Information Management Computers MCQ Set 1

Online Assignment MCQ Set 1

These online assignment question answers based on two similar subjects name i.e. (1. Information Management Computers and ii) Computer in Managements).

Q1. Computer can not do anything without a:

(a) Chip

(b) Memory

(c) Output device

(d) Software

(e) None of these

Answer

Ans: (e) None of these

Q2. Primary storage is————–as compared to secondary storage.

(a) Slow and inexpensive

(b) Fast and inexpensive

(c) Fast and expensive

(d) Slow and expensive

(e) None of the above

Answer

Ans: (c) Fast and expensive

Q3. The memory which is programmed at the time it is manufactured:

(a) ROM

(b) RAM

(c) PROM

(d) EPROM

(e) None of the above

Answer

Ans: (a) ROM

Q4. Which of the following isn’t used in the storage phase of a computer based information system?

(a) Magnetic disk

(b) Keyboard

(c) Diskette

(d) Hard disk

(e) None of the above

Answer

Ans: (b) Keyboard

Q5. A kind of serial dot œ matrix printer that forms characters with magnetically charged ink-sprayed dots is called:

(a) Laser Printer

(b) Ink-Jet printer

(c) Both of the above

(d) None of the above

Answer

Ans: (b) Ink-Jet printer

Q6. Which of the following is not applications software?

(a) Word processing

(b) Spreadsheet

(c) UNIX

(d) Desktop publishing

(e) None of the above

Answer

Ans: (c) UNIX

Q7. A translator which reads an entire program written in a high-level language and converts it into machine language code is called:

(a) Assembler

(b) Translator

(c) Compiler

(d) System Software

Answer

Ans: (c) Compiler

Q8. The database structure that treats files as tables is:

(a) Relational database

(b) Hierarchical database

(c) Network database

(d) All of the above

(e) None of the above

Answer

Ans: (a) Relational database

Q9. Combining of records from two or more files into a single ordered file is called:

(a) Sorting

(b) Searching

(c) Merging

(d) None of the above

Answer

Ans: (c) Merging

Q10. Which of the following is a query language?

(a) Dbase

(b) Access

(c) Fox Pro

(d) All of the above

(e) None of the above

Answer

Ans: (d) All of the above

Q11. Which of the following are popular DBMS packages?

(a) Dbase

(b) Access

(c) FoxPro

(d) All of the above

(e) None of the above

Answer

Ans: (d) All of the above

Q12. Web browser is a:

(a) Hardware

(b) Software

(c) Hyperlink

(d) All of the above

(e) None of the above

Answer

Ans: (b) Software

Q13. Which of the following communication system uses simplex transmission mode?

(a) Radio

(b) Television

(c) Cable

(d) All of the above

(e) None of the above

Answer

Ans: (d) All of the above

Q14. Searching on a net can be done through:

(a) Search Engines

(b) Indexes

(c) Both of these

(d) None of these

Answer

Ans: (c) Both of these

Q15. Private networks set up by companies for their employees for purposes such as e-mail, group brainstorming, access to corporate database etc is called:

(a) Internet

(b) Intranet

(c) Pop-up-windows

(d) All of these above

(e) None of the above

Answer

Ans: (b) Intranet

Q16. Which of the following functions is supported by e-mail systems?

(a) Composition

(b) Reporting

(c) Transfer

(d) Disposition

(e) All of the above

Answer

Ans: (e) All of the above

Q17. The internal structure of the World Wide Web is built on a set of rules called:

(a) Hyper Text Transfer Protocol

(b) TCP/IP

(c) All of the above

(d) None of the above

Answer

Ans: (c) All of the above

Q18. Which of the following is not a wide area network?

(a) ARPANET

(b) INDONET

(c) OMNINET

(d) None of the above

Answer

Ans: (d) None of the above

Q19. _____ is used to connect a terminal to a computer through public telephone lines.

(a) Modem

(b) Internet

(c) Network

(d) None of these

Answer

Ans: (a) Modem

Q20. Following is the disadvantage of using interpreters.

(a) Fast response

(b) easy to write

(c) Less memory requirements

(d) Time consuming

Answer

Ans: (d) Time consuming

Q21. To install multimedia facility into a computer one needs:

(a) Sound card

(b) Speakers

(c) CD-ROM

(d) All of the above

(e) None of the above

Answer

Ans: (d) All of the above

Q22. The links that take the user to new page is:

(a) Hypertext

(b) Hyperlink

(c) Hyper Text Transfer Protocol

(d) All of the above

Answer

Ans: (b) Hyperlink

Q23. Application software can be acquired through:

(a) Customs programming

(b) Pre-written packages

(c) Both of the above

(d) None of the above

Answer

Ans: (c) Both of the above

Q24. Which of the following is not an utility program?

(a) Editing

(b) Sorting

(c) Merging

(d) None of the above

Answer

Ans: (d) None of the above

Q25. The malicious program that damages your computer is called:

(a) Worm

(b) Viruses

(c) Bugs

(d) None of the above

Answer

Ans: (b) Viruses

Q26. Data entry can be performed with all of the following except?

(a) OCR

(b) COM

(c) Voice œ recognition systems

(d) None of the above

Answer

Ans: (d) None of the above

Q27. The two kinds of main memory are:

(a) Primary and Secondary

(b) Random and sequential

(c) RAM and ROM

(d) All of the above

Answer

Ans: (c) RAM and ROM

Q28. What is the name of the screen symbol that shows the placement of the next character?

(a) Mouse

(b) Cursor

(c) Track Ball

(d) All of the above

Answer

Ans: (b) Cursor

Q29. A command that lets you change one or more fields in a record is:

(a) Insert

(b) Delete

(c) Modify

(d) None of the above

Answer

Ans: (c) Modify

Q30. Data elements of related type are grouped into?

(a) Record

(b) Title

(c) String

(d) All of the above

Answer

Ans: (a) Record

Q31. A Hacker is:

(a) A software program

(b) An unauthorized person

(c) A virus

(d) All of the above

Answer

Ans: (b) An unauthorized person

Q32. The interface between user and computer system is provided by:

(a) Compiler

(b) Utility programs

(c) Operating systems

(d) All of the above

Answer

Ans: (d) All of the above

Q33. The process of navigating and exploring the World Wide Web is called:

(a) Browsing

(b) Surfing

(c) Both of the above

(d) None of the above

Answer

Ans: (c) Both of the above

Q34. An unauthorized access to network can be prevented through:

(a) Passwords

(b) Digital signatures

(c) Encryption

(d) All of the above

Answer

Ans: (d) All of the above

Q35. Which of the following is not a search engine?

(a) AltaVista

(b) Lycos

(c) Infoseek

(d) Gopher

Answer

Ans: (d) Gopher

Q36. Computer Network spanning a global area is:

(a) LAN

(b) MAN

(c) WAN

(d) All the above

Answer

Ans: (c) WAN

Q37. Transmission Channels used in LAN are:

(a) Coaxial cable

(b) Fiber-optics cable

(c) Twisted wire

(d) Both (a) and (b)

(e) All of the above

Answer

Ans: (e) All of the above

Q38. Remote access to distant computers is called:

(a) Telnet

(b) FTP

(c) Both of the above

(d) None of the above

Answer

Ans: (a) Telnet

Q39. The floppy disks comes in two sizes. They are:

(a) 3.5 inch & 5.25 inch

(b) 2 inch and 3.5 inch

(c) 2 inch and 4.25 inch

(d) None of the above

Answer

Ans: (a) 3.5 inch & 5.25 inch

Q40. 1 Byte is equal to combination of:

(a) 16 bits

(b) 8 bits

(c) 2 bits

(d) None of the above

Answer

Ans: (b) 8 bits

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.