UPSC,PCS,CDS,NDA MCQ Quiz Hub

Computer Awareness MCQ Competitive Exam - Computer

Choose a topic to test your knowledge and improve your UPSC,PCS,CDS,NDA skills

An area of a computer that temporarily holds data waiting to be processed is..........





✅ Correct Answer: 2

is the key to close a selected drop -down list; cancel a command and close a dialog box





✅ Correct Answer: 3

is the key we use to run the selected command





✅ Correct Answer: 3

Is the functional key to display save-as box





✅ Correct Answer: 4

Data becomes ................ when it is presented in a format that people can understand and use





✅ Correct Answer: 3

The term ............. designates equipment that might be added to a computer system to enhance its functionality.





✅ Correct Answer: 4

A ............ is a microprocessor -based computing device.





✅ Correct Answer: 1

RAM can be treated as the for the computer's processor





✅ Correct Answer: 3

Which of the following are the functions of a operating system





✅ Correct Answer: 4

To move a copy of file from one computer to another over a communication channel is called?





✅ Correct Answer: 1

The primary function of the ............ is to set up the hardware and load and start an operating system





✅ Correct Answer: 2

What kind of memory is both static and non -volatile?





✅ Correct Answer: 2

is computer software designed to operate the computer hardware and to provide platform for running application software





✅ Correct Answer: 2

The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second





✅ Correct Answer: 3

A device, which is not connected to CPU, is called as .......





✅ Correct Answer: 3

What is the other name for programmed chip?





✅ Correct Answer: 3

On-line real time systems become popular in ........... generation





✅ Correct Answer: 3

You use a(n) ....., such as a keyboard or mouse, to input information





✅ Correct Answer: 2

is the ability of a device to jump directly to the requested data





✅ Correct Answer: 2

provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously





✅ Correct Answer: 1

The task of performing operations like arithmetic and logical operations is called......





✅ Correct Answer: 1

ALU and Control Unit jointly known as





✅ Correct Answer: 3

RAM is an example of





✅ Correct Answer: 2

Magnetic disk is an example of





✅ Correct Answer: 1

Which one of the following is NOT a computer language





✅ Correct Answer: 1

RAM is also called as





✅ Correct Answer: 1

Store data or information temporarily and pass it on as directed by the control unit





✅ Correct Answer: 2

Select the Odd one





✅ Correct Answer: 1

A ............ is an additional set of commands that the computer displays after you make a selection from the main menu





✅ Correct Answer: 1

COBOL is an acronym for.............





✅ Correct Answer: 1

All of the following are examples of real security and privacy risks EXCEPT





✅ Correct Answer: 2

Which of the following is NOT one of the four major data processing functions of a computer?





✅ Correct Answer: 3

All of the following are examples of storage devices EXCEPT





✅ Correct Answer: 2

The CPU and memory are located on the





✅ Correct Answer: 2

is the science that attempts to produce machines that display the same type of intelligence that humans do





✅ Correct Answer: 4

Servers are computers that provide resources to other computers connected to a





✅ Correct Answer: 2

When creating a computer program, the ......... designs the structure of the program





✅ Correct Answer: 2

A computer program that converts an entire program into machine language at one time is called a/ an





✅ Correct Answer: 3

Computers process data into information by working exclusively with





✅ Correct Answer: 3

The difference between people with access to computers and the Internet and those without this access is known as the





✅ Correct Answer: 1

Computers manipulate data in many ways, and this manipulation is called......





✅ Correct Answer: 2

The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called





✅ Correct Answer: 3

Where does most data go first with in a computer memory hierarchy ?





✅ Correct Answer: 1

The………….data mining technique derives rules from real-world case examples





✅ Correct Answer: 3

…………….are used to identify a user who returns to a Website





✅ Correct Answer: 1

Codes consisting of lines of varying widths or lengths that are computer-readable are known as-





✅ Correct Answer: 4

Why is it unethical to share copyrighted files with your friends?





✅ Correct Answer: 3

Reusable optical storage will typically have the acronym-





✅ Correct Answer: 4

The most common type of storage devices are





✅ Correct Answer: 3

A device that connects to a network without the use of cables is said to be





✅ Correct Answer: 4

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a





✅ Correct Answer: 1

To access properties of an object, the mouse technique to use is





✅ Correct Answer: 3

A DVD is an example of a (n





✅ Correct Answer: 2

The process of transferring files from a computer on the Internet to your computer is called





✅ Correct Answer: 1

is the process of dividing the disk into tracks and sectors





✅ Correct Answer: 2

Help Menu is available at which button?





✅ Correct Answer: 2

The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as





✅ Correct Answer: 2

Which is not a basic function of a computer?





✅ Correct Answer: 4

ASCII is a coding system that provides





✅ Correct Answer: 3

Which part of the computer is directly involved in executing the instructions of the computer program?





✅ Correct Answer: 4

When a computer is switched on, the booting process performs





✅ Correct Answer: 2

A computer system that is old and perhaps not satisfactory is referred to as a(n)





✅ Correct Answer: 4

Which of the following is not a binary number?





✅ Correct Answer: 3

Which of the following does not store data permanently?





✅ Correct Answer: 2

Which of the following is the smallest storage?





✅ Correct Answer: 4

Which of the following contains permanent data and gets updated during the processing of transactions?





✅ Correct Answer: 4

Which of the following helps to protect floppy disks from data getting accidentally erased?





✅ Correct Answer: 2

A modem is connected to





✅ Correct Answer: 1

Large transaction processing systems in automated organisations use





✅ Correct Answer: 2

In a computer, most processing takes place in





✅ Correct Answer: 4

Which of the following is not a storage medium?





✅ Correct Answer: 4

The computer abbreviation KB usually means





✅ Correct Answer: 3

The typical computer criminal is a(n):





✅ Correct Answer: 2

The common name for the crime of stealing passwords is:





✅ Correct Answer: 3

Collecting personal information and effectively posing as another individual is known as the crime of





✅ Correct Answer: 2

Malicious software is known as:





✅ Correct Answer: 2

A program that performs a useful task while simultaneously allowing destructive acts is a





✅ Correct Answer: 2

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:





✅ Correct Answer: 2

In 1999, the Melissa virus was a widely publicised:





✅ Correct Answer: 1

What type of virus uses computer hosts to reproduce itself?





✅ Correct Answer: 2

The thing that eventually terminates a worm virus is a lack of:





✅ Correct Answer: 1

When a logic bomb is activated by a time-related event, it is known as a:





✅ Correct Answer: 3

A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a





✅ Correct Answer: 3

What is the name of an application program that gathers user information and sends it to someone through the Internet?





✅ Correct Answer: 2

------ is the measurement of things such as fingerprints and retinal scans used for security access





✅ Correct Answer: 1

What is the most common tool used to restrict access to a computer system?





✅ Correct Answer: 2

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):





✅ Correct Answer: 2

The scrambling of code is known as:





✅ Correct Answer: 1

To prevent the loss of data during power failures, use a(n):





✅ Correct Answer: 4

------Is defined as any crime completed through the use of computer technology





✅ Correct Answer: 2

------ refers to electronic trespassing or criminal hacking





✅ Correct Answer: 1

The first electronic computer was developed by





✅ Correct Answer: 1

Snowbol is an/a---------





✅ Correct Answer: 2

Switching device of fifth generation computer is-





✅ Correct Answer: 4

---------- computers operates essentially by counting





✅ Correct Answer: 4

---------- computer is small general purpose micro computer, but larger than portable computer





✅ Correct Answer: 3

Cathode Ray Tube is a form of.......





✅ Correct Answer: 3

Trackball is a...........





✅ Correct Answer: 1

computer is a medium sized computer





✅ Correct Answer: 4

computer are of large size





✅ Correct Answer: 2

Note book, laptop,palm,hand-held computers are coming under the category of......... computer





✅ Correct Answer: 3

Light pen and joystick are............





✅ Correct Answer: 2

Touch Screen is............





✅ Correct Answer: 3

printer is the cheapest in terms of price and operating cost





✅ Correct Answer: 4

printer is a non-impact printer and is quite in working





✅ Correct Answer: 1

are high-end printers





✅ Correct Answer: 2

are used for plotting graphs and design on papers





✅ Correct Answer: 4

Daisy wheel, Drum, chain etc are the .............





✅ Correct Answer: 4

are specific to users’ needs





✅ Correct Answer: 2

Joshy, Perfumes are examples of.............





✅ Correct Answer: 3

Which of the following is/ are operating systems





✅ Correct Answer: 4

MAN stands for





✅ Correct Answer: 4

Which of the following is a network topology





✅ Correct Answer: 4

Which of the following is a type of network





✅ Correct Answer: 4

VOIP stands for.........





✅ Correct Answer: 1

The first web browser is





✅ Correct Answer: 1

LAN stands for..............





✅ Correct Answer: 3

are set of rules and procedures to control the data transmission over the internet





✅ Correct Answer: 3

NOS stands for





✅ Correct Answer: 3

are system software to facilitate editing of text and data





✅ Correct Answer: 2

Computers, combine both measuring and counting, are called





✅ Correct Answer: 3

In world today, most of the computers are





✅ Correct Answer: 1

Physical structure of computer is called





✅ Correct Answer: 2

In which type of computer, data are represented as discrete signals.





✅ Correct Answer: 2

Which of the following is available in the form of a PC now?





✅ Correct Answer: 2