Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 2

  • 1. Which of the following contains text as well information about the text?
   A.) Machine language
   B.) High level language
   C.) Annotated language
   D.) Markup language

Answer: Option 'D'

Markup language

  • 2. Which of the following will make high-level application connections on behalf of internal hosts?
   A.) Internet
   B.) Server
   C.) Application service provider.
   D.) Proxy Server

Answer: Option 'D'

Proxy Server

  • 3. The _______ icon and bold message heading indicating that the e-mail message has not been read.
   A.) Highlighted Envelope
   B.) Closed Envelope
   C.) Opened Envelope
   D.) All of these

Answer: Option 'B'

​Closed Envelope

  • 4. Storing same data in many places is called _______
   A.) Data Enumeration
   B.) Data Iteration
   C.) Data Concurrency
   D.) Data Redundancy

Answer: Option 'D'

Data Redundancy

  • 5. In computing, ______________ is an Adaptec-developed programming interface which standardizes communication on a computer bus.
   A.) ASPI
   B.) MTBF
   C.) SCSI
   D.) All of these

Answer: Option 'A'

​ASPI

  • 6. Which of the following is a cyber attack intended to redirect a website’s traffic to another, fake site?
   A.) Phishing
   B.) Pharming
   C.) Piracy
   D.) Both (1) and (2)

Answer: Option 'B'

Pharming

  • 7. Which of the following is a method of transferring information between digital devices, especially audio and video equipment?
   A.) USB
   B.) Integrated Drive Electronics (IDE)
   C.) Small Computer System Interface(SCSI)
   D.) Firewire

Answer: Option 'D'

Firewire

  • 8. Companies use ______ vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves.
   A.) Open source vendors
   B.) Alliances
   C.) Application service providers
   D.) All of the above

Answer: Option 'C'

Application service providers

  • 9. _________ is computer processing that enables a user to extract and view data from different points of view
   A.) OLTP
   B.) OLAP
   C.) OLEP.
   D.) OLFP.

Answer: Option 'B'

OLAP

  • 10. There are several primary categories of procedures. Which of the following is not a primary category of procedures?
   A.) Testing
   B.) Backup and recovery
   C.) Firewall development
   D.) Design

Answer: Option 'C'

​Firewall development

  • 11. By default, your documents print in ________ mode
   A.) Page setup
   B.) Portrait
   C.) Landscape
   D.) Print preview

Answer: Option 'B'

Portrait

  • 12. The path of the creation of an executable program is _______
   A.) coding, linking, compiling, parsing
   B.) coding, parsing, compiling, linking
   C.) coding, compiling, parsing, linking
   D.) coding, compiling, linking, parsing

Answer: Option 'D'

coding, compiling, linking, parsing

  • 13. Which of the following is a specification that combines video and audio into a single digital interface?
   A.) MHL
   B.) HDMI
   C.) Serial Port
   D.) All of these

Answer: Option 'B'

​HDMI

  • 14. Which of the following is open source project?
   A.) Firefox
   B.) MySQL
   C.) Open Office
   D.) All of these

Answer: Option 'D'

​All of these

  • 15. When a hardware component fails, the computer switches over to a redundant component without the service to the user being interrupted is termed as _____________
   A.) Payload
   B.) Failover
   C.) Fault‐Tolerant
   D.) All of these

Answer: Option 'B'

​Failover

  • 16. Which of the following source code is highly protected and only available to trusted employees and contractors?
   A.) Machine Code
   B.) Code written by human
   C.) Closed Source
   D.) Open Source

Answer: Option 'C'

Closed Source

  • 17. Which of the following is an unethical web practice that keeps users trapped on a particular site?
   A.) Hoax
   B.) Clickjacking
   C.) Browser Hijacking
   D.) Mousetrapping

Answer: Option 'B'

​Clickjacking

  • 18. ________ is a method of providing website content such as news stories or software updates.
   A.) RSS
   B.) Upgrading
   C.) Piracy
   D.) Both (1) and (2)

Answer: Option 'A'

RSS

  • 19. When data changes in multiple lists and all lists are not updated this causes _____
   A.) data redundancy
   B.) data inconsistency
   C.) duplicate data
   D.) data overload

Answer: Option 'B'

data inconsistency

  • 20. When a website automatically retrieves information from another website is known as ________
   A.) Push
   B.) Pull
   C.) Receive
   D.) All of these

Answer: Option 'B'

​Pull

  • 21. ______ is a way to quickly access a favorite website by saving it in your browser
   A.) Cookie
   B.) Bookmark
   C.) blog
   D.) Both (1) and (2)

Answer: Option 'B'

​Bookmark

  • 22. Which of the following is the one that runs within a browser and does not need to be pre- installed?
   A.) Thin Clients
   B.) Thick Clients
   C.) Client
   D.) All of these

Answer: Option 'A'

​Thin Clients

  • 23. Which one of the following rebooting commonly occurs when the system of the computer is crashed?
   A.) Soft rebooting
   B.) Cold rebooting
   C.) Hard rebooting
   D.) Random rebooting

Answer: Option 'D'

Random rebooting

  • 24. System Software
   A.) is a programming language
   B.) is an optional form of software
   C.) helps the computer to manage internal resources
   D.) controls and manipulates data

Answer: Option 'C'

​helps the computer to manage internal resources

  • 25. Which of the following is used to move your paragraph closer to margin?
   A.) change case
   B.) increase indent
   C.) decrease indent
   D.) Both (1) and (2)

Answer: Option 'C'

decrease indent

Computer Quiz Set - 2 Download Pdf