Basic Computer MCQs-4

Basic Computer MCQs-4

01 . Approximately how many bytes make one megabyte?

  • (A) One thousand
  • (B) Ten thousand
  • (C) One hundred
  • (D) One million
  • (E) None of these

Ans: (D)

2 . What is MP3?

  • (A) A mouse
  • (B) A printer
  • (C) A sound format
  • (D) A scanner
  • (E) None of these

Ans: (C)

3 . All the deleted files go to_____________

  • (A) Recycle Bin
  • (B) Task Bar
  • (C) Tool Bar
  • (D) My Computer
  • (E) None of these

Ans : (A)

4 . ……… this is the act of copying or downloading a program from a network and making multiple copies of it.

  • (A) Network piracy
  • (B) Plagiarism
  • (C) Software piracy
  • (D) Site-license piracy
  • (E) None of these

Ans: (C)

5 . A directory within a directory is called—

  • (A) Mini Directory
  • (B) Junior Directory
  • (C) Part Directory
  • (D) Sub Directory
  • (E) None of these

Ans : (D)

6 . In MICR, C stands for ……….

  • (A) Code
  • (B) Colour
  • (C) Computer
  • (D) Character
  • (E) None of these

Ans: (D)

7 . Fax machines and imaging systems are examples of—

  • (A) Bar-code readers
  • (B) Imaging systems
  • (C) Scanning devices
  • (D) Pen-based systems
  • (E) None of these

Ans : (B)

8 . When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.

  • (A) Dictionary
  • (B) Word finder
  • (C) Encyclopaedia
  • (D) Thesaurus
  • (E) None of these

Ans: (A)

9 . A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—

  • (A) Read-only
  • (B) Memory-only
  • (C) Run-only
  • (D) Write-only
  • (E) None of these

Ans : (A)

10 . In an information system, alphanumeric data normally takes the form of—

  • (A) Sentences and paragraphs
  • (B) Numbers and alphabetical characters
  • (C) Graphic shapes and figures
  • (D) Human voice and other sounds
  • (E) None of these

Ans : (B)

11 . A Website’s main page is called its—

  • (A) Home page
  • (B) Browser page
  • (C) Search place
  • (D) Bookmark
  • (E) None of these

Ans : (A)

12 . When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.

  • (A) Programming software
  • (B) System hardware
  • (C) Applications hardware
  • (D) Applications software
  • (E) None of these

Ans : (A)

13 . A collection of interrelated files in a computer is a—

  • (A) File manager
  • (B) Field
  • (C) Record
  • (D) Database
  • (E) None of these

Ans : (D)

14 . A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.

  • (A) Server
  • (B) Mainframe
  • (C) Desktop
  • (D) Tablet
  • (E) None of these

Ans : (B)

15 . The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as____________

  • (A) A roller ball which moves the cursor
  • (B) A pen-shaped device which allows data to be entered through the CRT screen
  • (C) A figure which resembles a familiar office device
  • (D) An out-dated input device
  • (E) None of these

Ans : (A)

16 . Various applications and documents are represented on the Windows desktop by—

  • (A) Symbols
  • (B) Labels
  • (C) Graphs
  • (D) Icons
  • (E) None of these

Ans : (D)

17 . What is usually used for displaying information at public places?

  • (A) Monitors
  • (B) Overhead Projections
  • (C) Monitors and Overhead Projections
  • (D) Touch Screen Kiosks
  • (E) None of these

Ans : (D)

18 . The real business and competitive value of information technology lies in—

  • (A) The software applications that are used by many companies
  • (B) The capabilities of the software and value of the information a business acquires and uses
  • (C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
  • (D) The capabilities of the hardware and the speed at which it processes information
  • (E) None of these

Ans: (B)

19 . Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves?

  • (A) Open source vendors
  • (B) Alliances
  • (C) Application service providers
  • (D) All of the above
  • (E) None of these

Ans: (C)

20 . Which one of the following would be considered as a way that a computer virus can enter a computer system?

  • (A) Opening an application previously installed on the computer
  • (B) Borrowed copies of software
  • (C) Viewing a website without causing any additional transactions
  • (D) Running antivirus programs
  • (E) None of these

Ans : (B)

21 . Collecting personal information and effectively posing as another individual is known as the crime of—

  • (A) Spooling
  • (B) Density theft
  • (C) Spoofing
  • (D) Hacking
  • (E) None of these

Ans : (B)

22 . The first step in the transaction processing cycle is___________

  • (A) Database operations
  • (B) Audit
  • (C) Data entry
  • (D) User inquiry
  • (E) None of these

Ans : (C)

23. In the information systems concept, the output function involves__________

  • (A) Capturing and assembling elements that enter the system to be processed
  • (B) Transformation processes that convert input into output
  • (C) Transferring elements that have been produced by a transformation process to their ultimate destination
  • (D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
  • (E) None of these

Ans : (A)
24. Which is the best definition of a software package?

  • (A) An add-on for your computer such as additional memory
  • (B) A set of computer programs used for a certain function such as word processing
  • (C) A protection you can buy for a computer
  • (D) The box, manual and license agreement that accompany commercial software
  • (E) None of these

Ans : (B)
25. Which key is used in combination with another key to perform a specific task?

  • (A) Function
  • (B) Control
  • (C) Arrow
  • (D) Space bar
  • (E) None of these

Ans: (B)