400 Computer Awareness MCQ Set- 10
Q226. What is the term for the amount of vertical space between lines of text in a document?
A. Margins
B. Indents
C. Spacing
D. Line spacing
Answer – D. Line spacing
Explanation-
Q227. A computer cannot “boot” if it does not have which component?
A. Keyboard
B. Monitor
C. Operating system
D. Power supply
Answer – C. Operating system
Explanation-
Q228. What is another name for a programmed chip?
A. BIOS
B. LSIC
C. RAM
D. ROM
Answer – B. LSIC
Explanation-
Q229. Approximately how much data can a normal CD-ROM store?
A. 500 MB
B. 1 GB
C. 4.7 GB
D. 680 MB
Answer – D. 680 MB
Explanation-
Q230. What does DMA stand for?
A. Direct Memory Access
B. Dynamic Memory Allocation
C. Digital Media Adapter
D. Data Manipulation Algorithm
Answer – A. Direct Memory Access
Explanation-
Q231. What does LAN stand for?
A. Local Access Network
B. Local Area Network
C. Longitudinal Antenna Node
D. Linear Array Network
Answer – B. Local Area Network
Explanation-
Q232. What does ASCII stand for?
A. American Standard Code for Information Integration
B. American Standard Code for Information Interchange
C. Advanced System Control for Input and Interchange
D. Automated Standard Code for Internal Integration
Answer – B. American Standard Code for Information Interchange
Explanation-
Q233. During which period were the second-generation computers developed?
A. 1940-1950
B. 1956-1965
C. 1965-1971
D. 1980-1985
Answer – B. 1956-1965
Explanation-
Q234. In which year did arch-rivals IBM and Apple Computers Inc. decide to join hands?
A. 1976
B. 1984
C. 1991
D. 2000
Answer – C. 1991
Explanation-
Q235. Which type of memory is both static and non-volatile?
A. RAM
B. ROM
C. Cache
D. Flash
Answer – B. ROM
Explanation-
Q236. What is the alternative computer jargon for an error in software or hardware?
A. Bug
B. Glitch
C. Crash
D. Malfunction
Answer – B. Glitch
Explanation-
Q237. What is the term for unwanted repetitious messages, such as unsolicited bulk e-mail?
A. Spam
B. Junk
C. Phishing
D. Malware
Answer – A. Spam
Explanation-
Q238. What is the common name for the crime of stealing passwords?
A. Hacking
B. Phishing
C. Spoofing
D. Identity theft
Answer – C. Spoofing
Explanation-
Q239. What does BIOS stand for?
A. Basic Input Output System
B. Binary Input Output System
C. Basic Integrated Operating System
D. Binary Integrated Output System
Answer – A. Basic Input Output System
Explanation-
Q240. Who is regarded as the Father of “C” programming language?
A. Dennis Ritchie
B. Linus Torvalds
C. Bill Gates
D. Steve Jobs
Answer – A. Dennis Ritchie
Explanation-
Q241. RAM can be treated as the ____________ for the computer’s processor.
A. Waiting room
B. Temporary storage
C. Output device
D. Central processing unit
Answer – B. Temporary storage
Explanation-
Q242. What is the term for the manipulation of data in computers?
A. Processing
B. Storing
C. Retrieving
D. Encoding
Answer – A. Processing
Explanation-
Q243. Examples of viruses include:
A. Joshy, Perfumes
B. Trojan horses, Worms
C. Spyware, Adware
D. Phishing, Spoofing
Answer – B. Trojan horses, Worms
Explanation-
Q244. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. Computer hacking
B. Data recovery
C. Cybersecurity
D. Computer forensics
Answer – D. Computer forensics
Explanation-
Q245. Where do most data go first within a computer memory hierarchy?
A. Cache
B. Hard drive
C. RAM
D. CPU
Answer – C. RAM
Explanation-
Q246. Where is the Help Menu available?
A. Start button
B. Taskbar
C. Control Panel
D. Desktop
Answer – A. Start button
Explanation-
Q247. Which file contains permanent data and gets updated during the processing of transactions?
A. Master File
B. Temporary File
C. System File
D. Backup File
Answer – A. Master File
Explanation-
Q248. What is an example of an optical disc?
A. USB flash drive
B. Hard disk drive
C. Floppy disk
D. DVD
Answer – D. DVD
Explanation-
Q249. Which is the most common tool used to restrict access to a computer system?
A. Firewalls
B. Encryption
C. Biometrics
D. Passwords
Answer – D. Passwords
Explanation-
Q250. The technology that stores only essential instructions on a microprocessor chip and thus enhances its speed is referred to as:
A. RISC
B. CISC
C. BIOS
D. MIPS
Answer – A. RISC
Explanation-