Computer MCQ Quiz Hub

Computer mcqs smaple paper 2

Choose a topic to test your knowledge and improve your Computer skills

1. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a




2. To access properties of an object, the mouse technique to use is




3. A DVD is an example of a (n




4. The process of transferring files from a computer on the Internet to your computer is called




5. is the process of dividing the disk into tracks and sectors




6. Help Menu is available at which button?




7. The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as




8. Which is not a basic function of a computer?




9. ASCII is a coding system that provides




10. Which part of the computer is directly involved in executing the instructions of the computer program?




11. When a computer is switched on, the booting process performs




12. A computer system that is old and perhaps not satisfactory is referred to as a(n)




13. Which of the following is not a binary number?




14. Which of the following does not store data permanently?




15. Which of the following is the smallest storage?




16. Which of the following contains permanent data and gets updated during the processing of transactions?




17. Which of the following helps to protect floppy disks from data getting accidentally erased?




18. A modem is connected to




19. Large transaction processing systems in automated organisations use




20. In a computer, most processing takes place in




21. Which of the following is not a storage medium?




22. The computer abbreviation KB usually means




23. The typical computer criminal is a(n):




24. The common name for the crime of stealing passwords is:




25. Collecting personal information and effectively posing as another individual is known as the crime of




26. Malicious software is known as:




27. A program that performs a useful task while simultaneously allowing destructive acts is a




28. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:




29. In 1999, the Melissa virus was a widely publicised:




30. What type of virus uses computer hosts to reproduce itself?




31. The thing that eventually terminates a worm virus is a lack of:




32. When a logic bomb is activated by a time-related event, it is known as a:




33. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a




34. What is the name of an application program that gathers user information and sends it to someone through the Internet?




35. ------ is the measurement of things such as fingerprints and retinal scans used for security access




36. What is the most common tool used to restrict access to a computer system?




37. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):




38. The scrambling of code is known as:




39. To prevent the loss of data during power failures, use a(n):




40. ------Is defined as any crime completed through the use of computer technology




41. ------ refers to electronic trespassing or criminal hacking




42. The first electronic computer was developed by




43. Snowbol is an/a---------




44. Switching device of fifth generation computer is-




45. ---------- computers operates essentially by counting




46. ---------- computer is small general purpose micro computer, but larger than portable computer




47. Cathode Ray Tube is a form of.......




48. Trackball is a...........




49. computer is a medium sized computer




50. computer are of large size