COMPUTER FUNDAMENTALS MCQ
1. Civil Liberties is
2. Theoretical Perceptive of computing is
[A] Phenomenography [B] Sociocultural [C] Influential Studies [D] None of the above
3.Involves the ethical aspects of technology within a society is called
[A] Ethical Theories [B] Duty Ethics[C] Relationship Ethics
4. Research Methods for Computer?
[A] Modelling [B] Theoretical [C] Both [A] and [B] [D] None of the above
5. _________ is the systemematic study of algorithmic processes that describe and transform information is called
[A] Computing [B] Modelling [C] Computer simulation [D] None of the Above
6.Ethical Issues for safety and security is
[A] Social Networking [B] Cyber bullying [C] Both [A] and [B] [D]None of the Above
7. Legal use of Technology is
[A] Copyright [B] Fair Use [C] Both [A] and [B] [D] None of the Above
8. Digital divide is
[A] Gender [B] Socio Economic [C] Both [A] & [B] [D] None of the Above
9.----------------refers to the online code of what is appropriate and in good taste for internet users
[A] Netiquette [B] Socio Economic [C] Copyright [D]Fairness
. 10.--------------is a system of moral standards or moral values used as a guideline for computer users
[A] Computer Ethics [B] Code of Ethics [C] Privacy [D] None of the Above
11.---------------is a guideline in ICT that helps determine whether a specific computer action is ethical or unethical
12.---------------is any laws reacting to protect the internet and other online communication technology
[A] Cyber Laws [B] Computer Crime [C] Interlectual Property [D] All of the above
13. Types of Interlectual Property is
[A] Patents [B] trademark [C] Both [A] & [B] [D] All of the above
14.Every move made online is being tracked is
[A] Internet policy [B] Legal Policy [C] Computing Policy [D] None of the above
15. Many people living in poverty do not get the same technological resources as others is called
[A] Socio Economic [B] Economic Diversity [C] Legal Economic [D] None of the Above
16. ----------------is the equal access to technology
[A] Equity [B] Equal education [C] equal Information [D] All of the above
17. -------------------is a process where user verifies their identity
[A] Authentication [B] Computer Ethics [C] Legal Issues [D] Copyright
18. Social Issues caused by the rise of technology in work
[A] Communication [B] increased Stress [C] Both [A] and [B]
19. Cyber crime can involve
[A] Computer Viruses [B] Cyber Bullying [C] Cyber Stalking [D] All of the above
20. A balancing act between attacker and defender
[A] Security [B] Privacy [C] Coordination [D] None of the Above
21. Investigation to gather and preserve evidence from a particular computing device is
[A]Computer investigation [B]Cyber crime[C]Computer forensic [D] None of the above
22. ICT is
[A] The infrastructure and components that enable modern computing
[C] The infrastructure and components that enable ethical computing
[D] The infrastructure and components that enable Privacy and liberties
23. Why technology is required in work/business?
[A]Ensure computational Accuracy [B] Be competitive in the market place [C]Be Industry relevant [D]All of the above
24. Responsible computing is
[A]Authorised use[B]Data Security and integrity[C]Privacy[D]All of the above
[A]Bank and credit card fraud [B] Computer hacking [C] Industrial Espionage [D] Electrotherapy
[A] National Science foundation [B] U.S department [C] U.S Patent and Trademark office [D] U.S. copyright office
27. The architecture of the computer was invented by
28.
What is the electronic component of Fifth generation computers
[A] Artificial
Intelligence [B] Programming Intelligence [C] System Knowledge [D] VVLSI
29. First generation of computer was based on which
technology?
[A] Transistor [B] LSI [C] VLSI [D] Vaccum Tube
30. Name the name generation when
Microprocessor was developed in computers?
[A] Second Generation [B] Fourth
Generation [C] Both (A) and (B) [D] Third Generation
31. Name
the non-volatile memory?
[A] SRAM [B] RAM [C] ROM [D] All of the above
32. Time
during which a job is processed by the computer is:
[A] Execution Time [B] Processing Time [C] Real Time [D] Waiting Time
33.
What is the memory size in mainframe computers
[A] Bytes [B] Kilobytes [C] Bits [D] Megabytes
34. Mention
the software from the given below software which are not belong to an
application software package?
[A] Redhat Linux [B] Microsoft Office [C] Adobe Pagemaker [D] Open
Office
35.
An error is also known as:
[A] Bug [B] Debug [C] Cursor [D]
Icon
36. Who invented the super computer?
[A] PT Fransworth [B] JH Van Tassell [C]
Charles Ginsberg [D] Charles Babbage
37. Graphical pictures that represent an object like file, folder etc are:
[A] Task bar [B] Windows [C] Icons [D]
Desktop
38. Cut off that option which is not included in magnetic disk
storage?
[A] The access time of magnetic disk is
much less than that of magnetic tape [B] Disk storage is less
expensive than tape storage [c] Disk storage is longer lasting than
magnetic tape [D] None of the above
39.
what are the name of the digits 0 and 1 in the binary number system
[A] Bytes [B] Kilobytes [C] Decimal bytes [D] Bits
40. What is the size of commonly used
floppy disk is
[A] 6.5" [B] 3.5" [C] 7.25"
[D] 2.5"
41. What is the basic component
of 'IC' chip which are used in computers
[A] Chomium [B] Iron Oxide [C] Silica [D] Silicon
42.
What operating systems is created by IBM?
[A] OS-2 [B] Windows [C] DOS [D] UNIX
43.
Arithmetical and logical operations are performed by which part of the
processor?
[A] Control [B] ALU [C] Cache Memory [D]
Register
44 Name the early mainframe computer?
[A] UNIC [B] FUNTRIA [C] BRAINIA [D] ENIAC
45. What is the location of Intel headquarters?
[A] Redmond, Washington [B] Tucson, Arizona [C] Santa Clara,
California [D] Richmond, Virginia
46. What
was the first Intel processor introduced?
[A] 3080 [B] 4004 [C] 8080 [D] 8086
47. Where
Window's settings are stored
[A] Windows.Ini [B] Win.Ini [C] System.Ini [D] Group.Ini
48. What is
the network protocol which is used for sending e-mail?
[A] FTP [B] SSH [C] POP3 [D] SMTP
49. Which
year the first e-mail was sent?
[A] 1963 [B] 1969 [C] 1971 [D] 1974
50.
Operating System is come under the what type of software?
[A] Communication [B] Application [C] System [D] Word Processing
Software
1[D]
|
17[A]
|
33[D]
|
49[C]
|
2[D]
|
18[C]
|
34[A]
|
50[C]
|
3[A]
|
19[D]
|
35[A]
|
|
4[C]
|
20[A]
|
36[B]
|
|
5[A]
|
21[C]
|
37[C]
|
|
6[C]
|
22[A]
|
38[D]
|
|
7[C]
|
23[D]
|
39[D]
|
|
8[C]
|
24[D]
|
40[B]
|
|
9[A]
|
25[D]
|
41[D]
|
|
10[A]
|
26[A]
|
42[A]
|
|
11[A]
|
27[A]
|
43[B]
|
|
12[A]
|
28[A]
|
44[D]
|
|
13[C]
|
29[D]
|
45[C]
|
|
14[A]
|
30[D]
|
46[B]
|
|
15[A]
|
31[C]
|
47[B]
|
|
16[A]
|
32[A]
|
48[D]
|