Top 1000+ Solved Important Computer MCQs For Competitive Exams part-1 MCQ Questions Answer

From 1096 to 1110 of 2106

Q. A spooler is a(n) :

a. location in memory that maintains the contents of a document until it prints out.

b. print job

c. program that coordinates the print jobs that are waiting to print

d. message sent from the printer to the operating system when a print job is completed

e. None of these

  • c. program that coordinates the print jobs that are waiting to print

Q. The memory resident portion of the operating system is called the :

a. registry

b. API

c. CMOS

d. kernel

e. None of these

  • d. kernel

Q. Multimedia System involves :

a. Only Audio and Video

b. Animation Video Movies

c. Animation movie with Text also

d. All type of movie with Animation Graphics and Text

e. None of these

  • d. All type of movie with Animation Graphics and Text

Q. The PC (personal computer) and the Apple Macintosh are examples of two different :

a. platforms

b. applications

c. programs

d. storage devices

e. None of these

  • a. platforms

Q. In the right setting a thief will steal yourinformation by simply watching what you type.

a. snagging

b. spying

c. social engineering

d. shoulder surfing

e. None of these

  • d. shoulder surfing

Q. A………..is a small program embedded inside of a GIF image.

a. web bug

b. cookie

c. spyware application

d. spam

e. None of these

  • a. web bug

Q. A hacker contacts you my phone or email and attempts to acquire your password

a. spoofing

b. phishing

c. spamming

d. bugging

e. None of these

  • b. phishing

Q. A hacker that changes or forges information in an electronic resource, is engaging in………

a. denial of service

b. sniffing

c. terrorism

d. data diddling

e. None of these

  • d. data diddling

Q. Hackers often gain entry to a network be pretending to be at a legitimate computer.

a. Spoofing

b. forging

c. IP spoofing

d. ID theft

e. None of these

  • c. IP spoofing

Q. The………..of a threat measures itspotential impact on a system.

a. vulnerabilities

b. countermeasures

c. degree of harm

d. susceptibility

e. None of these

  • c. degree of harm

Q. The power level drops below 120V.

a. brownout

b. spike

c. blackout

d. surge

e. None of these

  • b. spike

Q. Which of the following is NOT a Microsoft Internet tool or technology?

a. Dreamweaver

b. Silverlight

c. Internet Explorer

d. Expression Web

e. None of these

  • a. Dreamweaver

Q. A protocol used to control the secure sending of data on the internet is :

a. SMTP

b. HTTPS

c. TCP/IP

d. HTTP

e. None of these

  • b. HTTPS

Q. Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ………..

a. software suites

b. integrated software packages

c. software processing packages

d. personal information managers

e. None of these

  • a. software suites
Subscribe Now

Get All Updates & News