Note: Computer Solved Past Papers MCQs Set-4 comprises 100 important Computer MCQs. These MCQs are taken from different Past Papers and are helpful for different Computer related posts like Stenotypist, Computer Operator, etc.
1. Data becomes _____ when it is presented in a format that people can understand and use.
A. Processed
B. Graphs
C. Information
D. Presentation
Answer
Correct Answer: C. Information
2. The term ___ designates equipment that might be added to a computer system to enhance its functionality.
A. Digital Device
B. System add-on
C. Disk Pack
D. Peripheral Devices
Answer
Correct Answer: D. Peripheral Devices
3. A ___ is a microprocessor-based computer device.
A. Personal Computer
B. Mainframe
C. Workstation
D. Server
Answer
Correct Answer: A. Personal Computer
4. The task of performing operations like arithmetic and logical operations is called:
A. Storing
B. Sorting
C. Processing
D. Editing
Answer
Correct Answer: C. Processing
5. ALU and Control Unit are Jointly known as:
A. RAM
B. CPU
C. ROM
D. PC
Answer
Correct Answer: B. CPU
6. RAM is an example of ___.
A. Secondary Memory
B. Primary Memory
C. Both A. and B
D. None of these
Answer
Correct Answer: B. Primary Memory
7. Magnetic disk is an example of ____.
A. Secondary Memory
B. Primary Memory
C. Main Memory
D. Both A & B
Answer
Correct Answer: A. Secondary Memory
8. RAM can be treated as the ___ for the computer’s processor.
A. Factory
B. Operating System
C. Waiting Room
D. Planning Room
Answer
Correct Answer: C. Waiting Room
9. _____ is computer software designed to operate the computer hardware and to provide a platform for running applications software?
A. Application Software
B. System Software
C. Software
D. Operating System
Answer
Correct Answer: B. System Software
10. The ___ is the amount of data that a storage device can move from the storage medium to the computer per second?
A. A data migration rate
B. Data digitizing rate
C. Data transfer rate
D. Data access rate
Answer
Correct Answer: C. Data Transfer Rate
11. A device that is not connected to the CPU is called as:
A. Land Line Device
B. On-Line Device
C. Offline device
D. Device
Answer
Correct Answer: C. Offline Device
12. What is the other name for the programmed chip?
A. RAM
B. ROM
C. LSIC
D. PROM
Answer
Correct Answer: B. ROM
13. Online real-time systems become popular in:
A. First Generation
B. Second Generation
C. Third Generation
D. Fourth Generation
Answer
Correct Answer: C. Third Generation
14. You use a (n) ___ such as a keyboard or mouse to input information.
A. Output Device
B. Input Device
C. Storage Device
D. Processing Device
Answer
Correct Answer: B. Input Device
15. ____ is the ability of a device to jump directly to the requested data.
A. Sequential Access
B. Quick Access
C. Random Access
D. None of these
Answer
Correct Answer: C. Random Access
16. ____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
A. Multithreading
B. Multiprocessing
C. Multi Computing
D. Multitasking
Answer
Correct Answer: D. Multitasking
17. Which one of the following is not a computer language?
A. MS-Excel
B. BASIC
C. COBOL
D. C++
Answer
Correct Answer: A. MS- Excel
18. _____ store data or information temporarily and pass it on as directed by the control unit?
A. Address
B. Register
C. Number
D. Memory
Answer
Correct Answer: B. Register
19. Select the odd one from the following.
A. Operating System
B. Interpreter
C. Compiler
D. Assembler
Answer
Correct Answer: A. Operating System
20. A ___ is an additional set of Commands that the computer displays after you make a selection from the main menu.
A. Menu Selection
B. Submenu
C. Dialog Box
D. None of these
Answer
Correct Answer: C. Dialog Box
21. COBOL is an acronym for ____.
A. Computer Business Oriented Language
B. A Common Business Oriented Language
C. Common Business Operated Language
D. Common Business Organized Language
Answer
Correct Answer: B. A Common Business Oriented Language
22. All of the following is an example of real security and privacy risks EXCEPT:
A. Hackers
B. Viruses
C. Spam
D. Identity Theft
Answer
Correct Answer: C. Spam
23. Which of the following is not one of the four major data processing functions of a computer?
A. Gathering Data
B. Analyzing the data or Information
C. Processing data into Information
D. Storing the data or Information
Answer
Correct Answer: B. Analyzing the data or Information
24. All of the following are examples of storage devices EXCEPT:
A. Printers
B. Floppy Disk Drivers
C. CD Drivers
D. Hard Disk Drives
Answer
Correct Answer: A. Printers
25. The CPU and Memory are located on the _____.
A. Expansions
B. Motherboard
C. Storage Device
D. OutPut Device
Answer
Correct Answer: B. Motherboard
26. ____ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Artificial Intelligence
D. Simulation
Answer
Correct Answer: C. Artificial Intelligence
27. Servers are computers that provide resources to other computers connected to a ____.
A. Mainframe
B. Supercomputer
C. Client
D. Network
Answer
Correct Answer: D. Network
28. When creating a computer program the ____ designs the structure of the program.
A. End-User
B. System Analyst
C. Programmer
D. All of these
Answer
Correct Answer: B. System Analyst
29. Computers process data into information by working exclusively with ____.
A. Multimedia
B. Word
C. Numbers
D. Characters
Answer
Correct Answer: C. Numbers
30. Computers manipulate data in many ways, and this manipulation is called:
A. Upgrading
B. Batching
C. Utilizing
D. Processing
Answer
Correct Answer: D. Processing
31. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. Computer Forensics
B. Simulation
C. Animation
D. Robotics
Answer
Correct Answer: A. Computer Forensics
32. Where do most data go first within a computer memory hierarchy?
A. RAM
B. ROM
C. BIOS
D. CACHE
Answer
Correct Answer: A. RAM
33. The ____ data mining technique derives rules from real-world case examples.
A. Rule discover
B. Signal Processing
C. Neural nets
D. Case-based reasoning
Answer
Correct Answer: C. Neural nets
34. ____ are used to identify a user who returns to a website.
A. Plug-ins
B. Cookies
C. Scripts
D. ASPs
Answer
Correct Answer: B. Cookies
35. Codes consisting of lines of varying widths or lengths that are computer-readable are known as:
A. AN SCII Code
B. A magnetic tape
C. An OCR Scanner
D. A bar Code
Answer
Correct Answer: D. A bar Code
36. Why is it unethical to share copyrighted files with your friends?
A. It is not unethical, because it is legal
B. It is unethical because the files are being given for free
C. Sharing copyrights files without permission breaks copyrights laws
D. None of these
Answer
Correct Answer: C. Sharing copyrights files without permission breaks copyrights laws
37. Reusable Optical storage will typically have the acronym ______.
A. CD
B. DVD
C. ROM
D. RW
Answer
Correct Answer: D. RW
38. The most common type of storage device is _____.
A. Magnetic Storage
B. Flash Memory
C. Optical
D. Both A & B
Answer
Correct Answer: D. Both A & B
39. A device that connects to a network without the use of cables is said to be:
A. Distributed
B. Free
C. Centralized
D. None of these
Answer
Correct Answer: D. None of these
40. A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a _____.
A. Spammer
B. Hacker
C. Programmer
D. Instant Messenger
Answer
Correct Answer: B. Hacker
41. To access properties of an object, the mouse technique to use is _____.
A. Dragging
B. Dropping
C. Right-Clicking
D. Shift-Clicking
Answer
Correct Answer: C. Right Clicking
42. A DVD is an example of a (n) _____.
A. Hard Disk
B. Optical Disc
C. Output devices
D. Solid state storage device
Answer
Correct Answer: B. Optical Disc
43. The process of transferring fillies from a computer on the internet to your computer is called:
A. Downloading
B. Uploading
C. FTP
D. JPEG
Answer
Correct Answer: A. Downloading
44. ____ is the process of dividing the disk into tracks and sectors.
A. Tracking
B. Crashing
C. Formatting
D. Allotting
Answer
Correct Answer: C. Formatting
45. ASCII is a coding system that provides ____.
A. 512 different Character
B. 256 Different Character
C. 128 Different Character
D. 1024 Different Character
Answer
Correct Answer: B. 256 Different Characters
46. Which part of the computer is directly involved in executing the instructions of the computer program?
A. The Scanner
B. The Main Storage
C. The processor
D. The Secondary Storage
Answer
Correct Answer: C. The Processor
47. When a computer is switched on, the booting process performs _____.
A. Power on Self Test
B. Integrity Test
C. Correct Functioning Test
D. Reliability Test
Answer
Correct Answer: A. Power onself Test
48. A computer system that is old and perhaps not satisfactory is referred to as a (n) _____.
A. Ancient System
B. Historical System
C. Age old System
D. Legacy System
Answer
Correct Answer: D. Legacy System
49. Which of the following does not store data permanently?
A. ROM
B. RAM
C. Floppy Disk
D. Hard Disk
Answer
Correct Answer: B. RAM
50. Which of the following is not a binary number?
A. 001
B. 101
C. 201
D. 110
Answer
Correct Answer: C. 201
51. Which of the following is the smallest storage?
A. Megabyte
B. Gigabyte
C. Terabyte
D. None of these
Answer
Correct Answer: D. None of these
52. Which of the following contains permanent data and gets updating during the processing of transactions?
A. Operating System File
B. Transaction File
C. Master File
D. Software
Answer
Correct Answer: C. Master File
53. A modem is connected to:
A. A Keyboard
B. A Telephone Line
C. A Printer
D. A Monitor
Answer
Correct Answer: B. A Telephone
54. Large Transaction processing system in automated organizations use _____.
A. Online Processing
B. Batch Processing
C. Once-a-day Processing
D. End-of-day Processing
Answer
Correct Answer: B. Batch Processing
55. Which of the following is not a storage medium?
A. Hard Disk
B. Flash Drive
C. DVD
D. Scanner
Answer
Correct Answer: D. Scanner
56. The computer abbreviation KB usually means ___.
A. Key Block
B. Kernel Boot
C. KiloByte
D. Key Bit
Answer
Correct Answer: C. Kilo Byte
57. The Typical computer criminal is a (n) ____.
A. Young Hacker
B. Trusted employee with no criminal record
C. Trusted employee with a long but unknown criminal record
D. Overseas young Cracker
Answer
Correct Answer: B. Trusted employee with no criminal record
58. The common name for the crime of stealing passwords is _____.
A. Jacking
B. Identity Theft
C. Spoofing
D. Hacking
Answer
Correct Answer: C. Spoofing
59. Collecting personal information and effectively posing as another individual is known as the crime of ___.
A. Spooling
B. Identity theft
C. Spoofing
D. Hacking
Answer
Correct Answer: B. Identity theft
60. Malicious software is known as ____.
A. Badware
B. Malware
C. Maliciousware
D. Illegalware
Answer
Correct Answer: B. Malware
61. A program that performs a useful task while simultaneously allowing destructive acts is a ____.
A. Worm
B. Virus
C. Trojan Horses
D. Macro virus
Answer
Correct Answer: C. Trojan Virus
62. To prevent the loss of data during power failures use a (n):
A. UPS
B. Firewall
C. Surge Protector
D. Encryption Program
Answer
Correct Answer: A. UPS
63. An internationally disruptive program that spreads from program to program or from disk to disk is known as a:
A. Trojan Horse
B. Virus
C. Time Bomb
D. Time related bomb sequence
Answer
Correct Answer: B. Virus
64. _____ is defined as any crime completed through the use of computer technology.
A. Computer Forensics
B. Computer Crime
C. Hacking
D. Cracking
Answer
Correct Answer: B. Computer Crime
65. ____ refers to electronic trespassing or criminal hacking.
A. Cracking
B. Jacking
C. Spoofing
D. Smarming
Answer
Correct Answer: A. Cracking
66. The first electronic computer was developed by ____.
A. J.V Attansoff
B. Bill Gates
C. Timur Cray
D. Winton Serf
Answer
Correct Answer: A. J.V Attansoff
67. ______ Computer operates essentially by counting.
A. Portable Computer
B. Hybrid Computer
C. Analog Computer
D. Digital Computer
Answer
Correct Answer: D. Digital Computer
68. In 1999 the Melissa virus was widely publicized:
A. E-mail virus
B. Macro Virus
C. Trojan Horse
D. Time Bomb
Answer
Correct Answer: A. E-mail Virus
69. What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa Virus
D. Macro Virus
Answer
Correct Answer: B. Worm
70. The thing that eventually terminates a worm virus is a lack of:
A. Time
B. CD Drives Space
C. Memory or Disk Space
D. CD-RW
Answer
Correct Answer: C. Memory or Disk Space
71. When a logic bomb is activated by a time-related event, it is known as a ______.
A. Time related bomb Sequence
B. Virus
C. Time Bomb
D. Trojan Horse
Answer
Correct Answer: C. Time Bomb
72. What is the name of an application program that gathers user information and sends it to someone through the internet?
A. A Virus
B. Spybot
C. Logic Bomb
D. Security Patch
Answer
Correct Answer: B. Spybot
73. ____ is the measurement of things such as fingerprints and retinal scans used for security access?
A. Biometrics
B. Bio Measurement
C. Computer Security
D. Smart weapon Machinery
Answer
Correct Answer: A. Biometrics
74. What is the most common tool used to restrict access to a computer system?
A. User Login
B. Passwords
C. Computer Keys
D. Access Control Software
Answer
Correct Answer: B. Passwords
75. Hardware or Software designed to guard against unauthorized access to a computer network is known as _____.
A. Hacker Proof program
B. Firewall
C. Hacker resistant server
D. Encryption Safe wall
Answer
Correct Answer: B. Firewall
76. The Scrambling of code is known as:
A. Encryption
B. A firewall
C. Scrambling
D. Password Proofing
Answer
Correct Answer: A. Encryption
77. _____ Computer is a small general-purpose microcomputer but larger than a portable computer.
A. Hybrid
B. Digital
C. Desktop
D. Laptop
Answer
Correct Answer: C. Desktop
78. Which of the printers used in conjunction with the computer uses dry ink powder?
A. Daisy Wheel Printer
B. Line Printer
C. Laser Printer
D. Thermal Printer
Answer
Correct Answer: C. Laser Printer
79. In which generation computer vacuum tubes were used?
A. First Generation
B. Second generation
C. Third Generation
D. Fourth Generation
Answer
Correct Answer: A. First Generation
80. ICs are classified on basis of ____.
A. Manufacturing Company
B. Type of Computer
C. Number of Transistors
D. None of these
Answer
Correct Answer: C. Number of Transistors
81. Process of loading and fixing or bypassing errors in computer program code is called _____.
A. Debugging
B. Defusing
C. Defragmenting
D. Defrosting
Answer
Correct Answer: A. Debugging
82. Cathode Ray Tube is a Form of _____.
A. Mouse
B. Keyboard
C. Monitor
D. Mother Board
Answer
Correct Answer: C. Monitor
83. ____ computer is a medium-sized computer.
A. Micro
B. Mainframe
C. Supercomputer
D. Mini
Answer
Correct Answer: D. Mini
84. ____ Computers are large in size.
A. Micro Computer
B. Mini Computer
C. Super Computer
D. Main Frame
Answer
Correct Answer: D. Main Frame
85. Note book, Laptop, Palm, Hand-Held computers are coming under category of ______ computer.
A. Digital Computer
B. Main Frame Computer
C. Portable Computer
D. Hybrid Computer
Answer
Correct Answer: C. Portable Computer
86. Touch Screen is ____.
A. Input Device
B. Output Device
C. Both A & B
D. None of these
Answer
Correct Answer: C. Both A & B
87. ____ are used for plotting graphs and design on papers.
A. Trackball
B. Joystick
C. Light pen
D. Plotters
Answer
Correct Answer: D. Plotters
88. ____ are specific to the user’s needs.
A. Application Software
B. System Software
C. Assemblers
D. Compilers
Answer
Correct Answer: A. Application Software
89. MAN stands for:
A. Main Area Network
B. Metropolitan Area Network
C. Minimum Area Network
D. Maximum Area Network
Answer
Correct Answer: B. Metropolitan Area Network
90. Which of the following is a network topology?
A. WAN
B. WAN
C. Bus
D. USB
Answer
Correct Answer: C. Bus
91. VOIP stands for:
A. Video Over IP
B. Voice Over IP
C. Viruses Over IP
D. Virtual Over IP
Answer
Correct Answer: B. Voice over IP
92. LAN stands for:
A. Local Area Network
B. Logical Area Network
C. Large Area Network
D. Limited Area Network
Answer
Correct Answer: A. Local Area Network
93. NOS stands for:
A. Node Operating System
B. None Open System
C. Network Operating System
D. Nonoperating Software
Answer
Correct Answer: C. Network Operating System
94. Are system software to facilitate editing of text and data?
A. MS Word
B. MS Publisher
C. Editors
D. Macromedia Flash
Answer
Correct Answer: C. Editors
95. Computers combine both measuring and counting is called:
A. Analog
B. Hybrid
C. Digital
D. All of these
Answer
Correct Answer: B. Hybrid
96. In the world today most of the computers are:
A. Hybrid
B. Digital
C. Analog
D. Complex
Answer
Correct Answer: B. Digital
97. Physical Structure of a computer is called:
A. Human Ware
B. Software
C. Hardware
D. All of these
Answer
Correct Answer: C. Hardware
98. In which type of computer, data are represented as discrete signals?
A. Digital Computer
B. Analog Computer
C. Both a & b
D. Hybrid Computer
Answer
Correct Answer: A. Digital Computer
99. C’ in CPU denotes?
A. Common
B. Complex
C. Complicated
D. Central
Answer
Correct Answer: D. Central
100. Which of the following uses a handheld operating system?
A. Supercomputer
B. PDA
C. Personal Computer
D. Laptop Computer
Answer
Correct Answer: B. PDA
Related Content