COMPUTER FUNDAMENTALS MCQ

        1. Civil Liberties is
  [A] Personal Guarantees and freedoms that the govt cannot abridge.[B] Personal Guarantees and freedoms that the govt can abridge.[C] Judicial Interpretation [D] Both [A] & [C]
   2. Theoretical Perceptive of computing is
[A] Phenomenography [B] Sociocultural [C] Influential Studies [D] None of the above
     3.Involves the ethical aspects of technology within a society is called
   [A] Ethical Theories [B] Duty Ethics[C] Relationship Ethics
    4. Research Methods for Computer?
    [A] Modelling [B] Theoretical [C] Both [A] and [B] [D] None of the above
  
    5. _________ is the systemematic study of algorithmic processes that describe and transform   information is called
    [A] Computing [B] Modelling [C] Computer simulation [D] None of the Above
    6.Ethical Issues for safety and security is
    [A] Social Networking [B] Cyber bullying [C] Both [A] and [B] [D]None of the Above
  
    7. Legal use of Technology is
    [A] Copyright [B] Fair Use [C] Both [A] and [B] [D] None of the Above
    8. Digital divide is
    [A] Gender [B] Socio Economic [C]  Both [A] & [B] [D] None of the Above
    9.----------------refers to the online code of what is appropriate and in good taste for internet users
   [A] Netiquette [B] Socio Economic [C] Copyright [D]Fairness
.   10.--------------is a system of moral standards or moral values used as a guideline for  computer  users
   [A] Computer Ethics [B] Code of Ethics [C] Privacy [D] None of the Above
  11.---------------is a guideline in ICT that helps determine whether a specific computer action is  ethical or unethical
   [A] Code of ethics [B] Computer Crime [C] Cyber Law [D] None of the above
    12.---------------is any laws reacting to protect the internet and other online communication technology
   [A] Cyber Laws [B] Computer Crime [C] Interlectual Property [D] All of the above
   13. Types of Interlectual Property is
  [A] Patents [B] trademark [C] Both [A] & [B] [D] All of the above
   14.Every move made online is being tracked is
    [A] Internet policy [B] Legal Policy [C] Computing Policy [D] None of the above
    15. Many people living in poverty do not  get the same technological resources as others is called 
    [A] Socio Economic [B] Economic Diversity [C] Legal Economic [D] None of the Above
   16. ----------------is the equal access to technology
   [A] Equity [B] Equal education [C] equal Information [D] All of the above
   17. -------------------is a process where user verifies their identity
    [A] Authentication [B] Computer Ethics [C] Legal Issues [D] Copyright
   18. Social Issues caused by the rise of technology in work
   [A] Communication [B] increased Stress [C] Both [A] and [B]
   19. Cyber crime can involve
   [A] Computer Viruses [B] Cyber Bullying [C] Cyber Stalking [D] All of the above
    20. A balancing act between attacker and defender
    [A] Security [B] Privacy [C] Coordination [D] None of the Above
     21. Investigation to gather and preserve evidence from a particular computing device is
     [A]Computer investigation [B]Cyber crime[C]Computer forensic [D] None of the above
    22.  ICT is
    [A] The infrastructure and components that enable modern computing
  [B] The infrastructure and components that enable social technical computing
  [C] The infrastructure and components that enable ethical computing
  [D] The infrastructure and components that enable Privacy and liberties
  23. Why technology is required in work/business?
          [A]Ensure computational Accuracy [B] Be competitive in the market place [C]Be Industry relevant [D]All of the above
  24. Responsible computing is
  [A]Authorised use[B]Data Security and integrity[C]Privacy[D]All of the above
  25. Which is not included in cyber crime
  [A]Bank and credit card fraud [B] Computer hacking [C] Industrial Espionage [D] Electrotherapy
   26. In 1980’s which organization began using the internet
  [A] National Science foundation [B] U.S department [C] U.S Patent and Trademark office [D] U.S. copyright office
  27. The architecture of the computer was invented by
  [A] John Von Neumann [B] Charles Babbage [C] Blaise Pascal [D] Garden Moore
  28. What is the electronic component of Fifth generation computers
  [A] Artificial Intelligence [B] Programming Intelligence [C] System Knowledge [D] VVLSI

  29. First generation of computer was based on which technology?
  [A] Transistor  [B] LSI   [C] VLSI [D] Vaccum Tube
  30. Name the name generation when Microprocessor was developed in computers?
   [A] Second Generation [B] Fourth Generation [C] Both (A) and (B) [D] Third Generation
  31. Name the non-volatile memory?
   [A] SRAM [B] RAM [C] ROM [D] All of the above
  32. Time during which a job is processed by the computer is:
   [A] Execution Time [B] Processing Time [C] Real Time [D] Waiting Time
   33. What is the memory size in mainframe computers
   [A] Bytes [B] Kilobytes [C] Bits [D] Megabytes
  34. Mention the software from the given below software which are not belong to an application software package?
    [A] Redhat Linux [B] Microsoft Office [C] Adobe Pagemaker [D] Open Office
    35. An error is also known as:
    [A] Bug  [B] Debug [C] Cursor [D] Icon  
  36. Who invented the super computer?
  [A] PT Fransworth [B] JH Van Tassell [C] Charles Ginsberg [D] Charles Babbage
     37. Graphical pictures that represent an object like file, folder etc are:
    [A] Task bar [B] Windows [C] Icons [D] Desktop
     38. Cut off that option which is not included in magnetic disk storage?
   [A] The access time of magnetic disk is much less than that of magnetic tape  [B] Disk storage is less expensive than tape storage [c] Disk storage is longer lasting than magnetic tape [D] None of the above
      39. what are the name of the digits 0 and 1 in the binary number system
      [A] Bytes [B] Kilobytes [C] Decimal bytes [D] Bits
     40. What is the size of commonly used floppy disk is
     [A] 6.5" [B] 3.5" [C] 7.25"   [D] 2.5"
     41. What is the basic component of 'IC' chip which are used in computers
    [A] Chomium [B] Iron Oxide [C] Silica [D] Silicon
    42. What operating systems is created by IBM?
    [A] OS-2 [B] Windows [C] DOS [D] UNIX
   43. Arithmetical and logical operations are performed by which part of the processor?
  [A] Control [B] ALU [C] Cache Memory [D] Register
   44 Name the early mainframe computer?
  [A] UNIC [B] FUNTRIA [C] BRAINIA [D] ENIAC
  45. What is the location of Intel headquarters?
  [A] Redmond, Washington [B] Tucson, Arizona [C] Santa Clara, California [D] Richmond, Virginia
  46. What was the first Intel processor introduced?
  [A] 3080 [B] 4004 [C] 8080 [D] 8086
  47. Where Window's settings are stored
  [A] Windows.Ini [B] Win.Ini [C] System.Ini [D] Group.Ini
  48. What is the network protocol which is used for sending e-mail?
  [A] FTP [B] SSH [C] POP3 [D] SMTP
  49. Which year the first e-mail was sent?
  [A] 1963 [B] 1969 [C] 1971 [D] 1974
  50. Operating System is come under the what type of software?
  [A] Communication [B] Application [C] System [D] Word Processing Software



  Answere keys

1[D]
17[A]
33[D]
49[C]
2[D]
18[C]
34[A]
50[C]
3[A]
19[D]
35[A]
4[C]
20[A]
36[B]
5[A]
21[C]
37[C]
6[C]
22[A]
38[D]
7[C]
23[D]
39[D]
8[C]
24[D]
40[B]
9[A]
25[D]
41[D]
10[A]
26[A]
42[A]
11[A]
27[A]
43[B]
12[A]
28[A]
44[D]
13[C]
29[D]
45[C]
14[A]
30[D]
46[B]
15[A]
31[C]
47[B]
16[A]
32[A]
48[D]
       

 




Page : 1    2   3

 

 


Popular Posts