Computer Multiple Choice Questions SET-19

Last updated on December 5, 2021
1 min read

Computer Multiple Choice Questions SET-19

Computer Multiple Choice Questions SET-19

Question 1
The function of key F4 is
A
(a) Undo the last action
B
(b) To repeat the last action
C
(c) Both of above
D
(d) Both (b) and (a)
Question 2
Graphical pictures that represent an object like file, folder etc. are
A
(a) Windows
B
(b) Task bar
C
(c) Desktop
D
(d) Icons
Question 3
. DSL is an example of a(n) ___________ connection.
A
(a) wireless
B
(b) network
C
(c) slow
D
(d) broadband
Question 4
Smaller and less expensive PCbased servers are replacing ________ in many businesses.
A
(a) clients
B
(b) supercomputers
C
(c) laptops
D
(d) mainframes
Question 5
Servers are computers that provide resources to other computers connected to a:
A
(a) mainframe.
B
(b) network.
C
(c) supercomputer.
D
(d) client.
Question 6
The PC (personal computer) and the Apple Macintosh are examples of two different:
A
(a) applications.
B
(b) platforms.
C
(c) programs.
D
(d) storage devices.
Question 7
. Which of the following statement best describes the batch method of input?
A
(a) Data is input at the time it is collected
B
(b) Data is processed as soon as it is input
C
(c) Data is collected in the form of source documents, placed into groups, and then input to the computer
D
(d) Source documents are not used
Question 8
_______ bits equal one byte.
A
(a) Two
B
(b) Eight
C
(c) One thousand
D
(d) One million
Question 9
. The operating system is the most common type of ____________ software.
A
(a) application
B
(b) communication
C
(c) system
D
(d) word-processing software
Question 10
What is the name for the process that is used to convert a series of instructions, or program, written in a high-level language into instructions (or a program) that can be run on a computer?
A
(a) Compiling
B
(b) Assembling
C
(c) Translating
D
(d) Uploading
Question 11
A string of eight 0s and 1s is called a:
A
(a) byte
B
(b) megabyte
C
(c) kilobyte
D
(d) gigabyte
Question 12
Coded entries which are used to gain access to a computer system are called—
A
(a) Passwords
B
(b) Entry codes
C
(c) Security commands
D
(d) Code words
Question 13
. The subsystem of the kernel and hardware that cooperates to translate virtual to physical addresses comprises
A
(a) Memory Management Subsystem
B
(b) Process Management Subsystem
C
(c) Input/Output Management Subsystem
D
(d) All of the above
Question 14
. In DOS, the “Label” command is used to
A
(a) change the label of disk
B
(b) display the label of disk
C
(c) remove the label of disk
D
(d) Both (b) and (a)
E
) (e) All of these
Question 15
When we run a program in HTML coding, ____ is used as backend and ___ works as frontend.
A
(a) Notepad – Msn-messenger
B
(b) Notepad – Internet-Explorer
C
(c) MS-word – Internet Explorer
D
(d) Both (b) and (a)
Question 16
______ is collection of web-pages and ______ is the very first page that we see on opening of a website.
A
(a) Web-site, Home-page
B
(b) Home-page, Web-page
C
(c) Web-page-, Home-page
D
(d) Web-page, Web-site
Question 17
DOS and windows 3.x support file names upto _____ characters in length.
A
(a) Four
B
(b) Two
C
(c) Six
D
(d) Eight
Question 18
Which of the following computer languages is a mathematically oriented languages used for scientific problems?
A
(a) COBOL
B
(b) FORTRAN
C
(c) LISP
D
(d) PROLOG
Question 19
Encryption and decryption are functions of
A
(a) Session layer
B
(b) Transport layer
C
(c) Presentation layer
D
(d) All of the above
Question 20
For separating channels in FDM, it is necessary to use
A
(a) Bandpass filters
B
(b) Time slots
C
(c) Differentiation
D
(d) All of the above
Question 21
. A device operating at the physical layer is called a
A
(a) Router
B
(b) Bridge
C
(c) Repeater
D
(d) All of the above
Question 22
If the _____ bit in X.25 standard is set to 1, it means that there is more than one packet.
A
(a) D
B
(b) Q
C
(c) M
D
(d) P
Question 23
. A permanent virtual circuit involves
A
(a) Data transfer
B
(b) Connection establishment
C
(c) Connection release
D
(d) All of the above
Question 24
each packet of a message follows the same path from sender to receiver.
A
(a) Message switching
B
(b) Circuit switching
C
(c) The virtual approach to packet switching
D
(d) The datagram approach to packet switching
Question 25
. The ____ is a device that connects n inputs to m outputs.
A
(a) Crossbar
B
(b) Crossword
C
(c) Modem
D
(d) RAM
Question 26
. Which type of switching uses the entire capacity of a dedicated link ?
A
(a) Virtual Circuit Packet Switching
B
(b) Circuit switching
C
(c) Datagram Packet Switching
D
(d) Message Switching
Question 27
Which of the following types of tables constraints will prevent the entry of duplicate rows ?
A
(a) Unique
B
(b) Primary key
C
(c) Null
D
(d) Foreign key
Question 28
. Array is —
A
(a) non-linear data structure
B
(b) linear data structure
C
(c) complex data structure
D
(d) simple data structure
Question 29
X.21 protocol consists of
A
(a) Frame and packet levels
B
(b) Physical and frame levels
C
(c) Physical, frame and packet levels
D
(d) Only physical level
Question 30
The search tool used to text that appears in gotherspace is
A
(a) Archie
B
(b) Gobler
C
(c) Mikky
D
(d) Veronica
Question 31
. Which multiplexing technique transmits analog signals ?
A
(a) Synchronous TDM
B
(b) FDM
C
(c) Asynchronous TDM
D
(d) Both (a) and (c)
Question 32
The sharing of a medium and its path by 2 or more devices is called ____.
A
(a) Encoxing
B
(b) Modulation
C
(c) Line discipline
D
(d) Multiplexing
Question 33
Most mail programs automatically complete the following two parts in an e-mail
A
(a) From : and date:
B
(b) From: and Body:
C
(c) From : and To:
D
(d) From : and Subject:
Question 34
A device that connects to a network without the use of cables is said to be
A
(a) Centralised
B
(b) Distributed
C
(c) Open source
D
(d) Wireless
Question 35
. An error is also known as
A
(a) Debug
B
(b) Bug
C
(c) Cursor
D
(d) Icon
Question 36
A menu contains a list of
A
(a) Data
B
(b) Commands
C
(c) Objects
D
(d) Reports
Question 37
Which of the following groups consist of only input devices?
A
(a) Mouse, Keyboard, Printer
B
(b) Mouse, Keyboard, Monitor
C
(c) Mouse, Keyboard, Plotter
D
(d) Mouse, Keyboard, Scanner
Question 38
What would you do to highlight a word? You position the cursor next to the word, and then____
A
(a) Click mouse once
B
(b) Drag mouse while holding button down
C
(c) Roll mouse around
D
(d) Roll and then click mouse
Question 39
. Back up of the data files will help to prevent ____
A
(a) Duplication of data
B
(b) Loss of confidentiality
C
(c) Virus infection
D
(d) Loss of data
Question 40
File ____shrinks the size of a file so it requires less storage space.
A
(a) Synthesizing
B
(b) Scanning
C
(c) Defragmenting
D
(d) Compression
Question 41
. An e-mail address typically consists of a user ID followed by the____ sign and the name of the e-mail server that manages the user’s electronic post office box.
A
(a) #
B
(b) @
C
(c) &
D
(d) *
Question 42
Processing information involves.
A
(a) Communication with another computer.
B
(b) Accepting information from the outside world.
C
(c) Performing arithmetic or logical operations on information that is input.
D
(d) All of these answers are forms of processing information.
Question 43
. A generic term that refers to the combination of all commercial transactions executed over electronic media for the exchange of product and services.
A
(a) E-shopping
B
(b) E-commerce
C
(c) E-banking
D
(d) EDI
Question 44
For locating any document on the WWW, there is a unique address know as
A
(a) E-mail account
B
(b) Domain name
C
(c) Home-page
D
(d) URL
Question 45
The rectangular pattern of lines of varying width and spaces used for automatic product identification by computer
A
(a) Cost analysis
B
(b) Bar-code
C
(c) Test-code
D
(d) Sensor
Question 46
The protocol for sharing hypertext information on the World Wide Web is
A
(a) HTML
B
(b) HTTP
C
(c) FTP
D
(d) TCP
Question 47
Digital means that computer information is discrete and countable, subdivided into:
A
(a) Analog units.
B
(b) Digits.
C
(b) Digits.
D
(d) Bytes.
Question 48
. If a user needs information instantly available to the CPU, it should be stored:
A
(a) In RAM.
B
(b) In the CPU.
C
(c) In secondary storage.
D
(d) On a CD.
Question 49
. The CPU is also known as the:
A
(a) Random access memory.
B
(b) Microprocessor.
C
(c) Primary storage.
D
(d) Micro unit
Question 50
The primary output device for computers is a:
A
(a) Printer.
B
(b) Video monitor.
C
(c) Keyboard.
D
(d) Mouse.
There are 50 questions to complete.

Leave a Reply

Latest Posts

Previous Story

Computer Multiple Choice Questions SET-18

Next Story

Computer Multiple Choice Questions SET-21

Latest from Blog

Computer Class PDF Download

In this Post we share some Important Questions that Help to your exam The _ may also be called the screen or monitor.(a) scanner(b) printer(c) hard disk(d) software(e) display The primary purpose
computer architecture

computer architecture

Computer architecture refers to the fundamental design and organization of a computer system, including the instruction set architecture (ISA), the memory architecture, and the microarchitecture. It encompasses both the hardware and software
Go toTop