TNPSC Expected Computer Science Questions with Answers MCQ - Practice Set -9

The aspirants appearing at various competitive examinations are always in a deep need and search of comparatively easy to understand and useful study contents in Computer Science. With this key point in mind we are providing you  numerous questions for your reference that are intelligently selected and it is covering all examination oriented topics and few questions are taken from different competitive examinations.

1. A(n) ……….is a special visual and audio effect applied in Power­point to text or content.
(A) animation
(B) flash
(C) wipe
(D) dissolve
Answer : (A)

2. When the pointer is positioned on a……….it is shaped like a hand.
(A) grammar error
(B) Formatting error
(C) Screen Tip
(D) hyperlink
Ans : (D)

3. Personal computers can be connected together to form a ______ 
(A) server
(B) supercomputer
(C) network
(D) enterprise
Answer : (C)

4. A Web site's main page is called its–
(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
Answer : (A)

5. The simultaneous processing of two or more programs by multiple processors is ______ 
(A) multiprogramming
(B) multitasking
(C) time­sharing
(D) multiprocessing
Answer : (D)

6. Codes consisting of lines of varying widths or lengths that are computerreadable are known as ______ 
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these
Answer : (D)

7. Reusable optical storage will typica1ly have the acronym–
(A) CO
(B) DVD
(C) ROM
(D) RW
Answer : (D)

8. The most common type of storage devices are–
(A) persistent
(B) optical
(C) magnetic
(D) flash
Answe : (D)

9. A device that connects to a network without the use of cables is said to be ______ 
(A) distributed
(B) free
(C) centralized
(D) open source
Answer : (B)

10. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a ______ 
(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
Answer : (A)

11. To access properties of an object, the mouse technique to use is ______ 
(A) dragging
(B) dropping
(C) right­clicking
(D) shift­clicking
Answer : (C)

12. To change selected text to all capital letters, click the change case button, then click  ______ 
(A) UPPERCASE
(B) UPPER ALL
(C) CAPS LOCK
(D) Lock Upper
Answer : (A)

13. The basic unit of a worksheet into which you enter data in Excel iscalled a ______ 
(A) tab
(B) cell
(C) box
(D) range
Answer : (B)

14. Computer uses the ______ number system to store data and perform
calculations.
(A) binary
(B) octal
(C) decimal
(D) hexadecimal
Answer : (A)

15. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to AutoFit Contents.
(A) Fit to Form
(B) Format
(C) Autosize
(D) AutoFit
Answe : (D)

16. Why is it unethical to share copyrighted files with your friends ?
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
Answer : (C)

17. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is ______ 
(A) Memory­only
(B) Write­only
(C) Once­only
(D) Run­only
(E) Read­only
Answe : (E)

18. Which of the following can be used to select the entire document ?
(A) CTRL+A
(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
Answer : (A)

19.  ______ are 'attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
Answer : (A)

20. Part number, part description, and number of parts ordered are examples of ______ 
(A) control
(B) output
(C) processing
(D) Input
Answer : (D)

Click to comment