Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 4

  • 1. Which of the following refers to the means by which an OS or any other programs interacts with the user?
   A.) Program front-end
   B.) Programming Interface
   C.) User Compatibility
   D.) User Interface

Answer: Option 'D'

User Interface

  • 2. To access a mainframe or Supercomputer, users often use a ______.
   A.) Node
   B.) Terminal
   C.) Desktop
   D.) All of these

Answer: Option 'B'

Terminal

  • 3. Which of the following is an application designed to probe a server or host for open ports?
   A.) bit robbing
   B.) Web services description language (WSDL)
   C.) jabber
   D.) port scan

Answer: Option 'D'

port scan

  • 4. _________ is an industry standard for a mobile audio/video interface that allows one to connect electronic devices such as mobile phones, tablets etc., to high-definition televisions (HDTVs) and audio receivers.
   A.) HDMI (High-Definition Multimedia Interface)
   B.) MHL(Mobile High-Definition Link)
   C.) SDI (Serial Digital Interface)
   D.) All of these

Answer: Option 'B'

MHL(Mobile High-Definition Link)

  • 5. Multi user systems provided cost savings for small business because they use a single processing unit to link several ______
   A.) Personal computers
   B.) Workstations
   C.) Dumb terminals
   D.) Mainframes

Answer: Option 'C'

Dumb terminals

  • 6. The difference between memory and storage is that memory is _____ and storage is _________
   A.) Permanent, temporary
   B.) Temporary, permanent
   C.) Slow, fast
   D.) All of these

Answer: Option 'B'

​Temporary, permanent

  • 7. A collection of conceptual tools for describing data, relationships, semantics & constraints is referred as ________
   A.) data model
   B.) ER model
   C.) DBMS
   D.) All of these

Answer: Option 'A'

data model

  • 8. ______ is a feature for scheduling & multiprogramming to provide an economical interactive system of two or more users.
   A.) time tracing
   B.) time sharing
   C.) multi-tasking
   D.) All of these

Answer: Option 'B'

​time sharing

  • 9. When a hardware component fails, the computer switches over to a redundant component without the service to the user being interrupted is termed as _____________
   A.) Payload
   B.) Fault‐Tolerant
   C.) Failover
   D.) All of these

Answer: Option 'C'

​Failover

  • 10. ______ is a network security system, either hardware or software based that monitors traffic to or from your network based on a set of rules.
   A.) Anti Spyware
   B.) Anti-virus
   C.) Firewall
   D.) All of these

Answer: Option 'C'

​Firewall

  • 11. Which is a device designed to absorb and disperse heat away from a microprocessor?
   A.) PCI
   B.) Heat Sink
   C.) Motherboard
   D.) All of these

Answer: Option 'B'

​Heat Sink

  • 12. Which of the following is not a primary category of procedures? 
   A.) Testing
   B.) Backup and recovery
   C.) Firewall development
   D.) Design

Answer: Option 'C'

​Firewall development

  • 13. Which of the following is the first computer to use Stored Program Concept?
   A.) UNIVAC
   B.) ENIAC
   C.) EDSAC
   D.) All of these

Answer: Option 'C'

EDSAC

  • 14. 1 nibble equals to _____
   A.) 1 bits
   B.) 2 bits
   C.) 4 bits
   D.) 8 bits

Answer: Option 'C'

​4 bits

  • 15. ______ provides total solutions to reduce data redundancy, inconsistency, dependence & unauthorized access of data.
   A.) Table
   B.) Protection password
   C.) Data reliability
   D.) All of these

Answer: Option 'B'

​Protection password

  • 16. The particular field of a record that uniquely identifies each record is called the ______
   A.) primary field
   B.) key field
   C.) master field
   D.) All of these

Answer: Option 'B'

​key field

  • 17. The term _______ designates equipment that might be added to a computer system to enhance its functionality. 
   A.) digital device
   B.) peripheral device
   C.) system add-on
   D.) disk components

Answer: Option 'B'

​peripheral device

  • 18. A computer-intensive problem runs on a ______
   A.) Server
   B.) Personal Computer
   C.) Mainframe Computer
   D.) Super Computer

Answer: Option 'D'

Super Computer

  • 19. A _________ is a type of malware that is designed to change your browser’s settings.
   A.) Hoax
   B.) Clickjacking
   C.) Browser Hijacker
   D.) Mousetrapping

Answer: Option 'C'

Browser Hijacker

  • 20. When a file contains instructions that can be carried out by the computer. It is known as _________.
   A.) information
   B.) application
   C.) executable
   D.) data

Answer: Option 'C'

​executable

  • 21. The displayed data over the internet can be classified into two types. They are _______
   A.) Static & Dynamic
   B.) Graphical & Text
   C.) Data & Voice
   D.) All of these

Answer: Option 'A'

Static & Dynamic

  • 22. Which is an open source development environment to develop dynamic web pages?
   A.) PHP
   B.) XML
   C.) VB Script
   D.) All of these

Answer: Option 'A'

PHP

  • 23. _____are distinct items that don’t have much meaning to you in a given answer
   A.) Fields
   B.) Data
   C.) Queries
   D.) All of these

Answer: Option 'A'

Fields

  • 24. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft is known as ______
   A.) Pharming
   B.) Smishing
   C.) Vishing
   D.) All of these

Answer: Option 'C'

Vishing

  • 25. Which of the following is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites?
   A.) server accelerator card
   B.) smart card
   C.) PCMCIA card
   D.) network interface card

Answer: Option 'A'

server accelerator card

Computer Quiz Set - 4 Download Pdf