Top 1000+ Solved Important Computer MCQs For Competitive Exams part-1 MCQ Questions Answer

From 1996 to 2010 of 2106

Q. Test the validity of the statements?

a. 1 KB = 1024 BYTES

b. 1 MB = 2048 BYTES

c. 1 MB = 1000 KILOBYTES

d. 1 KB = 1000 BYTES

e. None of these

  • a. 1 KB = 1024 BYTES

Q. Which of the following is not a computerlanguage?

a. BASIC

b. C++

c. C#

d. Java

e. Microsoft

  • e. Microsoft

Q. Now a days Vishing has become a criminal practice of using social engineering over which of the following?

a. Social networking sites

b. Mobile Phones

c. E-mails

d. Cyber cafes

e. All of these

  • b. Mobile Phones

Q. What is the fullform of W3C?

a. World Wide Web Consortium

b. World Wide Web Company

c. World Wide Web Center

d. World Wide Web Command

e. None of these

  • a. World Wide Web Consortium

Q. Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?

a. Virtual keyboard

b. Finger Touching

c. Touchscreen

d. ShapeWriter

e. Dasher

  • a. Virtual keyboard

Q. ADSL data communications technology uses which of the following for faster data transmission?

a. Voiceband modem

b. Wireless Modem

c. Copper telephone Lines

d. Sockets

e. None of these

  • c. Copper telephone Lines

Q. What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode?

a. Reduce Power consumption

b. Back up

c. To write contents of RAM to hard disc

d. To improve download speed

e. None of these

  • a. Reduce Power consumption

Q. What is the ultimate purpose ofDefragmentation?

a. Make the PC faster

b. Create More Free Space

c. Delete temporary files

d. Reduce Power consumption

e. All of these

  • b. Create More Free Space

Q. The purpose of the primary key in a database is to :

a. unlock the database

b. provide a map of the data

c. uniquely identify a record

d. establish constraints on database operations

e. None of these

  • b. provide a map of the data

Q. The design of the network is called the network :

a. architecture

b. server

c. transmission

d. type

e. None of these

  • a. architecture

Q. The most frequently used instructions of a computer program are likely to be fetched from :

a. the hard disk

b. cache memory

c. RAM

d. registers

e. None of these

  • b. cache memory

Q. Personal logs or journal entries posted on the Web are known as :

a. listservs

b. Webcasts

c. blogs

d. subject directories

e. None of these

  • c. blogs

Q. Linux is a(n)………..operating system.

a. open-source

b. Microsoft

c. Windows

d. Mac

e. None of these

  • a. open-source

Q. Which of the following places the common data elements in order from smallest to largest

a. character, file, record, field, database

b. character, record, field, database, file

c. character, field, record, file, database

d. Bit, byte, character, record, field, file, database

e. None of these

  • c. character, field, record, file, database
Subscribe Now

Get All Updates & News