400 Computer Awareness MCQ

3.6/5 - (11 votes)

400 Computer Awareness MCQ Set- 10

Q226. What is the term for the amount of vertical space between lines of text in a document?
A. Margins
B. Indents
C. Spacing
D. Line spacing

Answer – D. Line spacing
Explanation-


Q227. A computer cannot “boot” if it does not have which component?
A. Keyboard
B. Monitor
C. Operating system
D. Power supply

Answer – C. Operating system
Explanation-


Q228. What is another name for a programmed chip?
A. BIOS
B. LSIC
C. RAM
D. ROM

Answer – B. LSIC
Explanation-


Q229. Approximately how much data can a normal CD-ROM store?
A. 500 MB
B. 1 GB
C. 4.7 GB
D. 680 MB

Answer – D. 680 MB
Explanation-


Q230. What does DMA stand for?
A. Direct Memory Access
B. Dynamic Memory Allocation
C. Digital Media Adapter
D. Data Manipulation Algorithm

Answer – A. Direct Memory Access
Explanation-


Q231. What does LAN stand for?
A. Local Access Network
B. Local Area Network
C. Longitudinal Antenna Node
D. Linear Array Network

Answer – B. Local Area Network
Explanation-


Q232. What does ASCII stand for?
A. American Standard Code for Information Integration
B. American Standard Code for Information Interchange
C. Advanced System Control for Input and Interchange
D. Automated Standard Code for Internal Integration

Answer – B. American Standard Code for Information Interchange
Explanation-


Q233. During which period were the second-generation computers developed?
A. 1940-1950
B. 1956-1965
C. 1965-1971
D. 1980-1985

Answer – B. 1956-1965
Explanation-


Q234. In which year did arch-rivals IBM and Apple Computers Inc. decide to join hands?
A. 1976
B. 1984
C. 1991
D. 2000

Answer – C. 1991
Explanation-


Q235. Which type of memory is both static and non-volatile?
A. RAM
B. ROM
C. Cache
D. Flash

Answer – B. ROM
Explanation-


Q236. What is the alternative computer jargon for an error in software or hardware?
A. Bug
B. Glitch
C. Crash
D. Malfunction

Answer – B. Glitch
Explanation-


Q237. What is the term for unwanted repetitious messages, such as unsolicited bulk e-mail?
A. Spam
B. Junk
C. Phishing
D. Malware

Answer – A. Spam
Explanation-


Q238. What is the common name for the crime of stealing passwords?
A. Hacking
B. Phishing
C. Spoofing
D. Identity theft

Answer – C. Spoofing
Explanation-


Q239. What does BIOS stand for?
A. Basic Input Output System
B. Binary Input Output System
C. Basic Integrated Operating System
D. Binary Integrated Output System

Answer – A. Basic Input Output System
Explanation-


Q240. Who is regarded as the Father of “C” programming language?
A. Dennis Ritchie
B. Linus Torvalds
C. Bill Gates
D. Steve Jobs

Answer – A. Dennis Ritchie
Explanation-


Q241. RAM can be treated as the ____________ for the computer’s processor.
A. Waiting room
B. Temporary storage
C. Output device
D. Central processing unit

Answer – B. Temporary storage
Explanation-


Q242. What is the term for the manipulation of data in computers?
A. Processing
B. Storing
C. Retrieving
D. Encoding

Answer – A. Processing
Explanation-


Q243. Examples of viruses include:
A. Joshy, Perfumes
B. Trojan horses, Worms
C. Spyware, Adware
D. Phishing, Spoofing

Answer – B. Trojan horses, Worms
Explanation-


Q244. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. Computer hacking
B. Data recovery
C. Cybersecurity
D. Computer forensics

Answer – D. Computer forensics
Explanation-


Q245. Where do most data go first within a computer memory hierarchy?
A. Cache
B. Hard drive
C. RAM
D. CPU

Answer – C. RAM
Explanation-


Q246. Where is the Help Menu available?
A. Start button
B. Taskbar
C. Control Panel
D. Desktop

Answer – A. Start button
Explanation-


Q247. Which file contains permanent data and gets updated during the processing of transactions?
A. Master File
B. Temporary File
C. System File
D. Backup File

Answer – A. Master File
Explanation-


Q248. What is an example of an optical disc?
A. USB flash drive
B. Hard disk drive
C. Floppy disk
D. DVD

Answer – D. DVD
Explanation-


Q249. Which is the most common tool used to restrict access to a computer system?
A. Firewalls
B. Encryption
C. Biometrics
D. Passwords

Answer – D. Passwords
Explanation-


Q250. The technology that stores only essential instructions on a microprocessor chip and thus enhances its speed is referred to as:
A. RISC
B. CISC
C. BIOS
D. MIPS

Answer – A. RISC
Explanation-


Share This:

As a professional blogger and passionate educator, I am driven by a deep-seated desire to share knowledge and empower others. With years of experience in the field, I am committed to providing valuable insights and guidance to aspiring learners. My passion lies in helping individuals discover their potential and achieve their goals. I am also a firm believer in the power of motivation and strive to inspire others to pursue their dreams with unwavering determination.

Leave a Comment

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
100% Free SEO Tools - Tool Kits PRO