Computer Science

PPSC Mcqs about computer

Computer Quiz # 7

Q1. __________ Store data or information temporarily and pass it on as directed by the control unit?

(A) Address
(B) Register
(C) Number
(D) Memory

Q2. Select the Odd one from the following

(A) Operating system
(B) Interpreter
(C) Compiler
(D) Assembler

Q3. A________________ is a set of additional commands that the computer displays after selecting from the main menu?

(A) dialog box
(B) submenu
(C) menu selection
(D) All of the above

Q4. COBOL is an acronym for________________?

(A) Common Business Oriented Language
(B) Computer Business Oriented Language
(C) Common Business Operated Language
(D) Common Business Organized Language

Q5. All are real security and privacy threats. EXCEPT____?

(A) hackers
(B) Spam
(C) Viruses
(D) identity theft

Computer Science

Q6. Which of the following are NOT  major data processing functions of a computer?

(A) gathering data
(B) processing data into information
(C) analyzing the data or information
(D) storing the data or information

Q7. All are storage devices EXCEPT____________?

(A) hard disk drives
(B) printers
(C) floppy disk drives
(D) CD drives

Q8. The CPU and memory are located on the__________?

(A) expansion board
(B) motherboard
(C) storage device
(D) output device

Q9. ______________is the science that attempts to produce machines that display the same type of intelligence that humans do?

(A) Nanoscience
(B) Nanotechnology
(C) Simulation
(D) Artificial intelligence (Al)

Q10. server computers provide resources for computers connected to ___________?

(A) network
(B) mainframe
(C) supercomputer
(D) client

Q11. When designing a software ____________is to design a software framework?

(A) End-user
(B) System Analyst
(C) Programmer
(D) All of the above

Q12. Computers process data and use only _____ to convert it into information?

(A) multimedia
(B) word
(C) numbers
(D) characters

Q13. Computers manipulate data in different ways and this manipulation is called ____________?

(A) upgrading
(B) processing
(C) batching
(D) utilizing

Q14. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called___________?

(A) robotics
(B) simulation
(C) computer forensics
(D) animation

Important Computer Mcqs

Q15. In Computer hierarchy data is first stored in _____?

(A) RA

Q16. The_____________data mining technique derives rules from real-world case examples?

(A) Rule discover
(B) Signal processing
(C) Neural nets
(D) Case-based reasoning

Q17. Using _____________repeating visitors of a Website is determined.

(A) Cookies
(B) Plug-ins
(C) Scripts
(D) ASPs

Q18. Computer-readable codes consisting of lines are known as__________?

(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code

Q19. Why is it immoral to share copyrighted files with your friends?

(A) That is not immoral because it is legal.
(B) This is immoral as the files are provided for free.
(C) Sharing copyrighted files are against copyright law.
(D) This is not immoral as the files are provided for free.

Q20. Reusable optical storage will typically have the acronym________?

(A) CD
(D) RW