Welcome to your Computer hardware and software MCQ
1. Which of the following does not affect the resolution of a video display image?
4. Databases software may be divided into
6. ………….is the time required by a sector to reach below read/write heat
7. ………….is a technique of improving the priority of process waiting in Queue for CPU allocation
8. A grammar for a programming language is a formal description of
9. …………is a technique of temporarily removing inactive programs from the memory of computer system
10. The memory allocation scheme subject to “external” fragmentation is
12. Before proceeding with its execution, each process must acquire all the resources it needs is called
13. The main reason to encrypt a file is to ……………
14. ‘LRU’ page replacement policy is
15. Whichofthefollowingisnota fundamental process state
17. Which two files are used during operations of the DBMS
18. A protocol is a set of rules governing a time sequence of events that must take place
19. In communication satellite, multiple repeaters are known as
20. Which of the following is required to communicate between two computers?
21. Which of the following is an advantage to using fiber optics data transmission?
22. Which of the following is not a transmission medium?
23. A technique for direct search is
24. Two main measures for the efficiency of an algorithm are
25. The space factor when determining the efficiency of algorithm is measured by
26. The memory address of the first element of an array is called
27. The term “push” and “pop” is related to the
28. What does Router do in a network?
29. Repeater operates in which layer of the OSI model?
30. GIF images can have only upto …………. colors
31. . …………is stored on a client and contains state information of the website visited
32. ………..are small applications that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.
33. Encryption is the conversion of data in some intelligible format into an unintelligible format called……….to prevent the data from being understood if read by an unauthorized party.
34. The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is known as :
35. Each cell in Microsoft Office Excel documents is referred to by its cell address, which is the…………..
36. The lowest form of computer language is called
37. The portion of the application that you work with in an application software package is the
38. A……………provides access to features of the program.
39. Menus are a part of the
40. Which of the following is the term for a request for specific data contained in a database?
41. Windows 7 is an example of a(n)
42. The most powerful type of computer.
43. The system component that controls and manipulates data in order to produce information is called the
44. Which of the following is not an operating system for mobile phones?
45. This type of file is created by word processors.
46. Many experts are predicting that this revolution is expected to dramatically affect the way we communicate and use computer technology.
47. The Internet was launched in 1969 when the United States funded a project that developed a national computer network called
48. A(n)………..program provides access to Web resources.
49. Rules for exchanging data between computers are called
50. The last part of the domain name following the dot(.) is the top……….domain
51. Many individuals create their own personal sites called Web logs, or………….
52. Programs that automatically submit your search request to several search engines simultaneously are called…………
53. …………..cash is the Internet’s equivalent to traditional cash.
54. These programs allow parents as well as organizations to block out selected sites and set time limits on Internet access.
55. This type of software works with end users, application software, and computer hardware to handle the majority of technical details.
56. ………….are narrowly focused on specific disciplines and occupations.
57. The primary purpose of this type of software is to create text-based documents.
58. Letters, memos, term papers, reports, and contracts are all examples of
59. The acronym DBMS stands for what?
60. Database…………..are primarily used to enter new records and to make changes to existing records.
61. A file that includes predefined settings that can be used to create many common types of presentations is called a
62. A(n)……....is a single program that provides the functionality of a word processor, spreadsheet, database manager, and more.
63. A Computer that is on the Network is a ……….
64. Network operating systems from Novell is ….……..
66. Older network often use another type of cable, called………..
67. Magnetic Media is an Example of………layer
68. This power protection device includes a battery that provides a few minutes of power.
69. Which layer defines the mechanical, electrical, and timing interfaces to the network?
70. SCSI port (pronounced skuzzy) stands for
72. Spool stands for________
73. Which of the following field is not a part of Frame?
75. The data link layer is used for_____
76. What does SDLC mean in Networking protocol?
78. According to ISO, HDLC means
79. …………..act as a central transmitter and receiver in wireless local area network
81. Which technology is used in a CDROM Drive?
82. Which of the following device can store large amounts of data?
83. Which of the following is handy to carry yet can store large amounts of data?
84. Data (information) is stored in computers as?
85. IP Addresses has………..bytes
86. Which of the following statements is/are true?
87. A server that can perform to other task besides network services is called…………
88. Name a network operating system that is specially designed to handle networking functions efficiently.
90. Which of the following is not a logic gate?
91. Which of the following RAM times have to be refreshed often in order to retain its contents?
92. Which of the following companies is a leader in manufacture of Hard Disk Drives?
93. Usually, in MSDOS, the primary hard disk drives has the drive letter?
94. Which of the memories below is often used in a typical computer operation?
95. Which storage device is mounted on ‘reels’?
97. How many write cycles are allowed to a RAM?
98. How many write cycles are allowed to a EEPROM?
99. The Analytical Engine developed during First Generation of computers used…………as a memory unit
100. A…………is anything that can cause harm.