The following Introduction to Computing MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of Introduction to Computing . We encourage you to answer these multiple-choice questions to assess your proficiency.
Please continue by scrolling down.
A. Transitory data
B. The data in slack space, also known as latent data.
C. The data in active use
D. The data in non-volatile storage
A. A device that scans money
B. A machine that prints money
C. A machine that allows bank customers to perform certain transactions, such as withdrawing cash from their bank account.
D. A device that dispenses cash
A. The identification of people using biological characteristics such as fingerprints, iris recognition and DNA analysis.
B. The identification of people using psychological characteristics
C. The study of people's behavior
D. The study of biological characteristics of people
A. An electric railway in which the cars are propelled by cables running beneath the street.
B. A system of sending signals by means of electrical currents transmitted through underground cables.
C. A nautical unit of length equal to 720 feet (219.456 metres).
D. A set of wires or optical fibres assembled, with a protective coating, for use as a communication medium.
A. An amount of memory on a disk drive that consists of a fixed number of sectors.
B. A group of individual computers and associated devices that share a common communications line or wireless link
C. A measure of the speed of a computer processor
D. A device that connects a computer to a network
A. To prevent others from using copyrighted material
B. To ensure that only the creator can make money from the content
C. To protect the rights of content creators
D. To make sure that the creator receives credit for their work
A. The right of creators of content to be anonymous
B. The rights of users to use content
C. The right of creators of content to control how their work is used
D. The rights of creators of content to be rewarded for their work
A. A group of programs
B. A set of computer-based data that has been organised so that it can be read, written, updated and searched.
C. A set of information that can be accessed by computers
D. A set of computer files
A. A process for compressing files on a disk
B. An operating system process for optimising the physical location of files on a disk.
C. A process for backing up files on a disk
D. A process for deleting files from a disk
A. ScanDisk
B. Defragmentation
C. Formatting
D. File Allocation Table
A. The study of insects
B. The process of investigating a crime
C. A method of data recovery
D. A branch of forensic science that is concerned with obtaining legal evidence from computer systems.
A. A range of technologies used by copyright owners to control how the content they produce is used.
B. Copy protection
C. Copyright
D. Copy prevention
A. Data Rights Management
B. Digital Rights Marionette
C. Digital Rights Management
D. Data Retention Management
A. Technology that uses digital devices to store or process information
B. A technology that uses computer networks to exchange information
C. Any technology that is based on representing data as sequences of numbers, i.e. as digital data.
D. A device that converts analog signals to digital signals
A. Twitter follow button
B. Text characters or images that indicate someone’s mood by representing a simple facial expression.
C. Facebook like button
D. Instagram post button
A. Face expressions
B. Emojis
C. Text symbols
D. Smileys
A. A programming language
B. A virus that attacks Windows computers
C. A type of computer file
D. A file system developed for Windows that is now mainly used by USB flash drives.
A. Encrypts files
B. Holds information about where a file is stored on a hard disk or in an SSD
C. Compresses files
D. Stores a copy of the file contents
A. A type of computer virus
B. The method by which an operating system controls how data is stored on and retrieved from the hardware.
C. A type of data storage device
D. A software application
A. Dynamic RAM
B. Non-volatile
C. Volatile
D. Static RAM
A. The act of preparing a storage device for use by a computer.
B. The act of preparing a computer storage device for use by a file system.
C. The act of preparing a file system for use by a computer.
D. The act of preparing a computer for use by a file system.
A. Designed for discussion
B. An area on the internet
C. On a specific topic
D. Bulletin board system
A. Computer files are eliminated from physical locations on a disk
B. Computer files are duplicated across a number of physical locations on a disk
C. Computer files are combined into one physical location on a disk
D. Computer files are split across a number of physical locations on a disk
A. Global positioning system
B. Greenwich position system
C. Global positioning satellite
D. General public service
A. A data storage device that uses one or more rigid, rapidly rotating disks to store and retrieve digital information.
B. A data storage device that uses one or more floppy disks to store and retrieve digital information.
C. A data storage device that uses one or more CDs to store and retrieve digital information.
D. A data storage device that uses one or more removable disks to store and retrieve digital information.
A. The physical components of a computer system.
B. The process of making a computer system run faster.
C. The part of the computer system that the user interacts with.
D. The software that makes a computer system run.
A. Information society
B. Knowledge economy
C. Digitalization
D. Information overload
A. Imaginary Money
B. Interesting Money
C. Instant Messaging
D. International Money
A. A way to communicate with people who are not online at the same time as you
B. A device that allows you to send messages to people without using a phone
C. Text-based communication between people who are online at the same time.
D. A text-based communication system that is not Instant
A. A Russian initiative
B. A way to connect computers
C. A US government-funded project
D. A European initiative
A. A type of computer network
B. The global internetwork that has grown from a US government-funded project started in the 1960s.
C. A way to connect to a network
D. A way to send information
A. Data that is waiting to be used
B. The data in slack space
C. Data that is not needed
D. Data that is collected but not analyzed
A. The amount of space required to store a directory and its contents.
B. The size of the content of a file.
C. The maximum amount of data that can be stored in a file.
D. The amount of space a file takes up on a storage device.
A. To process programs and data
B. To store programs and data
C. To store results
D. To calculate results
A. A set of guidelines for table manners.
B. A set of guidelines for online behaviour.
C. A set of guidelines for business manners.
D. A set of guidelines for party manners.
A. A device that allows you to communicate with others
B. A way to share files between devices
C. A device that connects to the internet
D. A collection of devices that can communicate with each other
A. Social media
B. Cable television
C. Network analysis
D. Information society
A. Digital society
B. Information network
C. Knowledge society
D. Network society
A. A file system commonly used in Unix computers.
B. A file system commonly used in Mac computers.
C. A file system commonly used in Linux computers.
D. A file system commonly used in Windows computers.
A. Deleting
B. Overwriting
C. Formatting
D. Encrypting
A. Sections
B. Partitions
C. Elements
D. Particles
A. The sections of a hard disk.
B. The way in which a hard disk is formatted.
C. A unit of measure for hard disks.
D. The type of file system used on a hard disk.
A. Giving credit to the author in a paper.
B. Citing sources for all the information used in a paper.
C. Putting information in your own words.
D. Using the work of other people without formally acknowledging that the work came from someone else.
A. Any created content that is not subject to copyright.
B. Created content that is available for anyone to copy.
C. Created content that is available for anyone to distribute.
D. Created content that is available for anyone to use.
A. A type of physical desktop card for storing data
B. A software company
C. A type of physical desktop card index for storing data
D. A type of physicalindex for storing data
A. A type of physical desktop card index for storing data, invented in the 1960s.
B. A type of physical desktop card index for storing data, invented in the 1950s.
C. A type of physical desktop card index for storing data, invented in the 1970s.
D. A type of physical desktop card index for storing data, invented in the 1980s.
A. 512 bytes
B. 2048 bytes
C. 1024 bytes
D. 4096 bytes
A. Cluster
B. Sector
C. Byte
D. Bit
A. Reserved space
B. Free space
C. Unallocated space
D. Slack space
A. A device that cannot exchange information with other devices.
B. A device that does not process information.
C. An electronic device that processes information and exchanges it with other devices.
D. A device that is not electronic.
A. Short Message System
B. Service Message System
C. Save Money Saving
D. Single Message Service
A. The practice of promoting a product or service through online channels.
B. A way to connect with friends and family online.
C. The activities involved in building and maintaining online relationships and communities.
D. The act of meeting and interacting with people in a social setting.
A. Programs
B. Software
C. System
D. Control
A. A device that allows data to be accessed on a computer
B. A device that allows data to be stored on a computer
C. A device that uses a disk to store data
D. A storage device that uses integrated circuit assemblies as memory to store data persistently.
A. Serial System Drive
B. Serial Sector Drive
C. Solid State Drive
D. Solid Storage Drive
A. Something that is new
B. Something that is rare
C. Something that seems to be everywhere at the same time.
D. Something that is old
A. The space on a hard drive that is available for the user to write to
B. The space on a hard drive that is available for the operating system to write to.
C. The space on a hard drive that is used by the operating system
D. The space on a hard drive that is not used by the operating system
A. A disease that affects living organisms
B. Malicious software that is designed to attack software on users’ computers
C. A file that contains a set of instructions
D. A type of computer software
A. A technique for storing data in more than one location
B. A technique for prolonging the service life of some kinds of erasable computer storage media
C. A technique for shortening the service life of some kinds of erasable computer storage media
D. A technique for copying data from one computer storage media to another
A. Links computer files such as documents, images, audio and video.
B. It is a website builder.
C. It is a search engine.
D. It is a social media platform.
A. A machine that requires a person to operate it
B. A machine powered by electricity
C. A digital electronic machine that can be programmed to carry out sequences of arithmetic or logical operations automatically.
D. A machine that can think and make decisions on its own.
A. A process of repetitively breaking down a problem
B. A data set
C. A finite sequence of instructions used to solve a specific problem or to perform a computation
D. A computer software
A. RAM
B. CPU
C. Case
D. Microsoft Word
A. The study of analog signals and the engineering of devices that use or produce them.
B. The study of digital signals and the engineering of devices that use or produce them.
C. Both of these
D. None of these
A. A framework for managing work
B. A project management tool
C. A software development methodology
D. To continually improve through small and digestible increments.
A. A new way of computing
B. A term used to describe human abilities
C. A method of programming
D. A term used to describe computers’ aptitude to mimic human abilities
A. Is an interpreted language
B. Is a high-level programming language
C. Is aLightweight programming language
D. Communicates with the hardware of a computer
A. A high-level programming language that communicates with the software of a computer.
B. A high-level programming language that communicates with the hardware of a computer.
C. A low-level programming language that communicates with the hardware of a computer.
D. A low-level programming language that communicates with the software of a computer.
A. The distortion of signals in networking cables or connections.
B. The loss of signal strength in networking cables or connections.
C. The amplification of signal strength in networking cables or connections.
D. The elimination of signal strength in networking cables or connections.
A. Loss of signal strength in networking cables or connections.
B. Too much traffic
C. Incorrectly wired cables
D. Weak internet connection
A. To provide a map
B. To provide an enhanced version of their surroundings by providing virtual elements in the field of vision
C. To play music
D. To obstruct the person's view
A. Artificial Reality
B. Amplified Reality
C. Alternate Reality
D. Augmented Reality
A. A process that requires manual input.
B. Using software to perform a process without manual input.
C. Using software to perform a process with manual input.
D. A process that does not require software.
A. A vehicle that can operate without human involvement but not sense its surroundings.
B. A vehicle that can operate and sense its surroundings without human involvement.
C. A vehicle that can only operate without human involvement.
D. A vehicle that can only sense its surroundings without human involvement.
A. A well-structured data set
B. A data set with no structure
C. A small data set
D. A label that typically applies to extremely large and/or unstructured data sets or data sets.
A. A method of data storage
B. A type of virus protection
C. The use of a person’s unique characteristics to verify their identity
D. A way to access computer systems
A. A way to securely transfer digital information
B. A list of records linked together using special cryptographic operations across a distributed network of computers.
C. A method of encrypting data
D. A safe place to store digital information
A. Denying access to legitimate applications or other entities
B. Blocking access to legitimate applications or other entities
C. Allowing access to applications or other entities that might pose a threat to a network
D. Denying access to applications or other entities that might pose a threat to a network.
A. 5G
B. NFC
C. Bluetooth
D. Wifi
A. Stores
B. Processes
C. Executes instructions
D. None of these
A. Cloud Computing
B. Virtual Reality
C. Distributed Computing
D. Parallel Computing
A. Computer architecture
B. Computer networking
C. Data compression
D. Data communication
A. The process of isolating and maintaining an application.
B. The process of packaging software in a container.
C. A method of software development.
D. The process of shipping goods in containers.
A. A set of actions aimed to infiltrate government websites.
B. A set of actions aimed to infiltrate computer networks, systems and personal devices.
C. A set of actions aimed to delete computer networks.
D. A set of actions aimed to block computer networks.
A. The practice of protecting digital assets against cybercriminals
B. The practice of protecting physical assets against cybercriminals
C. The practice of protecting digital assets against natural disasters
D. The practice of hacking into digital assets
A. Someone who maintains computer systems
B. Someone who detects and predicts cyber threats and then implements changes to protect an organization
C. Someone who builds computer systems
D. Someone who uses computer systems
A. Meeting all security requirements set by an organization
B. Adhering to standards and regulatory requirements set forth by an agency, law or authority group.
C. Implementing security measures to protect an organization's information systems
D. Achieving all security objectives set by an organization
A. To discover new ways to attack systems.
B. To build systems that are secure against all possible attacks.
C. To build and maintain a system that's safe against cyberattacks.
D. To learn about different types of cyberattacks.
A. To block access to a site
B. To overload a server with internet traffic
C. To disrupt normal web traffic
D. To slow down a website
A. To create a botnet army.
B. To disrupt normal web traffic from accessing a site by flooding a server with internet traffic.
C. To allow normal web traffic from accessing a site by flooding a server with internet traffic.
D. To overload a server with internet traffic.
A. A part of the internet that is only accessible to the general public.
B. A part of the internet that is a haven for free speech.
C. A part of the internet that is only accessible to criminals.
D. A part of the internet that isn't accessible to the general public.
A. Assist in making better business decisions
B. Generate insights
C. Develop new products
D. Support marketing efforts
A. Someone who manages all aspects of an organized database environment.
B. Someone who uses databases
C. Someone who maintains databases
D. Someone who creates databases
A. A software program
B. A security measure
C. A type of computer
D. A physical server facility that securely houses critical applications, data and other digital assets.
A. Pattern Mining
B. Data Center
C. Data Mining
D. Data Analysis
A. The representation of data through visual elements like charts, plots, infographics, maps, etc.
B. A way to analyze data
C. A way to collect data
D. A way to organize data
A. There is no need for a dedicated data center.
B. Data is processed closer to the point of creation.
C. It is cheaper than cloud computing.
D. It is more energy efficient than cloud computing.
A. The process of creating software for embedded systems.
B. When manufacturers place software or code into products that consumers use every day.
C. A system where manufacturers place software or code into products
D. Placing software or code into products that consumers use every day.
A. Hashing
B. Decryption
C. Code
D. Encryption
A. HTML, CSS and JavaScript
B. Ruby on Rails
C. C++, Java and Python
D. PHP, MySQL and Apache