Table of Contents
COMPUTER AWARENESS MCQ FOR COMPETITIVE EXAMS
DOWNLOAD MOBILE APPLICATION TO LEARN MORE: COMPUTER AWARENESS MCQ FOR COMPETITIVE EXAMS
221. UNIVAC is:
a. Universal Automatic Computer
b. Universal Array Computer
c. Unique Automatic Computer
d. Unvalued Automatic Computer
ANSWER:A
222. CD-ROM stands for:
a. Compactable Read Only Memory
b. Compact Data Read Only Memory
c. Compactable Disk Read Only Memory
d. Compact Disk Read Only Memory
ANSWER:D
223. ALU is:
a. Arithmetic Logic Unit
b. Array Logic Unit
c. Application Logic Unit
d. None of above
ANSWER:A
224. VGA is:
a. Video Graphics Array
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter
ANSWER:A
225. IBM 1401 is:
a. First Generation Computer
b. Second Generation Computer
c. Third Generation Computer
d. Fourth Generation Computer
ANSWER:B
226. MSI stands for:
a. Medium Scale Integrated Circuits
b. Medium System Integrated Circuits
c. Medium Scale Intelligent Circuit
d. Medium System Intelligent Circuit
ANSWER:A
227. The capacity of 3.5 inch floppy disk is:
a. 1.40 MB
b. 1.44 GB
c. 1.40 GB
d. 1.44 MB
ANSWER:D
228. The first computer introduced in Nepal was:
a. IBM 1400
b. IBM 1401
c. IBM 1402
d. IBM1402
ANSWER:B
229. WAN stands for:
a. Wap Area Network
b. Wide Area Network
c. Wide array Net
d. Wireless Area Network
ANSWER:B
230. MICR stands for:
a. Magnetic Ink Character Reader
b. Magnetic Ink Code Reader
c. Magnetic Ink Cases Reader
d. None
ANSWER:A
231. Which of the following topology provides a highly fault- tolerant architecture:
(a) Mesh
(b) Bus
(c) Ring
(d) Tree
ANSWER:A
232. Which of the following statements is incorrect for TELNET :-
(a) It is an application layer protocol
(b) It provides encryption feature
(c) It provides bidirectional feature
(d) None of These
ANSWER:B
233. Which of the following techniques is used by unethical hackers to certify fake data over the Internet for stealing information?
(a) Phishing
(b) Logic Bomb
(c) Cracking
(d) Spoofing
ANSWER:D
234. __________ ensures secure transfer of data over an unsecured network, such as the Internet.
(a) Hacking
(b) Spoofing
(c) Cryptography
(d) Anti- virus
ANSWER:C
235. Which of the following is/ are the benefits of subnetting:-
(a) Reduced network traffic
(b) Better security
(c) Enhanced performance
(d) All of these
ANSWER:D
236. Which of the following minimizes the interference between wireless devices?
(a) FCS
(b) FHSS
(c) FSSH
(d) RTFS
ANSWER:B
237. Which of the following model does the working of Bluetooth devices depend:
(a) Client/ Sever
(b) LAN
(c) Analog/Digital
(d) Master/ Slave
ANSWER:D
238. How many IP addresses would be there in a block containing the mask/ 28:
(a) 16
(b) 32
(c) 64
(d) 128
ANSWER:A
239. Which of the following terms explains the execution of more than one file at the same time on a single processor:-
(a) Single tasking
(b) Multi- tasking
(c) Scheduling
(d) None of these
ANSWER:B
240. The full form of ISR is:
(a) Information service Request
(b) Information select Routine
(c) Interrupt service Routine
(d) Information service Routine
ANSWER:C
DOWNLOAD MOBILE APPLICATION TO LEARN MORE: COMPUTER AWARENESS MCQ FOR COMPETITIVE EXAMS