440+ Important Computer MCQs For Competitive Exams part 2 Solved MCQs

301.

A computer infected with a malware bot is called

A. android
B. zombie
C. e-ogre
D. dirty bot
E. None of these
Answer» B. zombie
302.

POS data entry system is used most extensively by the

A. grocery industry
B. railroad industry
C. word-processing industry
D. banking industry
E. None of these
Answer» A. grocery industry
303.

A ________ is a non-impact printer that can produce very high-quality, letter-perfect printing.

A. daisy wheel printer
B. laser printer
C. dot-matrix printer
D. thermal printer
E. drum printer
Answer» B. laser printer
304.

A computer can do nothing without a

A. memory
B. program
C. chip
D. output device
E. file
Answer» B. program
305.

RAM chip was invented by ________ company.

A. Intel
B. Toshiba
C. Motorola
D. IBM
E. Microsystem
Answer» A. Intel
306.

The first item defined for a new system is its

A. processing requirements
B. inputs
C. outputs
D. file formats
E. programs
Answer» C. outputs
307.

The language that the computer can understand and execute is

A. System program
B. Application software
C. Machine language
D. Only 1) and 2)
E. None of these
Answer» C. Machine language
308.

The number used to identify a storage location is called

A. a byte
B. a bit
C. an address
D. Both 1) and 2)
E. All the above
Answer» C. an address
309.

A CD-ROM is

A. an optical ROM
B. an erasable ROM
C. a magnetic ROM
D. Both 2) and 3)
E. None of these
Answer» A. an optical ROM
310.

The computer device used primarily to provide hard copy is

A. line printer
B. CRT
C. card reader
D. computer console
E. Either 1) or 3)
Answer» A. line printer
311.

Which of the following devices can be used directly to input printed text?

A. OMR
B. OCR
C. MICR
D. Either 1) or 2)
E. Both 2) and 3)
Answer» B. OCR
312.

The best graphics reproduction is produced by

A. dot matrix printer
B. laser printer
C. ink jet printer
D. plotter
E. None of these
Answer» B. laser printer
313.

AND and NOT logical operations are performed in

A. ALU
B. control unit
C. registers
D. Either 1) or 2)
E. None of these
Answer» A. ALU
314.

Ethernet uses

A. ring topology
B. bus topology
C. mesh topology
D. All the above
E. None of these
Answer» B. bus topology
315.

The single user operating system does not have

A. device management schedule
B. memory management schedule
C. CPU scheduling module
D. Only 2) and 3)
E. None of these
Answer» C. CPU scheduling module
316.

Computers send data to peripherals with the help of

A. modem
B. serial I/O interface
C. parallel I/O interface
D. All the above
E. None of these
Answer» C. parallel I/O interface
317.

Integrated Service Digital Network (ISDN) lines provide

A. Only voice circuits
B. Only data circuits
C. Both data and voice circuits
D. None of these
E. Only 1), 2) and 3)
Answer» C. Both data and voice circuits
318.

A transaction file is a type of

A. data file
B. master file
C. access method
D. Only 2) and 3)
E. None of these
Answer» A. data file
319.

Which of the following programs is not a utility?

A. spooler
B. debugger
C. edition
D. Both 2) and 3)
E. Both 1) and 3)
Answer» A. spooler
320.

The operating system manages

A. memory
B. processor
C. I/O devices
D. All of these
E. None of these
Answer» D. All of these
321.

A network consists of interconnected

A. workstations
B. computers
C. servers
D. nodes
E. All the above
Answer» A. workstations
322.

Which is not true for LAN?

A. It operates at higher speed than WAN.
B. It is a public network.
C. It is designed to work in limited geographical areas.
D. None of these
E. All the above
Answer» B. It is a public network.
323.

Which of the following is not a transmission medium?

A. modem
B. telephone lines
C. coaxial cables
D. satellite system
E. Either 2) or 3)
Answer» A. modem
324.

Faster data communication is possible using

A. optical fibre
B. coaxial cable
C. microwave transmission
D. None of these
E. Only 2) and 3)
Answer» A. optical fibre
325.

The operation of a digital computer is based on ________ principle.

A. counting
B. electronic
C. logical
D. measuring
E. All the above
Answer» C. logical
326.

HTML viruses infect

A. your computer
B. a web page in HTML code
C. both 1) and 2)
D. Either 1) or 2)
E. Neither 1) nor 2)
Answer» E. Neither 1) nor 2)
327.

The scrambling of code is known as

A. encryption
B. firewall
C. scrambling
D. password proofing
E. None of these
Answer» A. encryption
328.

Which of the following moves the cursor one space to the right to put spaces in between words?

A. Control key
B. Space bar
C. Printer
D. Mouse
E. None of these
Answer» B. Space bar
329.

When your computer suddenly stops working, it is referred to as

A. crash
B. die
C. death
D. penalty
E. None of these
Answer» A. crash
330.

A program that works like a calculator for keeping track of money and making budgets, is called

A. Calculator
B. Spreadsheet
C. Budgeter
D. Financier
E. None of these
Answer» B. Spreadsheet
331.

The most frequently used instructions of a computer program are likely to be fetched from

A. The hard disc
B. cache memory
C. RAM
D. registers
E. None of these
Answer» B. cache memory
332.

Verification of a login name and password is known as

A. configuration
B. accessibility
C. authentication
D. logging in
E. None of these
Answer» C. authentication
333.

In a ring topology, the computer in possession of the ________ can transmit data.

A. packet
B. data
C. access method
D. token
E. None of these
Answer» D. token
334.

You must install a/an ________ on a network if you want to share an Internet connection.

A. router
B. modem
C. node
D. cable
E. None of these
Answer» A. router
335.

The system unit of a personal computer typically contains all of the following except

A. microprocessor
B. disk controller
C. serial interface
D. modem
E. None of these
Answer» D. modem
336.

A small or intelligent device is so called because it contains within it a

A. computer
B. microprocessor
C. programmable data
D. sensor
E. None of these
Answer» D. sensor
337.

EPROM can be used for

A. erasing the contents of ROM
B. reconstructing the contents of ROM
C. 1) and 2)
D. duplicating ROM
E. None of these
Answer» C. 1) and 2)
338.

The 16-bit microprocessor means that it has

A. 16 address lines
B. 16 buses
C. 16 data lines
D. 16 routes
E. None of these
Answer» C. 16 data lines
339.

What does SNMP stand for?

A. Simple Network Mail Protocol
B. Single Network Mail Protocol
C. Single Network Message Protocol
D. Simple Network Management Protocol
E. None of these
Answer» D. Simple Network Management Protocol
340.

________ temporarily holds program instructions, data and output until they are no longer needed by the computer.

A. Hard disk
B. Motherboard
C. CD
D. RAM
E. Floppy disk
Answer» D. RAM
341.

Basic Input Output System (BIOS) is necessary for

A. boot-up
B. mouse and keyboard only
C. revolution
D. audio and video system
E. None of these
Answer» A. boot-up
342.

SQL stands for

A. Structured Query Language
B. Solution to Query Language
C. Sub Query Language
D. Structural Query Language
E. None of these
Answer» A. Structured Query Language
343.

A hard drive consists of spinning ________ made up of aluminum or ceramic that is coated with magnetic media.

A. plates
B. disks
C. relay
D. memories
E. platters
Answer» E. platters
344.

POST stands for

A. Positive Operating System Test
B. Particle Of Static Transfer
C. Power-On Self-Test
D. Printer Online Static Test
E. None of these
Answer» C. Power-On Self-Test
345.

Which of the following is not an example of a virus?

A. Polymorphic
B. Logic Bombs
C. Worms
D. Tartan
E. Trojan
Answer» D. Tartan
346.

A database that spreads information across different tables while maintaining links between them is referred to as

A. Relational database
B. Rotational database
C. Database connection
D. Tabular database
E. None of these
Answer» A. Relational database
347.

________ is a method of storing data on two or more hard drives that work in combination to do the job for a larger drive.

A. DAID
B. RAID
C. Shadowing
D. Casting
E. MiniSD
Answer» B. RAID
348.

C is a programming language developed for developing

A. LINUX Operating system
B. Windows NT
C. UNIX Operating system
D. Mac OS X
E. Windows ME
Answer» C. UNIX Operating system
349.

First RAM chip was introduced by which of the following?

A. Microsoft
B. Intel
C. Dell
D. HP
E. Apple
Answer» B. Intel
350.

A specialised network device that determines the next network point to which it can forward a data packet towards the destination of the packet is commonly known as

A. bridge
B. router
C. switch
D. hub
E. repeater
Answer» B. router
351.

Timing and control unit is a part of a(n)

A. ALU
B. Processor
C. Memory
D. CMOS
E. BIOS
Answer» B. Processor
352.

Chip is the common name for a(n)

A. transistor
B. resistor
C. integrated circuit
D. semiconductor
E. None of these
Answer» C. integrated circuit
353.

Malicious software is known as

A. hardware
B. malware
C. malicious ware
D. illegal ware
E. None of these
Answer» B. malware
354.

Name the key that will erase information from the computer memory and characters on the screen.

A. Edit
B. Delete key
C. Dummy out
D. Trust key
E. None of these
Answer» B. Delete key
355.

________ determines the appearance of your desktop and controls the performance of your hardware.

A. Windows Explorer
B. Internet Explorer
C. Program file
D. Control Panel
E. System file
Answer» D. Control Panel
356.

The processing capability of a microcomputer can be enhanced with the help of

A. secondary memory
B. additional processor
C. expansion card
D. buffer memory
E. None of these
Answer» C. expansion card
357.

Which view is not available in Microsoft Word 2007?

A. Outline
B. Full Screen
C. Page Break
D. Draft
E. Print Layout
Answer» C. Page Break
358.

The collection of commands is called

A. file
B. program
C. information
D. data
E. instruction
Answer» B. program
359.

Recycle Bin enables you to restore a file which was deleted from

A. Drive B
B. Drive C
C. Drive K
D. Drive L
E. None of these
Answer» B. Drive C
360.

________ bar appears immediately below the title bar and provides access to pull-down menus.

A. Tool
B. Menu
C. Task
D. Status
E. None of these
Answer» B. Menu
361.

By default, number entries are

A. rightied aligned
B. centred
C. left-aligned
D. merged
E. justified
Answer» A. rightied aligned
362.

________ process rearranges file fragments into contiguous files.

A. Folder folding
B. Defragmentation
C. Unfragging
D. Disk scanning
E. File filling
Answer» B. Defragmentation
363.

The memory card which is conceptually related to the smart card but is similar to the video disk, is

A. Master card
B. Visa card
C. Optical card
D. Laser card
E. Data card
Answer» D. Laser card
364.

The main advantage of magnetic disk compared to magnetic tape is

A. low cost
B. rigidity
C. direct access
D. high packet density
E. sequential access
Answer» C. direct access
365.

Which of the following printers is used in conjunction with computers and uses dry ink powder?

A. Daisy wheel
B. Thermal printer
C. Line printer
D. Laser printer
E. Band printer
Answer» D. Laser printer
366.

Another term for the Internet is

A. web
B. www
C. cyberspace
D. arpanet
E. None of these
Answer» C. cyberspace
367.

Which of the following topologies is not of broadcast type?

A. Star
B. Bus
C. Ring
D. Mesh
E. Tree
Answer» C. Ring
368.

Enterprise storage unit that uses DVD and CD discs as the storage medium is

A. library
B. data mart
C. jukebox
D. RAID
E. NAS
Answer» C. jukebox
369.

The function of the ‘home key’ in a microcomputer is

A. to interrupt executions
B. to reposition the cursor
C. to cancel the entry
D. to capitalise letters
E. to delete letters
Answer» B. to reposition the cursor
370.

A computer user obsessed with gaining entry into highly secured computer system is called a(n)

A. Hacker
B. Attacker
C. Normal user
D. Cracker
E. Programmer
Answer» D. Cracker
371.

The programming team fixes program errors discovered by users during

A. program maintenance
B. nesting
C. documentation
D. developing
E. flowcharting
Answer» A. program maintenance
372.

A data type used for nontextual data like pictures, sound and videos is called

A. Complex data type
B. OLE object data type
C. Memo data type
D. Simple data type
E. Yes/No data type
Answer» B. OLE object data type
373.

A(n) ________ is a system that is used for capturing knowledge from books and experienced individuals making it available where needed.

A. expert system
B. executive information system
C. decision support system
D. knowledge management system
E. knowledge database
Answer» D. knowledge management system
374.

Computer’s language consisting of binary numbers that directly corresponds to its electrical state is called

A. Natural
B. BASIC
C. Machine language
D. Assembly language
E. High level language
Answer» C. Machine language
375.

________ is a type of computer crime in which knowledgeable thieves remove some of the computer’s RAM chips but leave enough to start the computer.

A. Memory shaving
B. Software piracy
C. Syn flooding
D. Cybergaming crime
E. None of these
Answer» A. Memory shaving
376.

The ________ is a portion of Internet that contains billions of documents.

A. internet
B. w3.org
C. www
D. information highway
E. None of these
Answer» C. www
377.

Which of the following is not a program command?

A. READ
B. PRINT
C. PURGE
D. WRITE
E. GO TO
Answer» E. GO TO
378.

GDI represents

A. Global Data Interface
B. Graphics Data Interface
C. Graphics Device Interface
D. Global Device Interface
E. None of these
Answer» C. Graphics Device Interface
379.

A robot consists of three basic components: power supply, memory and

A. software
B. arm
C. micro computer
D. co-axial cable
E. None of these
Answer» B. arm
380.

Status indicators are located on the

A. standard toolbar
B. formatting toolbar
C. formula bar
D. vertical scrollbar
E. horizontal scrollbar
Answer» C. formula bar
381.

What is the acronym for Dual-In-Line Memory Module?

A. DIMM
B. DM
C. DMM
D. DILMM
E. None of these
Answer» A. DIMM
382.

Data division is the third division of a ________ program.

A. LISP
B. FORTH
C. COBOL
D. BASIC
E. PASCAL
Answer» D. BASIC
383.

________ file is created in Microsoft Excel.

A. Folder
B. Program
C. Data
D. Instruction
E. Local
Answer» C. Data
384.

The view that shows the maximum amount of information about each file in My Computer is called

A. small icons
B. large icons
C. medium icons
D. details
E. list
Answer» D. details
385.

Error messages in an Excel sheet starts with _______ sign/symbol.

A. %
B. $
C. #
D. =
E.
Answer» C. #
386.

In SIO2 the figure 2 appears lowered. Which effect has been applied?

A. Superscript
B. Laid down
C. Laid up
D. Lowered
E. Subscript
Answer» E. Subscript
387.

Dvorak is used with reference to

A. Printer
B. Monitor
C. Mouse
D. Keyboard
E. Adapter
Answer» D. Keyboard
388.

Which of the following codes is written into serially accessed memory?

A. EOD code
B. Gray code
C. Bar code
D. Excess-3 code
E. Unicode
Answer» A. EOD code
389.

________ program is used to detect overall system malfunction.

A. System software
B. Application software
C. Utilities
D. System diagnostics
E. System analysis
Answer» D. System diagnostics
390.

To separate mechanism from policy ________ is used in operating system.

A. single-level implementation
B. two-level implementation
C. triple-level implementation
D. multi-level implementation
E. None of these
Answer» B. two-level implementation
391.

________ is the combination of keys to cut the selected text.

A. CTRL + X
B. CTRL + Y
C. CTRL + Z
D. CTRL + F
E. CTRL + P
Answer» A. CTRL + X
392.

A portion of disk that is unable to store data reliably is a

A. search utility
B. clean-up utility
C. bad section
D. file manager
E. None of these
Answer» C. bad section
393.

A unit of measurement, ________ is equal to approximately 1 septillion bytes.

A. Zetta byte
B. Yotta byte
C. Exa byte
D. Peta byte
E. Geop byte
Answer» B. Yotta byte
394.

Which of the following is used for broadband communications?

A. Cable modem
B. DSL modem
C. Satellite modem
D. All the above
E. None of these
Answer» D. All the above
395.

________ a document means the file is transferred from your computer to another computer.

A. Downloading
B. Really simple syndication
C. Accessing
D. Upgrading
E. Uploading
Answer» E. Uploading
396.

A(n) ________ allows you to communicate over the internet similar to a newsgroup but is easier to use.

A. forum
B. webmail
C. message board
D. webblog
E. None of these
Answer» C. message board
397.

A computer program used by search engine to roam the World Wide Web via the Internet, is

A. spimming
B. spider
C. specialised search engine
D. subject guide
E. None of these
Answer» B. spider
398.

A simple automated program that scans the web for specific data and insert into a designated database.

A. Web mining
B. Web database integration
C. Web crawler
D. Web scanning
E. Web searching
Answer» C. Web crawler
399.

In web searching a symbol or keyword that instructs the search software to make sure that any retrieved records contain a certain word, is called

A. Data operator
B. Increment operator
C. Decrement operator
D. Inclusion operator
E. Search operator
Answer» D. Inclusion operator
400.

Which of the following is a characterstic(s) of education software?

A. linked
B. interactive
C. dynamic
D. All the above
E. None of these
Answer» D. All the above
Tags
  • Question and answers in Important Computer MCQs For Competitive Exams part 2,
  • Important Computer MCQs For Competitive Exams part 2 multiple choice questions and answers,
  • Important Computer MCQs For Competitive Exams part 2 Important MCQs,
  • Solved MCQs for Important Computer MCQs For Competitive Exams part 2,
  • Important Computer MCQs For Competitive Exams part 2 MCQs with answers PDF download