Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 1

  • 26. Which is the standard monitor or display interface used in most PCs?
   A.) VGA
   B.) NIC
   C.) RAM
   D.) Router

Answer: Option 'A'

​VGA

  • 27. _________ is a method of providing website content such as news stories or software updates.
   A.) RSS
   B.) Upgrading
   C.) Piracy
   D.) Both (1) and (2)

Answer: Option 'A'

RSS

  • 28. Which of the following inputs a computer’s memory, but unlike a virus, it does not replicate itself?
   A.) Trojan Horse
   B.) Logic bomb
   C.) Firewall
   D.) Both (1) and (2)

Answer: Option 'B'

Logic bomb

  • 29. Press _________ to move the insertion point to the Address box, or to highlight the URL in the Address box.
   A.) CTRL + S
   B.) ALT + A
   C.) ALT + D
   D.) TAB + CTRL

Answer: Option 'C'

​ALT + D

  • 30. Which is an open source development environment to develop dynamic web pages?
   A.) PHP (Hypertext Preprocessor)
   B.) VB Script
   C.) XML
   D.) None of these

Answer: Option 'A'

PHP (Hypertext Preprocessor)

  • 31. Which of the following activity can be termed as software piracy?
   A.) Soft loading
   B.) Renting
   C.) Counterfeiting
   D.) All of these

Answer: Option 'D'

All of these

  • 32. An email feature, which is used to send a copy of an email to one or many other people at the same time that you are sending it to the main recipient/s is called
   A.) CC
   B.) BCC
   C.) To
   D.) None of these

Answer: Option 'A'

CC

  • 33. A dynamic website that is normally database driven and which enables the owner/user to manage the content of their own website without needing to know any coding at all is known as _____
   A.) Content Management System (CMS)
   B.) ASP
   C.) DNS
   D.) None of these

Answer: Option 'A'

Content Management System (CMS)

  • 34. The process of analyzing large data sets in search of new, previously undiscovered relationships is known as ______
   A.) data mining
   B.) data marting
   C.) data maintenance
   D.) data warehousing

Answer: Option 'A'

data mining

  • 35. A repository of data that is designed to serve a particular community of knowledge workers is called _________
   A.) data mart
   B.) data warehousing
   C.) data maintenance
   D.) None of these

Answer: Option 'A'

data mart

  • 36. An intelligent Hub that has the ability to determine the destination of a packet sent across the network is called ______
   A.) Bridge
   B.) Switch
   C.) Repeater
   D.) None of these

Answer: Option 'B'

Switch

  • 37. Which stores information about the user’s web activity?
   A.) Spam
   B.) Cache
   C.) Cookie
   D.) None of these

Answer: Option 'C'

Cookie

  • 38. Layer which manages flow control & ensures reliable delivery of data packets in sequence with no losses or duplications is known as ______
   A.) Session Layer
   B.) Presentation Layer
   C.) Transport Layer
   D.) None of these

Answer: Option 'C'

Transport Layer

  • 39. Layer which manages flow control & ensures reliable delivery of data packets in sequence with no losses or duplications is known as ______
   A.) Presentation Layer
   B.) Transport Layer
   C.) Session Layer
   D.) None of these

Answer: Option 'B'

Transport Layer

  • 40. Vendor-created program modifications are called _______
   A.) patches
   B.) antiviruses
   C.) holes
   D.) None of these

Answer: Option 'A'

patches

  • 41. Which of the following is the smallest and fastest computer imitating brain working?
   A.) Super Computer
   B.) Quantum Computer
   C.) Param 1000
   D.) All of these

Answer: Option 'B'

Quantum Computer

  • 42. Which of the following programming language does not need a translator?
   A.) Assembly language
   B.) High level language
   C.) BASIC
   D.) Machine language

Answer: Option 'D'

Machine language

  • 43. Which of the following is/are the core functions of all firewalls?
   A.) Filtering
   B.) Logging
   C.) Proxying
   D.) All of the above

Answer: Option 'D'

All of the above

  • 44. A(n) ______ allows network users to share a single copy of software, which resides on the network server.
   A.) single-user license agreement
   B.) network site license
   C.) end-user license agreement
   D.) business software license

Answer: Option 'B'

​network site license

  • 45. Programs that automatically submit your search request to several search engines simultaneously are called _______
   A.) Metasearch engines
   B.) Spiders
   C.) Web crawlers
   D.) Hits

Answer: Option 'A'

Metasearch engines

  • 46. A device that regenerates the signal transmitted on a cable in a network is called _______
   A.) Repeater
   B.) Bridge
   C.) Router
   D.) All of these

Answer: Option 'A'

Repeater

  • 47. A code that represents English characters as numbers and ranging from 0 to 127 is known as ______
   A.) ASCII
   B.) BCD
   C.) EBCDIC
   D.) All of these

Answer: Option 'A'

ASCII

  • 48. A type of phishing attack where mobile phone users receive text messages containing a Web site hyperlink is called _____
   A.) Pharming
   B.) Smishing
   C.) Vishing
   D.) All of these

Answer: Option 'B'

Smishing

  • 49. A most Sophisticated relay device used in a network that can be used to interconnect systems with different protocols, formatting languages and architecture is called ______
   A.) Gateway
   B.) Bridge
   C.) Switch
   D.) All of these

Answer: Option 'A'

Gateway

  • 50. An Interface refers to a specification by which programs can communicate with a web server is called ______
   A.) Musical Instrument Digital Interface (MIDI)
   B.) Graphical User Interface (GUI)
   C.) Common Gateway Interface (CGI)
   D.) All of these

Answer: Option 'C'

Common Gateway Interface (CGI)