Computer MCQ Questions and Answers Quiz

141. Computers manipulate data in many ways, and this manipulation is called......

  1. upgrading
  2. processing
  3. batching
  4. utilizing

142. What is the most common tool used to restrict access to a computer system?

  1. User logins
  2. Passwords
  3. Computer keys
  4. Access-control software

143. Switching device of fifth generation computer is--------

  1. Vacuum tubes
  2. Transistors
  3. IC
  4. VLSI

144. VOIP stands for..........

  1. Voice over IP
  2. Video over IP
  3. Viruses over IP
  4. Virtual over IP

145. Which of the following is/ are operating systems

  1. Windows
  2. Unix
  3. OS/2
  4. All of these

146. A program that performs a useful task while simultaneously allowing destructive acts is a:

  1. Worm.
  2. Trojan horse.
  3. Virus.
  4. Macro virus.

147. The typical computer criminal is a(n):

  1. Young hacker.
  2. Trusted employee with no criminal record.
  3. Trusted employee with a long, but unknown criminal record.
  4. Overseas young cracker.
Tags

MCQ Multiple Choice Questions and Answers on Computer

Computer Question and Answer