Computer Fundamental MCQ 300 Questions
Computer Fundamental MCQ 300 Questions
Computer Fundamental MCQ 300 Questions
6. A CPU contains
a. a card reader and a printing device b. an analytical engine and a control unit
c. a control unit and an arithmetic logic unit d. an arithmetic logic unit and a card reader
7. Which of the following controls the process of interaction between the user and the operating
system?
10. Coded entries which are used to gain access to a computer system are called
d. The speeds of both these computers cannot be compared with the speed of advanced
13. What type of resource is most likely to be a shared common resource in a computer
Network?
16. UNIVAC is
18. ALU is
19. VGA is
a. spam b. spoof
29. Hackers
c. may legally break into computers as long as they do not do any damage
30. What type of computers are client computers (most of the time) in a client-server system?
a. Mainframe b. Mini-computer
c. Microcomputer d. PDA
a. Compiler b. Loader
35. First page of Website is termed as- a. Homepage b. Index c. JAVA script d. Bookmark
38. Office LANS, which are scattered geographically on large scale, can be connected by the use
of corporate
39. Where are data and programme stored when the processor uses them?
b. Data in ROM is non-volatile, that is, it remains there even without electrical power.
42. What do you call the programs that are used to find out possible faults and their causes?
a. NAV b. F-Prot
c. Oracle d. McAfee
a. Joystick b. Modem
a. 1416 b. 1614
c. 1641 d. 1804
c. 680 MB d. 680 GB
50. MIS is designed to provide information needed for effective decision making by?
a. Consumers b. Workers
c. Foremen d. Managers
52. BCD is
56. FORTRAN is
61. Which of the following devices can be sued to directly image printed text?
a. OCR b. OMR
a. Input is first converted to digital form b. Input is never converted to digital form
67. Personnel who design, program, operate and maintain computer equipment refers to
a. Console-operator b. Programmer
68. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
a. 1978 b. 1984
c. 1990 d. 1991
69. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens?
a. Monitor b. Hardware
c. Robot d. Computer
70. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
a. Leech b. Squid
c. Slug d. Glitch
71. Modern Computer are very reliable but they are not
a. Fast b. Powerful
c. Infallible d. Cheap
72. What is the name of the display feature that highlights are of the screen which requires
operator attention?
73. Personal computers use a number of chips mounted on a main circuit board. What is the
74. In most IBM PCs, the CPU, the device drives, memory expansion slots and active components
a. Motherboard b. Breadboard
a. Which is used by one person only b. Which is assigned one and only one task
c. Which uses one kind of software d. Which is meant for application software
76. The system unit of a personal computer typically contains all of the following except:
77. A computer program that converts an entire program into machine language is called a/an
a. Interpreter b. Simulator c. Compiler d. Commander
78. A computer program that translates one program instructions at a time into machine language
is called a/an
80. A fault in a computer program which prevents it from working correctly is known as
81. A self replicating program, similar to a virus which was taken from a 1970s science fiction
90. ............ translates and executes program at run time line by line
a. Compiler b. Interpreter
c. Linker d. Loader
c. Inheritance d. Linking
94. 1 Byte =?
96. The device used to carry digital data on analogue lines is called as
a. Modem b. Multiplexer
c. Modulator d. Demodulator
100. The instructions that tell a computer how to carry out the processing tasks are referred
to as computer.........
101. An area of a computer that temporarily holds data waiting to be processed is..........
102. ........... is the key to close a selected drop -down list; cancel a command and close a
dialog box.
a. F5 b. F6 c. F9 d. F12
105. Data becomes ................ when it is presented in a format that people can understand
and use
a. processed b. graphs c. information d. presentation
106. The term ............. designates equipment that might be added to a computer system to
108. RAM can be treated as the ......... for the computer's processor
110. To move a copy of file from one computer to another over a communication channel is
called?
111. The primary function of the ............ is to set up the hardware and load and start an
operating system
c. CP d. Memory
113. .......... is computer software designed to operate the computer hardware and to provide
118. You use a(n) ....., such as a keyboard or mouse, to input information
119. ............. is the ability of a device to "jump" directly to the requested data
120. ............. provides process and memory management services that allow two or more
a. Multitasking b. Multithreading
c. Multiprocessing d. Multicomputing
121. The task of performing operations like arithmetic and logical operations is called......
a. Processing b. Storing
c. Editing d. Sorting
a. MS-Excel b. BASIC
c. COBOL d. C++
127. ............ Store data or information temporarily and pass it on as directed by the control
unit
a. Address b. Register
c. Number d. Memory
c. Compiler d. Assembler
129. A ............ is an additional set of commands that the computer displays after you make a
131. All of the following are examples of real security and privacy risks EXCEPT
a. hackers b. Spam
132. Which of the following is NOT one of the four major data processing functions of a
computer?
135. ............... is the science that attempts to produce machines that display the same type of
a. Nanoscience b. Nanotechnology
136. Servers are computers that provide resources to other computers connected to a :
a. networked b. mainframe
c. supercomputer d. client
137. When creating a computer program, the ......... designs the structure of the program
138. A computer program that converts an entire program into machine language at one time
is called a/ an
140. The difference between people with access to computers and the Internet and those
141. Computers manipulate data in many ways, and this manipulation is called......
142. The ability to recover and read deleted or damaged files from a criminal's computer is
143. Where does most data go first with in a computer memory hierarchy ?
144. The………….data mining technique derives rules from real-world case examples.
a. Cookies b. Plug-ins
c. Scripts d. ASPs
146. Codes consisting of lines of varying widths or lengths that are computer-readable are
d. It is not unethical because the files are being given for free.
148. Reusable optical storage will typically have the acronym- a. CD b. DVD c. ROM d. RW
149. The most common type of storage devices are- a. Steel b. optical c. magnetic d. flash
150. A device that connects to a network without the use of cables is said to be- a. Distributed b. free c.
centralized d. none of these
151. A person who used his or her expertise to gain access to other people's computers to get
152. To access properties of an object, the mouse technique to use is- a. Dragging b. dropping c. right-
clicking d. shift-clicking
154. . The process of transferring files from a computer on the Internet to your computer is
called
a. Downloading b. uploading
c. FTP d. JPEG
155. . .......... is the process of dividing the disk into tracks and sectors.
a. Tracking b. Formatting
c. Crashing d. Allotting
a. End b. Start
c. Turnoff d. Restart
157. The technology that stores only the essential instructions on a microprocessor chip and
a. CISC b. RISC
c. CD-ROM d. Wi-Fi
160. Which part of the computer is directly involved in executing the instructions of the
computer program?
162. A computer system that is old and perhaps not satisfactory is referred to as a(n)
a. Ancient system b. Historical system
166. Which of the following contains permanent data and gets updated during the
processing of transactions?
167. Which of the following helps to protect floppy disks from data getting accidentally
erased?
c. a printer d. a monitor
c. motherboard d. CPU
a. Young hacker.
174. The common name for the crime of stealing passwords is:
c. Spoofing. d. Hacking.
175. Collecting personal information and effectively posing as another individual is known
a. Badware. b. Malware. c. Maliciousware. d. Illegalware. 177. A program that performs a useful task
while simultaneously allowing destructive acts is
a:
178. An intentionally disruptive program that spreads from program to program or from disk
to disk is known as a:
181. The thing that eventually terminates a worm virus is a lack of:
183. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
184. What is the name of an application program that gathers user information and sends it
a. A virus b. Spybot
185. ------ is the measurement of things such as fingerprints and retinal scans used for
security access.
186. What is the most common tool used to restrict access to a computer system?
a. User logins b. Passwords
a. Encryption. b. a firewall.
189. To prevent the loss of data during power failures, use a(n):
c. Firewall. d. UPS.
190. ------Is defined as any crime completed through the use of computer technology.
c. Hacking d. Cracking
a. Cracking b. Jacking
c. Spoofing d. Smarming
194. Switching device of fifth generation computer is-------- a. Vacuum tubes b. Transistors
c. IC d. VLSI
196. ---------- computer is small general purpose micro computer, but larger than portable
computer
201. Note book, laptop,palm,hand-held computers are coming under the category of.........
computer
a. Inkjet b. Laser
a. Inkjet b. Laser
a. Inkjet b. Laser
207. ......... are used for plotting graphs and design on papers
a. Trackball b. Joystick
208. Daisy wheel, Drum, chain etc are the ............. a. Flow chart b. Mouse
c. Assemblers d. Compilers
a. Windows b. Unix
c. OS/2 d. All of these
a. LAN b. WAN
c. MAN d. BUS
a. Mosaic b. Netscape
218. .......... are set of rules and procedures to control the data transmission over the internet
a. IP address b. Domains
c. Protocol d. Gateway
220. ............... are system software to facilitate editing of text and data
a. MS Word b. Editors
c. PowerPoint d. MS publisher
a. Mainframe b. Microcomputer
a. Super computer b. PC
c. Laptop d. PDA
ANSWER KEY
11 a 65 c 119 b 173 b
12 b 66 a 120 a 174 c
13 a 67 c 121 a 175 b
14 b 68 d 122 c 176 b
15 b 69 d 123 b 177 b
16 a 70 d 124 a 178 b
17 a 71 c 125 a 179 a
18 a 72 b 126 a 180 b
19 a 73 b 127 b 181 a
20 b 74 a 128 a 182 c
21 a 75 b 129 a 183 c
22 d 76 d 130 a 184 b
23 b 77 c 131 b 185 a
24 a 78 a 132 c 186 b
25 a 79 d 133 b 187 b
26 d 80 b 134 b 188 a
27 a 81 d 135 d 189 d
28 a 82 b 136 b 190 b
29 b 83 a 137 b 191 a
30 c 84 a 138 c 192 a
31 c 85 b 139 c 193 b
32 b 86 d 140 a 194 d
33 a 87 d 141 b 195 d
34 d 88 b 142 c 196 c
35 a 89 c 143 a 197 c
36 b 90 b 144 c 198 a
37 b 91 c 145 a 199 d
38 d 92 a 146 d 200 b
39 a 93 d 147 c 201 c
40 b 94 a 148 d 202 b
41 b 95 a 149 b 203 c
42 c 96 a 150 d 204 d
43 d 97 c 151 a 205 a
44 c 98 a 152 c 206 b
45 b 99 a 153 b 207 d
(1) Average
(2)Count
(3)Minimum
(4)Maximum
(5)None of these
Ans: (4)
(1)Pie Wizard
(2)Excel Wizard
(3)Data Wizard
(4)Chart Wizard
(5)None of these
Ans: (4)
(1)Name box
(2)Row Headings
(3)Formula bar
(4)Task pane
(5)None of these
Ans: (3)
(2)Portrait
(3)Page Setup
(4)Print View
(5)None of these
Ans: (2)
5. What is the best way to have a data and the slide number appear on every slide ?
(1) choose Tools, Header and Footer, click Slide tab, select the desired options, click Apply to
All
(2) choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply to
All
(3) chouse View, Header and Footer, click Slide tab, select the desired options, click Apply to
All
(4) choose File, Header and Footer, click Slide tab, select the desired options, click Apply to
All
Ans: (2)
(1)Application
(2)Peripheral
(3)Programme
(4)Software
(5)None of these
Ans: (2)
(1) Monitor, Central Processing Unit (CPU), Keyboard, Mouse, Software and Network
(2) Monitor, Central Processing Unit (CPU), Keyboard, Mouse Programme and Network
(3) Monitor, Central Processing Unit (CPU), Keyboard, Mouse, Printer and Modem
(4) Monitor, Central Processing Unit (CPU), Keyboard, Mouse, Application and Network
Ans: (3)
(2)You can only see the page you are currently working
(5)None of these
Ans: (1)
Ans: (3)
11. Which of the following controls the process of interaction between the user and the
operating system?
(3) Platform
Ans: (1)
12.You will work on which groupings, while formatting the text in word?
Ans: (2)
13.When you want to move some text from one page to a different page, the best method is-
(1) drag and drop (2) cut and paste (3) delete and retype (4) find and replace (5) None of
these
Ans: (2)
14.The first computers were programmed using-
Ans: (2)
Ans: (2)
16. An is a combination of hardware and software that facilitates the sharing of information
(1) network
(2) peripheral
Ans: (1)
(1) icon
(2) default
(3) CPU
(4) peripheral
Ans: (2)
18. Coded entries which are used to gain access to a computer system are called-
(2) Passwords
Ans: (2)
Ans: (2)
2) Ctrl + Shift + ?
Ans: (1)
1) Landscape
2) Portrait
3) Page Setup
4) Print View
5) None of these
Ans: (2)
5) None of these
Ans: (4)
1) Average
2) Count
3) Minimum
4) Maximum
5) None of these
Ans: (4)
4) The speeds of both these computers cannot be compared with the speed of advanced
computer
5) None of these
Ans: (1)
UNIT 2
1. Selection of command-
Ans: (C)
(A) archives
(B) folders
(C) indexes
(D) lists
Ans: (B)
3. How many different documents can you have open at any one time ?
Ans: (C)
network?
(A) Printers
(B) Speakers
(D) Keyboards
Ans: (A)
(D) Sub-directory
Ans: (D)
6. Such a pre-made document, which has coordinating font, layout and background, is-
(A) Guide
(B) Model
(C) Ruler
(D) Template
(A) Tab consecutively until your cursor reaches the desired place
(D) Press the space bar until your cursor reaches the desired place
Ans: (E)
8. Saving is a process-
(D) To develop the document by recording the text with the use of keyboard
Ans: (A)
(A) move the cursor to the desired location in the sentence and type the new word
(B) move the cursor to the desired location in the sentence, press Enter key, and type the new
word
(C) move the cursor to the beginning of the sentence and start typing
Ans: (A)
10. A(n) .............. is a combination of hardware and software that facilitates the sharing of
(A) network
(B) peripheral
Ans: (A)
(A) By positioning your cursor at the appropriate place and pressing the F1 key
(C) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
Ans: (C)
(A) spam
(B) spoof
(D) spool
Ans: (A)
13. Hackers-
(C) may legally break into computers as long as they do not do any damage
Ans: (B)
14. What type of computers are client computers (most of the time) in a client-server system?
(A) Mainframe
(B) Mini-computer
(C) Microcomputer
(D) PDA
Ans: (C)
(A) Compiler
(B) Loader
(D) Assembler
Ans (C)
16. The amount of vertical space between lines of text in a document is called-
(A) double-space
Ans: (B)
Ans: (A)
(D) The computer and software system that control the machine
Ans: (D)
(B) Index
(D) Bookmark
(A) Size
(B) Format
(C) Point
(D) Colour
Ans: (B)
Ans: (B)
22. Office LANS, which are scattered geographically on large scale, can be connected by the use of
corporate-
(A) CAN
(B) LAN
(C) DAN
(D)WAN
(E) TAN
Ans: (D)
23. Where are data and programme stored when the processor uses them?
Ans: (A)
24. ............... represents raw facts, where- as ................. is data made meaningful.
Ans: (B)
25. Which keystroke will take you at the beginning or the end of a long document?
Ans: (C)
(B) Data in ROM is nonvolatile, that is, it remains there even without electrical power.
(D) ROM chips are easily swapped between different brands of computers.
(E) None of these
Ans:(B)
(B) You can only see the page you are currently working
(C) You can only see pages that do not contain graphics
(D) You can only see the title page of your document
Ans: (A)
(C) If the length is more than a page, the file will be needed to be saved
Ans: (A)
29. When creating a word-processed document, this step involves the user changing how words on the
page
Ans: (C)
(B) Right
(C) Centre
(D) Left
Ans: (A)
a. Printer
e. None of these
e. None of these
a. Ink-jet
d. Dot-matrix
e. None of these
4. A program written in machine language is called?
a. Assembler
b. Object
c. Computer
d. Machine
e. None of these
a. Charles Babbage
b. Von-nuumann
c. Danies Ritchel
d. Blaise Pascal
e. None of these
e. None of these
a. BASIC
b. FORTRAN
c. Machine Language
d. COBOL
e. None of these
a. Dot Matix
b. Laser Printer
c. Inkjet Printer
d. Plotter
e. None of these
9. Memory which forgets everything when you switch off the power is known as
a. Corrupted
b. Volatile
c. Non-Volatile
d. Non-Corrupted
e.None of these
a. Networking
b. Pairing
c. Interlocking
d. Assembling
e. Sharing
a. 16 address lines
b. 16 Buses
c. 16 Data lines
d. 16 routes
e. None of these
12. Data going into the computer is called
a. Output
b. algorithm
c. Input
d. Calculations
e. flow chart
a. LAN
b. DSL
c. RAM
d. USB
e. CPU
a. Shareware
c. Open-sourse software
e. An application suite
a. None of these
b. One
c. Two
16. A collection of program that controls how your computer system runs and
a. Operating System
b. Computer
c. Office
d. Compiler
e. Interpreter
a. run faster
b. go on line
d. E-mail
e. None of these
a. Flash memory
b. CMOS
c. Bays
d. Buses
e. Peripherals
a. mouse
b. logo
c. hand
d. palm
e. cursor
known as
a.B oot
b Bug
c Biff
22. A self replicating program, similar to a virus which was taken from a 1970s
a. Bug
b. Vice
c. Lice
d. Worm
e. None of these
a. Multivibrator
b. Flip-flop
c. Logic gates
d. laten
e. None of these
as
a. Spam
b. Trash
c. Calibri
d. Courier
e. None of these
e. None of these
a. Babbage
b. Bill Gates
e. None of these
a. Keyboard b. Mouse
e. All of these
28. Examples of output devices are
a. Screen
b. Printer
c. Speaker
d. All of these
e. None of these
a. Control unit
d. Monitor
e. None of these
a. Compiler
b. Interpreter c. Linker
d. Loader
e. None of these
b. Procedural programming
c. Inheritance
d. Linking
e. None of these
a. Commercial
b. Scientific
c. Space
d. Mathematical
e. None of these
e. None of these
35. 1 Byte = ?
a. 8 bits
b. 4 bits
c. 2 bits
d. 9 bits
e. None of these
37. The device used to carry digital data on analog lines is called as
a. Modem
b. Multiplexer
c. Modulator
d. Demodulator
e. None of these
a. Screen
b. Monitor
c. Both 1 & 2
d. printer
e. None of these
e. None of these
d. Bill Gates
e. None of these
ANSWERS
------------------------------------------------------------------------------------------------------------
9. (b) 10. (a)11. (c) 12. (c) 13. (a) 14. (e) 15. (c)
16. (a) 17. (c) 18. (c) 19. (d) 20. (e)21. (b) 22. (d)
23. (b) 24. (a) 25. (a) 26. (b) 27. (e) 28. (d) 29. (b)
30. (c) 31. (b) 32. (c) 33. (a) 34. (d) 35. (a)
36. (a) 37. (a) 38. (c) 39. (a) 40. (a)
1. Which command divides the surface of the blank disk into sectors and assign a unique
1) Ver
2) Format
3) Fat
4) Check disk
5) None of these
2. If you need to duplicate the entire disk, which command will you use?
1) Copy
2) Disk copy
3) Chkdsk
4) Format
5) None of these
3. A............. sometimes called a boot sector virus, executes when a computer boots up
because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
1) System virus
3) File virus
4) Macro virus
5) None of these
1) Disk Crash
3) Corruption o f program
4) Deletion of files
5) None of these
1) Firewall
2) Proxy server
3) IP address
4) Domain name
5) None of these
6. Programming language built into user programs such as Word and Excel are known as...
1) 4GLs
2) Macro languages
3) object-oriented languages
5) None of these
1) Unauthorized Attacks
2) Virus Attacks
4) Fire Attacks
5) None of these
8. Which of the following extensions suggest that the file is a backup copy?
1) Bak
2) Bas
3) Com
4) Txt
5) None of these
9. Computer programs are written in a high - level programming language; however, the
1) Cache
2) Instruction set
3) Source code
4) Word size
5) None of these
10. The software tools that enable a user to interact with a computer for specific purposes are
known as...
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these
1) Batch
2) Online
3) Real-time
4) Group
5) None of these
12. When a file contains instructions that can be carried out by the computer, it is often
1) Data
2) Information
3) Executable
4) Application
5) None of these
14. A set of step - by - step procedures for accomplishing a task is known as a (n)...
1) Algorithm
2) Hardware program
3) Software bug
4) Firmware program
5) None of these
15. A complete electronic circuit with transistors and other electronic components on a small
1) Workstation
2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these
1) File
2) Word
3) Folder
4) Project
5) None of these
5) None of these
18. When you turn on the computer, the boot routine will perform this test...
1) RAM test
3) Memory test
4) Power - on self-test
5) None of these
19. Which of the following storage media provides sequential access only?
1) Floppy disk
2) Magnetic disk
3) Magnetic tape
4) Optical disk
5) None of these
20. In word processing, an efficient way to move the 3rd paragraph to place it after
5) None of these
3) The computer and all the devices connected to it that are used to input and output data
4) All devices involved in processing information including the central processing unit, memory
and storage
5) None of these
22. The quickest and easiest way in Word, to locate a particular word or phrase in a document
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
1) What the user sees on the screen and how they can interact with it
3) The means by which the user interacts with the peripheral devices on the computer
5) None of these
1) Open
2) Close
3) New
4) Save
5) None of these
25. The.............. Becomes different shapes depending on the task you are performing
1) Active tab
2) Insertion point
3) Mouse pointer
4) Ribbon
5) None of these
26. Specilizd programs that assist users in locating information on the Web are called....
1) Information engines
2) Search engines
3) Web browsers
4) Resource locators
5) None of these
1) Debugging
2) Bugging
3) Rectifying
4) Modifying
5) None of these
29.Any letter, number, or symbol found on the keyboard that you could type into the computer
..........
1) Output
2) Character
3) Type
4) Print
5) Font
30.A symbol or question on the screen that prompts you to take action and tell the computer
1) Scanner
2) Questionnaire
4) Information seeker
5) None of these
1) Menu bar
2) Tool bar
3) User friendly
4) Word processor
5) None of these
1) Monitor
2) Memory
3) Disk
4) Hard drive
5) None of these
33.A file extension is separated from the main file name with a(n)..., but no spaces
1) Question nark
2) Exclamation mark
3) Underscore
4) Period
5) None of these
2) computer-centric tasks
3) Gaming tasks
5) None of these
35.A ... is a device that not only provides surge protection, but also furnishes your computer
1) Surge strip
2) USB
3) UPS
4) Battery strip
5) None of these
36.The term ............. designates equipment that might be added to a computer system to
1) Digital device
2) System add-on
3) Disk pack
4) Peripheral device
5) None of these
37........... this is the act of copying or downloading a program from a network and making
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
38.When installing ..., the user must copy and usually decompress program files from a CDROM
1) Programming software
2) System hardware
3) Applications hardware
4) Applications software
5) None of these
39.Which one of the following would be considered as a way that a computer virus can enter a
computer system ?
5) None of these
..........
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
3) Supercomputers are focused to execute few programs as fast as possible while mainframe
4) Supercomputers are focused to execute as many programs as possible while mainframe uses
5) None of these
5) None of these
1) Office XP
2) Windows XP
3) Office 2007
4) Office 2010
5) None of these
1) Floppy
2) Keyword
3) Computer
4) Printer
5) None of these
1) Input data
2) Output data
4) All of above
5) None of these
1) USB 2) Parallel
1) Workbook
2) Worksheet
3) Spreadsheet
4) Spread book
5) None of these
48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
5) None of these
2) Thesaurus
3) Both
4) Synonym viewer
5) None of these
50. Which command allows you to reduce fragments of file and optimize the performance of
disk ?
1) Scandisk
2) Diskcomp
3) Chkdsak
4) Defrag
5) None of these
Answers
1 2 11 1 21 4 31 1 41 3
2 2 12 3 22 2 32 4 42 1
3 5 13 1 23 1 33 5 43 4
4 2 14 1 24 3 34 4 44 2
5 2 15 4 25 3 35 3 45 4
6 4 16 1 26 2 36 4 46 4
7 1 17 4 27 4 37 3 47 1
8 1 18 2 28 1 38 1 48 1
9 3 19 2 29 2 39 2 49 2
10 4 20 4 30 3 40 4 50 4
(C) Hollirth
(A) Univac
(B) Mark-I
(C) Eniac
(A) 4
(B) 5
(C) 3
(D) 6
(A) Transistors
(C) LSI
(D) VLSI
(B) Transistors
(C) LSI
(D) VLSI
(A) LSI
(D) Transistors
(A) Analog
(B) Digital
(C) Hybrid
(A) Digital
(B) Hybrid
(C) Analog
(D) Complex
(A) 2
(B) 4
(C) 3
(D) 1
(A) Software
(B) Hardware
(C) Human ware
(A) Computation
(B) Communication
(C) Processing
(C) both
(A) Mainframe
(B) Microcomputer
(C) Minicomputer
(B) PC
(C) Laptop
(D) PDA
(C) Shannon
(D) IBM
(A) Transistor
(C) LSI
(D) VLSI
22. The time taken by CPU to retrieve and interpret the instruction to be executed is called
as:
(A) ALU
(C) Registers
(D) BUS
(C) Microprocessor
(D) BUS
(A) SRAM
Answers
1 A 11 B 21 A
2 B 12 D 22 A
3 B 13 B 23 A
4 B 14 B 24 A
5 B 15 B 25 C
6 A 16 A
7 A 17 B
8 C 18 B
9 A 19 B
10 C 20 B
1. In a survey of more than 500 companies and government agencies, percent detected
A. 20
B. 75
C. 85
D. 99
Answer: C
2. The survey showed that these businesses lost more than due to security breaches.
A. $100,000 each
B. $377 million
D. $1 million
Answer: B
A. young hacker.
Answer: B
A. hackers.
B. insiders.
C. overseas criminals.
Answer: B
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
6. Collecting personal information and effectively posing as another individual is known as the crime
of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B
8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate
9. An intentionally disruptive program that spreads from program to program or from disk to disk is
known as a:
A. Trojan horse.
B. virus.
C. time bomb.
Answer: B
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B
12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
14. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
15. What is the name of an application program that gathers user information and sends it to
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
16. Standardization of Microsoft programs and the Windows operating system has made the spread of
viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C
A. your computer.
D. No
Answer: B
18. Software programs that close potential security breaches in an operating system are known as:
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D
19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is
known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D
20. is the measurement of things such as fingerprints and retinal scans used for security
access.
A. Biometrics B. Biomeasurement
Answer: A
21. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B
22. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.
Answer: D
23. Hardware or software designed to guard against unauthorized access to a computer network is
known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
Answer: B
A. encryption.
B. a firewall.
C. scrambling.
D. password proofing.
Answer: A
A. cryptology source.
B. encryption key.
D. cryptosystem.
26. To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B
Answer: B
A. encryption
B. firewall software
C. PGP
Answer: C
30. is defined as any crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B
A. logins
B. passwords
C. encryption
Answer: B
32. Creating strong computer security to prevent computer crime usually simultaneously helps
protect :
A. privacy rights.
B. personal ethics.
D. personal space.
Answer: A
33. Over was spent by businesses and government to repair problems in regard to Y2K.
A. 20 million dollars
C. 1 billion dollars
Answer: D
34. What is a complex system that takes on nearly complete responsibility for a task eliminating the
A. Autonomous system
C. Smart weapon
D. Independent system
Answer: D
35. Security procedures can:
Answer: B
36. The field of computer uses special software to scan hard drives of potential criminal
suspects.
37. Computer often goes unreported because businesses fear negative publicity.
Answer: crime
38. connections are the most frequent point of attack for Internet commerce.
Answer: Internet
Answer: Theft
40. A survey by eMarketer.com found that are the most often cited online fraud cases.
Answer: notebook
42. When you use a disk in several different computers within the same day, you are taking the
43. A(n) attaches itself to documents that contain embedded programs that automate
tasks.
Answer: macro virus
Answer: worms
46. A security patch is a software program that closes possible security breaches in the operating
47. was once the word used for malicious computer wizardry.
Answer: Cracking
Answer: Webjackers
Answer: Audit-control
53. Each individual who uses a public key cryptosystem has keys.
56. It should now be common knowledge that users should not open from e-mail recipients that
Answer: attachments
1) Compiler
2) Interpreter
3) Linker
4) Loader
5) None
2. _ _ _ _ _ _ _ _ is an OOP principle
1) Structured programming
2) Procedural programming
3) Inheritance
4) Linking
5) None
1) Commercial
2) Scientific
3) Space
4) Mathematical
5) None
5) None
5. 1 Byte = ?
1) 8 bits
2) 4 bits
3) 2 bits
4) 9 bits
5) None
5) None
1) Modem
2) Multiplexer
3) Modulator
4) Demodulator 5) None
1) Screen
2) Monitor
3) Both 1 & 2
4) printer
5) None
5) None
1) Dennis Ritchie
5) None
1) 16 address lines
2) 16 Buses
3) 16 Data lines
4) 16 routes
5) None
1) Output
2) algorithm
3) Input
4) Calculations
5) flow chart
1) LAN
2) DSL
3) RAM
4) USB
5) CPU
1) Shareware
3) Open-source software
5) An application suite
1) None
2) One
3) Two
16. A collection of program that controls how your computer system runs and processes
information is called
4) E-mail 5) None
Ans:-
consideration?
Ans: (3)
Ans: (4)
(2) there must be communications media connecting the network hardware devices
(4) each computer must have software that supports the movement of information
Ans: (2)
Ans: (3)
(1) Cookies
(2) Plug-ins
(3) Scripts
(4) ASPs
Ans: (1)
UNIT 11
1. Computer uses the .......... number system to store data and perform calculations.
(1) binary
(2) octal
(3) decimal
(4) hexadecimal
ANSWER: 1
2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased
(1) Memory-only
(2) Write-only
(3) Once-only
(4) Run-only
(5) Read-only
ANSWER: 5
(1) CTRL + A
(2) ALT + F5
(3) SHIFT + A
(4) CTRL + K
(5) CTRL + H
ANSWER: 1
4. .......... are attempts by individuals to obtain confidential information from you by falsifying their
identity.
(1) Phishing
(4) Viruses
ANSWER: 1
5. Port number, port description, and number of ports ordered are examples of
(1) control
(2) output
(3) processing
(4) feedback
(5) input
ANSWER: 5
(4) Bookmark
ANSWER: 1
(1) multiprogramming
(2) multitasking
(3) time-sharing
ANSWER: 1
8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-
ANSWER: 4
9. To instruct Word to fit the width of a column to the contents of a table automatically, click the
(2) Format
(3) Autosize
(4) Contents
(5) AutoFit
ANSWER: 5
(2) It is unethical because the files are being given for free.
(4) It is not unethical because the files are being given for free.
ANSWER: 3
(1) CD
(2) DVD
(3) ROM
(4) RW
(5) ROS
ANSWER: 4
(1) persistent
(2) optical
(3) magnetic
(4) flash
(5) steel
ANSWER: 2
13. A device that connects to a network without the use of cables is said to be-
(1) distributed
(2) free
(3) centralized
ANSWER:5
14. A person who used his or her expertise to gain access to other people's computers to get
(1) hacker
(2) analyst
(4) programmer
(5) spammer
ANSWER: 1
(1) dragging
(2) dropping
(3) right-clicking
(4) shift-clicking
16. To change selected text to all capital letters, click the change case button, then click- (1)
UPPERCASE
ANSWER: 1
17. The basic unit of a worksheet into which you enter data in Excel is called a-
(1) tab
(2) cell
(3) box
(4) range
ANSWER: 2
(1) My folder
(2) My Documents
(3) My Files
(4) My Text
ANSWER: 2
(2) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
ANSWER: 2
ANSWER:2
(1) Work
(2) Auto
(3) Normal
(4) Roman
ANSWER:3
22. The process of transferring files from a computer on the Internet to your computer is called
(1) downloading
(2) uploading
(3) FTP
(4) JPEG
(5) downsizing
ANSWER: 1
23. .......... is the process of dividing the disk into tracks and sectors.
(1) Tracking
(2) Formatting
(3) Crashing
(4) Allotting
ANSWER:2
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot
ANSWER:2
25. The contents of .......... are lost when the computer turns off.
(1) storage
(2) input
(3) output
(4) memory
ANSWER: 5
26. When you enter text in a cell in Excel, it also appears in which of the following?
ANSWER:2
(2) Buttons
(3) Diagrams
(4) Charts
(5) Worksheets
ANSWER:5
ANSWER: 1
31. The technology that stores only the essential instructions on a microprocessor chip and thus
(1) CISC
(2) RISC
3) CD-ROM
(4) Wi-Fi
(5) MISC
ANSWER: 2
(2)Accept input
(3)Process data
ANSWER: 4
33. ASCII is a coding system that provides
ANSWER: 4
34. Which part of the computer is directly invoked in executing the instructions of the computer
program?
ANSWER: 5
(1) tab consecutively until your cursor reaches the desired place
(4) press the space bar until your cursor reaches the desired place
ANSWER: 5
(2) databases
(3) folders
(4) graphs
(5) diagrams
ANSWER:3
(5) Shut-down
ANSWER: 2
38. In Word, the feature that automatically detects common errors is called
(1) Autocorrect
(2) Autograph
(4) Go to
(5) Thesaurus
ANSWER:1
39. A computer system that is old and perhaps not satisfactory is referred to as a(n)
ANSWER: 4
(1) 001
(2) 101
(3) 202
(4) 110
(5) 011
ANSWER:3
(1) ROM
(2) RAM
ANSWER:2
(1) Megabyte
(2) Gigabyte
(3) Kilobyte
(4) Terabyte
ANSWER:5
43. Which menu enables the user to choose toolbars?
(1) View
(2) Format
(3) Insert
(4) Edit
(5) Help
ANSWER: 1
44. By viewing the properties of the local hard disk of a computer, the user can find out
(1) the amount of space that has been used up and the remaining free space on the disk.
(2) the name of the user viewing the properties of the disk.
ANSWER: 1
(1) Autosheets
(2) Diagrams
(3) Charts
(4) Tables
(5) Functions
ANSWER:5
46. Which of the following contains permanent data and gets updated during the processing of
transactions?
ANSWER:4
(2) Ctrl + C
(3) Alt + C
(5) Ctrl + E
ANSWER: 5
48. Which of the following helps to protect floppy disks from data getting accidentally erased?
ANSWER:2
(2) a keyboard
(3) a printer
(4) a monitor
(5) a scanner
ANSWER:1
ANSWER:2
51. The operation of combining two cells into a single cell in Excel is referred to as
ANSWER:2
52. Which of the following can be used to store a large number of files in a small amount of storage
space?
ANSWER:5
(2) RAM
(3) motherboard
(4) CPU
ANSWER:4
(4) graphs
ANSWER:2
(1) 6AH1
(2) 100101
(3) 005
(4) ABCD
(5) 23456
ANSWER:2
ANSWER:5
(3) DVD
(4) CD
(5) Keyboard
ANSWER:5
58. In Excel, when the contents and attributes of a cell or range of cells have to be erased using the
(1) select the Cells. choose Edit. and select Clear, then All
(3) select the Cells. choose Tools. and select Clear. then Formats
(4) select the Cells. choose Tools. and select Formula Audit. then Delete
ANSWER:1
60. If an Excel Worksheet is to be linked for use in a PowerPoint presentation, the following should
be clicked
ANSWER: 2
ANSWER: 1
62. Which of the following is the hardware and not the software? .
(1) Excel
(4) Powerpoint
ANSWER:5
63. In Word, which menu would the user select to print a document?
(1) Tools
(2) File
(3) View
(4) Wind0Vob
ANSWER: 2
(3) A file extension is established by the user to indicate the date it was created
ANSWER:5
(1) modem
(2) joiner
(3) networker
(4) connector
(5) demod
ANSWER: 1
66. What do you see when you click the right mouse button?
(3) No effect
ANSWER:2
ANSWER:1
(1) logarithm-based
(2) ASCII
(3) algorithm-based
(4) arithmetic
ANSWER:4
(1) Database
(3) Spreadsheet
70. .......... consists of volatile chips that temporarily store data or instructions.
(1) CPU
(2) ROM
(3)RMA
(4) RAM
Ans: C Postscript
Ans: D Java
Q.5 A computer system that permits multiple users to run programs at same time
Ans: A LAN
Q.8. A device that forwards data packet from one network to another is called a
Ans: B Switch
Internet
Ans: C TCP
Q.11 HTML is a
Q.14 SMTP is a
(B) Protocol used for transferring message between end user &
Mail Server
Q.16 Telnet is a
Q.18 An e-business that allows consumer to name their own price for products
Ans: D C2B
Q.20 DNS is
Q.21 A firewall is
(B) Software or hardware used to isolate a private network from a public network.
(D) A predefined encryption key used to encrypt and decrypt data transmissions.
Ans: B Software or hardware used to isolate a private network from a public network.
Q.22 A router
Ans: B B2C
(A) to diagnose line failures, measure and manage traffic flow and simplify re
configuring of LANs.
(C)Screening packets to/from the Network and provide controllable filtering of network
traffic.
Ans: C Screening packets to/from the Network and provide controllable filtering of
network traffic.