Online Assignment MCQ Set 1
These online assignment question answers based on two similar subjects name i.e. (1. Information Management Computers and ii) Computer in Managements).
Q1. Computer can not do anything without a:
(a) Chip
(b) Memory
(c) Output device
(d) Software
(e) None of these
Ans: (e) None of theseAnswer
Q2. Primary storage is————–as compared to secondary storage.
(a) Slow and inexpensive
(b) Fast and inexpensive
(c) Fast and expensive
(d) Slow and expensive
(e) None of the above
Ans: (c) Fast and expensiveAnswer
Q3. The memory which is programmed at the time it is manufactured:
(a) ROM
(b) RAM
(c) PROM
(d) EPROM
(e) None of the above
Ans: (a) ROMAnswer
Q4. Which of the following isn’t used in the storage phase of a computer based information system?
(a) Magnetic disk
(b) Keyboard
(c) Diskette
(d) Hard disk
(e) None of the above
Ans: (b) KeyboardAnswer
Q5. A kind of serial dot œ matrix printer that forms characters with magnetically charged ink-sprayed dots is called:
(a) Laser Printer
(b) Ink-Jet printer
(c) Both of the above
(d) None of the above
Ans: (b) Ink-Jet printerAnswer
Q6. Which of the following is not applications software?
(a) Word processing
(b) Spreadsheet
(c) UNIX
(d) Desktop publishing
(e) None of the above
Ans: (c) UNIXAnswer
Q7. A translator which reads an entire program written in a high-level language and converts it into machine language code is called:
(a) Assembler
(b) Translator
(c) Compiler
(d) System Software
Ans: (c) CompilerAnswer
Q8. The database structure that treats files as tables is:
(a) Relational database
(b) Hierarchical database
(c) Network database
(d) All of the above
(e) None of the above
Ans: (a) Relational databaseAnswer
Q9. Combining of records from two or more files into a single ordered file is called:
(a) Sorting
(b) Searching
(c) Merging
(d) None of the above
Ans: (c) MergingAnswer
Q10. Which of the following is a query language?
(a) Dbase
(b) Access
(c) Fox Pro
(d) All of the above
(e) None of the above
Ans: (d) All of the aboveAnswer
Q11. Which of the following are popular DBMS packages?
(a) Dbase
(b) Access
(c) FoxPro
(d) All of the above
(e) None of the above
Ans: (d) All of the aboveAnswer
Q12. Web browser is a:
(a) Hardware
(b) Software
(c) Hyperlink
(d) All of the above
(e) None of the above
Ans: (b) SoftwareAnswer
Q13. Which of the following communication system uses simplex transmission mode?
(a) Radio
(b) Television
(c) Cable
(d) All of the above
(e) None of the above
Ans: (d) All of the aboveAnswer
Q14. Searching on a net can be done through:
(a) Search Engines
(b) Indexes
(c) Both of these
(d) None of these
Ans: (c) Both of theseAnswer
Q15. Private networks set up by companies for their employees for purposes such as e-mail, group brainstorming, access to corporate database etc is called:
(a) Internet
(b) Intranet
(c) Pop-up-windows
(d) All of these above
(e) None of the above
Ans: (b) IntranetAnswer
Q16. Which of the following functions is supported by e-mail systems?
(a) Composition
(b) Reporting
(c) Transfer
(d) Disposition
(e) All of the above
Ans: (e) All of the aboveAnswer
Q17. The internal structure of the World Wide Web is built on a set of rules called:
(a) Hyper Text Transfer Protocol
(b) TCP/IP
(c) All of the above
(d) None of the above
Ans: (c) All of the aboveAnswer
Q18. Which of the following is not a wide area network?
(a) ARPANET
(b) INDONET
(c) OMNINET
(d) None of the above
Ans: (d) None of the aboveAnswer
Q19. _____ is used to connect a terminal to a computer through public telephone lines.
(a) Modem
(b) Internet
(c) Network
(d) None of these
Ans: (a) ModemAnswer
Q20. Following is the disadvantage of using interpreters.
(a) Fast response
(b) easy to write
(c) Less memory requirements
(d) Time consuming
Ans: (d) Time consumingAnswer
Q21. To install multimedia facility into a computer one needs:
(a) Sound card
(b) Speakers
(c) CD-ROM
(d) All of the above
(e) None of the above
Ans: (d) All of the aboveAnswer
Q22. The links that take the user to new page is:
(a) Hypertext
(b) Hyperlink
(c) Hyper Text Transfer Protocol
(d) All of the above
Ans: (b) HyperlinkAnswer
Q23. Application software can be acquired through:
(a) Customs programming
(b) Pre-written packages
(c) Both of the above
(d) None of the above
Ans: (c) Both of the aboveAnswer
Q24. Which of the following is not an utility program?
(a) Editing
(b) Sorting
(c) Merging
(d) None of the above
Ans: (d) None of the aboveAnswer
Q25. The malicious program that damages your computer is called:
(a) Worm
(b) Viruses
(c) Bugs
(d) None of the above
Ans: (b) VirusesAnswer
Q26. Data entry can be performed with all of the following except?
(a) OCR
(b) COM
(c) Voice œ recognition systems
(d) None of the above
Ans: (d) None of the aboveAnswer
Q27. The two kinds of main memory are:
(a) Primary and Secondary
(b) Random and sequential
(c) RAM and ROM
(d) All of the above
Ans: (c) RAM and ROMAnswer
Q28. What is the name of the screen symbol that shows the placement of the next character?
(a) Mouse
(b) Cursor
(c) Track Ball
(d) All of the above
Ans: (b) CursorAnswer
Q29. A command that lets you change one or more fields in a record is:
(a) Insert
(b) Delete
(c) Modify
(d) None of the above
Ans: (c) ModifyAnswer
Q30. Data elements of related type are grouped into?
(a) Record
(b) Title
(c) String
(d) All of the above
Ans: (a) RecordAnswer
Q31. A Hacker is:
(a) A software program
(b) An unauthorized person
(c) A virus
(d) All of the above
Ans: (b) An unauthorized personAnswer
Q32. The interface between user and computer system is provided by:
(a) Compiler
(b) Utility programs
(c) Operating systems
(d) All of the above
Ans: (d) All of the aboveAnswer
Q33. The process of navigating and exploring the World Wide Web is called:
(a) Browsing
(b) Surfing
(c) Both of the above
(d) None of the above
Ans: (c) Both of the aboveAnswer
Q34. An unauthorized access to network can be prevented through:
(a) Passwords
(b) Digital signatures
(c) Encryption
(d) All of the above
Ans: (d) All of the aboveAnswer
Q35. Which of the following is not a search engine?
(a) AltaVista
(b) Lycos
(c) Infoseek
(d) Gopher
Ans: (d) GopherAnswer
Q36. Computer Network spanning a global area is:
(a) LAN
(b) MAN
(c) WAN
(d) All the above
Ans: (c) WANAnswer
Q37. Transmission Channels used in LAN are:
(a) Coaxial cable
(b) Fiber-optics cable
(c) Twisted wire
(d) Both (a) and (b)
(e) All of the above
Ans: (e) All of the aboveAnswer
Q38. Remote access to distant computers is called:
(a) Telnet
(b) FTP
(c) Both of the above
(d) None of the above
Ans: (a) TelnetAnswer
Q39. The floppy disks comes in two sizes. They are:
(a) 3.5 inch & 5.25 inch
(b) 2 inch and 3.5 inch
(c) 2 inch and 4.25 inch
(d) None of the above
Ans: (a) 3.5 inch & 5.25 inchAnswer
Q40. 1 Byte is equal to combination of:
(a) 16 bits
(b) 8 bits
(c) 2 bits
(d) None of the above
Ans: (b) 8 bitsAnswer