Computer MCQ Questions and Answers Quiz

141. Computers manipulate data in many ways, and this manipulation is called......

  1. upgrading
  2. processing
  3. batching
  4. utilizing

142. What is the most common tool used to restrict access to a computer system?

  1. User logins
  2. Passwords
  3. Computer keys
  4. Access-control software

143. Switching device of fifth generation computer is--------

  1. Vacuum tubes
  2. Transistors
  3. IC
  4. VLSI

144. VOIP stands for..........

  1. Voice over IP
  2. Video over IP
  3. Viruses over IP
  4. Virtual over IP

145. Which of the following is/ are operating systems

  1. Windows
  2. Unix
  3. OS/2
  4. All of these

146. A program that performs a useful task while simultaneously allowing destructive acts is a:

  1. Worm.
  2. Trojan horse.
  3. Virus.
  4. Macro virus.

147. The typical computer criminal is a(n):

  1. Young hacker.
  2. Trusted employee with no criminal record.
  3. Trusted employee with a long, but unknown criminal record.
  4. Overseas young cracker.
Tags

MCQ Multiple Choice Questions and Answers on Computer

Computer Trivia Questions and Answers PDF

Computer Question and Answer

Spreading Education Across the World

USA - United States of America  Canada  United Kingdom  Australia  New Zealand  South America  Brazil  Portugal  Netherland  South Africa  Ethiopia  Zambia  Singapore  Malaysia  India  China  UAE - Saudi Arabia  Qatar  Oman  Kuwait  Bahrain  Dubai  Israil  England  Scotland  Norway  Ireland  Denmark  France  Spain  Poland  and many more....