These Computer and technology multiple-choice questions and their answers will help you strengthen your grip on the subject of Computer and technology. You can prepare for an upcoming exam or job interview with these Computer and technology MCQs.
So scroll down and start answering.
A. Store data wirelessly
B. Connect to the Internet wirelessly
C. Communicate with a wired network.
D. Send data to other devices wirelessly
A. A type of computer virus
B. A small fruit often used in pies
C. A program capable of running on any computer regardless of the operating system.
D. A counted thread embroidery design
A. A program designed for a specific purpose, such as word processing or graphic design.
B. The act of applying something
C. A document that is submitted in order to apply for something
D. A resume
A. A file that can only be opened and read by standard text editor programs on Linux computers.
B. A file that can be opened and read by standard text editor programs on almost any type of computer.
C. A file that can be opened and read by standard text editor programs on Windows computers.
D. A file that can only be opened and read by standard text editor programs on Mac computers.
A. A model-view-controller design pattern
B. A programming language
C. A software engineering process
D. An industry standard set of commands beginning with the letters
A. They are just appended to the message text.
B. They are encoded and sent separately.
C. They are sent as BinHex files.
D. They are sent as MIME files.
A. The process of entering restricted information
B. The process of looking up information about someone
C. The process of approving someone
D. The process of identifying yourself and verifying that you're who you say you are.
A. The main network connections that comprise the Internet or other major network.
B. A large corporation
C. A computer network that supports storage and retrieval of data
D. The main skeleton of an animal
A. The process of sending data across a network
B. A measure of how much data can be stored on a network
C. A measurement of the amount of data that can be transmitted over a network at any given time.
D. The speed of a network
A. A file that can be read by standard text editor programs like Notepad or Simple Text.
B. A file that cannot be read by standard text editor programs like Notepad or Simple Text.
C. A file that can only be read by standard text editor programs like Notepad or Simple Text.
D. A file that can be read by standard text editor programs like Notepad and Simple Text.
A. A binary digit that can either be 0 or 1
B. A unit of measurement for storage
C. A type of computer
D. The most basic unit of data that can be recognized and processed by an internet
A. Online learning experiences only
B. Face-to-face learning experiences only
C. Only available at Oregon State University
D. Instruction that combines aspects of both face-to-face (F2F) and online learning experiences.
A. A web page that contains journal-like entries and links that are updated daily for public viewing.
B. A personal website
C. A web page that is only for personal use
D. A web page that is only updated once a week
A. Sending voice and data from one electronic device to another
B. Storing data
C. Connecting devices to the internet
D. Sending voice and data from one electronic device to a printer
A. Advanced Placement Interfaces
B. Application Programming Interface
C. Attention Please Inside
D. American Petroleum Institute
A. Data about the world around you.
B. A device that projects images onto your retina
C. A game with enhanced graphics
D. 3D images that appear to be in the real world.
A. Makes information small
B. Ignores small data sets
C. Turns small amounts of data into useful information
D. Creates large data sets
A. Bit Torrent
B. Google Drive
C. One Drive
D. Drop Box
A. A blog is a personal website.
B. A blog is a personal news sharing website.
C. A blog is a professional website.
D. A blog is a professional news sharing website.
A. Output device, input device, and CPU
B. Motherboard, power supply, and CPU
C. System unit, network card, and optical drive
D. Hard-drive, RAM, and Processor
A. Operating systems
B. Software
C. Databases, programs, and hardware
D. Memory
A. Data
B. Software
C. Apps
D. Programs
A. Programs that can help your computer run faster.
B. Programs that are designed to help you protect your computer.
C. Programs that are designed to help you be more productive on your computer.
D. Programs that can possibly do harm to your computer.
A. Use someone else's photos on CC to share them and still give them the credit
B. Use your photos on CC to share them and still give you the money
C. Use your photos on CC to share them and still give you the credit
D. Use your photos on CC to share them but not give you the credit
A. Letting a group of people choose what to do
B. Using a group of people to get a task done
C. Use people to help complete a certain goal
D. Getting a large group of people together in one place
A. A way to communicate with people via internet using a computer
B. A type of computer
C. Given by computer companies
D. A software
A. Upload videos
B. Create a website
C. Edit your photos
D. Save your photos on the internet
A. Scams in which criminals send out emails that look untrustworthy and aren't
B. Scams in which criminals send out emails that look untrustworthy but are
C. Scams in which criminals send out emails that look trustworthy but aren't
D. Scams in which criminals send out emails that look trustworthy and are
A. A way to download T.V. shows
B. Uses the internet to allow you to listen to videos and even watch your T.V. shows
C. A type of internet radio
D. A method of streaming video
A. Not giving credit to the original author of a piece of work
B. Paraphrasing somebody's work without giving credit
C. Quoting somebody in a paper without using quotation marks
D. Using somebody's work and saying it is your own
A. Sharing confidential information with the wrong people
B. Spending too much time online
C. Using social media to communicate
D. Posting negative comments about others
A. Quite Random Codes
B. Quick Relation Codes
C. Quick Response Codes
D. Questionable Response Codes
A. Real-time Simple Syndication
B. Restricted Service Set
C. Really Simple Syndication
D. Radio Seeking Service
A. A method of website design.
B. A technique used to improve website ranking on search engines.
C. A way to increase web traffic.
D. The words and other things you put on your website to allow search engines to read your website.
A. Search Engine Order
B. Social Engineering Optimization
C. Search Engine Optimization
A. In English, lowercase letters, numbers, and special characters
B. NOT in English, UPPERCASE letters, NUMBERS, and SPECIAL CHARACTERS
C. In English, UPPERCASE letters, NUMBERS, and SPECIAL CHARACTERS
D. All of the above
A. If it has an encryption, https, and a padlock icon
B. If it has https only
C. If it has a padlock icon only
D. If it has an encryption only
A. A home for your project so other people can work on it
B. A way to communicate with others
C. A place to store your belongings
D. A method of transportation
A. A way to store files online
B. A way to connect with friends and family online
C. Allows you to keep your bookmarks on the internet instead of one computer
D. A type of online marketing
A. A place to play video games
B. Where people can make their own things and share with others
C. Where people can buy things and have them shipped to them
D. A place to talk to friends
A. Keep up with their friends
B. Waste time
C. Post pictures of their food
D. Keep up their business
A. You can be cyberbullied.
B. You can waste a lot of time.
C. You can be hacked.
D. You can see connections that are hidden in the real world.
A. Communicate through the internet
B. Connect with friends and family
C. Use the internet for free
D. Access the world's information
A. Website where you can book hotels
B. Twitter Website that allows you to keep up with your friends and even famous people
C. Website where you can order food
D. Website where you can buy clothes
A. Businesses can use Twitter to post updates and news.
B. Automatically responds to customers' tweets.
C. Allows businesses to post messages for customers to see.
D. Allows businesses to communicate with their customers for almost immediate feedback.
A. Tumblr
B. Facebook
C. Instagram
D. Twitter
A. Virtual Private Network
B. Virtual Parish Network
C. Very Powerful Network
D. Violent Personal Network
A. VPN is a secure network that allows you to connect with people through a software.
B. VPN is a secure network that allows you to connect with people through a social media site.
C. VPN is an unsecured network that allows you to connect with people through a software.
D. VPN is a secure network that allows you to connect with people through an email.
A. A software program that allows you to access and view web pages
B. Software that makes browsing the internet easier and faster
C. A file format that is used to create websites
D. A website that contains a collection of web pages
A. By providing a list of websites that match your search criteria
B. By translating your search criteria into different languages
C. By providing directions to the nearest library
A. Use only one search engine
B. Use only popular search engines
C. Use search engines sparingly
D. Use a variety of search engines to find the best results
A. A type of candy
B. A way to browse the internet without a history
C. A virus
D. Tiny files that allow websites to remember you and how you used their site.
A. Finding out when the website was created
B. Determining the purpose of the website
C. Deciding if a website is good or bad
D. Checking the sources and author to ensure credibility
A. A website of vast knowledge
B. A website that only allows changes to be made by certain people
C. A website that only allows changes to be made to certain pages
D. A website that does not allow changes to be made by users
A. Communicate with every change that happens on the site
B. Upload files to the site
C. Edit every page on the site
D. Communicate with every user on the site
A. Warped West Web
B. Wet West Web
C. West West Web
D. World Wide Web
A. The open-source code
B. The package manager
C. The production kernel
D. The user interface
A. A program that forms the inner core of an operating system.
B. The hard outer casing of a seed.
C. A type of nut.
D. The edible part of a grain.
A. It only permits the copying, distribution, performance of work.
B. It permits the copying, distribution, display and performance of work but not derivatives.
C. It only permits the copying, distribution, display of work.
D. Copying, distribution, display and performance of work
A. A type of computer
B. A text editor
C. An operating system that was popular in the 1980s and is still widely used today.
D. A programming language
A. A method of repetition
B. An abbreviation that refers to itself
C. An infinite loop
D. A software development process
A. Typographical arrangements
B. Trapping
C. Knowing the alphabet
D. Justifying
A. A group of people who are allowed to access classified information.
B. A file format that can be opened by anyone.
C. Any created content that is not subject to copyright.
D. A website that is available to everyone on the internet.
A. The rights of creators of content
B. The right to free speech
C. The right to bear arms
D. The right to a free and fair trial
A. A particular word or phrase and/or artwork that distinguishes a company’s goods and services.
B. A company's mission statement
C. A company's slogan
D. A company's logo
A. Text that cannot be modified by a compiler or interpreter.
B. A program that cannot be executed by a computer.
C. Code that is not understandable by humans.
D. Text representing a program that is usually input into a compiler or interpreter.
A. This is code that is written in a high-level language and is used to create software.
B. This is code that is written in a low-level language and is used to create software.
C. This is code that is written in a high-level language and is used to create hardware.
D. This is code that is written in an assembler language and is used to create software.
A. Software that can be used for any purpose
B. Software provided with source code
C. Software that is free to use
D. Software that is available for purchase
A. Formating
B. Encryption
C. Deletion
D. Overwriting
A. A file format
B. An operating system process for organising the physical location of files on a disk.
C. A software
D. A programming language
A. A file format
B. Data remaining on a storage device despite supposedly having been deleted or erased.
C. A data compression technique
D. A data storage device
A. A type of backup
B. A sorting algorithm
C. A collection of disks that together form a RAID.
D. A temporary storage area
A. Random access memory
B. Random access format
C. Read access memory
D. Read and write access memory
A. A collection of documents or set of data that will be used for further study.
B. A collection of documents or set of data that will be retained unchanged for future use.
C. A collection of documents or set of data that will be discarded after a certain amount of time.
D. A collection of documents or set of data that will be used for future reference.
A. To die
B. To move data from one medium to another to ensure it remains readable.
C. To leave a group and start a new one elsewhere
D. To travel from one place to another in order to find a new place to live
A. A product or service that is not well received by the market.
B. A product or service whose introduction displaces an existing product or service.
C. A product or service that is not profitable.
D. A product or service that is not new or innovative.
A. The ability of a modern device or technology to meaningfully receive an input designed for older devices.
B. The ability of a modern device or technology to recreate an input from older devices.
C. The ability of a modern device or technology to create an output for older devices.
D. The ability of a modern device or technology to predict output from older devices.
A. Technological obsolescence
B. Industry life cycle
C. Technology life cycle
D. Product life cycle
A. Pessimistic
B. Dystopian
C. Utopian
D. Optimistic
A. The photographs a user has uploaded to Flickr, ordered according to when they were taken.
B. The area of a user's profile on Flickr where they can post messages.
C. A user's profile on Flickr.
D. All the photographs on Flickr.
A. A device that can be used for navigation
B. A device that can connect to the internet
C. A device that is aware of its surroundings
D. A mobile computing device that is able to determine its geographic location.
A. A device that is stationary and does not move.
B. A mobile computing device whose functionality depends on its geographic location.
C. A device that uses GPS to track its location.
D. A device that does not rely on its geographic location.
A. A device that connects a computer to a network
B. A device that enables a wireless connection between two devices
C. A device that allows a computer to access the internet wirelessly.
D. The unique identifier associated with a wireless transceiver base station.
A. The time taken for a signal to travel from its middle to its destination.
B. The time taken for a signal to travel from its destination to its source.
C. The time taken for a signal to travel from its source to its destination.
D. The time taken for a signal to travel from its source to its middle.
A. Geocoding
B. Decoding
C. Encoding
D. Reverse geocoding
A. The process of computing a geographical location based on map coordinates.
B. The process of computing a geographical location based on an address.
C. The process of computing a geographical location based on some other type of information.
D. The process of computing a geographical location based on latitude and longitude.
A. A method of using remote computers to process and store data and run applications.
B. A method of data storage
C. A method of application development
D. A method of data processing
A. An RFID tag
B. A component of an RFID system that processes and manages the information it receives from the reader.
C. A device used to read RFID tags
D. A device used to write data to RFID tags
A. Software application
B. Electronic circuitry and an antenna
C. GPS tracking device
D. Encryption
A. A computer-readable identifier that is uniquely associated with an object or person
B. Short description
C. A small painting
D. A label or name given to someone
A. The use of a blue light to kill blue mold
B. The use of a blue light to cast messages onto a screen
C. The use of a blue light to disinfect
D. The use of Bluetooth to distribute messages to Bluetooth-enabled devices such as smart phones.
A. Data that is used to control the transmission of information
B. Data that is used to display information
C. Data that is used to process information
D. Data that is used to store information
A. A small, wireless local area network
B. A type of Local Area Network
C. A way of connecting to the Internet wirelessly
D. A network of two or more piconets
A. The network formed when Bluetooth devices form an ad hoc connection.
B. A device that uses Bluetooth technology
C. A device that uses Bluetooth to connect to the internet
D. A device that allows for a connection between two Bluetooth devices
A. A mathematical model of a communications network.
B. The study of the properties of space.
C. A class of networks with a similar shape in terms of links between nodes.
D. A measure of the degree of connectivity between nodes in a network.
A. The capital of Ghana
B. A method of contraception
C. A network covering a very large geographic area such as a city.
D. A type of animal
A. A system that gathers information about a user’s behavior in the home.
B. A method of communication
C. A device that allows two-way communication
D. A way to remotely access a computer
A. A very small, simple computer that only contains a processor.
B. A very small, simple computer that contains a processor and memory.
C. A very small, simple computer that contains a processor, memory and input and output ports along with a timer.
D. A very small, simple computer that contains a processor and input and output ports.
A. Medium-Range
B. Limited-range
C. Short-range
D. Long-range
A. A short-range wireless data transmission technology
B. A color
C. A mobile device company
D. A type of ice cream