440+ Important Computer MCQs For Competitive Exams part 2 Solved MCQs

201.

________ means that the data contained in a database is accurate and reliable.

A. Data redundancy
B. Data integrity
C. Data reliability
D. Data consistency
E. None of these
Answer» B. Data integrity
202.

A(n) ________ is a private corporate network used exclusively by company employees.

A. internet
B. local area network
C. peer to peer
D. intranet
E. None of these
Answer» D. intranet
203.

Which of the following terms is just the connection of networks that can be joined together ?

A. virtual private network
B. internet
C. intranet
D. extranet
E. None of these
Answer» B. internet
204.

An area of a computer that temporarily holds data waiting to be processed is

A. CPU
B. Memory
C. Storage
D. File
E. None of these
Answer» B. Memory
205.

A ________ is a microprocessor-based computing device.

A. personal computer
B. mainframe
C. workstation
D. server
E. None of these
Answer» A. personal computer
206.

You use a(n) ________, such as a keyboard or mouse, to input information.

A. output device
B. input device
C. storage device
D. processing device
E. None of these
Answer» B. input device
207.

The operating system called UNIX is typically used for

A. Desktop computers
B. Laptop computers
C. Super computers
D. Web servers
E. All of these
Answer» E. All of these
208.

Press — to move the insertion point to the address box, or to highlight the URL in the address box

A. Alt + D
B. Alt + A
C. Shift + Tab
D. Tab + Ctrl
E. Ctrl + S
Answer» A. Alt + D
209.

________ contain data in Oracle database.

A. Extents
B. Segments
C. Tables
D. Datablocks
E. Records
Answer» D. Datablocks
210.

What is a Gigabyte?

A. Flash memory
B. An optical storage medium capable of storing vast amount of information
C. Roughly a trillion bytes
D. Roughly a million bytes
E. Roughly a billion bytes
Answer» E. Roughly a billion bytes
211.

Which of the following is a part of session layer?

A. Transports data across the physical link
B. Terminates a session
C. Performs flow control
D. Determines network topology
E. Performs physical addressing
Answer» B. Terminates a session
212.

Window registry consists of ________ and ________ files.

A. user.dat, win.ini
B. user.dat, system.dat
C. autoexec.bat, config.sys
D. win.reg, user.dat
E. win.reg, system.dat
Answer» B. user.dat, system.dat
213.

In Open System Interconnection (OSI) model IP belongs to ________ layer.

A. session layer
B. physical layer
C. network layer
D. transport layer
E. application layer
Answer» C. network layer
214.

________ technology is typically used by Extranet and Intranet.

A. Protocol
B. SSL
C. Proprietary
D. Internet
E. SET
Answer» D. Internet
215.

A program which is in execution is called

A. data
B. job
C. process
D. information
E. None of these
Answer» C. process
216.

A computer cannot “boot” without a(n)

A. loader
B. linker
C. OS
D. compiler
E. assembler
Answer» C. OS
217.

________ are loaded into main memory when the computer is booted.

A. Word processing instructions
B. Utility programs
C. Internal commands
D. Intermediate commands
E. External commands
Answer» C. Internal commands
218.

A(n)________ is a register or main memory location which contains the effective address of the operand.

A. special location
B. pointer
C. scratch pad
D. indexed register
E. direct indexed register
Answer» B. pointer
219.

Resolution of externally defined symbols is performed by

A. OS
B. compiler
C. linker
D. loader
E. interpreter
Answer» C. linker
220.

Which major development led to the production of microcomputer?

A. Logic gates
B. Floppy disks
C. Magnetic disks
D. Magnetic tape
E. Integrated circuits
Answer» E. Integrated circuits
221.

The arranging of data in a logical sequence is called

A. classifying
B. summarizing
C. reproducing
D. sorting
E. sequencing
Answer» D. sorting
222.

________ company started the personal-computer industry.

A. Compaq
B. Apple
C. HCL
D. IBM
E. Texas instruments
Answer» B. Apple
223.

________ can be programmed one time by either the manufacturer or the computer user: once programmed, it cannot be modified.

A. ROM
B. PROM
C. EPROM
D. EEPROM
E. None of these
Answer» B. PROM
224.

In a computer system, ________ device is functionally opposite of a keyboard.

A. joystick
B. mouse
C. trackball
D. printer
E. scanner
Answer» D. printer
225.

The silicon chips used in computers are made from

A. copper
B. germanium
C. ordinary sand
D. gallium-arsenide
E. None of these
Answer» C. ordinary sand
226.

In modems data transfer rate is measured in

A. bandwidth
B. bits per second
C. bits per minute
D. All the above
E. None of these
Answer» B. bits per second
227.

The output of a 2 input and gate is 1 only when its

A. either input is 1
B. both inputs one 0
C. both inputs are 1
D. either input is 0
E. None of these
Answer» C. both inputs are 1
228.

________ printer is a character-at-a time printer.

A. Line
B. Chain
C. Band
D. Daisywheel
E. Drum
Answer» D. Daisywheel
229.

A half byte is known as

A. data
B. bit
C. half byte
D. word
E. nibble
Answer» E. nibble
230.

A ________ code is used in retail stores to identify merchandise.

A. mnemonics
B. gray code
C. machine code
D. universal product code
E. access-3 code
Answer» D. universal product code
231.

Which of the following languages is based on graphics for use in education?

A. COBOL
B. BASIC
C. LOGO
D. PROLOG
E. FORTRAN
Answer» C. LOGO
232.

You can activate a cell by

A. pressing the tab key
B. pressing the arrow key
C. pressing the enter key
D. All the above
E. None of these
Answer» D. All the above
233.

Which of the following is not an option in the spelling dialog box?

A. Ignore
B. Ignore all
C. Change
D. Change all
E. Edit
Answer» E. Edit
234.

________ layer performs multiplexing and demultiplexing of network connections.

A. Physical
B. Network
C. Transport
D. Data link
E. Application
Answer» C. Transport
235.

In which of the following topologies, security and privacy are less of an issue for devices?

A. Mesh
B. Star
C. Ring
D. Bus
E. Tree
Answer» D. Bus
236.

A television broadcast uses _________ transmission mode.

A. half-duplex
B. full-duplex
C. simplex
D. automatic
E. None of these
Answer» C. simplex
237.

_________ and ________ protocols are defined in transport layer.

A. TCP, UDP
B. TCP, IP
C. UDP, IP
D. UDP, ICMP
E. TCP, ICMP
Answer» A. TCP, UDP
238.

Borders can be applied to

A. paragraph
B. text
C. cell
D. All the above
E. None of these
Answer» D. All the above
239.

What is the short-cut key to highlight the entire column?

A. Ctrl + Page up
B. Ctrl + Page down
C. Ctrl + Enter
D. Ctrl + Space bar
E. Ctrl + C
Answer» D. Ctrl + Space bar
240.

Which command is used to display current date and time in MS Excel?

A. today
B. now ()
C. time ()
D. date ()
E. system ()
Answer» B. now ()
241.

________ language is used to create macros in MS Excel.

A. C
B. C++
C. Visual C++
D. Java
E. Visual Basic
Answer» E. Visual Basic
242.

Workspace means

A. Group of worksheets
B. Group of rows
C. Group of columns
D. Group of workbooks
E. Group of cells
Answer» D. Group of workbooks
243.

Which of the following graphical models is used to define a database?

A. Organisation model
B. Programming model
C. Flow chart
D. E-R diagram
E. None of these
Answer» D. E-R diagram
244.

To refer to a specific record in your library database, for instance, information stored about a specific book ________ term is used.

A. table
B. column
C. relation
D. instance
E. entity
Answer» D. instance
245.

The most important advantage of an IC is

A. low power consumption
B. reduced cost
C. easy replacement in case of circuit failure
D. extremely high reliability
E. None of these
Answer» D. extremely high reliability
246.

To modify the structure of a created table, which SQL command is used?

A. change
B. alter
C. update
D. modify
E. None of these
Answer» B. alter
247.

________ can be use to send an e-mail to a large group at one time.

A. Group
B. Alias
C. Mail server
D. List server
E. Remote server
Answer» D. List server
248.

To save the current document or to open a previously saved document, ________ is used.

A. file menu
B. tools menu
C. view menu
D. edit
E. review menu
Answer» A. file menu
249.

Documents of the web that are transported over the Internet are called

A. web sites
B. web link
C. web pages
D. HTML pages
E. hypertext
Answer» C. web pages
250.

The ability to convey a message without disclosing your name or identity is called

A. privacy
B. security
C. encryption
D. anonymity
E. authentication
Answer» D. anonymity
251.

_________ operating systems are found on ROM chips in portable or dedicated devices.

A. Server
B. Network
C. Embedded
D. Stand-alone
E. Windows
Answer» C. Embedded
252.

Identify the odd term among the following groups.

A. Optical fibre
B. Co-axial cable
C. Twisted pair wire
D. Micro waves
E. None of these
Answer» D. Micro waves
253.

________ are tiny charts embedded into the background of an Excel cell.

A. Labels
B. Functions
C. Formulas
D. Sparklines
E. Background
Answer» D. Sparklines
254.

A(n) ________ is called an Internet-based online retailer.

A. online tailer
B. net-tailer
C. cybertailer
D. e-tailer
E. None of these
Answer» D. e-tailer
255.

For predicting the weather ________ is the best solution.

A. thin clients
B. servers
C. super computer
D. workstations
E. minicomputer
Answer» C. super computer
256.

To organise the bookmarks, ________ can be used.

A. containers
B. folders
C. structure
D. menus
E. files
Answer» B. folders
257.

Different computers are connected to a LAN by a cable and a(n)

A. interface card
B. special wires
C. modem
D. telephone lines
E. channel
Answer» A. interface card
258.

A ________ is a software that measures, monitors, analyses and controls real-world events.

A. real-time software
B. scientific software
C. system software
D. business software
E. None of these
Answer» A. real-time software
259.

________ operating system uses write through catches.

A. DOS
B. VLTRIX
C. UNIX
D. XENIX
E. None of these
Answer» A. DOS
260.

When you want to draw a perfect shape ________ should be used.

A. alt-key
B. ctrl-key
C. shift-key
D. space bar
E. backspace
Answer» C. shift-key
261.

Which of the following might prevent a program from being modified in future?

A. Pseudocode
B. Logic errors
C. Syntax error
D. Lack of program documentation
E. All the above
Answer» D. Lack of program documentation
262.

Which generation is natural language related to?

A. First generation
B. Second generation
C. Third generation
D. Fourth generation
E. Fifth generation
Answer» E. Fifth generation
263.

The database environment has all of the following components except

A. database
B. DBA
C. users
D. SQL
E. separate files
Answer» E. separate files
264.

A number of related records that are treated as a unit is called a

A. field
B. data
C. file
D. batch
E. group
Answer» C. file
265.

Coding and testing are done in a ________ manager.

A. cross-sectional
B. by-sectional
C. ad hoc
D. bottom-up
E. top-down
Answer» E. top-down
266.

Computer software is composed of

A. mnemonics
B. symbols
C. statements
D. algorithms
E. data
Answer» D. algorithms
267.

Disk checking is associated with

A. debugging a program
B. running a program
C. compiling a program
D. coding a program
E. assembling a program
Answer» A. debugging a program
268.

What is the common name given to a program written in any one of the high-level languages?

A. System program
B. Compiler program
C. Object program
D. Source program
E. Data program
Answer» D. Source program
269.

________ is used to produce graphic outputs.

A. VDU
B. Magnetic tape
C. Magnetic disk
D. Plotter
E. None of these
Answer» D. Plotter
270.

Binary-Coded Decimal (BCD) often uses ________ bits.

A. 64
B. 128
C. 8
D. 16
E. 32
Answer» C. 8
271.

________ holds microprograms.

A. ROM
B. RAM
C. Core memory
D. Control memory
E. EPROM
Answer» B. RAM
272.

A hybrid computer uses a ________ to convert digital signals from a computer into analog signals.

A. modem
B. modulator
C. demodulator
D. decoder
E. None of these
Answer» A. modem
273.

________ program gives instructions regarding operations inside the computer.

A. Application
B. System software
C. Utility
D. Compiler
E. Assembler
Answer» B. System software
274.

The first electronic computer was made in the year

A. 1946
B. 1955
C. 1964
D. 1967
E. 1969
Answer» A. 1946
275.

The record produced in an audit trail is known as

A. job stream
B. job file
C. journal tape
D. journal stream
E. job tape
Answer» C. journal tape
276.

A group of magnetic tapes, videos or terminals usually under the control of one master is called a

A. cluster
B. track
C. cylinder
D. All the above
E. None of these
Answer» A. cluster
277.

________ is an alternative form of binary code.

A. Decoder
B. Bar code
C. Encoder
D. Gray code
E. Excess-3 code
Answer» D. Gray code
278.

Which of the following layers is responsible for token management?

A. Physical layer
B. Application layer
C. Transport layer
D. Network layer
E. Session layer
Answer» D. Network layer
279.

In a ________ topology, a network that contains multiple hubs is most likely configured.

A. ring
B. star
C. bus
D. mesh
E. tree
Answer» E. tree
280.

Communication between a computer and a CPU uses ________ transmission mode.

A. automatic
B. simplex
C. half-duplex
D. full-duplex
E. None of these
Answer» B. simplex
281.

ISDN is an acronym for

A. Integrated Standard Digital Network
B. Intelligent Services Digital Network
C. Integrated Services Digital Network
D. Integrated Services Data Network
E. None of these
Answer» C. Integrated Services Digital Network
282.

In which of the following networks, irregular topologies are used?

A. LAN
B. WAN
C. MAN
D. CAN
E. Broadcast Networks
Answer» B. WAN
283.

________ standard describes the CSMA/CD protocol.

A. IEEE 802.1
B. IEEE 802.2
C. IEEE 802.3
D. IEEE 802.4
E. IEEE 802.5
Answer» C. IEEE 802.3
284.

COBOL is used in ________ applications.

A. scientific
B. space
C. mathematical
D. commercial
E. graphics
Answer» D. commercial
285.

In MS Excel, to display current date only ________ is used.

A. date ()
B. now ()
C. today ()
D. time ()
E. current date ()
Answer» C. today ()
286.

To rename currently highlighted object ________ is used.

A. F1
B. F2
C. F3
D. F5
E. F6
Answer» B. F2
287.

To display the window system properties dialogue, which of the following short cut keys is used?

A. Windows key + P
B. Windows key + D
C. Windows key + Pause
D. Windows key + Shift
E. Windows key + Ctrl
Answer» C. Windows key + Pause
288.

A permanent virtual circuit involves

A. Connection establishment
B. Data transfer
C. Connection release
D. All of the above
E. None of these
Answer» B. Data transfer
289.

________ input/output device is not associated with personal computers.

A. Colour monitors
B. Dot-matrix printer
C. Punched cards
D. Mice
E. Optical scanners
Answer» C. Punched cards
290.

A computer enthusiast is called

A. a hacker
B. user friendly
C. a computerist
D. All the above
E. None of these
Answer» E. None of these
291.

Actual execution of instructions in a computer takes place in

A. control unit
B. storage unit
C. arithmetic logic unit
D. All the above
E. None of these
Answer» C. arithmetic logic unit
292.

________ function displays row data in a column or column data in a row.

A. Index
B. Rows
C. Hyperlink
D. Transpose
E. Columns
Answer» D. Transpose
293.

Multiple calculations can be done by a single formula using

A. complex formula
B. array formula
C. smart formula
D. standard formula
E. advanced formula
Answer» B. array formula
294.

Which of the following charts can be created in Excel?

A. Line
B. Pie
C. Area
D. All the above
E. None of these
Answer» D. All the above
295.

________ type of commercial Internet service providers are most widely used.

A. Centralised
B. National
C. Regional
D. Decentralise
E. Application
Answer» B. National
296.

Moving from one website to another is called

A. moving
B. jumping
C. surfing
D. applying
E. changing
Answer» C. surfing
297.

Which of the following is not one of the basic elements of an e-mail message?

A. Header
B. Message
C. Footer
D. Signature
E. None of these
Answer» C. Footer
298.

________ are specialised utility programs that make using the Internet and the web easier and safer.

A. Web utilities
B. Telecom
C. Web firewalls
D. Proxy server
E. Norton Utilities
Answer» A. Web utilities
299.

The process that rearranges file fragments into contiguous files is called

A. file filing
B. folder folding
C. unfragging
D. defragmentation
E. file folding
Answer» D. defragmentation
300.

________ virus describes the awful consequences of not acting immediately.

A. Android
B. Spoofing
C. Phishing
D. Misleading e-mail
E. Sabotage
Answer» D. Misleading e-mail
Tags
  • Question and answers in Important Computer MCQs For Competitive Exams part 2,
  • Important Computer MCQs For Competitive Exams part 2 multiple choice questions and answers,
  • Important Computer MCQs For Competitive Exams part 2 Important MCQs,
  • Solved MCQs for Important Computer MCQs For Competitive Exams part 2,
  • Important Computer MCQs For Competitive Exams part 2 MCQs with answers PDF download