Submit MCQ
Everyday Science Mcqs (2021)
Math Solutions
Everyday Science Mcqs
Computer Mcqs
Computer Mcqs (754)
Math Solutions (1)
Go Back to Home
Which of the following does not store data permanently?
ROM
RAM
Floppy Disk
Hard Disk
Which of the following is not a binary number?
001
101
202
110
A computer system that is old and perhaps not satisfactory is referred to as a(n)____________?
Ancient system
Historical system
Age old system
Legacy system
When a computer is switched on, the booting process performs___________?
Integrity Test
Power-On Self-Test
Correct Functioning Test
Reliability Test
Which part of the computer is directly involved in executing the instructions of the computer program?
The scanner
The main storage
The secondary storage
The processor
ASCII is a coding system that provides_____________?
256 different characters
512 different characters
1024 different characters
128 different characters
The process of transferring files from a computer on the Internet to your computer is called_____________?
Downloading
uploading
FTP
JPEG
A DVD is an example of a (n)___________?
hard disk
optical disc
output device
solid-state storage device
To access properties of an object, the mouse technique to use is_____________?
Dragging
dropping
right-clicking
shift-clicking
A person who used his or her expertise to gain access to other people';s computers to get information illegally or do damage is a____________?
Hacker
spammer
instant messenger
programmer
A device that connects to a network without the use of cables is said to be___________?
Distributed
free
centralized
none of these
The most common type of storage devices are_________?
magnetic storage
Flash memory
optical
Both A and B
Reusable optical storage will typically have the acronym________?
CD
DVD
ROM
RW
Why is it unethical to share copyrighted files with your friends?
It is not unethical, because it is legal.
It is unethical because the files are being given for free.
Sharing copyrighted files without permission breaks copyright laws.
It is not unethical because the files are being given for free.
Codes consisting of lines of varying widths or lengths that are computer-readable are known as__________?
an ASCII code
a magnetic tape
an OCR scanner
a bar code
_____________are used to identify a user who returns to a Website?
Cookies
Plug-ins
Scripts
ASPs
The_____________data mining technique derives rules from real-world case examples?
Rule discover
Signal processing
Neural nets
Case-based reasoning
Where does most data go first with in a computer memory hierarchy ?
RAM
ROM
BIOS
CACHE
The ability to recover and read deleted or damaged files from a criminal';s computer is an example of a law enforcement speciality called___________?
robotics
simulation
computer forensics
animation
Computers manipulate data in many ways, and this manipulation is called___________?
upgrading
processing
batching
utilizing
Computers process data into information by working exclusively with____________?
multimedia
word
numbers
characters
When creating a computer program, the____________designs the structure of the program?
End user
System Analyst
Programmer
All of the above
______________is the science that attempts to produce machines that display the same type of intelligence that humans do?
Nanoscience
Nanotechnology
Simulation
Artificial intelligence (Al)
The CPU and memory are located on the__________?
expansion board
motherboard
storage device
output device
All of the following are examples of storage devices EXCEPT____________?
hard disk drives
printers
floppy disk drives
CD drives
«
1
...
104
105
106
107
108
109
110
...
112
»