Computer Knowledge MCQs (Chalanging - 2)
Q1. Cache and main memory will lose their content when power is turned off. They are categorized as ______.
a) Volatile
b) Non-Volatile
c) Tangible
d) Static
e) None of the above
Q2. DRAM stands for ____.
a) Digital Random Access Memory
b) Domain Random Access Memory
c) Dynamic Random Access Memory
d) Dividend Random Access Memory
e) None of the above
Q3. What is the name given to the process of initializing a personal computer with its operating system?
a) Rooting
b) Knotting
c) Routing
d) Booting
e) None of the above
Q4. Which among the following is/are parts associated with an operating system?a) Device drivers
b) Kernel
c) User Interface
d) System Utilities
e) All of the above
Q5. Which among the given options is graphical representation of an application?
a) Windows Explorer
b) Task Bar
c) Icon
d) Microsoft Explorer
e) Windows 95
Q6. What is the shortcut key if you want to justify the selected text?
a) Ctrl+1
b) Ctrl+Alt+J
c) Ctrl+J
d) Alt+J
e) Shift+J
Q7. What is a special visual and audio effect applied in PowerPoint called?
a) Swipe
b) Wipe
c) Flash
d) Animation
e) None of the above
Q8. What type of language is HTML?
a) Scripting
b) Programming
c) Web Browser
d) Encryption
e) Protocol
Q9. What is Authentication?
a) asserting data
b) Assuring the identity of the user
c) establishing connection
d) managing memory
Q10. Which of the following is/are threat for electronic payment system?
a) Computer Worms
b) Computer Virus
c) Trojan Horse
d) All of the above
e) None of the above
Q11. Which among the following statement is true about motherboard?
(b) Motherboard specifically refers to a PCB with expansion capability
(c) It is the main printed circuit board (PCB) found in general purpose microcomputers and other expandable systems
(d) All of the above
(e) None of the above
Q12. If your computer keeps
rebooting itself, then it is likely that _______.
(a) It has a virus
(b) It does not have enough memory
(c) There is no printer
(d) There has been a power surge
(e) It needs a CD-ROM
Q13. When the pointer is
positioned which of the following, it is shaped like a
hand?
(a) Grammar
error(b) Hyperlink
(c) Screen Tip
(d) Spelling error
(e) Syntax error
(a)
Copying
(b)
Merging(c) Pasting
(d) Compiling
(e) None of these
Q15. Which type of software coordinates the interaction of technology devices?
a) Application software
b) Utility software
c) Operation system
d) Systems software
e) None of these.
Q16. Computers manipulate data
in many ways, and this
manipulation is called—
a)
updatingb) batching
c) upgrading
d) processing
e) None of these.
a) hub
b) site
c) address
d) template
e) None of these.
Q18. A USB communication device that supports data encryption for secure wireless communication for notebook users is called a
a) USB wireless network adapter
b) wireless switch
c) wireless hub
d) router
e) None of The Above
Q19. Which media have the ability to have data/information stored (written) on them by users more than once?
a) Compact disks
b) CD-RW disks
c) Zip disks
d) Optical Disks
e) Word processing
a) Pull down the File menu and click the Save command
b) Click the Save button on the Standard toolbar
c) click on view bar
d) Either (a) and (b)
e) None of these.
Q21. Once you load the suitable program and provide required data, computer does not need human intervention. This feature is known as
(b) Reliability
(c) Versatility
(d) Automatic
(e) No IQ
Q22. Which of the following is
not the classification of computers based on operating principle?
(a)
Electronic Computers (b) Analog Computers
(c) Digital Computers
(d) Hybrid Computers
(e) Both (b) and (c)
Q23. Which of the following is a
small microprocessor-based computer designed to be used by one person at a
time?
(a)
Netbook(b) Mainframe
(c) Supercomputer
(d) Personal computer
(e) All-in-one
Q24.
ARP (address resolution protocol) is
(a) A
TCP/IP protocol used to dynamically bind a high level IP address to a low level
physical hardware address (b) A TCP/IP high level protocols for transferring files from one machine to another
(c) a protocol used to monitor computers
(d) a protocol that handles error and control messages
(e) All of the above
Q25. A device that not only provides surge protection, but also furnishes the
computer with battery backup power during a power outage is
(a)
Battery strip(b) UPS
(c) Surge strip
(d) USB
(e) Memory
Q26. Which of the following code
used in present day computing was developed by IBM Corporation?
(a)
ASCII(b) Hollerith Code
(c) Baudot Code
(d) EBCDIC Code
(e) All of the above
Q27. Networking such as LAN, MAN
started from which generation of computers?
(a)
First generation
(b)
Second generation(c) Third generation
(d) Fourth generation
(e) Fifth generation
Q28. The conversion of the binary number 10100111011 into its decimal form is __________.
(a)
1339
(b)
1349(c) 1393
(d) 1939
(e) None of these
Q29. __________ are the gates that can be used to
implement any type of Boolean logic.
(a)
OR gates(b) Universal gates
(c) NAND gates
(d) Exclusive-NOR gates
(e) AND gates
Q30. In number system, LSD stands for ----
(a)
Left Significant Digit(b) Low Significant Digit
(c) Lower Significant Digit
(d) Least Significant Digit
(e) Low Simple Digit
Q31. In decimal number 529, which of the following digits is known as the MSD?
(a)
5
(b)
2(c) 9
(d) 10
(e) None of the above
(a)
Indian Standard Code for Information Interchange
(b)
International Standard Code for Information Interchange(c) Indian Standard Code for Interchanging Information
(d) International Standard Code for Interchanging Information
(e) None of the above
Q33. Features of LINUX are:
(a) Portability
(b) Open source
(c) Multi-user & Multi Programming
(d) All of the above
(e) None of the above
Q34. F7 is a short cut key to launch which feature
in MS-word?
(a) Word Count(b) Spelling & Grammar
(c) Mail Merge
(d) Translate
(e) Insert
Q35. CTLR + ENTER KEY(Return) is a short cut to
insert?
(a)
Table(b) Picture
(c) Clip Art
(d) Page Break
(e) MP3 files
Q36. Which is not an object oriented Programming
language-?
(a)
JAVA(c) C++
(b) Python
(d) FORTRAN
(e) Ruby
Q37. Database _______ which is the logical design of the database, and the database ________ which is snapshot of the data in the database at given instant in time.(a) Instance, Schema
(b) Relation, Schema
(c) Relation, Domain
(d) Schema, Instance
(e) Trees, Attributes
Q38. Which of the following extends a private
network across public networks?
(a)
Local area network(b) Virtual private network
(c) Enterprise private network
(d) Storage area network
(e) DSL-LINE
Q39. Bluetooth is an example of ?
(a)
Personal area network(b) Local area network
(b) Virtual private network
(d) None of the above
(e) Wireless fidelity
Q40. In computer network nodes are:
(a)
The computer that originates the data(b) The computer that routes the data
(c) The computer that terminates the data
(d) All of the mentioned
(e) None of the above
Q41. When collection of various computers seems a
single coherent system to its client, then it is called
(a)
Computer Network(b) Distributed System
(c) Both (a) & (b)
(d) None of the above
(e) Server
Q42. Specialised program(s) designed to allow
particular input or output device(s) to communication with the rest of the
computer system is called _______.
(a)
Computer (b) Device drivers
(c) Interpreters
(d) Operating system
(e) None of these
Q43. Distributed processing involves ?
(a)
Solving computer component problems from a different computer (b) Solving computing problems by breaking them into smaller parts that are separately processed by different computers
(c) Allowing users to share files on a network
(d) Allowing users to access network resources away from the office
(e) None of the above
Q44. Which command is used to set a name to a
disk in DOS?
(a)
VOLUME(b) VOL
(c) LABEL
(d) DISKLABEL
(e) None of these
BY - AKASH SHRIVASTAVA
Comments
Post a Comment