Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 9

  • 26. Which physical layer devices can be used to enlarge the area covered by a single LAN segment?
    1. Switch
    2. NIC
    3. Hub
    4. Repeater
    5. RJ45 transceiver
   A.) 1 only
   B.) 1 and 3
   C.) 3 and 4
   D.) 5 only

Answer: Option 'C'

A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network.  A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations.

  • 27. Which of the following describe router functions?
   A.) Packet switching
   B.) Packet filtering
   C.) Internetwork communication
   D.) All of the above

Answer: Option 'D'

All of the given options are router functions.

  • 28. A __________ is a computer network that usually spans a city or a large campus.
   A.) LAN
   B.) DAN
   C.) MAN
   D.) WAN

Answer: Option 'C'

MAN is abbreviation for Metropolitan Area Network and is a computer network that usually spans a city or a large campus.

  • 29. What does MAN stands for?
   A.) Micro area network
   B.) Metropolitan area network
   C.) Macro area network
   D.) Mix area network

Answer: Option 'B'

MAN is abbreviation for Metropolitan Area Network.

  • 30. OSI model has how many layers?
   A.) Two layers
   B.) Five Layers
   C.) Seven Layers
   D.) Six Layers

Answer: Option 'C'

​Seven Layers

  • 31. Network __________ is the arrangement of the various elements (links, nodes, etc.) of a computer network. 
   A.) memory
   B.) topology
   C.) mainframe
   D.) protocol

Answer: Option 'B'

Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.

  • 32. Which of the following term is associated with Internet? 
   A.) Plotter 
   B.) Slide presentation  
   C.) Bookmark 
   D.) Pie Chart  

Answer: Option 'C'

Bookmark 

  • 33. The dual-port version of DRAM formerly used in graphics adaptors is :
   A.) FPM DRAM
   B.) EDORAM
   C.) VRAM
   D.) DDRSDRAM

Answer: Option 'C'

Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters. 

  • 34. Type _______to start a numbered list, and then press SPACEBAR or the TAB key.
   A.) 1# 
   B.) 1$
   C.) 1. 
   D.) 1*

Answer: Option 'C'

1. -> Spacebar -> enter, will start numbered list.

  • 35. Which of the following elements are used in an e-mail to express emotions of feelings clearly?  
   A.) Acronyms 
   B.) Abbreviations 
   C.) Rich text 
   D.) Emotions or smileys 

Answer: Option 'D'

Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message. 

  • 36. Which of the following forms a part of a search engine?  
   A.) Spiders or Web crawlers 
   B.) Indexing software 
   C.) Search algorithm 
   D.) All of these 

Answer: Option 'D'

All of these 

  • 37. _________ ports connect special types of music instruments to sound cards.
   A.) MIDI
   B.) CPU
   C.) BUS
   D.) USB

Answer: Option 'A'

MIDI stands for Musical Instrument Digital Interface, is a technical standard that describes a protocol, digital interface and connectors and allows a wide variety of electronic musical instruments, computers and other related devices to connect and communicate with one another.

  • 38. Choose the odd one out:
   A.) Brute force attack
   B.) Virtual Reality
   C.) Unethical Phreaker
   D.) Keystroke logging

Answer: Option 'B'

Except Virtual Reality all other are obvious security threats to computers and data.

  • 39. State whether true or false:
    i) A worm mails a copy of itself to other systems.
    ii) A worm executes a copy of itself on another system.
    iii) A worm cannot be spread without a human action, (such as running an infected program) to keep it going.
   A.) True, False, True
   B.) False, True, True
   C.) True, True, False
   D.) False, False, False

Answer: Option 'C'

Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.

  • 40. VIRUS stands for___________.
   A.) Vital Information Resources Under Siege
   B.) Viral Important Record User Searched
   C.) Very Interchanged Result Until Source
   D.) Very Intelligent Resources Under Search

Answer: Option 'A'

VIRUS stands for Vital Information Resources Under Siege.

  • 41. Different icons of application software can be found in which bar in latest version of Microsoft Windows?
   A.) Start Menu
   B.) Browser
   C.) Status
   D.) Control Panel

Answer: Option 'A'

Microsoft re-introduced Start Menu bar and you can access various application software like paint or Word.

  • 42. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 
   A.) program thievery
   B.) data snatching
   C.) software piracy
   D.) program looting

Answer: Option 'C'

Software piracy is the illegal copying, distribution, or use of software.

  • 43. A computer port is a specialized outlet on a piece of equipment to which a plug or cable connects, which of the following port is used to connect video sources to TVs and monitors?
   A.) 3.5mm Jack
   B.) USB
   C.) VGA
   D.) Ethernet

Answer: Option 'C'

The Video Graphics Array (VGA) is one of the oldest connection standards which can still be found in large swaths of computing equipment. It was first developed by IBM and introduced in 1987. It was widely used for video cards, TV sets, computer monitors, and laptops.

  • 44. Which among the following operation facilitate the operating system to allow more than one process to be loaded into the executable memory at a time and loaded process shares the CPU using time multiplexing?
   A.) Process Scheduling
   B.) Device queues
   C.) Execution
   D.) IPO Cycle

Answer: Option 'A'

The process scheduling is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy. Process scheduling is an essential part of Multiprogramming operating systems. 

  • 45. Which cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms and it is particularly valuable for dynamic or highly changeable workloads? 
   A.) Dynamic Cloud
   B.) Advance Cloud
   C.) Hybrid Cloud
   D.) Sharing Cloud

Answer: Option 'C'

Hybrid cloud is a cloud computing environment which uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms. By using a Hybrid approach, companies can maintain control of an internally managed private cloud while relying on the public cloud as needed.

  • 46. In first generation of computers, they used :
   A.) batch processing
   B.) multithreading
   C.) multiprogramming
   D.) networking

Answer: Option 'A'

In First Generation mainly batch processing operating system were used.

  • 47. What does DBMS stand for?
   A.) Data Management System
   B.) Database Management System
   C.) Database Management Server
   D.) Database Maintenance Server

Answer: Option 'B'

​Database Management System

  • 48. Changing desktop wallpaper is a simple task which can be accessed through ________ section of all control panel items. 
   A.) Personalize
   B.) Graphics
   C.) Image
   D.) Browser

Answer: Option 'A'

Wallpapers can be changed by the personalize section of all control panel items.

  • 49. Which of the following would most likely not be a symptom of a virus?
   A.) Existing program files and icons disappear
   B.) The CD-ROM stops functioning
   C.) The web browser opens to an unusual home page
   D.) Odd message or images are displayed on the screen

Answer: Option 'B'

Except option (b) all others are the symptoms of a computer virus.

  • 50. The type of threats on the security of a computer system or network are ……………………..
    i) Interruption   ii) Interception     iii) Modification
    iv) Creation       v) Fabrication 
   A.) i, ii, iii and iv only
   B.) ii, iii, iv and v only
   C.) i, ii, iii and v only
   D.) iii, iv and v only

Answer: Option 'C'

Except Creation all other actions performed by unauthorised and suspicious person.