Top 1000+ Solved Important Computer MCQs For Competitive Exams part-1 MCQ Questions Answer

From 1381 to 1395 of 2106

Q. Which type of processing that produces output results immediately after input data are entered into a computer system

a. Time-sharing

b. Interactive

c. Batch Processing

d. Real-time processing

e. None of these

  • b. Interactive

Q. A computer program that instructs otherprograms to perform a particular type of operation is

a. System software

b. Application program

c. Compiler

d. Interpreter

e. None of these

  • a. System software

Q. The provides a path between the CPU and peripheral devices, which are connected via interface cards

a. computer

b. expansion bus

c. memory

d. CPU

e. None of these

  • b. expansion bus

Q. Programs prepared by an outside supplier & provided to a user in a machine readable form is known as

a. Utility program

b. Canned program

c. Application program

d. Application software

e. None of these

  • b. Canned program

Q. Pictures or drawings, typically displayed on a VDU to allow users to select program options is called

a. HIPO charts

b. Icons

c. Graphics

d. Network

e. None of these

  • b. Icons

Q. The pieces of equipment which are attached to the CPU of a computer and which it can access are called

a. output devices

b. control units

c. hardware

d. disk drive

e. peripherals

  • e. peripherals

Q. A factor which might cause an individual to consider using a computer in criminal activities is :

a. The computer’s access to large sums of money

b. The speed with which the crime can be accomplished

c. EFTS (Electronic Funds Transfer System)

d. All the these

e. None of these

  • d. All the these

Q. The Secure Electronic Transaction (SET) specification

a. is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate

b. provides private-key encryption of all data that passes between a client and a server

c. allows users to choose an encryption scheme for the data that passes between a client and a server

d. uses a public-key encryption to secure credit-card transaction systems

e. None of these

  • d. uses a public-key encryption to secure credit-card transaction systems

Q. ‘DOS’ floppy disk does not have                  

a. A Boot Record

b. A File Allocation Table

c. A Root Directory

d. Virtual Memory

e. BIOS

  • e. BIOS

Q. All the information collected during database development is stored in a_                 

a. repository

b. data warehouse

c. RAD

d. CASE

e. None of these

  • b. data warehouse

Q. The…………component is used by the data analyst to create the queries that access the database.

a. data extraction

b. end-user query tool

c. end-user presentation tool

d. data store

e. None of these

  • b. end-user query tool

Q. A polymorphic virus

a. modifies its program code each time it attaches itself to another program or file

b. is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains.

c. a malicious-logic program that hides within or looks like a legitimate program

d. infects a program file, but still reports the size and creation date of the original uninfected program

e. None of these

  • a. modifies its program code each time it attaches itself to another program or file

Q. Microwave transmission is used in environments where installing physical transmission media is _           

a. difficult or impossible and where line-of- sight transmission is unavailable

b. easy or promising and where line-of-sight transmission is unavailable

c. difficult or impossible and where line-of- sight transmission is available

d. easy or promising and where line-of-sight transmission is available

e. None of these

  • d. easy or promising and where line-of-sight transmission is available

Q. Which is NOT a good Web security strategy?

a. Restrict access to the Web server; keep a minimum number of ports open

b. Limit the users who can load software, edit or add files.

c. Add demo programs, so users can test system without accessing production data.

d. Remove unnecessary compilers and interpreters

e. None of these

  • d. Remove unnecessary compilers and interpreters

Q. The word FTP stands for                      

a. File Translate Protocol

b. File Transit Protocol

c. File Typing Protocol

d. File Transfer Protocol

e. None of these

  • a. File Translate Protocol
Subscribe Now

Get All Updates & News