Mcqs
Trending

Computer Science MCQS – 300+ Latest MCQs

Exams and tests on technology are hot topics for competitive exams. In order to prepare for the exam well, Computer Science MCQs have become necessary. For all competitive exams such as NTS, NAT, GAT, FPSC & PPSC, with computer programming aptitude test questions and answers.

For your ease, we have also added the computer science MCQs with answers pdf as a basic quiz at the end. We feel pleasure to add more and more in the coming days.

Computer Science, Internet & IT MCQs

  1. Basic Computer
  2. IT / Internet
  3. MS Office
  4. Operating Systems
  5. Communication & Networks
  6. Architecture & Organization
  7. C++ Programming
  8. Computer Engineering
  9. Software Engineering
  10. Programming Languages
  11. Security, Privacy & Ethics

1. What component manages the data flow and interaction between the components of a computer processor?

  1.  Accumulator
  2.  Control unit
  3.  Register
  4.  Monitor

2. Web pages are interlinked by using

  1. HTTP
  2. marquee
  3. hyperlinks
  4. internet

3. “IP” is an abbreviation of

  1.  Inner Process
  2.  Internet Program
  3.  Internet Protocol
  4.  Internal process

4. Which of the following is an internet standard communication protocol for email transmission?

  1. FTP
  2. SMTP
  3. SSH
  4. STP

5. “CMS” is an abbreviation of computer software related to

  1.  Content Management System
  2.  Content Modification Software
  3.  Client Management System
  4.  Control Management System

6. Internet uses _____ to communicate between devices and networks.

  1. HTTPS
  2. email
  3. website
  4. internet protocol suite

7. C++ is an object-oriented language, and C, BASIC, and Pascal are _____ languages.

  1.  Procedural
  2. scripting
  3. general purpose
  4. web based

8. The amount of time taken by a device to begin reading data is called

  1.  Seek time
  2.  Read time
  3.  Access time
  4.  Write time

9. The main function of a web server is to store and process

  1. internet
  2. websites
  3. database
  4. programs

10. “Google Language Translator” is an example of the application of

  1. internet
  2. debugging
  3. computer simulations
  4. machine learning

11. Algorithms that improve automatically through experience is known as

  1. computer program
  2. machine learning
  3. computer language
  4. artificial intelligence

12. The basic medium of optical fiber is a fiber that is mostly made of

  1. glass
  2. wood
  3. copper
  4. lead

13. Web pages are interlinked by using

  1. HTTP
  2.  marquee
  3. hyperlinks
  4. slider

14. In peer-to-peer networking,

  1. there is only one server and many clients
  2. there is only one client and many servers
  3. every computer is capable of playing the role of server
  4. every computer is capable of playing the role of client, server or both at the same time

15. URL is an abbreviation for

  1.  Universal Resource Locator
  2.  Uniform Resource Locator
  3.  Universal Resource Location
  4.  Uniform Resource Location

16. The network in which we connect each node to the network along a single piece of network cable is called

  1.  Bus Network Topology
  2.  Star Network Topology
  3.  Ring Network Topology
  4.  None of these

17. The network in which we connect each network node to a central device (hub) is called

  1.  Star Network Topology
  2.  Bus Network Topology
  3.  Ring Network Topology
  4.  None of these

18. FTP is an abbreviation for

  1.  File Transfer Position
  2.  File Transfer Protection
  3.  File Transfer Protocol
  4.  File Transfer Possibility

19. Which operating system is used by most of the supercomputers in the world?

  1.  Windows
  2.  Linux
  3.  Macintosh
  4.  None of these

20. The “Macintosh” computers and laptops are manufactured by

  1.  Apple
  2.  Microsoft
  3.  Samsung
  4.  Lenovo

21. Which variable type can have only two possible values?

  1. integer
  2. string
  3. double
  4. bool

22. IDE is an abbreviation of

  1. Integrated Dual Environment
  2. Inter Development Environment
  3. Integrated Development Environment
  4. Inter Dual Environment

23. C++ is an object-oriented language, and C, BASIC, and Pascal are _____ languages.

  1.  Procedural
  2. scripting
  3. general purpose
  4. web based

24. Which number system is used by computers?

  1.  Digital
  2. decimal
  3. analogue
  4. binary

25. A computer virus that replicates itself is called

  1.  Bug
  2.  Worm
  3.  Bomb
  4.  Hoax

26. The tool used to find a similar word in a document is called

  1.  Finder
  2.  Thesaurus
  3.  Dictionary
  4.  Find and Replace

27. The major language of the World Wide Web (WWW) is

  1. HTML
  2. PHP
  3. ASP.NET
  4.  Java

28. Which computer language is used to design the display of an HTML web page?

  1. PHP
  2.  Java
  3. CSS
  4. ASP.NET

29. “Google Language Translator” is an example of the application of

  1. internet
  2. debugging
  3. computer simulations
  4. machine learning

30. Which of the following components of physical database design refer to the correctness and consistency of data?

  1.  Indexes
  2.  Integrity constraints
  3.  File organization
  4.  Data Distribution strategy

31. conio.h stands for

  1. character input output
  2. console input output
  3. common input output
  4. complex input output

32. Duplication of data in multiple files is called

  1.  Data Redundancy
  2.  Data Dependence
  3.  Data Inconsistency
  4.  None Of These

33. A relation that contains minimal redundancy and allows easy use is called

  1.  Clean
  2.  Simple
  3.  Complex
  4.  Well-Structured

34. SQL stands for

  1.  Structured Query Language
  2.  Sequential Query Language
  3.  Simple Query Language
  4.  None Of These

35. In a program where the user inputs the roll number and the program displays the marks obtained, which of the following is suitable?

  1. for loop
  2. do-while loop
  3. if/ else statement
  4. switch statement

36. In which loop, the loop body executes at least once?

  1. for loop
  2. while loop
  3. do-while loop
  4. none of these

37. Consider the main body of a program,

string a = “4”;

string b = “8”;

string c = a + b;

cout << c << endl;

If the program is run, what will be displayed on the screen?

  1. 4
  2. 8
  3. 12
  4. 48

38. Which register stores the result of ALU operations?

  1. Data Register
  2. Instruction Register
  3. Data Address Register
  4. Accumulator Register

39. A collection of rules for writing programs in a programming language is known as

  1. Syntax
  2. Program logic
  3. Program Standards
  4. None Of These

40. Which one connects two similar network segments?

  1. Router
  2. Bridge
  3. Gateway
  4. Node

41. Which of the following device uses the parallel transmission?

  1. Mouse
  2. Keyboard
  3. Printer
  4. Light Pen

42. What is a diagrammatic way of representing the relationship between the entities in a database?

  1. Flowchart
  2. ERD
  3. DFD
  4. Algorithm

43. In computer science and information technology (IT), DNS is an abbreviation of

  1. Direct Name System
  2. Domain Name System
  3. Direct Name Software
  4. Domain Name Software

44. In C++, the library function exit() causes an exit from the

statement

  1. loop in which it occurs
  2. function in which it occurs
  3. program in which it occurs

45. In C++, a function name must be followed by

  1. braces
  2. parentheses
  3. statement
  4. variable name

46. Which transmission allows data to travel in both directions but only one direction at a time?

  1. Simplex
  2. Full duplex
  3. Half duplex
  4. Reverse

47. Another name for free software is?

  1. Encrypted Software
  2. Copy Protected Software
  3. Shareware
  4. Public Domain Software

48. DPI stands for?

  1. Dot Per Inch
  2. Decimal Per Inch
  3. Digit Per Inch
  4. Data Per Inch

49. A small high-speed memory inside the CPU is

  1. RAM
  2. ROM
  3. Cache
  4. Register

50. ________ are used to evaluate compound conditions.

  1. Arithmetic Operators
  2. Logical Operators
  3. Relational Operators
  4. Assignment Operators

51. Consider the main body of a C++ program,

string var1 = “Computer “;

string var2 = “Science”;

string var3 = var1 + var2;

cout << “var3” << endl;

If the program is run, what will be displayed on the screen?

  1. var3
  2. Computer
  3. Science
  4. Computer Science

52. MICR stands for?

  1. Magic In Character Redo
  2. Magnetic Ink Character Recorder
  3. Magnetic Ink Character Reader
  4. None Of These

53. __________ is used to control all the parts of a manufacturing process.

  1. ATM
  2. CAM
  3. CAD
  4. MICR

54. CPU consists of the following parts:

  1. Control unit and ALU
  2. CU and Main memory
  3. Main memory and ALU
  4. Operating system and Main memory

55. MHz stands for?

  1. Millihertz
  2. Microhertz
  3. Megahertz
  4. None Of These

56. DRAM stands for?

  1. Digital Random Access Memory
  2. Dynamic Random Access Memory
  3. Digital Read Access Memory
  4. Dynamic Read Access Memory

57. In C++, a pointer is

  1. address of a variable
  2. variable for storing addresses
  3. data type of an address variable
  4. constant value

58. What is the statement that displays the address of the variable myvar?

  1. myvar;
  2. &myvar;
  3. cout << myvar;
  4. cout << &myvar;

59. An address is a _____, while a pointer is a _____.

  1. constant, variable
  2. variable, constant
  3. constant, constant
  4. variable, variable

60. The dots that compose the image of a digital photograph are called __________.

  1. Points
  2. Resolution Points
  3. Digital Points
  4. Pixels

61. A type of reader commonly used to read UPC code is __________.

  1. Bar-code reader
  2. Optical-mark reader
  3. Magnetic-ink reader
  4. Both A and C

62. Caps Lock is a:

  1. Window key
  2. Modifier key
  3. Toggle key
  4. Cursor control key

63. GPS stands for?

  1. Global Pointing System
  2. Global Positioning System
  3. Google Positioning System
  4. None Of These

64. Internet surfing is an example of:

  1. Half duplex
  2. Simplex
  3. Full duplex
  4. None Of These

65. The file type #include is called

  1. syntax
  2. operator
  3. header file
  4. string constant

66. To generate different random numbers in C++, which of the following header file(s) must be included?

  1. #include <rand>
  2. #include <cstdlib>
  3. #include <ctime>
  4. #include <cstdlib> and #include <ctime>

67. Analog signal is measured in:

  1. Volt
  2. Hertz
  3. Digits
  4. WATTS

68. _________ uses liquid crystal between the glass plates.

  1. ELD
  2. LCD
  3. CRT
  4. None of These

69. Open System Interconnection(OSI) model consists of _________ layers.

  1. Eight
  2. Six
  3. Seven
  4. Five

70. Which of the following coding schemes uses 4-bit code?

  1. Unicode
  2. ASCII
  3. EBCDIC
  4. BCD

71. Which of the following communication medium requires “line-of-sight”?

  1. Microwave
  2. Fiber-Optic cable
  3. Twisted-Pair cable
  4. Coaxial cable

72. The goto statement causes control to go to a/an

  1. function
  2. operator
  3. variable
  4. label

73. Bundling data and functions together is known as

  1. debugging
  2. encapsulation
  3. overloading
  4. polymorphism

74. _________ is a collection of system programs that controls and coordinates the overall operations of a computer system.

  1. System software
  2. Operating system
  3. Utility program
  4. Device driver

75. The translated program into machine code is called _________.

  1. Source program
  2. Object program
  3. System program
  4. None Of These

76. FormatC is an example of virus _________.

  1. Chernobal
  2. Logic Bomb
  3. Boot Sector
  4. Torjan Horse

77. What type of operating system MS-DOS is?

  1. Command Line Interface
  2. Graphical User Interface
  3. Multitasking
  4. Menu Driven Interface

78. Which of the following keyboard shortcuts is used to change the case?

  1. Ctrl+F3
  2. Alt+F3
  3. Shift+F3
  4. Ctrl+Shift+F3

79. A technique to get a small amount of money illegally from a large financial system is:

  1. Zapping
  2. Data Diddling
  3. Salami
  4. Piggy backing

80. If a legitimate user does not log off from the system, an illegitimate user may be involved in:

  1. Zapping
  2. Trapdoor
  3. Piggy Backing

81. A program placed in a legitimate program for unauthorized and hidden access to the system is called:

  1. Trapdoor
  2. Bomb
  3. Worm
  4. None of these

82. The term that refers to a circular portion of the disk is:

  1. Track
  2. Cylinder
  3. Sector
  4. Machine cycle

83. Which of the following RAID technology is used to improve system performance?

  1. Data striping
  2. Disk mirroring
  3. Tolerant computing
  4. None of these

84. The RAID technology that contributes to fault tolerance is called:

  1. Data striping
  2. Disk mirroring
  3. Tolerant computing
  4. None of these

85. Which of the following function is used to write a string to a file?

  1. fprintf()
  2. puts()
  3. fputs()
  4. printf()

86. Which of the following loop is always executed at least once:

  1. for
  2. while
  3. do while
  4. counter loop

87. After evaluation of expression 5%2 the value is equal to:

  1. 0
  2. 1
  3. 2
  4. 4

88. Which of the following function is used to display output on the screen?

  1. getch()
  2. scanf()
  3. printf()
  4. main()

89. A type of language in which instructions are written in binary form is:

  1. Machine language
  2. High level language
  3. Assembly language
  4. None

90. Which of the following is compiler directive?

  1. #include<stdio.h>
  2. int main()
  3. getch()
  4. All of these

91. Which type of error occurs when the program directs the computer to execute an illegal or undefined operation?

  1. Syntax error
  2. Logical error
  3. Run-time error
  4. None

92. The Annotation symbol in the flow chart indicates:

  1. Input
  2. Process
  3. Remarks
  4. Condition

93. A program syntax error is detected by:

  1. Compiler
  2. Interpreter
  3. Debugger
  4. Both a & b

94. The process of carefully observing the working of an algorithm is called:

  1. Desk Checking
  2. Debugging
  3. Coding
  4. Compiling

95. A set of tests ensure that computer and peripherals are working correctly is called:

  1. Registry
  2. Load
  3. Post
  4. Cold boot

96. The process of transferring data from a storage device to memory is known as:

  1. Boot
  2. Load
  3. Post
  4. Install

97. A process of restarting a computer that is already on is called:

  1. Warm boot
  2. Cold boot
  3. Load
  4. Post

98. The rules for exchanging data between computers are called:

  1. Protocols
  2. Hyperlinks
  3. Procedures
  4. Programs

99. The protocol responsible for routing packets to the correct address is:

  1. HTTP
  2. FTP
  3. TCP
  4. IP

100. At which layer of the OSI Model, Bit synchronization is handled?

  1. Data link
  2. Session
  3. Network
  4. Physical

101. Which of the following Microsoft Products is used to plan tasks?

  1. Excel
  2. Access
  3. Project
  4. PowerPoint

102. The process of training personnel to use the new systems is done during:

  1. Design
  2. Implementation
  3. Development
  4. analysis

103. Which type of diagram shows how information flows through a system?

  1. DFD
  2. Logic flowchart
  3. Decision table
  4. Gantt chart

104. The virus that activates itself every Friday the 13th and erases program files from the disk is called:

  1. Melissa
  2. Cascade
  3. Michelangelo
  4. Jerusalem B

105. Which layer is responsible for flow control and ensuring messages are delivered without error?

  1. Session
  2. Physical
  3. Application
  4. Transport

106. Routers operate at which layer of the OSI Model?

  1.  Network
  2. Transport
  3. Physical
  4. Application

107. An operating system in which all processes are time-bounded uses:

  1. Distributed processing
  2. Time sharing
  3. Real time processing
  4. Batch processing

108. Which type of processing needs very limited or no interaction from the user?

  1. Real time processing
  2. Time Sharing
  3. Batch processing
  4. Distributed processing

109. What is running programs with more than one CPU called?

  1. Multiprocessing
  2. Interrupting
  3. Multitasking
  4. Multi-programming

110. What is the default mode parameter for ofstream?

  1. ios::in
  2. ios::out
  3. ios::binary
  4. both a and b

111. The operator used for dereferencing or indirection is:

  1. &
  2. *
  3. ->
  4. ->>

112. Which of the following creates user groups and assigns privileges to them?

  1. Process management
  2. I/O management
  3. File management
  4. Network management

113. A file that contains data about a single entity is:

  1. Database table
  2. Field
  3. Relation
  4. Record

114. What data file type is used to provide descriptive comments?

  1. Text
  2. Report
  3. Autonumber
  4. Memo

115. Which of the following query is used to change data in existing records?

  1. Update query
  2. Select query
  3. Make table query
  4. Append query

116. CTRL, SHIFT, and ALT are called _____ keys.

  1. Adjustment
  2. Alphanumeric
  3. Modifier
  4. Function

117. Which software can convert document images into text that can be edited in a word processor?

  1. Document imaging
  2. Optical character recognition
  3. Discrete word systems
  4. Continuous word systems

118. The Caps Lock key is a:

  1. Window key
  2. Modifier key
  3. Cursor control key
  4. Toggle key

119. The set of rules to exchange data in a communication network is called:

  1. Token
  2. Gateway
  3. Protocol
  4. Router

120. SDLC stands for:

  1. System development life cycle
  2. System design life cycle
  3. Server design life circle
  4. System development life circle

121. Which of the following is the first phase of SDLC?

  1. System analysis
  2. System development
  3. Initial investigation
  4. Maintenance

122. Which of the following computer program is a mathematical model of a real system?

  1. Transmitter
  2. Spreadsheet
  3. Simulation
  4. Modulation

123. “Google Translator” is an example of the applications of

  1. HTTPS
  2. internet
  3. computer simulations
  4. machine learning

124. How many bytes are occupied by the data type “long double” in a 32-bit system?

  1. 4
  2. 6
  3. 8
  4. 10

125. Which component of a computer holds data or instructions temporarily when they are being processed?

  1. Accumulator
  2. Control unit
  3. Register
  4. Bus

126. At which layer of the OSI Model, IP is implemented?

  1. Data link
  2. Presentation
  3. Network
  4. Transport

127. Which of the following is the bottom layer of the OSI Model?

  1. Application
  2. Presentation
  3. Transport
  4. Physical

128. A communications signal in the form of a continuous wave is called:

  1. Analog
  2. Digital
  3. Modulation
  4. None of these

129. A cell at the fourth column and 20 rows has a cell address:

  1. A20
  2. B20
  3. C20
  4. D20

130. In spreadsheet MS Excel, columns are labeled by:

  1. Numbers
  2. Letters
  3. Alphanumeric
  4. Cell reference

131. In a spreadsheet, MS Excel rows are labeled by?

  1. Numbers
  2. Letters
  3. Alphanumeric
  4. Cell reference

132. Software used to connect a PC and the server of ISP is known as:

  1. ISP’s link
  2. Dial up software
  3. Modem software
  4. Communication software

133. ARPA stands for:

  1. Advance Research Project Agency
  2. American Research Project Agency
  3. Advanced Residential Programming Association
  4. American Residential Programming Association

134. What is the domain name in the following address? name@server.com

  1. name
  2. server
  3. com
  4. server.com

135. Which of the following bus transfers actual data from input devices to memory and from memory to CPU?

  1. Control bus
  2. Address bus
  3. Data bus
  4. System

136. The ASCII coding system can provide _____ different representations.

  1. 16
  2. 32
  3. 64
  4. 256

137. The most widely used code for representing characters in computers is:

  1. BCD
  2. ASCII
  3. EBCDIC
  4. ANSII

138. In which topology a hub (switch) is used?

  1. Ring topology
  2. Star topology
  3. Bus topology
  4. Mesh topology

139. Which combination of keys is used to move back to previous control, while working in forms?

  1. Ctrl+Tab
  2. Shift+Alt
  3. Shift+Tab
  4. Shift+F3

140. Which of the following is the oldest search engine on Internet?

  1. Ask.com
  2. Archie.com
  3. Google.com
  4. Yahoo.com

141. In which topology all nodes are connected to a single cable?

  1. Bus topology
  2. Ring topology
  3. Tree topology
  4. Star topology

142. Which of the following standards were developed without any formal planning?

  1. De Jure
  2. De Facto
  3. ISO
  4. CCIT

143. In which network model do all computers have equal status?

  1. Peer-to-peer
  2. Client-Server
  3. Hybrid
  4. All of these

144. The most recent version of the MAC OS is based on the _____ operating system.

  1. Linux
  2. Unix
  3. Windows
  4. BSD/OS

145. The operating system is the most common type of _____ software.

  1. System
  2. Application
  3. Communication
  4. Freeware

146. The process of copying data from a memory location is known as:

  1. Booting
  2. Hacking
  3. Writing
  4. Reading

147. You can protect your device from hackers by using:

  1. Malware
  2. Antivirus
  3. Firefox
  4. File manager

148. What is the maximum number of columns that can be inserted in MS Word?

  1. 60
  2. 63
  3. 70
  4. 73

149. Which of the following type cannot be attached with email?

  1. pptx
  2. exe
  3. docx
  4. sisx

150. How many bits a bus with 32 data lines can transport at a time?

  1. 8 bits
  2. 16 bits
  3. 32 bits
  4. 64 bits

151. What type of software and operating system is?

  1. Utility software
  2. Firmware software
  3. System software
  4. Application software

152. Which term is related to the database?

  1. Oracle
  2. Php
  3. Java
  4. Assembly

153. Which key is used to close Microsoft Excel?

  1. ALT+F3
  2. ALT+F4
  3. ALT+F5
  4. ALT+F7

154. What is used at the end of a Word document, providing more info about something in your document?

  1. Sidenote
  2. Footer
  3. Footnote
  4. Endnote

155. Which shortcut is used to search for a word in a document?

  1. CTRL+I
  2. CTRL+E
  3. CTRL+F
  4. CTRL+S

156. Conditional formatting feature is used in:

  1. MS Word
  2.  MS Powerpoint
  3. MS Excel
  4. MS Outlook

157. With which sign every formula in MS Excel starts?

  1. +
  2. *
  3. <
  4. =

158. Which shortcut key is used in order to set line spacing at 1.5?

  1. CTRL+5
  2. CTRL+6
  3. CTRL+7
  4. CTRL+8

159. How many distinct operations can be performed if the op-code of a microprocessor consists of 4 bits?

  1. 4
  2. 8
  3. 16
  4. 32

160.What is the interface that provides connections to external devices called?

  1. Expansion slot
  2. Memory slot
  3. Disk controller
  4. Port

161. Which of the following memory devices has sequential access to data?

  1. Magnetic disk
  2. Magnetic tape
  3. Optical memory
  4. Chip memory

162. The most powerful tool to handle memory addresses is:

  1. Arrays
  2. operator
  3. string
  4. pointer

163. The ability to use a function in multiple ways is:

  1. Class
  2. Overloading
  3. Inheritance
  4. Polymorphism

164. Which of the following is NOT a reserved word in C++?

  1. quit
  2. break
  3. exit
  4. continue

165. Which command is used to change the directory in the disk operating system?

  1. CD
  2. CHG DIR
  3. Change directory
  4. Replace directory

166. Which operating system allows the execution of application software on different computers in a network?

  1. Parallel processing operating system
  2. Multi-tasking operating system
  3. Distributed operating system
  4. multi-processor operating system

167. What is the number of default sheets in MS Excel?

  1. 1
  2. 2
  3. 3
  4. 4

168. The protocol which assigns an IP address to a client, connected to the internet  is:

  1. FTP
  2. DHCP
  3. ARP
  4. HTTP

169. Which shortcut key combination is used to select an entire column in Excel?

  1. Ctrl-pagedown
  2. Ctrl-shift
  3. Ctrl-space
  4. Alt-enter

170. Which query is used to add records from a table to another table?

  1. Select query
  2. Update query
  3. Append query
  4. Make Table query

171. Which key combination is used to center align text?

  1. CTRL + B
  2. CTRL + C
  3. CTRL + E
  4. CTRL + Z

172. Does CRT stand for?

  1. Cathode Rays Tube
  2. Clarity Rays Tube
  3. Crystal Rays Tube
  4. None Of These

173. A computer program that translates one statement of program instructions at a time into machine language is called

  1. CPU
  2. Interpreter
  3. Compiler
  4. Simulator

174. What does NTFS stand for?

  1. New Trend File Saving
  2. Network File Saving
  3. New Technology File System
  4. None Of These

175. In MS Windows key F1 is mostly used for

  1. Help
  2. Exit
  3. Save
  4. Refresh

176. 1 Gigabyte is equal to

  1. 1024 bits
  2. 1024 bytes
  3. 1024 kilobytes
  4. 1024 megabytes

177. The most widely used code for representing characters in computers is

  1. ASCII
  2. BCD
  3. EBCDIC
  4. None Of These

178. The type of reader commonly used to read bank cheques is

  1. OPtical-mark reader
  2. Magnetic-ink reader
  3. Bar-code reader
  4. None Of These

179. Which of the following devices stores instructions that help the computer startup?

  1. Keyboard
  2. RAM
  3. ROM
  4. Hard disk

180. The computer can move data and instructions between storage and memory as needed, in a process called

  1. Volatility
  2. Swapping
  3. Pipelining
  4. Exchanging

181. When you press a key, which device notifies the system software?

  1. Keyboard
  2. Keyboard Controller
  3. Keyboard Buffer
  4. Keyboard Handler

182. DOS was introduced by

  1. IBM
  2. Xerox
  3. Microsoft
  4. Bell labs

183. Which of the following operating system is based on open-source software?

  1. UNIX
  2. Windows 2000
  3. Windows NT
  4. Linux

184. The amount of time taken by a device to begin reading data is called

  1. Seek time
  2. Read time
  3. Access time
  4. Write time

185. The RAID technology that contributes to fault tolerance is called

  1. Disk mirroring
  2. Tolerant computing
  3. Data striping
  4. None Of These

186. What does MAN stand for?

  1. Metropolitan Arranged Network
  2. Marked Area Network
  3. Manufactured Arrangements of Networks
  4. Metropolitan Area Network

187. The software used for workgroup computing is called

  1. Shareware
  2. Freeware
  3. Groupware
  4. Both A and B

189. Which of the following standards were developed without any formal planning?

  1. De Facto
  2. De Jure
  3. ISO
  4. Both A and B

190. Which of the following is LAN protocol?

  1.  Ethernet
  2. ARCnet
  3. Token Ring
  4. All

191. Which one is the Bottom-most layer of the OSI model?

  1. Data link
  2. Physical
  3.  Network
  4. Transport

192. Data is transmitted block-by-block in ___________ transmission.

  1. Digital
  2. Analog
  3. Synchronous
  4. Asynchronous

193. An important property of fiber optic is

  1. Refraction
  2. Reflection
  3. Interface
  4. None Of These

194. The process to convert analog signals into digital signals is called

  1.  Modulation
  2.  Demodulation
  3. Digitization
  4. Conversion

195. Which of the following memories can be re-written by using electrical devices?

  1. PROM
  2. ROM
  3. EEPROM
  4. EPROM

196. ___________ virus is a polymorphic virus. Polymorphic means “change nature with passage of time”.

  1. Redlof
  2. Torjan Horse
  3. Chernobal
  4. Logic Bomb

197. Which of the following protocols is used by World Wide Web(www)?

  1. TCP/IP
  2. Ethernet
  3. FTP
  4. HTTP

198. A primary key that consists of more than one attribute is called a

  1. Foreign key
  2. Composite key
  3. Multivalued key
  4. Global key

199. An attribute in the database is also known as

  1. Tuple
  2. Relation
  3. Row
  4. Field

200. C language was developed by

  1. Van Neumann
  2. Dennis Ritchie
  3. Charles Babbage
  4.  John Backus

201. A space in a computer’s memory set aside for some data that can be changed is called

  1. Variable
  2. Constant
  3. Integer
  4. Floating Point

202. Which of the following components is used to convert the first .c to first .exe?

  1. Compiler and header
  2. Header and linker
  3. Compiler and linker
  4. Compiler only

203. Which of the database objects allows to extract specific information from tables?

  1. Queries
  2. Forms
  3. Reports
  4. Records

204. The instructions that are given to the compiler before the beginning of the actual program are:

  1. C statements
  2. Preprocessor directive
  3. Linking instructions
  4. C instructions

205. Which key combination is used to run the C program:

  1. Alt+F9
  2. Ctrl+S
  3. Alt+F5
  4. Ctrl+F9

206. Different attributes in two different tables having the same name are referred to as

  1. Acronym
  2. Synonym
  3. Homonym
  4. Mutually exclusive

207. SQL is a/an

  1. Unstructured language
  2. Structured language
  3. Object oriented language
  4. Software

208. The loop which never ends is called:

  1. Infinite loop
  2. Running loop
  3. Continuous loop
  4. Nested loop

209. Another term for a conditional operator is:

  1. Binary
  2. Iteration
  3. Selective
  4. Ternary

210. The total number of keywords in C are:

  1. 60
  2. 42
  3. 32
  4. 50

211. What does CIM stand for?

  1. Computer Integrated Manufacturing
  2. Copy In Memory
  3. Computer International Management
  4. Computer Intel Marketing

212. Which register normally functions as a 16-bit counter that controls the sequence in which the instructions are fetched from memory?

  1. PC
  2. IR
  3. DR
  4. DAR

213. Access time for most memories is measured in:

  1. Microseconds
  2. Milliseconds
  3. Nanoseconds
  4. Megahertz

214. A database consists of various components called:

  1. Tools
  2. Properties
  3. Entities
  4. Objects

215. Which of the following terms is related to the features of cascading deletion?

  1. Data integrity
  2. Data redundancy
  3. Referential integrity
  4. Indexing

216. What does ATM stand for?

  1. Automatic Talking Machine
  2. Automatic Teller Machine
  3. Analog Teller Machine
  4. Automatic Ticketing Machine

217. Who is known as the “Father of Computer Science”?

  1. Charles Babbage
  2. Howard Aiken
  3. Dr.Herman Hollerith
  4. Blaise Pascal

218. One of the first recognized calculating devices was?

  1. Abacus
  2. Analytical engine
  3. Difference engine
  4. None of these

219. Pentium II is a __________ generation computer.

  1. second
  2. third
  3. fourth
  4. fifth

220. The first computer that used vacuum tubes was?

  1. Mark I
  2. ENIAC
  3. EDVAC
  4. UNIVAC

221. Which of the following is not a pointing device?

  1. Mouse
  2. Joystick
  3. Trackball
  4. None of these

222. The number of reading/write heads for a hard disk of four platters are

  1. 4
  2. 6
  3. 8
  4. 16

223. Which of the following is a 16-bit code?

  1. BCD
  2. Unicode
  3. ASCII
  4. EBCDIC

224. Boolean algebra is also known as?

  1. Logical algebra
  2. Code algebra
  3. Switching algebra
  4. Digital algebra

225. The command that is not present on the edit menu?

  1. Font
  2. GoTo
  3. Find
  4. Ctrl+z

226. Does first-generation language use?

  1. Pseudo code
  2. Binary code
  3. Mnemonics code
  4. Decimal code

227. In which of the flowchart symbols, the statement “IS A > B” is placed?

  1. Connector
  2. Rectangular
  3. Parallelogram
  4. Diamond

228. Name the error which you think exists in the formula C=C*D/C.

  1. Logical
  2. Syntax
  3. Execution
  4. None of these

229. Which of the following statements transfers control unconditionally?

  1. GOTO
  2. FOR…NEXT
  3. IF THEN
  4. ON GOTO

230. The statement to reserve memory locations for an array M arranged in 12 columns and 20 rows maybe?

  1. DIM(12,20)
  2. DIMM(20,12)
  3. M(240)
  4. DIMM(12,20)

231. On execution of PRINT FIX(-6.83), the output will be?

  1. 6
  2. 6.83
  3. –6
  4. –7

233. In BASIC, LOG function refers to natural logarithm have Base?

  1. 2
  2. 10
  3. 5
  4. e

234. An 8-bit address bus can address memory of?

  1. 1 Byte
  2. 8 Bytes
  3. 256 bits
  4. 256 Bytes

235. The number of colors a CGA monitor displays are?

  1. 4
  2. 16
  3. 64
  4. 256

236. The radix of a computerized version of the number (+0.66E–4) is?

  1. 4
  2. 6
  3. 2
  4. 8

237. The programs which are permanent and stored in ROM are known as?

  1. Utility Programs
  2. Firmware
  3. System softwares
  4. None of these

238. UNIVAC stands for?

  1. Universal Automatic Computer
  2. Universal Array Computer
  3. Unvalued Automatic Computer
  4. Unique Automatic Computer

239. File compression utilities can reduce the file size by?

  1. 10%
  2. 60%
  3. 80%
  4. 100%

240. The “NT” in Windows NT stands for?

  1. Not Tested
  2. Network Technology
  3. Network Terminal
  4. New Technology

241. In C language, the .exe file is produced by?

  1. Linker
  2. Loader
  3. Compiler
  4. Interpreter

242. Which of the following is a valid statement for declaring a Variable In C?

  1. Int marks;
  2. int a,b,c;
  3. double salary;
  4. All of these

243. The number of Bytes used by char data type in C is?

  1. 2
  2. 1
  3. 3
  4. 4

244. The format specifier %u is used for?

  1. Integer
  2. unsigned short
  3. unsigned float
  4. unsigned long int

245. Which of the following objects are used to store data in MS Access?

  1. Reports
  2. Queries
  3. Forms
  4. Table

246. Which number system is usually followed in a typical 32-bit computer?

  1. Binary
  2. Decimal
  3. Hexadecimal
  4. Octal

247. Operating system, editors, and debuggers come under?

  1. System software
  2. Application software
  3. Utilities
  4. None of these

248. When did John Napier develop logarithm?

  1. 1416
  2. 1614
  3. 1641
  4. 1804

249. Which of the following tools of MS Word is used to rotate the text?

  1. Word Art
  2. Auto Shape
  3. Text Boxes
  4. None of these

250. Which of the following features of the word processor allows specifying margins of the documents?

  1. Marco
  2. Thesaurus
  3. Merge
  4. Layout

251. Which of the following devices can be used to directly image printed text?

  1. OCR
  2. OMR
  3. MICR
  4. All of these

252. The popular series of personal computers was the Apple series designed in 1976 using __________ microprocessor.

  1. 8-bit
  2. 16-bit
  3. 64-bit
  4. None of these

253. Who designed the first electronic computer-ENIAC?

  1. Van-Neumann
  2. Joseph M.Jacquard
  3. J.Presper Eckert and John W. Mauchly
  4. All of these

254. In the latest generation computers, the instructions are executed?

  1. Parallel
  2. Sequentially
  3. Both A and B
  4. Randomly

255. Web pages are linked together using?

  1. HTTP
  2. Hyperlinks
  3. Interlinks
  4. None of these

256. A CPU with a 32-bit Address Bus can address memory of?

  1. 4 KB
  2. 4 GB
  3. 8 KB
  4. 8 GB

257. In BASIC, LEFT(A$,n) is used to?

  1. Leave n spaces before the strung A$
  2. Leave n spaces before every character of the strung A$
  3. Leave n left characters of the strung A$
  4. Select n characters of the strung A$

258. In BASIC, RETURN statement passes control back to?

  1. GOSUB statement
  2. Next to GOSUB statement
  3. Beginning of the program
  4. The statement before GOSUB

259. The number of elements assigned automatically to a two-dimensional array in BASIC is?

  1. 10
  2. 100
  3. 110
  4. 121

260. Which of the following statements can be used for multiple branching?

  1. GOTO
  2. IF THEN ELSE
  3. ON GOTO
  4. WHILE…WEND

261. Which of the following statements can be used for unlimited looping?

  1. GOTO
  2. FOR…NEXT
  3. IF THEN
  4. ON GOTO

262. Which of the following command is used to exit from BASIC and to return to DOS?

  1. CLEAR
  2. KILL
  3. SYSTEM
  4. NEW

263. A number of Shutdown options on Windows 2000 professional are?

  1. 2
  2. 3
  3. 4
  4. 5

264. The number of items present on the control panel depends upon?

  1.  Items install during Setup
  2.  Items contained on Windows CD
  3.  Items required by your system
  4.  Hardware Items attached with the system

265. The number of actions with two buttons mouse is?

  1. 6
  2. 5
  3. 4
  4. 3

266. Which of the following is a DOS Internal Command?

  1. DELTREE
  2. ERASE
  3. FORMAT
  4. None of these

267. Which of the following is not an executable command?

  1. CLS
  2. REN
  3. REM
  4. COPY

268. An OR operation has 4 variables, the possible number of combinations in its truth table is?

  1. 64
  2. 16
  3. 34
  4. 32

269. By default, Word automatically saves your document after every?

  1. 5 minutes
  2. 10 minutes
  3. 15 minutes
  4. 20 minutes

270. Pressing Ctrl+Shift+A causes?

  1. To select whole document
  2. To highlight the selected text
  3. To capitalize the selected text
  4. Office assistant to appear

271. Pressing Ctrl+Shift+D causes?

  1. To delete the selected text
  2. To underline selected text
  3. To double underline the selected text
  4. None of these

272. The number of colors a VGA monitor displays are?

  1. 16
  2. 256
  3. 64
  4. 4

273. The device driver is an example of?

  1. System software
  2. Application software
  3. Freeware
  4. Shareware

274. A standard keyboard used in personal computers?

  1. 80 keys
  2. 84 keys
  3. 101 keys
  4. 102 keys

275. Which of the following layers of the OSI model is responsible for breaking data into segments?

  1. Presentation
  2. Transport
  3. Datalink
  4. Session

276. The Media Access Control sublayer resides in which layer?

  1. Datalink
  2. Physical
  3. Network
  4. Transport

277. Which of the following coding schemes uses 4-bit code?

  1. Unicode
  2. ASCII
  3. EBCDIC
  4. BCD

278. Satellite transmission stations that can both send and receive messages are known as?

  1. Transreceivers
  2. Receivers
  3. Earth Stations
  4. Transmitters

279. Which of the following tools of MS Word is used to rotate the text?

  1. Word Art
  2. Auto Shape
  3. Text Boxes
  4. None of these

280. Which of the following features of the word processor allows to specify margins of the documents?

  1. Marco
  2. Thesaurus
  3. Merge
  4. Layout

281. Which of the following devices can be used to directly image printed text?

  1. OCR
  2. OMR
  3. MICR
  4. All of these

282. The popular series of personal computers was the Apple series designed in 1976 using __________ microprocessor.

  1. 8-bit
  2. 16-bit
  3. 64-bit
  4. None of these

283. Who designed the first electronic computer-ENIAC?

  1. Van-Neumann
  2. Joseph M.Jacquard
  3. J.Presper Eckert and John W. Mauchly
  4. All of these

284. In the latest generation computers, the instructions are executed?

  1. Parallel
  2. Sequentially
  3. Both A and B
  4. Randomly

285. Web pages are linked together using?

  1. HTTP
  2. Hyberlinks
  3. Interlinks
  4. None of these

286. A CPU with a 32-bit Address Bus can address memory of?

  1. 4 KB
  2. 4 GB
  3. 8 KB
  4. 8 GB

287. In BASIC, LEFT(A$,n) is used to?

  1. Leave n spaces before the strung A$
  2. Leave n spaces before every character of the strung A$
  3. Leave n left characters of the strung A$
  4. Select n characters of the strung A$

288. In BASIC, RETURN statement passes control back to?

  1. GOSUB statement
  2. Next to GOSUB statement
  3. Beginning of the program
  4. The statement before GOSUB

289. The number of elements assigned automatically to two-dimensional arrays in BASIC is?

  1. 10
  2. 100
  3. 110
  4. 121

290. Which of the following statements can be used for multiple branching?

  1. GOTO
  2. IF THEN ELSE
  3. ON GOTO
  4. WHILE…WEND

291. Which of the following statements can be used for unlimited looping?

  1. GOTO
  2. FOR…NEXT
  3. IF THEN
  4. ON GOTO

292. Which of the following command is used to exit from BASIC and to return to DOS?

  1. CLEAR
  2. KILL
  3. SYSTEM
  4. NEW

293. The number of Shutdown options on Windows 2000 professionals is?

  1. 2
  2. 3
  3. 4
  4. 5

294. The number of items present on the control panel depends upon?

  1. Items install during Setup
  2. Items contained on Windows CD
  3. Items required by your system
  4. Hardware Items attached with the system

295. The number of actions with two buttons mouse is?

  1. 6
  2. 5
  3. 4
  4. 3

296. Which of the following is a DOS Internal Command?

  1. DELTREE
  2. ERASE
  3. FORMAT
  4. None of these

297. Which of the following is not an executable command?

  1. CLS
  2. REN
  3. REM
  4. COPY

298. An OR operation has 4 variables, the possible number of combinations in its truth table is?

  1. 64
  2. 16
  3. 34
  4. 32

299. According to Absorption Law A+(A.B) is equal to?

  1. 1+B
  2. AB
  3. A+1
  4. A

300. The number of tracks in one cylinder of a hard dick with two platters is?

  1. 4
  2. 8
  3. 16
  4. 32

301. A translator is a?

  1. System Software
  2. Low-Level language
  3. Translating machine
  4. Application Software

302. CRAY-1, CRAY-2, and CYBER 205 are examples of?

  1. Mainframes
  2. Supercomputers
  3. Microcomputers
  4. Minicomputers

303. IBM PC, AT&T, PS/2, and Apple Macintosh are examples of?

  1. Supercomputers
  2. Minicomputers
  3. Microcomputers
  4. Mainframes

304. In 1786, J.H. Muller proposed a calculating machine called a?

  1. Analytical Engine
  2. Difference Engine
  3. Electronic Engine
  4. None of these

305. Which of the following is called the first generation computer?

  1. ENIAC
  2. ABACUS
  3. UNIVAC-1
  4. EDVAC

306. Which of the following software products is the most appropriate for developing web pages?

  1. Adobe Page Maker
  2. Arcsoft
  3. Corel Draw
  4. Dreamweaver

307. Which of the following codes used in present-day computing was developed by IBM Corporation?

  1. ASCII
  2. Hollerith code
  3. Baudot code
  4. EBCDIC code

308. The ALU of a computer responds to the commands coming from?

  1.  Primary Memory
  2.  Control Section
  3.  External Memory
  4.  Cache Memory

309. In Microsoft Windows, key F1 is mostly used for?

  1.  Help
  2.  Exit
  3.  Save
  4.  Refresh

310. The operating system may perform __________ operation to manage the memory while running a large program.

  1.  Sorting
  2. Scheduling
  3.  Paging
  4.  None of these

311. Octal 6 is equal to __________ decimal.

  1. 14
  2. 16
  3. 15
  4. 13

312. In the decimal system, the base is?

  1. 1
  2. 0
  3. 2
  4. 10

313. Which logic gate is similar to the function of two series switches?

  1. NOR
  2. OR
  3. AND
  4. NAND

314. Does remote computing service involve the use of time-sharing and?

  1.  Multiprocessing
  2.  Interactive processing
  3.  Batch processing
  4.  Real-time processing

315. A combination of 16-bits is called?

  1.  Word
  2.  Nibble
  3.  Memory Block
  4.  Byte

316. In the OSI network model, the dialogue control and token management are the responsibility of?

  1.  Data link layer
  2.  Session layer
  3.  Transport layer
  4.  None of these

317. In the OSI network model, the routing is performed by?

  1.  Network layer
  2.  Data link layer
  3.  Transport layer
  4.  Session layer

318. The transmission signal coding method of the TI carrier is called?

  1.  Binary
  2. NRZ
  3.  Bipolar
  4.  Manchester

319. CTRL, SHIFT, and ALT are called _____ keys.

  1.  Adjustment
  2.  Alphanumeric
  3.  Modifier
  4.  Function

320. Which software can convert document images into text that can be edited in a word processor?

  1.  Document imaging
  2.  Optical character recognition
  3.  Discrete word systems
  4.  Continuous word systems

321. The Caps Lock key is a:

  1.  Window key
  2.  Modifier key
  3.  Cursor control key
  4.  Toggle key

322. Which of the following computer program is a mathematical model of a real system?

  1.  Transmitter
  2.  Spreadsheet
  3.  Simulation
  4.  Modulation

323. How many bytes are occupied by the data type “long double” in a 32-bit system?

  1. 4
  2. 6
  3. 8
  4. 10

324. Which component of a computer holds data or instructions temporarily when they are being processed?

  1.  Accumulator
  2.  Control unit
  3.  Register
  4.  Bus

325. The process of copying data from a memory location is known as:

  1.  Booting
  2.  Hacking
  3.  Writing
  4.  Reading

326. You can protect your device from hackers by using:

  1.  Malware
  2.  Antivirus
  3.  Firefox
  4.  File manager

327. How many bits a bus with 32 data lines can transport at a time?

  1. 8 bits
  2. 16 bits
  3. 32 bits
  4. 64 bits

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker