Basic Computer MCQs-6

Basic Computer MCQs-6

1. Which of the following is not an advantage of magnetic disk storage?

  • (A)The access time of magnetic disk is much less than that of magnetic tape
  • (B)Disk storage is longer lasting than magnetic tape
  • (C)Disk storage is less expensive than tape storage
  • (D)None of the above

ANSWER: (D)

2. A prefix for billion which is equal to _____is called as billi.

  • (A) 100
  • (B) 10000
  • (C) 1000
  • (D) 10

ANSWER: (A)

3. One kilobyte -byte

  • (A) 1250
  • (B) 2088
  • (C) 1024
  • (D) 1000

ANSWER: (C)

4. To move the cursor to the end of the document
press

  • (A) Ctrl + Esc
  • (B) Ctrl + End
  • (C) Ctrl + B
  • (D) Ctrl + C

ANSWER: (B)

5. The shortcut key to print documents is

  • (A) Ctrl + A
  • (B) Ctrl + B
  • (C) Ctrl + P
  • (D) Ctrl + C


ANSWER: (C)

6. In MICR, C stands for

  • (A) Code
  • (B) Colour
  • (C) Computer
  • (D) Character
  • (E) None of these

ANSWER: (D)

7. The simultaneous processing of two or more Programs by multiple processors is

  • (A) Multiprogramming
  • (B) Multitasking
  • (C) Time-sharing
  • (D) Multiprocessing
  • (E) None of these

ANSWER: (D)

8. First layer in the OSI reference model is

  • (A) Data link
  • (B) Network
  • (C) Physical
  • (D) Application

ANSWER: (C)

9. Viruses, Trojan horses and worms are

  • (A) Able to harm computer system
  • (B) Unable to detect if affected on computer
  • (C) User-friendly applications
  • (D) Harmless applications resident on computer

ANSWER: (A)

10. Failure of passwords security due to exposure can result from

  • (A) Electronic monitoring
  • (B) Visual
  • (C) Both ‘A’ and ‘B’
  • (D) Light


ANSWER: (C)

11. Data security threats include

  • (A) Hardware failure
  • (B) Privacy invasion
  • (C) Fraudulent manipulation of data
  • (D) All of the above

ANSWER (B)

12. Graphical pictures that represent an object like file, folder etc. are

  • (A) Task bar
  • (B) Windows
  • (C) Desktop
  • (D) Icons

ANSWER (D)

13. Accessing records from a file directly without searching from the beginning of the file is

  • (A) Time sharing
  • (B) Random
  • (C) Direct access
  • (D) Access time

ANSWER (C)

14. Database redesign is not terribly difficult if the

  • (A) Database is structured
  • (B) Database is well-designed
  • (C) Database has no data
  • (D) Database is relatively small

ANSWER (C)

15. Which of the following SQL statements are helpful in database redesign?

  • (A) Correlated sub queries only
  • (B) EXISTS/ NOT EXISTS expressions only
  • (C) Both of the above are helpful
  • (D) Creating the database are helpful


ANSWER (C)

16. The EXISTS keyword will be true if

  • (A)Any row in the sub query meets the condition only
  • (B)All rows in the sub query fail the condition only
  • (C)Both of these two conditions are met
  • (D)Neither of these two conditions is met

ANSWER (A)

17. How can you find rows that do not match some specified condition ?

  • (A) EXISTS
  • (B) Double use of NOT EXISTS
  • (C) NOT EXISTS
  • (D) ROWS EXIT

ANSWER (C)

18. The process of reading a database schema and producing a data model from that schema is known as

  • (A) Data modelling
  • (B) Database design
  • (C) Reverse engineering
  • (D) Inverse engineering

ANSWER (C)

19. Which SQL-92 standard SQL command can be used to change a table name ?

  • (A) RENAME TABLE
  • (B) CHANGE TABLE
  • (C) ALTER TABLE
  • (D) None of the above is correct

ANSWER (A)

20. What SQL command can be used to delete columns from a table?

  • (A) MODIFY TABLE Name DROP COLUMN Name
  • (B) MODIFY TABLE Name DROP Column Name
  • (D) ALTER TABLE Name DROP Column Name

ANSWER (C)

21. Which of the following modifications may not succeed?

  • (A) Changing a column data type from char to date
  • (B) Changing a column data type from numeric to char
  • (C) Both of the above actions should succeed
  • (D) Neither of the above actions will succeed

ANSWER ((A)

22. Changing cardinalities in a database is

  • (A) A common database design task
  • (B) A rare database design task, but does occur
  • (C) A database design task that never occurs
  • (D) Is impossible to do, so a new database must be constructed and the data moved into it

ANSWER (A)

23. A regular sub query can be processed

  • (A)From the top down
  • (B)From the bottom up
  • (C)By nesting
  • (D)From the right up

ANSWER ((B)

24. How many copies of the database schema are typically used in the redesign process?

  • (A)One
  • (B)Two
  • (C)Three
  • (D)Four

ANSWER (C)

25. Through which device the main components of the computer communicate with each other?

  • (A). Keyboard
  • (B). System Bus
  • (C). Monitor
  • (D). Memory

ANSWER (B)

One thought on “Basic Computer MCQs-6”

  1. Great post. I was checking continuously this blog and I'm impressed! Very useful information specially the last part 🙂 I care for such information a lot. I was looking for this particular info for a very long time. Thank you and good luck.|

Comments are closed.