Uncategorised

Computer Most Repeated MCQs for Job Test

(100) Arrangement of keys on keyboard is called                      ?

  • A. Home arrangement
  • B. Qwerty arrangement
  • C. Basic arrangement
  • D. General arrangement

(101) Which generation computers used transistors for the first time?

  • A. Fourth
  • B. Third
  • C. Second
  • D. First

(102) Website is a collection of                   ?

  • A. web pages
  • B. Graphic Files
  • C. Audio and Video Files
  • D. All of the Above

(103) Who was the first to introduce the punch card ?

  • A. Powers
  • B. Pascal
  • C. Herman Hollerith
  • D. Jacquard

(104) The communication protocol used by Internet is                             ?

  • A. HTTP
  • B. WWW
  • C. TCP/IP
  • D. FTP

(105) To copy a picture of the screen to the Clipboard use:                     Command?

  • A. Alt Key
  • B. Shift key
  • C. Print screen
  • D. None of these

(106) Who is the father of Computer?

  • A. Allen Turing
  • B. Charles Babbage
  • C. Simur Cray
  • D. Augusta Adaming

(107) The brain of any computer system is                        ?

  • A. ALU
  • B. Memory
  • C. CPU
  • D. Control unit

(108) What is the main difference between a mainframe and a super computer?

  • A. Super computer is much larger than mainframe computers
  • B. Super computers are much smaller than mainframe computers
  • C. Supercompute rs are focused to execute few programs as fast as possible while mainframe uses its power to execute as many programs concurrently
  • D. Supercomputer s are focused to execute as many programs as possible while mainframe uses its power to execute few programs as fast as possible.

(109) What type of resource is most likely to be a shared common resource in a computer Network?

  • A. Printers
  • B. Speakers
  • C. Floppy disk drives
  • D. Keyboards

(110) which statement describe “Hackers”?

  • A. all have the same motive
  • B. break into other people’s computers
  • C. may legally break into computers as long as they do not do any damage
  • D. are people who are allergic to computers

(111) What do you call the programs that are used to find out possible faults and their causes?

  • A. operating system extensions
  • B. cookies
  • C. diagnostic software
  • D. boot diskettes

(112) Chief component of first generation computer was                      ?

  • A. Transistors
  • B. Vacuum Tubes and Valves
  • C. Integrated Circuits
  • D. None of above

(113) Personnel who design, program, operate and maintain computer equipment refers to                      ?

  • A. Console- operator
  • B. Programmer
  • C. Peopleware
  • D. System Analyst

(114) A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is                      ?

  • A. Bug
  • B. Vice
  • C. Lice
  • D. Worm

(115) The device used to carry digital data on analogue lines is called as                    ?

  • A. Modem
  • B. Multiplexer
  • C. Modulator
  • D. Demodulator

(116) A                            is a microprocessor -based computing device?

  • A. personal computer
  • B. mainframe
  • C. workstation
  • D. server

(117) On-line real time systems become popular in                               generation?

  • A. First Generation
  • B. Second Generation
  • C. Third Generation
  • D. Fourth Generation

(118) Select the Odd one from the following

  • A. Operating system
  • B. Interpreter
  • C. Compiler
  • D. Assembler

(119) Computers process data into information by working exclusively with                           ?

  • A. multimedia
  • B. word
  • C. numbers
  • D. characters

(120) A device that connects to a network without the use of cables is said to be                        ?

  • A. Distributed
  • B. free
  • C. centralized
  • D. none of these

(121) Which of the following is not a binary number?

  • A. 001
  • B. 101
  • C. 202
  • D. 110

(122) Collecting personal information and effectively posing as another individual is known as the crime of                             ?

  • A. Spooling.
  • B. Identity theft.
  • C. Spoofing.
  • D. Hacking.

(123) What is the most common tool used to restrict access to a computer system?

  • A. User logins
  • B. Passwords
  • C. Computer keys
  • D. Access- control software

(124) computer is a medium sized computer?

  • A. Micro
  • B. Mainframe
  • C. Super
  • D. Mini

(125)                              are set of rules and procedures to control the data transmission over the internet?

  • A. IP address
  • B. Domains
  • C. Protocol
  • D. Gateway
Sharing is caring: