143
93.4k

440+ Important Computer MCQs For Competitive Exams part 2 Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Common Topics in Competitive and Entrance exams , Union Public Service Commission (UPSC) , Indian Administrative Service (IAS) .

351.

Timing and control unit is a part of a(n)

A. ALU
B. Processor
C. Memory
D. CMOS
E. BIOS
Answer» B. Processor
352.

Chip is the common name for a(n)

A. transistor
B. resistor
C. integrated circuit
D. semiconductor
E. None of these
Answer» C. integrated circuit
353.

Malicious software is known as

A. hardware
B. malware
C. malicious ware
D. illegal ware
E. None of these
Answer» B. malware
354.

Name the key that will erase information from the computer memory and characters on the screen.

A. Edit
B. Delete key
C. Dummy out
D. Trust key
E. None of these
Answer» B. Delete key
355.

________ determines the appearance of your desktop and controls the performance of your hardware.

A. Windows Explorer
B. Internet Explorer
C. Program file
D. Control Panel
E. System file
Answer» D. Control Panel
356.

The processing capability of a microcomputer can be enhanced with the help of

A. secondary memory
B. additional processor
C. expansion card
D. buffer memory
E. None of these
Answer» C. expansion card
357.

Which view is not available in Microsoft Word 2007?

A. Outline
B. Full Screen
C. Page Break
D. Draft
E. Print Layout
Answer» C. Page Break
358.

The collection of commands is called

A. file
B. program
C. information
D. data
E. instruction
Answer» B. program
359.

Recycle Bin enables you to restore a file which was deleted from

A. Drive B
B. Drive C
C. Drive K
D. Drive L
E. None of these
Answer» B. Drive C
360.

________ bar appears immediately below the title bar and provides access to pull-down menus.

A. Tool
B. Menu
C. Task
D. Status
E. None of these
Answer» B. Menu
361.

By default, number entries are

A. rightied aligned
B. centred
C. left-aligned
D. merged
E. justified
Answer» A. rightied aligned
362.

________ process rearranges file fragments into contiguous files.

A. Folder folding
B. Defragmentation
C. Unfragging
D. Disk scanning
E. File filling
Answer» B. Defragmentation
363.

The memory card which is conceptually related to the smart card but is similar to the video disk, is

A. Master card
B. Visa card
C. Optical card
D. Laser card
E. Data card
Answer» D. Laser card
364.

The main advantage of magnetic disk compared to magnetic tape is

A. low cost
B. rigidity
C. direct access
D. high packet density
E. sequential access
Answer» C. direct access
365.

Which of the following printers is used in conjunction with computers and uses dry ink powder?

A. Daisy wheel
B. Thermal printer
C. Line printer
D. Laser printer
E. Band printer
Answer» D. Laser printer
366.

Another term for the Internet is

A. web
B. www
C. cyberspace
D. arpanet
E. None of these
Answer» C. cyberspace
367.

Which of the following topologies is not of broadcast type?

A. Star
B. Bus
C. Ring
D. Mesh
E. Tree
Answer» C. Ring
368.

Enterprise storage unit that uses DVD and CD discs as the storage medium is

A. library
B. data mart
C. jukebox
D. RAID
E. NAS
Answer» C. jukebox
369.

The function of the ‘home key’ in a microcomputer is

A. to interrupt executions
B. to reposition the cursor
C. to cancel the entry
D. to capitalise letters
E. to delete letters
Answer» B. to reposition the cursor
370.

A computer user obsessed with gaining entry into highly secured computer system is called a(n)

A. Hacker
B. Attacker
C. Normal user
D. Cracker
E. Programmer
Answer» D. Cracker
371.

The programming team fixes program errors discovered by users during

A. program maintenance
B. nesting
C. documentation
D. developing
E. flowcharting
Answer» A. program maintenance
372.

A data type used for nontextual data like pictures, sound and videos is called

A. Complex data type
B. OLE object data type
C. Memo data type
D. Simple data type
E. Yes/No data type
Answer» B. OLE object data type
373.

A(n) ________ is a system that is used for capturing knowledge from books and experienced individuals making it available where needed.

A. expert system
B. executive information system
C. decision support system
D. knowledge management system
E. knowledge database
Answer» D. knowledge management system
374.

Computer’s language consisting of binary numbers that directly corresponds to its electrical state is called

A. Natural
B. BASIC
C. Machine language
D. Assembly language
E. High level language
Answer» C. Machine language
375.

________ is a type of computer crime in which knowledgeable thieves remove some of the computer’s RAM chips but leave enough to start the computer.

A. Memory shaving
B. Software piracy
C. Syn flooding
D. Cybergaming crime
E. None of these
Answer» A. Memory shaving
376.

The ________ is a portion of Internet that contains billions of documents.

A. internet
B. w3.org
C. www
D. information highway
E. None of these
Answer» C. www
377.

Which of the following is not a program command?

A. READ
B. PRINT
C. PURGE
D. WRITE
E. GO TO
Answer» E. GO TO
378.

GDI represents

A. Global Data Interface
B. Graphics Data Interface
C. Graphics Device Interface
D. Global Device Interface
E. None of these
Answer» C. Graphics Device Interface
379.

A robot consists of three basic components: power supply, memory and

A. software
B. arm
C. micro computer
D. co-axial cable
E. None of these
Answer» B. arm
380.

Status indicators are located on the

A. standard toolbar
B. formatting toolbar
C. formula bar
D. vertical scrollbar
E. horizontal scrollbar
Answer» C. formula bar
381.

What is the acronym for Dual-In-Line Memory Module?

A. DIMM
B. DM
C. DMM
D. DILMM
E. None of these
Answer» A. DIMM
382.

Data division is the third division of a ________ program.

A. LISP
B. FORTH
C. COBOL
D. BASIC
E. PASCAL
Answer» D. BASIC
383.

________ file is created in Microsoft Excel.

A. Folder
B. Program
C. Data
D. Instruction
E. Local
Answer» C. Data
384.

The view that shows the maximum amount of information about each file in My Computer is called

A. small icons
B. large icons
C. medium icons
D. details
E. list
Answer» D. details
385.

Error messages in an Excel sheet starts with _______ sign/symbol.

A. %
B. $
C. #
D. =
E.
Answer» C. #
386.

In SIO2 the figure 2 appears lowered. Which effect has been applied?

A. Superscript
B. Laid down
C. Laid up
D. Lowered
E. Subscript
Answer» E. Subscript
387.

Dvorak is used with reference to

A. Printer
B. Monitor
C. Mouse
D. Keyboard
E. Adapter
Answer» D. Keyboard
388.

Which of the following codes is written into serially accessed memory?

A. EOD code
B. Gray code
C. Bar code
D. Excess-3 code
E. Unicode
Answer» A. EOD code
389.

________ program is used to detect overall system malfunction.

A. System software
B. Application software
C. Utilities
D. System diagnostics
E. System analysis
Answer» D. System diagnostics
390.

To separate mechanism from policy ________ is used in operating system.

A. single-level implementation
B. two-level implementation
C. triple-level implementation
D. multi-level implementation
E. None of these
Answer» B. two-level implementation
391.

________ is the combination of keys to cut the selected text.

A. CTRL + X
B. CTRL + Y
C. CTRL + Z
D. CTRL + F
E. CTRL + P
Answer» A. CTRL + X
392.

A portion of disk that is unable to store data reliably is a

A. search utility
B. clean-up utility
C. bad section
D. file manager
E. None of these
Answer» C. bad section
393.

A unit of measurement, ________ is equal to approximately 1 septillion bytes.

A. Zetta byte
B. Yotta byte
C. Exa byte
D. Peta byte
E. Geop byte
Answer» B. Yotta byte
394.

Which of the following is used for broadband communications?

A. Cable modem
B. DSL modem
C. Satellite modem
D. All the above
E. None of these
Answer» D. All the above
395.

________ a document means the file is transferred from your computer to another computer.

A. Downloading
B. Really simple syndication
C. Accessing
D. Upgrading
E. Uploading
Answer» E. Uploading
396.

A(n) ________ allows you to communicate over the internet similar to a newsgroup but is easier to use.

A. forum
B. webmail
C. message board
D. webblog
E. None of these
Answer» C. message board
397.

A computer program used by search engine to roam the World Wide Web via the Internet, is

A. spimming
B. spider
C. specialised search engine
D. subject guide
E. None of these
Answer» B. spider
398.

A simple automated program that scans the web for specific data and insert into a designated database.

A. Web mining
B. Web database integration
C. Web crawler
D. Web scanning
E. Web searching
Answer» C. Web crawler
399.

In web searching a symbol or keyword that instructs the search software to make sure that any retrieved records contain a certain word, is called

A. Data operator
B. Increment operator
C. Decrement operator
D. Inclusion operator
E. Search operator
Answer» D. Inclusion operator
400.

Which of the following is a characterstic(s) of education software?

A. linked
B. interactive
C. dynamic
D. All the above
E. None of these
Answer» D. All the above

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.