Top 1000+ Solved Important Computer MCQs For Competitive Exams part-1 MCQ Questions Answer
Q. Most important advantage of an IC is its
a. easy replacement in case of circuit failure
b. extremely high reliability
c. reduced cost
d. low power consumption
e. None of these
Q. The most popular language for interactive use is
a. COBOL
b. PASCAL
c. BASIC
d. FORTRAN
e. None of these
Q. In which mode, each user has a local input/output device?
a. Interactive
b. Time sharing mode
c. Batch processing mode
d. All of these
e. None of these
Q. A standard tape recorder used to save or loadcomputer information is known as
a. magnetic tape
b. cassette drive
c. punched paper tape
d. card punch
e. None of these
Q. Programs designed to perform specific tasks is known as
a. system software
b. application software
c. utility programs
d. operating system
e. None of these
Q. The memory address of the first element of anarray is called
a. floor address
b. foundation address
c. first address
d. base address
e. None of these
Q. The term “push” and “pop” is related to the
a. array
b. lists
c. stacks
d. all of these
e. None of these
Q. What does Router do in a network?
a. Forwards a packet to all outgoing links
b. Forwards a packet to the next free outgoing link
c. Determines on which outing link a packet is to be forwarded
d. Forwards a packet to all outgoing links except the original link
e. None of these
Q. Repeater operates in which layer of the OSI model?
a. Physical layer
b. Data link layer
c. Network layer
d. Transport layer
e. None of these
Q. …………is stored on a client and contains state information of the website visited
a. Cookies
b. Servelet
c. History
d. Resident Page
e. None of these
Q. ………..are small applications that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.
a. Applets
b. Java Bean
c. Sockets
d. Java Component
e. None of these
Q. Encryption is the conversion of data in some intelligible format into an unintelligible format called……….to prevent the data from being understood if read by an unauthorized party.
a. Clear Text
b. Encrypted Text
c. Cipher Text
d. Coded Text
e. None of these
Q. The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is known as :
a. Spooling
b. Contention
c. I/O wait
d. Buffering
e. None of these
Q. Each cell in Microsoft Office Exceldocuments is referred to by its cell address, which is the…………..
a. cell’s column label
b. cell’s column label and worksheet tab name
c. cell’s row and column labels
d. cell’s row label
e. None of these