Top 350+ Solved Important Computer MCQs For Competitive Exams part 2 MCQ Questions Answer

From 166 to 180 of 447

Q. Another term for the Internet is

a. web

b. www

c. cyberspace

d. arpanet

e. None of these

  • c. cyberspace

Q. Which of the following topologies is not of broadcast type?

a. Star

b. Bus

c. Ring

d. Mesh

e. Tree

  • c. Ring

Q. Enterprise storage unit that uses DVD and CD discs as the storage medium is

a. library

b. data mart

c. jukebox

d. RAID

e. NAS

  • c. jukebox

Q. The function of the ‘home key’ in a microcomputer is

a. to interrupt executions

b. to reposition the cursor

c. to cancel the entry

d. to capitalise letters

e. to delete letters

  • b. to reposition the cursor

Q. A computer user obsessed with gaining entry into highly secured computer system iscalled a(n)

a. Hacker

b. Attacker

c. Normal user

d. Cracker

e. Programmer

  • d. Cracker

Q. The programming team fixes program errors discovered by users during

a. program maintenance

b. nesting

c. documentation

d. developing

e. flowcharting

  • a. program maintenance

Q. A data type used for nontextual data like pictures, sound and videos is called

a. Complex data type

b. OLE object data type

c. Memo data type

d. Simple data type

e. Yes/No data type

  • b. OLE object data type

Q. A(n) ________ is a system that is used for capturing knowledge from books and experiencedindividuals making it available where needed.

a. expert system

b. executive information system

c. decision support system

d. knowledge management system

e. knowledge database

  • d. knowledge management system

Q. Computer’s language consisting of binary numbers that directly corresponds to its electrical state iscalled

a. Natural

b. BASIC

c. Machine language

d. Assembly language

e. High level language

  • c. Machine language

Q. ________ is a type of computer crime in which knowledgeable thieves remove some of the computer’sRAM chips but leave enough to start the computer.

a. Memory shaving

b. Software piracy

c. Syn flooding

d. Cybergaming crime

e. None of these

  • a. Memory shaving

Q. The ________ is a portion of Internet that contains billions of documents.

a. internet

b. w3.org

c. www

d. information highway

e. None of these

  • c. www

Q. Which of the following is not a program command?

a. READ

b. PRINT

c. PURGE

d. WRITE

e. GO TO

  • e. GO TO

Q. GDI represents

a. Global Data Interface

b. Graphics Data Interface

c. Graphics Device Interface

d. Global Device Interface

e. None of these

  • c. Graphics Device Interface

Q. A robot consists of three basic components: power supply, memory and

a. software

b. arm

c. micro computer

d. co-axial cable

e. None of these

  • b. arm

Q. Status indicators are located on the

a. standard toolbar

b. formatting toolbar

c. formula bar

d. vertical scrollbar

e. horizontal scrollbar

  • c. formula bar
Subscribe Now

Get All Updates & News