Thursday, 30 August 2018

MCQ Computer Science

300 MCQ -COMPUTER SCIENCE [SLC / SEE]



Networking and Telecommunication
1.      Data communication means:
                           i.          We can easily send and receive the message                     Data computing system is fastest in network
                          ii.          The process of transferring data and information              None of above
2.      The term network basically refers to:
Communication                         Interconnection                          Sharing                         All of them
3.      Which of the following are is not a goal of computer networks?
Resource sharing                       High reliability                           Scalability            None of the above
4.      Which one of the device is simplex?
i. Television ii. Telephone                 iii. Computer                 iv. Walkie-Talkie
5.      TV broadcasting is an example for data transmitting
i. Half-duplex Mode   ii. Simplex Mode   iii. Full duplex mode   iv. None of them
6.      Which refers to the communication media: [SLC 2065]
UTP Cable              Fiber optics cable           Satellite             All of above
7.      Which is not a communication media? [SLC 2067]
Wire                 Microwave                    Satellite             NIC
8.      Which is not unguided media? [SLC 2069]
i) Fiber optics          ii) Microwave                iii) Infrared                    iv) Radio wave
9.      Which is NOT a guided media? [SLC 2066 S]
i) UTP Cable           ii) STP Cable    iii) Satellite                    iv) Fiber Optics
10.   Which of the following is not a guided data communication media? [SLC 2068 S]
i) Coaxial cable        ii) Fiber optic     iii) twisted pair               iv) Satellite
11.   Which transmission media is not used for guided transmission media?
Fiber Optic              Coaxial Cable                RJ45                             Satellite
12.   Which one is an example of bounded media? [SLC 2067 S] [SLC 2070]
i) Fiber optics          ii) Microwave transmission         iii)Laser transmission      iv) infrared transmission
13.   An example of guided media_______
Radio wave             Infrared                        Fiber Optics                  Micro wave
14.   In which communication media data transfer high? [SLC 2068]
i) Twisted pair         ii) Co-axial cable            iii) Fiber optics               iv) Microwave
15.   Fastest and high bandwidth data communication medium is:
Optical fiber            Twisted Pair                  Coaxial Cable                Telephone Line
16.   Media used to transfer data in forms of light? [SLC 2070 S]
i. Microwave   ii. Fiber optical   iii. Radio wave   iv. Satellite
17.   Microwave and Infrared technology are related with:
Unbounded media                Bounded Media             Confounded                  Hot Bounded
18.   A form of wireless transmission in which signals are sent via pulses of infrared light.
i) Radio networking   ii) Infrared transmission  iii) Microwave transmission  iv) None of the above  
19.   Which is the connector of UTP cable?
i. BNC                    ii. T-Connector              iii. ST connector            iv. RJ-45 connector
20.   Which is the connector of coaxial cable.
i. RJ 45      ii. BNC      iii. ST      iv. None of them
21.   Which of the following is not Media connector?
BNC             ii. terminator    iii.RJ-45            iv.NIC
22.   The device used for connecting PC to telephone line is
i) CD-ROM             ii) MODEM                  iii) Printer                      iv) Port
23.   A device that converts the discrete stream of digital ON-OFF electric pulses used by computer into the continuously variable analog wave patterns used to transmit the human voice over many existing telephone lines.
i) Modem                   ii) Bridge                                iii) Gateway
24.   Modem converts ______________ [SLC 2066 S]
Sound into digital                 Digital signal into sound  Both (i) and (ii)              None of above
25.   The speed of Modems is measured in terms of
mbps                 ii.bps    iii. kbps                 iv. bits
26.   Which device is used to connect multiple networks that uses the same protocol. [SLC 2074]
(i) Bridge                (ii) NIC             (iii) Switch                    (iv) Gateway
27.   Which of the following is used to connect  totally dissimilar networks?
i) Router                 ii) Bridge                       iii) Gateway                   iv) None of the above
28.   A networking device that joins multiple networks having different protocols is_
 Switch                   ii. Router                       iii. Gateway                   iv. Bridge
29.   Which is not a network device?
Hub                  Repeater                       switch                           TCP/IP
30.   Which is not a physical component of computer network ?
i) Cable                   ii) NIC                          iii) Network OS             iv) Hub
31.   Which is not network hardware component?
HUB                                  ii. Repeater                    iii. Router                      iv. Windows NT
32.   Which is the component of a network?
i. MSDOS      ii. Hub      iii. Volt guard      iv. None of them
33.   Devices installed on long cable runs to amplify the signal are called:
Repeaters                      Adapters                                   Switches                       Routers
34.   A network navigation device that merely retransmits a signal to all other nodes attached to it:
Router                          NIC                                          Hub                              Adapter
35.   A device that lets you link two networks together.
i. Switch                      ii. Hub                      iii. Router           iv. None of above
36.   Which of the following device is multi ports repeater?
Hub                        ii. router                        iii. bridge          iv. Gateway
37.   Any network device that can connect to the network and can generate ,process or transfer network data.
i) Node                        ii) Client                               iii) Peer
38.   A network interface card is the card that physically makes the connection between the computer
and the network cable.
i) Network cables            ii) Network connector              iii) NIC
39.   Which is not the network operating system:
Linux                            UNIX                           MS-DOS                      Windows Server 2012
40.   Which is Network operating system(NOS)? [SLC 2064]
i. Linux                   ii. Windows XP                         iii. MS-DOS                  iv. All
41.   Which is the network operating system used in a server computer?
i. Windows XP        ii. Windows Vista           iii. Windows NT server    iv. None of them
42.   Which one is an operating system software? [SLC 2070]
i) MS-Word ii) MS-Excel      iii) Firefox         iv) MS-DOS
43.   Protocols in network means
i)                 Language for communication between computer  
ii)                Rules for exchange of message between two or more hosts
iii) Both i) and ii)                                         iv) None of the above
44.   Which of the following is not a protocol? [SLC 2068] [SLC 2074]
i) POP        ii) TCP/IP         iii) NOS                        iv) FTP
45.   Which is not a network protocol?
i. TCP/IP      ii. HTTP         iii. LAN                          iv. FTP
46.   Which of the following is not a protocol?
TCP/IP        ii.IPX/SPX      iii.NETBIOS/NETBUI        iv. Client
47.   Which is not the network protocol?
 TCP/IP                  ii. STP                          iii. FTP             iv. SMTP

48.   Which of the following is protocol?
TCP/IP                   HTTP              FTP                 All of them
49.   The communication protocol used to connect to web servers on the internet or on a local network (intranet).
i) TCP/IP                 ii) HTTP          i) SMTP             iv) POP
50.   _______ is the protocol used to send email:
HTTP              SMTP              POP                 FTP
51.   Which protocol is used to receive mail from mail server?
POP                       FTP                 HTTP              SMTP
52.   Which of the following networking solution is suitable for networking within a building?
i) WAN                   ii) LAN             iii) MAN           iv) None of above
53.   A data communications system allowing a number of independent devices to communicate directly with each other, within a moderately sized geographic area.
i.LAN                     ii.WAN             iii. MAN                         iv.CAN
54.   A network of computer spread over a city or town located in the same geographical area.
i) LAN                      ii) MAN                      iii) WAN
55.   A telecommunication network, usually used for connecting computers, that spans a wide   geographical area.
                        i) LAN                ii) MAN                   iii) CAN                 iv) WAN
56.   Which type of network is used in the internet?
LAN                MAN                            GAN                            WAN
57.   Which of the following topologies share a single channel on which all stations can receive and transmit the data?
i) LAN                    ii) BUS             iii) TREE          iv) None of the above
58.   Physical layout of computer:
Network                       Topology                      LAN                             MAN
59.   Which is not a network topology? [SLC 2066]
STAR                           Ring                             Client Server                 BUS
60.   A topology with a single cable that connects all the workstations, servers, printers and other devices on the network.
i. Ring Topology           ii. Bus Topology                   iii. Star Topology     iv. Mesh Topology
61.   Which of the following topologies is least affected by addition/removal of a node?
i) Star                     ii) Ring              iii) Bus              iv) None of the above
62.   In which topology network devices are connected through hub? [SLC 2067]
i) Ring topology       ii) Bus topology             iii) Star topology                        iv) None of the above
63.   Token passing system is used in _____ topology.
Star                              Ring                                         Bus                              Mesh
64.   The network architecture used in most home networks is:
Client-server LAN                     Peer-to-peer LAN          Client-server WAN            Peer-to-peer WAN
65.   A _______ is a self-sufficient computer that acts both as a server and a client to other similar computers on the network.
i. Node       ii. Client                        iii. Peer
66.   A group of computers that functions both as a client and as a server.
                        Centralized computing          ii) Client/server        iii) Peer-to-peer          iv)Local Area Network
67.   In which of the following network model all the computers have equal access?
i. Peer-to-peer network              ii. apple talk network
iii. Client/server network            iv. None of the above
68.   A specialized network device on a host-based network that transmits the data entered by the user to the host for processing and displays the results.
i. Client                    ii. Network Server                    iii. Terminal                   iv. None of the above
69.   A centralized computing network is a type of network where  all the users connect to a host computer that is the acting agent for all communication.
i) Peer-to peer                     ii) Client/server                           iii) None of the above
70.   A network in which a central host computer performs data processing and storage on behalf of clients.
i. Centralized computing network                  ii. Client/Server network iii. Peer-to-peer network
71.   Which of the following acts as the central authority in the network?
protocol                  ii.client iii.server             iv.none of the above
72.   A server in LAN is a
i) Device offering service to user                   ii) NIC             
iii) Workstation with huge secondary storage iv) None of the above
73.   A dedicated server that manages printers and printing jobs is_
 Network Server      ii. Printer Server            iii. Modem Server          iv. File Server
74.   The maximum speed at which data can be transmitted between two nodes on a network.
Bit rate                   Bandwidth                    Band length                   None of them
75.   The bandwidth of digital signal is measured in­_
i. Hertz                   ii. Cycle per second        iii. Bits per second         iv. None of the above

Internet and Its services

76.   The internet was developed by US.
Department of Defence        Department of Electronics          Department of Commerce       None
77.   The large group of millions of computers around the world that are all connected to one another.
LAN                             Intranet                         Internet                     All of above
78.   Which is not related to Internet? [SLC 2067]
i.ISP                             ii.TCP/IP               iii.WWW                       iv.UPS
79.   Which of the following network connects computer to the Internet? [SLC 2069 S]
i) Intranet                ii) LAN             iii) WAN                       iv) MAN
80.   Which device is necessary to operate the internet? [SLC 2066 S]
i.CD-ROM         ii. ISP                          iii. Modem                 iv. All of above
81.   Connection between a computer and  the Internet done using a normal telephone is called
                                     i.          Satellite network                  Dial-Up network            Cable network         None of them
82.   Which is the protocol used in internet?
i. TCP/IP            ii.FTP                         iii.ICP                            iv.ISP
83.   __________ is the main line of defense between a local network or intranet and the Internet.
USB port                Encryption key              Firewall Decryption key
84.   Each computer on the Internet has a unique numeric address called a/an …. [SLC 2069 S]
i) Web address        ii) Domain address         iii) Network binding       iv) IP address
85.   The ARPAnet that helped to develop protocol is
                                     i.          TCP/IP                   ARP                 POPA               None of above
86.   Which of the flowing is the internet service? [SLC 2069]
IRC                        E-Mail              Telnet               All of above
87.   Which is the internet service? [SLC 2064]
i) Telnet                        ii) POP             iii) Both iv) None
88.   Which one is not the service of the Internet?
Electronic Fax               ii. Chatting        iii. Sharing hardware                  iv. Electronic mail
89.   Which is not an internet service? [SLC 2066 S]
i) e-mail                        ii) e-telephone                iii)e-fax             iv) e-commerce
90.   WWW is a
Protocol of Internet              Service of Internet         Language of Internet      None of them
91.   Email is
                                     i.          Mail concerning electronic devices
                                    ii.          Transaction of letters,messages and memos over a communication network.
                                   iii.          Transaction of messages within a computer.                           None of them.
92.   E-mail is a/an …………… [SLC 2067 S]
i) organization which controls internet            ii) protocol to access internet       iii) service of Internet   iv) none
93.   Which is the correct Email ID? [SLC 2065]
i) Yahoo@ramesh    ii) Ramesh@yahoo.com             iii) @ramesh.yahoo.com    iv) None of the above
94.   In an email address : abc@yahoo.com, what does ‘yahoo’ refer?
User account name        ii. Domain name            iii. Top level domain name          iv. None of them.
95.   Which of the following is online business?
E-Commerce           E-shopping        E-Business        All of the above
96.   E-commerce is ………….[SLC 2067 S]
i) a type of business             ii) a type of virus           iii) both (i) &(ii) iv) None of the above
97.   Each web page has its own unique address known as
i) Uniform Resource Locator                                   ii) Universal Resource Locator
iii) Uniform Resources Locator                               iv) Universal Resources Locator
98.   The unique address of a web page on the internet is called
i.URL                 ii. Browser                  iii. Protocol                 iv. HTTP
99.   Which of the following allows the user to surf and interact with the web-page?
i. website                  ii. Browser                  iii.web page                  iv.web server
100.          Which is web browser software? [SLC 2067]
 i. Windows 2007             ii. Internet explorer      iii. Windows NT                       iv. All of the above
101.          Web sites that allow the users to search information based on keywords or a combination of keywords.
                        i)World Wide Web          ii) Electronic mail                iii) Search engines
102.          Which is not the search engine?
Yahoo.com                   ii. Google.com               iii. Bing.com                  iv. Ebay.com
103.          Yahoo! Is a ……..
i. browser                      ii .home page                 iii. search engines
104.          FTP is used to
                                     i.          Browse the Internet             Send emails
                                    ii.          transfer files from one computer to another                None of above
105.          Used to transfer file from one computer to another computer in Internet. [SLC 2070 S]
i. FAQ              ii. IRC              iii. FTP             iv. TPF
106.          Which of the following is remote login service? [SLC 2068 S] [SLC 2071]
        i) Video conferencing   ii) Telnet           iii) FTP             iv) TCP/IP
107.          A web site in the internet that brings people together in central location to talk, share ideas, share
                        interests, make new friends.
                        i)USENET                   ii) Social network                        iii) Web chat
108.          An online interactive communication mechanism that lets people to make a real time decision with
one or more people through the Internet.
                         i)Web chat               ii)Newsgroup                     iii)Videoconferencing
109.          The service of the Internet that provides audio and video conversation is_
Chat                 ii. E-mail           iii. Video conference                  iv. Video chat
110.          The process of transferring file from a remote computer to local computer is:
Uploading                     Downloading                 Searching                      File transfer protocol
111.          The process of transferring file from a local computer to internet is:
Uploading               Downloading                 Searching                      File transfer protocol
112.          Web-site is a collection of
HTML documents         Graphics File                 audio and video files      All of above
113.          A set of interconnected WebPages, usually including a homepage, generally located on the same server, and prepared and maintained as a collection of information by a person, group, or organization.
i. Web site                     ii. Web Browser            iii. Web server               iv. None of above    
114.          A technology that allows the creation of collaborative web sites.
i. Wiki                          ii. E-Mail                      iii. Search Engine           iv. All of above


Computer Security
115.          The term computer security refers to:
Use of antivirus                                     Protection of software   
Protection to a computer system             Use of firewall

116.          Common computer security is
Hardware Security                                 Software security          
Hardware & software security                None of them
117.          _______ protect the machine and peripheral hardware from theft, electronic intrusion and damage.
i) Information security         ii) Hardware security           iii) Software security            iv) None of the above
118.          Some of the methods of hardware protection are:
i) Fire Alarms            ii) Security Lighting      iii) Closed-circuit cameras               iv) All of above
119.          Some of the methods of hardware protection are:
i. Password security                  ii. Security lighting                iii. Scandisk                 iv. All of the above
120.          Which of the following is not hardware security method?
i. Insurance     ii. Maintenance       iii. Closed-circuit cameras        iv. Hard lock key
121.          Hardware security includes
Regular maintenance            Use of power of regulator devices           Both               None of them
122.          Which is not the power protection device?
UPS                                   Spike Guard                  Volt Guard              Scan disk
123.          Which of the following is not power supply device?
i. Volt guard               ii.UPS      iii. Constant Voltage Transformer                   iv. Power Plug
124.          A device that protects your PC against power surges and spikes.
i) UPS              ii) Voltage Regulator             iii) Surge suppressor                iv) All of the above
125.          An electrical regulator designed to automatically maintain a constant voltage level.
i.UPS                ii. Voltage regulator             iii. Surge processor         iv. All of the above
126.          UPS is a
Voltage filtration device        Voltage processing device           Voltage regulator device           None
127.          ……….. is a device that allows your computer to keep running for at least a short time when the primary power source is lost.
i.UPS           ii. Voltage regulator      iii. Surge processor         iv. All of the above
128.          To prevent the loss of data during power failures, we use:
Encryption program             Surge protector              Firewall             UPS
129.          Which device protects hardware? [SLC 2068]
i) UPS        ii) MODEM      iii) Gateway       iv) All of the above
130.          The temperature in computer system should be maintained between ______to________
i)21`C to 24`C              ii) 20`C to 25`C                    iii) 23`C to 28`C                       iv) None of the above
131.          The temperature in the computer system should be maintained between  ……….   and          ……….
i. 68 to 72 degree Fahrenheit                         ii.88 to 78 degree Fahrenheit      
iii.68 to 27 degree Fahrenheit                        iv. All
132.           
133.          The type of security that provides barriers and other cyber –tools that protect programs, files
and the information flow to and from a computer.
i) Computer security            ii) Hardware security      iii) Software security       iv) None of the above
134.          Which of the following is not software security measure?
i. Virus Scanning          ii. Scandisk                  iii. Password             iv. Security Guard
135.          Data and software security includes
Protection from computer virus         Cover the computer property      Both          None of them
136.          An important counter measure against data corruption or loss.
Password policy                  Defragmentation            Scan disk                Backup system
137.          Which of the following measure allows to protect computers being opened from unauthorized user?
i. Antivirus program      ii. Password                 iii. Debug               iv. program
138.          Scan disk is used for
Removing virus                   Removing bad clusters               Backup data      All of above
139.          Scan disk is performed by using
Application software            Operating system software                      Utility software      None

140.          Backup is way of
                                     i.          Securing data and information                                   Securing internal part of the computer
                                    ii.          Securing external parts of the computer                     None of them
141.                                      refers to the condition of a disk in which files are divided into pieces scattered around the disk.
i. Fragmentation       ii. Defragmentation       iii. Scan disk      iv. All of the above
142.          Process of arranging the scattered parts of file into a contiguous manner. [SLC 2068 S] [SLC 2071] [SLC 2074]
        i) Backup        ii) Defragmentation        iii) Debugging    iv) All of the above
143.                                                                                  The process of loading the noncontiguous fragments of data, rearranging   the fragments and restoring them into fewer fragments or into the whole life.
i)Fragmentation              ii) Defragmentation              iii) Scan disk
144.          Defragmentation is a process of
Formatting the disk                                      Relocation of the disk                
Relocation of the files of the disk                  None of them

Computer Virus
145.          Computer virus is___________software.
i. Malware                     ii. Utility                        iii. Application   iv. Operating System
146.          Computer virus is ………. [SLC 2068 S]
         i) dust particle             ii) computer programs    iii) useful program          iv) none of the above
147.          Virus is a [SLC 2071]
i. Utility program           ii. Destructive program               iii. System program         iv. None
148.          Computer virus can
i. Hide in a host file                    ii. Replicate                   iii. Spread                     iv. All of the above.
149.          Computer virus can destroy
i. Hardware                         ii. Software                  iii. Data                                iv. All
150.          Which is not a virus? [SLC 2064]
i. Worm                        ii. Logic bomb               iii. Trojan Horse            iv. Win-zip
151.          Which one is not a type of virus? [SLC 2067 S] [SLC 2070]
i) Message Carrying virus                       ii) Boot sector virus       
iii)System virus                                      iv)Special Purpose Application Infector
152.          Route of virus transmission. [SLC 2065]
Mouse                    Printer              Microphone                   Pen drive
153.          What is the route of virus transmission? [SLC 2070 S]
i. Monitor          ii. Flash drive     iii. Mouse                      iv. Cable
154.          Computer virus can spread from one computer to another through_
i. Infected portable disk        ii. The Internet              iii. Pirated software        iv. All of the above.
155.          A program or set of programs designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware and more.
i)Shareware                     ii)Freeware                          ii)Antivirus
156.          Which of the following is not anti-virus
i.AVG                                  ii.NAV                      iii, Kaspersky                      iv. I Love you
157.          Which of the following is an anti-virus program? [SLC 2068 S]
        i) NAV                        ii) Windows       iii) Photoshop    iv) All of the above
158.          An example of antivirus software is
i. NAV   ii. McAfee   iii. CPAV         iv. All

159.          Which is antivirus software?
i. Scan                    ii. Defrag           iii. Kaspersky                iv. Power point
160.          Norton antivirus, when loaded onto a computer system , checks the following areas for viruses       
boot record             programs at the time you use them                                  both
161.          ________ Virus are often transmitted by a floppy disk left in the floppy disk drive.
Boot-sector             Trojan horse                 Script                logic bomb
162.          Which computer virus damages the master boot record? [SLC 2068]
i) Macro virus  ii) File virus       iii) New folder virus       iv) Boot sector virus
163.          Which virus infects boot sector files? [SLC 2069]
i) Macro virus          ii) Multipartite virus        iii) Boot sector virus       iv) Program virus
164.          Boot sector virus infects [SLC 2066]
i. System files                      ii. Master boot record      iii. Application software    iv. Document file
165.          Disk Killer, stoned and Michelangelo are examples of ________________
i) Boot sector virus                          ii) File infecting virus    
iii) Polymorphic virus                       iv) All of the above
166.          A virus that infects the part of the computer called a system sector.
i. Boot sector virus              ii. File infecting Virus      iii. Polymorphic virus              iv. None of the above
167.          Which of the following virus infects the various parts of operating system?
i. boot sector                        ii. Worm                    iii. Macro                             iv. system infector
168.          A type of virus that infects executable files having .exe, .com, .ovl, .drv, .sys, or .dil.
i) Boot sector virus                ii) File infecting            iii) Script virus                                   iv) Macro virus
169.          __________ Virus can infect both programs and boot sectors.
Stealth virus                        File infectors                 Multipartite virus                 Polymorphic virus
170.          Multipartite viruses have combination features of
i. Boot sector & stealth virus                         ii. Boot sector &macro  virus     
iii. Boot sector & program virus                    iv. None
171.          Viruses attach themselves to documents such as Word and Excel.
Macro virus             File infectors                             Polymorphic virus         
172.          A type of virus that replaces a macro , which is what enables a program to work and instigates a designated group of actions and commands.
i)Macro virus                         ii)File infecting virus                       iii)Polymorphic virus
173.          A virus that can change its appearance with every infection is called_____________
i) Boot virus                        ii) Micro virus                iii) Script virus                                       iv) None of them
174.                                        is a self-encrypted virus designed to avoid detection by a scanner.
i. Polymorphic virus             ii. Macro virus   iii. Script virus   iv. None of the above

Multimedia and Its Application
175.          A computer-derived electronic system that allows the user to control, combine, and manipulate different types different types of media, such as text, sound, video, computer graphics and animation.
Monomedia             Multimedia                    Hypermedia                  None of the above
176.                                                                                                    In order to work with multimedia a personal computer typically requires the following hardware  components.
                          i)Faster CPU                   ii)Large main memory              iii)All of above          iv)None of above
177.          In order to work with multimedia, a personal computer typically requires the following hardware components.
Power microprocessor                      Huge main memory       Compact disk    All of them
178.          Which of the following media are used in Multimedia system?
i. Text-audio          ii. Text-visual      iii. Text, graphic, audio and visual           iv. Text, graphic and sound
179.          The types of media used in multimedia includes
                                     i.          Text                                   Graphics                       Sound                           All of them
180.          A MUK consists of the
                                     i.          CD-ROM Drive       Sound Card                   Speaker            All of them
181.          Which of the following are components of multimedia?
i. Computer                     ii. Software                             iii. Projector                   iv. All of above
182.          Which of the following is main component of multimedia? [SLC 2065]
i. Floppy disk                 ii. Floppy drive                 iii. Sound card               iv. Magnetic tape
183.          Which of the following is the component of multimedia? [SLC 2069 S]
         i) Network     ii) Microphone               iii) Power cable              iv) Printer
184.          Select the common components of the multimedia computer system.
                                     i.          Floppy                    Floppy drive                  CD-ROM                      None
185.          Which is not related to multimedia? [SLC 2069]
i) Printer                       ii) Sound card                            iii) Microphone              iv) CD-ROM
186.          Which of the following is an audio output device? [SLC 2070]
i) Microphone          ii) Speaker                                 iii) Monitor                    iv) Printer
187.          Which of the following is an audio input device? [SLC 2071]
i. Printer                  ii. Microphone                           iii. Head phone                        iv. Speaker
188.          Which of these software is used for photo editing? [SLC 2074]
(i) Ms-Excel                        (ii) Photoshop    (iii) Power-Point            (iv) Ms-Word
189.          Which one is the software used in multimedia?
CD-ROM                Sound Card                   Sound Forge                  MS-Word
190.          Software used in multimedia system.
Photoshop               Flash                            Maya                            All of them
191.          The software associated with the multimedia technology is                           .
i. Macromedia Flash           ii. Microsoft Word.    iii. Adobe In design           iv. None of the above
192.          Software associated with the multimedia technology is
Windows XP                 Macromedia Flash         QBASIC                       None
193.          Which of the following is software used in multimedia technology.
i. Office XP                     ii. Adobe Photoshop             iii. Basic                       iv. None of the above
194.          Which of the following is not multimedia software?
i. Windows media player            ii. Windows XP     iii. Adobe illustrator         iv. Macromedia flash
195.          Which of the following is multimedia application?
i. Education                   ii. Entertainment                   iii. virtual reality          iv. All  of above
196.          Multimedia technology is very effective in
                                     i.          Market                                Classroom                     War                        None
197.          Multimedia technology is used in ……… [SLC 2066]
i) Education                   ii) Business                    iii) Health care               iv) All of the above
198.          An artificial reality that projects the user into a 3D space generated by the computer.
Virtual Reality               Virtual Computer                       All of the above             None of the above
199.          An upcoming technology that makes users feel in Virtual Environment(VE) by using computer    hardware and software.
  i)Virtual space                      ii)Virtual computer           iii)Virtual reality          iv)None of above
200.          _____ deals with the recording and display sequence of images at a reasonable speed to create an impression of movement.
Graphics                 Video                            Animation                     Text
201.          Graphics that contain movement often referred to as                        .
i. Graphics                      ii. Video                iii. Animation                                 iv. Text
202.          _______ provides a visual impact.
Image                     Graphics                       Video                None of them
203.                                                                                                    The process of displaying still images in a rapid sequence to create the illusion of movement.
                          i)Text                                ii)Graphics                      iii)Video                    iv)Animation
204.          An extension to hypertext supports linking graphics, sound and video elements in addition to text elements.
Interactive media                       Hypermedia                  All of the above             None of the above

Cyber Law and Computer Ethics

205.          A genetic term that is concerned to the legal and regulatory aspects of Internet and computer technology.
Copyright law                      Cyber law                     Computer Crime      None of them
206.          “The Electronic Transaction and Digital Signature Act-Ordinance” is Known as:
                                                              i.     Intellectual Property Law                             Cyber Law
                                                             ii.     Telecommunication Law                              Data Protection Law
207.          When did cyber law introduced in Nepal?
i.2002 A.D.        ii.2003 A.D.                      iii.2004 A.D.                  iv.2005 A.D.
208.          When did cyber law introduced in Nepal? [SLC 2066] [SLC 2070 S]
i) 2061 B.S.      ii) 2062 B.S.      iii) 2007 B.S.     iv) 2016 B.S.
209.          The government of Nepal has passed the cyber law on:
31st Bhadra 2061 BS                        29th Bhadra 2061 BS      30thBhadra 2062 BS            30thBhadra 2061 BS
210.          The term ‘cyberspace’ was used in:
1984                              1884                             1985                            1885
211.          A criminal activity within the information technology infrastructure.
Digital crime                        Intellectual property       Cybercrime                   All of them
212.          Which of the following is computer crime?
i. piracy            ii. pornography                  iii. harassment                iv.All of above
213.          Which of the following is not computer crime?
i. Plagiarism        ii. Password guessing         iii. Internet                      iv. virus transferring
214.          _______ is the normal Principal that regulates the use of computers.
Cyber Law              Cyber act                      Computer ethics All of them
215.          Which of the following is not computer ethics?
Not to steal data                   Not to bear false message    Not to use Internet        Not to harm the society
216.          Premeditated, usually politically-motivated violence committed against civilians through the use of, or with the help of, computer technology
i) Cyber stalking             ii) Cyber laundering iii) Cyber theft              iv) Cyber terrorism
217.          The act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trust worthy source.
i) Hacking                     ii) Phishing              iii) Computer Virus              iv) Cyber stalking
218.          Electronic transfer of illegally-obtained monies with the goal of hiding its source and possibly its destination.
                        i)Cyber stalking          ii) Cyber laundering           iii) Cyber theft                      iv) Cyber terrorism
219.          The method of making the data or message unreadable by unauthorized people.
Digital signature             Decryption        Encryption                    All of them
220.          Which of the following is included in cyber law?
i. Trademark right    ii. Copyright                  iii. Data privacy               iv. All of the above
221.          The law which includes literature and art, films, computer programs, invention, designed used by traders for their goods or services is called:
                                                              i.     Data Privacy Law                            Intellectual Property Law
                                                            ii.     Telecommunication Law                  Cyber crime Law
222.          The Process of ensuring the preservation, integrity and reliability of data is Known as:
                                                              i.     Intellectual Property Law                 Data Protection and Privacy law
                                                             ii.     Cyber Law                                      Telecommunication Law
223.          The law that provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium.
i. Digital signature law    ii. Intellectual property law          ii. Telecommunication law
224.          A federal law enacted in 1970 to ensure confidentiality of consumer credit information held by lenders and credit reporting agencies.
i. Fair credit reporting act                        ii.Federal privacy act      iii.Copyright act

Database Management System
225.          Database is a
i.tool of editing documents                ii. way to automate common tasks
iii. collection of related information
226.          A (n) ____________________ is an organized collection of the related information.
            Object              database            Property                       document
227.          Which is the database?
Data of SLC Exam              Oracle               MS-Access                    Excel
228.          Which is not the database?
i. Phone diary                ii. Mark ledger   iii. Attendance Register    iv. Report Card
229.          Which is the example of Relational Database Management System?
i.Oracle                ii.FoxBASE                  iii.Sybase                          iv.FoxPro
230.          __________ is a Database Management System.
DBase                    MSAV              EXCEL            All of above
231.          MS-Access is a
DBMS                    RDBMS           Database           Metabase
232.          MS-Access is used to create _____________.
Database     DBMS              Record              Table
233.          ___________ is not DBMS.
Oracle                     dBase               FoxPro             Paint
234.          Which is an example of database? [SLC 2064]
DBase                    MS-Access        Telephone Directory      All
235.          …………… is the DBMS. [SLC 2065]
i) Fox-Pro   ii) MS-Excel                  iii) Lotus-123     iv) All of the above
236.          Which of the following is database application? [SLC 2070]
i) MS-Word ii) MS-Access                iii) MS-Excel                 iv) QBASIC
237.          Which of the following is not a database application? [SLC 2069]
          i) Oracle                    ii) Foxpro          iii) MS-Access       iv) MS-Excel
238.          MS-Access is a software.
i. Utility            ii. Application                iii. System         iv. None of the above.
239.          Which is DBMS?
i. Database                    ii. Metabase                   iii. dBase           iv. MS-Excel.
240.          A Database Management System can be used to                               .
i. retrieve information           ii. search information     iii. sort information   iv. all of the above
241.          ___________________ is a set of rules used by Access to ensure that the relationships between tables are valid and that the related data is not accidentally changed or deleted.
            Relationship                  Referential integrity                    Query               Forms
242.          What is extension of access database? (MS-Access 2003 version) [SLC 2066]
DBF                       MDB                MBD                DBM
243.          _____ is the table design creating option to create custom table design.
Datasheet                Design view                  Wizard              Link Table
244.          _____ is a data type used for lengthy text and numbers
Text                       Long Text                     OLE Object                  Memo
245.          A field name can be up to _____ characters long.
40                          46                    64                    2048
246.          Data type that requires 8 bytes of storage.
Yes/No                   Currency                       Long Integer                  All of them
247.          Memory space consumed by a currency data type maximally is …………[SLC 2069]
          i) 2 bytes                   ii) 4 bytes          iii) 8 bytes         iv) 1 GB
248.          The data type appropriate to store salary is: [SLC 2067]
i)Memo                         ii)Currency        iii)Text              iv) Auto number
249.          The name of caption can be declared up to _____ characters.
1024                       2024                             2048                             2005
250.          Memory space used by a auto number data type is _____
1 Byte                    2 Bytes                         4 Bytes                         8 Bytes
251.          What is the default size of Access?                                                         
(i) 10                (ii) 20               (iii) 30               (iv) 50
252.          Date/Time occupies ……….  bytes of memory. [SLC 2066] [SLC 2067]
i) 4             ii) 2                  iii) 8                              iv) 16
253.          The maximum size of text field in MS-Access is …………. [SLC 2068 S] [SLC 2070]
         i) 50              ii) 10                 iii) 6400                        iv) 255
254.          Format symbol that converts all characters to uppercase.
@                           &                                 <                                  >
255.          …………… is not the data type of MS-Access. [SLC 2065] [SLC 2068]
i) Number         ii) Text              iii) Memo          iv) Form
256.          The logical field data type of MS-Access is______________ [SLC 2064]
i. Yes/No                ii. True/False                 iii. On/Off                     iv. All of the above.
257.          The field size of logical field data type is __________ in MS-Access.
i. 1 bit                           ii. 1 byte                       iii. 2 bytes                     iv. 2 bits
258.          Which data type consumes the least storage space? [SLC 2074]
(i) Text       (ii) Yes/No        (iii) OLE object (iv) Memo
259.          Which of the following data type is appropriate to store gender of person in terms M or F?
i. Memo                    ii. Currency              iii. Yes no                         iv. Auto number
260.          The default data type of MS-Access is: [SLC 2068 S] [SLC 2069] [SLC 2074]
          i) Number     ii)Text               iii) Memo          iv) Auto number
261.          The default field size of “AutoNumber” data type is                 .
i. Byte              ii. Integer                      iii. Long Integer             iv. Long Integer
262.          Which is the subtypes for the number data type?
Hyperlink          Bit                    Index                Integer
263.          Which is the subtype of number data type?
i. Integer                       ii. Byte                          iii. Single                       iv. All of the above.
264.          Number field is used for storing only _______________.
Number            Text and Number          Number and Time         Number and Year
265.          The datatype which is used for only integer value.
i.text                     ii.currency                    iii.number                         iv.OLE
266.          Which of them is not a data type?
Memo               Yes/No             Time/Date         Caption
267.          Which of the following is not a data type?
i. Picture                  ii.date/time                         iii.text                              iv.number
268.          Which of the following is not the data type used in MS-Access?
i. Date/Time                  ii. Counter                     iii. Hyperlink                 iv. Caption
269.          Which of the following is not a data type in Microsoft Access?
i. Text                ii. Currency                  iii. Hypertext                 iv. Date/Time
270.          What field type is used to store picture in a table?
i.memo                  ii.OLE                          iii.hyperlink                     iv.None
271.          Which is suitable data type to store video? [SLC 2070] [SLC 2073]
i) Text              ii) Number        iii) Hyperlink     iv) OLE object

272.          The data type appropriate to store address is                   .
i. Memo                        ii. Currency                   iii. Text                         iv. Auto number
273.          What kind of data is kept in memo field?                                                
(i) Hyperlink      (ii) Software      (iii) Data           (iv) Pictures
274.          What kind of data are kept in memo field?
i.Name of Student     ii.Students phone number     iii.Students Bio data     iv.Students picture
275.          Which specifies the expression that checks the invalid data?
Validation Rule                    Validation Text              Input Mask       Required
276.          _____ is not a field property of MS-Access.
Caption                   Index                            Color                            Format
277.          …………… defines a standard pattern for the appearance of all data entered in the field
i.format                   ii.input mask                  iii.default value
278.          A field property that limits the data to be entered in a field is___________
i. Validation Rule     ii. Format                      iii. Input Mask               iv. Indexed
279.          The maximum number of characters that can be stored in a field is determined by_
i. Field Type                        ii. Field Size                  iii. Field Length  iv. Field width
280.          Field size, format, input mask, caption and default values are:
            Key elements                field properties               Navigating modes          data types
281.          The primary key contains _____ value.
Null                        No Null                         Number                        Auto number
282.          The _________________ key uniquely identifies each record. [SLC 2066]
            Primary            database                        Object              premier
283.          Primary key does not accept …………… [SLC 2064] [SLC 2065] [SLC 2068] [SLC 2074]
i) Text              ii) Number        iii) Null value     iv) None of the above
284.          In MS-Access data are stored in ……………… [SLC 2068]
        i) Form                       ii) Query           iii) Table                       iv) All of the above
285.          Form is designed for
i. filters data              ii. Sort data               iii. Print data                      iv. Modify data
286.          Which component of MS-Access is used to enter data? [SLC 2065]
Query                     Forms               Report              Both (i) and (ii)
287.          Which component of MS-ACCESS does not allow entering data? [SLC 2064]
i. Table                   ii. Query                       iii. Form            iv. None of them
288.          Query is used to
i. retrieves data from database          ii. Create table in database    iii. Print database      iv. All 
289.          …………….. query changes value in main table. [SLC 2068 S]
         i) Select                     ii) Update          iii) Both (i) &(ii) iv) None of the above
290.          Which is not a type of query? [SLC 2067] [SLC 2073]
i) Search     ii) Select            iii) Update         iv)All of the above
291.          Report can be generated by using data from …………[SLC 2068 S]
         i) Table                      ii) Query           iii) Forms                      iv) Both (i) &(ii)
292.          ……………….. object of access is used to print formatted data. [SLC 2068] [SLC 2073]
        i) Query                      ii) Form iii) Report                      iv) Table
293.          The object of MS-Access that is used to generate hard copy of records. [SLC 2066]
i) Query      ii) Table            iii) Form                        iv) Report
294.          __________allows MS-Access to query and sort record faster.
i. Sorting                 ii. Editing                      iii. Filtering                    iv. Indexing
295.          Which of the following is not MS-Access database object?
i. Table                      ii. Form                     iii. Query                         iv. Print
296.          A collection of records for a single subject, such as all of the customer records.
i. Field                    ii. Record                      iii. Table                      iv. Data
297.          Collecting multiple related fields is called: [SLC 2067]
i)Records    ii)Table             iii) Forms          iv)Query

298.          A field is also known as
i.records               ii.column                     iii.Database                          iv.entity
299.          Row is also called …………[SLC 2069] [SLC 2074]
          i) Record                   ii) Field             iii) Database                  iv) Table
300.          The columns in database tables are called: [SLC 2070] [SLC 2073]
i) Record                       ii) Field             iii) Report                      iv) Memo

MCQ Question Bank Microsoft PowerPoint