Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 3


Telnet is which of the following based computer protocol?

   A.) sound
   B.) image
   C.) text
   D.) All of these

Answer: Option 'C'



A program that generally has more user-friendly interface than a DBMS is called a ______

   A.) back end
   B.) front end
   C.) form
   D.) All of these

Answer: Option 'C'



Modifying data for fun and profit is defined as _____

   A.) Distributed DoS attack
   B.) Denial of Service (DoS) attack
   C.) Data Diddling
   D.) All of these

Answer: Option 'C'

​Data Diddling


The terminal device that functions as a cash register, computer terminal, and OCR reader is the _____

   A.) Data collection terminal
   B.) OCR register terminal
   C.) Video Display terminal
   D.) POS terminal

Answer: Option 'D'

POS terminal


An intelligent Hub that has the ability to determine the destination of a packet sent across the network is called ______

   A.) Repeater
   B.) Switch
   C.) Bridge
   D.) All of these

Answer: Option 'B'



The signal that a computer is waiting for a command from the user is _______

   A.) prompt
   B.) event
   C.) time slice
   D.) interrupt

Answer: Option 'A'



Mail from unwanted senders can be blocked by ______

   A.) e-mailing them & asking to be removed from the list
   B.) clicking the unsubscribe link
   C.) using mail filters
   D.) All of these

Answer: Option 'C'

using mail filters


A mistake in an algorithm that causes incorrect results is called a ______

   A.) logical error
   B.) syntax error
   C.) procedural error
   D.) compiler error

Answer: Option 'A'

logical error


A device for changing the connection on a connector to a different configuration is ______

   A.) a converter
   B.) a component
   C.) an attachment
   D.) an adapter

Answer: Option 'D'

an adapter


Which of these is considered intelligent CASE tool?

   A.) Workbench
   B.) Toolkit
   C.) Upper CASE
   D.) Lower CASE

Answer: Option 'A'



A key that is used to alternate the input mode of a group of keys on a keyboard is known as _____

   A.) Function keys
   B.) Alphanumeric keys
   C.) Toggle Keys
   D.) All of these

Answer: Option 'C'

Toggle Keys


Overwhelming or saturating resources on a target system to cause a reduction of availability to legitimate users is termed as _______

   A.) Denial of Service (DoS) attack
   B.) Distributed DoS attack
   C.) Data Diddling
   D.) All of these

Answer: Option 'A'

Denial of Service (DoS) attack


A coding language that is compatible with windows servers which is used for increased functionality on a website or to work with a database is known as _______

   A.) HTML
   B.) ASP
   C.) XML
   D.) All of these

Answer: Option 'B'



Which of the following memory chip is faster?

   A.) DRAM
   B.) RAM
   C.) SRAM
   D.) All of these

Answer: Option 'C'



The program which interprets commands given by the user?

   A.) Kernel
   B.) Shell
   C.) Fork
   D.) All of these

Answer: Option 'B'


Computer Quiz Set - 3 Download Pdf

Recent Posts