Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 5

1.

Which of the following is a program that uses a variety of different approaches to identify and eliminate spam?

   A.) Directory search
   B.) Anti-spam program
   C.) Software
   D.) Firmware

Answer: Option 'B'

Anti-spam program

2.

Which of the following is the full-form of ENIAC? 

   A.) Electronic Numerical Integrator and Computer
   B.) Electrical Numerical Integer and Calculator
   C.) Electrical Numerical Integer and Computation
   D.) Efficient Numerical Integrator and Computer

Answer: Option 'A'

ENIAC stands for Electronic Numerical Integrator and Computer

3.

A language that can be written on one platform and executed on another platform is said to be __________.

   A.) portable
   B.) robust
   C.) third generation
   D.) dynamic

Answer: Option 'A'

portable

4.

Which of the following is a cache memory that is used to speed up the process of storing and accessing data from the host hard disk?

   A.) Crashing
   B.) Disk Caching
   C.) File Compression
   D.) RAID

Answer: Option 'B'

Disk Caching

5.

Select the best description of Read Only Memory(ROM)

   A.) Volatile used to store information that does not change during system operation
   B.) Volatile used to store information that changes during system operation
   C.) Non-Volatile used to store information that does not change during system operation
   D.) Non-Volatile used to store information that changes during system operation

Answer: Option 'C'

Non-Volatile used to store information that does not change during system operation

6.

Which of the following is not a type of database?

   A.) Hierarchical
   B.) Relational
   C.) Transition
   D.) Network

Answer: Option 'C'

There is no transition database.

7.

Which of the following application layer protocols does not use UDP? 

   A.) FTP
   B.) SNMP
   C.) DNS
   D.) VoIP

Answer: Option 'A'

Each application layer protocol uses one of the transport layer protocols for transmitting data from one end to another. UDP is an unreliable protocol that does not provide any acknowledgment for the receipt of the data. Therefore, the application layer protocols that require reliable connection use TCP as the transport protocol. FTP is one of the application layer protocols that uses TCP.

 

8.

A _________ is a type of malware that is designed to change your browser’s settings.

   A.) Hoax
   B.) Clickjacking
   C.) Browser Hijacker
   D.) Mousetrapping

Answer: Option 'C'

Browser Hijacker

9.

In excel which of the following symbols is used before a numeric value so that it can be treated as a labeled value?

   A.) ” (quote)
   B.) = (equal)
   C.) ’ (apostrophe)
   D.) _ (underscore)

Answer: Option 'C'

In MS Excel, apostrophe is a symbol that is used to convert the numeric value in the text format. To do this, you need to add the apostrophe symbol before the numeric value.

10.

By an Intranet we mean _____

   A.) A LAN of an organization
   B.) A Wide Area Network for all branches of an organization
   C.) Personal Area Network of top management of an organization
   D.) A network connecting all computers of an organization using Internet Protocol

Answer: Option 'D'

A network connecting all computers of an organization using Internet Protocol

11.

Which of the following is open source project?

   A.) Firefox
   B.) MySQL
   C.) Open Office
   D.) All of these

Answer: Option 'D'

All of these

12.

______ describes a network in which a company’s data and applications are stored at offsite data centres that are accessed over the Internet.

   A.) Virtual Private Network
   B.) Intranet
   C.) Extranet
   D.) Cloud Computing

Answer: Option 'D'

Cloud Computing

13.

Which of the following menu types is also called a drop-down menu?

   A.) go-up
   B.) pull-down
   C.) cascading
   D.) fly-but

Answer: Option 'B'

Drop Down menu is also called drop down list or pull down list.
 

14.

Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?

   A.) HTTP 
   B.) FTP 
   C.) Telnet 
   D.) POP3

Answer: Option 'C'

Through Telnet, an administrator or another user can establish a connection to someone else's computer remotely. On the Web, HTTP and FTP protocols allow you to request specific files from remote computers, but not to actually be logged on as a user of that computer.

15.

You can select which of the following format to save a document in a previous Word version?

   A.) Word 97-2003 Document 
   B.) XPS Document 
   C.) Open Document Text 
   D.) Word Template 

Answer: Option 'A'

Word 97-2003 Document is a compatible format used to save a document in a compatibility mode with previous versions of Word document.

Computer Quiz Set - 5 Download Pdf

Recent Posts