Fundamentals of Computer MCQ Questions for Computer Science
Question: Which of the following statements is true?
a) Minicomputer works faster than Microcomputer
b) Microcomputer works faster than Minicomputer
c) Speed of both computers is the same
d) The speeds of these computers cannot be compared with advanced
Answer: A
Question: A CPU contains:
a) A card reader and a printing device
b) An analytical engine and a control unit
c) A control unit and an arithmetic logic unit
d) An arithmetic logic unit and a card reader
Answer: C
Question: Which of the following protocol allow us to acess the data over world wide web?
a) DNS
b) SNMP
c) HTTP
d) FTP
Answer: C
Question: __________ is a combination of hardware and software that facilitates the sharing of information between computing devices.
a) Network
b) Peripheral
c) Expansion board
d) Digital device
Answer: A
Question: Coded entries used to gain access to a computer system are called:
a) Entry codes
b) Passwords
c) Security commands
d) Code words
Answer: B
Question: What type of resource is most likely to be a shared common resource in a computer network?
a) Printers
b) Speakers
c) Floppy disk drives
d) Keyboards
Answer: A
Question: What characteristic of read-only memory (ROM) makes it useful?
a) ROM information can be easily updated.
b) Data in ROM is non-volatile, it remains even without power.
c) ROM provides large amounts of inexpensive data storage.
d) ROM chips are easily swapped between different computer brands.
Answer: B
Question: Which device is required for the Internet connection?
a) Joystick
b) Modem
c) CD Drive
d) NIC Card
Answer: B
Question: Example of non-numeric data is:
a) Employee address
b) Examination score
c) Bank balance
d) All of these
Answer: A
Question: What is a light pen?
a) Mechanical input device
b) Optical input device
c) Electronic input device
d) Optical output device
Answer: B
Question: Which of the following is a part of the Central Processing Unit?
a) Printer
b) Keyboard
c) Mouse
d) Arithmetic & Logic unit
Answer: D
Question: UNIVAC stands for:
a) Universal Automatic Computer
b) Universal Array Computer
c) Unique Automatic Computer
d) Unvalued Automatic Computer
Answer: A
Question: Junk e-mail is also called:
a) Spam
b) Spoof
c) Sniffer script
d) Spool
Answer: A
Question: CD-ROM stands for:
a) Compactable Read Only Memory
b) Compact Data Read Only Memory
c) Compactable Disk Read Only Memory
d) Compact Disk Read Only Memory
Answer: A
Question: What type of computers are client computers (most of the time) in a client-server system?
a) Mainframe
b) Mini-computer
c) Microcomputer
d) PDA
Answer: C
Question: VGA stands for:
a) Video Graphics Array
b) Visual Graphics Array
c) Volatile Graphics Array
d) Video Graphics Adapter
Answer: A
Question: DMA stands for:
a) Distinct Memory Access
b) Direct Memory Access
c) Direct Module Access
d) Direct Memory Allocation
Answer: B
Question: MIS is designed to provide information needed for effective decision making by:
a) Consumers
b) Workers
c) Foremen
d) Managers
Answer: D
Question: IBM 1401 is a:
a) First Generation Computer
b) Second Generation Computer
c) Third Generation Computer
d) Fourth Generation Computer
Answer: B
Question: You organize files by storing them in:
a) Archives
b) Folders
c) Indexes
d) Lists
Answer: B
Question: MSI stands for:
a) Medium Scale Integrated Circuits
b) Medium System Integrated Circuits
c) Medium Scale Intelligent Circuit
d) Medium System Intelligent Circuit
Answer: A
Question: Who is the father of personal computer?
a) Edward Robert
b) Allen Turing
c) Charles Babbage
d) None of these
Answer: A
Question: The capacity of a 3.5 inch floppy disk is:
a) 1.40 MB
b) 1.44 GB
c) 1.40 GB
d) 1.44 MB
Answer: D
Question: __________ represents raw facts, whereas __________ is data made meaningful.
a) Information, reporting
b) Data, information
c) Information, bits
d) Records, bytes
Answer: B
Question: Who is the father of Computer?
a) Allen Turing
b) Charles Babbage
c) Simur Cray
d) Augusta Adaming
Answer: B
Question: EBCDIC stands for:
a) Extended Binary Coded Decimal Interchange Code
b) Extended Bit Code Decimal Interchange Code
c) Extended Bit Case Decimal Interchange Code
d) Extended Binary Case Decimal Interchange Code
Answer: A
Question: Which of the following is a storage device?
a) Tape
b) Hard Disk
c) Floppy Disk
d) All of the above
Answer: D
Question: ALU is:
a) Arithmetic Logic Unit
b) Array Logic Unit
c) Application Logic Unit
d) None of above
Answer: A
Question: CAD stands for:
a) Computer-aided design
b) Computer algorithm for design
c) Computer application in design
d) Computer analogue design
Answer: A
Question: A computer cannot 'boot' if it does not have the:
a) Compiler
b) Loader
c) Operating System
d) Assembler
Answer: C
Question: Which of the following is not anti-virus software?
a) NAV
b) F-Prot
c) Oracle
d) McAfee
Answer: C
Question: The amount of vertical space between lines of text in a document is called:
a) Double-space
b) Line spacing
c) Single space
d) Vertical spacing
Answer: B
Question: WAN stands for:
a) Wap Area Network
b) Wide Area Network
c) Wide Array Net
d) Wireless Area Network
Answer: B
Question: Who is the father of Computer science?
a) Allen Turing
b) Charles Babbage
c) Simur Cray
d) Augusta Adaming
Answer: A
Question: What is an embedded system?
a) The program which arrives by being wrapped in a box
b) The program which is a permanent part of the computer
c) The computer which is a part of a bigger computer
d) The computer and software system that controls the machine
Answer: D
Question: The first computers were programmed using:
a) Assembly language
b) Machine language
c) Source code
d) Object code
Answer: B
Question: The first page of a Website is termed as:
a) Homepage
b) Index
c) JAVA script
d) Bookmark
Answer: A
Question: __________ is the appearance of typed characters.
a) Size
b) Format
c) Point
d) Colour
Answer: B
Question: When a file is saved for the first time:
a) A copy is automatically printed
b) It must be given a name to identify it
c) It does not need a name
d) It only needs a name if it is not going to be printed
Answer: B
Question: When did John Napier develop logarithm?
a) 1416
b) 1614
c) 1641
d) 1804
Answer: B
Question: A normal CD-ROM usually can store up to _________ data:
a) 680 KB
b) 680 Bytes
c) 680 MB
d) 680 GB
Answer: C
Question: Office LANs, which are scattered geographically on a large scale, can be connected by the use of:
a) CAN
b) LAN
c) DAN
d) WAN
Answer: D
Question: The term 'Computer' is derived from:
a) Latin
b) German
c) French
d) Arabic
Answer: A
Question: Which of the following controls the process of interaction between the user and the operating system?
a) User interface
b) Language translator
c) Platform
d) Screen saver
Answer: A
Question.
A web page is located using a
a) Uniform Resource Locator
b) Universal Record Linking
c) Universal Record Locator
d) Uniformly Reachable Links
e) None of these
Answer : A
Question.
A search engine is a program to search
a) for information
b) web pages
c) web pages for Information using specified search terms
d) web pages for specified in-dex terms
e) None of these
Answer : C
Question.
Which of the following is a Web browser ?
a) Paint
b) Power Point
c) Word
d) Fire fox
e) All are Web browsers
Answer : D
Question.
What is the most common way to get a virus in your computer's hard disk ?
a) By installing games from their CDROMS
b) By uploading pictures from mobile phones to the computer
c) By sending e-mails
d) By opening e-mails
e) None of these
Answer : D
Question.
By an intranet we mean
a) a network connecting al! computers of an organi-ation and using the internet
protocol
b) a Wide Area Network connecting all branches of an organization
c) a corporate computer net work
d) a LAN of an organization
e) None of these
Answer : A
Question.
What is an E-mail attachment?
a) A separate document from another program sent along with an E-mail message
b) A receipt sent by the recipient
c) A malicious parasite that feeds off of your messages and destroys the
contents
d) A list of CC: or BCC: recipients
e) None of these
Answer : A
Question.
Sending an E-mail is similar to
a) drawing a picture
b) writing a letter
c) talking on the phone
d) sending a package
e) None of these
Answer : B
Question.
A commonly used graphic format for the web is
a) Imp
b) bmp
c) text
d) GIF
e) TIP
Answer : D
Question.
Choose the web-browser among the following:
a) MSN messenger
b) Yahoo messenger
c) Rediffbal. net
d) None of these
e) Netscape Navigator
Answer : E
Question.
A repair for a known software bug, usually available at no charge on the
internet, is called a(n)_
a) version
b) tutorial
c) patch
d) FAQ
e) None of these
Answer : C
Question.
What is the full form of CC in reference to Email..
a) Carbon copy
b) Carbon clue
c) Carbon cost
d) Cost Copy
e) None of these
Answer : A
Question.
A Web site address is a unique name that identifies a specific _ on the Web.
a) Web browser
b) PDA
c) Link
d) Web site
e) None of these
Answer : D
Question.
When the pointer is positioned on a ——, it is shaped like a hand.
a) hyperlink
b) grammar error
c) screen tip
d) spelling error
e) formatting error
Answer : A
Question.
Internet is
a) a local computer network
b) a world wide network of computers
c) a world wide interconnected network of computers which use a common protocol
to communicate with one another
d) an interconnected network of computers
e) None of these
Answer : C
Question.
Which of the following is an example of connectivity ?
a) floppy disk
b) Internet
c) power cord
d) data
e) None of these
Answer : B
Question.
The process of connecting to the Internet account is
a) SIGN IN
b) LOG OUT
c) LOG IN
d) SIGN OUT
e) None of these
Answer : C
Question.
When we run a program in HTML coding, _ is used as backend and __works as
frontend.
a) Notepad - Msn-messenger
b) Notepad-1 nternet Ex-plorer
c) MS-word - Internet -Explorer
d) Both (a) and (b)
e) None of these
Answer : B
Question.
Which of the following are all considered advantages of e-mail ?
a) Printable, global and expensive
b) Global, convenience and Microsoft owned
c) Convenience, speed of delivery, generality and reliability
d) Slow delivery, reliable, global and inexpensive
e) None of these
Answer : C
Question.
In a browser, the URL of the current page Displayed at?
a) Tool bar
b)Tittle bar
c) Address bar
d) Menu bar
e) None of these
Answer : C
Question.
What is an E-mail attachment?
a) A separate document from another program sent along with an E-mail message
b) A receipt sent by the recipient
c) A malicious parasite that feeds off of your messages and destroys the
contents
d) A list of CC : or BCC : recipients
e) None of these
Answer : A
Question.
One advantage of dial-up Internet access is
a) it utilizes broadband technology
b) None of these
c) it uses a router for security
d) modem speeds are very fast
e) it utilizes existing telephone service
Answer : E
Question.
A word in a web page that, when clicked, opens another document is called —
a) hyperlink
b) anchor
c) reference
d) URL
e) None of these
Answer : A
Question.
The code for a Web page is written using ——
a) a fifth generation language
b) Hypertext Markup Language
c) Win Zip
d) Perl
e) URL
Answer : B
Question.
HTML uses
a) Fixed tags defined by the language
b) User defined tags
c) Tags only for linking
d) Pre-specified tags
e) None of these
Answer : A
Question.
Small application programs that run on a Web page and may ensure a form is
completed properly or provide animation are known as ——
a) spiders
b) flash
c) cookies
d) applets
e) sparks
Answer : B
Question.
Internet requires
a) an international agreement to connect computers
b) a commonly agreed'set of rules to communicate between computers
c) a local area network
d) a World Wide Web
e) None of these
Answer : B
Question.
When sending an e-mail, the _ line describes the contents of the message.
a) to
b) None of these
c) contents
d) CC
e) subject
Answer : E
Question.
What is the term for unsolicited e-mail ?
a) newsgroup
b) Usenet
c) backbone
d) spam
e) flaming
Answer : D
Question.
Each computer connected to the internet must
a) be an IBM PC
b) be internet compatible
c) have a unique IP address
d) have a modem connection
e) None of these
Answer : C
Question.
XSL definition is used along with XML definition to specify
a) The data types of the contents of XML document
b) The links with other documents
c) The presentation of XML document
d) The juncture of XML document
e) None of these
Answer : C
Question.
All of the following are examples of real security and privacy risks
EXCEPT:
a) hackers.
b) identity theft.
c) viruses.
d) spam.
e) None of these
Answer : D
Question.
If you receive an e-mail from someone you don't know,what should you do?
a) Delete it without opening it
b) Forward it to the police immediately
c) Open it and respond to them saying you don't know them
d) Reply and ask them for their personal information
e) Reply and tell them you want to keep in touch with them
Answer : A
0 Comments