of molecules & structures whose size
ranges from 1 to 100 Nanometers (A)Nanoscience
(correct)·
(B)Microelectrodes·
(C)cComputer forensics·
(D)Artificial
intelligence·
Q.10.The ability to
recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called:
(A)Robotics.·
(B)Simulation.·
(C)Computer forensics (correct)·
(D)Animation.·
Q.11.The _______states that a foreign key must either match a primary key
value in another relation or it must be null.
(A)Entity integrity rule (correct)·
(B)Referential integrity constraint·
(C)Action assertion·
(D)Composite attribute·
Q.12.An applet _______ Is an
interpreted program that
(A)runs on·
(B)the client Tracks the
number of visitors to a·
(C)Is a compiled program that usually runs·
(D)on the client Collects data from visitors to a Website·
Q.13.A ________sometimes called a boot sector virus, executes when a
computer boots up because it resides in the boot sector of a floppy disk orthe
master boot record of a hard disk.
(A)System virus·
(B)Trojan horse virus·
(C)File virus·
(D)None of these
(correct)·
Q.14.Which error detection method uses one's complement arithmetic?
(A)Simply parity check·
(B)Check sum (correct)·
(C)Two-dimensional parity check·
(D)CRC·
Q.15.A result of a computer virus can NOT lead to ________ .
(A)Disk Crash·
(B)Mother Board Crash
(correct)·
(C)Corruption of program·
(D)Deletion of files·
Q.16.The network
interface card of LAN is related to following layer of OSIModel
(A)Transport·
(B)Network·
(C)Data Link·
(D)& Physical All of
these (correct)·
Q.17.Which of the following does NOT describe a data warehouse?
(A)Subject-oriented·
(B)Integrated·
(C)Time-variant·
(D)Updateable (correct)·
Q.18.Which of the following is TRUE ?
(A)Logical
design is software-dependent·
(correct)
(B)In a distributed
database, database is·
(C)stored in one physical location Conceptual design translates the logical·
(D)design into internal
model Logical design is software
independent·
Q.19.A range check ________
(A)Ensures that only the correct data type·
(B)is entered into a
field Verifies that all required data is
present·
(C)Determines whether a
number is·
(D)within a specified limit (correct)
Tests if the data in
two or more·
associated fields is logical
Q.20.The total set of
(A)interlinked ·
(B)hypertext documents worldwide is HTTP (correct) Browser·
(C)WWW·
(D)B2B·
21. The software
tools that enable a user to interact with a computer for specific purposes are
known as—
(A) Hardware
(B) Networked Software
(C) Shareware
(D) Applications
(E) None of these Ans : (D)
22. A………shares hardware, software, and data among authorized users.
(A)
network
(B) protocol
(C)
hyperlink
(D) transmitter
(E) None of these Ans : (A)
2 3.
Computer programs are written in a high-level programming language; however,
the humanreadable version of a program is called—
(A) cache
(B) instruction set
(C) source code
(D) word size
(E) None of these Ans : (C)
24. In word processing, an efficient way to
move the 3rd paragraph to place it after the 5th paragraph is—
(A) copy and paste
(B) copy, cut and paste
(C) cut, copy and paste
(D) cut and paste
(E) None of these Ans : (D)
25.
Which of the following is not a function of the control unit ?
(A) Read instructions
(B)
Execute instructions
(C) Interpret instructions
(D) Direct operations
(E) None of these Ans : (D)
26. Software for organizing storage and retrieval
of information is a(n)—
(A) operating system
(B) database
(C) database program
(D) data warehouse
(E) None of these Ans : (C)
27.
A set of step-by-step procedures for accomplishing a task is known as a(n)—
(A) algorithm
(B) hardware program
(C) software bug
(D) firmware program
(E) None of these Ans : (A)
28. Which of the following is not true about
RAM ?
(A)
RAM is a temporary storage area
(B) RAM is the same as hard disk storage
(C) RAM is volatile
(D) Information stored in RAM is gone when
you turn the computer off
(E) None of these Ans : (B)
29. The main directory of a disk is called
the………directory.
(A) root
(B) sub
(C) folder
(D)
network
(E) None of these Ans : (A)
30. The physical arrangement of elements on a
page is referred to as a document’s……
(A) features
(B) format
(C) pagination
(D) grid
(E) None of these Ans : (B)
31.
=SUM (B1 : B8) is an example of a—
(A) function
(B) formula
(C) cell address
(D) value
(E) None of these Ans : (B)
32.
Which of the following storage media provides sequential access only ?
(A) Floppy disk
(B) Magnetic disk
(C) Magnetic tape
(D) Optical disk
(E) None of these Ans : (B)
33.
Compilers and translators are one form of—
(A) ROM
(B) RAM
(C) Hard disk
(D) Software
(E) None of these Ans : (D)
34.
Data representation is based on the………number system, which uses two numbers to
represent all data.
(A) binary
(B) biometric
(C) bicentennial
(D) byte
(E) None of these Ans : (A)
35. The most common input devices include—
(A) Monitor and keyboard
(B) Monitor and mouse
(C) Mouse and keyboard
(D) Printer and mouse
(E) None of these Ans : (C)
36. www means—
(A) world wide wonder
(B) world wide wizard
(C) world wide web
(D) wide world web
(E) None of these Ans : (C)
No comments