

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Common Topics in Competitive and Entrance exams , Union Public Service Commission (UPSC) , Indian Administrative Service (IAS) .
251. |
_________ operating systems are found on ROM chips in portable or dedicated devices. |
A. | Server |
B. | Network |
C. | Embedded |
D. | Stand-alone |
E. | Windows |
Answer» C. Embedded |
252. |
Identify the odd term among the following groups. |
A. | Optical fibre |
B. | Co-axial cable |
C. | Twisted pair wire |
D. | Micro waves |
E. | None of these |
Answer» D. Micro waves |
253. |
________ are tiny charts embedded into the background of an Excel cell. |
A. | Labels |
B. | Functions |
C. | Formulas |
D. | Sparklines |
E. | Background |
Answer» D. Sparklines |
254. |
A(n) ________ is called an Internet-based online retailer. |
A. | online tailer |
B. | net-tailer |
C. | cybertailer |
D. | e-tailer |
E. | None of these |
Answer» D. e-tailer |
255. |
For predicting the weather ________ is the best solution. |
A. | thin clients |
B. | servers |
C. | super computer |
D. | workstations |
E. | minicomputer |
Answer» C. super computer |
256. |
To organise the bookmarks, ________ can be used. |
A. | containers |
B. | folders |
C. | structure |
D. | menus |
E. | files |
Answer» B. folders |
257. |
Different computers are connected to a LAN by a cable and a(n) |
A. | interface card |
B. | special wires |
C. | modem |
D. | telephone lines |
E. | channel |
Answer» A. interface card |
258. |
A ________ is a software that measures, monitors, analyses and controls real-world events. |
A. | real-time software |
B. | scientific software |
C. | system software |
D. | business software |
E. | None of these |
Answer» A. real-time software |
259. |
________ operating system uses write through catches. |
A. | DOS |
B. | VLTRIX |
C. | UNIX |
D. | XENIX |
E. | None of these |
Answer» A. DOS |
260. |
When you want to draw a perfect shape ________ should be used. |
A. | alt-key |
B. | ctrl-key |
C. | shift-key |
D. | space bar |
E. | backspace |
Answer» C. shift-key |
261. |
Which of the following might prevent a program from being modified in future? |
A. | Pseudocode |
B. | Logic errors |
C. | Syntax error |
D. | Lack of program documentation |
E. | All the above |
Answer» D. Lack of program documentation |
262. |
Which generation is natural language related to? |
A. | First generation |
B. | Second generation |
C. | Third generation |
D. | Fourth generation |
E. | Fifth generation |
Answer» E. Fifth generation |
263. |
The database environment has all of the following components except |
A. | database |
B. | DBA |
C. | users |
D. | SQL |
E. | separate files |
Answer» E. separate files |
264. |
A number of related records that are treated as a unit is called a |
A. | field |
B. | data |
C. | file |
D. | batch |
E. | group |
Answer» C. file |
265. |
Coding and testing are done in a ________ manager. |
A. | cross-sectional |
B. | by-sectional |
C. | ad hoc |
D. | bottom-up |
E. | top-down |
Answer» E. top-down |
266. |
Computer software is composed of |
A. | mnemonics |
B. | symbols |
C. | statements |
D. | algorithms |
E. | data |
Answer» D. algorithms |
267. |
Disk checking is associated with |
A. | debugging a program |
B. | running a program |
C. | compiling a program |
D. | coding a program |
E. | assembling a program |
Answer» A. debugging a program |
268. |
What is the common name given to a program written in any one of the high-level languages? |
A. | System program |
B. | Compiler program |
C. | Object program |
D. | Source program |
E. | Data program |
Answer» D. Source program |
269. |
________ is used to produce graphic outputs. |
A. | VDU |
B. | Magnetic tape |
C. | Magnetic disk |
D. | Plotter |
E. | None of these |
Answer» D. Plotter |
270. |
Binary-Coded Decimal (BCD) often uses ________ bits. |
A. | 64 |
B. | 128 |
C. | 8 |
D. | 16 |
E. | 32 |
Answer» C. 8 |
271. |
________ holds microprograms. |
A. | ROM |
B. | RAM |
C. | Core memory |
D. | Control memory |
E. | EPROM |
Answer» B. RAM |
272. |
A hybrid computer uses a ________ to convert digital signals from a computer into analog signals. |
A. | modem |
B. | modulator |
C. | demodulator |
D. | decoder |
E. | None of these |
Answer» A. modem |
273. |
________ program gives instructions regarding operations inside the computer. |
A. | Application |
B. | System software |
C. | Utility |
D. | Compiler |
E. | Assembler |
Answer» B. System software |
274. |
The first electronic computer was made in the year |
A. | 1946 |
B. | 1955 |
C. | 1964 |
D. | 1967 |
E. | 1969 |
Answer» A. 1946 |
275. |
The record produced in an audit trail is known as |
A. | job stream |
B. | job file |
C. | journal tape |
D. | journal stream |
E. | job tape |
Answer» C. journal tape |
276. |
A group of magnetic tapes, videos or terminals usually under the control of one master is called a |
A. | cluster |
B. | track |
C. | cylinder |
D. | All the above |
E. | None of these |
Answer» A. cluster |
277. |
________ is an alternative form of binary code. |
A. | Decoder |
B. | Bar code |
C. | Encoder |
D. | Gray code |
E. | Excess-3 code |
Answer» D. Gray code |
278. |
Which of the following layers is responsible for token management? |
A. | Physical layer |
B. | Application layer |
C. | Transport layer |
D. | Network layer |
E. | Session layer |
Answer» D. Network layer |
279. |
In a ________ topology, a network that contains multiple hubs is most likely configured. |
A. | ring |
B. | star |
C. | bus |
D. | mesh |
E. | tree |
Answer» E. tree |
280. |
Communication between a computer and a CPU uses ________ transmission mode. |
A. | automatic |
B. | simplex |
C. | half-duplex |
D. | full-duplex |
E. | None of these |
Answer» B. simplex |
281. |
ISDN is an acronym for |
A. | Integrated Standard Digital Network |
B. | Intelligent Services Digital Network |
C. | Integrated Services Digital Network |
D. | Integrated Services Data Network |
E. | None of these |
Answer» C. Integrated Services Digital Network |
282. |
In which of the following networks, irregular topologies are used? |
A. | LAN |
B. | WAN |
C. | MAN |
D. | CAN |
E. | Broadcast Networks |
Answer» B. WAN |
283. |
________ standard describes the CSMA/CD protocol. |
A. | IEEE 802.1 |
B. | IEEE 802.2 |
C. | IEEE 802.3 |
D. | IEEE 802.4 |
E. | IEEE 802.5 |
Answer» C. IEEE 802.3 |
284. |
COBOL is used in ________ applications. |
A. | scientific |
B. | space |
C. | mathematical |
D. | commercial |
E. | graphics |
Answer» D. commercial |
285. |
In MS Excel, to display current date only ________ is used. |
A. | date () |
B. | now () |
C. | today () |
D. | time () |
E. | current date () |
Answer» C. today () |
286. |
To rename currently highlighted object ________ is used. |
A. | F1 |
B. | F2 |
C. | F3 |
D. | F5 |
E. | F6 |
Answer» B. F2 |
287. |
To display the window system properties dialogue, which of the following short cut keys is used? |
A. | Windows key + P |
B. | Windows key + D |
C. | Windows key + Pause |
D. | Windows key + Shift |
E. | Windows key + Ctrl |
Answer» C. Windows key + Pause |
288. |
A permanent virtual circuit involves |
A. | Connection establishment |
B. | Data transfer |
C. | Connection release |
D. | All of the above |
E. | None of these |
Answer» B. Data transfer |
289. |
________ input/output device is not associated with personal computers. |
A. | Colour monitors |
B. | Dot-matrix printer |
C. | Punched cards |
D. | Mice |
E. | Optical scanners |
Answer» C. Punched cards |
290. |
A computer enthusiast is called |
A. | a hacker |
B. | user friendly |
C. | a computerist |
D. | All the above |
E. | None of these |
Answer» E. None of these |
291. |
Actual execution of instructions in a computer takes place in |
A. | control unit |
B. | storage unit |
C. | arithmetic logic unit |
D. | All the above |
E. | None of these |
Answer» C. arithmetic logic unit |
292. |
________ function displays row data in a column or column data in a row. |
A. | Index |
B. | Rows |
C. | Hyperlink |
D. | Transpose |
E. | Columns |
Answer» D. Transpose |
293. |
Multiple calculations can be done by a single formula using |
A. | complex formula |
B. | array formula |
C. | smart formula |
D. | standard formula |
E. | advanced formula |
Answer» B. array formula |
294. |
Which of the following charts can be created in Excel? |
A. | Line |
B. | Pie |
C. | Area |
D. | All the above |
E. | None of these |
Answer» D. All the above |
295. |
________ type of commercial Internet service providers are most widely used. |
A. | Centralised |
B. | National |
C. | Regional |
D. | Decentralise |
E. | Application |
Answer» B. National |
296. |
Moving from one website to another is called |
A. | moving |
B. | jumping |
C. | surfing |
D. | applying |
E. | changing |
Answer» C. surfing |
297. |
Which of the following is not one of the basic elements of an e-mail message? |
A. | Header |
B. | Message |
C. | Footer |
D. | Signature |
E. | None of these |
Answer» C. Footer |
298. |
________ are specialised utility programs that make using the Internet and the web easier and safer. |
A. | Web utilities |
B. | Telecom |
C. | Web firewalls |
D. | Proxy server |
E. | Norton Utilities |
Answer» A. Web utilities |
299. |
The process that rearranges file fragments into contiguous files is called |
A. | file filing |
B. | folder folding |
C. | unfragging |
D. | defragmentation |
E. | file folding |
Answer» D. defragmentation |
300. |
________ virus describes the awful consequences of not acting immediately. |
A. | Android |
B. | Spoofing |
C. | Phishing |
D. | Misleading e-mail |
E. | Sabotage |
Answer» D. Misleading e-mail |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.