Computer MCQ Questions and Answers

Government Examination Computer asked Questions

computer MCQ  questions and answers

01. The term ‘Computer’ is derived from……….

a.Latin b. German c. French d. Arabic

02. Who is the inventor of “Difference Engine”?

a. Allen Turing

b. Charles Babbage

c. Simur Cray

d. Augusta Adaming

03.Who is the father of Computer? 

a. Allen Turing

b. Charles Babbage

c. Simur Cray

d. Augusta Adaming

04. Who is the father of Computer science?

a. Allen Turing

b. Charles Babbage

c. Simur Cray

d. Augusta Adaming

05. Who is the father of personal computer?

a. Edward Robert

b. Allen Turing

c. Charles Babbage

d. None of these

06. A CPU contains

a. a card reader and a printing device

b. an analytical engine and a control unit

c. a control unit and an arithmetic logic unit

d. an arithmetic logic unit and a card reader

07. Which of the following controls the process of interaction between the user and the operating system?

a. User interface

b. Language translator

c. Platform

d. Screen saver

08. The first computers were programmed using

a. assembly language

b. machine language

c. source code

d. object code

09. ……….is a combination of hardware and software that facilitates the sharing of information between computing devices.

a. network

b. peripheral

c. expansion board

d. digital device

 10. Coded entries which are used to gain access to a computer system are called

a. Entry codes

b. Passwords

c. Security commands

d. Code words

11.Which of the following statements is true?

a. Minicomputer works faster than Microcomputer

b. Microcomputer works faster than Minicomputer

c. Speed of both the computers is the same

d. The speeds of both these computers cannot be compared with the speed of advanced

12. You organize files by storing them in

a. archives

b. folders

c. indexes

d. lists

13.What type of resource is most likely to be a shared common resource in a computer Network?

a. Printers

b. Speakers

c. Floppy disk drives

d. Keyboards

14. Which device is required for the Internet connection?

a. Joystick

b. Modem

c. CD Drive

d. NIC Card

15. What is a light pen?

a. A Mechanical Input device

b. Optical input device

c. Electronic input device

d. Optical output device

16. UNIVAC is

a. Universal Automatic Computer

b. Universal Array Computer

c. Unique Automatic Computer

d. Unvalued Automatic Computer

17. CD-ROM stands for

a. Compactable Read Only Memory

b. Compact Data Read Only Memory

c. Compactable Disk Read Only Memory

d. Compact Disk Read Only Memory

18. ALU is

a. Arithmetic Logic Unit

b. Array Logic Unit

c. Application Logic Unit

d. None of above

19. VGA is

a. Video Graphics Array

b. Visual Graphics Array

c. Volatile Graphics Array

d. Video Graphics Adapter

20. IBM 1401 is

a. First Generation Computer

b. Second Generation Computer

c. Third Generation Computer

d . Fourth Generation

21. MSI stands for

a. Medium Scale Integrated Circuits

b. Medium System Integrated Circuits

c. Medium Scale Intelligent Circuit

d. Medium System Intelligent Circuit

22.The capacity of 3.5 inch floppy disk is

a. 1.40 MB

b. 1.44 GB

c. 1.40 GB

d. 1.44 MB

23.WAN stands for

a. Wap Area Network

b. Wide Area Network

c. Wide Array Net

d. Wireless Area Network

24.MICR stands for

a. Magnetic Ink Character Reader

b. Magnetic Ink Code Reader

c. Magnetic Ink Cases Reader

d. None

25. EBCDIC stands for

a. Extended Binary Coded Decimal Interchange Code

b. Extended Bit Code Decimal Interchange Code

c. Extended Bit Case Decimal Interchange Code

d. Extended Binary Case Decimal Interchange Code

computer MCQ  questions and answers

Answer:-

1 – A

2 – B

3 – B

4 – A

5- A

6- C

7- A

8- B

9- A

10- B

11- A

12- B

13- A

14- B

15- B

16- A

17- A

18- A

19- A

20- B

21 – A

22 – D

23 – B

24 – A

25 – A

 

 

 

 

 

 

26. Which of the following is a part of the Central Processing Unit?

a. Printer

b. Keyboard

c. Mouse

d. Arithmetic & Logic unit

Ans:- d

27. CAD stands for

a. Computer-aided design

b. Computer algorithm for design

c. Computer application in design

d. Computer analogue design

Ans:- a

28. Junk e-mail is also called

a. spam

b. spoof

c. sniffer script

d. spool

Ans:- a

29. Hackers

a. all have the same motive

b. break into other people’s computers

c. may legally break into computers as long as they do not do any damaged. are people who are allergic to computers

Ans:- b

30. What type of computers are client computers (most of the time) in a client-server system?

a. Mainframe

b. Mini-computer

c. Microcomputer

d. PDA

Ans:- c

31. A computer cannot ‘boot’ if it does not have the

a. Compiler

b. Loader

c. Operating System

d. Assembler

Ans:- c

32. The amount of vertical space between lines of text in a document is called

a. double-space

b. line spacing

c. single-spaced.

d. vertical spacing

Ans:- b

33. Example of non-numeric data is

a. Employee address

b. Examination score

c. Bank balanced.

d. All of these

Ans:- a

34. What is embedded system?

a. The programme which arrives by being wrapped in box.

b. The programme which is the permanent part of the computer

c. The computer which is the part of a big computer

d. The computer and software system that control the machine

Ans:- d

35. First page of Website is termed as-

a. Homepage

b. Index

c. JAVA script

d. Bookmark

Ans:- a

36.  ………………… Is the appearance of typed characters?

a. Size

b. Format

c. Point

d. Colour

Ans:- b

37. When a file is saved for the first time

a. a copy is automatically printed

b. it must be given a name to identify it

c. it does not need a named.

d. it only needs a name if it is not going to be printed

Ans:- b

38. Office LANs, which are scattered geographically on large scale, can be connected by the use of corporate

a. CAN

b. LAN

c. DAN

d. WAN

Ans:- d

39. Where are data and programme stored when the processor uses them?

a. Main memory

b. Secondary memory

c. Disk memory

d. Programme memory

Ans:- a

40. …………… represents raw facts, where-as…………….. is data made meaningful.

a. Information, reporting

b. Data, information

c. Information, bits

d. Records, byte

Ans:- b

41. What characteristic of read-only memory (ROM) makes it useful?

a. ROM information can be easily updated.

b. Data in ROM is non-volatile, that is, it remains there even without electrical power.

c. ROM provides very large amounts of inexpensive data storage.

d. ROM chips are easily swapped between different brands of computers.

Ans:- b

42. What do you call the programs that are used to find out possible faults and their causes?

a. operating system extensions

b. cookies

c. diagnostic software

d. boot diskettes

Ans:- c

43. Which programming languages are classified as low level languages?

a. BASIC, COBOL, Fortran

b. Prolog c. C, C++

c. Knowledge Based System

d. Assembly languages

Ans:- d

44. Which of the following is not anti-viruses’ software?

a. NAV

b. F-Prot

c. Oracle

d. McAfee

Ans:- c

45. Which device is required for the Internet connection?

a. Joystick

b. Modem

c. CD Drive

d. NIC Card

Ans:- b

46. What does DMA stand for?

a. Distinct Memory Access

b. Direct Memory Access

c. Direct Module Access

d. Direct Memory Allocation

Ans:- b

47. Which of the following is a storage device?

a. Tape

b. Hard Disk

c. Floppy Disk

d. All of the above

Ans:- d

48. When did John Napier develop logarithm?

a. 1416

b. 1614

c. 1641

d. 1804

Ans:- b

49. A normal CD- ROM usually can store up to _________ _data?

a. 680 KB

b. 680 Bytes

c. 680 MB

d. 680 GB

Ans:- c

50. MIS is designed to provide information needed for effective decision making by?

a. Consumers

b. Workers

c. Foremen

d. Managers

Ans:- d

51.  From What location are the 1st computer instructions available on boot up?
A. ROM BIOS
B. CPU
C. boot.ini
D. CONFIG.SYS
ANSWER: A
52.What could cause a fixed disk error.
A. No-CD installed
B. bad ram
C. slow processor
D. Incorrect CMOS settings
ANSWER: D
53.Missing slot covers on a computer can cause?
A. over heat
B. power surges
C. EMI.
D. incomplete path for ESD
ANSWER: A
54.With respect to a network interface card, the term 10/100 refers to
A. protocol speed
B. a fiber speed
C. megabits per seconds
D. minimum and maximum server speed
ANSWER: C
55.Which Motherboard form factor uses one 20 pin connector
A. ATX
B. AT
C. BABY AT
D. All of the above
ANSWER: A
56.A hard disk is divided into tracks which are further subdivided into:
A. clusters
B. sectors
C. vectors
D. heads
ANSWER: B
57.A wrist grounding strap contains which of the following:
A. Surge protector
B. Capacitor
C. Voltmeter
D. Resistor
ANSWER: D
58.ESD would cause the most damage to which component?
A. Power supply
B. Expansion board
C. Monitor
D. Keyboard
E. All of the mentioned
ANSWER: B
59.Most PCs give a single beep on bootup to indicate they are ok hardware wise. You boot your PC and don’t get a beep. What should you check first?
A. system board
B. RAM
C. microprocessor
D. power supply
E. speaker
ANSWER: E
60.Which peripheral port provides the FASTEST throughput to laser printers?
A. RS-232
B. SCSI
C. Parallel
D. Serial
E. None of the mentioned
ANSWER: C
61.If there are multiple recycle bin for a hard disk
A. You can set different size for each recycle bin
B. You can choose which recycle bin to use to store your deleted files
C. You can make any one of them default recycle bin
D. None of above
ANSWER: A
62.Identify false statement
A. You can find deleted files in recycle bin
B. You can restore any files in recycle bin if you ever need
C. You can increase free space of disk by sending files in recycle bin
D. You can right click and choose Empty Recycle Bin to clean it at once
ANSWER: C
63.If the displayed system time and date is wrong, you can reset it using
A. Write
B. Calendar
C. Write file
D. Control panel
ANSWER: D
64.You should save your computer from?
A. Viruses
B. Time bombs
C. Worms
D. All of the mentioned
ANSWER: D
65.World Wide Web is being standard by
A. Worldwide corporation
B. W3C
C. World Wide Consortium
D. World Wide Web Standard
ANSWER: B
66.A co-processor
A. Is relatively easy to support in software
B. Causes all processor to function equally
C. Works with any application
D. Is quite common in modern computer
ANSWER: A
67.A Microsoft Windows is a(n)
A. Operating system
B. Graphic program
C. Word Processing
D. Database program
ANSWER: A
68.Which of the following is program group?
A. Accessories
B. Paint
C. Word
D. All of the mentioned
ANSWER: A
69.Which is not application software?
A. Windows NT
B. Page Maker
C. WinWord XP
D. Photoshop
ANSWER: A
70.The …… program compresses large files into a smaller file
A. WinZip
B. WinShrink
C. WinStyle
D. None of the mentioned
ANSWER: A
71.Which of the following is an example of a real time operating system?
A. Lynx
B. MS DOS
C. Windows XP
D. Process Control
ANSWER: D
72.Which of the following operating system does not implement the multitasking truly?
A. Windows 98
B. Windows NT
C. Windows XP
D. MS DOS
ANSWER: D
73.Which of the following windows version support 64 bit processor?
A. Windows 98
B. Windows 2000
C. Windows XP
D. Windows 95
ANSWER: C
74.Which of the following Operating systems is better for implementing a Client-Server network
A. MS DOS
B. Windows 95
C. Windows 98
D. Windows 2000
ANSWER: D
75.Which of the following Windows do not have Start button
A. Windows Vista
B. Windows 7
C. Windows 8
D. None of the mentioned
ANSWER: C
76.Which operating system doesn’t support networking between computers?
A. Windows 3.1
B. Windows 95
C. Windows 2000
D. Windows NT
ANSWER: A
77.Which of the following does not support more than one program at a time?
A. DOS
B. Linux
C. Windows
D. Unix
ANSWER: A
78.Which of the following is not an operating system?
A. DOS
B. Linux
C. Windows
D. Oracle
ANSWER: D
79.Linux is a(n) ……. operating system
A. Open source
B. Microsoft
C. Windows
D. Mac
ANSWER: A
80.Which operating system can you give smallest file name?
A. Ps/2
B. Dos
C. Windows
D. Windows NT
ANSWER: B

                                            IBM ADVANCE DIPLOMA

MODULE-03 (WEB DESIGNING)  QUESTIONS & ANSWERS                                         

81. A webpage displays a picture. What tag was used to display that picture? 

A. picture

B. image

C. img

D. src

ANSWER: C

82.<b> tag makes the enclosed text bold. What is other tag to make text bold? 

A. <strong>

B. <dar>

C. <black>

D. <emp>

ANSWER: A

83.Tags and text that are not directly displayed on the page are written in _____ section. 

A. <html>

B. <head>

C. <title>

D. <body>

ANSWER: B

84.Which tag inserts a line horizontally on your web page? 

A. <hr>

B. <line>

C. <line direction=”horizontal”>

D. <tr>

ANSWER: A

85.What should be the first tag in any HTML document?

A. <head>

B. <title>

C. <html>

D. <document>

ANSWER: C

86.Which tag allows you to add a row in a table? 

A. <td> and </td>

B. <cr> and </cr>

C. <th> and </th>

D. <tr> and </tr>

ANSWER: D

87.How can you make a bulleted list? 

A. <list>

B. <nl>

C. <ul>

D. <ol>

ANSWER: C

88.How can you make a numbered list? 

A. <dl>

B. <ol>

C. <list>

D. <ul>

ANSWER: B

89.How can you make an e-mail link? 

A. <a href=”[email protected] ”>

B. <mail href=”[email protected] ”>

C. <mail>[email protected] </mail>

D. <a href=”mailto:[email protected] ”>

ANSWER: D

90.What is the correct HTML for making a hyperlink? 

A. <a href=”http:// data.com“>Question</a>

B. <a name=”https://data.com“>Question</a>

C. <https://data.com</a>

D. url=”https://data.com“>Question

ANSWER: A

91.Choose the correct HTML tag to make a text italic

A. <ii>

B. <italics>

C. <italic>

D. <i>

ANSWER: D

 92.Choose the correct HTML tag to make a text bold 

A. <b>

B. <bold>

C. <bb>

D. <bld>

ANSWER: A

93.What is the correct HTML for adding a background color? 

A. <body color=”yellow”>

B. <body bgcolor=”yellow”>

C. <background>yellow</background>

D. <body background=”yellow”>

ANSWER: B

94.Choose the correct HTML tag for the smallest size heading?

A. <heading>

B. <h6>

C. <h1>

D. <head>

ANSWER: B

95.What is the correct HTML tag for inserting a line break?

A. <br>

B. <lb>

C. <break>

D. <newline>

ANSWER: A

96.What doesvlink attribute mean?

A. visited link

B. virtual link

C. very good link

D. active link

ANSWER: A

97.Which attribute is used to name an element uniquely?

A. class

B. id

C. dot

D. all of the mentioned

ANSWER: B

98.Which tag creates a check box for a form in HTML?

A. <checkbox>

B. <input type=”checkbox”>

C. <input=checkbox>

D. <input checkbox>

ANSWER: B

99.To create a combo box (drop down box) which tag will you use?

A. <select>

B. <list>

C. <input type=”dropdown”>

D. all of above

ANSWER: A

100.Which of the following is not a pair tag?

A. <p>

B. < u >

C. <i>

D. <img>

ANSWER: D

101.To create HTML document you require a

A. web page editing software

B. High powered computer

C. Just a notepad can be used

D. None of above

ANSWER: C

102.The special formatting codes in HTML document used to present contentare

A. tags

B. attributes

C. values

D. None of above

ANSWER: A

103.HTML documents are saved in

A. Special binary format

B. Machine language codes

C. ASCII text

D. None of above

ANSWER: C

104.Some tags enclose the text. Those tags are known as

A. Couple tags

B. Single tags

C. Double tags

D. Pair tags

ANSWER: D

105.The _____ character tells browsers to stop tagging the text

A. ?

B. /

C. >

D. %

ANSWER: B

106.In HTML document the tags

A. Should be written in upper case

B. should be written in lower case

C. should be written in propercase

D. can be written in both uppercase or lowercase

ANSWER: D

107.Marquee is a tag in HTML to

A. mark the list of items to maintaininqueue

B. Mark the text so that it is hidden in browser

C. Display text with scrolling effect

D. None of the options

ANSWER: C

108.There are ____ different of heading tags in HTML

A. 4

B. 5

C. 6

D. 7

ANSWER: C

109.To create a blank line in your web page

A. press Enter two times

B. press Shift + Enter

C. insert <BR> tag

D.insert <BLINE>

ANSWER: C

110.Which of the following is not a style tag?

A. <b>

B. <tt>

C. <i>

D. All of the mentioned are style tags

ANSWER: D

CSS

111.What does CSS stand for?

A. Creative Style Sheets

B. Colorful Style Sheets

C. Cascading Style Sheets

D. Computer Style Sheets

ANSWER:C

112.What is the correct HTML for referring to an external style sheet?

A. <stylesheet>mystyle.css</stylesheet />

B. <style src=”mystyle.css” />

C. <link rel=”stylesheet” type=”text/css” href=”mystyle.css”>

ANSWER: C

113.Where in an HTML document is the correct place to refer to an external style sheet?

A. At the end of the document

B. In the <head> section

C. At the top of the document

D. In the <body> section

ANSWER: B

114.Which HTML tag is used to define an internal style sheet?

A. <style>

B. <css>

C. <script>

ANSWER: A

115.Which HTML attribute is used to define inline styles?

A. font

B. class

C. styles

D. style

ANSWER: D

116.Which is the correct CSS syntax?

A. body {color: black}

B. {body;color:black}

C. {body:color=black(body}

D. body:color=black

ANSWER: A

117.How do you insert a comment in a CSS file?

A. // this is a comment //

B. /* this is a comment */

C. ‘ this is a comment

D. // this is a comment

ANSWER: B

118.Which property is used to change the background color?

A. bgcolor:

B. background-color:

C. color:

ANSWER: B

119.How do you add a background color for all <h1> elements?

A. all.h1 {background-color:#FFFFFF}

B. h1.all {background-color:#FFFFFF}

C. h1 {background-color:#FFFFFF}

ANSWER: C

120.How do you change the text color of an element?

A. text-color=

B. fgcolor:

C. color:

D. text-color:

ANSWER: C

121.Which CSS property controls the text size?

A. font-size

B. font-style

C. text-style

D. text-size

ANSWER: A

122.What is the correct CSS syntax for making all the <p> elements bold?

A. <p style=”text-size:bold”>

B. p {font-weight:bold}

C. p {text-size:bold}

D. <p style=”font-size:bold”>

ANSWER: B

123.How do you display hyperlinks without an underline?

A. a {text-decoration:no underline}

B. a {decoration:no underline}

C. a {text-decoration:none}

D. a {underline:none}

ANSWER: C

124.How do you make each word in a text start with a capital letter?

A. text-transform:capitalize

B. You can’t do that with CSS

C. text-transform:uppercase

ANSWER: A

125.How do you change the font of an element?

A. font-family:

B. font=

C. f:

ANSWER: A

126.How do you make the text bold?

A. font:b

B. font-weight:bold

C. style:bold

ANSWER: B

127.How do you display a border like this: The top border = 10 pixels The bottom border = 5 pixels The left border = 20 pixels The right border = 1pixel?

A. border-width:10px 20px 5px 1px

B. border-width:10px 1px 5px 20px

C. border-width:5px 20px 10px 1px

D. border-width:10px 5px 20px 1px

ANSWER: B

128.How do you change the left margin of an element?

A. margin:

B. indent:

C. margin-left:

D. text-indent:

ANSWER: C

129.To define the space between the element’s border and content, you use the padding property, but are you allowed to use negative values?

A. Yes

B. No

ANSWER: B

130.How do you make a list that lists its items with squares?

A. list-type: square

B. type: square

C. type: 2

D. list-style-type: square

ANSWER:D

MODULE-03(WEB DESIGNING) PART-03  

PHP,PYTHAN,CLOUD &DBMS QUESTIONS MCQ:118 Questions With Answers:

131.What PHP stands for?

A. Hypertext Preprocessor

B. Pre Hypertext Processor

C. Pre Hyper Processor

D. Pre Hypertext Process

ANSWER: D

132.Which of the following tags is not a valid way to begin and end a PHP code block?

A.<% %>

B.<? ?>

C.<?PHP ?>

D.<! !>

ANSWER: B

133. How does the identity operator === compare two values?

A. It converts them to a common compatible data type and then compares the resulting values

B. It returns True only if they are both of the same type and value

C. If the two values are strings, it performs a lexical comparison

D. It bases its comparison on the

C strcmp function exclusively

E. It converts both values to strings and compares them

ANSWER: A

134.Under what circumstance is it impossible to assign a default value to a parameter while declaring a function?

A. When the parameter is Boolean

B. When the function is being declared as a member of a class

C. When the parameter is being declared as passed by reference

D. When the function contains only one parameter

E. Never

ANSWER: C

135.Variables always start with a …….. in PHP

A. Pond-sign

B. Yen-sign

C. Dollar-sign

E. Euro-sign

ANSWER: C

136.What is the value displayed when the following is executed?

Assume that the code was executed using the following URL:

testscript.php?c=25 <?php function process($c, $d = 25) { global $e; $retval = $c + $d – $_GET[‘c’] – $e; return $retval; } $e = 10; echo process(5); ?>

A. 25

B. -5

C. 10

D. 5

E. 0

ANSWER: B

137.PHP is an open source software

A. True

B. False

ANSWER: A

138.Which of the following is not valid PHP code?

A. $_10

B. ${“MyVar”}

C. &$something

D. $10_somethings

E. $aVaR

ANSWER: D

139.Doubt What is the difference between print() and echo()?

A. print() can be used as part of an expression, while echo() can’t

B. echo() can be used as part of an expression, while print() can’t

C. echo() can be used in the CLI version of PHP, while print() can’t

D. print() can be used in the CLI version of PHP, while echo() can’t

E. There’s no difference: both functions print out some text!

ANSWER: A, B

140.PHP runs on different platforms (Windows, Linux, Unix, etc.)

A. True

B. False

ANSWER: A

141.Which of the following will not combine strings $s1 and $s2 into a single string?

A. $s1 + $s2

B. “{$s1}{$s2}”

C. $s1.$s2

D. implode(‘ ‘, array($s1,$s2))

E. All the mentioned options combine the strings

ANSWER: A

142.Given a variable $email containing the string [email protected], which of the following statements would extract the string example.com?

A. substr($email, strpos($email, “@”));

B. strstr($email, “@”);

C. strchr($email, “@”);

D. substr($email, strpos($email, “@”)+1);

E. strrpos($email, “@”);

ANSWER: D

143.Given a comma-separated list of values in a string, which function from the given list can create an array of each individual value with a single call?

A. strstr()

B. Cannot be done with a single function

C. extract()

D. explode()

E. strtok()

ANSWER: D

144.What is the best all-purpose way of comparing two strings?

A. Using the strpos function

B. Using the == operator

C. Using strcasecmp()

D. Using strcmp()

ANSWER: D

145.Which of the following PCRE regular expressions best matches the string php|architect?

A. .*

B. …|………

C. \d{3}\|\d{8}

D. [az]{3}\|[az]{9}

E. [a-z][a-z][a-z]\|\w{9}

ANSWER: E

146.Doubt Which of the following functions can be used to determine the integrity of a string?

A. md5()

B. sha1()

C. str_rot13()

D. crypt()

E. crc32()

ANSWER: A,B,E

147.What happens if you add a string to an integer using the + operator?

A. The interpreter outputs a type mismatch error

B. The string is converted to a number and added to the integer

C. The string is discarded and the integer is preserved

D. The integer and string are concatenated together in a new string

E. The integer is discarded and the string is preserved

ANSWER: B

148.The ___________ function can be used to compare two strings using a case-insensitive binary algorithm

A. strcmp()

B. stricmp()

C. strcasecmp()

D. stristr()

E. None of the above

ANSWER: C

149.Doubt Which of the following functions can be used to convert the binary data stored in a string into its hexadecimal representation?

A. encode_hex()

B. pack()

C. hex2bin()

D. bin2hex()

E. printf()

ANSWER: B,D

150.Doubt ^[A-Za-z].* matches

A. play it again

B. I

C. 123

D. ?

ANSWER: A,B

151.^[0-9]{5}(\-[0-9]{4})?$ matches

A. 90001 and 90002-4323

B. 9001 and 12-4321

ANSWER: A

152.Array values are keyed by ______ values (called indexed arrays) or using ______ values (called associative arrays). Of course, these key methods can be combined as well.

A. Float, string

B. Positive number, negative number

C. Even number, string

D. String, Boolean

E. Integer, string

ANSWER: E

153.What will the following script output? <?php $array = array (1, 2, 3, 5, 8, 13, 21, 34, 55); $sum = 0; for ($i = 0; $i < 5; $i++) { $sum += $array[$array[$i]]; } echo $sum; ?>

A. 78

B. 19

C. NULL

D. 5

E. 0

ANSWER: A

154.What elements will the following script output? <?php $array = array (true => ‘a’, 1 => ‘b’); var_dump ($array); ?>

A. 1 => ‘b’

B. True => ‘a’, 1 => ‘b’

C. 0 => ‘a’, 1 => ‘b’

D. None

E. It will output NULL

ANSWER: E

155.Which array function checks if the specified key exists in the array

A. array_key_exist()

B. array_key_exists()

C. array_keys_exists()

D. arrays_key_exists()

ANSWER: B

156.There are three different kind of arrays:

A. Numeric array, String array, Multidimensional array

B. Numeric array, Associative array, Dimensional array

C. Numeric array, Associative array, Multidimensional array

D. Const array, Associative array, Multidimensional array

ANSWER: C

157.Absent any actual need for choosing one method over the other, does passing arrays by value to a read-only function reduce performance compared to passing them by reference?

A. Yes, because the interpreter must always create a copy of the array before passing it to the function. B. Yes, but only if the function modifies the contents of the array.

C. Yes, but only if the array is large.

D. Yes, because PHP must monitor the execution of the function to determine if changes are made to the array.

E. No.

ANSWER: E

158.Assume you would like to sort an array in ascending order by value while preserving key associations. Which of the following PHP sorting functions would you use?

A. ksort()

B. asort()

C. krsort()

D. sort()

E. usort()

ANSWER: B

159.What function computes the difference of arrays?

A. array_diff

B. diff_array

C. arrays_diff

D. diff_arrays

ANSWER: A

160.Doubt What functions count elements in an array?

A. count

B. Sizeof

C. Array_Count

D. Count_array

ANSWER: A,B

161.What array will you get if you convert an object to an array?

A. An array with properties of that object as the array’s elements.

B. An array with properties of that array as the object’s elements.

C. An array with properties of that object as the Key elements.

D. An array with keys of that object as the array’s elements.

ANSWER: A

162.Doubt Which of the following functions do not return a timestamp?

A. time()

B. date()

C. strtotime()

D. localtime()

E. gmmktime()

ANSWER: B, D

163.The getdate() function returns

A. An integer

B. A floating-point number

C. An array

D. A string

E. A Boolean

ANSWER: C .

164………. Returns the time of sunrise for a given day / location

A. datesunrise()

B. date_sunrise()

C. date-sunrise()

D. date.sunrise()

ANSWER: B

165.What will the following script output?

<?php $time = strtotime (‘2004/01/01’); echo date (‘H:\i:s’, $time); ?>

A. 00:00:00

B. 12:00:00

C. 00:i:00

D. 12:i:00

E. -1

ANSWER: C .

166……………Checks a date for numeric validity.

A. check_date

B. verifydate

C. Verify_date

D. checkdate

ANSWER: D

167.What is the difference, in seconds, between the current timestamp in the GMT time zone and the current timestamp in your local time zone?

A. It depends on the number of hours between the local time zone and GMT

B. There is no difference

C. The two will only match if the local time zone is GMT

D. The two will never match

E. None of the above

ANSWER: B

168.You must make a call to ………………. to specify what time zone you want calculations to take place in before calling any date functions.

A. date_default_timezone_set()

B. datedefault_timezone_set()

C. date_defaulttimezone_set()

D. date_default_timezoneset()

ANSWER: A

169.What would happen if the following script were run on a Windows server set to Moscow, Russia’s time zone?

<?php echo gmmktime(0, 0, 0, 1, 1, 1970); ?>

A. It would output the number 0

B. It would output the number -1

C. It would output the number 1

D. It would raise an error

E. It would output nothing

ANSWER: B

170.The ……… function parses an English textual date or time into a Unix timestamp

A. strtodate()

B. stroftime()

C. strtotime()

D. str_to_time()

ANSWER: C

171……………. Formats a local time or date according to locale settings.

A. strftime

B. strgtime

C. strhtime

D. stritime

ANSWER: A

172.In PHP, the difference between double quote and single quote is that variables . . . . in single quoted strings whereas they . . . . . in double quoted strings.

A. are not parsed, are parsed

B. are parsed, are not parsed

ANSWER: A

173.PHP strings are binary-safe (i.e. they can contain null bytes) . Their size is limited only by the amount of memory that is available to PHP.

A. True

B. False

ANSWER: A

174.Print substr (‘watch out for that tree’,20,5); What is the output of above statement?

A. tree

B. tree’

C. ree

D. none of above

ANSWER: C

175.$var = ‘HELLO WORLD!’; $var = ucfirst($var); What is the value of var?

A. Hello World!

B. hello world!

C. Hello world!

D. HELLO WORLD!

ANSWER: D

176.The functions strtolower() and strtoupper() work on individual characters and not on entire strings.

A. True

B. False

ANSWER: B

177.For trim, ltrim or rtrim, whitespace is defined as

A. newline

B. space

C. vertical tab

D. null

E. both a and B

F. all the mentioned options

ANSWER: F

178.Heredoc’s are a great alternative to quoted strings because of increased readability and maintainability.

A. True

B. False

ANSWER: A

179.Which of the below is most useful for debugging:

A. print()

B. printf()

C. print_r()

D. echo

ANSWER: C

180.$name = “John”; $message = ‘Hello, $name’; What is the value of message?

A. Hello, John

B. it will print an error message

C. ‘Hello, $name’

D. none of above

ANSWER: C

181.$str = “Hello fri3nd, you’re feeling happy today?”; echo str_word_count($str);

A. 7

B. 6

C. 5

D. 4

ANSWER: A

182.PYTHON What is answer of this expression, 22 % 3 is?

A. 7

B. 1

C. 0

D. 5

ANSWER: B

183.What is the output of this expression, 3*1**3?

A. 27

B. 9

C. 3

D. 1

ANSWER: C

184.Which of the following will run without errors ?

A. round(45.8)

B. round(6352.898,2,5)

C. round()

D. round(7463.123,2,1)

ANSWER: A

185.What dataype is the object below ? L = [1, 23, ‘hello’, 1].

A. list

B. dictionary

C. array

D. tuple

ANSWER: A

186.What does ——— 5 evaluate to?

A. +5

B. -11

C. +11

D. -5

ANSWER: A

187.What is the result of round(0.5) – round(-0.5)?

A. 1.0

B. 2.0

C. 0.0

D. None of the mentioned

ANSWER: B

188.What is the maximum possible length of an identifier?

A. 31 characters

B. 63 characters

C. 79 characters

D. none of the mentioned

ANSWER: D

189.All keywords in Python are in

A. lower case

B. UPPER CASE

C. Capitalized

D. None of the mentioned

ANSWER: D

190.Which of the following is an invalid statement?

A. abc = 1,000,000

B. a b c = 1000 2000 3000

C. a,b,c = 1000, 2000, 3000

D. a_b_c = 1,000,000

ANSWER: B

191.Which of these in not a core datatype?

A. Lists

B. Dictionary

C. Tuples

D. Class

ANSWER: D

192.What is the output when following code is executed ? print r”\nhello” The output is

A. a new line and hello

B. \nhello

C. the letter r and then hello

D. Error

ANSWER: B

193.What is the output of the following code ? example = “snow world” example[3] = ‘s’ print example

A. snow

B. snow world

C. Error

D. snos world

ANSWER: C

194.What is the output of “hello”+1+2+3 ?

A. hello123

B. hello

C. Error

D. hello6

ANSWER: C

195.Suppose i is 5 and j is 4, i + j is same as

A. i.__add(j)

B. i.__add__(j)

C. i.__Add(j)

D. i.__ADD(j)

ANSWER: B

196.What is the output of the following? print(‘*’, “abcdef”.center(7), ‘*’)

A. * abcdef *

B. * abcdef *

C. *abcdef *

D. * abcdef*

ANSWER: B

197 .What is the output of the following? print(“xyyzxyzxzxyy”.count(‘xyy’, 2, 11))

A. 2

B. 0

C. 1

D. Error

ANSWER: B

198.What is the output of the following? print(“Hello {1} and {0}”.format(‘bin’, ‘foo’))

A. Hello foo and bin

B. Hello bin and foo

C. Error

D. None of the mentioned

ANSWER: A

199.What is the output of the following? print(‘The sum of {0} and {1} is {2}’.format(2, 10, 12))

A. The sum of 2 and 10 is 12

B. Error

C. The sum of 0 and 1 is 2

D. None of the mentioned

ANSWER: A

200.What is the output of the following? print(‘ab’.isalpha())

A. True

B. False

C. None

D. Error

ANSWER: A

201.What is the output of the following? print(‘1.1’.isnumeric())

A. True

B. False

C. None

D. Error

ANSWER: B

202.What is the output of the following? print(‘a’.maketrans(‘ABC’, ‘123’))

A. {97: 49, 98: 50, 99: 51}

B. {65: 49, 66: 50, 67: 51}

C. {97: 49}

D. 1

ANSWER: A

203.What is the output of the following? print(‘xyyxyyxyxyxxy’.replace(‘xy’, ’12’, 100))

A. xyyxyyxyxyxxy

B. 12y12y1212x12

C. none of the mentioned

D. error

ANSWER: B

204.What is the output of the following? print(‘abcd’.translate({‘a’: ‘1’, ‘b’: ‘2’, ‘c’: ‘3’, ‘d’: ‘4’}))

A. abcd

B. 1234

C. error

D. none of the mentioned

ANSWER: A

205.Cloud Computing When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model.

A. SaaS

B. PaaS

C. IaaS

D. All of the mentioned

ANSWER: A

206.Which of the following is most refined and restrictive service model ?

A. IaaS

B. CaaS

C. PaaS

D. All of the mentioned

ANSWER: C

207.All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity.

A. propagation

B. latency

C. noise

D. All of the mentioned

ANSWER: B

208.Cloud computing is a _______ system and it is necessarily unidirectional in nature.

A. stateless

B. stateful

C. reliable

D. 4

ANSWER: A

209. Which of the following is best known service model ?

A. SaaS

B. IaaS

C. PaaS

D. All of the mentioned

ANSWER: D

210.The __________ model originally did not require a cloud to use virtualization to pool resources.

A. NEFT

B. NIST

C. NIT

D. All of the mentioned

ANSWER: B

211.Which of the following is related to service provided by Cloud ?

A. Sourcing

B. Ownership

C. Reliability

D. AaaS

ANSWER: A

212.________ dimension corresponds to two different states in the eight possible cloud forms.

A. Physical location of data

B. Ownership

C. Security boundary

D. None of the mentioned

ANSWER: D

213._______ is a complete operating environment with applications, management, and the user interface.

A. IaaS

B. SaaS

C. PaaS

D. All of the mentioned

ANSWER: B

214.Which of the following cloud concept is related to pooling and sharing of resources?

A. Polymorphism

B. Abstraction

C. Virtualization

D. None of the mentioned

ANSWER: C

215.DBMS The candidate key is that you choose to identify each row uniquely is called ……………..

A. Alternate Key

B. Primary Key

C. Foreign Key

D. None of the above

ANSWER: B

216.…………….. is used to determine whether a table contains duplicate rows.

A. Unique predicate

B. Like Predicate

C. Null predicate

D. In predicate

ANSWER: A

217.To eliminate duplicate rows ……………… is used

A. NODUPLICATE

B. ELIMINATE

C. DISTINCT

D. None of these

ANSWER: C

218.State true or false i. A candidate key is a minimal super key. ii. A candidate key can also refer to a surrogate key.

A. i-true, ii-false

B. i-false, ii-true

C. i-true, ii-true

D. i-false, ii-false

ANSWER: C

219.DCL stands for

A. Data Control Language

B. Data Console Language

C. Data Console Level

D. Data Control Level

ANSWER: A

220.…………………… is the process of organizing data into related tables.

A. Normalization

B. Generalization

C. Specialization

D. None of the above

ANSWER: A

221.A ………………. Does not have a distinguishing attribute if its own and most are dependent entities, which are part of some another entity.

A. Weak entity

B. Strong entity

C. Non-attributes entity

D. Dependent entity

ANSWER: A

222.…………….. is the complex search criteria in the where clause.

A. Substring

B. Drop Table

C. Predict

D. Predicate

ANSWER: D

223.………………… is the preferred method for enforcing data integrity

A. Constraints

B. Stored Procedure

C. Triggers

D. Cursors

ANSWER: A

224.The number of tuples in a relation is called its …………. While the number of attributes in a relation is called it’s ………………..

A. Degree, Cardinality

B. Cardinality, Degree

C. Rows, Columns

D. Columns, Rows

ANSWER: B

225.The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is

A. Procedural DML

B. Non-Procedural DML

C. Procedural DDL

D. Non-Procedural DDL

ANSWER: B

226.Which two files are used during the operation of the DBMS?

A. Query languages and utilities

B. DML and query language

C. Data dictionary and transaction log

D. Data dictionary and query language

ANSWER: C

227.The database schema is written in

A. HLL

B. DML

C. DDL

D. DCL

ANSWER: C

228.The way a particular application views the data from the database that the application uses is a

A. module

B. relational model

C. schema

D. subschema

ANSWER: D

229 .The relational model feature is that there

A. is no need for primary key data

B. is much more data independence than some other database models

C. are explicit relationships among records.

D. are tables with many dimensions

ANSWER: B

230.Which one of the following statements is false?

A. The data dictionary is normally maintained by the database administrator

B. Data elements in the database can be modified by changing the data dictionary.

C. The data dictionary contains the name and description of each data element.

D. A data dictionary is a tool used exclusively by the database administrator.

ANSWER: B

231.Which of the following are the properties of entities?

A. Groups

B. Table

C. Attributes

D. Switchboards

ANSWER: C

232.Which database level is closest to the users?

A. External

B. Internal

C. Physical

D. Conceptual

ANSWER: A

233.Which are the two ways in which entities can participate in a relationship?

A. Passive and active

B. Total and partial

C. Simple and Complex

D. All of the above

ANSWER: B

234. …….. data type can store unstructured data

A. RAW

B. CHAR

C. NUMERIC

D. VARCHAR

ANSWER: A

235 .DBMS is a collection of ………….. that enables user to create and maintain a database.

A. Keys

B. Translators

C. Program

D. Language Activity

ANSWER: C

236.In a relational schema, each tuple is divided into fields called

A. Relations

B. Domains

C. Queries

D. All of the above

ANSWER: B

237.In an ER model, ……………. is described in the database by storing its data.

A. Entity

B. Attribute

C. Relationship

D. Notation

ANSWER: A

238.DFD stands for

A. Data Flow Document

B. Data File Diagram

C. Data Flow Diagram

D. Non of the above

ANSWER: C

239. A top-to-bottom relationship among the items in a database is established by a

A. Hierarchical schema

B. Network schema

C. Relational Schema

D. All the mentioned options

ANSWER: A

240.……………… table store information about database or about the system.

A. SQL

B. Nested

C. System

D. None of these

ANSWER: C

241. …………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs.

A. Instance

B. Schema

C. Program

D. Super Key

ANSWER: B

242. ……………… clause is an additional filter that is applied to the result.

A. Select

B. Group-by

C. Having

D. Order by

ANSWER: C

243 .A logical schema

A. is the entire database

B. is a standard way of organizing information into accessible parts.

C. Describes how data is actually stored on disk.

D. All of the above

ANSWER: B

244. .………………… is a full form of SQL.

A. Standard query language

B. Sequential query language

C. Structured query language

D. Server side query language

ANSWER: C

245. A relational database developer refers to a record as

A. a criteria

B. a relation

C. a tuple

D. an attribute

ANSWER: C

246. .………. keyword is used to find the number of values in a column.

A. TOTAL

B. COUNT

C. ADD

D. SUM

ANSWER: B

247.An advantage of the database management approach is

A. data is dependent on programs

B. data redundancy increases

C. data is integrated and can be accessed by multiple programs

D. none of the above

ANSWER: C

              Module 3: MCQ with correct answer on Database Theory concept from 

248 . A primary key if combined with a foreign key creates .

a). Parent-Child relationship between the tables that connect them.

b). Many to many relationship between the tables that connect them.

c). Network model between the tables that connect them.

d). None of the above

Correct answer: a) Parent-Child relationship between the tables that connect them

249 . In E-R Diagram relationship type is represented by .

a). Ellipse

b). Dashed Ellipsed

c). Rectangle

d). Diamond

Correct answer: d) Diamond

250. Hierarchical model is also called .

a) Tree structure

b) Plex Structure

c). Normalize Structure

d). Table Structure

Correct answer: a) Tree structure

251. To delete a particular column in a relation the command used is:

a). UPDATE

b). DROP

c). ALTER

d). DELETE

Correct answer: c) ALTER

252.  The ______ operator is used to compare a value to a list of literals

values that have been specified.

a). BETWEEN

b). ANY

c). WHERE

d). ALL

Correct answer: a) BETWEEN

253. A logical schema .

a) is the entire database.

b) is a standard way of organizing information into a accessible part.

c) describes how data is actually stored on disk.

d) None of these.

Correct answer: d) None of the these

254. A data manipulation command that combines the records from one or more tables is called ?

a) SELECT

b). PROJECT

c). JOIN

d). PRODUCT

Correct answer: c) JOIN

255. In E-R diagram generalization is represented by .

a). Ellipse

b). Dashed ellipse

c) Rectangle

d). Triangle

Correct answer: d) Triangle

256.  ________ is a virtual table that draws its data from the result of an SQL SELECT statement.

a). View

b). Synonym

c). Sequence

d). Transaction

Correct answer: a) View

257. The method of access which uses key transformation is known as

a). Direct

b). Hash

c). Random

d). Sequential

Correct answer: b) Hash

258. The view of total database content is ____________

a) Conceptual view

b) Internal view

c) External view

d) Physical View.

Correct answer: a) Conceptual view

259. The database schema is written in _________________

a) DDL

b) DCL

c) DML

d) HLL

Correct answer: a) DLL

260. In Hierarchical model records are organized as___________

a) Graph

b) List

c) Link

d) Tree

Correct answer: d) Tree

261. A sub-schema expresses ______________

a) Conceptual view

b) Internal view

c) External view

d) Physical View.

Correct answer: c) External view

262. SET concept is used in :_________________

a) Network Model

b) Relational Model

c) Hierarchical Model

d) ER Model

Correct answer: a) Network Model

263. The relationship associating the weak entity sets with the identifying entity set is called as ________

a) Identifying relationship

b) Connecting relationship

c) Completing relationship

d) Unique relationship

Correct answer: a) Identifying relationship

264. Relational Algebra is a __________ query language that takes two relations as input and produces another relation as an output of the query.

a) Relational

b) Structural

c) Procedural

d) Fundamental

Correct answer: c) Procedural

265. Which one of the following statements is false?

a) The data dictionary is normally maintained by the database administrator.

b) Data elements in the database can be modified by changing the data dictionary.

c) The data dictionary contains the name and description of each data element.

d) A data dictionary is a tool used exclusively by the database administrator.

Correct answer: b) Data elements in the database can be modified by changing the data dictionary

266. ____________ means to hide certain details of how data is stored and maintain.

a) Data Integrity

b) Data Abstraction

c) Data Isolation

d) None of these

Correct answer: b) Data Abstraction

267. For select operation the ________ appear in the subscript and the ___________ argument appears in the parenthesis after the sigma

a) Predicates, relation

b) Relation, Predicates

c) Operation, Predicates

d) Relation, Operation

Correct answer: a) Predicates, relation

268. A table can have

a) One primary key

b) Two primary keys

c) Three primary keys

d) Unlimited primary keys

Correct answer: a) Option 1

269. Which key creates a relationship between two tables

a) Primary Key

b) Foreign key

c) Candidate Key

d) Compound Key

Correct answer: b) Option 2

270. The long form of DDL is 

a) Data Duplicate Language

b) Data Dedicated Language

c) Data Definition Language

d) Data Determining Language

Correct answer: c) Option 3

271. Relational Algebra is a

a) programming language

b) structure query language

c) non-procedural query language

d) procedural query language

Correct answer: d) Option 4

272. The relational model ( RM ) for database management is first described by

English computer scientist Edgar F Codd

e) in 1967

f) in 1968

g) in 1969

h) in 1970

Correct answer: g) Option 3

273. In relational algebra select operation is denoted by the

e) symbol: ς

f) symbol: ρ

g) symbol: π

h) symbol: υ

Correct answer: e) Option 1

274. Which of the following concept is not present in MongoDB

e) Documents

f) Collections

g) Field

h) Joins

Correct answer: h) Option 4

275. First-order logic—also known as

i) queue logic

j) stack logic

k) predicate logic

l) preceding logic

Correct answer: k) Option 3

276. The following represents the name of the relation with its attributes.

i) Relation instance

j) Relation schema

k) Relation key

l) Attribute domain

Correct answer: j) Option 2

277. Which of the following is not correct

i) ALTER TABLE <table_name>

ADD <column_name datatype>;

j) ALTER TABLE <table_name>

CHANGE <old_column_name> <new_column_name>;

k) ALTER TABLE <table_name>

DROP COLUMN <column_name>;

l) ALTER TABLE <database_name, table_name>

SET <column_name = value>

Correct answer: l) Option 4

MCQ with correct answer on AWS Cloud Theory concept from Module 3:

278. Which of the cloud service models provide hardware infrastructure along with operating

system and runtime environments for applications?

a) Infrastructure as a Service (IaaS)

b) Platform as a Service (PaaS)

c) Database as a Service (DBaaS)

d) Software as a Service (SaaS)

Correct answer: b) Platform as a Service (PaaS)

279. Which deployment model allows you to host part of your application in cloud and remaining

within your on-premises infrastructure?

a) Public

b) Private

c) Hybrid Cloud

d) Community Cloud

Correct answer: c) Hybrid

280. Which among is/are service(s) that can be provided by cloud environment for online live

webinars?

a) Video Encoding

b) Content Sharing

c) Multipoint Scaling

d) All of the mentioned

Correct answer d) All of the mentioned

281. Which service among the following is an AWS service for running event driven

functionalities?

a) Lambda

b) EC2

c) Route 53

d) Glacier

Correct answer a) Lambda

282. Which service in AWS can be used for storing data archives, not accessed frequently?

a) EBS

b) S3 Bucket

c) Glacier

d) EFS

Correct answer: c) Glacier

283. Method(s) to access Amazon Web Services includes:

a) CLI

b) SDK

c) Management Console (Web Based GUI)

d) All of the mentioned

Correct answer d) All of the mentioned

284. Which among the following is the service in AWS used for managing user accounts and

permissions?

a) Route 53

b) Lambda

c) AWS Shield

d) AWS Identity and Access Management

Correct answer d) AWS Identity and Access Management

285. A location from where cloud services are being accessed by users is known as

a) Region

b) Zone

c) Edge Location

d) Data Center

Correct answer: c) Edge Location

286. Which among the following is NOT a default feature of cloud computing environment?

a) High Availability

b) Fault Tolerance

c) Scalability

d) Auto Deletion

Correct answer d) Auto Deletion

287. Ability to grow or scale when required and reduce in size when resources are no longer

needed.

a) Elasticity

b) Scalability

c) Availability

d) Reliability

Correct answer a) Elasticity

 

Computer MCQ Fundamental Series 01 : Click Here

Computer MCQFundamental Series 02 : Click Here

 

 

Spread the love

22 thoughts on “Computer MCQ Questions and Answers”

Leave a Comment

Your email address will not be published.

Scroll to Top