Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 2


Which of the following contains text as well information about the text?

   A.) Machine language
   B.) High level language
   C.) Annotated language
   D.) Markup language

Answer: Option 'D'

Markup language


Which of the following will make high-level application connections on behalf of internal hosts?

   A.) Internet
   B.) Server
   C.) Application service provider.
   D.) Proxy Server

Answer: Option 'D'

Proxy Server


The _______ icon and bold message heading indicating that the e-mail message has not been read.

   A.) Highlighted Envelope
   B.) Closed Envelope
   C.) Opened Envelope
   D.) All of these

Answer: Option 'B'

​Closed Envelope


Storing same data in many places is called _______

   A.) Data Enumeration
   B.) Data Iteration
   C.) Data Concurrency
   D.) Data Redundancy

Answer: Option 'D'

Data Redundancy


In computing, ______________ is an Adaptec-developed programming interface which standardizes communication on a computer bus.

   A.) ASPI
   B.) MTBF
   C.) SCSI
   D.) All of these

Answer: Option 'A'



Which of the following is a cyber attack intended to redirect a website’s traffic to another, fake site?

   A.) Phishing
   B.) Pharming
   C.) Piracy
   D.) Both (1) and (2)

Answer: Option 'B'



Which of the following is a method of transferring information between digital devices, especially audio and video equipment?

   A.) USB
   B.) Integrated Drive Electronics (IDE)
   C.) Small Computer System Interface(SCSI)
   D.) Firewire

Answer: Option 'D'



Companies use ______ vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves.

   A.) Open source vendors
   B.) Alliances
   C.) Application service providers
   D.) All of the above

Answer: Option 'C'

Application service providers


_________ is computer processing that enables a user to extract and view data from different points of view

   A.) OLTP
   B.) OLAP
   C.) OLEP.
   D.) OLFP.

Answer: Option 'B'



There are several primary categories of procedures. Which of the following is not a primary category of procedures?

   A.) Testing
   B.) Backup and recovery
   C.) Firewall development
   D.) Design

Answer: Option 'C'

​Firewall development


By default, your documents print in ________ mode

   A.) Page setup
   B.) Portrait
   C.) Landscape
   D.) Print preview

Answer: Option 'B'



The path of the creation of an executable program is _______

   A.) coding, linking, compiling, parsing
   B.) coding, parsing, compiling, linking
   C.) coding, compiling, parsing, linking
   D.) coding, compiling, linking, parsing

Answer: Option 'D'

coding, compiling, linking, parsing


Which of the following is a specification that combines video and audio into a single digital interface?

   A.) MHL
   B.) HDMI
   C.) Serial Port
   D.) All of these

Answer: Option 'B'



Which of the following is open source project?

   A.) Firefox
   B.) MySQL
   C.) Open Office
   D.) All of these

Answer: Option 'D'

​All of these


When a hardware component fails, the computer switches over to a redundant component without the service to the user being interrupted is termed as _____________

   A.) Payload
   B.) Failover
   C.) Fault‐Tolerant
   D.) All of these

Answer: Option 'B'



Which of the following source code is highly protected and only available to trusted employees and contractors?

   A.) Machine Code
   B.) Code written by human
   C.) Closed Source
   D.) Open Source

Answer: Option 'C'

Closed Source


Which of the following is an unethical web practice that keeps users trapped on a particular site?

   A.) Hoax
   B.) Clickjacking
   C.) Browser Hijacking
   D.) Mousetrapping

Answer: Option 'B'



________ is a method of providing website content such as news stories or software updates.

   A.) RSS
   B.) Upgrading
   C.) Piracy
   D.) Both (1) and (2)

Answer: Option 'A'



When data changes in multiple lists and all lists are not updated this causes _____

   A.) data redundancy
   B.) data inconsistency
   C.) duplicate data
   D.) data overload

Answer: Option 'B'

data inconsistency


When a website automatically retrieves information from another website is known as ________

   A.) Push
   B.) Pull
   C.) Receive
   D.) All of these

Answer: Option 'B'


Computer Quiz Set - 2 Download Pdf

Recent Posts