MCQS HOME 2020

which statement describe “Hackers”

(A) all have the same motive

(B) break into other people’s computers

(C) may legally break into computers as long as they do not do any damage

(D) are people who are allergic to computers

Submitted By: Ali Uppal


Junk e_mail is also called_________

(A) spam

(B) spoof

(C) sniffer script

(D) spool

Submitted By: Ali Uppal


MIS is designed to provide information needed for effective decision making by

(A) Consumers

(B) Workers

(C) Foremen

(D) Managers

Submitted By: Ali Uppal


When did John Napier develop logarithm

(A) 1416

(B) 1614

(C) 1641

(D) 1804

Submitted By: Ali Uppal


Which of the following is a storage device

(A) Tape

(B) Hard Disk

(C) Floppy Disk

(D) All of the above

Submitted By: Ali Uppal


What does DMA stand for

(A) Distinct Memory Access

(B) Direct Memory Access

(C) Direct Module Access

(D) Direct Memory Allocation

Submitted By: Ali Uppal


Which of the following is not anti_ viruses software

(A) Avira

(B) Kaspersky

(C) Oracle

(D) McAfee

Submitted By: Ali Uppal


Which programming languages are classified as low level languages

(A) BASIC, COBOL, Fortran

(B) Prolog

(C) C, C++

(D) Assembly languages

Submitted By: Ali Uppal


What do you call the programs that are used to find out possible faults and their causes

(A) operating system extensions

(B) cookies

(C) diagnostic software

(D) boot diskettes

Submitted By: Ali Uppal


What characteristic of read_only memory (ROM) makes it useful

(A) ROM information can be easily updated.

(B) Data in ROM is non-volatile, that is, it remains there even without electrical power.

(C) ROM provides very large amounts of inexpensive data storage.

(D) ROM chips are easily swapped between different brands of computers.

Submitted By: Ali Uppal