Basic Computer MCQs-4
01 . Approximately how many bytes make one megabyte?
- (A) One thousand
- (B) Ten thousand
- (C) One hundred
- (D) One million
- (E) None of these
Ans: (D)
2 . What is MP3?
- (A) A mouse
- (B) A printer
- (C) A sound format
- (D) A scanner
- (E) None of these
Ans: (C)
3 . All the deleted files go to_____________
- (A) Recycle Bin
- (B) Task Bar
- (C) Tool Bar
- (D) My Computer
- (E) None of these
Ans : (A)
4 . ……… this is the act of copying or downloading a program from a network and making multiple copies of it.
- (A) Network piracy
- (B) Plagiarism
- (C) Software piracy
- (D) Site-license piracy
- (E) None of these
Ans: (C)
5 . A directory within a directory is called—
- (A) Mini Directory
- (B) Junior Directory
- (C) Part Directory
- (D) Sub Directory
- (E) None of these
Ans : (D)
6 . In MICR, C stands for ……….
- (A) Code
- (B) Colour
- (C) Computer
- (D) Character
- (E) None of these
Ans: (D)
7 . Fax machines and imaging systems are examples of—
- (A) Bar-code readers
- (B) Imaging systems
- (C) Scanning devices
- (D) Pen-based systems
- (E) None of these
Ans : (B)
8 . When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
- (A) Dictionary
- (B) Word finder
- (C) Encyclopaedia
- (D) Thesaurus
- (E) None of these
Ans: (A)
9 . A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
- (A) Read-only
- (B) Memory-only
- (C) Run-only
- (D) Write-only
- (E) None of these
Ans : (A)
10 . In an information system, alphanumeric data normally takes the form of—
- (A) Sentences and paragraphs
- (B) Numbers and alphabetical characters
- (C) Graphic shapes and figures
- (D) Human voice and other sounds
- (E) None of these
Ans : (B)
11 . A Website’s main page is called its—
- (A) Home page
- (B) Browser page
- (C) Search place
- (D) Bookmark
- (E) None of these
Ans : (A)
12 . When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
- (A) Programming software
- (B) System hardware
- (C) Applications hardware
- (D) Applications software
- (E) None of these
Ans : (A)
13 . A collection of interrelated files in a computer is a—
- (A) File manager
- (B) Field
- (C) Record
- (D) Database
- (E) None of these
Ans : (D)
14 . A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
- (A) Server
- (B) Mainframe
- (C) Desktop
- (D) Tablet
- (E) None of these
Ans : (B)
15 . The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as____________
- (A) A roller ball which moves the cursor
- (B) A pen-shaped device which allows data to be entered through the CRT screen
- (C) A figure which resembles a familiar office device
- (D) An out-dated input device
- (E) None of these
Ans : (A)
16 . Various applications and documents are represented on the Windows desktop by—
- (A) Symbols
- (B) Labels
- (C) Graphs
- (D) Icons
- (E) None of these
Ans : (D)
17 . What is usually used for displaying information at public places?
- (A) Monitors
- (B) Overhead Projections
- (C) Monitors and Overhead Projections
- (D) Touch Screen Kiosks
- (E) None of these
Ans : (D)
18 . The real business and competitive value of information technology lies in—
- (A) The software applications that are used by many companies
- (B) The capabilities of the software and value of the information a business acquires and uses
- (C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
- (D) The capabilities of the hardware and the speed at which it processes information
- (E) None of these
Ans: (B)
19 . Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves?
- (A) Open source vendors
- (B) Alliances
- (C) Application service providers
- (D) All of the above
- (E) None of these
Ans: (C)
20 . Which one of the following would be considered as a way that a computer virus can enter a computer system?
- (A) Opening an application previously installed on the computer
- (B) Borrowed copies of software
- (C) Viewing a website without causing any additional transactions
- (D) Running antivirus programs
- (E) None of these
Ans : (B)
21 . Collecting personal information and effectively posing as another individual is known as the crime of—
- (A) Spooling
- (B) Density theft
- (C) Spoofing
- (D) Hacking
- (E) None of these
Ans : (B)
22 . The first step in the transaction processing cycle is___________
- (A) Database operations
- (B) Audit
- (C) Data entry
- (D) User inquiry
- (E) None of these
Ans : (C)
23. In the information systems concept, the output function involves__________
- (A) Capturing and assembling elements that enter the system to be processed
- (B) Transformation processes that convert input into output
- (C) Transferring elements that have been produced by a transformation process to their ultimate destination
- (D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
- (E) None of these
Ans : (A)
24. Which is the best definition of a software package?
- (A) An add-on for your computer such as additional memory
- (B) A set of computer programs used for a certain function such as word processing
- (C) A protection you can buy for a computer
- (D) The box, manual and license agreement that accompany commercial software
- (E) None of these
Ans : (B)
25. Which key is used in combination with another key to perform a specific task?
- (A) Function
- (B) Control
- (C) Arrow
- (D) Space bar
- (E) None of these
Ans: (B)