Govt Jobs Test Preparation of Computer MCQS for LDC, UDC, Assistant, Data Entry Operator, Stenographer and Computer Operator

 

1. ------------Is the functional key to display save-as box?





ANSWER= (B) F12
Explain:-

 

2. Data becomes------------when it is presented in a format that people can understand and use.





ANSWER= (C) information
Explain:-

 

3. The term-----------designates equipment that might be added to a computer system to enhance its functionality.





ANSWER= (D) peripheral device
Explain:-

 

4. A ------------is a microprocessor -based computing device?





ANSWER= (A) personal computer
Explain:-

 

5. RAM can be treated as the------------for the computer’s processor?





ANSWER= (C) waiting room
Explain:-

 

6. Which of the following are the functions of a operating system?





ANSWER= (D) All of the above
Explain:-

 

7. To move a copy of file from one computer to another over a communication channel is called?





ANSWER= (A) File transfer
Explain:-

 

8. The primary function of the----------is to set up the hardware and load and start an operating system?





ANSWER= (B) BIOS
Explain:-

 

9. What kind of memory is both static and non -volatile?





ANSWER= (B) ROM
Explain:-


10. -------------is computer software designed to operate the computer hardware and to provide platform for running application software?





ANSWER= (B) System software (
Explain:-

 

11. The--------------is the amount of data that a storage device can move from the storage medium to the Computer per second?





ANSWER= (C) data transfer rate
Explain:-

 

12. A device, which is not connected to CPU, is called as-----------?





ANSWER= (C) Off-line device
Explain:-

 

13. What is the other name for programmed chip?





ANSWER= (C) LSIC
Explain:-

 

14. On-line real time systems become popular in--------------generation?





ANSWER= (C) Third Generation
Explain:-

 

15. You use a(n)-----------such as a keyboard or mouse, to input information?





ANSWER= (B) input device
Explain:-

 

16. ---------------is the ability of a device to “jump” directly to the requested data?





ANSWER= (B) Random access
Explain:-

 

17. -----------------provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously?





ANSWER= (A) Multitasking
Explain:-

 

18. The task of performing operations like arithmetic and logical operations is called------------?





ANSWER= (A) Processing
Explain:-

 

19. ALU and Control Unit jointly known as----------?





ANSWER= (C) CPU
Explain:-

 

20. RAM is an example of-----------?





ANSWER= (B) Primary memory
Explain:-

 

21. Magnetic disk is an example of------------?





ANSWER= (A) Secondary memory
Explain:-

 

22. Which one of the following is NOT a computer language?





ANSWER= (A) MS-Excel
Explain:-

 

23. -----------Store data or information temporarily and pass it on as directed by the control unit?





ANSWER= (B) Register
Explain:-

 

24. Select the Odd one from the following





ANSWER= (A) Operating system
Explain:-

 

25. A----------------is an additional set of commands that the computer displays after you make a selection from the main menu?





ANSWER= (A) dialog box
Explain:-

 

26. COBOL is an acronym for----------------?





ANSWER= (A) Common Business Oriented Language
Explain:-

 

27. All of the following are examples of real security and privacy risks EXCEPT------------?





ANSWER= (B) Spam
Explain:-

 

28. Which of the following is NOT one of the four major data processing functions of a computer?





ANSWER= (C) analyzing the data or information
Explain:-

 

29. All of the following are examples of storage devices EXCEPT------------?





ANSWER= (B) printers
Explain:-

 

30. The CPU and memory are located on the----------?





ANSWER= (B) motherboard
Explain:-

 

31. --------------is the science that attempts to produce machines that display the same type of intelligence that humans do?





ANSWER= (D) Artificial intelligence
Explain:-

 

32. Servers are computers that provide resources to other computers connected to a-----------?





ANSWER= (A) network
Explain:-

 

33. When creating a computer program, the------------designs the structure of the program?





ANSWER= (B) System Analyst
Explain:-

 

34. Computers process data into information by working exclusively with------------?





ANSWER= (C) numbers
Explain:-

 

35. Computers manipulate data in many ways, and this manipulation is called-----------?





ANSWER= (B) processing
Explain:-

 

36. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called-----------?





ANSWER= (C) computer forensics
Explain:-

 

37. Where does most data go first with in a computer memory hierarchy ?





ANSWER= (A) RAM
Explain:-

 

38. The-------------data mining technique derives rules from real-world case examples?





ANSWER= (C) Neural nets
Explain:-

 

39. -------------are used to identify a user who returns to a Website?





ANSWER= (A) Cookies
Explain:-

 

40. Codes consisting of lines of varying widths or lengths that are computer-readable are known as----------?





ANSWER= (D) a bar code
Explain:-

 

41. Why is it unethical to share copyrighted files with your friends?





ANSWER= (C) Sharing copyrighted files without permission breaks copyright laws
Explain:-

 

42. Reusable optical storage will typically have the acronym--------?





ANSWER= (D) RW
Explain:-

 

43. The most common type of storage devices are---------?





ANSWER= (B) optical
Explain:-

 

44. A device that connects to a network without the use of cables is said to be-----------?





ANSWER= (D) none of these
Explain:-

 

45. A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a------------?





ANSWER= (A) Hacker
Explain:-

 

46. To access properties of an object, the mouse technique to use is-------------?





ANSWER= (C) right-clicking
Explain:-

 

47. A DVD is an example of a (n)-----------?





ANSWER= (B) optical disc
Explain:-

 

48. The process of transferring files from a computer on the Internet to your computer is called-------------?





ANSWER= (A) Downloading
Explain:-

 

49. -----------is the process of dividing the disk into tracks and sectors?





ANSWER= (B) Formatting
Explain:-

 

50. ASCII is a coding system that provides-------------?





ANSWER= (C) 1024 different characters
Explain:-

 

51. Which part of the computer is directly involved in executing the instructions of the computer program?





ANSWER= (D) The processor
Explain:-

 

52. When a computer is switched on, the booting process performs-----------?





ANSWER= (B) Power-On Self-Test
Explain:-

 

53. A computer system that is old and perhaps not satisfactory is referred to as a(n)------------?





ANSWER= (D) Legacy system
Explain:-

 

54. Which of the following is not a binary number?





ANSWER= (C) 202
Explain:-

 

55. Which of the following does not store data permanently?





ANSWER= (B) RAM
Explain:-

 

56. Which of the following is the smallest storage?





ANSWER= (D) None of these
Explain:-

 

58. A modem is connected to-------------?





ANSWER= (A) a telephone line
Explain:-

 

59. Large transaction processing systems in automated organisations use-----------?





ANSWER= (B) Batch Processing
Explain:-

 

60. Which of the following is not a storage medium?





ANSWER= (D) scanner
Explain:-

 

61. The computer abbreviation KB usually means------------?





ANSWER= (C) Kilo Byte
Explain:-

 

62. The typical computer criminal is a(n)------------?





ANSWER= (B) Trusted employee with no criminal record.
Explain:-

 

63. The common name for the crime of stealing passwords is------------?





ANSWER= (C) Spoofing
Explain:-

 

64. Collecting personal information and effectively posing as another individual is known as the crime of-------------?





ANSWER= (B) Identity theft.
Explain:-

 

65. Malicious software is known as------------?





ANSWER= (B) Malware
Explain:-

 

66. A program that performs a useful task while simultaneously allowing destructive acts is a-----------?





ANSWER= (B) Trojan horse.
Explain:-

 

67. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a-----------





ANSWER= (B) Virus
Explain:-

 

68. In 1999, the Melissa virus was a widely publicised:------------?





ANSWER= (A) E-mail virus
Explain:-

 

69. What type of virus uses computer hosts to reproduce itself?





ANSWER= (B) Worm
Explain:-

 

70. The thing that eventually terminates a worm virus is a lack of:





ANSWER= (A) Memory or disk space
Explain:-

 

71. When a logic bomb is activated by a time-related event, it is known as a------------?





ANSWER= (C) Time bomb
Explain:-

 

72. What is the name of an application program that gathers user information and sends it to someone through the Internet?





ANSWER= (B) Spybot
Explain:-

 

73. ------------is the measurement of things such as fingerprints and retinal scans used for security access?





ANSWER= (A) Biometrics
Explain:-

 

74. What is the most common tool used to restrict access to a computer system?





ANSWER= (B) Passwords
Explain:-

 

75. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)---------- ?





ANSWER= (B) Firewall
Explain:-

 

76. The scrambling of code is known as-----------?





ANSWER= (A) Encryption
Explain:-

 

77. To prevent the loss of data during power failures, use a(n)-------------?





ANSWER= (D) UPS
Explain:-

 

78. ----------is defined as any crime completed through the use of computer technology?





ANSWER= (B) Computer crime
Explain:-

 

79. -----------refers to electronic trespassing or criminal hacking?





ANSWER= (A) Cracking
Explain:-

 

80. The first electronic computer was developed by------------?





ANSWER= (A) J.V. Attansoff
Explain:-

 

81. -------------computers operates essentially by counting?





ANSWER= (D) Digital computer
Explain:-

 

82. ------------computer is small general purpose micro computer, but larger than portable computer?





ANSWER= (C) Desktop
Explain:-

 

83. Cathode Ray Tube is a form of----------?





ANSWER= (C) Monitor
Explain:-

 

84. ------------computer is a medium sized computer?





ANSWER= (D) Mini
Explain:-

 

85. ---------computer are of large size?





ANSWER= (B) Mainframe
Explain:-

 

86. Note book, laptop,palm,hand-held computers are coming under the category of----------computer?





ANSWER= (C) Portable computer
Explain:-

 

87. Touch Screen is-----------?





ANSWER= (C) Both A & B above
Explain:-

 

88. ------------are used for plotting graphs and design on papers?





ANSWER= (D) Plotters
Explain:-

 

89. ---------------are specific to users’ needs?





ANSWER= (B) Application software
Explain:-

 

9O. “MAN” stands for---------------?





ANSWER= (D) Metropolitan Area Network
Explain:-

 

91. Which of the following is a network topology?





ANSWER= (D) BUS
Explain:-

 

92. VOIP stands for-----------?





ANSWER= (A) Voice over IP
Explain:-

 

93. LAN stands for--------------?





ANSWER= (C) Local Area Network IP
Explain:-

 

94. -------------are set of rules and procedures to control the data transmission over the internet?





ANSWER= (C) Protoco
Explain:-

 

95. NOS stands for--------------?





ANSWER= (C) Network Operating system
Explain:-

 

96. ---------------are system software to facilitate editing of text and data?





ANSWER= (B) Editors
Explain:-

 

97. Computers, combine both measuring and counting, are called----------------?





ANSWER= (C) Hybrid
Explain:-

 

98. In world today, most of the computers are-------------?





ANSWER= (C) Hybrid
Explain:-

 

99. physical structure of computer is called------------?





ANSWER= (B) Hardware
Explain:-

 

100. In which type of computer, data are represented as discrete signals?





ANSWER= (B) Digital computer
Explain:-