Computer MCQ Quiz Hub

Computer mcqs smaple paper 2

Choose a topic to test your knowledge and improve your Computer skills

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a





✅ Correct Answer: 1

To access properties of an object, the mouse technique to use is





✅ Correct Answer: 3

A DVD is an example of a (n





✅ Correct Answer: 2

The process of transferring files from a computer on the Internet to your computer is called





✅ Correct Answer: 1

is the process of dividing the disk into tracks and sectors





✅ Correct Answer: 2

Help Menu is available at which button?





✅ Correct Answer: 2

The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as





✅ Correct Answer: 2

Which is not a basic function of a computer?





✅ Correct Answer: 4

ASCII is a coding system that provides





✅ Correct Answer: 3

Which part of the computer is directly involved in executing the instructions of the computer program?





✅ Correct Answer: 4

When a computer is switched on, the booting process performs





✅ Correct Answer: 2

A computer system that is old and perhaps not satisfactory is referred to as a(n)





✅ Correct Answer: 4

Which of the following is not a binary number?





✅ Correct Answer: 3

Which of the following does not store data permanently?





✅ Correct Answer: 2

Which of the following is the smallest storage?





✅ Correct Answer: 4

Which of the following contains permanent data and gets updated during the processing of transactions?





✅ Correct Answer: 4

Which of the following helps to protect floppy disks from data getting accidentally erased?





✅ Correct Answer: 2

A modem is connected to





✅ Correct Answer: 1

Large transaction processing systems in automated organisations use





✅ Correct Answer: 2

In a computer, most processing takes place in





✅ Correct Answer: 4

Which of the following is not a storage medium?





✅ Correct Answer: 4

The computer abbreviation KB usually means





✅ Correct Answer: 3

The typical computer criminal is a(n):





✅ Correct Answer: 2

The common name for the crime of stealing passwords is:





✅ Correct Answer: 3

Collecting personal information and effectively posing as another individual is known as the crime of





✅ Correct Answer: 2

Malicious software is known as:





✅ Correct Answer: 2

A program that performs a useful task while simultaneously allowing destructive acts is a





✅ Correct Answer: 2

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:





✅ Correct Answer: 2

In 1999, the Melissa virus was a widely publicised:





✅ Correct Answer: 1

What type of virus uses computer hosts to reproduce itself?





✅ Correct Answer: 2

The thing that eventually terminates a worm virus is a lack of:





✅ Correct Answer: 1

When a logic bomb is activated by a time-related event, it is known as a:





✅ Correct Answer: 3

A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a





✅ Correct Answer: 3

What is the name of an application program that gathers user information and sends it to someone through the Internet?





✅ Correct Answer: 2

------ is the measurement of things such as fingerprints and retinal scans used for security access





✅ Correct Answer: 1

What is the most common tool used to restrict access to a computer system?





✅ Correct Answer: 2

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):





✅ Correct Answer: 2

The scrambling of code is known as:





✅ Correct Answer: 1

To prevent the loss of data during power failures, use a(n):





✅ Correct Answer: 4

------Is defined as any crime completed through the use of computer technology





✅ Correct Answer: 2

------ refers to electronic trespassing or criminal hacking





✅ Correct Answer: 1

The first electronic computer was developed by





✅ Correct Answer: 1

Snowbol is an/a---------





✅ Correct Answer: 2

Switching device of fifth generation computer is-





✅ Correct Answer: 4

---------- computers operates essentially by counting





✅ Correct Answer: 4

---------- computer is small general purpose micro computer, but larger than portable computer





✅ Correct Answer: 3

Cathode Ray Tube is a form of.......





✅ Correct Answer: 3

Trackball is a...........





✅ Correct Answer: 1

computer is a medium sized computer





✅ Correct Answer: 4

computer are of large size





✅ Correct Answer: 2