2500+ Top Computer Mcqs With Answers For Competitive Exams PDF
2500+ Top Computer Mcqs With Answers For Competitive Exams PDF
ABOUT US
Home » Computer GK Questions » 2500+ TOP Computer MCQs with Answers for Competitive Exams Pdf
D. Screen Size
E. None of these
Answer: A. Bandwidth
2. Latency time is
A. Time to spin the needed data under head
D. All of these
E. None of these
E. None of these
E. None of these
B. Latency Time
C. Access Time
D. None
E. None of these
7. ………….is a technique of improving the priority of process waiting in Queue for CPU allocation
A. Starvation
B. Ageing
C. Revocation
D. Relocation
E. None of these
Answer: B. Ageing
B. Semantics
C. Structure
D. Code
E. None of these
Answer: C. Structure
9. …………is a technique of temporarily removing inactive programs from the memory of computer system
A. Swapping
B. Spooling
C. Semaphore
D. Scheduler
E. None of these
Answer: A. Swapping
B. swapping
E. None of these
Answer: A. segmentation
E. None of these
12. Before proceeding with its execution, each process must acquire all the resources it needs is called
A. hold and wait
B. No pre-emption
C. circular wait
D. starvation
E. None of these
E. None of these
B. terminated
C. executing
D. blocked
E. None of these
Answer: D. blocked
E. None of these
17. Which two files are used during operations of the DBMS
A. Query languages and utilities
E. None of these
18. A protocol is a set of rules governing a time sequence of events that must take place
A. between peers
B. between an interface
C. between modems
D. across an interface
E. None of these
B. modulator
C. stations
D. transponders
E. None of these
Answer: D. transponders
C. communication hardware
E. None of these
21. Which of the following is an advantage to using fiber optics data transmission?
A. resistance to data theft
D. All of these
E. None of these
B. coaxial cables
C. modem
D. microwave systems
E. None of these
Answer: C. modem
B. Linear Search
C. Tree Search
D. Hashing
E. None of these
Answer: D. Hashing
E. None of these
25. The space factor when determining the efficiency of algorithm is measured by
A. Counting the maximum memory needed by the algorithm
B. foundation address
C. first address
D. base address
E. None of these
B. lists
C. stacks
D. all of these
E. None of these
Answer: C. stacks
E. None of these
C. Network layer
D. Transport layer
E. None of these
B. 256
C. 512
D. 1024
E. None of these
Answer: B. 256
31. …………is stored on a client and contains state information of the website visited
A. Cookies
B. Servelet
C. History
D. Resident Page
E. None of these
Answer: A. Cookies
32. ………..are small applications that are accessed on an internet server, transported over the internet, automatically installed
and run as part of a web document.
A. Applets
B. Java Bean
C. Sockets
D. Java Component
E. None of these
Answer: A. Applets
33. Encryption is the conversion of data in some intelligible format into an unintelligible format called……….to prevent the data
from being understood if read by an unauthorized party.
A. Clear Text
B. Encrypted Text
C. Cipher Text
D. Coded Text
E. None of these
34. The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is
known as :
A. Spooling
B. Contention
C. I/O wait
D. Buffering
E. None of these
Answer: D. Buffering
35. Each cell in Microsoft Office Excel documents is referred to by its cell address, which is the…………..
A. cell’s column label
E. None of these
B. FORTRAN
C. Machine Language
D. COBOL
E. None of these
37. The portion of the application that you work with in an application software package is the
A. user interface
B. utility interface
C. processing interface
D. analytical interface
E. None of these
B. brows r
C. Office Assistant
D. feature presentation
E. None of these
B. monitor
C. Status Bar
D. user interface
E. None of these
40. Which of the following is the term for a request for specific data contained in a database?
A. question
B. query
C. inquiry
D. quiz
E. None of these
Answer: B. query
B. browser
C. Operating system
D. shareware
E. None of these
B. microcomputers
C. minicomputers
D. supercomputers
E. None of these
Answer: D. supercomputers
43. The system component that controls and manipulates data in order to produce information is called the
A. keyboard
B. microprocessor
C. monitor
D. mouse
E. None of these
Answer: B. microprocessor
44. Which of the following is not an operating system for mobile phones?
A. Android
B. Symbian
C. iOS
D. Bada
B. document
C. database
D. presentation
E. None of these
Answer: B. document
46. Many experts are predicting that this revolution is expected to dramatically affect the way we communicate and use
computer technology.
A. graphics
B. input
C. memory
D. wireless
E. None of these
Answer: D. wireless
47. The Internet was launched in 1969 when the United States funded a project that developed a national computer network
called
A. Web
B. ISP
C. CERN
D. ARPANET
E. None of these
Answer: D. ARPANET
B. ISP
C. browser
D. URL
E. None of these
Answer: C. browser
B. procedures
C. protocols
D. hyperlinks
E. None of these
Answer: C. protocols
50. The last part of the domain name following the dot(.) is the top……….domain
A. Level
B. link
C. locator
D. language
E. None of these
Answer: A. Level
51. Many individuals create their own personal sites called Web logs, or………….
A. social networks
B. blogs
C. wikis
D. search engines
E. None of these
Answer: B. blogs
52. Programs that automatically submit your search request to several search engines simultaneously are called…………
A. meta search engines
C. spiders
D. hits
E. None of these
Answer: A. meta search engines
B. Web
C. Premium
D. Digital
E. None of these
Answer: D. Digital
54. These programs allow parents as well as organizations to block out selected sites and set time limits on Internet access.
A. plug-ins
B. filters
C. FTP
D. DSL
E. None of these
Answer: B. filters
55. This type of software works with end users, application software, and computer hardware to handle the majority of technical
details.
A. application software
B. communications software
C. system software
D. Web software
E. None of these
B. Business suites
C. Specialized applications
D. Utility programs
E. None of these
57. The primary purpose of this type of software is to create text-based documents.
A. spreadsheet
B. presentation
C. word processing
D. web development
E. None of these
58. Letters, memos, term papers, reports, and contracts are all examples of
A. models
B. spreadsheets
C. documents
D. menus
E. None of these
Answer: C. documents
E. None of these
60. Database…………..are primarily used to enter new records and to make changes to existing records.
A. reports
B. tables
C. forms
D. queries
E. None of these
Answer: C. forms
61. A file that includes predefined settings that can be used to create many common types of presentations is called a
A. pattern
B. model
C. template
D. blueprint
E. None of these
Answer: C. template
62. A(n)……….is a single program that provides the functionality of a word processor, spreadsheet, database manager, and
more.
A. specialized application
B. integrated package
C. basic application
D. software suite
E. None of these
B. Terminal
C. Client
D. Online
E. None of these
Answer: A. Node
64. Network operating systems from Novell is….……..
A. NOS
B. UNIX
C. NetWare
D. Solaris
E. None of these
Answer: C. NetWare
65. NIC Stands for …………
A. Network Interface Card
E. None of these
C. Coaxial cable
D. Optical Fiber
E. None of these
C. Network Layer
D. Application Layer
E. None of these
B. line conditioner
C. generator
D. UPS
E. None of these
Answer: D. UPS
69. Which layer defines the mechanical, electrical, and timing interfaces to the network?
A. Physical Layer
C. Network Layer
D. Application Layer
E. None of these
E. None of these
B. Link Port
C. Line Printer
D. Line Port
E. None of these
E. None of these
B. seq
C. header
D. info
E. None of these
Answer: C. header
74. The technique of temporarily delaying outgoing acknowledgments so that they can be hooked onto the next outgoing data
frame is known as
A. Correcting
B. Piggybacking
C. Sliding
D. None of these
E. None of these
Answer: B. Piggybacking
75. The data link layer is used for
A. Providing a well-defined service interface to the network layer.
C. Regulating the flow of data so that slow receivers are not swamped by fast senders
D. All of these
E. None of these
E. None of these
E. None of these
E. None of these
B. Access Points
C. Access Hubs
D. Access Switch
E. None of these
B. Internal Power
C. Intranet Protocol
D. Internal Protocol
E. None of these
B. Electromechanical
C. Optical
D. Fiber Optical
E. None of these
Answer: C. Optical
82. Which of the following device can store large amounts of data?
A. Floppy Disk
B. Hard Disk
C. CDROM
D. Zip Disk
E. None of these
B. Hard Disk
C. CDROM
D. Zip Disk
E. None of these
B. Directories
C. Floppies
D. Maer
E. None of these
Answer: A. Files
85. IP Addresses has………..bytes
A. 2
B. 4
C. 8
D. 16
E. None of these
Answer: B. 4
E. None of these
C. Committed server
D. Service server
E. None of these
B. Windows NT
C. NOS
D. UNIX
E. None of these
Answer: B. Windows NT
89. MOS stands for?
A. Metal Oxide Semiconductor
E. None of these
B. NOR
C. NAND
D. NAT
E. None of these
Answer: D. NAT
91. Which of the following RAM times have to be refreshed often in order to retain its contents?
A. SIMM
B. DIMM
C. SDMM
D. Western Digital
E. None of these
Answer: B. DIMM
92. Which of the following companies is a leader in manufacture of Hard Disk Drives?
A. Samsung
B. IBM
C. Fujitsu
D. Western Digital
E. None of these
B. B
C. C
D. D
E. None of these
Answer: C. C
94. Which of the memories below is often used in a typical computer operation?
A. RAM
B. ROM
C. FDD
D. HDD
E. None of these
Answer: A. RAM
95. Which storage device is mounted on ‘reels’?
A. Floppy Disk
B. Hard Disk
C. Magnetic Tapes
D. CDROM
E. None of these
E. None of these
B. 10
C. 100
D. 1000
E. None of these
Answer: A. 1
B. 10
C. 100
D. 1000
E. None of these
Answer: D. 1000
99. The Analytical Engine developed during First Generation of computers used…………as a memory unit
A. RAM
B. Floppies
C. Cards
D. Counter Wheels
E. None of these
B. phish
C. threat
D. spoof
E. None of these
Answer: C. threat
101. In the right setting a thief will steal yourinformation by simply watching what you type.
A. snagging
B. spying
C. social engineering
D. shoulder surfing
E. None of these
B. cookie
C. spyware application
D. spam
E. None of these
B. phishing
C. spamming
D. bugging
E. None of these
Answer: B. phishing
104. A hacker that changes or forges information in an electronic resource, is engaging in………
A. denial of service
B. sniffing
C. terrorism
D. data diddling
E. None of these
B. forging
C. IP spoofing
D. ID theft
E. None of these
Answer: C. IP spoofing
B. countermeasures
C. degree of harm
D. susceptibility
E. None of these
B. spike
C. blackout
D. surge
E. None of these
Answer: B. spike
108. Which of the following is NOT a Microsoft Internet tool or technology?
A. Dreamweaver
B. Silverlight
C. Internet Explorer
D. Expression Web
E. None of these
Answer: A. Dreamweaver
109. A protocol used to control the secure sending of data on the internet is :
A. SMTP
B. HTTPS
C. TCP/IP
D. HTTP
E. None of these
Answer: B. HTTPS
110. Programs from the same developer sold bundled together, that provide better integration and share common features,
toolbars and menus are known as ………..
A. software suites