Category Archives: Computer MCQs

A Person who used his or her expertise to gain access to other People’s Computers to get information illegally or do damage is a ?

A. Hacker
B. spammer
C. instant messenger
D. programmer

A device that Connects to a network without the use of cables is said to be ?

A. Distributed
B. free
C. centralized
D. none of these

The most Common type of Storage devices are ?

A. magnetic storage
B. Flash memory
C. optical
D. Both A & B

Why is it unethical to share copyrighted files with your friends?

A. It is not unethical, because it is legal.
B. It is unethical because the files are being given for free.
C. Sharing copyrighted files without permission breaks copyright laws.
D. It is not unethical because the files are being given for free.

Codes consisting of lines of varying widths or lengths that are Computer-readable are known as ?

A. an ASCII code
B. a magnetic tape
C. an OCR scanner
D. a bar code

______are used to identify a user who returns to a Website?

A. Cookies
B. Plug-ins
C. Scripts
D. ASPs

The_____ data mining technique derives rules from real-world case examples?

A. Rule discover
B. Signal processing
C. Neural nets
D. Case-based reasoning

Where does most data go first with in a Computer memory hierarchy ?

A. RAM
B. ROM
C. BIOS
D. CACHE

The Ability to recover and read deleted or damaged files from a criminal’s Computer is an example of a law Enforcement speciality called ?

A. robotics
B. simulation
C. computer forensics
D. animation