UPSC,PCS,CDS,NDA MCQ Quiz Hub

Computer Awareness MCQ Competitive Exam - Sample Test 10

Choose a topic to test your knowledge and improve your UPSC,PCS,CDS,NDA skills

Reusable optical storage will typically have the acronym





✅ Correct Answer: 4

The most common type of storage devices are





✅ Correct Answer: 2

A device that connects to a network without the use of cables is said to be





✅ Correct Answer: 4

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a





✅ Correct Answer: 1

To access properties of an object, the mouse technique to use is





✅ Correct Answer: 3

A DVD is an example of a (n)





✅ Correct Answer: 2

The process of transferring files from a computer on the Internet to your computer is called





✅ Correct Answer: 1

is the process of dividing the disk into tracks and sectors





✅ Correct Answer: 2

Help Menu is available at which button?





✅ Correct Answer: 2

The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as





✅ Correct Answer: 2

Which is not a basic function of a computer?





✅ Correct Answer: 4

ASCII is a coding system that provides





✅ Correct Answer: 3

Which part of the computer is directly involved in executing the instructions of the computer program?





✅ Correct Answer: 4

When a computer is switched on, the booting process performs





✅ Correct Answer: 2

A computer system that is old and perhaps not satisfactory is referred to as a(n)





✅ Correct Answer: 4

Which of the following is not a binary number?





✅ Correct Answer: 3

Which of the following does not store data permanently?





✅ Correct Answer: 2

Which of the following is the smallest storage?





✅ Correct Answer: 4

Which of the following contains permanent data and gets updated during the processing of transactions?





✅ Correct Answer: 4

Which of the following helps to protect floppy disks from data getting accidentally erased?





✅ Correct Answer: 2

A modem is connected to





✅ Correct Answer: 1

Large transaction processing systems in automated organisations use





✅ Correct Answer: 2

In a computer, most processing takes place in





✅ Correct Answer: 4

Which of the following is not a storage medium?





✅ Correct Answer: 4

The computer abbreviation KB usually means





✅ Correct Answer: 3

The typical computer criminal is a(n):





✅ Correct Answer: 2

The common name for the crime of stealing passwords is:





✅ Correct Answer: 3

Collecting personal information and effectively posing as another individual is known as the crime of





✅ Correct Answer: 2

Malicious software is known as:





✅ Correct Answer: 2

A program that performs a useful task while simultaneously allowing destructive acts is a:





✅ Correct Answer: 2

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:





✅ Correct Answer: 2

In 1999, the Melissa virus was a widely publicised





✅ Correct Answer: 1

What type of virus uses computer hosts to reproduce itself?





✅ Correct Answer: 2

The thing that eventually terminates a worm virus is a lack of





✅ Correct Answer: 1

When a logic bomb is activated by a time-related event, it is known as a:





✅ Correct Answer: 3

A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:





✅ Correct Answer: 3

What is the name of an application program that gathers user information and sends it to someone through the Internet?





✅ Correct Answer: 2

----- is the measurement of things such as fingerprints and retinal scans used for security access.





✅ Correct Answer: 1

What is the most common tool used to restrict access to a computer system?





✅ Correct Answer: 2

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):





✅ Correct Answer: 2

The scrambling of code is known as:





✅ Correct Answer: 1

To prevent the loss of data during power failures, use a(n):





✅ Correct Answer: 4

--Is defined as any crime completed through the use of computer technology.





✅ Correct Answer: 2

--- refers to electronic trespassing or criminal hacking.





✅ Correct Answer: 1

The first electronic computer was developed by





✅ Correct Answer: 1

Snowbol is an/a--------





✅ Correct Answer: 2

Switching device of fifth generation computer is------





✅ Correct Answer: 4

------ computers operates essentially by counting





✅ Correct Answer: 4

---- computer is small general purpose micro computer, but larger than portable computer





✅ Correct Answer: 3

Cathode Ray Tube is a form of.......





✅ Correct Answer: 3

Trackball is a.........





✅ Correct Answer: 1

computer is a medium sized computer





✅ Correct Answer: 4

computer are of large size





✅ Correct Answer: 2

Note book, laptop,palm,hand-held computers are coming under the category of computer





✅ Correct Answer: 3

Light pen and joystick are...........





✅ Correct Answer: 2

Touch Screen is............





✅ Correct Answer: 3

printer is the cheapest in terms of price and operating cost





✅ Correct Answer: 4

printer is a non-impact printer and is quite in working





✅ Correct Answer: 1