Introduction to computer MCQs

Introduction to computer MCQs

Try to answer these 1000+ Introduction to computer MCQs and check your understanding of the Introduction to computer subject. Scroll down and let's begin!

1: ____ measures image clarity

A.   DOT PITCH

B.   LCD

C.   HARDWARE

D.   WORD SIZE

2: A join line is also called a(n) ____ line.

A.   Link

B.   Data

C.   True

D.   False

3: A relation is a(n) ____.

A.   Attribute

B.   ​column

C.   ​field

D.   Table

4: A specific formula for solving a problem is called ________.

A.   An algorithm

B.   A heuristic

C.   A mental set

D.   Trial and error

5: A struct is a(n) ____________________, not a declaration.

A.   Heterogeneous

B.   Definition

C.   Reference

D.   Member-wise

6: All of the following are examples of database software except ________.

A.   Microsoft Access

B.   MySQL

C.   Oracle

D.   OneNote

7: All of the following are examples of software suites except ________.

A.   OneNote

B.   EverQuest

C.   Microsoft OneNote

D.   None of these

8: All of the following are formats accepted for picture files except ____.

A.   .mp3

B.   .png

C.   .jpg

D.   .SVG

9: All of the following are types of multimedia and entertainment software except ________.

A.   Sony Sound Forge

B.   OneNote

C.   Productivity software

D.   Spreadsheet software

10: As with any research paper, write the ___________________ last.

A.   Abstract

B.   Verbal Report

C.   Written report

D.   150 to 200 words

11: Function is another name for ________.

A.   Module

B.   Variable

C.   Reference

D.   Sub class

E.   None of these

12: Gui components have a set of ________ that determine how the component appears on the screen.

A.   Properties

B.   Dialog boxes

C.   Radio button

D.   None of these

13: If a recursive function does not contain a base case, it ________.

A.   Returns 0 and stops

B.   Returns false and stops

C.   Uses up all available stack memory, causing the program to crash

D.   Reaches the recursive case and stops

E.   None of these

14: In a helpstar dashboard, throughput measures ____.

A.   Lower level help desk staff can refer difficult problems to higher levels

B.   The volume of incidents in various categories

C.   The lowest support level

D.   Automated call distributor

15: Linux is an example of a(n) ______.

A.   Operating system

B.   Broswer word

C.   Processing software

D.   Photo Editor

16: Metacognition involves a troubleshooter asking all these questions except ____.

A.   What recent change in configuration caused the user to experience a problem?

B.   How much experience do you have using this system?

C.   Critical thinking

D.   Analogies

17: Methods that set values are called ____ methods.

A.   Sector

B.   Mutator

C.   Name

D.   State

18: Multiple inheritance is when a ________ class has ________ base classes.

A.   Private members; base class members

B.   Derived, two or more

C.   Member functions; base class members

D.   Two or more; derived

19: Pointers are variables that contain __________ as their values.

A.   Strings

B.   Flowlines

C.   Memory addresses

D.   Directions

20: Ram is an example of ____ storage

A.   Volatile

B.   Non-volatile

C.   Both

D.   None of these

21: Steganalysis tools are also called ____.

A.   Steg tools

B.   Header data

C.   Graphics editors

D.   Insertion

E.   Data compression

22: Suppose integer x = new integer(3); x holds ________.

A.   Value 3

B.   A reference value to an Integer object

C.   An integer value

D.   An abstract class can be used as a data type

23: The ____ file is typically saved with a prefix of inc_.

A.   Insert

B.   Nested

C.   Include

D.   Increment

24: The setonaction method is defined in ________.

A.   Label

B.   Labelled

C.   Node

D.   ButtonBase

E.   Button

25: The size, or _______, is measured by the diagonal length of a monitor's viewing area.

A.   Active display area

B.   Speakers and headsets

C.   Personal and shared

D.   None of these

26: The statement select * from t1, t2 produces a(n) _____ join.

A.   Cross

B.   Natural

C.   Inner

D.   Full outer

27: ____ applications require that a record be accessed immediately while a client is waiting.

A.   Database

B.   Real-time

C.   Sort

D.   Batch

28: ____ are used to display data that is calculated from other data, such as a total.

A.   Add Existing Fields

B.   Calculated Controls

C.   Unbound Controls

D.   Advanced Filter/Sort

29: ____ browsing allows you to open multiple web pages at one time.

A.   Opera

B.   Static

C.   Tabbed

D.   TPLs

30: ____ can tell more about a person than all other kinds of electronic surveillance.

A.   Transparent

B.   LexisNexis

C.   Data mining

D.   Network neutrality

31: ____ cookies remain available only for the current browser session.

A.   Persistent

B.   Temporary

C.   Local

D.   Global

32: ____ files involves combining two or more files while maintaining the sequential order.

A.   Splitting

B.   Merging

C.   Dividing

D.   Sorting

33: ____ help users establish a connection to another computer, mobile device, or network.

A.   Packet sniffer software

B.   Digital forensics

C.   Computer technician

D.   Communications software

34: ____ is a packet-switched network that was designed for transmitting data over fixed lines.

A.   T-1

B.   IntraLATA

C.   Frame relay

D.   InterLATA

35: ____ is a relational set operator.

A.   MINUS

B.   PLUS

C.   ALL

D.   EXISTS

36: ____ is a scripting language that does not create standalone applications.

A.   Java

B.   Spam filters

C.   JavaScript

D.   Image spam

37: ____ is an example of a web crawler.

A.   Googlebot

B.   Alta Vista

C.   Bing

D.   DMOZ

38: ____ is data before any encryption has been performed.

A.   Plaintext

B.   Ciphertext

C.   Encriptext

D.   Cryptotext

39: ____ is not a common source of job stress among user support workers.

A.   Inadequate training

B.   Abusive users

C.   Inadequate resources

D.   All of these are common sources

40: ____ is not one of the five critical questions suggested in the chapter.

A.   What recent change in configuration caused the user to experience a problem?

B.   All of these characteristics

C.   How much experience do you have using this system?

D.   Iterative, repetitious procedure

41: ____ is one of the primary operations of a computer

A.   C:The Internet

B.   C:Processing

C.   C:browser

D.   A:Supercomputers

42: ____ is not a valid file name.

A.   This File Name Is Very Long.docx

B.   My-picture.jpg

C.   SA!AD-DRE33ING.mp4

D.   Mary*Jon.doc

43: ____ is the fastest and most current wi-fi standard.

A.   Telemedicine

B.   Ethernet

C.   False

D.   802.11n

44: ____ is the use of networking technology to provide medical information and services.

A.   Videoconferencing

B.   Satellite phone

C.   Telemedicine

D.   802.11ax

45: ____ networks use a central device to connect each device directly to the network.

A.   Mesh

B.   Four

C.   False

D.   Star

46: ____ occurs when data is entered into the computer.

A.   Output

B.   Processing

C.   Input

D.   Storage

47: ____ servers can store files that internet users can download, or transfer, to their computers.

A.   FTP

B.   Usenet

C.   News

D.   Telnet

48: ____ software helps you carry out tasks using a computer, such as editing a photo.

A.   Interpreter

B.   Utility

C.   Application

D.   Presentation

49: ____ threats are network security threats that originate from within a network.

A.   Firewall

B.   Interior

C.   Zombie

D.   SSL connection

50: ____ transmissions are used with cell phones and are sent and received via cellular (cell) towers.

A.   Geosynchronous

B.   Simplex

C.   Microwave stations

D.   Cellular radio