Computer Multiple Choice Questions SET-19

Computer Multiple Choice Questions SET-19

Computer Multiple Choice Questions SET-19

Question 1
The function of key F4 is
A
(a) Undo the last action
B
(b) To repeat the last action
C
(c) Both of above
D
(d) Both (b) and (a)
Question 2
Graphical pictures that represent an object like file, folder etc. are
A
(a) Windows
B
(b) Task bar
C
(c) Desktop
D
(d) Icons
Question 3
. DSL is an example of a(n) ___________ connection.
A
(a) wireless
B
(b) network
C
(c) slow
D
(d) broadband
Question 4
Smaller and less expensive PCbased servers are replacing ________ in many businesses.
A
(a) clients
B
(b) supercomputers
C
(c) laptops
D
(d) mainframes
Question 5
Servers are computers that provide resources to other computers connected to a:
A
(a) mainframe.
B
(b) network.
C
(c) supercomputer.
D
(d) client.
Question 6
The PC (personal computer) and the Apple Macintosh are examples of two different:
A
(a) applications.
B
(b) platforms.
C
(c) programs.
D
(d) storage devices.
Question 7
. Which of the following statement best describes the batch method of input?
A
(a) Data is input at the time it is collected
B
(b) Data is processed as soon as it is input
C
(c) Data is collected in the form of source documents, placed into groups, and then input to the computer
D
(d) Source documents are not used
Question 8
_______ bits equal one byte.
A
(a) Two
B
(b) Eight
C
(c) One thousand
D
(d) One million
Question 9
. The operating system is the most common type of ____________ software.
A
(a) application
B
(b) communication
C
(c) system
D
(d) word-processing software
Question 10
What is the name for the process that is used to convert a series of instructions, or program, written in a high-level language into instructions (or a program) that can be run on a computer?
A
(a) Compiling
B
(b) Assembling
C
(c) Translating
D
(d) Uploading
Question 11
A string of eight 0s and 1s is called a:
A
(a) byte
B
(b) megabyte
C
(c) kilobyte
D
(d) gigabyte
Question 12
Coded entries which are used to gain access to a computer system are called—
A
(a) Passwords
B
(b) Entry codes
C
(c) Security commands
D
(d) Code words
Question 13
. The subsystem of the kernel and hardware that cooperates to translate virtual to physical addresses comprises
A
(a) Memory Management Subsystem
B
(b) Process Management Subsystem
C
(c) Input/Output Management Subsystem
D
(d) All of the above
Question 14
. In DOS, the “Label” command is used to
A
(a) change the label of disk
B
(b) display the label of disk
C
(c) remove the label of disk
D
(d) Both (b) and (a)
E
) (e) All of these
Question 15
When we run a program in HTML coding, ____ is used as backend and ___ works as frontend.
A
(a) Notepad – Msn-messenger
B
(b) Notepad – Internet-Explorer
C
(c) MS-word – Internet Explorer
D
(d) Both (b) and (a)
Question 16
______ is collection of web-pages and ______ is the very first page that we see on opening of a website.
A
(a) Web-site, Home-page
B
(b) Home-page, Web-page
C
(c) Web-page-, Home-page
D
(d) Web-page, Web-site
Question 17
DOS and windows 3.x support file names upto _____ characters in length.
A
(a) Four
B
(b) Two
C
(c) Six
D
(d) Eight
Question 18
Which of the following computer languages is a mathematically oriented languages used for scientific problems?
A
(a) COBOL
B
(b) FORTRAN
C
(c) LISP
D
(d) PROLOG
Question 19
Encryption and decryption are functions of
A
(a) Session layer
B
(b) Transport layer
C
(c) Presentation layer
D
(d) All of the above
Question 20
For separating channels in FDM, it is necessary to use
A
(a) Bandpass filters
B
(b) Time slots
C
(c) Differentiation
D
(d) All of the above
Question 21
. A device operating at the physical layer is called a
A
(a) Router
B
(b) Bridge
C
(c) Repeater
D
(d) All of the above
Question 22
If the _____ bit in X.25 standard is set to 1, it means that there is more than one packet.
A
(a) D
B
(b) Q
C
(c) M
D
(d) P
Question 23
. A permanent virtual circuit involves
A
(a) Data transfer
B
(b) Connection establishment
C
(c) Connection release
D
(d) All of the above
Question 24
each packet of a message follows the same path from sender to receiver.
A
(a) Message switching
B
(b) Circuit switching
C
(c) The virtual approach to packet switching
D
(d) The datagram approach to packet switching
Question 25
. The ____ is a device that connects n inputs to m outputs.
A
(a) Crossbar
B
(b) Crossword
C
(c) Modem
D
(d) RAM
Question 26
. Which type of switching uses the entire capacity of a dedicated link ?
A
(a) Virtual Circuit Packet Switching
B
(b) Circuit switching
C
(c) Datagram Packet Switching
D
(d) Message Switching
Question 27
Which of the following types of tables constraints will prevent the entry of duplicate rows ?
A
(a) Unique
B
(b) Primary key
C
(c) Null
D
(d) Foreign key
Question 28
. Array is —
A
(a) non-linear data structure
B
(b) linear data structure
C
(c) complex data structure
D
(d) simple data structure
Question 29
X.21 protocol consists of
A
(a) Frame and packet levels
B
(b) Physical and frame levels
C
(c) Physical, frame and packet levels
D
(d) Only physical level
Question 30
The search tool used to text that appears in gotherspace is
A
(a) Archie
B
(b) Gobler
C
(c) Mikky
D
(d) Veronica
Question 31
. Which multiplexing technique transmits analog signals ?
A
(a) Synchronous TDM
B
(b) FDM
C
(c) Asynchronous TDM
D
(d) Both (a) and (c)
Question 32
The sharing of a medium and its path by 2 or more devices is called ____.
A
(a) Encoxing
B
(b) Modulation
C
(c) Line discipline
D
(d) Multiplexing
Question 33
Most mail programs automatically complete the following two parts in an e-mail
A
(a) From : and date:
B
(b) From: and Body:
C
(c) From : and To:
D
(d) From : and Subject:
Question 34
A device that connects to a network without the use of cables is said to be
A
(a) Centralised
B
(b) Distributed
C
(c) Open source
D
(d) Wireless
Question 35
. An error is also known as
A
(a) Debug
B
(b) Bug
C
(c) Cursor
D
(d) Icon
Question 36
A menu contains a list of
A
(a) Data
B
(b) Commands
C
(c) Objects
D
(d) Reports
Question 37
Which of the following groups consist of only input devices?
A
(a) Mouse, Keyboard, Printer
B
(b) Mouse, Keyboard, Monitor
C
(c) Mouse, Keyboard, Plotter
D
(d) Mouse, Keyboard, Scanner
Question 38
What would you do to highlight a word? You position the cursor next to the word, and then____
A
(a) Click mouse once
B
(b) Drag mouse while holding button down
C
(c) Roll mouse around
D
(d) Roll and then click mouse
Question 39
. Back up of the data files will help to prevent ____
A
(a) Duplication of data
B
(b) Loss of confidentiality
C
(c) Virus infection
D
(d) Loss of data
Question 40
File ____shrinks the size of a file so it requires less storage space.
A
(a) Synthesizing
B
(b) Scanning
C
(c) Defragmenting
D
(d) Compression
Question 41
. An e-mail address typically consists of a user ID followed by the____ sign and the name of the e-mail server that manages the user’s electronic post office box.
A
(a) #
B
(b) @
C
(c) &
D
(d) *
Question 42
Processing information involves.
A
(a) Communication with another computer.
B
(b) Accepting information from the outside world.
C
(c) Performing arithmetic or logical operations on information that is input.
D
(d) All of these answers are forms of processing information.
Question 43
. A generic term that refers to the combination of all commercial transactions executed over electronic media for the exchange of product and services.
A
(a) E-shopping
B
(b) E-commerce
C
(c) E-banking
D
(d) EDI
Question 44
For locating any document on the WWW, there is a unique address know as
A
(a) E-mail account
B
(b) Domain name
C
(c) Home-page
D
(d) URL
Question 45
The rectangular pattern of lines of varying width and spaces used for automatic product identification by computer
A
(a) Cost analysis
B
(b) Bar-code
C
(c) Test-code
D
(d) Sensor
Question 46
The protocol for sharing hypertext information on the World Wide Web is
A
(a) HTML
B
(b) HTTP
C
(c) FTP
D
(d) TCP
Question 47
Digital means that computer information is discrete and countable, subdivided into:
A
(a) Analog units.
B
(b) Digits.
C
(b) Digits.
D
(d) Bytes.
Question 48
. If a user needs information instantly available to the CPU, it should be stored:
A
(a) In RAM.
B
(b) In the CPU.
C
(c) In secondary storage.
D
(d) On a CD.
Question 49
. The CPU is also known as the:
A
(a) Random access memory.
B
(b) Microprocessor.
C
(c) Primary storage.
D
(d) Micro unit
Question 50
The primary output device for computers is a:
A
(a) Printer.
B
(b) Video monitor.
C
(c) Keyboard.
D
(d) Mouse.
There are 50 questions to complete.

Leave a Comment