Sei sulla pagina 1di 15

The term ‘Computer’ is derived C.

Web World Wide


from__________? D. World Wide Web

A. Latin A collection of system programs that


B. German controls and co-ordinates the overall
C. French operations of a computer system is
D. Arabic called____________?

Who is the father of Computer? A. System software


B. Operating system
A. Allen Turing C. Utility program
B. Charles Babbage D. Device driver
C. Simur Cray
D. Augusta Adaming What type of operating system MS-DOS
is?
The basic operations performed by a
computer are__________? A. Command Line Interface
B. Graphical User Interface
A. Arithmetic operation C. Multitasking
B. Logical operation D. Menu Driven Interface
C. Storage and relative
D. All the above Which technology is used in compact
disks?
Who is the father of Internet ?
A. Mechanical
A. Chares Babbage B. Electrical
B. Vint Cerf C. Electro Magnetic
C. Denis Riche D. Laser
D. Martin Cooper
1 Gigabyte is equal to ____________?
If a computer has more than one
processor then it is known as__________? A. 1024 bits
B. 1000 megabytes
A. Uni-process C. 1024 kilobytes
B. Multiprocessor D. 1024 megabytes
C. Multi-threaded
D. Multi-programming The brain of any computer system
is___________?
A light sensitive device that converts
drawing, printed text or other images into A. ALU
digital form is___________? B. Memory
C. CPU
A. Keyboard D. Control unit
B. Scanner
C. OMR Which of the following are components of
D. None of these Central Processing Unit (CPU) ?

WWW stands for___________? A. Arithmetic logic unit, Mouse


B. Arithmetic logic unit, Control unit
A. World Whole Web C. Arithmetic logic unit, Integrated Circuits
B. Wide World Web D. Control Unit, Monitor
Analog computer works on the supply of A. Medium Scale Integrated Circuits
____________? B. Medium System Integrated Circuits
C. Medium Scale Intelligent Circuit
A.Continuous electrical pulses D. Medium System Intelligent Circuit
B.Electrical pulses but not continuous
C.Magnetic strength _________ is called the father of modern
D.None of the above digital computer?

Read More about this Mcq A. Leibnitz


B. Blaise Pascal
which one is Digital device, select from the C. Charles Babbage
choices below? D. J.H Muller

A.Digital Clock Who is the father of Computer science?


B.Automobile speed meter
C.Clock with a dial and two hands A. Allen Turing
D.All of them B. Charles Babbage
C. Simur Cray
The computer that process both analog D. Augusta Adaming
and digital is called____________?
A CPU contains___________?
A.Analog computer
B.Digital computer A. a card reader and a printing device
C.Hybrid computer B. an analytical engine and a control unit
D.Mainframe computer C. a control unit and an arithmetic logic
unit
Read more about this Mcq D. an arithmetic logic unit and a card reader

CD-ROM stands for____________? Which of the following controls the


process of interaction between the user
A. Compactable Read Only Memory and the operating system?
B. Compact Data Read Only Memory
C. Compactable Disk Read Only Memory A. User interface
D. Compact Disk Read Only Memory B. Language translator
C. Platform
ALU is____________? D. Screen saver

A. Arithmetic Logic Unit The first computers were programmed


B. Array Logic Unit using___________?
C. Application Logic Unit
D. None of above A. Assembly language
B. Machine language
VGA is____________? C. Source code
D. Object code
A. Video Graphics Array
B. Visual Graphics Array __________is a combination of hardware
C. Volatile Graphics Array and software that facilitates the sharing of
D. Video Graphics Adapter information between computing devices.

MSI stands for___________? A. Network


B. Peripheral
C. Expansion board as they do not do any damage
D. Digital device D. are people who are allergic to computers

Coded entries which are used to gain A computer cannot ‘boot’ if it does not
access to a computer system are have the__________?
called__________?
A. Compiler
A. Entry codes B. Loader
B. Passwords C. Operating System
C. Security commands D. Assembler
D. Code words
The amount of vertical space between
Which of the following statements is true lines of text in a document is
about Minicomputer and Microcomputer? called___________?

A. Minicomputer works faster than A. double-space


Microcomputer B. line spacing
B. Microcomputer works faster than C. single space
Minicomputer D. vertical spacing
C. Speed of both the computers is the same
D. The speeds of both these computers Example of non-numeric data
cannot be compared with the speed of is_________?
advanced
A. Employee address
Which of the following is a part of the B. Examination score
Central Processing Unit? C. Bank balance
D. All of these
A. Printer
B. Key board What is embedded system?
C. Mouse
D. Arithmetic & Logic unit A. The programme which arrives by being
wrapped in box.
CAD stands for_________? B. The programme which is the permanent
part of the computer
A. Computer aided design C. The computer which is the part of a big
B. Computer algorithm for design computer
C. Computer application in design D. The computer and software system that
D. Computer analogue design control the machine

Junk e-mail is also called_________? First page of Website is termed


as__________?
A. spam
B. spoof A. Homepage
C. sniffer script B. Index
D. spool C. JAVA script
D. Bookmark
which statement describe “Hackers”?
When a file is saved for the first time?
A. all have the same motive
B. break into other people’s computers A. a copy is automatically printed
C. may legally break into computers as long B. it must be given a name to identify it
C. it does not need a name
D. it only needs a name if it is not going to be A. Avira
printed B. Kaspersky
C. Oracle
Where are data and programme stored D. McAfee
when the processor uses them?
What does DMA stand for?
A. Main memory
B. Secondary memory A. Distinct Memory Access
C. Disk memory B. Direct Memory Access
D. Programme memory C. Direct Module Access
D. Direct Memory Allocation
__________represents raw facts, where-
as__________is data made meaningful? Which of the following is a storage
device?
A. Information, reporting
B. Data, information A. Tape
C. Information, bits B. Hard Disk
D. Records, bytes C. Floppy Disk
D. All of the above
What characteristic of read-only memory
(ROM) makes it useful? When did John Napier develop logarithm?

A. ROM information can be easily updated. A. 1416


B. Data in ROM is non-volatile, that is, it B. 1614
remains there even without electrical C. 1641
power. D. 1804
C. ROM provides very large amounts of
inexpensive data storage. MIS is designed to provide information
D. ROM chips are easily swapped between needed for effective decision making by?
different brands of computers.
A. Consumers
What do you call the programs that are B. Workers
used to find out possible faults and their C. Foremen
causes? D. Managers

A. operating system extensions ASCII stands for__________?


B. cookies
C. diagnostic software A. American Stable Code for International
D. boot diskettes Interchange
B. American Standard Case for Institutional
Which programming languages are Interchange
classified as low level languages? C. American Standard Code for
Information Interchange
A. BASIC, COBOL, Fortran D. American Standard Code for Interchange
B. Prolog Information
C. C, C++
D. Assembly languages Which of the following is first generation
of computer?
Which of the following is not anti- viruses
software? A. EDSAC
B. IBM-1401
C. CDC-1604 A. Dot per inch
D. ICL-2900 B. Dot per sq. inch
C. Dots printed per unit time
IBM 1401 is_________? D. All of above

A. First Generation Computer In analogue computer_____________?


B. Second Generation Computer
C. Third Generation Computer A. Input is first converted to digital form
D . Fourth Generation Computer B. Input is never converted to digital form
C. Output is displayed in digital form
Chief component of first generation D. All of above
computer was__________?
In latest generation computers, the
A. Transistors instructions are executed___________?
B. Vacuum Tubes and Valves
C. Integrated Circuits A. Parallel only
D. None of above B. Sequentially only
C. Both sequentially and parallel
Second Generation computers were D. All of above
developed during___________?
A computer program that translates one
A. 1949 to 1955 program instructions at a time into
B. 1956 to 1965 machine language is called
C. 1965 to 1970 a/an___________?
D. 1970 to 1990
A. Interpreter
The computer size was very large B. CPU
in__________? C. Compiler
D. Simulator
a. First Generation
b. Second Generation A small or intelligent device is so called
c. Third Generation because it contains within it a________?
d. Fourth Generation
A. Computer
Microprocessors as switching devices are B. Microcomputer
for ___________generation computers? C. Programmable
D. Sensor
A. First Generation
B. Second Generation A fault in a computer program which
C. Third Generation prevents it from working correctly is
D. Fourth Generation known as___________?

Which of the following devices can be A. Boot


sued to directly image printed text? B. Bug
C. Biff
A. OCR D. Strap
B. OMR
C. MICR A self replicating program, similar to a
D. All of above virus which was taken from a 1970s
science fiction novel by John Bruner
The output quality of a printer is measured entitled the Shockwave Rider
by____________? is__________?
A. Bug A. Compiler
B. Vice B. Interpreter
C. Lice C. Linker
D. Worm D. Loader

Unwanted repetitious messages, such as RAM stands for___________?


unsolicited bulk e-mail is known
as_________? A. Random origin money
B. Random only memory
A. Spam C. Read only memory
B. Trash D. Random access memory
C. Calibri
D. Courier 1 Byte =___________?

DOS stands for____________? A. 8 bits


B. 4 bits
A. Disk Operating System C. 2 bits
B. Disk operating session D. 9 bits
C. Digital Operating System
D. Digital Open system The device used to carry digital data on
analogue lines is called as_________?
Who is the Current CEO of Microsoft?
A. Modem
A. Babbage B. Multiplexer
B. Bill Gates C. Modulator
C. Bill Clinton D. Demodulator
D. Satya Nadella
BIOS stands for__________?
Which of the following are input devices?
A. Basic Input Output system
A. Keyboard B. Binary Input output system
B. Mouse C. Basic Input Off system
C. Card reader D. all the above
D. Any of these
Father of “C‘ programming language?
Examples of output devices are?
A. Dennis Ritchie
A. Screen B. Prof John Keenly
B. Printer C. Thomas Kurtz
C. Speaker D. Bill Gates
D. All of these
The instructions that tell a computer how
Which of the following is also known as to carry out the processing tasks are
brain of computer? referred to as computer___________?

A. Control unit A. programs


B. Central Processing unit B. processors
C. Arithmetic and language unit C. input devices
D. Monitor D. memory modules

____________translates and executes


program at run time line by line?
An area of a computer that temporarily A ____________is a microprocessor -
holds data waiting to be processed based computing device?
is___________?
A. personal computer
A. CPU B. mainframe
B. Memory C. workstation
C. Storage D. server
D. File
RAM can be treated as
___________ is the key to close a selected the____________for the computer’s
drop -down list; cancel a command and processor?
close a dialog box.
A. factory
A. TAB B. operating room
B. SHIFT C. waiting room
C. ESC D. planning room
D. F10
Which of the following are the functions of
___________is the key we use to run the a operating system?
selected command?
A. Allocates resources
A. SHIFT B. Monitors Activities
B. TAB C. Manages disks and files
C. ENTER D. All of the above
D. CTRL
To move a copy of file from one computer
____________Is the functional key to to another over a communication channel
display save-as box? is called?

A. F5 A. File transfer
B. F6 B. File encryption
C. F9 C. File modification
D. F12 D. File copying

Data becomes____________when it is The primary function of the__________is


presented in a format that people can to set up the hardware and load and start
understand and use. an operating system?

A. processed A. System Programs


B. graphs B. BIOS
C. information C. CP
D. presentation D. Memory

The term___________designates What kind of memory is both static and


equipment that might be added to a non -volatile?
computer system to enhance its
functionality. A. RAM
B. ROM
A. digital device C. BIOS
B. system add-on D. CACHE
C. disk pack
D. peripheral device
_____________is computer software RAM is an example of___________?
designed to operate the computer
hardware and to provide platform for A. Secondary memory
running application software? B. Primary memory
C. Main memory
A. Application software D. Both (1) and (2)
B. System software
C. Software Magnetic disk is an example
D. Operating system of____________?

You use a(n)___________such as a A. Secondary memory


keyboard or mouse, to input information? B. Primary memory
C. Main memory
A. output device D. Both (1) and (2)
B. input device
C. storage device Which one of the following is NOT a
D. processing device computer language?

_______________is the ability of a device A. MS-Excel


to “jump” directly to the requested data? B. BASIC
C. COBOL
A. Sequential access D. C++
B. Random access
C. Quick access ___________Store data or information
D. All of the above temporarily and pass it on as directed by
the control unit?
_________________provides process and
memory management services that allow A. Address
two or more tasks, jobs, or programs to B. Register
run simultaneously? C. Number
D. Memory
A. Multitasking
B. Multithreading Select the Odd one from the following
C. Multiprocessing
D. Multicomputing A. Operating system
B. Interpreter
The task of performing operations like C. Compiler
arithmetic and logical operations is D. Assembler
called____________?
A________________is an additional set of
A. Processing commands that the computer displays
B. Storing after you make a selection from the main
C. Editing menu?
D. Sorting
A. dialog box
ALU and Control Unit jointly known B. submenu
as__________? C. menu selection
D. All of the above
A. RAM
B. ROM COBOL is an acronym
C. CPU for________________?
D. PC
A. Common Business Oriented Language A. networked
B. Computer Business Oriented Language B. mainframe
C. Common Business Operated Language C. supercomputer
D. Common Business Organized Language D. client

All of the following are examples of real When creating a computer program,
security and privacy risks the____________designs the structure of
EXCEPT____________? the program?

A. hackers A. End user


B. Spam B. System Analyst
C. Viruses C. Programmer
D. identity theft D. All of the above

Which of the following is NOT one of the Computers process data into information
four major data processing functions of a by working exclusively
computer? with____________?

A. gathering data A. multimedia


B. processing data into information B. word
C. analyzing the data or information C. numbers
D. storing the data or information D. characters

All of the following are examples of Computers manipulate data in many ways,
storage devices EXCEPT____________? and this manipulation is
called___________?
A. hard disk drives
B. printers A. upgrading
C. floppy disk drives B. processing
D. CD drives C. batching
D. utilizing
The CPU and memory are located on
the__________? The ability to recover and read deleted or
damaged files from a criminal’s computer
A. expansion board is an example of a law enforcement
B. motherboard speciality called___________?
C. storage device
D. output device A. robotics
B. simulation
______________is the science that C. computer forensics
attempts to produce machines that display D. animation
the same type of intelligence that humans
do? Where does most data go first with in a
computer memory hierarchy ?
A. Nanoscience
B. Nanotechnology A. RAM
C. Simulation B. ROM
D. Artificial intelligence (Al) C. BIOS
D. CACHE
Servers are computers that provide
resources to other computers connected
to a___________?
The_____________data mining technique A person who used his or her expertise to
derives rules from real-world case gain access to other people’s computers
examples? to get information illegally or do damage is
a____________?
A. Rule discover
B. Signal processing A. Hacker
C. Neural nets B. spammer
D. Case-based reasoning C. instant messenger
D. programmer
_____________are used to identify a user
who returns to a Website? To access properties of an object, the
mouse technique to use is_____________?
A. Cookies
B. Plug-ins A. Dragging
C. Scripts B. dropping
D. ASPs C. right-clicking
D. shift-clicking
Codes consisting of lines of varying
widths or lengths that are computer- A DVD is an example of a (n)___________?
readable are known as__________?
A. hard disk
A. an ASCII code B. optical disc
B. a magnetic tape C. output device
C. an OCR scanner D. solid-state storage device
D. a bar code
The process of transferring files from a
Reusable optical storage will typically computer on the Internet to your computer
have the acronym________? is called_____________?

A. CD A. Downloading
B. DVD B. uploading
C. ROM C. FTP
D. RW D. JPEG

The most common type of storage devices ___________is the process of dividing the
are_________? disk into tracks and sectors?

A. Steel A. Tracking
B. optical B. Formatting
C. magnetic C. Crashing
D. flash D. Allotting

A device that connects to a network ASCII is a coding system that


without the use of cables is said to provides_____________?
be___________?
A. 256 different characters
A. Distributed B. 512 different characters
B. free C. 1024 different characters
C. centralized D. 128 different characters
D. none of these
Which part of the computer is directly Which of the following contains
involved in executing the instructions of permanent data and gets updated during
the computer program? the processing of transactions?

A. The scanner A. Operating System File


B. The main storage B. Transaction file
C. The secondary storage C. Software File
D. The processor D. Master file

When a computer is switched on, the A modem is connected to_____________?


booting process performs___________?
A. a telephone line
A. Integrity Test B. a keyboard
B. Power-On Self-Test C. a printer
C. Correct Functioning Test D. a monitor
D. Reliability Test
Large transaction processing systems in
A computer system that is old and automated organisations
perhaps not satisfactory is referred to as use___________?
a(n)____________?
A. Online processing
A. Ancient system B. Batch Processing
B. Historical system C. Once-a-day Processing
C. Age old system D. End-of-day processing
D. Legacy system
Which of the following is not a storage
Which of the following is not a binary medium?
number?
A. Hard disk
A. 001 B. Flash drive
B. 101 C. DVD
C. 202 D. scanner
D. 110
The computer abbreviation KB usually
Which of the following does not store data means____________?
permanently?
A. Key Block
A. ROM B. Kernel Boot
B. RAM C. Kilo Byte
C. Floppy Disk D. Kit Bit
D. Hard Disk
The typical computer criminal is
Which of the following is the smallest a(n)____________?
storage?
A. Young hacker.
A. Megabyte B. Trusted employee with no criminal
B. Gigabyte record.
C. Terabyte C. Trusted employee with a long, but
D. None of these unknown criminal record.
Read More about this mcq D. Overseas young cracker.
The common name for the crime of What type of virus uses computer hosts to
stealing passwords is____________? reproduce itself?

A. Jacking. A. Time bomb


B. Identity theft. B. Worm
C. Spoofing. C. Melissa virus
D. Hacking. D. Macro virus

Collecting personal information and The thing that eventually terminates a


effectively posing as another individual is worm virus is a lack of:
known as the crime of_____________?
A. Memory or disk space.
A. Spooling. B. Time.
B. Identity theft. C. CD drives space.
C. Spoofing. D. CD-RW
D. Hacking.
What is the most common tool used to
Malicious software is known restrict access to a computer system?
as____________?
A. User logins
A. Badware. B. Passwords
B. Malware. C. Computer keys
C. Maliciousware. D. Access-control software
D. Illegalware
____________computer is small general
A program that performs a useful task purpose micro computer, but larger than
while simultaneously allowing destructive portable computer?
acts is a___________?
A. Hybrid
A. Worm. B. Digital
B. Trojan horse. C. Desktop
C. Virus. D. Laptop
D. Macro virus
Cathode Ray Tube is a form
An intentionally disruptive program that of__________?
spreads from program to program or from
disk to disk is known as a_____________? A. Keyboard
B. Mouse
A. Trojan horse. C. Monitor
B. Virus. D. Mother board
C. Time bomb. Read More about this mcq
D. Time-related bomb sequence.
Touch Screen is___________?
In 1999, the Melissa virus was a widely
publicised:____________? A. Input device
B. Output device
A. E-mail virus. C. Both A & B above
B. Macro virus. D. None of these
C. Trojan horse.
D. Time bomb. Which of the following is a network
topology?
A. LAN In world today, most of the computers
B. WAN are_____________?
C. MAN
D. BUS A. Digital
B. Hybrid
VOIP stands for___________? C. Analog
D. Complex
A. Voice over IP
B. Video over IP physical structure of computer is
C. Viruses over IP called____________?
D. Virtual over IP
A. Software
LAN stands for______________? B. Hardware
C. Human ware
A. Limited Area Network D. All of these
B. Logical Area Network
C. Local Area Network In which type of computer, data are
D. Large Area Network represented as discrete signals?

_____________are set of rules and A. Analog computer


procedures to control the data B. Digital computer
transmission over the internet? C. both
D. Hybrid Computer
A. IP address
B. Domains The software that is used to create text-
C. Protocol based documents are referred to
D. Gateway as_________________?

NOS stands for______________? A. DBMS


B. Suites
A. Node operating system C. Spreadsheets
B. Non-open software D. Word processors
C. Network Operating system
D. Non-operating software _______________devices convert human
understandable data and programs into a
_______________are system software to form that the computer can process?
facilitate editing of text and data?
A. Printing
A. MS Word B. Output
B. Editors C. Solid state
C. PowerPoint D. Input
D. MS publisher
What feature adjusts the top and bottom
Computers, combine both measuring and margins so that the text is centered
counting, are called________________? vertically on the printed page?

A. Analog A. Vertical justifying


B. Digital B. Vertical adjusting
C. Hybrid C. Dual centering
D. All of these D. Horizontal centering
A detailed written description of the When entering text within a document, the
programming cycle and the program, Enter key is normally pressed at the end of
along with the test results and a printout every____________?
of the program is called___________?
A. Line
A. documentation B. Sentence
B. output C. Paragraph
C. reporting D. Word
D. spec sheets E. None of these

Forms that are used to organize business Which of the following software could
data into rows and coloumns are assist someone who cannot use their
called_____________? hands for computer input?

A. transaction sheets A. Video conferencing


B. registers B. Speech recognition
C. business forms C. Audio digitizer
D. spread sheets D. Synthesizer

In power point, the header and footer Memory unit is one part of____________?
button can be found on the insert tab in
what group? A. Input device
B. Control unit
A. Illustrations group C. Output device
B. Object group D. Central Processing Unit
C. Text group
D. Tables group Microprocessors can be used to
make________________?
A(n)_____________is a set of programs
designed to manage the resources of a A. Computer
computer, including starting the computer, B. Digital systems
managing programs, managing memory C. Calculators
and coordinating tasks between input and D. All of the above
output devices?
Which statement is valid about computer
A. application suite program?
B.compiler
C. input/output system A. High level languages must be converted
D. Operating system into machine language to execute
E. None of these B. High level language programs are more
efficient and faster to execute
A(n)_____________program is one that is C. It is more difficult to identify errors in high
ready to run and does not need to be level language program than in low level
altered in any way. programs
D. All of above
A. Interpreter
B. High level By programmable machine we
C. Compiler mean_____________?
D. Executable
A. computers
B. modern television
C. washing machines
D. anything that can be set to perform A. Data consists of numbers
different tasks with suitable programs B. Short access time is required
C. Each stored word is processed differently
Which of the following is a secondary D. Data naturally needs to flow in and out
memory device? in serial form

A. Keyboard IC are classified on the basis


B. Disk of_____________?
C. ALU
D. All of the above A. Manufacturing company
B. Type of computer
One of the popular mass storage device is C. Number of transistors
CD ROM. What does CD ROM stand for? D. None of these

A. Compactable Read Only Memory Smallest font size in MS-word


B. Compact Data Read Only Memory is____________?
C. Compactable Disk Read Only Memory
D. Compact Disk Read Only Memory A. 6
B. 8
Identify the true statement about C. 10
computer. D. 12

A. Computers are 100% accurate but it can The World Wide Web was invented
suffer from GIGO (Garbage In Garbage Out) by____________?
B. Computers are reliable because they use
electronic component which have very low A. Tim Berners-Lee
failure rate B. Bob Kahn
C. Computer is never tired and does not C. Steve Jobs
suffer from boredom D. Bill Gates
D. All of above

Which of the following memories must be


refreshed many times per second?

A. Static RAM
B. Dynamic RAM
C. EPROM
D. ROM

What do you call the translator which


takes assembly language program as
input & produce machine language code
as output?

A. Compiler
B. Interpreter
C. Debugger
D. Assembler

Serial access memories are useful in


applications where:

Potrebbero piacerti anche