R4RIN
MCQS
Computer MCQ Quiz Hub
Computer mcqs smaple paper 2
Choose a topic to test your knowledge and improve your Computer skills
1. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a
Hacker
spammer
instant messenger
programmer
2. To access properties of an object, the mouse technique to use is
Dragging
dropping
right-clicking
shift-clicking
3. A DVD is an example of a (n
hard disk
optical disc
output device
solid-state storage device
4. The process of transferring files from a computer on the Internet to your computer is called
Downloading
uploading
FTP
JPEG
5. is the process of dividing the disk into tracks and sectors
Tracking
Formatting
Crashing
Allotting
6. Help Menu is available at which button?
End
Start
Turnoff
Restart
7. The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as
CISC
RISC
CD-ROM
Wi-Fi
8. Which is not a basic function of a computer?
Store data
Accept input
Process data
Copy text
9. ASCII is a coding system that provides
256 different characters
512 different characters
1024 different characters
128 different characters
10. Which part of the computer is directly involved in executing the instructions of the computer program?
The scanner
The main storage
The secondary storage
The processor
11. When a computer is switched on, the booting process performs
Integrity Test
Power-On Self-Test
Correct Functioning Test
Reliability Test
12. A computer system that is old and perhaps not satisfactory is referred to as a(n)
Ancient system
Historical system
Age old system
Legacy system
13. Which of the following is not a binary number?
1
101
202
110
14. Which of the following does not store data permanently?
ROM
RAM
Floppy Disk
Hard Disk
15. Which of the following is the smallest storage?
Megabyte
Gigabyte
Terabyte
None of these
16. Which of the following contains permanent data and gets updated during the processing of transactions?
Operating System File
Transaction file
Software File
Master file
17. Which of the following helps to protect floppy disks from data getting accidentally erased?
Access notch
Write-protect notch
Entry notch
Input notch
18. A modem is connected to
a telephone line
a keyboard
a printer
a monitor
19. Large transaction processing systems in automated organisations use
Online processing
Batch Processing
Once-a-day Processing
End-of-day processing
20. In a computer, most processing takes place in
Memory
RAM
motherboard
CPU
21. Which of the following is not a storage medium?
Hard disk
Flash drive
DVD
scanner
22. The computer abbreviation KB usually means
Key Block
Kernel Boot
Kilo
Kit Bit
23. The typical computer criminal is a(n):
Young hacker
Trusted employee with no criminal record
Trusted employee with a long, but unknown criminal record.
Overseas young cracker.
24. The common name for the crime of stealing passwords is:
Jacking
Identity theft
Spoofing
Hacking
25. Collecting personal information and effectively posing as another individual is known as the crime of
Spoofing
Identity theft
Spoofing
Hacking
26. Malicious software is known as:
Badware
Malware
Maliciousware
Illegalware
27. A program that performs a useful task while simultaneously allowing destructive acts is a
Worm
Trojan horse
Virus
Macro Virus
28. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
Trojan horse
Virus
Time bomb
Time-related bomb sequence
29. In 1999, the Melissa virus was a widely publicised:
E-mail virus
Macro virus
Trojan horse
Time bomb.
30. What type of virus uses computer hosts to reproduce itself?
Time bomb
Worm
Melissa virus
Macro virus
31. The thing that eventually terminates a worm virus is a lack of:
Memory or disk space
Time
CD drives space
CD-RW
32. When a logic bomb is activated by a time-related event, it is known as a:
Time-related bomb sequence
Virus.
Time bomb
Trojan horse
33. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a
Time-related bomb sequence
Virus
Time bomb
Trojan horse
34. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A virus
Spybot
Logic bomb
Security patch
35. ------ is the measurement of things such as fingerprints and retinal scans used for security access
Biometrics
Bio measurement
Computer security
Smart weapon machinery
36. What is the most common tool used to restrict access to a computer system?
Hacker-proof program
Passwords
Computer keys
Access-control software
37. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
Hacker-proof program
Firewall
Hacker-resistant server
Encryption safe wall.
38. The scrambling of code is known as:
Encryption
a firewall
Scrambling
Password proofing
39. To prevent the loss of data during power failures, use a(n):
Encryption program
Surge protector
Firewall
UPS
40. ------Is defined as any crime completed through the use of computer technology
Computer forensics
Computer crime
Hacking
Cracking
41. ------ refers to electronic trespassing or criminal hacking
Cracking
Switching device of fifth generation computer is-
Spoofing
Smarming
42. The first electronic computer was developed by
J.V. Attansoff
Bill Gates
Simur Cray
Winton Serf
43. Snowbol is an/a---------
Operating system
HLL
Software
Search engine
44. Switching device of fifth generation computer is-
Vacuum tubes
Transistors
IC
VLSI
45. ---------- computers operates essentially by counting
Portable computer
Hybrid computer
Analog computer
Digital computer
46. ---------- computer is small general purpose micro computer, but larger than portable computer
Hybrid
Digital
Desktop
Laptop
47. Cathode Ray Tube is a form of.......
Keyboard
Mouse
Monitor
Mother board
48. Trackball is a...........
Input device
Output device
Programming language
Software
49. computer is a medium sized computer
Micro
Mainframe
Super
Mini
50. computer are of large size
Micro
Mainframe
Super
Mini
Submit