Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 6

1.

The _______ icon and bold message heading indicating that the e-mail message has not been read.

   A.) Highlighted Envelope
   B.) Opened Envelope
   C.) Closed Envelope
   D.) All of these

Answer: Option 'C'

Closed Envelope

2.

Which is an open standard application programming interface (API) for accessing a database?

   A.) Universal Data Access
   B.) Open Database Connectivity
   C.) Command Line Interface
   D.) Open Data-Link Interface

Answer: Option 'B'

Open Database Connectivity

3.

Press _________ to move the insertion point to the Address box, or to highlight the URL in the Address box.

   A.) CTRL + S
   B.) ALT + A
   C.) SHIFT + TAB
   D.) ALT + D

Answer: Option 'D'

ALT + D

4.

_________ is a short-range wireless connectivity standard that uses magnetic field induction to enable communication between devices when they’re touched together, or brought within a few centimeters of each other.

   A.) Far Field Communication(FFC)
   B.) Wireless Fidelity (Wi-Fi)
   C.) Near Field Communication(NFC)
   D.) All of these

Answer: Option 'C'

Near Field Communication(NFC)

5.

In computer technology, _________ is a program, usually part of a compiler, that receives input in the form of sequential source program instructions

   A.) RAM
   B.) Cache
   C.) Parser
   D.) All of these

Answer: Option 'C'

Parser

6.

Which is a standard interactive and programming language for getting information from and updating a database?

   A.) dynamic data exchange
   B.) Structured Query Language
   C.) ASCII
   D.) Erlang programming language

Answer: Option 'B'

Structured Query Language

7.

Which of the following is a program that controls the computer’s resources?

   A.) Application Software
   B.) Compiler
   C.) Interpreter
   D.) Operating System

Answer: Option 'D'

Operating System

8.

Which of the following is a two-dimensional barcode consisting of a black and white pixel pattern which allows to encode up to a few hundred characters?

   A.) UPC code
   B.) EAN code
   C.) CODE 93
   D.) Quick Response Code

Answer: Option 'D'

Quick Response Code

9.

The fastest component for accessing stored data is ________

   A.) DVDs
   B.) Cache
   C.) hard disks.
   D.) main memory.

Answer: Option 'B'

Cache

10.

Part number, part description, and number of parts ordered are examples of _______

   A.) control
   B.) output
   C.) processing
   D.) input

Answer: Option 'D'

input

11.

Which of the following source code is highly protected and only available to trusted employees and contractors?

   A.) Open Source
   B.) Machine Code
   C.) Code was written by human
   D.) Closed Source

Answer: Option 'D'

Closed Source

12.

In the field of computers, what is the term for the process of adapting software so that an executable program can be created for a computing environment that is different from the one for which it was originally designed?

   A.) Networking
   B.) Porting
   C.) Clean up
   D.) Reading

Answer: Option 'B'

Porting

13.

Which of the following is a cyber attack intended to redirect a website’s traffic to another, fake site?

   A.) Pharming
   B.) Phishing
   C.) Piracy
   D.) Both (A) and (B)

Answer: Option 'A'

Pharming

14.

In computing,______________ is an Adaptec-developed programming interface which standardizes communication on a computer bus.

   A.) ASPI
   B.) MTBF
   C.) SCSI
   D.) All of these

Answer: Option 'A'

ASPI

15.

_______ is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users.

   A.) PC virtualization
   B.) Server virtualization
   C.) Desktop virtualization
   D.) All of these

Answer: Option 'B'

Server virtualization

16.

While selecting multiple worksheets in Excel, the following key must also be used when clicking the sheet tab ________

   A.) Alt
   B.) Insert
   C.) Ctrl
   D.) Shift

Answer: Option 'C'

Ctrl

17.

________ is a method of providing website content such as news stories or software updates.

   A.) RSS
   B.) Upgrading
   C.) Piracy
   D.) Both (1) and (2)

Answer: Option 'A'

RSS

18.

Which of the following is a method of transferring information between digital devices, especially audio and video equipment?

   A.) USB
   B.) Integrated Drive Electronics (IDE)
   C.) Small Computer System Interface(SCSI)
   D.) Firewire

Answer: Option 'D'

Firewire

19.

Which of the following is a type of malware that collects information about users without their knowledge?

   A.) Spam
   B.) Freeware
   C.) Spyware
   D.) Trojan Horse

Answer: Option 'C'

Spyware

20.

A portion of the worksheet displayed on the screen can be viewed through a _______

   A.) Worksheet Window
   B.) the active window
   C.) the task bar
   D.) the cell

Answer: Option 'A'

Worksheet Window


Computer Quiz Set - 6 Download Pdf

Recent Posts