Computer knowledge MCQ-8

Question No:1

Auto Correct was originally designed to replace ……… words as you type.

(A) Short repetitive
(B) Grammatically incorrect
(C) Misspelled
(D) All of these
(E) None of these

Question No:2

The term, Hypertext, means……….

(A) Non-sequential writing
(B) Hypermedia i
(C) Text with heavy formatting
(D) Blinking text
(E) None of these

Question No:3

To protect organisation from virus or attacks

(A) All mails sent and received should be monitored
(B) All messages should be encrypted
(C) E-mails should be used only for official purpose
(D) All of the above
(E) None of these

Question No:4

A computer-based information system is

(A) A system in which a computer is used to process data to get information
(B) Developing data
(C) Performing complex mathematical calculations
(D) Data is put into the computer for processing
(E) None of these

Question No:5

The common name for the crime of stealing passwords is :

(A) spooling
(B) identity theft
(C) phishing
(D) hacking
(E) None of these

Question No:6

Which of the following functions are not performed by servers ?

(A) Email processing
(B) Database sharing
(C) Processing Web sites
(D) Storage
(E) Word processing

Question No:7

A physical connection between the microprocessor memory and other parts of the microcomputer is known as:

(A) Path
(B) Address bus
(C) Router
(D) All of these
(E) None of these

Question No:8

Compatibility in regard to computers refers to :

(A) the software doing the right job for the user
(B) it being versatile enough to handle the job
(C) the software being able to run on the computer
(D) software running with other previously installed software
(E) None of the above

Question No:9

Which of the following is not a special program in MS Office?

(A) Office Art
(B) Clip Art
(C) Word Art
(D) Paint Art
(E) None of these

Question No:10


(A) Permanent storage device
(B) Temporary storage device
(C) Not a storage device
(D) Volatile
(E) None of these

Question No:11

Malicious software is known as:

(A) badware
(B) malware
(C) malicious ware
(D) illegal ware
(E) None of these

Question No:12

The main job of a CPU is to ……… .

(A) carry out program instructions
(B) store data/information for future use
(C) process data and information
(D) Both (1) and (3)
(E) None of these

Question No:13

The toolbar in which you can type a web address is the ………Bar.

(A) Address
(B) Format
(C) Status
(D) Navigation
(E) None of these

Question No:14

A record is related to a file, as a statement is related to a :

(A) procedure
(B) file
(C) program
(D) data
(E) None of these

Question No:15

The binary values are represented by two different frequencies in

(A) Amplitude shift keying
(B) Frequency shift keying
(C) Phase-shift keying
(D) Time period
(E) None of these

Question No:16

DSL is an example of a(n) ……… connection.

(A) network
(B) wireless
(C) slow
(D) Broadband
(E) None of these

Question No:17

the internet to your computer is called ………

(A) downloading
(B) uploading
(E) downsizing

Question No:18

……… are used to identify a user who returns to a Website.

(A) Cookies
(B) Plug-ins
(C) Scripts
(D) ASPs
(E) None of these

Question No:19

Output which is made up of pictures, sounds and video is called :

(B) hard copy
(C) graphics
(D) multimedia
(E) None of the above

Question No:20

For optical fiber used in point to point transmission, the repeater spacing is

(A) 10-100 km
(B) 2-10 km
(C) 1 – 10 km
(D) 100-1000 km
(E) None of these