Basic Computer MCQs-6
1. Which of the following is not an advantage of magnetic disk storage?
- (A)The access time of magnetic disk is much less than that of magnetic tape
- (B)Disk storage is longer lasting than magnetic tape
- (C)Disk storage is less expensive than tape storage
- (D)None of the above
ANSWER: (D)
2. A prefix for billion which is equal to _____is called as billi.
- (A) 100
- (B) 10000
- (C) 1000
- (D) 10
ANSWER: (A)
3. One kilobyte -byte
- (A) 1250
- (B) 2088
- (C) 1024
- (D) 1000
ANSWER: (C)
4. To move the cursor to the end of the document
press
- (A) Ctrl + Esc
- (B) Ctrl + End
- (C) Ctrl + B
- (D) Ctrl + C
ANSWER: (B)
5. The shortcut key to print documents is
- (A) Ctrl + A
- (B) Ctrl + B
- (C) Ctrl + P
- (D) Ctrl + C
ANSWER: (C)
6. In MICR, C stands for
- (A) Code
- (B) Colour
- (C) Computer
- (D) Character
- (E) None of these
ANSWER: (D)
7. The simultaneous processing of two or more Programs by multiple processors is
- (A) Multiprogramming
- (B) Multitasking
- (C) Time-sharing
- (D) Multiprocessing
- (E) None of these
ANSWER: (D)
8. First layer in the OSI reference model is
- (A) Data link
- (B) Network
- (C) Physical
- (D) Application
ANSWER: (C)
9. Viruses, Trojan horses and worms are
- (A) Able to harm computer system
- (B) Unable to detect if affected on computer
- (C) User-friendly applications
- (D) Harmless applications resident on computer
ANSWER: (A)
10. Failure of passwords security due to exposure can result from
- (A) Electronic monitoring
- (B) Visual
- (C) Both ‘A’ and ‘B’
- (D) Light
ANSWER: (C)
11. Data security threats include
- (A) Hardware failure
- (B) Privacy invasion
- (C) Fraudulent manipulation of data
- (D) All of the above
ANSWER (B)
12. Graphical pictures that represent an object like file, folder etc. are
- (A) Task bar
- (B) Windows
- (C) Desktop
- (D) Icons
ANSWER (D)
13. Accessing records from a file directly without searching from the beginning of the file is
- (A) Time sharing
- (B) Random
- (C) Direct access
- (D) Access time
ANSWER (C)
14. Database redesign is not terribly difficult if the
- (A) Database is structured
- (B) Database is well-designed
- (C) Database has no data
- (D) Database is relatively small
ANSWER (C)
15. Which of the following SQL statements are helpful in database redesign?
- (A) Correlated sub queries only
- (B) EXISTS/ NOT EXISTS expressions only
- (C) Both of the above are helpful
- (D) Creating the database are helpful
ANSWER (C)
16. The EXISTS keyword will be true if
- (A)Any row in the sub query meets the condition only
- (B)All rows in the sub query fail the condition only
- (C)Both of these two conditions are met
- (D)Neither of these two conditions is met
ANSWER (A)
17. How can you find rows that do not match some specified condition ?
- (A) EXISTS
- (B) Double use of NOT EXISTS
- (C) NOT EXISTS
- (D) ROWS EXIT
ANSWER (C)
18. The process of reading a database schema and producing a data model from that schema is known as
- (A) Data modelling
- (B) Database design
- (C) Reverse engineering
- (D) Inverse engineering
ANSWER (C)
19. Which SQL-92 standard SQL command can be used to change a table name ?
- (A) RENAME TABLE
- (B) CHANGE TABLE
- (C) ALTER TABLE
- (D) None of the above is correct
ANSWER (A)
20. What SQL command can be used to delete columns from a table?
- (A) MODIFY TABLE Name DROP COLUMN Name
- (B) MODIFY TABLE Name DROP Column Name
- (D) ALTER TABLE Name DROP Column Name
ANSWER (C)
21. Which of the following modifications may not succeed?
- (A) Changing a column data type from char to date
- (B) Changing a column data type from numeric to char
- (C) Both of the above actions should succeed
- (D) Neither of the above actions will succeed
ANSWER ((A)
22. Changing cardinalities in a database is
- (A) A common database design task
- (B) A rare database design task, but does occur
- (C) A database design task that never occurs
- (D) Is impossible to do, so a new database must be constructed and the data moved into it
ANSWER (A)
23. A regular sub query can be processed
- (A)From the top down
- (B)From the bottom up
- (C)By nesting
- (D)From the right up
ANSWER ((B)
24. How many copies of the database schema are typically used in the redesign process?
- (A)One
- (B)Two
- (C)Three
- (D)Four
ANSWER (C)
25. Through which device the main components of the computer communicate with each other?
- (A). Keyboard
- (B). System Bus
- (C). Monitor
- (D). Memory
ANSWER (B)
Great post. I was checking continuously this blog and I'm impressed! Very useful information specially the last part 🙂 I care for such information a lot. I was looking for this particular info for a very long time. Thank you and good luck.|