113
84.3k

440+ Important Computer MCQs For Competitive Exams part 2 Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Common Topics in Competitive and Entrance exams , Union Public Service Commission (UPSC) , Indian Administrative Service (IAS) .

251.

_________ operating systems are found on ROM chips in portable or dedicated devices.

A. Server
B. Network
C. Embedded
D. Stand-alone
E. Windows
Answer» C. Embedded
252.

Identify the odd term among the following groups.

A. Optical fibre
B. Co-axial cable
C. Twisted pair wire
D. Micro waves
E. None of these
Answer» D. Micro waves
253.

________ are tiny charts embedded into the background of an Excel cell.

A. Labels
B. Functions
C. Formulas
D. Sparklines
E. Background
Answer» D. Sparklines
254.

A(n) ________ is called an Internet-based online retailer.

A. online tailer
B. net-tailer
C. cybertailer
D. e-tailer
E. None of these
Answer» D. e-tailer
255.

For predicting the weather ________ is the best solution.

A. thin clients
B. servers
C. super computer
D. workstations
E. minicomputer
Answer» C. super computer
256.

To organise the bookmarks, ________ can be used.

A. containers
B. folders
C. structure
D. menus
E. files
Answer» B. folders
257.

Different computers are connected to a LAN by a cable and a(n)

A. interface card
B. special wires
C. modem
D. telephone lines
E. channel
Answer» A. interface card
258.

A ________ is a software that measures, monitors, analyses and controls real-world events.

A. real-time software
B. scientific software
C. system software
D. business software
E. None of these
Answer» A. real-time software
259.

________ operating system uses write through catches.

A. DOS
B. VLTRIX
C. UNIX
D. XENIX
E. None of these
Answer» A. DOS
260.

When you want to draw a perfect shape ________ should be used.

A. alt-key
B. ctrl-key
C. shift-key
D. space bar
E. backspace
Answer» C. shift-key
261.

Which of the following might prevent a program from being modified in future?

A. Pseudocode
B. Logic errors
C. Syntax error
D. Lack of program documentation
E. All the above
Answer» D. Lack of program documentation
262.

Which generation is natural language related to?

A. First generation
B. Second generation
C. Third generation
D. Fourth generation
E. Fifth generation
Answer» E. Fifth generation
263.

The database environment has all of the following components except

A. database
B. DBA
C. users
D. SQL
E. separate files
Answer» E. separate files
264.

A number of related records that are treated as a unit is called a

A. field
B. data
C. file
D. batch
E. group
Answer» C. file
265.

Coding and testing are done in a ________ manager.

A. cross-sectional
B. by-sectional
C. ad hoc
D. bottom-up
E. top-down
Answer» E. top-down
266.

Computer software is composed of

A. mnemonics
B. symbols
C. statements
D. algorithms
E. data
Answer» D. algorithms
267.

Disk checking is associated with

A. debugging a program
B. running a program
C. compiling a program
D. coding a program
E. assembling a program
Answer» A. debugging a program
268.

What is the common name given to a program written in any one of the high-level languages?

A. System program
B. Compiler program
C. Object program
D. Source program
E. Data program
Answer» D. Source program
269.

________ is used to produce graphic outputs.

A. VDU
B. Magnetic tape
C. Magnetic disk
D. Plotter
E. None of these
Answer» D. Plotter
270.

Binary-Coded Decimal (BCD) often uses ________ bits.

A. 64
B. 128
C. 8
D. 16
E. 32
Answer» C. 8
271.

________ holds microprograms.

A. ROM
B. RAM
C. Core memory
D. Control memory
E. EPROM
Answer» B. RAM
272.

A hybrid computer uses a ________ to convert digital signals from a computer into analog signals.

A. modem
B. modulator
C. demodulator
D. decoder
E. None of these
Answer» A. modem
273.

________ program gives instructions regarding operations inside the computer.

A. Application
B. System software
C. Utility
D. Compiler
E. Assembler
Answer» B. System software
274.

The first electronic computer was made in the year

A. 1946
B. 1955
C. 1964
D. 1967
E. 1969
Answer» A. 1946
275.

The record produced in an audit trail is known as

A. job stream
B. job file
C. journal tape
D. journal stream
E. job tape
Answer» C. journal tape
276.

A group of magnetic tapes, videos or terminals usually under the control of one master is called a

A. cluster
B. track
C. cylinder
D. All the above
E. None of these
Answer» A. cluster
277.

________ is an alternative form of binary code.

A. Decoder
B. Bar code
C. Encoder
D. Gray code
E. Excess-3 code
Answer» D. Gray code
278.

Which of the following layers is responsible for token management?

A. Physical layer
B. Application layer
C. Transport layer
D. Network layer
E. Session layer
Answer» D. Network layer
279.

In a ________ topology, a network that contains multiple hubs is most likely configured.

A. ring
B. star
C. bus
D. mesh
E. tree
Answer» E. tree
280.

Communication between a computer and a CPU uses ________ transmission mode.

A. automatic
B. simplex
C. half-duplex
D. full-duplex
E. None of these
Answer» B. simplex
281.

ISDN is an acronym for

A. Integrated Standard Digital Network
B. Intelligent Services Digital Network
C. Integrated Services Digital Network
D. Integrated Services Data Network
E. None of these
Answer» C. Integrated Services Digital Network
282.

In which of the following networks, irregular topologies are used?

A. LAN
B. WAN
C. MAN
D. CAN
E. Broadcast Networks
Answer» B. WAN
283.

________ standard describes the CSMA/CD protocol.

A. IEEE 802.1
B. IEEE 802.2
C. IEEE 802.3
D. IEEE 802.4
E. IEEE 802.5
Answer» C. IEEE 802.3
284.

COBOL is used in ________ applications.

A. scientific
B. space
C. mathematical
D. commercial
E. graphics
Answer» D. commercial
285.

In MS Excel, to display current date only ________ is used.

A. date ()
B. now ()
C. today ()
D. time ()
E. current date ()
Answer» C. today ()
286.

To rename currently highlighted object ________ is used.

A. F1
B. F2
C. F3
D. F5
E. F6
Answer» B. F2
287.

To display the window system properties dialogue, which of the following short cut keys is used?

A. Windows key + P
B. Windows key + D
C. Windows key + Pause
D. Windows key + Shift
E. Windows key + Ctrl
Answer» C. Windows key + Pause
288.

A permanent virtual circuit involves

A. Connection establishment
B. Data transfer
C. Connection release
D. All of the above
E. None of these
Answer» B. Data transfer
289.

________ input/output device is not associated with personal computers.

A. Colour monitors
B. Dot-matrix printer
C. Punched cards
D. Mice
E. Optical scanners
Answer» C. Punched cards
290.

A computer enthusiast is called

A. a hacker
B. user friendly
C. a computerist
D. All the above
E. None of these
Answer» E. None of these
291.

Actual execution of instructions in a computer takes place in

A. control unit
B. storage unit
C. arithmetic logic unit
D. All the above
E. None of these
Answer» C. arithmetic logic unit
292.

________ function displays row data in a column or column data in a row.

A. Index
B. Rows
C. Hyperlink
D. Transpose
E. Columns
Answer» D. Transpose
293.

Multiple calculations can be done by a single formula using

A. complex formula
B. array formula
C. smart formula
D. standard formula
E. advanced formula
Answer» B. array formula
294.

Which of the following charts can be created in Excel?

A. Line
B. Pie
C. Area
D. All the above
E. None of these
Answer» D. All the above
295.

________ type of commercial Internet service providers are most widely used.

A. Centralised
B. National
C. Regional
D. Decentralise
E. Application
Answer» B. National
296.

Moving from one website to another is called

A. moving
B. jumping
C. surfing
D. applying
E. changing
Answer» C. surfing
297.

Which of the following is not one of the basic elements of an e-mail message?

A. Header
B. Message
C. Footer
D. Signature
E. None of these
Answer» C. Footer
298.

________ are specialised utility programs that make using the Internet and the web easier and safer.

A. Web utilities
B. Telecom
C. Web firewalls
D. Proxy server
E. Norton Utilities
Answer» A. Web utilities
299.

The process that rearranges file fragments into contiguous files is called

A. file filing
B. folder folding
C. unfragging
D. defragmentation
E. file folding
Answer» D. defragmentation
300.

________ virus describes the awful consequences of not acting immediately.

A. Android
B. Spoofing
C. Phishing
D. Misleading e-mail
E. Sabotage
Answer» D. Misleading e-mail

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.