Note: Computer Solved Past Papers MCQs Set-4 comprises 100 important Computer MCQs. These MCQs are taken from different Past Papers and helpful for different Computer related posts like Stenotypist, Computer Operator, etc.

 

1. Data becomes _____ when it is presented in a format that people can understand and use.

A. Processed
B. Graphs
C. Information
D. Presentation

Answer

Correct Answer: C. Information 

 

2. The term ___ designates equipment that might be added to a computer system to enhance its functionality.

A. Digital Device
B. System add-on
C. Disk Pack
D. Peripheral Devices

Answer

Correct Answer: D. Peripheral Devices 

 

3. A ___ is a microprocessor-based computer device.

A. Personal Computer
B. Mainframe
C. Workstation
D. Server

Answer

Correct Answer: A. Personal Computer 

 

4. The task of performing operations like arithmetic and logical operations is called:

A. Storing
B. Sorting
C. Processing
D. Editing

Answer

Correct Answer: C. Processing 

 

5. ALU and Control Unit are Jointly known as:

A. RAM
B. CPU
C. ROM
D. PC

Answer

Correct Answer: B. CPU 

 

6. RAM is an example of ___.

A. Secondary Memory
B. Primary Memory
C. Both A. and B
D. None of these

Answer

Correct Answer: B. Primary Memory 

 

7. Magnetic disk is an example of ____.

A. Secondary Memory
B. Primary Memory
C. Main Memory
D. Both A & B

Answer

Correct Answer: A. Secondary Memory 

 

8. RAM can be treated as the ___ for the computer’s processor.

A. Factory
B. Operating System
C. Waiting Room
D. Planning Room

Answer

Correct Answer: C. Waiting Room 

 

9. _____ is computer software designed to operate the computer hardware and to provide a platform for running applications software?

A. Application Software
B. System Software
C. Software
D. Operating System

Answer

Correct Answer: B. System Software 

 

10. The ___ is the amount of data that a storage device can move from the storage medium to the computer per second?

A. A data migration rate
B. Data digitizing rate
C. Data transfer rate
D. Data access rate

Answer

Correct Answer: C. Data Transfer Rate 

 

11. A device that is not connected to the CPU is called as:

A. Land Line Device
B. On-Line Device
C. Offline device
D. Device

Answer

Correct Answer: C. Offline Device

 

12. What is the other name for the programmed chip?

A. A.RAM
B. ROM
C. LSIC
D. PROM

Answer

Correct Answer: B. ROM 

 

13. Online real-time systems become popular in:

A. First Generation
B. Second Generation
C. Third Generation
D. Fourth Generation

Answer

Correct Answer: C. Third Generation 

 

14. You use a (n) ___ such as a keyboard or mouse to input information.

A. Output Device
B. Input Device
C. Storage Device
D. Processing Device

Answer

Correct Answer: B. Input Device 

 

15. ____ is the ability of a device to jump directly to the requested data.

A. Sequential Access
B. Quick Access
C. Random Access
D. None of these

Answer

Correct Answer: C. Random Access 

 

16. ____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.

A. Multithreading
B. Multiprocessing
C. Multi Computing
D. Multitasking

Answer

Correct Answer: D. Multitasking 

 

17. Which one of the following is not a computer language?

A. MS-Excel
B. BASIC
C. COBOL
D. C++

Answer

Correct Answer: A. MS- Excel 

 

18. _____ store data or information temporarily and pass it on as directed by the control unit?

A. Address
B. Register
C. Number
D. Memory

Answer

Correct Answer: B. Register 

 

19. Select the odd one from the following.

A. Operating System
B. Interpreter
C. Compiler
D. Assembler

Answer

Correct Answer: A. Operating System 

 

20. A ___ is an additional set of Commands that the computer displays after you make a selection from the main menu.

A. Menu Selection
B. Submenu
C. Dialog Box
D. None of these

Answer

Correct Answer: C. Dialog Box 

 

21. COBOL is an acronym for ____.

A. Computer Business Oriented Language
B. A Common Business Oriented Language
C. Common Business Operated Language
D. Common Business Organized Language

Answer

Correct Answer: B. A Common Business Oriented Language 

 

22. All of the following is an example of real security and privacy risks EXCEPT:

A. Hackers
B. Viruses
C. Spam
D. Identity Theft

Answer

Correct Answer: C. Spam 

 

23. Which of the following is not one of the four major data processing functions of a computer?

A. Gathering Data
B. Analyzing the data or Information
C. Processing data into Information
D. Storing the data Or Information

Answer

Correct Answer: B. Analyzing the data or Information 

 

24. All of the following are examples of storage devices EXCEPT:

A. Printers
B. Floppy Disk Drivers
C. CD Drivers
D. Hard Disk Drives

Answer

Correct Answer: A. Printers 

 

25. The CPU and Memory are located on the _____.

A. Expansions
B. Motherboard
C. Storage Device
D. Out Put Device

Answer

Correct Answer: B. Motherboard 

 

26. ____ is the science that attempts to produce machines that display the same type of intelligence that humans do.

A. Nanoscience
B. Nanotechnology
C. Artificial Intelligence
D. Simulation

Answer

Correct Answer: C. Artificial Intelligence 

 

27. Servers are computers that provide resources to other computers connected to a ____.

A. Mainframe
B. Supercomputer
C. Client
D. Network

Answer

Correct Answer: D. Network 

 

28. When creating a computer program the ____ designs the structure of the program.

A. End-User
B. System Analyst
C. Programmer
D. All of these

Answer

Correct Answer: B. System Analyst 

 

29. Computers process data into information by working exclusively with ____.

A. Multimedia
B. Word
C. Numbers
D. Characters

Answer

Correct Answer: C. Numbers 

 

30. Computers manipulate data in many ways, and this manipulation is called:

A. Upgrading
B. Batching
C. Utilizing
D. Processing

Answer

Correct Answer: D. Processing 

 

31. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:

A. Computer Forensics
B. Simulation
C. Animation
D. Robotics

Answer

Correct Answer: A. Computer Forensics 

 

32. Where does most data go first with in a computer memory hierarchy?

A. RAM
B. ROM
C. BIOS
D. CACHE

Answer

Correct Answer: A. RAM 

 

33. The ____ data mining technique derives rules from real-world case examples.

A. Rule discover
B. Signal Processing
C. Neural nets
D. Case-based reasoning

Answer

Correct Answer: C. Neural nets

 

34. ____ are used to identify a user who returns to a website.
A. Plug-ins
B. Cookies
C. Scripts
D. ASPs

Answer

Correct Answer: B. Cookies

 

35. Codes consisting of lines of varying widths or lengths that are computer readable are known as:

A. AN SCII Code
B. A magnetic tape
C. An OCR Scanner
D. A bar Code

Answer

Correct Answer: D. A bar Code

 

36. Why is it unethical to share copyrighted files with your friends?

A. It is not unethical, because it is legal
B. It is unethical because the files are being given for free
C. Sharing copyrights files without permission breaks copyrights laws
D. None of these

Answer

Correct Answer: C. Sharing copyrights files without permission breaks copyrights laws 

 

37. Reusable Optical storage will typically have the acronym ______.

A. CD
B. DVD
C. ROM
D. RW

Answer

Correct Answer: D. RW 

 

38. The most common type of storage devices are _____.

A. Magnetic Storage
B. Flash Memory
C. Optical
D. Both A & B

Answer

Correct Answer: D. Both A & B 

 

39. A device that connects to a network without the use of cables is said to be:

A. Distributed
B. Free
C. Centralized
D. None of these

Answer

Correct Answer: D. None of these 

 

40. A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a _____.

A. Spammer
B. Hacker
C. Programmer
D. Instant Messenger

Answer

Correct Answer: B. Hacker 

 

41. To access properties of an object, the mouse technique to use is _____.

A. Dragging
B. Dropping
C. Right Clicking
D. Shift Clicking

Answer

Correct Answer: C. Right Clicking 

 

42. A DVD is an example of a (n) _____.

A. Hard Disk
B. Optical Disc
C. Output devices
D. Solid state storage device

Answer

Correct Answer: B. Optical Disc 

 

43. The process of transferring fillies from a computer on the internet to your computer is called:

A. Downloading
B. Uploading
C. FTP
D. JPEG

Answer

Correct Answer: A. Downloading 

 

44. ____ is the process of dividing the disk into tracks and sectors.

A. Tracking
B. Crashing
C. Formatting
D. Allotting

Answer

Correct Answer: C. Formatting 

 

45. ASCII is a coding system that provides ____.

A. 512 different Character
B. 256 Different CharacterC. 128 Different Character
D. 1024 Different Character

Answer

Correct Answer: B. 256 Different Characters 

 

46. Which part of the computer is directly involved in executing the instructions of the computer program?

A. The Scanner
B. The Main Storage
C. The processor
D. The Secondary Storage

Answer

Correct Answer: C. The Processor 

 

47. When a computer is switched on, the booting process performs _____,

A. Power on Self Test
B. Integrity Test
C. Correct Functioning Test
D. Reliability Test

Answer

Correct Answer: A. Power onself Test 

 

48. A computer system that is old and perhaps not satisfactory is referred as a (n) _____.

A. Ancient System
B. Historical System
C. Age old System
D. Legacy System

Answer

Correct Answer: D. Legacy System 

 

49. Which of the following does not store data permanently?

A. ROM
B. RAM
C. Floppy Disk
D. Hard Disk

Answer

Correct Answer: B. RAM 

 

50. Which of the following is not a binary number?

A. 001
B. 101
C. 201
D. 110

Answer

Correct Answer: C. 201

 

51. Which of the following is the smallest storage?

A. Megabyte
B. Gigabyte
C. Terabyte
D. None of these

Answer

Correct Answer: D. None of these 

 

52. Which of the following contains permanent data and gets updating during the processing of transactions?

A. Operating System File
B. Transaction File
C. Master File
D. Software

Answer

Correct Answer: C. Master File 

 

53. A modem is connected to:
A. A Keyboard
B. A Telephone Line
C. A Printer
D. A Monitor

Answer

Correct Answer: B. A Telephone 

 

54. Large Transaction processing system is automated organizations use _____.

A. Online Processing
B. Batch Processing
C. Once-a-day Processing
D. End-of-day Processing

Answer

Correct Answer: B. Batch Processing 

 

55. Which of the following is not a storage medium?

A. Hard Disk
B. Flash Drive
C. DVD
D. Scanner

Answer

Correct Answer: D. Scanner 

 

56. The computer abbreviation KB usually means ___.

A. Key Block
B. Kernel Boot
C. Kilo Byte
D. Key Bit

Answer

Correct Answer: C. Kilo Byte 

 

57. The Typical computer criminal is a (n) ____.

A. Young Hacker
B. Trusted employee with no criminal record
C. Trusted employee with a long but unknown criminal record
D. Overseas young Cracker

Answer

Correct Answer: B. Trusted employee with no criminal record 

 

58. The common name for the crime of stealing password is _____.

A. Jacking
B. Identity Theft
C. Spoofing
D. Hacking

Answer

Correct Answer: C. Spoofing

 

59. Collecting personal information and effectively posing as another individual is known as the crime of ___.

A. Spooling
B. Identity theft
C. Spoofing
D. Hacking

Answer

Correct Answer: B. Identity theft

 

60. Malicious software is known as ____.

A. Badware
B. Malware
C. Maliciousware
D. Illegalware

Answer

Correct Answer: B. Malware

 

61. A program that performs a useful task while simultaneously allowing destructive acts is a ____.

A. Worm
B. Virus
C. Trojan Horse
D. Macro virus

Answer

Correct Answer: C. Trojan Virus

 

62. To Prevent the loss of data during power failures use a (n):

A. UPS
B. Firewall
C. Surge Protector
D. Encryption Program

Answer

Correct Answer: A. UPS 

 

63. An internationally disruptive program that spreads from program to program or from disk to disk is known as a:

A. Trojan Horse
B. Virus
C. Time Bomb
D. Time related bomb sequence

Answer

Correct Answer: B. Virus 

 

64. _____ is defined as any crime completed through the use of computer technology.

A. Computer Forensics
B. Computer Crime
C. Hacking
D. Cracking

Answer

Correct Answer: B. Computer Crime 

 

65. ____ refers to electronic trespassing or criminal hacking.
A. Cracking
B. Jacking
C. Spoofing
D. Smarming

Answer

Correct Answer: A. Cracking 

 

66. The first electronic computer was developed by ____.

A. J.V Attansoff
B. Bill Gates
C. Simur Cray
D. Winton Serf

Answer

Correct Answer: A. J.V Attansoff 

 

67. ______ Computer operates essentially by counting.

A. Portable Computer
B. Hybrid Computer
C. Analog Computer
D. Digital Computer

Answer

Correct Answer: D. Digital Computer 

 

68. In 1999 the Melissa virus was a widely publicized:

A. E-mail virus
B. Macro Virus
C. Trojan Horse
D. Time Bomb

Answer

Correct Answer: A. E-mail Virus 

 

69. What type of virus uses computer hosts to reproduce itself?

A. Time bomb
B. Worm
C. Melissa Virus
D. Macro Virus

Answer

Correct Answer: B. Worm 

 

70. The thing that eventually terminates a worm virus is a lack of:

A. Time
B. CD Drives Space
C. Memory or Disk Space
D. CD-RW

Answer

Correct Answer: C. Memory or Disk Space 

 

71. When a logic bomb is activated by a time related event, it is known as a ______.

A. Time related bomb Sequence
B. Virus
C. Time Bomb
D. Trojan Horse

Answer

Correct Answer: C. Time Bomb 

 

72. What is the name of an application program that gathers user information and sends it to someone through the internet?

A. A Virus
B. Spybot
C. Logic Bomb
D. Security Patch

Answer

Correct Answer: B. Spybot 

 

73. ____ is the measurement of thing such as fingerprints and retinal scans used for security access?

A. Biometrics
B. Bio Measurement
C. Computer Security
D. Smart weapon Machinery

Answer

Correct Answer: A. Biometrics 

 

74. What is the most common tool used to restrict access to a computer system?

A. User Login
B. Passwords
C. Computer Keys
D. Access Control Software

Answer

Correct Answer: B. Passwords 

 

75. Hardware or Software designed to guard against unauthorized access to a computer network is known as _____.

A. Hacker Proof program
B. Firewall
C. Hacker resistant server
D. Encryption Safe wall

Answer

Correct Answer: B. Firewall 

 

76. The Scrambl ing of code is known as?

A. Encryption
B. A firewall
C. Scrambling
D. Password Proofing

Answer

Correct Answer: A. Encryption 

 

77. _____ Computer is small general purpose micro computer but larger than portable computer.

A. Hybrid
B. Digital
C. Desktop
D. Laptop

Answer

Correct Answer: C. Desktop 

 

78. Which of the printers used in conjunction with computer uses dry ink powder?

A. Daisy Wheel Printer
B. Line Printer
C. Laser Printer
D. Thermal Printer

Answer

Correct Answer: C. Laser Printer 

 

79. In which generation computer vacuum tube were used:

A. First Generation
B. Second generation
C. Third Generation
D. Fourth Generation

Answer

Correct Answer: A. First Generation 

 

80. ICs are classified on basis of ____.

A. Manufacturing Company
B. Type of Computer
C. Number of Transistors
D. None of these

Answer

Correct Answer: C. Number of Transistors

 

81. Process of loading and fixing or bypassing errors in computer program code is called _____.

A. Debugging
B. Defusing
C. Defragmenting
D. Defrosting

Answer

Correct Answer: A. Debugging 

 

82. Cathode Ray tube is Form of _____.

A. Mouse
B. Keyboard
C. Monitor
D. Mother Board

Answer

Correct Answer: C. Monitor 

 

83. ____ computer is a medium sized computer.

A. Micro
B. Mainframe
C. Supercomputer
D. Mini

Answer

Correct Answer: D. Mini 

 

84. ____ Computers are large in size.

A. Micro Computer
B. Mini Computer
C. Super Computer
D. Main Frame

Answer

Correct Answer: D. Main Frame 

 

85. Note book, Laptop, Palm, Hand-Held computers are coming under category of ______ computer.

A. Digital Computer
B. Main Frame Computer
C. Portable Computer
D. Hybrid Computer

Answer

Correct Answer: C. Portable Computer 

 

86. Touch Screen is ____.

A. Input Device
B. Output Device
C. Both A & B
D. None of these

Answer

Correct Answer: C. Both A & B 

 

87. ____ are used for plotting graphs and design on papers.

A. Trackball
B. Joystick
C. Light pen
D. Plotters

Answer

Correct Answer: D. Plotters

 

88. Are specific to user’s needs?

A. Application Software
B. System Software
C. Assemblers
D. Compilers

Answer

Correct Answer: A. Application Software

 

89. MAN stand for:

A. Main Area Network
B. Metropolitan Area Network
C. Minimum Area Network
D. Maximum Area Network

Answer

Correct Answer: B. Metropolitan Area Network 

 

90. Which of the following is a network topology?

A. WAN
B. WAN
C. Bus
D. USB

Answer

Correct Answer: C. Bus 

 

91. VOIP stands for:

A. Video Over IP
B. Voice Over IP
C. Viruses Over IP
D. Virtual Over IP

Answer

Correct Answer: B. Voice over IP 

 

92. LAN stands for:

A. Local Area Network
B. Logical Area Network
C. Large Area Network
D. Limited Area Network

Answer

Correct Answer: A. Local Area Network

 

93. NOS stand for:

A. A=Node Operating System
B. None Open System
C. Network Operating System
D. Non operating Software

Answer

Correct Answer: C. Network Operating System 

 

94. Are system software to facilitate editing of text and data?

A. MS Word
B. Ms Publisher
C. Editors
D. Macromedia Flash

Answer

Correct Answer: C. Editors 

 

95. Computers combine both measuring and counting is called:

A. Analog
B. Hybrid
C. Digital
D. All of these

Answer

Correct Answer: B. Hybrid 

 

96. In world today most of the computers are:

A. Hybrid
B. Digital
C. Analog
D. Complex

Answer

Correct Answer: B. Digital 

 

97. Physical Structure of computer is called:

A. Human Ware
B. Software
C. Hardware
D. All of these

Answer

Correct Answer: C. Hardware 

 

98. In which type of computer, data are represented as discrete signals?

A. Digital Computer
B. Analog Computer
C. Both a & b
D. Hybrid Computer

Answer

Correct Answer: A. Digital Computer 

 

99. C’ in CPU denotes?
A. Common
B. Complex
C. Complicated
D. Central

Answer

Correct Answer: D. Central

 

100. Which of the following uses a handheld operating system?

A. Supercomputer
B. PDA
C. Personal Computer
D. Laptop Computer

Answer

Correct Answer: B. PDA 

 

Related Content

← Back to Main Page

Write a Comment

Your email address will not be published. Required fields are marked *