WhatsApp Group Join Now
Telegram Group (170K+) Join Now

COMPUTER AWARENESS MCQ FOR COMPETITIVE EXAMS

Table of Contents

COMPUTER AWARENESS MCQ FOR COMPETITIVE EXAMS

DOWNLOAD MOBILE APPLICATION TO LEARN MORE: COMPUTER AWARENESS MCQ FOR COMPETITIVE EXAMS

221. UNIVAC is:
a. Universal Automatic Computer
b. Universal Array Computer
c. Unique Automatic Computer
d. Unvalued Automatic Computer

ANSWER:A

222. CD-ROM stands for:
a. Compactable Read Only Memory
b. Compact Data Read Only Memory
c. Compactable Disk Read Only Memory
d. Compact Disk Read Only Memory

ANSWER:D

223. ALU is:
a. Arithmetic Logic Unit
b. Array Logic Unit
c. Application Logic Unit
d. None of above

ANSWER:A

224. VGA is:
a. Video Graphics Array
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter

ANSWER:A

225. IBM 1401 is:
a. First Generation Computer
b. Second Generation Computer
c. Third Generation Computer
d. Fourth Generation Computer

ANSWER:B

226. MSI stands for:
a. Medium Scale Integrated Circuits
b. Medium System Integrated Circuits
c. Medium Scale Intelligent Circuit
d. Medium System Intelligent Circuit

ANSWER:A

227. The capacity of 3.5 inch floppy disk is:
a. 1.40 MB
b. 1.44 GB
c. 1.40 GB
d. 1.44 MB

ANSWER:D

228. The first computer introduced in Nepal was:
a. IBM 1400
b. IBM 1401
c. IBM 1402
d. IBM1402

ANSWER:B

229. WAN stands for:
a. Wap Area Network
b. Wide Area Network
c. Wide array Net
d. Wireless Area Network

ANSWER:B

230. MICR stands for:
a. Magnetic Ink Character Reader
b. Magnetic Ink Code Reader
c. Magnetic Ink Cases Reader
d. None

ANSWER:A

231. Which of the following topology provides a highly fault- tolerant architecture:
(a) Mesh
(b) Bus
(c) Ring
(d) Tree

ANSWER:A

232. Which of the following statements is incorrect for TELNET :-
(a) It is an application layer protocol
(b) It provides encryption feature
(c) It provides bidirectional feature
(d) None of These

ANSWER:B

233. Which of the following techniques is used by unethical hackers to certify fake data over the Internet for stealing information?
(a) Phishing
(b) Logic Bomb
(c) Cracking
(d) Spoofing

ANSWER:D

234. __________ ensures secure transfer of data over an unsecured network, such as the Internet.
(a) Hacking
(b) Spoofing
(c) Cryptography
(d) Anti- virus

ANSWER:C

235. Which of the following is/ are the benefits of subnetting:-
(a) Reduced network traffic
(b) Better security
(c) Enhanced performance
(d) All of these

ANSWER:D

236. Which of the following minimizes the interference between wireless devices?
(a) FCS
(b) FHSS
(c) FSSH
(d) RTFS

ANSWER:B

237. Which of the following model does the working of Bluetooth devices depend:
(a) Client/ Sever
(b) LAN
(c) Analog/Digital
(d) Master/ Slave

ANSWER:D

238. How many IP addresses would be there in a block containing the mask/ 28:
(a) 16
(b) 32
(c) 64
(d) 128

ANSWER:A

239. Which of the following terms explains the execution of more than one file at the same time on a single processor:-
(a) Single tasking
(b) Multi- tasking
(c) Scheduling
(d) None of these

ANSWER:B

240. The full form of ISR is:
(a) Information service Request
(b) Information select Routine
(c) Interrupt service Routine
(d) Information service Routine

ANSWER:C

DOWNLOAD MOBILE APPLICATION TO LEARN MORE: COMPUTER AWARENESS MCQ FOR COMPETITIVE EXAMS

Leave a Comment

Your email address will not be published. Required fields are marked *