Introduction To Computing MCQs

Introduction To Computing MCQs

Answer these 50+ Introduction To Computing MCQs and assess your grip on the subject of Introduction To Computing.
Scroll below and get started!

1: Remote

A.   The ______ is a marker on the monitor which indicates where the next character will appear.

B.   In programming - a variable represents a value that can ______.

C.   This can also be called a command-_____ interface.

D.   Transferring data from a ______ computer to a local computer is called downloading.

2: High level

A.   On a hard disk - this waiting area is called a _______.

B.   Utility programs are designed to help monitor and configure ________ for the computer - the operating system - or applications.

C.   Harvard Graphics and MS __________ are examples of presentation graphics software.

D.   _____ _____ languages are based on human languages and include C - C++ and FORTRAN.

3: Web page

A.   _______ is the operating system installed on more than 80% of the world's personal computers.

B.   Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.

C.   Public key encryption uses ___ keys.

D.   The ________ ________ is the computer software that manages the basic operation of the computer.

4: Machine

A.   The monitor - speakers - and printer are examples of computer ______ devices.

B.   A ___ ________ is software that enables a user to find and access the various parts of the Internet.

C.   VPN stands for ________ Private Network.

D.   The instruction cycle is also often referred to as the ________ cycle.

5: Passwords

A.   The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.

B.   All the physical equipment in a computer system is called ________.

C.   Search agents and _____ search tools allow you to automate your search process across many sites.

D.   A keystroke logger can be used to steal __________.

6: Security

A.   A wiki is one or more ___ documents that can be viewed and changed by users.

B.   One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.

C.   This UNIX-based kernel also contributes to stronger _________.

D.   The compiled program is saved as object code for later __________.

7: Component

A.   Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.

B.   In programming - a _________ is a prewritten module designed for a specific task.

C.   Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.

D.   In word processing - the __________ for a document refers to the way text - graphics - headings - and page numbers appear on a page.

8: Network interface

A.   Data and programs waiting to be processed wait in ______ in temporary storage.

B.   A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.

C.   One use of an intranet is to allow employees to access and exchange company _____ needed to do their jobs.

D.   This UNIX-based kernel also contributes to stronger _________.

9: Decryption

A.   Built in 1951 - UNIVAC was considerably smaller and more powerful than ______.

B.   Plaintext is also called __________.

C.   The process of converting cyphertext to plaintext is ___________

D.   ____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.

10: Meta

A.   Tests run by laboratories to compare the overall speed of microprocessors are called __________.

B.   A _____ takes digital signals from a computer and converts them to analog signals to transmit over a telephone line.

C.   Search agents and _____ search tools allow you to automate your search process across many sites.

D.   Embedded computers are also called microcontrollers and are small - specialized microprocessors installed in ____ and smart appliances.

11: Sequentially

A.   Note that the URL starts by indicating what _________ should be used to access the page (HTTP).

B.   A LAN (______ _____ Network) normally occupies a single building.

C.   For example - the largest number an 8-bit variable can hold is ____ (2 to the power of 8 equals 256 - but a computer starts at 0 - so it can express anywhere from 0 through 255).

D.   With serial processing - instructions are executed ______________ in the order received.

12: Served

A.   With serial processing - instructions are executed ______________ in the order received.

B.   A ______ is a small unit of data transmitted over a network.

C.   Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.

D.   In a ring network - all packets flow in only one __________; there are no data collisions.

13: Hypertext

A.   HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.

B.   Database ______________ create - maintain - and supervise the day to day operation of databases.

C.   The easiest way to reduce exposure to cellphone _________ is to use a headset.

D.   On the job choices that reflect a person's values are called ____________ ethics.

14: Formula

A.   _______________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.

B.   MAC addresses are set from the factory and cannot be ________ by the network admin.

C.   An algorithm is a _______ or set of steps for solving a particular problem.

D.   E-waste includes discarded obsolete _________ - televisions - printers - cell phones - and other electronic devices.

15: Routes

A.   Tests run by laboratories to compare the overall speed of microprocessors are called __________.

B.   This is where the term __________ (a group edited encyclopedia) comes from.

C.   The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up

D.   Unlike a hub - a ______ sends packets only to the computer that is the intended recipient.

16: Organize

A.   A technique for increasing the speed of computer components such as motherboards - memory - processors - and graphics cards is called ____________.

B.   ______ times for PC storage devices are measured in milliseconds.

C.   Databases use structured files to _________ data.

D.   A gigabyte is a unit of measurement roughly equaling one _______ bytes.

17: Employment

A.   Most Information Systems departments are managed by a ___.

B.   A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.

C.   Like hubs - switches have multiple ______.

D.   The compiled program is saved as object code for later __________.

18: Local Area

A.   A LAN (______ _____ Network) normally occupies a single building.

B.   Random access storage devices are able to go _____ to the requested data

C.   A _____ _____ is an example of a sequential access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found.

D.   A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.

19: Three dimensional

A.   Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.

B.   The internet backbone consists of high speed - high capacity transmission lines that use the newest communications technology to ________ data across the internet.

C.   A _________ logger is a type of spyware that records each character you type.

D.   A collection of fields make up a _______.

20: Cable

A.   A bus network has two endpoints and all computers are connected to a single wire or _____.

B.   With virtual memory - free _____ ____ space is used to extend the capacity of RAM.

C.   Backbone connections are supplied by internet backbone __________ such as GTE - Sprint - UUNET and AT&T.

D.   System software helps the computer manage internal and external _________ and enables the computer to run applications.

21: Buffer

A.   ___________ programming rules are called syntax.

B.   ______________ are the most expensive and fastest computers available.

C.   Usually - project management software allows the user to break a project down into a series of goals or events which are organized as a _________.

D.   On a hard disk - this waiting area is called a _______.

22: Copyrighted

A.   The Sarbanes-Oxley act requires full disclosure in accounting systems and protects corporate ______________.

B.   _________ is the process of moving up - down - or sideways through the text or other screen display.

C.   Public domain software is not ___________ and can be copied without fear of prosecution.

D.   A MAC address is a series of numbers assigned by the manufacturer to a _________ ________ card at the factory.

23: Instructions

A.   Rule-based detection software is used by merchants for online transactions to detect and prevent _____ by establishing criteria each transaction must meet.

B.   With a relational database - users _____ records to locate and display them.

C.   A wiki is one or more ___ documents that can be viewed and changed by users.

D.   A programming language is a set of keywords and grammar rules used to create ____________ for a computer.

24: Com

A.   An example of parallel processing is when several ___________ work together sharing memory on the same task.

B.   Cookies can save you time by not requiring you to _______ in the same information on subsequent visits to the same website.

C.   What part of the URL http://instantcert.com/landing.html is the top level domain? ___

D.   To convert seconds to milliseconds - _________ by 1000 (i.e. 5 seconds is equal to 5 -000 milliseconds).

25: Overheat

A.   Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.

B.   Productivity software is designed to help people work more ___________.

C.   ______ ____________ software allows scheduling of events - management of costs and allocation of resources associated with a project.

D.   Random access storage devices are able to go _____ to the requested data

26: Microcomputers

A.   _____ ____ is a special feature that automatically continues text on the next line when the user reaches the right margin.

B.   Personal computers are also called ______________.

C.   Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.

D.   When a file is saved to disk - it isn't always saved in adjacent sectors; in other words - the data making up the file is spread out over the hard drive. This is called fragmentation. Fragmentation _____ ______ file retrieval.

27: Securely

A.   SSL and TLS are protocols used to ________ transmit credit card data over the Internet.

B.   In computer programming - ______ errors refer to typographical errors and incorrect use of the programming language.

C.   SSL (Secure _______ Layer) and TLS are protocols used to create a secure connection between a computer and a website.

D.   A programming problem statement defines the scope of the problem - spells out the known information - and specifies when the problem has been ______.

28: Changed

A.   MAC addresses are set from the factory and cannot be ________ by the network admin.

B.   Secondary storage refers to devices and media that store data _____________.

C.   In a relational database - information is organized in rows and columns. Rows are called _______.

D.   _____ memory drives plug into the computer's USB ports and have memory capacities of up to several gigabytes.

29: Defragmentation

A.   Micropayments allow customers to purchase goods and services for amounts so small as to be impractical for ________ _____ transactions.

B.   By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.

C.   The particular operating system and _________ model on which a computer system is based is called the platform.

D.   A message which has been encrypted is called __________.

30: Windows

A.   Examples of word size in _____ computers include 16 - 32 - and 64 bits.

B.   Common platforms include Apple Macintosh - ________ platforms and PC platforms.

C.   Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.

D.   Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of ____.

31: ________ is used to solve large-scale computing problems.

A.   Grid Computing

B.   Protocols

C.   Cloud Computing

D.   Host (lookup)

32: A byte's ______ is a unique number that identifies the location of a byte in memory.

A.   Backside

B.   Comparison

C.   Address

33: A common way to move an object from one location to another using a mouse is to ______.

A.   Point

B.   Drag

C.   Double-click

D.   Right-click

34: A graphics tablet also is called a(n) ______.

A.   Digitizer

B.   Illustration Pad

C.   Art Input Device

D.   Illustrator

35: A microsoft ________ account allows you to store and share files in the cloud.

A.   .edu

B.   Plug-ins

C.   OneDrive

D.   Webcast

36: Among the rights you have as a user of computing resources is the right to _______.

A.   Ignore the standard techniques for using applications

B.   Treat your password carelessly

C.   Use your own mobile device in any way you want at work

D.   Protection from​ viruses, worms, and other threats

E.   Report trivial problems

37: Buses differ according to their ____.

A.   Hardware

B.   Repeaters

C.   Capacity

D.   Data link

38: Cloud pricing structure is a ____-based model.

A.   Flat

B.   Box

C.   Subscription

D.   Pay-as-you-go

39: Daas stands for ______ as a service.

A.   Device

B.   Document

C.   Data

D.   Digital

40: Data that a computer accepts and processes is called ______.

A.   Imput

B.   Skimmer

C.   Apple

D.   Ports

41: Entering data into a computer system is also known as ________________ data.

A.   Chief financial officer

B.   Capturing

C.   Structured

D.   Version 5010

42: If data aggregation is the goal of collecting the data, ______ are the best choice.

A.   Classifications

B.   Code systems

C.   Clinical terminologies

D.   Nomenclatures

43: A ____ is responsible for maintaining a large, multiuser system.

A.   Software engineer;

B.   Vice president of information systems;

C.   System administrator

D.   Programmer/analyst

44: Characters are made up of smaller elements called ____.

A.   Fields

B.   Records

C.   Bits

D.   Bytes

45: A distributed computing system usually includes ____.

A.   A central computer server

B.   Decentralized PCs

C.   A network to link systems together

D.   All of these

46: A ____ network is the only network that offers a dedicated path.

A.   Packet switch

B.   Circuit switch

C.   Virtual circuit

D.   Broadcast

47: A user name ________ a user.

A.   Authenticates

B.   Identifies

C.   Conceals

D.   Encrypts

48: When you are looking for a 'hotspot', you are searching for _____.

A.   A wireless access point

B.   Bluetooth signals

C.   Free charging stations

D.   Strong satellite signals

49: Data sent by a program to the screen, a printer, or a file is __________.

A.   Output

B.   Input

C.   Variable

D.   Modulus

50: With _____, you can access storage and applications over the internet.

A.   Net neutrality

B.   E-commerce

C.   VOIP

D.   Cloud Computing