Basic Computer Fundamentals Questions and Answers MCQs Set - 13


________ is a technique made possible by a special program available on most computer systems.

   A.) Spamming
   B.) Vandalism
   C.) Super zapping
   D.) All of these

Answer: Option 'C'

Super zapping


The _______ icon and bold message heading indicating that the e-mail message has not been read.

   A.) Highlighted Envelope
   B.) Closed Envelope
   C.) Opened Envelope
   D.) All of these

Answer: Option 'B'

Closed Envelope


A system call of OS which is used to create a new process is known as ________

   A.) Kernel
   B.) Fork
   C.) Shell
   D.) All of these

Answer: Option 'B'



Objects on the slide that hold text are called _______

   A.) Place holders
   B.) Object holders
   C.) Auto layout
   D.) Text holders

Answer: Option 'A'

Place holders


In computing, ________ refers to reverting software (or hardware) back to an older version.

   A.) Upgrading
   B.) Downgrading
   C.) Upsizing
   D.) Downsizing

Answer: Option 'B'



The _________ protocol defines how a client and server establish an SSL connection.

   A.) HTTP
   B.) Record
   C.) Hand Shake
   D.) All of these

Answer: Option 'C'

Hand Shake


The technique that extends storage capacities of main memory beyond the actual size of the main memory is called _______

   A.) switching
   B.) virtual storage
   C.) multitasking
   D.) All of these

Answer: Option 'B'

virtual storage


AUI stands for ____

   A.) Artificial Intelligence User Interface
   B.) Arithmetic User Interface
   C.) Adjacent User Interface
   D.) Attachment User Interface

Answer: Option 'D'

Attachment User Interface


______ usually refers to a terminal attached to a minicomputer or mainframe and used to monitor the status of the system.

   A.) Machine
   B.) Emulator
   C.) Equipment
   D.) Console

Answer: Option 'D'



Which of the following is a method of transferring information between digital devices, especially audio and video equipment?

   A.) USB
   B.) Integrated Drive Electronics (IDE)
   C.) Small Computer System Interface(SCSI)
   D.) Firewire

Answer: Option 'D'



______ is a computer program that performs malicious function such as extracting a user’s password or other data or erasing the hard disk

   A.) Super zapping
   B.) Vandalism
   C.) Spamming
   D.) All of these

Answer: Option 'B'



An individual computer in “Botnet” group is known as a ____ computer.

   A.) Zombie
   B.) Computer Worm
   C.) Malicious Spyware
   D.) Rootkit

Answer: Option 'A'



Which of the following memory chip is faster?

   A.) DRAM
   B.) SRAM
   C.) RAM
   D.) All of these

Answer: Option 'B'



The elapsed time between the end of an inquiry on a computer system and the beginning of a response is termed as ______

   A.) Run Time
   B.) Access Time
   C.) Response Time
   D.) Random Time

Answer: Option 'C'

Response Time


Proprietary Software is also known as ________

   A.) Closed Source Software
   B.) Commercial Software
   C.) Open Source Software
   D.) All of these

Answer: Option 'A'

Closed Source Software


_______ is computer software designed to operate the computer hardware and to provide platform for running application software

   A.) Application software
   B.) System software
   C.) Software
   D.) Operating system

Answer: Option 'B'

System software


Which of the following Shortcut key is used to duplicate the Current Slide in MS PowerPoint?

   A.) Ctrl + V
   B.) Ctrl + C
   C.) Ctrl + D
   D.) Ctrl + E

Answer: Option 'C'

Ctrl + D


A list of rules for transferring data over a network is called ______

   A.) Protocol
   B.) Program code
   C.) Rules
   D.) All of these

Answer: Option 'A'



Which of the following is usually needed for a Web site?

   A.) dedicated server
   B.) virtual server
   C.) Off-Line Services
   D.) cache server

Answer: Option 'A'

dedicated server


______ are set of rules and procedures to control the data transmission over the internet

   A.) IP address
   B.) Domains
   C.) Protocol
   D.) Gateway

Answer: Option 'C'


Computer Quiz Set - 13 Download Pdf

Recent Posts