CoMpUtER's MCQ .......................
1. __________ is the capability to continue as if nothing has happened, even after a major component failure.
1) redundancy 2) interoperability 3) fault tolerance 4) backup5) None of these
Ans.) 3
2. Striping with parity is also known as RAID __________.
1) 0 2) 1 3) 4 4) 6 5) all of the above
Ans.) 3
3. A storage device that is connected directly to a network is an example of __________.
1) network attached storage 2) storage area network3) direct attached storage 4) RAID 5) None of these
Ans.) 1
4. A tape library will use a robotic component called a(n) __________ to change and store multiple tape cartridges.
1) RAID 2) backup device 3) redundant s ystem 4) auto loader 5) None of these
Ans.) 4
5. More than one of the same component is an example of a __________ system.
1) scalable 2) redundant 3) RAID 4) back-up 5) None of these
Ans.) 2
6. _______ is a first-generation cellular phone system.
1) AMPS 2) D-AMPS3) GSM 4) none of the above 5) None of these
Ans.) 1
7. __________ is a second-generation cellular phone system.
1) AMPS 2) D-AMPS 3) GSM 4) none of the above 5) all of the above
Ans.) 2
8. ____________ is a digital version of AMPS.
1) GSM 2) D-AMPS 3) IS-95 4) none of the above 5) all of the above
Ans.) 2
9. ___________ is a second-generation cellular phone system used in Europe.
1) GSM 2) D-AMPS 3) IS-95 4) all of the above 5) none of the above
Ans.) 1
10. The __________ cellular phone system will provide universal personal communication.
1) first-generation 2) second-generation 3) third-generation 4) all of the above 5) none of the above
Ans.) 3
11 Computer can not do anything without a
1) Chip 2) Memory 3) Output device 4) Program 5) None of these
Ans.) 4
12 A process known as ______is used by large retailers to study trends.
1) data mining 2) data selection 3) POS 4) data conversion 5) None of these
Ans.) 1
13 Which generation of computers is covered by the period 1964-77?
1) First 2) Second 3) Third 4) Forth 5) None of these
Ans.) 3
14 __________ is data that has been organized or presented in a meaningful fashion.
1) A process 2) Software 3) Storage 4) Information 5) None of these
Ans.) 4
15. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
1) Data 2) Point-of-sale 3) Sales 4) Query 5) None of these
Ans.) 2
16. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
1) PSS 2) POS 3) inventory 4) data mining 5) None of these
Ans.) 1
17. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
1) robotics 2) simulation 3) computer forensics 4) animation 5) None of these
Ans.) 3
18. Which of the following is not one of the four major data processing functions of a computer?
1) gathering data 2) processing data into information 3) analyzing the data or information 4) storing the data or information5) None of these
Ans.) 3
19. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements
1) POS 2) RFID 3) PPS 4) GPS 5) None of these
Ans.) 2
20. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as
1) robotics 2) computer forensics 3) simulation 4) forecasting5) None of these
Ans.) 1
21. Technology no longer protected by copyright, available to everyone, is considered to be:
1) proprietary 2) open 3) experimental 4) in the public domain 5) None of these
Ans.) 1
22 All of the following are examples of real security and privacy risks except
1) hackers 2) spam 3) viruses 4) identity theft 5) None of these
Ans.) 2
23 ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
1) Nanoscience 2) Microelectrodes 3) Computer forensics 4) Artificial intelligence 5) None of these
Ans.) 1
24 ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
1) Nanoscience 2) Nanotechnology 3) Simulation 4) Artificial intelligence 5) None of these
Ans.) 4
25 The name for the way that computers manipulate data into information is called 1) programming 2) processing 3) storing 4) organizing 5) None of these
Ans.) 2
26 An e-mail address typically consists of a user ID followed by the ____ sign and the name of the e-mail server that manages the user’s electronic post office box.
1) @ 2) # 3) & 4) * 5) None of these
Ans.) 1
27 Software applies ____ also called algorithms, to process data.
1) arithmetic 2) procedures 3) objects 4) rules 5) None of these
Ans.) 1
28 A file extension is separated from the main file name with a(n) ____ but no spaces.
1) question mark 2) exclamation mark 3) underscore 4) period 5) None of these
Ans.) 4
29 An ad hoc query is a—
1) pre-planned question 2) pre-scheduled question 3) spur-of-the moment question 4) question that will not return any results 5) None of these
Ans.) 3
30 A Web ……… consists of one or more Web pages located on a Web server.
1) hub 2) site 3) story 4) template5) None of these
Ans.) 2
31 A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
1) worm 2) virus 3) trojan horse 4) phishing scam 5) None of these
Ans.) 2
32 The desktop contains small graphics calledé
1) windows 2) logos 3) icons 4) pictures 5) None of these
Ans.) 3
33. C, BASIC, COBOL, and Java are examples of ______ languages
1) low-level 2) computer 3) system programming 4) high-leve 5) None of these
Ans.) 4
34 A(n) _______ camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
1) digital 2) analog 3) classic 4) film 5) None of these
Ans.) 1
35 _____ makes it possible for shoppers to make purchases using their computers.
1) E-world 2) Ecommerce 3) E-spend 4) E-business 5) None of these
Ans.) 4
36 A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself,
1) worm 2) virus3) trojan horse 4) phishing scam 5) None of these
Ans.) 2
37 The desktop contains small graphics calledé
1) windows 2) logos 3) icons 4) pictures 5) None of these
Ans.) 3
38 C, BASIC, COBOL, and Java are examples of ______ languages
1) low-level 2) computer 3) system programming 4) high-level 5) None of these
Ans.) 4
39 A(n) _______ camera is a peripheral device used to capture still images in a digital format that can
1) digital 2) analog 3) classic 4) film 5) None of these
Ans.) 1
40 _____ makes it possible for shoppers to make purchases using their computers
1) E-world 2) Ecommerce 3) E-spend 4) E-business 5) None of these
Ans.) 4
41. An Internet connection require
1) a personal computer 2) a modem 3) a dial-up telephone line 4) software to operate 5) all the above
Ans.) 5
42 The Boolean operators of the Internet are
1) And 2) OR 3) N and 4) Nor 5) all of the above
Ans.) 5
43 ICMP stands for
1) Intranet Control Message Protocol 2) Internet Control Message Protocol3) Information Control Master Protocol 4) internet communication message protocol5) None of the above
Ans.) 1
44. CRC stands for
1) Cyclic Read Check 2) Cyclic Redundancy Check 3) Cyclic Replicate Check 4) control message control 5) None of the above
Ans.) 2
45. The Java program file extension is
1) .jav 2) .java 3) .ja 4) .jvm 5) None of the above
Ans.) 2
46. The first mechanical computer designed by Charles Babbage was called
1) Abacus 2) Processor 3) Calculator 4) Analytical Engine5) None of these
Ans.) 4
47. The motherboard is the—
1) circuit board that houses peripheral devices 2) same as the CPU chip 3) the first dup that is accessed when the computer is turned on 4) circuit board that contains a CPU and other chips 5) None of these
Ans.) 4
48. The transformation of a message into an encoded form is known as
1) Mnemonics 2) Encoding 3) Encryption 4) Decoding 5) None of these
Ans.) 2
49 Which is device that interconnect two or more network, enabling data transfer to be made between them
1) Plotter 2) Joystick 3) Gateway 4) Path 5) None of these
Ans.) 3
50 Which of the following is directory controlled from a keyboard.
1) Card punch 2) punched paper tape 3) Magnetic disk 4) Magnetic tape 5) None of these
Ans.) 1
Comments