MCQs > IT & Programming > Computer Science MCQs > Introduction to computer MCQs

Introduction to computer MCQ

In an html table, the ___ tag is used to define a new row

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

The digital ____ method of writing has made plagiarism easy and ever more common.

Answer

Correct Answer: Cut-and-paste

Note: This Question is unanswered, help us to find answer for this one

One way to identify a particular digital item (collection of bits) is by means of a(n) ____.

Answer

Correct Answer: Cryptographic hash

Note: This Question is unanswered, help us to find answer for this one

_____ is the algorithm implemented on most systems.

Answer

Correct Answer: LRU

Note: This Question is unanswered, help us to find answer for this one

The windows registry is organized into five sections referred to as __________.

Answer

Correct Answer: Hives

Note: This Question is unanswered, help us to find answer for this one

Decision-support systems (dss) focus on problems ________.

Answer

Correct Answer: That require supporting more non-routine decision making

Note: This Question is unanswered, help us to find answer for this one

Decision support data tend to be non-normalized, ____, and pre-aggregated.

Answer

Correct Answer: Duplicated.

Note: This Question is unanswered, help us to find answer for this one

Decision making is enhanced by a diverse group of ________, such as data mining and fuzzy logic.

Answer

Correct Answer: Intelligent techniques

Note: This Question is unanswered, help us to find answer for this one

The exact appearance of each page is described in a separate document known as a ______.

Answer

Correct Answer: Style sheet.

Note: This Question is unanswered, help us to find answer for this one

The current ip standard lengthens ip addresses from ____.

Answer

Correct Answer: 32 bits to 128 bits

Note: This Question is unanswered, help us to find answer for this one

The css3 _____________ property allows you to rotate, scale, skew, or move an element.

Answer

Correct Answer: Transform

Note: This Question is unanswered, help us to find answer for this one

The css box model is composed of a series of concentric boxes containing ____.

Answer

Correct Answer: Element content

Note: This Question is unanswered, help us to find answer for this one

The creators of java chose ____ characters as the extra length for a stringbuilder object.

Answer

Correct Answer: 16

Note: This Question is unanswered, help us to find answer for this one

The command>accountsfile ____.

Answer

Correct Answer: Creates an empty file called accountsfile

Note: This Question is unanswered, help us to find answer for this one

The browser feature where tabs are independent of each other is known as ________.

Answer

Correct Answer: Tab isolation

Note: This Question is unanswered, help us to find answer for this one

Our e-textbook, emerge with computers, is an example of ____.

Answer

Correct Answer: Online education

Note: This Question is unanswered, help us to find answer for this one

Online __________ are two or more online personas with the same name or user name.

Answer

Correct Answer: Doppelgangers

Note: This Question is unanswered, help us to find answer for this one

Patents expire after ______ to encourage competition and innovation.

Answer

Correct Answer: 20 years from the application date

Note: This Question is unanswered, help us to find answer for this one

The dmca was drafted and passed by the ____.

Answer

Correct Answer: US

Note: This Question is unanswered, help us to find answer for this one

Internet explorer ____ can be applied only to objects that have a defined layout on the page.

Answer

Correct Answer: Width

Note: This Question is unanswered, help us to find answer for this one

Instead of writing a term paper, some people cheat and purchase one from a(n) ________.

Answer

Correct Answer: Paper mill

Note: This Question is unanswered, help us to find answer for this one

Powerpoint provides a wide variety of ____ shapes that can add visual interest to a slide.

Answer

Correct Answer: Predefined.

Note: This Question is unanswered, help us to find answer for this one

With the ____, the instructions in the loop are repeated as long as a certain condition is false.

Answer

Correct Answer: Do until structure

Note: This Question is unanswered, help us to find answer for this one

Conventional dial-up connects to the internet at a maximum of ____.

Answer

Correct Answer: 56 Kbps

Note: This Question is unanswered, help us to find answer for this one

Dropbox, microsoft one drive, and icloud are all examples of ________.

Answer

Correct Answer: Cloud storage

Note: This Question is unanswered, help us to find answer for this one

Drm protects intellectual property by ____.

Answer

Correct Answer: Limiting how many devices can use a file, and how many times it can be copied.

Note: This Question is unanswered, help us to find answer for this one

A keyboard access key is assigned to a button using the button control's ________ property.

Answer

Correct Answer: Text

Note: This Question is unanswered, help us to find answer for this one

A help desk software package that includes asset management can help a support staff control ____.

Answer

Correct Answer: An organization's equipment inventory

Note: This Question is unanswered, help us to find answer for this one

A game console relies on a fast _____ to handle the lively animations in a video game.

Answer

Correct Answer: Microprocessor

Note: This Question is unanswered, help us to find answer for this one

A fixed-length field contains a predetermined number of ____.

Answer

Correct Answer: Bytes

Note: This Question is unanswered, help us to find answer for this one

A criterion may be negated by using the ____ logical operator.

Answer

Correct Answer: Not

Note: This Question is unanswered, help us to find answer for this one

A controls ____ event occurs when a change is made to the contents of a controls text property.

Answer

Correct Answer: Text Changed

Note: This Question is unanswered, help us to find answer for this one

A computer ____ permits traffic to leave and enter a computer.

Answer

Correct Answer: Port

Note: This Question is unanswered, help us to find answer for this one

A company that contracts with another organization that specializes in user support is using ____.

Answer

Correct Answer: Outsourcing

Note: This Question is unanswered, help us to find answer for this one

A company network that is accessible to authorized outsiders is called a(n) ____.

Answer

Correct Answer: Extranet

Note: This Question is unanswered, help us to find answer for this one

A common sata numbering method uses the term _______________ for each controller.

Answer

Correct Answer: Channels

Note: This Question is unanswered, help us to find answer for this one

A bundle of bitmapped images that appear in a sequence is called an animated ______.

Answer

Correct Answer: GIF

Note: This Question is unanswered, help us to find answer for this one

A blocking program for protecting children from online objectionable adult material is ________.

Answer

Correct Answer: Cybersitter, Cyber Patrol, Net Nanny

Note: This Question is unanswered, help us to find answer for this one

A ____________________ technician goes to a customer site in response to a service call.

Answer

Correct Answer: PC support

Note: This Question is unanswered, help us to find answer for this one

A ________ is formatted as a pattern of uniformly spaced horizontal rows and vertical columns.

Answer

Correct Answer: Worksheets

Note: This Question is unanswered, help us to find answer for this one

A _____ is an entrance to a multifunction website.

Answer

Correct Answer: Portal

Note: This Question is unanswered, help us to find answer for this one

A _____ is a number that summarizes an encrypted information.

Answer

Correct Answer: Message Digest

Note: This Question is unanswered, help us to find answer for this one

A _____ is a computer with the ability to perform trillions of calculations per second.

Answer

Correct Answer: Computer

Note: This Question is unanswered, help us to find answer for this one

A _____ can be destructive and can modify or delete files that may not be recoverable.

Answer

Correct Answer: Macro virus

Note: This Question is unanswered, help us to find answer for this one

A ____ occurs when a limitation in a single computer system component slows down the entire system.

Answer

Correct Answer: Bottleneck

Note: This Question is unanswered, help us to find answer for this one

A ____ is equal to exactly 1,024 bytes, but often is rounded down to 1,000 bytes by computer users.

Answer

Correct Answer: Kilobyte (abbreviated K or KB)

Note: This Question is unanswered, help us to find answer for this one

A ____ is an agreed-upon way of doing something within an industry.

Answer

Correct Answer: Standard

Note: This Question is unanswered, help us to find answer for this one

A ____ is a temporary detour in the logic of a program.

Answer

Correct Answer: Control break

Note: This Question is unanswered, help us to find answer for this one

A ____ is a specific design with coordinating colors, fonts, and special effects.

Answer

Correct Answer: Document theme

Note: This Question is unanswered, help us to find answer for this one

A ____ enables a web server to keep track of your activity and compile a list of your purchases.

Answer

Correct Answer: Cookie

Note: This Question is unanswered, help us to find answer for this one

Development of software is not a frequent user support function is an example of ____.

Answer

Correct Answer: Nominalization

Note: This Question is unanswered, help us to find answer for this one

_________________ uses a device's gps to define geographical boundaries where an app can be used.

Answer

Correct Answer: Geo-Fencing

Note: This Question is unanswered, help us to find answer for this one

__________ sensors project and detect an infrared beam across an area.

Answer

Correct Answer: Photoelectric

Note: This Question is unanswered, help us to find answer for this one

________ software is used to perform calculations and numerical analyses.

Answer

Correct Answer: Spreadsheet

Note: This Question is unanswered, help us to find answer for this one

________ shrinks the width and height of the printed worksheet to fit a maximum number of pages.

Answer

Correct Answer: Scaling

Note: This Question is unanswered, help us to find answer for this one

_____ is the fastest-growing literary genre in the history of the written word.

Answer

Correct Answer: Fan fiction

Note: This Question is unanswered, help us to find answer for this one

Careers in computer ____ focus on the design of computer hardware.

Answer

Correct Answer: Engineering

Note: This Question is unanswered, help us to find answer for this one

As you search for a file, a green progress bar appears in the ____ bar.

Answer

Correct Answer: Address bar

Note: This Question is unanswered, help us to find answer for this one

____ work well when multiple people are collaborating and commenting on a worksheet.

Answer

Correct Answer: Comments

Note: This Question is unanswered, help us to find answer for this one

____ software can control which devices can be connected to an employees computer.

Answer

Correct Answer: Data-leakage prevention

Note: This Question is unanswered, help us to find answer for this one

____ sets are used to organize form elements.

Answer

Correct Answer: Field

Note: This Question is unanswered, help us to find answer for this one

____ reference sources include almanacs, dictionaries, directories, and encyclopedias.

Answer

Correct Answer: Online

Note: This Question is unanswered, help us to find answer for this one

____ provide additional resource material not included in the body of the report.

Answer

Correct Answer: Appendixes

Note: This Question is unanswered, help us to find answer for this one

____ means assigning a beginning value to a counter or an accumulator.

Answer

Correct Answer: Initializing

Note: This Question is unanswered, help us to find answer for this one

____ is designed only for windows and should not be solely relied upon for web multimedia.

Answer

Correct Answer: Activex

Note: This Question is unanswered, help us to find answer for this one

____ is charged with such responsibilities as ip address allocation and domain name management.

Answer

Correct Answer: ICANN

Note: This Question is unanswered, help us to find answer for this one

With regard to the security threat/loss scenario, human error would be categorized as a ________.

Answer

Correct Answer: Threat

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ is a network designed to service an urban area, typically a city or county.

Answer

Correct Answer: Metropolitan area network (MAN)

Note: This Question is unanswered, help us to find answer for this one

Hotspots are defined through the use of ____ maps.

Answer

Correct Answer: Image

Note: This Question is unanswered, help us to find answer for this one

If two borders have the same width but different styles, ____ borders have the highest priority.

Answer

Correct Answer: Double

Note: This Question is unanswered, help us to find answer for this one

An integrated circuit embodies what is called ________ technology

Answer

Correct Answer: Solid state

Note: This Question is unanswered, help us to find answer for this one

Retrograde amnesia is usually less severe for ______ memories.

Answer

Correct Answer: Remote

Note: This Question is unanswered, help us to find answer for this one

To send information to the nucleus accumbens, the _________ uses _________.

Answer

Correct Answer: Ventral tegmental area; dopamine

Note: This Question is unanswered, help us to find answer for this one

A(n) _________________ is a memory aid that helps people recall important information.

Answer

Correct Answer: Memory enhancement device

Note: This Question is unanswered, help us to find answer for this one

In the path c:\book\chapter8\images\fly.jpg, chapter8 is _____.

Answer

Correct Answer: A subfolder under

Note: This Question is unanswered, help us to find answer for this one

In stop-motion animation, a single photograph is called a ____.

Answer

Correct Answer: Frame

Note: This Question is unanswered, help us to find answer for this one

One rsi related to the repetitive movements made when using a keyboard is ____.

Answer

Correct Answer: Carpal tunnel syndrome (CTS)

Note: This Question is unanswered, help us to find answer for this one

The bus width and bus speed together determine the buss ____.

Answer

Correct Answer: Throughput

Note: This Question is unanswered, help us to find answer for this one

In critical thinking, a hypothesis is usually based on a ____.

Answer

Correct Answer: Mental model

Note: This Question is unanswered, help us to find answer for this one

In several languages, the visual development environment is known by the acronym ____.

Answer

Correct Answer: IDE

Note: This Question is unanswered, help us to find answer for this one

The exact separator that follows the communications protocol depends on the ____.

Answer

Correct Answer: Slashes.

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ is a collection of an individuals work accessible through a web site.

Answer

Correct Answer: Stores

Note: This Question is unanswered, help us to find answer for this one

The input/output unit manages data and instructions entering and leaving the ____________.

Answer

Correct Answer: Processor

Note: This Question is unanswered, help us to find answer for this one

A calculated field created in a query generates results when ____.

Answer

Correct Answer: When the query is run

Note: This Question is unanswered, help us to find answer for this one

With a(n) ____ connection, the unit of transmission is a sequence of characters.

Answer

Correct Answer: Synchronous

Note: This Question is unanswered, help us to find answer for this one

Favorites, also called ____________________, are links to preferred websites.

Answer

Correct Answer: Bookmarks

Note: This Question is unanswered, help us to find answer for this one

A user who presses the wrong sequence of keys in a software program is a victim of ____.

Answer

Correct Answer: A user mistake

Note: This Question is unanswered, help us to find answer for this one

One of the most recognized privacy seals is the ____ trustmark.

Answer

Correct Answer: TRUSTe

Note: This Question is unanswered, help us to find answer for this one

____ consists of predrawn electronic images.

Answer

Correct Answer: Clip art

Note: This Question is unanswered, help us to find answer for this one

____ are the standard for business documents and come in both personal and network versions.

Answer

Correct Answer: Laser printers

Note: This Question is unanswered, help us to find answer for this one

Once a web site has been carefully designed, it is time to create it. this process is called ____.

Answer

Correct Answer: Web site development

Note: This Question is unanswered, help us to find answer for this one

The term ____ refers to one resource available through the ____.

Answer

Correct Answer: WWW WWW

Note: This Question is unanswered, help us to find answer for this one

Encryption keys are generally ____ or ____ bits long.

Answer

Correct Answer: 64, 128

Note: This Question is unanswered, help us to find answer for this one

Dust buildup inside a desktop pc case can be managed effectively by ____.

Answer

Correct Answer: Vacuuming the inside of the case

Note: This Question is unanswered, help us to find answer for this one

Don draper holds _________________ over conrad hilton.

Answer

Correct Answer: Reward power

Note: This Question is unanswered, help us to find answer for this one

Disabling the ssid broadcast of a network makes that network ____ to roaming devices.

Answer

Correct Answer: ​invisible

Note: This Question is unanswered, help us to find answer for this one

The ____ tag was used to insert embedded content prior to html5.

Answer

Correct Answer:

Note: This Question is unanswered, help us to find answer for this one

To enter a blank line into a document, press the ____ key without typing any text on the line.

Answer

Correct Answer:

Note: This Question is unanswered, help us to find answer for this one

When you select a control on a form in the designer window, ________.

Answer

Correct Answer: Its sizing handles appear

Note: This Question is unanswered, help us to find answer for this one

When a search returns __________, you can view the results as a list.

Answer

Correct Answer: Statistical values

Note: This Question is unanswered, help us to find answer for this one

Unauthorized use and system failure are both examples of a ____.

Answer

Correct Answer: Digital security risk

Note: This Question is unanswered, help us to find answer for this one

To start a new line in a cell press the ____ keys

Answer

Correct Answer: TAB+ENTER

Note: This Question is unanswered, help us to find answer for this one

To create a polygonal hotspot, you enter the coordinates for each ____ in the shape.

Answer

Correct Answer: Corner

Note: This Question is unanswered, help us to find answer for this one

To create a cell that spans two rows in a table, you enter the tag as ____.