Top 1000+ Solved Important Computer MCQs For Competitive Exams part-1 MCQ Questions Answer
Q. A spooler is a(n) :
a. location in memory that maintains the contents of a document until it prints out.
b. print job
c. program that coordinates the print jobs that are waiting to print
d. message sent from the printer to the operating system when a print job is completed
e. None of these
Q. The memory resident portion of the operating system is called the :
a. registry
b. API
c. CMOS
d. kernel
e. None of these
Q. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the ………….view.
a. List
b. Thumbnails
c. Details
d. Icon
e. None of these
Q. Multimedia System involves :
a. Only Audio and Video
b. Animation Video Movies
c. Animation movie with Text also
d. All type of movie with Animation Graphics and Text
e. None of these
Q. The PC (personal computer) and the Apple Macintosh are examples of two different :
a. platforms
b. applications
c. programs
d. storage devices
e. None of these
Q. In the right setting a thief will steal yourinformation by simply watching what you type.
a. snagging
b. spying
c. social engineering
d. shoulder surfing
e. None of these
Q. A………..is a small program embedded inside of a GIF image.
a. web bug
b. cookie
c. spyware application
d. spam
e. None of these
Q. A hacker contacts you my phone or email and attempts to acquire your password
a. spoofing
b. phishing
c. spamming
d. bugging
e. None of these
Q. A hacker that changes or forges information in an electronic resource, is engaging in………
a. denial of service
b. sniffing
c. terrorism
d. data diddling
e. None of these
Q. Hackers often gain entry to a network be pretending to be at a legitimate computer.
a. Spoofing
b. forging
c. IP spoofing
d. ID theft
e. None of these
Q. The………..of a threat measures itspotential impact on a system.
a. vulnerabilities
b. countermeasures
c. degree of harm
d. susceptibility
e. None of these
Q. Which of the following is NOT a Microsoft Internet tool or technology?
a. Dreamweaver
b. Silverlight
c. Internet Explorer
d. Expression Web
e. None of these
Q. A protocol used to control the secure sending of data on the internet is :
a. SMTP
b. HTTPS
c. TCP/IP
d. HTTP
e. None of these
Q. Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ………..
a. software suites
b. integrated software packages
c. software processing packages
d. personal information managers
e. None of these