Computer Science MCQS – 300+ Latest MCQs
Contents
Exams and tests on technology are hot topics for competitive exams. In order to prepare for the exam well, Computer Science MCQs have become necessary. For all competitive exams such as NTS, NAT, GAT, FPSC & PPSC, with computer programming aptitude test questions and answers.
For your ease, we have also added the computer science MCQs with answers pdf as a basic quiz at the end. I will be pleased to add more and more in the coming days.
Computer Science MCQs + IT and Internet MCQs
- Basic Computer
- IT / Internet
- MS Office
- Operating Systems
- Communication & Networks
- Architecture & Organization
- C++ Programming
- Computer Engineering
- Software Engineering
- Programming Languages
- Security, Privacy & Ethics
1. What component manages the data flow and interaction between the components of a computer processor?
- Accumulator
- Control unit
- Register
- Monitor
2. Web pages are interlinked by using
- HTTP
- marquee
- hyperlinks
- Internet
3. “IP” is an abbreviation of
- Inner Process
- Internet Program
- Internet Protocol
- Internal process
4. Which of the following is an internet standard communication protocol for email transmission?
- FTP
- SMTP
- SSH
- STEP
- Content Management System
- Content Modification Software
- Client Management System
- Control Management System
6. Internet uses _____ to communicate between devices and networks.
- HTTP
- website
- internet protocol suite
7. C++ is an object-oriented language, and C, BASIC, and Pascal are _____ languages.
- Procedural
- scripting
- general purpose
- web-based
8. The amount of time taken by a device to begin reading data is called
- Seek time
- Read time
- Access time
- Write time
9. The main function of a web server is to store and process
- Internet
- websites
- database
- programs
10. “Google Language Translator” is an example of the application of
- Internet
- debugging
- computer simulations
- machine learning
11. Algorithms that improve automatically through experience are known as
- computer program
- Machine learning
- computer language
- artificial intelligence
12. The basic medium of optical fiber is a fiber that is mostly made of
- glass
- wood
- copper
- lead
13. Web pages are interlinked by using
- HTTP
- marquee
- hyperlinks
- slider
14. In peer-to-peer networking,
- there is only one server and many clients
- there is only one client and many servers
- every computer is capable of playing the role of server
- every computer is capable of playing the role of client, server or both at the same time
15. URL is an abbreviation for
- Universal Resource Locator
- Uniform Resource Locator
- Universal Resource Location
- Uniform Resource Location
16. The network in which we connect each node to the network along a single piece of network cable is called
- Bus Network Topology
- Star Network Topology
- Ring Network Topology
- None of these
17. The network in which we connect each network node to a central device (hub) is called
- Star Network Topology
- Bus Network Topology
- Ring Network Topology
- None of these
18. FTP is an abbreviation for
- File Transfer Position
- File Transfer Protection
- File Transfer Protocol
- File Transfer Possibility
19. Which operating system is used by most of the supercomputers in the world?
- Windows
- Linux
- Macintosh
- None of these
20. The “Macintosh” computers and laptops are manufactured by
- Apple
- Microsoft
- Samsung
- Lenovo
21. Which variable type can have only two possible values?
- integer
- string
- double
- bool
22. IDE is an abbreviation of
- Integrated Dual Environment
- Inter Development Environment
- Integrated Development Environment
- Inter Dual Environment
23. C++ is an object-oriented language, and C, BASIC, and Pascal are _____ languages.
- Procedural
- scripting
- general purpose
- web based
24. Which number system is used by computers?
- Digital
- decimal
- analogue
- binary
25. A computer virus that replicates itself is called
- Bug
- Worm
- Bomb
- Hoax
26. The tool used to find a similar word in a document is called
- Finder
- Thesaurus
- Dictionary
- Find and Replace
27. The major language of the World Wide Web (WWW) is
- HTML
- PHP
- ASP.NET
- Java
28. Which computer language is used to design the display of an HTML web page?
- PHP
- Java
- CSS
- ASP.NET
29. “Google Language Translator” is an example of the application of
- internet
- debugging
- computer simulations
- machine learning
30. Which of the following components of physical database design refer to the correctness and consistency of data?
- Indexes
- Integrity constraints
- File organization
- Data Distribution strategy
31. conio.h stands for
- character input output
- console input output
- common input output
- complex input output
32. Duplication of data in multiple files is called
- Data Redundancy
- Data Dependence
- Data Inconsistency
- None Of These
33. A relation that contains minimal redundancy and allows easy use is called
- Clean
- Simple
- Complex
- Well-Structured
34. SQL stands for
- Structured Query Language
- Sequential Query Language
- Simple Query Language
- None Of These
35. In a program where the user inputs the roll number and the program displays the marks obtained, which of the following is suitable?
- for loop
- do-while loop
- if/ else statement
- switch statement
36. In which loop, the loop body executes at least once?
- for loop
- while loop
- do-while loop
- none of these
37. Consider the main body of a program,
string a = “4”;
string b = “8”;
string c = a + b;
cout << c << endl;
If the program is run, what will be displayed on the screen?
- 4
- 8
- 12
- 48
38. Which register stores the result of ALU operations?
- Data Register
- Instruction Register
- Data Address Register
- Accumulator Register
39. A collection of rules for writing programs in a programming language is known as
- Syntax
- Program logic
- Program Standards
- None Of These
40. Which one connects two similar network segments?
- Router
- Bridge
- Gateway
- Node
41. Which of the following device uses the parallel transmission?
- Mouse
- Keyboard
- Printer
- Light Pen
42. What is a diagrammatic way of representing the relationship between the entities in a database?
- Flowchart
- ERD
- DFD
- Algorithm
43. In computer science and information technology (IT), DNS is an abbreviation of
- Direct Name System
- Domain Name System
- Direct Name Software
- Domain Name Software
44. In C++, the library function exit() causes an exit from the
statement
- loop in which it occurs
- function in which it occurs
- program in which it occurs
45. In C++, a function name must be followed by
- braces
- parentheses
- statement
- variable name
46. Which transmission allows data to travel in both directions but only one direction at a time?
- Simplex
- Full duplex
- Half duplex
- Reverse
47. Another name for free software is?
- Encrypted Software
- Copy Protected Software
- Shareware
- Public Domain Software
48. DPI stands for?
- Dot Per Inch
- Decimal Per Inch
- Digit Per Inch
- Data Per Inch
49. A small high-speed memory inside the CPU is
- RAM
- ROM
- Cache
- Register
50. ________ are used to evaluate compound conditions.
- Arithmetic Operators
- Logical Operators
- Relational Operators
- Assignment Operators
51. Consider the main body of a C++ program,
string var1 = “Computer “;
string var2 = “Science”;
string var3 = var1 + var2;
cout << “var3” << endl;
If the program is run, what will be displayed on the screen?
- var3
- Computer
- Science
- Computer Science
52. MICR stands for?
- Magic In Character Redo
- Magnetic Ink Character Recorder
- Magnetic Ink Character Reader
- None Of These
53. __________ is used to control all the parts of a manufacturing process.
- ATM
- CAM
- CAD
- MICR
54. CPU consists of the following parts:
- Control unit and ALU
- CU and Main memory
- Main memory and ALU
- Operating system and Main memory
55. MHz stands for?
- Millihertz
- Microhertz
- Megahertz
- None Of These
56. DRAM stands for?
- Digital Random Access Memory
- Dynamic Random Access Memory
- Digital Read Access Memory
- Dynamic Read Access Memory
57. In C++, a pointer is
- address of a variable
- variable for storing addresses
- data type of an address variable
- constant value
58. What is the statement that displays the address of the variable myvar?
- myvar;
- &myvar;
- cout << myvar;
- cout << &myvar;
59. An address is a _____, while a pointer is a _____.
- constant, variable
- variable, constant
- constant, constant
- variable, variable
60. The dots that compose the image of a digital photograph are called __________.
- Points
- Resolution Points
- Digital Points
- Pixels
61. A type of reader commonly used to read UPC code is __________.
- Bar-code reader
- Optical-mark reader
- Magnetic-ink reader
- Both A and C
62. Caps Lock is a:
- Window key
- Modifier key
- Toggle key
- Cursor control key
63. GPS stands for?
- Global Pointing System
- Global Positioning System
- Google Positioning System
- None Of These
64. Internet surfing is an example of:
- Half duplex
- Simplex
- Full duplex
- None Of These
65. The file type #include is called
- syntax
- operator
- header file
- string constant
66. To generate different random numbers in C++, which of the following header file(s) must be included?
- #include <rand>
- #include <cstdlib>
- #include <ctime>
- #include <cstdlib> and #include <ctime>
67. Analog signal is measured in:
- Volt
- Hertz
- Digits
- WATTS
68. _________ uses liquid crystal between the glass plates.
- ELD
- LCD
- CRT
- None of These
69. Open System Interconnection(OSI) model consists of _________ layers.
- Eight
- Six
- Seven
- Five
70. Which of the following coding schemes uses 4-bit code?
- Unicode
- ASCII
- EBCDIC
- BCD
71. Which of the following communication medium requires “line-of-sight”?
- Microwave
- Fiber-Optic cable
- Twisted-Pair cable
- Coaxial cable
72. The goto statement causes control to go to a/an
- function
- operator
- variable
- label
73. Bundling data and functions together is known as
- debugging
- encapsulation
- overloading
- polymorphism
74. _________ is a collection of system programs that controls and coordinates the overall operations of a computer system.
- System software
- Operating system
- Utility program
- Device driver
75. The translated program into machine code is called _________.
- Source program
- Object program
- System program
- None Of These
76. FormatC is an example of virus _________.
- Chernobal
- Logic Bomb
- Boot Sector
- Torjan Horse
77. What type of operating system MS-DOS is?
- Command Line Interface
- Graphical User Interface
- Multitasking
- Menu Driven Interface
78. Which of the following keyboard shortcuts is used to change the case?
- Ctrl+F3
- Alt+F3
- Shift+F3
- Ctrl+Shift+F3
79. A technique to get a small amount of money illegally from a large financial system is:
- Zapping
- Data Diddling
- Salami
- Piggy backing
80. If a legitimate user does not log off from the system, an illegitimate user may be involved in:
- Zapping
- Trapdoor
- Piggy Backing
81. A program placed in a legitimate program for unauthorized and hidden access to the system is called:
- Trapdoor
- Bomb
- Worm
- None of these
82. The term that refers to a circular portion of the disk is:
- Track
- Cylinder
- Sector
- Machine cycle
83. Which of the following RAID technology is used to improve system performance?
- Data striping
- Disk mirroring
- Tolerant computing
- None of these
84. The RAID technology that contributes to fault tolerance is called:
- Data striping
- Disk mirroring
- Tolerant computing
- None of these
85. Which of the following function is used to write a string to a file?
- fprintf()
- puts()
- fputs()
- printf()
86. Which of the following loop is always executed at least once:
- for
- while
- do while
- counter loop
87. After evaluation of expression 5%2 the value is equal to:
- 0
- 1
- 2
- 4
88. Which of the following function is used to display output on the screen?
- getch()
- scanf()
- printf()
- main()
89. A type of language in which instructions are written in binary form is:
- Machine language
- High level language
- Assembly language
- None
90. Which of the following is compiler directive?
- #include<stdio.h>
- int main()
- getch()
- All of these
91. Which type of error occurs when the program directs the computer to execute an illegal or undefined operation?
- Syntax error
- Logical error
- Run-time error
- None
92. The Annotation symbol in the flow chart indicates:
- Input
- Process
- Remarks
- Condition
93. A program syntax error is detected by:
- Compiler
- Interpreter
- Debugger
- Both a & b
94. The process of carefully observing the working of an algorithm is called:
- Desk Checking
- Debugging
- Coding
- Compiling
95. A set of tests ensure that computer and peripherals are working correctly is called:
- Registry
- Load
- Post
- Cold boot
96. The process of transferring data from a storage device to memory is known as:
- Boot
- Load
- Post
- Install
97. A process of restarting a computer that is already on is called:
- Warm boot
- Cold boot
- Load
- Post
98. The rules for exchanging data between computers are called:
- Protocols
- Hyperlinks
- Procedures
- Programs
99. The protocol responsible for routing packets to the correct address is:
- HTTP
- FTP
- TCP
- IP
100. At which layer of the OSI Model, Bit synchronization is handled?
- Data link
- Session
- Network
- Physical
101. Which of the following Microsoft Products is used to plan tasks?
- Excel
- Access
- Project
- PowerPoint
102. The process of training personnel to use the new systems is done during:
- Design
- Implementation
- Development
- analysis
103. Which type of diagram shows how information flows through a system?
- DFD
- Logic flowchart
- Decision table
- Gantt chart
104. The virus that activates itself every Friday the 13th and erases program files from the disk is called:
- Melissa
- Cascade
- Michelangelo
- Jerusalem B
105. Which layer is responsible for flow control and ensuring messages are delivered without error?
- Session
- Physical
- Application
- Transport
106. Routers operate at which layer of the OSI Model?
- Network
- Transport
- Physical
- Application
107. An operating system in which all processes are time-bounded uses:
- Distributed processing
- Time sharing
- Real time processing
- Batch processing
108. Which type of processing needs very limited or no interaction from the user?
- Real time processing
- Time Sharing
- Batch processing
- Distributed processing
109. What is running programs with more than one CPU called?
- Multiprocessing
- Interrupting
- Multitasking
- Multi-programming
110. What is the default mode parameter for ofstream?
- ios::in
- ios::out
- ios::binary
- both a and b
111. The operator used for dereferencing or indirection is:
- &
- *
- ->
- ->>
112. Which of the following creates user groups and assigns privileges to them?
- Process management
- I/O management
- File management
- Network management
113. A file that contains data about a single entity is:
- Database table
- Field
- Relation
- Record
114. What data file type is used to provide descriptive comments?
- Text
- Report
- Autonumber
- Memo
115. Which of the following query is used to change data in existing records?
- Update query
- Select query
- Make table query
- Append query
116. CTRL, SHIFT, and ALT are called _____ keys.
- Adjustment
- Alphanumeric
- Modifier
- Function
117. Which software can convert document images into text that can be edited in a word processor?
- Document imaging
- Optical character recognition
- Discrete word systems
- Continuous word systems
118. The Caps Lock key is a:
- Window key
- Modifier key
- Cursor control key
- Toggle key
119. The set of rules to exchange data in a communication network is called:
- Token
- Gateway
- Protocol
- Router
120. SDLC stands for:
- System development life cycle
- System design life cycle
- Server design life circle
- System development life circle
121. Which of the following is the first phase of SDLC?
- System analysis
- System development
- Initial investigation
- Maintenance
122. Which of the following computer program is a mathematical model of a real system?
- Transmitter
- Spreadsheet
- Simulation
- Modulation
123. “Google Translator” is an example of the applications of
- HTTPS
- internet
- computer simulations
- machine learning
124. How many bytes are occupied by the data type “long double” in a 32-bit system?
- 4
- 6
- 8
- 10
125. Which component of a computer holds data or instructions temporarily when they are being processed?
- Accumulator
- Control unit
- Register
- Bus
126. At which layer of the OSI Model, IP is implemented?
- Data link
- Presentation
- Network
- Transport
127. Which of the following is the bottom layer of the OSI Model?
- Application
- Presentation
- Transport
- Physical
128. A communications signal in the form of a continuous wave is called:
- Analog
- Digital
- Modulation
- None of these
129. A cell at the fourth column and 20 rows has a cell address:
- A20
- B20
- C20
- D20
130. In spreadsheet MS Excel, columns are labeled by:
- Numbers
- Letters
- Alphanumeric
- Cell reference
131. In a spreadsheet, MS Excel rows are labeled by?
- Numbers
- Letters
- Alphanumeric
- Cell reference
132. Software used to connect a PC and the server of ISP is known as:
- ISP’s link
- Dial up software
- Modem software
- Communication software
133. ARPA stands for:
- Advance Research Project Agency
- American Research Project Agency
- Advanced Residential Programming Association
- American Residential Programming Association
134. What is the domain name in the following address? name@server.com
- name
- server
- com
- server.com
135. Which of the following bus transfers actual data from input devices to memory and from memory to CPU?
- Control bus
- Address bus
- Data bus
- System
136. The ASCII coding system can provide _____ different representations.
- 16
- 32
- 64
- 256
137. The most widely used code for representing characters in computers is:
- BCD
- ASCII
- EBCDIC
- ANSII
138. In which topology a hub (switch) is used?
- Ring topology
- Star topology
- Bus topology
- Mesh topology
139. Which combination of keys is used to move back to previous control, while working in forms?
- Ctrl+Tab
- Shift+Alt
- Shift+Tab
- Shift+F3
140. Which of the following is the oldest search engine on Internet?
- Ask.com
- Archie.com
- Google.com
- Yahoo.com
141. In which topology all nodes are connected to a single cable?
- Bus topology
- Ring topology
- Tree topology
- Star topology
142. Which of the following standards were developed without any formal planning?
- De Jure
- De Facto
- ISO
- CCIT
143. In which network model do all computers have equal status?
- Peer-to-peer
- Client-Server
- Hybrid
- All of these
144. The most recent version of the MAC OS is based on the _____ operating system.
- Linux
- Unix
- Windows
- BSD/OS
145. The operating system is the most common type of _____ software.
- System
- Application
- Communication
- Freeware
146. The process of copying data from a memory location is known as:
- Booting
- Hacking
- Writing
- Reading
147. You can protect your device from hackers by using:
- Malware
- Antivirus
- Firefox
- File manager
148. What is the maximum number of columns that can be inserted in MS Word?
- 60
- 63
- 70
- 73
149. Which of the following type cannot be attached with email?
- pptx
- exe
- docx
- sisx
150. How many bits a bus with 32 data lines can transport at a time?
- 8 bits
- 16 bits
- 32 bits
- 64 bits
151. What type of software and operating system is?
- Utility software
- Firmware software
- System software
- Application software
152. Which term is related to the database?
- Oracle
- Php
- Java
- Assembly
153. Which key is used to close Microsoft Excel?
- ALT+F3
- ALT+F4
- ALT+F5
- ALT+F7
154. What is used at the end of a Word document, providing more info about something in your document?
- Sidenote
- Footer
- Footnote
- Endnote
155. Which shortcut is used to search for a word in a document?
- CTRL+I
- CTRL+E
- CTRL+F
- CTRL+S
156. Conditional formatting feature is used in:
- MS Word
- MS Powerpoint
- MS Excel
- MS Outlook
157. With which sign every formula in MS Excel starts?
- +
- *
- <
- =
158. Which shortcut key is used in order to set line spacing at 1.5?
- CTRL+5
- CTRL+6
- CTRL+7
- CTRL+8
159. How many distinct operations can be performed if the op-code of a microprocessor consists of 4 bits?
- 4
- 8
- 16
- 32
160.What is the interface that provides connections to external devices called?
- Expansion slot
- Memory slot
- Disk controller
- Port
161. Which of the following memory devices has sequential access to data?
- Magnetic disk
- Magnetic tape
- Optical memory
- Chip memory
162. The most powerful tool to handle memory addresses is:
- Arrays
- operator
- string
- pointer
163. The ability to use a function in multiple ways is:
- Class
- Overloading
- Inheritance
- Polymorphism
164. Which of the following is NOT a reserved word in C++?
- quit
- break
- exit
- continue
165. Which command is used to change the directory in the disk operating system?
- CD
- CHG DIR
- Change directory
- Replace directory
166. Which operating system allows the execution of application software on different computers in a network?
- Parallel processing operating system
- Multi-tasking operating system
- Distributed operating system
- multi-processor operating system
167. What is the number of default sheets in MS Excel?
- 1
- 2
- 3
- 4
168. The protocol which assigns an IP address to a client, connected to the internet is:
- FTP
- DHCP
- ARP
- HTTP
169. Which shortcut key combination is used to select an entire column in Excel?
- Ctrl-pagedown
- Ctrl-shift
- Ctrl-space
- Alt-enter
170. Which query is used to add records from a table to another table?
- Select query
- Update query
- Append query
- Make Table query
171. Which key combination is used to center align text?
- CTRL + B
- CTRL + C
- CTRL + E
- CTRL + Z
172. Does CRT stand for?
- Cathode Rays Tube
- Clarity Rays Tube
- Crystal Rays Tube
- None Of These
173. A computer program that translates one statement of program instructions at a time into machine language is called
- CPU
- Interpreter
- Compiler
- Simulator
174. What does NTFS stand for?
- New Trend File Saving
- Network File Saving
- New Technology File System
- None Of These
175. In MS Windows key F1 is mostly used for
- Help
- Exit
- Save
- Refresh
176. 1 Gigabyte is equal to
- 1024 bits
- 1024 bytes
- 1024 kilobytes
- 1024 megabytes
177. The most widely used code for representing characters in computers is
- ASCII
- BCD
- EBCDIC
- None Of These
178. The type of reader commonly used to read bank cheques is
- OPtical-mark reader
- Magnetic-ink reader
- Bar-code reader
- None Of These
179. Which of the following devices stores instructions that help the computer startup?
- Keyboard
- RAM
- ROM
- Hard disk
180. The computer can move data and instructions between storage and memory as needed, in a process called
- Volatility
- Swapping
- Pipelining
- Exchanging
181. When you press a key, which device notifies the system software?
- Keyboard
- Keyboard Controller
- Keyboard Buffer
- Keyboard Handler
182. DOS was introduced by
- IBM
- Xerox
- Microsoft
- Bell labs
183. Which of the following operating system is based on open-source software?
- UNIX
- Windows 2000
- Windows NT
- Linux
184. The amount of time taken by a device to begin reading data is called
- Seek time
- Read time
- Access time
- Write time
185. The RAID technology that contributes to fault tolerance is called
- Disk mirroring
- Tolerant computing
- Data striping
- None Of These
186. What does MAN stand for?
- Metropolitan Arranged Network
- Marked Area Network
- Manufactured Arrangements of Networks
- Metropolitan Area Network
187. The software used for workgroup computing is called
- Shareware
- Freeware
- Groupware
- Both A and B
189. Which of the following standards were developed without any formal planning?
- De Facto
- De Jure
- ISO
- Both A and B
190. Which of the following is LAN protocol?
- Ethernet
- ARCnet
- Token Ring
- All
191. Which one is the Bottom-most layer of the OSI model?
- Data link
- Physical
- Network
- Transport
192. Data is transmitted block-by-block in ___________ transmission.
- Digital
- Analog
- Synchronous
- Asynchronous
193. An important property of fiber optic is
- Refraction
- Reflection
- Interface
- None Of These
194. The process to convert analog signals into digital signals is called
- Modulation
- Demodulation
- Digitization
- Conversion
195. Which of the following memories can be re-written by using electrical devices?
- PROM
- ROM
- EEPROM
- EPROM
196. ___________ virus is a polymorphic virus. Polymorphic means “change nature with passage of time”.
- Redlof
- Torjan Horse
- Chernobal
- Logic Bomb
197. Which of the following protocols is used by World Wide Web(www)?
- TCP/IP
- Ethernet
- FTP
- HTTP
198. A primary key that consists of more than one attribute is called a
- Foreign key
- Composite key
- Multivalued key
- Global key
199. An attribute in the database is also known as
- Tuple
- Relation
- Row
- Field
200. C language was developed by
- Van Neumann
- Dennis Ritchie
- Charles Babbage
- John Backus
201. A space in a computer’s memory set aside for some data that can be changed is called
- Variable
- Constant
- Integer
- Floating Point
202. Which of the following components is used to convert the first .c to first .exe?
- Compiler and header
- Header and linker
- Compiler and linker
- Compiler only
203. Which of the database objects allows to extract specific information from tables?
- Queries
- Forms
- Reports
- Records
204. The instructions that are given to the compiler before the beginning of the actual program are:
- C statements
- Preprocessor directive
- Linking instructions
- C instructions
205. Which key combination is used to run the C program:
- Alt+F9
- Ctrl+S
- Alt+F5
- Ctrl+F9
206. Different attributes in two different tables having the same name are referred to as
- Acronym
- Synonym
- Homonym
- Mutually exclusive
207. SQL is a/an
- Unstructured language
- Structured language
- Object oriented language
- Software
208. The loop which never ends is called:
- Infinite loop
- Running loop
- Continuous loop
- Nested loop
209. Another term for a conditional operator is:
- Binary
- Iteration
- Selective
- Ternary
210. The total number of keywords in C are:
- 60
- 42
- 32
- 50
211. What does CIM stand for?
- Computer Integrated Manufacturing
- Copy In Memory
- Computer International Management
- Computer Intel Marketing
212. Which register normally functions as a 16-bit counter that controls the sequence in which the instructions are fetched from memory?
- PC
- IR
- DR
- DAR
213. Access time for most memories is measured in:
- Microseconds
- Milliseconds
- Nanoseconds
- Megahertz
214. A database consists of various components called:
- Tools
- Properties
- Entities
- Objects
215. Which of the following terms is related to the features of cascading deletion?
- Data integrity
- Data redundancy
- Referential integrity
- Indexing
216. What does ATM stand for?
- Automatic Talking Machine
- Automatic Teller Machine
- Analog Teller Machine
- Automatic Ticketing Machine
217. Who is known as the “Father of Computer Science”?
- Charles Babbage
- Howard Aiken
- Dr.Herman Hollerith
- Blaise Pascal
218. One of the first recognized calculating devices was?
- Abacus
- Analytical engine
- Difference engine
- None of these
219. Pentium II is a __________ generation computer.
- second
- third
- fourth
- fifth
220. The first computer that used vacuum tubes was?
- Mark I
- ENIAC
- EDVAC
- UNIVAC
221. Which of the following is not a pointing device?
- Mouse
- Joystick
- Trackball
- None of these
222. The number of reading/write heads for a hard disk of four platters are
- 4
- 6
- 8
- 16
223. Which of the following is a 16-bit code?
- BCD
- Unicode
- ASCII
- EBCDIC
224. Boolean algebra is also known as?
- Logical algebra
- Code algebra
- Switching algebra
- Digital algebra
225. The command that is not present on the edit menu?
- Font
- GoTo
- Find
- Ctrl+z
226. Does first-generation language use?
- Pseudo code
- Binary code
- Mnemonics code
- Decimal code
227. In which of the flowchart symbols, the statement “IS A > B” is placed?
- Connector
- Rectangular
- Parallelogram
- Diamond
228. Name the error which you think exists in the formula C=C*D/C.
- Logical
- Syntax
- Execution
- None of these
229. Which of the following statements transfers control unconditionally?
- GOTO
- FOR…NEXT
- IF THEN
- ON GOTO
230. The statement to reserve memory locations for an array M arranged in 12 columns and 20 rows maybe?
- DIM(12,20)
- DIMM(20,12)
- M(240)
- DIMM(12,20)
231. On execution of PRINT FIX(-6.83), the output will be?
- 6
- 6.83
- –6
- –7
233. In BASIC, LOG function refers to natural logarithm have Base?
- 2
- 10
- 5
- e
234. An 8-bit address bus can address memory of?
- 1 Byte
- 8 Bytes
- 256 bits
- 256 Bytes
235. The number of colors a CGA monitor displays are?
- 4
- 16
- 64
- 256
236. The radix of a computerized version of the number (+0.66E–4) is?
- 4
- 6
- 2
- 8
237. The programs which are permanent and stored in ROM are known as?
- Utility Programs
- Firmware
- System softwares
- None of these
238. UNIVAC stands for?
- Universal Automatic Computer
- Universal Array Computer
- Unvalued Automatic Computer
- Unique Automatic Computer
239. File compression utilities can reduce the file size by?
- 10%
- 60%
- 80%
- 100%
240. The “NT” in Windows NT stands for?
- Not Tested
- Network Technology
- Network Terminal
- New Technology
241. In C language, the .exe file is produced by?
- Linker
- Loader
- Compiler
- Interpreter
242. Which of the following is a valid statement for declaring a Variable In C?
- Int marks;
- int a,b,c;
- double salary;
- All of these
243. The number of Bytes used by char data type in C is?
- 2
- 1
- 3
- 4
244. The format specifier %u is used for?
- Integer
- unsigned short
- unsigned float
- unsigned long int
245. Which of the following objects are used to store data in MS Access?
- Reports
- Queries
- Forms
- Table
246. Which number system is usually followed in a typical 32-bit computer?
- Binary
- Decimal
- Hexadecimal
- Octal
247. Operating system, editors, and debuggers come under?
- System software
- Application software
- Utilities
- None of these
248. When did John Napier develop logarithm?
- 1416
- 1614
- 1641
- 1804
249. Which of the following tools of MS Word is used to rotate the text?
- Word Art
- Auto Shape
- Text Boxes
- None of these
250. Which of the following features of the word processor allows specifying margins of the documents?
- Marco
- Thesaurus
- Merge
- Layout
251. Which of the following devices can be used to directly image printed text?
- OCR
- OMR
- MICR
- All of these
252. The popular series of personal computers was the Apple series designed in 1976 using __________ microprocessor.
- 8-bit
- 16-bit
- 64-bit
- None of these
253. Who designed the first electronic computer-ENIAC?
- Van-Neumann
- Joseph M.Jacquard
- J.Presper Eckert and John W. Mauchly
- All of these
254. In the latest generation computers, the instructions are executed?
- Parallel
- Sequentially
- Both A and B
- Randomly
255. Web pages are linked together using?
- HTTP
- Hyperlinks
- Interlinks
- None of these
256. A CPU with a 32-bit Address Bus can address memory of?
- 4 KB
- 4 GB
- 8 KB
- 8 GB
257. In BASIC, LEFT(A$,n) is used to?
- Leave n spaces before the strung A$
- Leave n spaces before every character of the strung A$
- Leave n left characters of the strung A$
- Select n characters of the strung A$
258. In BASIC, RETURN statement passes control back to?
- GOSUB statement
- Next to GOSUB statement
- Beginning of the program
- The statement before GOSUB
259. The number of elements assigned automatically to a two-dimensional array in BASIC is?
- 10
- 100
- 110
- 121
260. Which of the following statements can be used for multiple branching?
- GOTO
- IF THEN ELSE
- ON GOTO
- WHILE…WEND
261. Which of the following statements can be used for unlimited looping?
- GOTO
- FOR…NEXT
- IF THEN
- ON GOTO
262. Which of the following command is used to exit from BASIC and to return to DOS?
- CLEAR
- KILL
- SYSTEM
- NEW
263. A number of Shutdown options on Windows 2000 professional are?
- 2
- 3
- 4
- 5
264. The number of items present on the control panel depends upon?
- Items install during Setup
- Items contained on Windows CD
- Items required by your system
- Hardware Items attached with the system
265. The number of actions with two buttons mouse is?
- 6
- 5
- 4
- 3
266. Which of the following is a DOS Internal Command?
- DELTREE
- ERASE
- FORMAT
- None of these
267. Which of the following is not an executable command?
- CLS
- REN
- REM
- COPY
268. An OR operation has 4 variables, the possible number of combinations in its truth table is?
- 64
- 16
- 34
- 32
269. By default, Word automatically saves your document after every?
- 5 minutes
- 10 minutes
- 15 minutes
- 20 minutes
270. Pressing Ctrl+Shift+A causes?
- To select whole document
- To highlight the selected text
- To capitalize the selected text
- Office assistant to appear
271. Pressing Ctrl+Shift+D causes?
- To delete the selected text
- To underline selected text
- To double underline the selected text
- None of these
272. The number of colors a VGA monitor displays are?
- 16
- 256
- 64
- 4
273. The device driver is an example of?
- System software
- Application software
- Freeware
- Shareware
274. A standard keyboard used in personal computers?
- 80 keys
- 84 keys
- 101 keys
- 102 keys
275. Which of the following layers of the OSI model is responsible for breaking data into segments?
- Presentation
- Transport
- Datalink
- Session
276. The Media Access Control sublayer resides in which layer?
- Datalink
- Physical
- Network
- Transport
277. Which of the following coding schemes uses 4-bit code?
- Unicode
- ASCII
- EBCDIC
- BCD
278. Satellite transmission stations that can both send and receive messages are known as?
- Transreceivers
- Receivers
- Earth Stations
- Transmitters
279. Which of the following tools of MS Word is used to rotate the text?
- Word Art
- Auto Shape
- Text Boxes
- None of these
280. Which of the following features of the word processor allows to specify margins of the documents?
- Marco
- Thesaurus
- Merge
- Layout
281. Which of the following devices can be used to directly image printed text?
- OCR
- OMR
- MICR
- All of these
282. The popular series of personal computers was the Apple series designed in 1976 using __________ microprocessor.
- 8-bit
- 16-bit
- 64-bit
- None of these
283. Who designed the first electronic computer-ENIAC?
- Van-Neumann
- Joseph M.Jacquard
- J.Presper Eckert and John W. Mauchly
- All of these
284. In the latest generation computers, the instructions are executed?
- Parallel
- Sequentially
- Both A and B
- Randomly
285. Web pages are linked together using?
- HTTP
- Hyberlinks
- Interlinks
- None of these
286. A CPU with a 32-bit Address Bus can address memory of?
- 4 KB
- 4 GB
- 8 KB
- 8 GB
287. In BASIC, LEFT(A$,n) is used to?
- Leave n spaces before the strung A$
- Leave n spaces before every character of the strung A$
- Leave n left characters of the strung A$
- Select n characters of the strung A$
288. In BASIC, RETURN statement passes control back to?
- GOSUB statement
- Next to GOSUB statement
- Beginning of the program
- The statement before GOSUB
289. The number of elements assigned automatically to two-dimensional arrays in BASIC is?
- 10
- 100
- 110
- 121
290. Which of the following statements can be used for multiple branching?
- GOTO
- IF THEN ELSE
- ON GOTO
- WHILE…WEND
291. Which of the following statements can be used for unlimited looping?
- GOTO
- FOR…NEXT
- IF THEN
- ON GOTO
292. Which of the following command is used to exit from BASIC and to return to DOS?
- CLEAR
- KILL
- SYSTEM
- NEW
293. The number of Shutdown options on Windows 2000 professionals is?
- 2
- 3
- 4
- 5
294. The number of items present on the control panel depends upon?
- Items install during Setup
- Items contained on Windows CD
- Items required by your system
- Hardware Items attached with the system
295. The number of actions with two buttons mouse is?
- 6
- 5
- 4
- 3
296. Which of the following is a DOS Internal Command?
- DELTREE
- ERASE
- FORMAT
- None of these
297. Which of the following is not an executable command?
- CLS
- REN
- REM
- COPY
298. An OR operation has 4 variables, the possible number of combinations in its truth table is?
- 64
- 16
- 34
- 32
299. According to Absorption Law A+(A.B) is equal to?
- 1+B
- AB
- A+1
- A
300. The number of tracks in one cylinder of a hard dick with two platters is?
- 4
- 8
- 16
- 32
301. A translator is a?
- System Software
- Low-Level language
- Translating machine
- Application Software
302. CRAY-1, CRAY-2, and CYBER 205 are examples of?
- Mainframes
- Supercomputers
- Microcomputers
- Minicomputers
303. IBM PC, AT&T, PS/2, and Apple Macintosh are examples of?
- Supercomputers
- Minicomputers
- Microcomputers
- Mainframes
304. In 1786, J.H. Muller proposed a calculating machine called a?
- Analytical Engine
- Difference Engine
- Electronic Engine
- None of these
305. Which of the following is called the first generation computer?
- ENIAC
- ABACUS
- UNIVAC-1
- EDVAC
306. Which of the following software products is the most appropriate for developing web pages?
- Adobe Page Maker
- Arcsoft
- Corel Draw
- Dreamweaver
307. Which of the following codes used in present-day computing was developed by IBM Corporation?
- ASCII
- Hollerith code
- Baudot code
- EBCDIC code
308. The ALU of a computer responds to the commands coming from?
- Primary Memory
- Control Section
- External Memory
- Cache Memory
309. In Microsoft Windows, key F1 is mostly used for?
- Help
- Exit
- Save
- Refresh
310. The operating system may perform __________ operation to manage the memory while running a large program.
- Sorting
- Scheduling
- Paging
- None of these
311. Octal 6 is equal to __________ decimal.
- 14
- 16
- 15
- 13
312. In the decimal system, the base is?
- 1
- 0
- 2
- 10
313. Which logic gate is similar to the function of two series switches?
- NOR
- OR
- AND
- NAND
314. Does remote computing service involve the use of time-sharing and?
- Multiprocessing
- Interactive processing
- Batch processing
- Real-time processing
315. A combination of 16-bits is called?
- Word
- Nibble
- Memory Block
- Byte
316. In the OSI network model, the dialogue control and token management are the responsibility of?
- Data link layer
- Session layer
- Transport layer
- None of these
317. In the OSI network model, the routing is performed by?
- Network layer
- Data link layer
- Transport layer
- Session layer
318. The transmission signal coding method of the TI carrier is called?
- Binary
- NRZ
- Bipolar
- Manchester
319. CTRL, SHIFT, and ALT are called _____ keys.
- Adjustment
- Alphanumeric
- Modifier
- Function
320. Which software can convert document images into text that can be edited in a word processor?
- Document imaging
- Optical character recognition
- Discrete word systems
- Continuous word systems
321. The Caps Lock key is a:
- Window key
- Modifier key
- Cursor control key
- Toggle key
322. Which of the following computer program is a mathematical model of a real system?
- Transmitter
- Spreadsheet
- Simulation
- Modulation
323. How many bytes are occupied by the data type “long double” in a 32-bit system?
- 4
- 6
- 8
- 10
324. Which component of a computer holds data or instructions temporarily when they are being processed?
- Accumulator
- Control unit
- Register
- Bus
325. The process of copying data from a memory location is known as:
- Booting
- Hacking
- Writing
- Reading
326. You can protect your device from hackers by using:
- Malware
- Antivirus
- Firefox
- File manager
327. How many bits a bus with 32 data lines can transport at a time?
- 8 bits
- 16 bits
- 32 bits
- 64 bits