COMPUTER-GK > Computer > computer_MCQ

About COMPUTER-GK Following are some of the multiple choice questions on the computer_MCQ with answers that will help the students in developing their knowledge.
    (1)What is considered a direct entry input device?
Ans:- All
Ans:- All
    (2)Which is a unit of measurement used with computer systems?
    (3)A character is represented in EBCDIC by
    (4)Which is secondary memory device?
    (5)Which is the computer memory that does not forget?
    (6)Which is the computer memory that does not forget?
    (7)The most common binary code in use today is the 8 bit ASCII code. What do the letters ASCII stand for?
    (8)A computer derives its basic strength from
    (9)A collection of eight bits is called
    (10)A collection of eight bits is called
    (11)A BIT represents a
    (12)Which can read data and convert them to a form that a computer can use?
    (13)Which of the following is the most powerful type of compute
    (14)Which of the following people probably has the least amount of technical knowledge?
    (15)This is the part of the computer system that one can touch
    (16)Reusable optical storage will typically have the acronym ___.
    (17)The __________ tells the computer how to use its components
    (18)A(n) __________ is a program that makes the computer easier to use.
    (19) The ‘Difference Analyzer’ was created in the early 1920s by __
    (20)The most important or powerful computer in a typical network.
    (21)To access a mainframe or supercomputer, users often use a ___
    (22)What data base function allows you to define the data your database is storing?
    (23)If you wanted to tell the database management system that a specific attribute contained numbers only, what would you need to set?
    (24)What key distinctly identifies a record in a database table?
    (25)What key links records from one database table to a record or records in another database table?
    (26)When you link one database table to another database table, what are you creating?
    (27)What would you need to establish if you wanted to insure that the key in one database table was the same as a key in another database table?
    (28)What database tool would you use to find answers to your questions about data stored in your database?
    (29)When we describe, or define, the categories of information we collect in an Excel worksheet, what type of table are we creating?
    (30)If you wished to limit what you would see on an Excel worksheet, what data function would you use?
    (31)If you wished to highlight, not hide, some information in a worksheet because it met some criteria, what Excel tool would you use?
    (32)What Excel tool allows you to create quickly and automatically summary data from a large data set?
    (33)When creating a custom file in Excel, which of the following would not be considered a Boolean operator?
    (34)Which of the following is a good habit to get into when creating a worksheet?
    (35)What term is used to describe a collection of information that you can use to build reports or discover facts about an environment?
    (36)What type of graphical model is used to define a database?
    (37)After you develop a model for your database, you should then _____ it before building it.
    (38)Which of the following contains information about the structure of a database?
    (39)The rules of a language are called its __________.
    (40)A language that can be written on one platform and executed on another platform is said to be __________.
    (41)__________ is Microsoft’s latest entry into the programming arena
    (42)A next-generation Web content development language, __________ typically refers to a suite of technologies that allow developers to store data in a readable format.
    (43)JavaScript was developed by __________ to run inside of web pages.
    (44)This technology is used to convert XML into HTML.
    (45)The __________ is a special database that holds information about the computer’s user, installed programs and hardware devices.
    (46)A(n) __________ converts all the source code into machine code, creating an executable file.
    (47)A series of steps that always results in an answer is the definition of __________
    (48)The color of an object is an example of a(n) __________.
    (49)A(n) __________ file contains information in an indexed and cross-linked format.
    (50)A(n) __________ encapsulates data and functionality.
    (51)__________ are text files containing OS commands.
    (52)The __________ prevents unlawful access to voice communications by wire
    (53)Which of the following will not protect you from spam?
    (54)A __________’s main purpose is to prohibit unauthorized access to your computer via the Internet.
    (55)To read the system messages and warnings, access the __________ in Windows.
    (56)To create a copy of files in the event of system failure, you create a __________.
    (57)If configured correctly, the __________ will prevent interaction with your computer after a specified time period.
    (58)To recover files from a backup, you perform a __________.