Table of Contents
COMPUTER AWARENESS MCQ FOR COMPETITIVE EXAMS
DOWNLOAD MOBILE APPLICATION TO LEARN MORE: COMPUTER AWARENESS MCQ FOR COMPETITIVE EXAMS
141. A processor that collects the transmissions from several communications media and sends them over a single line that operates at a higher capacity is called ______.
1) multiplexor
2) bridge
3) hub
4) router
5) None of these
ANSWER:1
142._________ is a primary key of one file that also appears in another file.
1) Physical key
2) Primary key
3) Foreign key
4) Logical key
5) None of these
ANSWER:3
143.What is the full form of SDRM?
(1) Shift Dynamic random access memory
(2) Synchronous Dynamic random access memory
(3) System Dynamic random access memory
(4) Serial Dynamic random access memory
(5) None of these
ANSWER:2
144.Alerts are mostly appears in ____?
(1) Check box
(2) Combo box
(3) Dialog box
(4) Window box
(5) None of these
ANSWER:3
145.When using characters in Windows, what code does a window use?
(1) ASCII
(2) UNICODE
(3) MORSE
(4) IDBC
(5) WESTRN
ANSWER:1
146. Which of the following scrambles a message by applying a secret code?
(1) Encryption
(2) Audits
(3) UPS
(4) Firewalls
(5) None of these
ANSWER:1
147. The Internet began with the development of
1) USENET
2) ARPANET
3) Ethernet
4) Intranet
5) None of these
ANSWER:2
148. Website is a collection of ________
1) HTML documents
2) Graphic files
3) Audio and Video files
4) All of the above
5) None of these
ANSWER:4
149. Who designed the first electronic computer – ENIAC?
1) Van Neuman
2) Joseph M Jacquard
3) J presper Eckert
4) Both 1 and 2
5) None of these
ANSWER:1
150. Which of the following is not a network?
1) Local Area Network
2) Wide Area Network
3) Optical Fiber
4) All are networks
5) None of these
ANSWER:3
161. What does DBMS stand for:
(a) Database Management System
(b) Data Management System
(c) Database Management Server
(d) Database Maintenance Server
ANSWER:A
162. Which of the following key is a field in one table that is used as a primary key field in another table:
(a) Identify key
(b) Candidate key
(c) Foreign key
(d) N.O.T
ANSWER:C
163. Which of the following is not a normal form in DBMS?
(a) First Normal Form(1NF)
(b) Second Normal Form(2NF)
(c) Third Normal Form(3NF)
(d) Ninth Normal Form(9NF)
(e) Boyce- codd Normal Form(BCNF)
ANSWER:D
164. Which of the following HTML tags as a logical style tag:
(a) <B>
(b) <I>
(c) <SMALL>
(d) <ABBR>
ANSWER:D
165. What does DDOS stand for:
(a) Data Denial –of –Service
(b) Distributed Denial of Server
(c) Distribution of Data Service
(d) N.O.T
ANSWER:B
166. A pathway inside a computer that carries data between hardware components are:
(a) carrier signal
(b) databus
(c) analog signal
(d) digital signal
ANSWER:B
167. An example of a telecommunications device is a ________.
(a) keyboard
(b) mouse
(c) modem
(d) N.O.T
ANSWER:C
168. What is named area on a disk that is used to store related subfolder & files called:
(a) folder
(b) desktop
(c) menu
(d) explorer
ANSWER:A
169. Two two ways to arrange multiple windows on the desktop:
(a) drag & drop
(b) point and click
(c) cascade and title
(d) point & clock
ANSWER:C
160. Which of the following is an option available when shutting down your computer?
(a) Log off
(b) Switch user
(c) Stand By
(d) All of these
ANSWER:D
DOWNLOAD MOBILE APPLICATION TO LEARN MORE: COMPUTER AWARENESS MCQ FOR COMPETITIVE EXAMS