Computer Knowledge MCQ-5

Question No:1

___ are self replicating malicious code independent of the action of the user, but slow down the processes on entering a network.

(A) Viruses
(B) Worms
(C) Trojan Horse
(D) All of the above
(E) None of these

Question No:2

Computers use the ……… language to process data.

(A) processing
(B) code
(C) binary
(D) representational
(E) None of these

Question No:3

A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a ……… .

(A) spammer
(B) hacker
(C) instant messenger
(D) programmer
(E) analyst

Question No:4

What does the Ctrl + I shortcut key accomplish in MS-Word ?

(A) It makes the selected text bold
(B) It adds a line break to the document
(C) It applies Italic formatting to the selected text
(D) It converts selected text into the next larger size of the same font
(E) None of the above

Question No:5

The process of preparing a floppy diskette for use is called:

(A) assembling
(B) translating
(C) parsing
(D) formatting
(E) None of the above

Question No:6

Web site is a collection of—

(A) HTML documents
(B) Graphic files
(C) Audio and video files
(D) All of the above
(E) None of these

Question No:7

Fibre optics cable supports data rate upto

(A) 100 Mbps to 2 Gbps
(B) 2 Gbps to 4 Gbps
(C) 100 Mbps to 10 Gbps
(D) 10 Gbps to 100 Gbps
(E) None of these

Question No:8

Laser beam technology is used for:

(A) terminals
(B) keyboards
(C) optical disks
(D) magnetic tape
(E) None of these

Question No:9

In a punched card system, data is processed by a :

(A) Keypunch machine, sorter and posting machine
(B) Accounting machine, posting machine and billing machine
(C) Sorter, posting machine, and billing machine
(D) Accounting machine, keypunch machine and sorter
(E) None of these

Question No:10

Computers manipulate data in many ways, and this manipulation is called ……… .

(A) upgrading
(B) processing
(C) batching
(D) utilizing
(E) None of these

Question No:11

Documentation while developing a software for a Bank is required for

(A) Auditing
(B) Correction
(C) Editing
(D) All of the above
(E) None of these

Question No:12

Assembly language programs are written using

(A) Hex code
(B) Mnemonics
(C) ASCII code
(E) None of these

Question No:13

Time during which a job is processed by the computer is:

(A) Delay times
(B) Real time
(C) Execution time
(D) Down time
(E) None of these

Question No:14

Which of the following are advantages of CD-ROM as a storage media ?

(A) CD-ROM is an inexpensive way to store large amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) All of these
(E) None of these

Question No:15

All of the following TRUE of the Safe Mode EXCEPT:

(A) Safe Mode is a special diagnostic mode
(B) Safe Mode loads all nonessential icons
(C) Safe Mode allows users to troubleshoot errors
(D) Safe Mode loads only the most essential devices
(E) None of these

Question No:16

A program that converts a high-level language source file into a machine-language file is called a :

(A) translator
(B) assembler
(C) compiler
(D) linker
(E) None of the above

Question No:17

Which of the following is the Word Processor in MS Office?

(A) Word Star
(B) Word Pad
(C) Word
(D) Word Perfect
(E) None of these

Question No:18

A disk where number of sectors are fixed is called

(A) Floppy
(B) CD
(C) Hard sectored
(D) Soft sectored
(E) None of these

Question No:19

Which of the following is graphics solution for Word Processors ?

(A) Clip Art
(B) Word Art
(C) Drop Cap
(D) All of these
(E) None of these

Question No:20

Main memory works in conjunction with ……….

(A) special function cards
(D) Intel
(E) All of these