Fundamentals Of Computers Set 7
On This Page
This set of Fundamentals of Computers Multiple Choice Questions & Answers (MCQs) focuses on Fundamentals Of Computers Set 7
Q1 | To access properties of an object, the mouse technique to use is-
- dragging
- dropping
- right-clicking
- shift-clicking
Q2 | A DVD is an example of a (n)-
- hard disk
- optical disc
- output device
- solid-state storage device
Q3 | . The process of transferring files from a computer on the Internet to your computer iscalled
- downloading
- uploading
- ftp
- jpeg
Q4 | . .......... is the process of dividing the disk into tracks and sectors.
- tracking
- formatting
- crashing
- allotting
Q5 | . Help Menu is available at which button?
- end
- start
- turnoff
- restart
Q6 | The technology that stores only the essential instructions on a microprocessor chip andthus enhances its speed is referred to as
- cisc
- risc
- cd-rom
- wi-fi
Q7 | Which is not a basic function of a computer?
- store data
- accept input
- process data
- copy text
Q8 | ASCII is a coding system that provides
- 256 different characters
- 512 different characters
- 1024 different characters
- 128 different characters
Q9 | Which part of the computer is directly involved in executing the instructions of thecomputer program?
- the scanner
- the main storage
- the secondary storage
- the processor
Q10 | When a computer is switched on, the booting process performs
- integrity test
- power-on self-test
- correct functioning test
- reliability test
Q11 | A computer system that is old and perhaps not satisfactory is referred to as a(n)
- ancient system
- historical system
- age old system
- legacy system
Q12 | Which of the following is not a binary number?
- 001
- 101
- 202
- 110
Q13 | Which of the following does not store data permanently?
- rom
- ram
- floppy disk
- hard disk
Q14 | Which of the following is the smallest storage?
- megabyte
- gigabyte
- terabyte
- none of these
Q15 | Which of the following contains permanent data and gets updated during theprocessing of transactions?
- operating system file
- transaction file
- software file
- master file
Q16 | Which of the following helps to protect floppy disks from data getting accidentallyerased?
- access notch
- write-protect notch
- entry notch
- input notch
Q17 | A modem is connected to
- a telephone line
- a keyboard
- a printer
- a monitor
Q18 | Large transaction processing systems in automated organisations use
- online processing
- batch processing
- once-a-day processing
- end-of-day processing
Q19 | In a computer, most processing takes place in
- memory
- ram
- motherboard
- cpu
Q20 | . Which of the following is not a storage medium?
- hard disk
- flash drive
- dvd
- scanner
Q21 | The computer abbreviation KB usually means
- key block
- kernel boot
- kilo byte
- kit bit
Q22 | The typical computer criminal is a(n):
- young hacker.
- trusted employee with no criminal record.
- trusted employee with a long, but unknown criminal reco
Q23 | The common name for the crime of stealing passwords is:
- jacking.
- identity theft.
- spoofing.
- hacking.
Q24 | Collecting personal information and effectively posing as another individual is knownas the crime of:
- spooling.
- identity theft.
- spoofing.
- hacking.
Q25 | Malicious software is known as:
- badware.
- malware.
- maliciousware.
- illegalware.