Basic Computer Fundamentals Questions and Answers MCQs Set - 13

  • 1. Which of the following domains is used for profit businesses?
   A.) .com
   B.) .edu
   C.) .net
   D.) All of these

Answer: Option 'A'

.com

  • 2. A list of rules for transferring data over a network is called ______
   A.) Protocol
   B.) Program code
   C.) Rules
   D.) All of these

Answer: Option 'A'

Protocol

  • 3. Proprietary Software is also known as ________
   A.) Closed Source Software
   B.) Commercial Software
   C.) Open Source Software
   D.) All of these

Answer: Option 'A'

Closed Source Software

  • 4. Which of the following memory chip is faster?
   A.) DRAM
   B.) SRAM
   C.) RAM
   D.) All of these

Answer: Option 'B'

SRAM

  • 5. The technique that extends storage capacities of main memory beyond the actual size of the main memory is called _______
   A.) switching
   B.) virtual storage
   C.) multitasking
   D.) All of these

Answer: Option 'B'

virtual storage

  • 6. A mistake in an algorithm that causes incorrect results is called a ______
   A.) compiler error
   B.) procedural error
   C.) syntax error
   D.) logical error

Answer: Option 'D'

logical error

  • 7. A set of flip flops integrated together is called ____
   A.) Adder
   B.) Counter
   C.) Register
   D.) All of these

Answer: Option 'C'

Register

  • 8. The signal that a computer is waiting for a command from the user is _______
   A.) prompt
   B.) event
   C.) time slice
   D.) interrupt

Answer: Option 'A'

prompt

  • 9. ______ is a primary key of one file that also appears in another file.
   A.) Physical key
   B.) Foreign key
   C.) Logical key
   D.) All of these

Answer: Option 'B'

Foreign key

  • 10. Which of the following is usually needed for a Web site?
   A.) dedicated server
   B.) virtual server
   C.) Off-Line Services
   D.) cache server

Answer: Option 'A'

dedicated server

  • 11. Which of the following memories must be refreshed many times per second?
   A.) Static RAM
   B.) Dynamic RAM
   C.) EPROM
   D.) ROM

Answer: Option 'B'

Dynamic RAM

  • 12. ________ is a technique made possible by a special program available on most computer systems.
   A.) Spamming
   B.) Vandalism
   C.) Super zapping
   D.) All of these

Answer: Option 'C'

Super zapping

  • 13. ______ is a computer program that performs malicious function such as extracting a user’s password or other data or erasing the hard disk
   A.) Super zapping
   B.) Vandalism
   C.) Spamming
   D.) All of these

Answer: Option 'B'

Vandalism

  • 14. An individual computer in “Botnet” group is known as a ____ computer.
   A.) Zombie
   B.) Computer Worm
   C.) Malicious Spyware
   D.) Rootkit

Answer: Option 'A'

Zombie

  • 15. The _______ icon and bold message heading indicating that the e-mail message has not been read.
   A.) Highlighted Envelope
   B.) Closed Envelope
   C.) Opened Envelope
   D.) All of these

Answer: Option 'B'

Closed Envelope

  • 16. Which of the following is a method of transferring information between digital devices, especially audio and video equipment?
   A.) USB
   B.) Integrated Drive Electronics (IDE)
   C.) Small Computer System Interface(SCSI)
   D.) Firewire

Answer: Option 'D'

Firewire

  • 17. Which of the following is a specification that combines video and audio into a single digital interface?
   A.) MHL
   B.) HDMI
   C.) Serial Port
   D.) All of these

Answer: Option 'B'

HDMI

  • 18. By default, your documents print in ________ mode
   A.) Page setup
   B.) Portrait
   C.) Landscape
   D.) Print preview

Answer: Option 'B'

Portrait

  • 19. The path of the creation of an executable program is _______
   A.) coding, linking, compiling, parsing
   B.) coding, parsing, compiling, linking
   C.) coding, compiling, parsing, linking
   D.) coding, compiling, linking, parsing

Answer: Option 'D'

coding, compiling, linking, parsing

  • 20. _______ is a computer program that attempts to simulate an abstract model of a particular system.
   A.) Machine
   B.) Console
   C.) Simulator
   D.) Emulator

Answer: Option 'C'

Simulator

  • 21. ______ usually refers to a terminal attached to a minicomputer or mainframe and used to monitor the status of the system.
   A.) Machine
   B.) Emulator
   C.) Equipment
   D.) Console

Answer: Option 'D'

Console

  • 22. _______ is computer software designed to operate the computer hardware and to provide platform for running application software
   A.) Application software
   B.) System software
   C.) Software
   D.) Operating system

Answer: Option 'B'

System software

  • 23.

    Hardware or software designed to guard against unauthorized access to a computer network is known as ______

   A.) hacker-proof program
   B.) firewall
   C.) hacker-resistant server.
   D.) All of these

Answer: Option 'B'

firewall

  • 24. DMA stands for ______
   A.) Digital Memory Access
   B.) Direct Memory Access
   C.) Distinct Memory Allocation
   D.) Direct Memory Allocation

Answer: Option 'B'

Direct Memory Access

  • 25. ______ are set of rules and procedures to control the data transmission over the internet
   A.) IP address
   B.) Domains
   C.) Protocol
   D.) Gateway

Answer: Option 'C'

Protocol



Computer Quiz Set - 13 Download Pdf