

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Common Topics in Competitive and Entrance exams , Union Public Service Commission (UPSC) , Indian Administrative Service (IAS) .
1901. |
What kind of memory is both static and non-volatile? |
A. | RAM |
B. | ROM |
C. | BIOS |
D. | CACHE |
E. | None of these |
Answer» B. ROM |
1902. |
…………is computer software designed to operate the computer hardware and to provide platform for running application software |
A. | Application software |
B. | System software |
C. | Software |
D. | Operating system |
E. | None of these |
Answer» B. System software |
1903. |
The…………is the amount of data that a storage device can move from the storage medium to the Computer per second. |
A. | data migration rate |
B. | data digitizing rate |
C. | data transfer rate |
D. | data access rate |
E. | None of these |
Answer» C. data transfer rate |
1904. |
A device, which is not connected to CPU, is called as………. |
A. | land-line device |
B. | On-line device |
C. | Off-line device |
D. | Device |
E. | None of these |
Answer» C. Off-line device |
1905. |
What is the other name for programmed chip? |
A. | RAM |
B. | ROM |
C. | LSIC |
D. | PROM |
E. | None of these |
Answer» B. ROM |
1906. |
On-line real time systems become popular in………..generation |
A. | First Generation |
B. | Second Generation |
C. | Third Generation |
D. | Fourth Generation |
E. | None of these |
Answer» C. Third Generation |
1907. |
………..is the ability of a device to “jump” directly to the requested data. |
A. | Sequential access |
B. | Random access |
C. | Quick access |
D. | All of these |
E. | None of these |
Answer» B. Random access |
1908. |
The task of performing operations like arithmetic and logical operations is called ………… |
A. | Processing |
B. | Storing |
C. | Editing |
D. | Sorting |
E. | None of these |
Answer» A. Processing |
1909. |
The ALU and Control Unit jointly known as |
A. | RAM |
B. | ROM |
C. | CPU |
D. | PC |
E. | None of these |
Answer» C. CPU |
1910. |
RAM is an example of |
A. | Secondary memory |
B. | Primary memory |
C. | Main memory |
D. | Both (a) and (b) |
E. | None of these |
Answer» B. Primary memory |
1911. |
Magnetic disk is an example of |
A. | Secondary memory |
B. | Primary memory |
C. | Main memory |
D. | Both (a) and (b) |
E. | None of these |
Answer» A. Secondary memory |
1912. |
Which one of the following is NOT a computer language? |
A. | MS-Excel |
B. | BASIC |
C. | COBOL |
D. | C + + |
E. | None of these |
Answer» A. MS-Excel |
1913. |
Each memory cell has a unique number, assigned to it is called as the……….of the cell |
A. | Address |
B. | Register |
C. | Number |
D. | Path |
E. | None of these |
Answer» A. Address |
1914. |
The server on the internet is also known as : |
A. | Repeater |
B. | Host |
C. | Gateway |
D. | AND Gate |
E. | None of these |
Answer» B. Host |
1915. |
Website is a collection of : |
A. | HTML documents |
B. | Graphic files |
C. | Audio and video files |
D. | All of these |
E. | None of these |
Answer» D. All of these |
1916. |
……….is a method in which multiple communication devices are connected to one another efficiently. |
A. | Switching |
B. | Redundancy |
C. | Capacity |
D. | Detecting |
E. | None of these |
Answer» A. Switching |
1917. |
One computer that is not considered a portable computer is……….. |
A. | Mini computer |
B. | A Laptop |
C. | Micro computer |
D. | All of these |
E. | None of these |
Answer» A. Mini computer |
1918. |
The sharing of a medium and its path by 2 or more devices is called………. |
A. | Modulation |
B. | Encoding |
C. | Line discipline |
D. | Multiplexing |
E. | None of these |
Answer» D. Multiplexing |
1919. |
Device drivers are : |
A. | tine power cords for external storage devices |
B. | experts who know to maximise the performance of device |
C. | small, special purpose programs |
D. | the innermost part of the operating system |
E. | substitutes for operating systems |
Answer» C. small, special purpose programs |
1920. |
Array is…………. |
A. | linear data structure |
B. | non-linear data structure |
C. | complex data structure |
D. | simple data structure |
E. | None of these |
Answer» C. complex data structure |
1921. |
A stored link to a webpage, in order to have a quick and easy access to it later, is called : |
A. | Bookmark |
B. | WP-link |
C. | Favourites |
D. | Both (a) and (c) |
E. | None of these |
Answer» D. Both (a) and (c) |
1922. |
Which input device cannot be used to work in MS Office? |
A. | Scanner |
B. | Mouse |
C. | Keyboard |
D. | Joy stick |
E. | Lightpen |
Answer» D. Joy stick |
1923. |
………….is an animated character that gives help in MS Office? |
A. | Office worker |
B. | Comic assistant |
C. | Office assistant |
D. | All of these |
E. | None of these |
Answer» C. Office assistant |
1924. |
RAM is also called as |
A. | Read/Write Memory |
B. | Long Memory |
C. | Permanent Memory |
D. | Primary Memory |
E. | None of these |
Answer» A. Read/Write Memory |
1925. |
……….Store data or information temporarily and pass it on as directed by the control unit |
A. | Address |
B. | Register |
C. | Number |
D. | Memory |
E. | None of these |
Answer» B. Register |
1926. |
Select the Odd one |
A. | Operating System |
B. | Interpreter |
C. | Compiler |
D. | Assembler |
E. | None of these |
Answer» A. Operating System |
1927. |
A………..is an additional set of commands that the computer displays after you make a selection from the main menu. |
A. | dialog box |
B. | submenu |
C. | menu selection |
D. | All of these |
E. | None of these |
Answer» A. dialog box |
1928. |
COBOL is an acronym for………… |
A. | Common Business Oriented Language |
B. | Computer Business Oriented Language |
C. | Common Business Operated Language |
D. | Common Business Organized Language |
E. | None of these |
Answer» A. Common Business Oriented Language |
1929. |
All of the following are examples of real security and privacy risks EXCEPT : |
A. | hackers |
B. | spam |
C. | viruses |
D. | identity theft |
E. | None of these |
Answer» B. spam |
1930. |
Which of the following is NOT one of the four major data processing functions of a computer? |
A. | gathering data |
B. | processing data into information |
C. | analyzing the data or information |
D. | storing the data or information |
E. | None of these |
Answer» C. analyzing the data or information |
1931. |
All of the following are examples of storage devices EXCEPT : |
A. | hard disk drives |
B. | printers |
C. | floppy disk drives |
D. | CD drives |
E. | Pen drives |
Answer» B. printers |
1932. |
The CPU and memory are located on the : |
A. | expansion board |
B. | motherboard |
C. | storage device |
D. | output device |
E. | display board |
Answer» B. motherboard |
1933. |
……….is the science that attempts to produce machines that display the same type of intelligence that humans do. |
A. | Nanoscience |
B. | Nanotechnology |
C. | Simulation |
D. | Artificial intelligence (AI) |
E. | None of these |
Answer» D. Artificial intelligence (AI) |
1934. |
Servers are computers that provide resources to other computers connected to a : |
A. | network |
B. | mainframe |
C. | supercomputer |
D. | client |
E. | internet |
Answer» A. network |
1935. |
When creating a computer program, the …………designs the structure of the program |
A. | End user |
B. | System Analyst |
C. | Programmer |
D. | All of these |
E. | None of these |
Answer» B. System Analyst |
1936. |
A computer program that converts an entire program into machine language at one time is called a/an |
A. | interpreter |
B. | simulator |
C. | compiler |
D. | commander |
E. | None of these |
Answer» C. compiler |
1937. |
Computers process data into information by working exclusively with : |
A. | multimedia |
B. | words |
C. | characters |
D. | numbers |
E. | None of these |
Answer» D. numbers |
1938. |
The difference between people with access to computers and the Internet and those without this access is known as the : |
A. | digital divide |
B. | Internet divide |
C. | Web divide |
D. | broadband divide |
E. | None of these |
Answer» A. digital divide |
1939. |
The ability to recover and read deleted or damaged files from a criminal deleted computer is an example of a law enforcement specialty called : |
A. | robotics |
B. | simulation |
C. | computer forensics |
D. | animation |
E. | None of these |
Answer» C. computer forensics |
1940. |
Where does most data go first with in a computer memory hierarchy? |
A. | RAM |
B. | ROM |
C. | BIOS |
D. | CACHE |
E. | None of these |
Answer» A. RAM |
1941. |
Which command divides the surface of the blank disk into sectors and assign a unique address to each one |
A. | Ver |
B. | Format |
C. | Fat |
D. | Chkdsk |
E. | None of these |
Answer» B. Format |
1942. |
If you need to duplicate the entire disk, which command will you use? |
A. | Copy |
B. | Diskcopy |
C. | Chkdsk |
D. | Format |
E. | None of these |
Answer» B. Diskcopy |
1943. |
A………..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk. |
A. | system virus |
B. | Trojan horse virus |
C. | file virus |
D. | macro virus |
E. | None of these |
Answer» E. None of these |
1944. |
A result of a computer virus can not lead to……… |
A. | Disk Crash |
B. | Mother Board Crash |
C. | Corruption of program |
D. | Deletion of files |
E. | None of these |
Answer» B. Mother Board Crash |
1945. |
Every computer connected to an intranet or extranet must have a distinct……….. |
A. | firewall |
B. | proxy server |
C. | IP address |
D. | domain name |
E. | None of these |
Answer» B. proxy server |
1946. |
Programming language built into user programs such as Word and Excel are known as…………… |
A. | 4GLs |
B. | macro languages |
C. | object-oriented languages |
D. | visual programming languages |
E. | None of these |
Answer» D. visual programming languages |
1947. |
Firewalls are used to protect against ……….. |
A. | Unauthorized Attacks |
B. | Virus Attacks |
C. | Data Driven Attacks |
D. | Fire Attacks |
E. | All of these |
Answer» A. Unauthorized Attacks |
1948. |
Which of the following extensions suggest that the file is a backup copy |
A. | Bak |
B. | Bas |
C. | Com |
D. | Txt |
E. | None of these |
Answer» A. Bak |
1949. |
Computer programs are written in a high- level programming language; however, the human-readable version of a program is called………….. |
A. | cache |
B. | instruction set |
C. | source code |
D. | word size |
E. | None of these |
Answer» C. source code |
1950. |
The software tools that enable a user to interact with a computer for specific purposes are known as…………. |
A. | Hardware |
B. | Networked Software |
C. | Shareware |
D. | Applications |
E. | None of these |
Answer» D. Applications |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.