Most Repeated MCQs of Computer

Data in ___________ format can be easily read and understood.

  1. graphs
  2. processed
  3. presentation
  4. information

____________ are used to give input to computer.

  1. input device
  2. output device
  3. processing device
  4. storage device

Which of the following is not example of real security?

  1. Spam
  2. Hackers
  3. Identity theft
  4. Viruses

A person who illegally broke into others computer to access unauthorized data is called _______.

  1. spammer
  2. Hacker
  3. Programmer
  4. instant messenger

__________ hold data permanently and get updated during transaction processing.

  1. Transaction file
  2. Operating System File
  3. Master file
  4. Software File

A _________ is a logic bomb that is set off by a time-related event.

  1. Virus
  2. Time-related bomb sequence
  3. Trojan horse
  4. Time bomb

___________ computer are enormous in size

  1. Mainframe
  2. Micro
  3. Mini
  4. Super

Which software is used to format text and data?

  1. Editors
  2. MS Word
  3. MS publisher
  4. PowerPoint

_____________ is software to create text based documents.

  1. Suites
  2. DBMS
  3. Word processors
  4. Spreadsheets

Microprocessors can be utilized in making of _________.

  1. Digital systems
  2. Calculators
  3. Computer
  4. All of the above