Introduction to Computing MCQs

Introduction to Computing MCQs

The following Introduction to Computing  MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of Introduction to Computing . We encourage you to answer these multiple-choice questions to assess your proficiency.
Please continue by scrolling down.

1: What is ambient data?

A.   Transitory data

B.   The data in slack space, also known as latent data.

C.   The data in active use

D.   The data in non-volatile storage

2: What is an ATM?

A.   A device that scans money

B.   A machine that prints money

C.   A machine that allows bank customers to perform certain transactions, such as withdrawing cash from their bank account.

D.   A device that dispenses cash

3: What is the meaning of the term "biometric"?

A.   The identification of people using biological characteristics such as fingerprints, iris recognition and DNA analysis.

B.   The identification of people using psychological characteristics

C.   The study of people's behavior

D.   The study of biological characteristics of people

4: What is the definition of 'cable'?

A.   An electric railway in which the cars are propelled by cables running beneath the street.

B.   A system of sending signals by means of electrical currents transmitted through underground cables.

C.   A nautical unit of length equal to 720 feet (219.456 metres).

D.   A set of wires or optical fibres assembled, with a protective coating, for use as a communication medium.

5: What is a cluster?

A.   An amount of memory on a disk drive that consists of a fixed number of sectors.

B.   A group of individual computers and associated devices that share a common communications line or wireless link

C.   A measure of the speed of a computer processor

D.   A device that connects a computer to a network

A.   To prevent others from using copyrighted material

B.   To ensure that only the creator can make money from the content

C.   To protect the rights of content creators

D.   To make sure that the creator receives credit for their work

A.   The right of creators of content to be anonymous

B.   The rights of users to use content

C.   The right of creators of content to control how their work is used

D.   The rights of creators of content to be rewarded for their work

8: What is a database?

A.   A group of programs

B.   A set of computer-based data that has been organised so that it can be read, written, updated and searched.

C.   A set of information that can be accessed by computers

D.   A set of computer files

9: What is defragmentation?

A.   A process for compressing files on a disk

B.   An operating system process for optimising the physical location of files on a disk.

C.   A process for backing up files on a disk

D.   A process for deleting files from a disk

10: What is the process for optimising the physical location of files on a disk called?

A.   ScanDisk

B.   Defragmentation

C.   Formatting

D.   File Allocation Table

11: What is digital forensics?

A.   The study of insects

B.   The process of investigating a crime

C.   A method of data recovery

D.   A branch of forensic science that is concerned with obtaining legal evidence from computer systems.

12: Which of the following is not an example of digital rights management?

A.   A range of technologies used by copyright owners to control how the content they produce is used.

B.   Copy protection

C.   Copyright

D.   Copy prevention

13: What does DRM stand for?

A.   Data Rights Management

B.   Digital Rights Marionette

C.   Digital Rights Management

D.   Data Retention Management

14: What is digital technology?

A.   Technology that uses digital devices to store or process information

B.   A technology that uses computer networks to exchange information

C.   Any technology that is based on representing data as sequences of numbers, i.e. as digital data.

D.   A device that converts analog signals to digital signals

15: What are emoticons?

A.   Twitter follow button

B.   Text characters or images that indicate someone’s mood by representing a simple facial expression.

C.   Facebook like button

D.   Instagram post button

16: What is the other name for emoticons?

A.   Face expressions

B.   Emojis

C.   Text symbols

D.   Smileys

17: What is FAT32?

A.   A programming language

B.   A virus that attacks Windows computers

C.   A type of computer file

D.   A file system developed for Windows that is now mainly used by USB flash drives.

18: What does a file allocation table do in a FAT32 file system?

A.   Encrypts files

B.   Holds information about where a file is stored on a hard disk or in an SSD

C.   Compresses files

D.   Stores a copy of the file contents

19: What is a file system?

A.   A type of computer virus

B.   The method by which an operating system controls how data is stored on and retrieved from the hardware.

C.   A type of data storage device

D.   A software application

20: What type of memory is flash memory?

A.   Dynamic RAM

B.   Non-volatile

C.   Volatile

D.   Static RAM

21: What is formatting?

A.   The act of preparing a storage device for use by a computer.

B.   The act of preparing a computer storage device for use by a file system.

C.   The act of preparing a file system for use by a computer.

D.   The act of preparing a computer for use by a file system.

22: What is the full form of "forum"?

A.   Designed for discussion

B.   An area on the internet

C.   On a specific topic

D.   Bulletin board system

23: What is the process of fragmentation?

A.   Computer files are eliminated from physical locations on a disk

B.   Computer files are duplicated across a number of physical locations on a disk

C.   Computer files are combined into one physical location on a disk

D.   Computer files are split across a number of physical locations on a disk

24: What is the full form of GPS?

A.   Global positioning system

B.   Greenwich position system

C.   Global positioning satellite

D.   General public service

25: What is a HDD?

A.   A data storage device that uses one or more rigid, rapidly rotating disks to store and retrieve digital information.

B.   A data storage device that uses one or more floppy disks to store and retrieve digital information.

C.   A data storage device that uses one or more CDs to store and retrieve digital information.

D.   A data storage device that uses one or more removable disks to store and retrieve digital information.

26: What is the meaning of the term "hardware"?

A.   The physical components of a computer system.

B.   The process of making a computer system run faster.

C.   The part of the computer system that the user interacts with.

D.   The software that makes a computer system run.

A.   Information society

B.   Knowledge economy

C.   Digitalization

D.   Information overload

28: What is the full form of IM?

A.   Imaginary Money

B.   Interesting Money

C.   Instant Messaging

D.   International Money

29: What is Instant Messaging?

A.   A way to communicate with people who are not online at the same time as you

B.   A device that allows you to send messages to people without using a phone

C.   Text-based communication between people who are online at the same time.

D.   A text-based communication system that is not Instant

30: What was the global internetwork originally started as?

A.   A Russian initiative

B.   A way to connect computers

C.   A US government-funded project

D.   A European initiative

31: What is the internet?

A.   A type of computer network

B.   The global internetwork that has grown from a US government-funded project started in the 1960s.

C.   A way to connect to a network

D.   A way to send information

32: What is latent data?

A.   Data that is waiting to be used

B.   The data in slack space

C.   Data that is not needed

D.   Data that is collected but not analyzed

33: What is the logical size of a file?

A.   The amount of space required to store a directory and its contents.

B.   The size of the content of a file.

C.   The maximum amount of data that can be stored in a file.

D.   The amount of space a file takes up on a storage device.

34: What is the primary purpose of a computer's memory?

A.   To process programs and data

B.   To store programs and data

C.   To store results

D.   To calculate results

35: What is the definition of etiquette?

A.   A set of guidelines for table manners.

B.   A set of guidelines for online behaviour.

C.   A set of guidelines for business manners.

D.   A set of guidelines for party manners.

36: What is a network?

A.   A device that allows you to communicate with others

B.   A way to share files between devices

C.   A device that connects to the internet

D.   A collection of devices that can communicate with each other

37: What is the term that is sometimes used interchangeably with 'network society'?

A.   Social media

B.   Cable television

C.   Network analysis

D.   Information society

38: What is the term that is sometimes used interchangeably with 'information society'?

A.   Digital society

B.   Information network

C.   Knowledge society

D.   Network society

39: What is New Technology File System (NTFS)?

A.   A file system commonly used in Unix computers.

B.   A file system commonly used in Mac computers.

C.   A file system commonly used in Linux computers.

D.   A file system commonly used in Windows computers.

40: What is the process of obscuring sensitive information that might remain on a disk before disposal called?

A.   Deleting

B.   Overwriting

C.   Formatting

D.   Encrypting

41: What are the sections of a hard disk called?

A.   Sections

B.   Partitions

C.   Elements

D.   Particles

42: What is the meaning of partitions?

A.   The sections of a hard disk.

B.   The way in which a hard disk is formatted.

C.   A unit of measure for hard disks.

D.   The type of file system used on a hard disk.

43: What is plagiarism?

A.   Giving credit to the author in a paper.

B.   Citing sources for all the information used in a paper.

C.   Putting information in your own words.

D.   Using the work of other people without formally acknowledging that the work came from someone else.

44: What is the public domain?

A.   Any created content that is not subject to copyright.

B.   Created content that is available for anyone to copy.

C.   Created content that is available for anyone to distribute.

D.   Created content that is available for anyone to use.

45: What is a Rolodex?

A.   A type of physical desktop card for storing data

B.   A software company

C.   A type of physical desktop card index for storing data

D.   A type of physicalindex for storing data

46: What is Rolodex?

A.   A type of physical desktop card index for storing data, invented in the 1960s.

B.   A type of physical desktop card index for storing data, invented in the 1950s.

C.   A type of physical desktop card index for storing data, invented in the 1970s.

D.   A type of physical desktop card index for storing data, invented in the 1980s.

47: What is the size of a sector?

A.   512 bytes

B.   2048 bytes

C.   1024 bytes

D.   4096 bytes

48: What is the smallest physical storage unit on a hard disk?

A.   Cluster

B.   Sector

C.   Byte

D.   Bit

49: What is the unused space in a disk cluster called?

A.   Reserved space

B.   Free space

C.   Unallocated space

D.   Slack space

50: What is a smart device?

A.   A device that cannot exchange information with other devices.

B.   A device that does not process information.

C.   An electronic device that processes information and exchanges it with other devices.

D.   A device that is not electronic.

51: What does SMS stand for?

A.   Short Message System

B.   Service Message System

C.   Save Money Saving

D.   Single Message Service

52: What is social networking?

A.   The practice of promoting a product or service through online channels.

B.   A way to connect with friends and family online.

C.   The activities involved in building and maintaining online relationships and communities.

D.   The act of meeting and interacting with people in a social setting.

53: What are the programs that control the functioning of a computer system?

A.   Programs

B.   Software

C.   System

D.   Control

54: What is a solid-state drive?

A.   A device that allows data to be accessed on a computer

B.   A device that allows data to be stored on a computer

C.   A device that uses a disk to store data

D.   A storage device that uses integrated circuit assemblies as memory to store data persistently.

55: What is the full form of SSD?

A.   Serial System Drive

B.   Serial Sector Drive

C.   Solid State Drive

D.   Solid Storage Drive

56: What does the term "ubiquitous" mean?

A.   Something that is new

B.   Something that is rare

C.   Something that seems to be everywhere at the same time.

D.   Something that is old

57: What is unallocated space?

A.   The space on a hard drive that is available for the user to write to

B.   The space on a hard drive that is available for the operating system to write to.

C.   The space on a hard drive that is used by the operating system

D.   The space on a hard drive that is not used by the operating system

58: What is a virus?

A.   A disease that affects living organisms

B.   Malicious software that is designed to attack software on users’ computers

C.   A file that contains a set of instructions

D.   A type of computer software

59: What is wear levelling?

A.   A technique for storing data in more than one location

B.   A technique for prolonging the service life of some kinds of erasable computer storage media

C.   A technique for shortening the service life of some kinds of erasable computer storage media

D.   A technique for copying data from one computer storage media to another

60: What does the world wide web do?

A.   Links computer files such as documents, images, audio and video.

B.   It is a website builder.

C.   It is a search engine.

D.   It is a social media platform.

61: What is a computer?

A.   A machine that requires a person to operate it

B.   A machine powered by electricity

C.   A digital electronic machine that can be programmed to carry out sequences of arithmetic or logical operations automatically.

D.   A machine that can think and make decisions on its own.

62: What is an algorithm?

A.   A process of repetitively breaking down a problem

B.   A data set

C.   A finite sequence of instructions used to solve a specific problem or to perform a computation

D.   A computer software

63: Which of the following is not considered computer hardware?

A.   RAM

B.   CPU

C.   Case

D.   Microsoft Word

64: What is digital electronics?

A.   The study of analog signals and the engineering of devices that use or produce them.

B.   The study of digital signals and the engineering of devices that use or produce them.

C.   Both of these

D.   None of these

65: What does the term "Agile" mean?

A.   A framework for managing work

B.   A project management tool

C.   A software development methodology

D.   To continually improve through small and digestible increments.

66: What is artificial intelligence?

A.   A new way of computing

B.   A term used to describe human abilities

C.   A method of programming

D.   A term used to describe computers’ aptitude to mimic human abilities

67: What does an Assembly language do?

A.   Is an interpreted language

B.   Is a high-level programming language

C.   Is aLightweight programming language

D.   Communicates with the hardware of a computer

68: What is assembly language?

A.   A high-level programming language that communicates with the software of a computer.

B.   A high-level programming language that communicates with the hardware of a computer.

C.   A low-level programming language that communicates with the hardware of a computer.

D.   A low-level programming language that communicates with the software of a computer.

69: What is Attenuation?

A.   The distortion of signals in networking cables or connections.

B.   The loss of signal strength in networking cables or connections.

C.   The amplification of signal strength in networking cables or connections.

D.   The elimination of signal strength in networking cables or connections.

70: What is the cause of attenuation?

A.   Loss of signal strength in networking cables or connections.

B.   Too much traffic

C.   Incorrectly wired cables

D.   Weak internet connection

71: What is the use of an AR device?

A.   To provide a map

B.   To provide an enhanced version of their surroundings by providing virtual elements in the field of vision

C.   To play music

D.   To obstruct the person's view

72: What does AR stand for?

A.   Artificial Reality

B.   Amplified Reality

C.   Alternate Reality

D.   Augmented Reality

73: What is Automation?

A.   A process that requires manual input.

B.   Using software to perform a process without manual input.

C.   Using software to perform a process with manual input.

D.   A process that does not require software.

74: What is an autonomous vehicle?

A.   A vehicle that can operate without human involvement but not sense its surroundings.

B.   A vehicle that can operate and sense its surroundings without human involvement.

C.   A vehicle that can only operate without human involvement.

D.   A vehicle that can only sense its surroundings without human involvement.

75: What is big data?

A.   A well-structured data set

B.   A data set with no structure

C.   A small data set

D.   A label that typically applies to extremely large and/or unstructured data sets or data sets.

76: What is biometric authentication?

A.   A method of data storage

B.   A type of virus protection

C.   The use of a person’s unique characteristics to verify their identity

D.   A way to access computer systems

77: What is a blockchain?

A.   A way to securely transfer digital information

B.   A list of records linked together using special cryptographic operations across a distributed network of computers.

C.   A method of encrypting data

D.   A safe place to store digital information

78: What is blocklisting?

A.   Denying access to legitimate applications or other entities

B.   Blocking access to legitimate applications or other entities

C.   Allowing access to applications or other entities that might pose a threat to a network

D.   Denying access to applications or other entities that might pose a threat to a network.

79: What is the name of the technology that allows devices to connect with each other over short distances?

A.   5G

B.   NFC

C.   Bluetooth

D.   Wifi

80: Which of the following is NOT a function of the CPU?

A.   Stores

B.   Processes

C.   Executes instructions

D.   None of these

81: What is the model of providing virtual infrastructure or software via network connections in a way that allows more self-service and dynamic allocation?

A.   Cloud Computing

B.   Virtual Reality

C.   Distributed Computing

D.   Parallel Computing

82: What is the process of linking computers together to send and receive information from each other?

A.   Computer architecture

B.   Computer networking

C.   Data compression

D.   Data communication

83: What is containerization?

A.   The process of isolating and maintaining an application.

B.   The process of packaging software in a container.

C.   A method of software development.

D.   The process of shipping goods in containers.

84: What is a cyberattack?

A.   A set of actions aimed to infiltrate government websites.

B.   A set of actions aimed to infiltrate computer networks, systems and personal devices.

C.   A set of actions aimed to delete computer networks.

D.   A set of actions aimed to block computer networks.

85: What is cybersecurity?

A.   The practice of protecting digital assets against cybercriminals

B.   The practice of protecting physical assets against cybercriminals

C.   The practice of protecting digital assets against natural disasters

D.   The practice of hacking into digital assets

86: What is a cybersecurity analyst?

A.   Someone who maintains computer systems

B.   Someone who detects and predicts cyber threats and then implements changes to protect an organization

C.   Someone who builds computer systems

D.   Someone who uses computer systems

87: What does Cybersecurity compliance refer to?

A.   Meeting all security requirements set by an organization

B.   Adhering to standards and regulatory requirements set forth by an agency, law or authority group.

C.   Implementing security measures to protect an organization's information systems

D.   Achieving all security objectives set by an organization

88: What is the main goal of a cybersecurity engineer?

A.   To discover new ways to attack systems.

B.   To build systems that are secure against all possible attacks.

C.   To build and maintain a system that's safe against cyberattacks.

D.   To learn about different types of cyberattacks.

89: What is the purpose of a DDoS attack?

A.   To block access to a site

B.   To overload a server with internet traffic

C.   To disrupt normal web traffic

D.   To slow down a website

90: What is the aim of a DDoS attack?

A.   To create a botnet army.

B.   To disrupt normal web traffic from accessing a site by flooding a server with internet traffic.

C.   To allow normal web traffic from accessing a site by flooding a server with internet traffic.

D.   To overload a server with internet traffic.

91: What is the dark web?

A.   A part of the internet that is only accessible to the general public.

B.   A part of the internet that is a haven for free speech.

C.   A part of the internet that is only accessible to criminals.

D.   A part of the internet that isn't accessible to the general public.

92: What is the main purpose of a data analyst?

A.   Assist in making better business decisions

B.   Generate insights

C.   Develop new products

D.   Support marketing efforts

93: What is a database administrator?

A.   Someone who manages all aspects of an organized database environment.

B.   Someone who uses databases

C.   Someone who maintains databases

D.   Someone who creates databases

94: What is a data center?

A.   A software program

B.   A security measure

C.   A type of computer

D.   A physical server facility that securely houses critical applications, data and other digital assets.

95: What is the process of examining and manipulating data sets to find patterns and prepare data for deeper analysis?

A.   Pattern Mining

B.   Data Center

C.   Data Mining

D.   Data Analysis

96: What is data visualization?

A.   The representation of data through visual elements like charts, plots, infographics, maps, etc.

B.   A way to analyze data

C.   A way to collect data

D.   A way to organize data

97: What is the main advantage of edge computing?

A.   There is no need for a dedicated data center.

B.   Data is processed closer to the point of creation.

C.   It is cheaper than cloud computing.

D.   It is more energy efficient than cloud computing.

98: What is embedded development?

A.   The process of creating software for embedded systems.

B.   When manufacturers place software or code into products that consumers use every day.

C.   A system where manufacturers place software or code into products

D.   Placing software or code into products that consumers use every day.

99: What is the process of concealing private information called?

A.   Hashing

B.   Decryption

C.   Code

D.   Encryption

100: What do front end developers use to design and develop the look and feel of a website?

A.   HTML, CSS and JavaScript

B.   Ruby on Rails

C.   C++, Java and Python

D.   PHP, MySQL and Apache