MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Fundamentals
Computer Fundamental Miscellaneous
Quiz 8
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Q.1
The amount of data that a disk may contains known as the disk's?
Volume
Size
Tracking Unit
Storage capacity
Q.2
A daisy wheel is a type of?
Storage device
Pointing device
Scaning Device
Printer
Q.3
Factory production lines can be automated using?
Machine tools
VDUs
Plotters
None of these
Q.4
What does a light pen contain?
Refillable ink
Light sensitive elements
Pencil lead
Blue Ink
Q.5
What would be the best way to move around a 3D environment?
Use a tracker ball
Use a keyboard
Use a space mouse
Use Joystick
Q.6
You can protect a floppy disk.
Read
Write
Read and Write
All of the above
Q.7
Information on a hard disk is usually backed-up using a?
CD-ROM
Magnetic tape
Floppy disk
All of the above
Q.8
An impact printer creates characters by using?
An inked ribbon and print head
Electrically charged ink
An ink pen
All of the above
Q.9
What would you not use with a flatbed plotter?
A pen
Eraser
Paper
None of these
Q.10
Where would you find a magnetic strip?
Speakers
Credit card
Smart card
All of the above
Q.11
Hard copy is a term used to describe?
Printed output
Writing on a hard board
Storing information on the hard disk
All of the above
Q.12
What do the abbreviations VAB stand for?
Voice activated broadcasting
Visual audio board
Voice answer back
None of these
Q.13
Which key on keyboard of a computer does not have its name printed on the key?
ESC
SHIFT
F1
SPACE
Q.14
Where would you find the letters QWERTY?
Mouse
Screen
Numeric Keypad
Keyboard
Q.15
How did the computer mouse get its name?
Its cable looks like a tail.
Because it squeaks when moved
It has ears.
Teeth outside mouth.
Q.16
A digitizing tablet can be used for?
Tracing diagrams
Printing letters
Reading bar-codes
Playing
Q.17
Resolution of laser printer is specified in terms of
DPI
LPM
CPM
PPM
Q.18
A byte represents a group of
10 bits
40 bits
8 bits
22 bits
Q.19
Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
Daughter board
Motherboard
Father board
Breadboard
Q.20
What is meant by a dedicated computer?
Which is used by one person only
Which is assigned one and only one task
Which uses one kind of software
Which is meant for application software
Q.21
Instructions and memory address are represented by
Character code
Binary codes
Binary word
Parity bit
Q.22
__________ is the measurement of things such as fingerprints and retinal scans used for security access.
Biometrics
Biomeasurement
Computer security
Smart weapon machinery
Q.23
A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is
Memory
Buffer
Accumulator
Address
Q.24
Which of the following will happen when data is entered into a memory location?
It will add to the content of the location.
It will change the address of the memory location.
It will erase the previous content.
It will not be fruitful if there is already some data at the location.
Q.25
What is the most common tool used to restrict access to a computer system?
User log in
Passwords
Computer keys
Access-control software
Q.26
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
Hacker-proof program
Firewall
Hacker-resistant server
Encryption safe wall
Q.27
The ALU of a computer responds to the commands coming from
Primary memory
Control section
External memory
Cache memory
Q.28
An error in software or hardware is called a bug. What is the alternative computer jargon for it?
Leech
Squid
Slug
Glitch
Q.29
What is the name of an application program that gathers user information and sends it to someone through the Internet?
A virus
Spybot
Logic bomb
Security patch
Q.30
Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
More complicated
More difficult
Easier
Slower
Q.31
The scrambling of code is known as:
Encryption
A firewall
Scrambling
Password-proofing
Q.32
If you want to secure a message, use a(n):
Cryptology source
Encryption key
Encryption software package
Cryptosystem
Q.33
HTML viruses infect:
Your computer
A Web page in the HTML code
Both a Web page and the computer that is viewing it.
None of these
Q.34
Software programs that close potential security breaches in an operating system are known as:
Security breach fixes
Refresh patches
Security repairs
Security patches
Q.35
When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A virus
A Trojan Horse
Cracking
A denial of service attack.
Q.36
The common name for the crime of stealing passwords is:
Spooling
Identity theft
Spoofing
Hacking
Q.37
A program that performs a useful task while simultaneously allowing destructive acts is:
Worm
Trojan Horse
Virus
Macro Virus
Q.38
The majority of computer crimes are committed by:
Hackers
Insiders
Overseas criminals
Young teenage computer geniuses
Q.39
The thing that eventually terminates a worm virus is a lack of:
Memory or disk space
Time
CD drive space
CD-RW
Q.40
In 1999, the Melissa virus was a widely publicized:
e-mail Virus
Macro virus
Trojan Horse
Time Bomb
Q.41
An intentionally disruptive program that spreads from program to program or from disk to disk is known as
Trojan horse
Virus
Time bomb
Time related bomb sequence
Q.42
When a logic bomb is activated by a time-related event, it is known as a:
Time-related bomb sequence
Virus
Time bomb
Trojan horse
Q.43
A logic bomb that was created to erupt on Michelangelo's birthday is an example of a:
Time-related bomb sequence
Virus
Time bomb
Trojan horse
Q.44
Intel and AMD are leaders in-
Processor
RAM
Mother board
Hard Disk
Q.45
IDE (ATE) or SATA interface connect Mother board with-
Mother board
RAM
Processor
Hard disk
Q.46
Malicious software is known as:
Badware
Malware
Maliciousware
Illegalware
Q.47
Collecting personal information and effectively posing as another individual is known as the crime of:
Spooling
Identity Theft
Spoofing
Hacking
Q.48
USB is a type of-
Processor
Port
Monitor
Program
Q.49
Surgeons can perform delicate operation by manipulating devices through computers instead of manually. this technology is known as-
Robotics
Computer forensics
Simulation
Forecasting
Q.50
Process of Combining strings is known as
Compiling
Combining
Attaching
Concatenation
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page