Home
MCQS
UPSC,PCS,CDS,NDA MCQ Quiz Hub
Computer Awareness MCQ Competitive Exam - Sample Test 10
Choose a topic to test your knowledge and improve your UPSC,PCS,CDS,NDA skills
1. Reusable optical storage will typically have the acronym
CD
DVD
ROM
RW
2. The most common type of storage devices are
Steel
optical
magnetic
flash
3. A device that connects to a network without the use of cables is said to be
Distributed
free
centralized
none of these
4. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a
Hacker
spammer
instant messenger
programmer
5. To access properties of an object, the mouse technique to use is
Dragging
dropping
right-clicking
shift-clicking
6. A DVD is an example of a (n)
hard disk
optical disc
output device
solid-state storage device
7. The process of transferring files from a computer on the Internet to your computer is called
Downloading
uploading
FTP
JPEG
8. is the process of dividing the disk into tracks and sectors
Tracking
Formatting
Crashing
Allotting
9. Help Menu is available at which button?
End
Start
Turnoff
Restart
10. The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as
CISC
RISC
CD-ROM
Wi-Fi
11. Which is not a basic function of a computer?
Store data
Store data
Process data
Copy text
12. ASCII is a coding system that provides
256 different characters
512 different characters
1024 different characters
128 different characters
13. Which part of the computer is directly involved in executing the instructions of the computer program?
The scanner
The main storage
The secondary storage
The processor
14. When a computer is switched on, the booting process performs
Integrity Test
Power-On Self-Test
Correct Functioning Test
Reliability Test
15. A computer system that is old and perhaps not satisfactory is referred to as a(n)
Ancient system
Historical system
Age old system
Legacy system
16. Which of the following is not a binary number?
1
101
202
110
17. Which of the following does not store data permanently?
ROM
RAM
Floppy Disk
Hard Disk
18. Which of the following is the smallest storage?
Megabyte
Gigabyte
Terabyte
None of these
19. Which of the following contains permanent data and gets updated during the processing of transactions?
Operating System File
Transaction file
Software File
Master file
20. Which of the following helps to protect floppy disks from data getting accidentally erased?
Access notch
Write-protect notch
Entry notch
Input notch
21. A modem is connected to
a telephone line
a keyboard
a printer
a monitor
22. Large transaction processing systems in automated organisations use
Online processing
Batch Processing
Once-a-day Processing
End-of-day processing
23. In a computer, most processing takes place in
Memory
RAM
motherboard
CPU
24. Which of the following is not a storage medium?
Hard disk
Flash drive
DVD
scanner
25. The computer abbreviation KB usually means
Key Block
Kernel Boot
Kilo Byte
Kit Bit
26. The typical computer criminal is a(n):
Young hacker
Trusted employee with no criminal record.
Trusted employee with a long, but unknown criminal record.
Overseas young cracker
27. The common name for the crime of stealing passwords is:
Jacking
Identity theft
Spoofing
Hacking
28. Collecting personal information and effectively posing as another individual is known as the crime of
Spooling
Identity theft
Spoofing
Hacking
29. Malicious software is known as:
Badware
Malware
Maliciousware
Illegalware
30. A program that performs a useful task while simultaneously allowing destructive acts is a:
Worm
Trojan horse
Virus
Macro virus
31. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
Trojan horse
Virus
Time bomb
Time-related bomb sequence
32. In 1999, the Melissa virus was a widely publicised
E-mail virus
Macro virus
Trojan horse
Time bomb
33. What type of virus uses computer hosts to reproduce itself?
Time bomb
Worm
Melissa virus
Macro virus
34. The thing that eventually terminates a worm virus is a lack of
Memory or disk space
Time
CD drives space
CD-RW
35. When a logic bomb is activated by a time-related event, it is known as a:
Time-related bomb sequence
Virus
Time bomb
Trojan horse
36. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
Time-related bomb sequence
Virus
Time bomb
Trojan horse
37. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A virus
Spybot
Logic bomb
Security patch
38. ----- is the measurement of things such as fingerprints and retinal scans used for security access.
Biometrics
Bio measurement
Computer security
Smart weapon machinery
39. What is the most common tool used to restrict access to a computer system?
User logins
Passwords
Computer keys
Access-control software
40. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
Hacker-proof program
Firewall
Hacker-resistant server
Encryption safe wall
41. The scrambling of code is known as:
Encryption
a firewall
Scrambling
Password proofing
42. To prevent the loss of data during power failures, use a(n):
Encryption program
Surge protector
Firewall
UPS
43. --Is defined as any crime completed through the use of computer technology.
Computer forensics
Computer crime
Hacking
Cracking
44. --- refers to electronic trespassing or criminal hacking.
Cracking
Jacking
Spoofing
Smarming
45. The first electronic computer was developed by
J.V. Attansoff
Bill Gates
Simur Cray
Winton Serf
46. Snowbol is an/a--------
Operating system
HLL
Software
Search engine
47. Switching device of fifth generation computer is------
Vacuum tubes
Transistors
IC
VLSI
48. ------ computers operates essentially by counting
Portable computer
Hybrid computer
Analog computer
Digital computer
49. ---- computer is small general purpose micro computer, but larger than portable computer
Hybrid
Digital
Desktop
Laptop
50. Cathode Ray Tube is a form of.......
Keyboard
Mouse
Monitor
Mother board
51. Trackball is a.........
Input device
Output device
Programming language
Software
52. computer is a medium sized computer
Micro
Mainframe
Super
Mini
53. computer are of large size
Micro
Mainframe
Super
Mini
54. Note book, laptop,palm,hand-held computers are coming under the category of computer
Digital computer
Mainframe computer
Portable computer
Hybrid computer
55. Light pen and joystick are...........
Algorithm
Input devices
Output devices
Portals
56. Touch Screen is............
Input device
Output device
Both a & b above
None of these
57. printer is the cheapest in terms of price and operating cost
Inkjet
Laser
Thermal
Dot matrix
58. printer is a non-impact printer and is quite in working
Inkjet
Laser
Thermal
Dot matrix
Submit