0% found this document useful (0 votes)
361 views20 pages

2500+ Top Computer Mcqs With Answers For Competitive Exams PDF

This document provides 2500+ multiple choice questions about computers with answers for competitive exams. It includes questions about topics like computer hardware, software, operating systems, networks, internet, databases, algorithms and more. The questions cover concepts like screen resolution, latency time, DPI, database categories, file record length, virtual memory, encryption, protocols, transmission mediums, algorithm efficiency measures, data structures, and computer components.

Uploaded by

kvbmails
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
361 views20 pages

2500+ Top Computer Mcqs With Answers For Competitive Exams PDF

This document provides 2500+ multiple choice questions about computers with answers for competitive exams. It includes questions about topics like computer hardware, software, operating systems, networks, internet, databases, algorithms and more. The questions cover concepts like screen resolution, latency time, DPI, database categories, file record length, virtual memory, encryption, protocols, transmission mediums, algorithm efficiency measures, data structures, and computer components.

Uploaded by

kvbmails
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

HOME Interview Questions MCQs Class Notes *LAB VIVA SEMINAR TOPICS ONLINE TEST GATE CAT Internship

ABOUT US

Any Skill Search Here...

Home » Computer GK Questions » 2500+ TOP Computer MCQs with Answers for Competitive Exams Pdf

2500+ TOP Computer MCQs with Answers for Competitive


Exams Pdf

Computer Multiple Choice Questions


1. Which of the following does not affect the resolution of a video display image?
A. Bandwidth

B. Raster scan rage

C. Vertical and horizontal lines of resolution

D. Screen Size

E. None of these

Answer: A. Bandwidth

2. Latency time is
A. Time to spin the needed data under head

B. Time to spin the needed data under track

C. Time to spin data under sector

D. All of these

E. None of these

Answer: A. Time to spin the needed data under head

3. DPI stands for


A. Desktop projection Ink

B. Dot per inch

C. Dot-matrix printer ink

D. Desktop pixel Inch


E. None of these

Answer: B. Dot per inch

4. Databases software may be divided into


A. five distinct categories

B. four distinct categories

C. three distinct categories

D. two distinct categories

E. None of these

Answer: C. three distinct categories

5. File record length


A. Should always be fixed

B. Should always be variable

C. Depends upon the size of file

D. Should be chosen to match the data characteristics.

E. None of these

Answer: D. Should be chosen to match the data characteristics.

6. ………….is the time required by a sector to reach below read/write heat


A. Seek Time

B. Latency Time

C. Access Time

D. None

E. None of these

Answer: B. Latency Time

7. ………….is a technique of improving the priority of process waiting in Queue for CPU allocation
A. Starvation

B. Ageing

C. Revocation

D. Relocation

E. None of these

Answer: B. Ageing

8. A grammar for a programming language is a formal description of


A. Syntax

B. Semantics

C. Structure

D. Code

E. None of these

Answer: C. Structure

9. …………is a technique of temporarily removing inactive programs from the memory of computer system
A. Swapping
B. Spooling

C. Semaphore

D. Scheduler

E. None of these

Answer: A. Swapping

10. The memory allocation scheme subject to “external” fragmentation is


A. segmentation

B. swapping

C. pure demand paging

D. multiple fixed contiguous partitions

E. None of these

Answer: A. segmentation

11. Virtual memory is


A. simple to implement

B. used in all major commercial operating systems

C. less efficient in utilization of memory

D. useful when fast I/O devices are not available

E. None of these

Answer: B. used in all major commercial operating systems

12. Before proceeding with its execution, each process must acquire all the resources it needs is called
A. hold and wait

B. No pre-emption

C. circular wait

D. starvation

E. None of these

Answer: A. hold and wait

13. The main reason to encrypt a file is to……………


A. Reduce its size

B. Secure it for transmission

C. Prepare it for backup

D. Include it in the start-up sequence

E. None of these

Answer: B. Secure it for transmission

14. ‘LRU’ page replacement policy is


A. Last Replaced Unit

B. Last Restored Unit

C. Least Recently Used

D. Least Required Unit


E. None of these

Answer: C. Least Recently Used

15. Which of the following is not a fundamental process state


A. ready

B. terminated

C. executing

D. blocked

E. None of these

Answer: D. blocked

16. ODBC stands for


A. Object Database Connectivity

B. Oral Database Connectivity

C. Oracle Database Connectivity

D. Open Database Connectivity

E. None of these

Answer: D. Open Database Connectivity

17. Which two files are used during operations of the DBMS
A. Query languages and utilities

B. DML and query language

C. Data dictionary and transaction log

D. Data dictionary and query language

E. None of these

Answer: C. Data dictionary and transaction log

18. A protocol is a set of rules governing a time sequence of events that must take place
A. between peers

B. between an interface

C. between modems

D. across an interface

E. None of these

Answer: A. between peers

19. In communication satellite, multiple repeaters are known as


A. detector

B. modulator

C. stations

D. transponders

E. None of these

Answer: D. transponders

20. Which of the following is required to communicate between two computers?


A. communications software
B. protocol

C. communication hardware

D. all of above including access to transmission medium

E. None of these

Answer: D. all of above including access to transmission medium

21. Which of the following is an advantage to using fiber optics data transmission?
A. resistance to data theft

B. fast data transmission rate

C. low noise level

D. All of these

E. None of these

Answer: D. All of these

22. Which of the following is not a transmission medium?


A. telephone lines

B. coaxial cables

C. modem

D. microwave systems

E. None of these

Answer: C. modem

23. A technique for direct search is


A. Binary Search

B. Linear Search

C. Tree Search

D. Hashing

E. None of these

Answer: D. Hashing

24. Two main measures for the efficiency of an algorithm are


A. Processor and memory

B. Complexity and capacity

C. Time and Space

D. Data and Space

E. None of these

Answer: C. Time and Space

25. The space factor when determining the efficiency of algorithm is measured by
A. Counting the maximum memory needed by the algorithm

B. Counting the minimum memory needed by the algorithm

C. Counting the average memory needed by the algorithm

D. Counting the maximum disk space needed by the algorithm


E. None of these

Answer: A. Counting the maximum memory needed by the algorithm

26. The memory address of the first element of anarray is called


A. floor address

B. foundation address

C. first address

D. base address

E. None of these

Answer: D. base address

27. The term “push” and “pop” is related to the


A. array

B. lists

C. stacks

D. all of these

E. None of these

Answer: C. stacks

28. What does Router do in a network?


A. Forwards a packet to all outgoing links

B. Forwards a packet to the next free outgoing link

C. Determines on which outing link a packet is to be forwarded

D. Forwards a packet to all outgoing links except the original link

E. None of these

Answer: C. Determines on which outing link a packet is to be forwarded

29. Repeater operates in which layer of the OSI model?


A. Physical layer

B. Data link layer

C. Network layer

D. Transport layer

E. None of these

Answer: A. Physical layer

30. GIF images can have only upto …………. colors


A. 128

B. 256

C. 512

D. 1024

E. None of these

Answer: B. 256

31. …………is stored on a client and contains state information of the website visited
A. Cookies
B. Servelet

C. History

D. Resident Page

E. None of these

Answer: A. Cookies

32. ………..are small applications that are accessed on an internet server, transported over the internet, automatically installed
and run as part of a web document.
A. Applets

B. Java Bean

C. Sockets

D. Java Component

E. None of these

Answer: A. Applets

33. Encryption is the conversion of data in some intelligible format into an unintelligible format called……….to prevent the data
from being understood if read by an unauthorized party.
A. Clear Text

B. Encrypted Text

C. Cipher Text

D. Coded Text

E. None of these

Answer: C. Cipher Text

34. The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is
known as :
A. Spooling

B. Contention

C. I/O wait

D. Buffering

E. None of these

Answer: D. Buffering

35. Each cell in Microsoft Office Excel documents is referred to by its cell address, which is the…………..
A. cell’s column label

B. cell’s column label and worksheet tab name

C. cell’s row and column labels

D. cell’s row label

E. None of these

Answer: C. cell’s row and column labels

36. The lowest form of computer language is called


A. BASIC

B. FORTRAN

C. Machine Language
D. COBOL

E. None of these

Answer: C. Machine Language

37. The portion of the application that you work with in an application software package is the
A. user interface

B. utility interface

C. processing interface

D. analytical interface

E. None of these

Answer: A. user interface

38. A……………provides access to features of the program.


A. menu bar

B. brows r

C. Office Assistant

D. feature presentation

E. None of these

Answer: A. menu bar

39. Menus are a part of the


A. hardware

B. monitor

C. Status Bar

D. user interface

E. None of these

Answer: D. user interface

40. Which of the following is the term for a request for specific data contained in a database?
A. question

B. query

C. inquiry

D. quiz

E. None of these

Answer: B. query

41. Windows 7 is an example of a(n)


A. application software

B. browser

C. Operating system

D. shareware

E. None of these

Answer: C. Operating system


42. The most powerful type of computer.
A. mainframe computers

B. microcomputers

C. minicomputers

D. supercomputers

E. None of these

Answer: D. supercomputers

43. The system component that controls and manipulates data in order to produce information is called the
A. keyboard

B. microprocessor

C. monitor

D. mouse

E. None of these

Answer: B. microprocessor

44. Which of the following is not an operating system for mobile phones?
A. Android

B. Symbian

C. iOS

D. Bada

E. All of these are OS for mobile phones

Answer: E. All of these are OS for mobile phones

45. This type of file is created by word processors.


A. worksheet

B. document

C. database

D. presentation

E. None of these

Answer: B. document

46. Many experts are predicting that this revolution is expected to dramatically affect the way we communicate and use
computer technology.
A. graphics

B. input

C. memory

D. wireless

E. None of these

Answer: D. wireless

47. The Internet was launched in 1969 when the United States funded a project that developed a national computer network
called
A. Web

B. ISP
C. CERN

D. ARPANET

E. None of these

Answer: D. ARPANET

48. A(n)………..program provides access to Web resources.


A. Web

B. ISP

C. browser

D. URL

E. None of these

Answer: C. browser

49. Rules for exchanging data between computers are called


A. programs

B. procedures

C. protocols

D. hyperlinks

E. None of these

Answer: C. protocols

50. The last part of the domain name following the dot(.) is the top……….domain
A. Level

B. link

C. locator

D. language

E. None of these

Answer: A. Level

51. Many individuals create their own personal sites called Web logs, or………….
A. social networks

B. blogs

C. wikis

D. search engines

E. None of these

Answer: B. blogs

52. Programs that automatically submit your search request to several search engines simultaneously are called…………
A. meta search engines

B. inclusive search engines

C. spiders

D. hits

E. None of these
Answer: A. meta search engines

53. …………..cash is the Internet’s equivalent to traditional cash.


A. Universal

B. Web

C. Premium

D. Digital

E. None of these

Answer: D. Digital

54. These programs allow parents as well as organizations to block out selected sites and set time limits on Internet access.
A. plug-ins

B. filters

C. FTP

D. DSL

E. None of these

Answer: B. filters

55. This type of software works with end users, application software, and computer hardware to handle the majority of technical
details.
A. application software

B. communications software

C. system software

D. Web software

E. None of these

Answer: C. system software

56. ………….are narrowly focused on specific disciplines and occupations.


A. Basic applications

B. Business suites

C. Specialized applications

D. Utility programs

E. None of these

Answer: C. Specialized applications

57. The primary purpose of this type of software is to create text-based documents.
A. spreadsheet

B. presentation

C. word processing

D. web development

E. None of these

Answer: C. word processing

58. Letters, memos, term papers, reports, and contracts are all examples of
A. models
B. spreadsheets

C. documents

D. menus

E. None of these

Answer: C. documents

59. The acronym DBMS stands for what?


A. double-blind management setup

B. document binder management system

C. data binding and marketing structure

D. database management system

E. None of these

Answer: D. database management system

60. Database…………..are primarily used to enter new records and to make changes to existing records.
A. reports

B. tables

C. forms

D. queries

E. None of these

Answer: C. forms

61. A file that includes predefined settings that can be used to create many common types of presentations is called a
A. pattern

B. model

C. template

D. blueprint

E. None of these

Answer: C. template
62. A(n)……….is a single program that provides the functionality of a word processor, spreadsheet, database manager, and
more.
A. specialized application

B. integrated package

C. basic application

D. software suite

E. None of these

Answer: B. integrated package


63. A Computer that is on the Network is a……….
A. Node

B. Terminal

C. Client

D. Online

E. None of these
Answer: A. Node
64. Network operating systems from Novell is….……..
A. NOS

B. UNIX

C. NetWare

D. Solaris

E. None of these

Answer: C. NetWare
65. NIC Stands for …………
A. Network Interface Card

B. Network Internal Card

C. Network Internet Client

D. Network Input Card

E. None of these

Answer: A. Network Interface Card


66. Older network often use another type of cable, called………..
A. Twisted-pair cable

B. Unshielded twisted-pair cable

C. Coaxial cable

D. Optical Fiber

E. None of these

Answer: C. Coaxial cable

67. Magnetic Media is an Example of………layer


A. Physical Layer

B. Data Link Layer

C. Network Layer

D. Application Layer

E. None of these

Answer: A. Physical Layer


68. This power protection device includes a battery that provides a few minutes of power.
A. surge suppressor

B. line conditioner

C. generator

D. UPS

E. None of these

Answer: D. UPS
69. Which layer defines the mechanical, electrical, and timing interfaces to the network?
A. Physical Layer

B. Data Link Layer

C. Network Layer

D. Application Layer
E. None of these

Answer: A. Physical Layer


70. SCSI port (pronounced skuzzy) stands for
A. System Computer Scanning Interface

B. Small Computer System Interface

C. Small Computer System Internet

D. System Computer, System Interfaced

E. None of these

Answer: B. Small Computer System Interface


71. LPT stands for
A. Laser Printer

B. Link Port

C. Line Printer

D. Line Port

E. None of these

Answer: C. Line Printer


72. Spool stands for
A. Serial Printer Object Oriented Language

B. Simultaneous Peripheral Output On-Line

C. System Protocol Optimization Outliner

D. Single Program Operating System Operation

E. None of these

Answer: B. Simultaneous Peripheral Output On-Line

73. Which of the following field is not a part of Frame?


A. kind

B. seq

C. header

D. info

E. None of these

Answer: C. header
74. The technique of temporarily delaying outgoing acknowledgments so that they can be hooked onto the next outgoing data
frame is known as
A. Correcting

B. Piggybacking

C. Sliding

D. None of these

E. None of these

Answer: B. Piggybacking
75. The data link layer is used for
A. Providing a well-defined service interface to the network layer.

B. Dealing with transmission errors

C. Regulating the flow of data so that slow receivers are not swamped by fast senders
D. All of these

E. None of these

Answer: D. All of these

76. What does SDLC mean in Networking protocol?


A. Software Data Link Control

B. Synchronous Data Link Control

C. Software Development Life Cycle

D. Synchronous Data Development Cycle

E. None of these

Answer: B. Synchronous Data Link Control


77. ADCCP means
A. Analog Data Code Check Procedure

B. Active Database Communication Control Program

C. Application Data Cache Call Procedure

D. Advanced Data Communication Control Procedure

E. None of these

Answer: D. Advanced Data Communication Control Procedure


78. According to ISO, HDLC means
A. High-Level Data Link Control

B. High-Level Data Language Control

C. Hardware Data Link Control

D. High Definition Link Control

E. None of these

Answer: A. High-Level Data Link Control


79. …………..act as a central transmitter and receiver in wireless local area network
A. Access Nodes

B. Access Points

C. Access Hubs

D. Access Switch

E. None of these

Answer: B. Access Points


80. IP address means
A. Internet Protocol

B. Internal Power

C. Intranet Protocol

D. Internal Protocol

E. None of these

Answer: A. Internet Protocol

81. Which technology is used in a CDROMDrive?


A. Mechanical

B. Electromechanical
C. Optical

D. Fiber Optical

E. None of these

Answer: C. Optical
82. Which of the following device can store large amounts of data?
A. Floppy Disk

B. Hard Disk

C. CDROM

D. Zip Disk

E. None of these

Answer: B. Hard Disk


83. Which of the following is handy to carry yet can store large amounts of data?
A. Floppy Disk

B. Hard Disk

C. CDROM

D. Zip Disk

E. None of these

Answer: D. Zip Disk


84. Data (information) is stored in computers as?
A. Files

B. Directories

C. Floppies

D. Maer

E. None of these

Answer: A. Files
85. IP Addresses has………..bytes
A. 2

B. 4

C. 8

D. 16

E. None of these

Answer: B. 4

86. Which of the following statements is/are true?


A. Cache Memories are bigger than RAM

B. Cache Memories are smaller than RAM

C. ROM are faster than RAM

D. Information in ROM can be written by users

E. None of these

Answer: B. Cache Memories are smaller than RAM


87. A server that can perform to other task besides network services is called…………
A. Uno server
B. Dedicated server

C. Committed server

D. Service server

E. None of these

Answer: B. Dedicated server


88. Name a network operating system that is specially designed to handle networking functions efficiently.
A. Windows Server 2008

B. Windows NT

C. NOS

D. UNIX

E. None of these

Answer: B. Windows NT
89. MOS stands for?
A. Metal Oxide Semiconductor

B. Most Often Store

C. Method Organised Stack

D. Microsoft Office Suite

E. None of these

Answer: A. Metal Oxide Semiconductor


90. Which of the following is not a logic gate?
A. AND

B. NOR

C. NAND

D. NAT

E. None of these

Answer: D. NAT
91. Which of the following RAM times have to be refreshed often in order to retain its contents?
A. SIMM

B. DIMM

C. SDMM

D. Western Digital

E. None of these

Answer: B. DIMM

92. Which of the following companies is a leader in manufacture of Hard Disk Drives?
A. Samsung

B. IBM

C. Fujitsu

D. Western Digital

E. None of these

Answer: D. Western Digital


93. Usually, in MSDOS, the primary hard disk drives has the drive letter?
A. A

B. B

C. C

D. D

E. None of these

Answer: C. C
94. Which of the memories below is often used in a typical computer operation?
A. RAM

B. ROM

C. FDD

D. HDD

E. None of these

Answer: A. RAM
95. Which storage device is mounted on ‘reels’?
A. Floppy Disk

B. Hard Disk

C. Magnetic Tapes

D. CDROM

E. None of these

Answer: C. Magnetic Tapes


96. MTBF means
A. Mean Time Before Failure

B. Master Time Buffer Feature

C. Most Treated Buffer Time

D. Master Test Board Feature

E. None of these

Answer: A. Mean Time Before Failure


97. How many write cycles are allowed to a RAM?
A. 1

B. 10

C. 100

D. 1000

E. None of these

Answer: A. 1

98. How many write cycles are allowed to a EEPROM?


A. 1

B. 10

C. 100

D. 1000

E. None of these
Answer: D. 1000
99. The Analytical Engine developed during First Generation of computers used…………as a memory unit
A. RAM

B. Floppies

C. Cards

D. Counter Wheels

E. None of these

Answer: D. Counter Wheels


100. A…………is anything that can cause harm.
A. vulnerability

B. phish

C. threat

D. spoof

E. None of these

Answer: C. threat

101. In the right setting a thief will steal yourinformation by simply watching what you type.
A. snagging

B. spying

C. social engineering

D. shoulder surfing

E. None of these

Answer: D. shoulder surfing


102. A………..is a small program embedded inside of a GIF image.
A. web bug

B. cookie

C. spyware application

D. spam

E. None of these

Answer: A. web bug


103. A hacker contacts you my phone or email and attempts to acquire your password
A. spoofing

B. phishing

C. spamming

D. bugging

E. None of these

Answer: B. phishing
104. A hacker that changes or forges information in an electronic resource, is engaging in………
A. denial of service

B. sniffing

C. terrorism

D. data diddling
E. None of these

Answer: D. data diddling


105. Hackers often gain entry to a network be pretending to be at a legitimate computer.
A. Spoofing

B. forging

C. IP spoofing

D. ID theft

E. None of these

Answer: C. IP spoofing

106. The………..of a threat measures itspotential impact on a system.


A. vulnerabilities

B. countermeasures

C. degree of harm

D. susceptibility

E. None of these

Answer: C. degree of harm


107. The power level drops below 120V.
A. brownout

B. spike

C. blackout

D. surge

E. None of these

Answer: B. spike
108. Which of the following is NOT a Microsoft Internet tool or technology?
A. Dreamweaver

B. Silverlight

C. Internet Explorer

D. Expression Web

E. None of these

Answer: A. Dreamweaver
109. A protocol used to control the secure sending of data on the internet is :
A. SMTP

B. HTTPS

C. TCP/IP

D. HTTP

E. None of these

Answer: B. HTTPS
110. Programs from the same developer sold bundled together, that provide better integration and share common features,
toolbars and menus are known as ………..
A. software suites

B. integrated software packages

C. software processing packages

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy