Class 9 Computer Grand Practice MCQs Test

Class 9 Computer Grand Practice MCQs Test

904

Class 9 Computer Science
Grand MCQs Practice Test 1

1 / 50

Which of the following user interface is the easiest one to learn and use?

2 / 50

All the input/output devices are connected to the:

3 / 50

Which of the following Windows icon allows users to access a program, file or folder quickly?

4 / 50

Which interface is based on textual input?

5 / 50

Third generation computers used:

6 / 50

DVD stands for:

7 / 50

It is a pointing device with a vertical lever mounted on a base.

8 / 50

It is a magnetic storage device used to store computer data.

9 / 50

It loads programs into memory and executes them.

10 / 50

The types of memories on the motherboard are:

11 / 50

Slid Rule was developed in 1614 by:

12 / 50

Which of the following is volatile memory?

13 / 50

Which of the following operating system must process information and produce a response within a specified time?

14 / 50

When were IC chips developed?

15 / 50

OCR stands for:

16 / 50

The period of the fourth generation computers is from:

17 / 50

Which of the following interface uses window, icon, menu, and a pointer to interact with computer?

18 / 50

In which generation of computer microprocessor was introduced?

19 / 50

It is the main chip on the motherboard that controls all the activities of the computer.

20 / 50

The period of the third generation computers was from:

21 / 50

Which generation of computer used transistor?

22 / 50

Which of the following Windows icon allows users to access the contents of computer drives and manage files and folders?

23 / 50

What type of software a device driver is?

24 / 50

Which software is given free of cost for an unlimited period of time.

25 / 50

The old name of International Business Machines (IBM) was:

26 / 50

In which of the following operating system, CPU is switched rapidly between all the programs to simultaneously execute all of them?

27 / 50

Which of the following is the fastest memory?

28 / 50

Which of the following is open source operating system?

29 / 50

Which software is distributed free of cost for a limited period as a trial version?

30 / 50

Which of the following is known as main memory or primary memory of computer?

31 / 50

First generation computers used:

32 / 50

The storage capacity of a DVD is in the range of:

33 / 50

Which of the following computer supports thousands of users at the same time?

34 / 50

Who invented logarithm?

35 / 50

The software which can convert an image of text into a text file that can be edited is known as:

36 / 50

Which of the following operating system allows many users to use a computer at the same time?

37 / 50

Which of the following operating system was introduced in 1969?

38 / 50

It is faster and more expensive than RAM.

39 / 50

Which one is a volatile memory?

40 / 50

Who is responsible for protecting information and information systems from unauthorized people in an organization?

41 / 50

Second generation computers used:

42 / 50

The period of the second generation computers was from:

43 / 50

Who is known as the father of modern digital computers?

44 / 50

It is a very small amount of extremely fast memory inside the microprocessor or on the motherboard.

45 / 50

It refers to the physical components that make up a computer system.

46 / 50

Fourth generation computers use:

47 / 50

The period of the first generation computers was from:

48 / 50

These are used to transmit information between various components of the computer.

49 / 50

These are the electric pathways printed on the motherboard.

50 / 50

The purpose of using this memory is to improve the processing speed of computer.

Your score is

0%

Please rate this quiz and give your feedback.


498

Class 9 Computer Science
Grand MCQs Practice Test 2

1 / 50

In which type of data transmission start/stop bits are used?

2 / 50

Novell’s Netware and ProDOS are the examples of:

3 / 50

Which of the following is NOT a communication device?

4 / 50

To create a new folder in Windows Explorer simply press the following keys:

5 / 50

_________ is difficult to use because users have to remember the commands to perform any task.

6 / 50

A device driver is a:

7 / 50

Google Chrome is an example of:

8 / 50

Flight Gear (flight simulator) is an example of:

9 / 50

The purpose of twisting the cables is:

10 / 50

Slide rule was replaced by electronic pocket calculator in the early: 

11 / 50

A process is a program _________.

12 / 50

___________  is a collection of system software that controls the working of a computer
system.

13 / 50

It acts as an interface between the computer user and computer.

14 / 50

Abacus was the earliest calculating device most probably invented in:

15 / 50

It is a single user and single task operating system.

16 / 50

Today’s modern digital computers are based on the idea of:

17 / 50

Which of the following device forwards information from one network to another by selecting the best pathway available?

18 / 50

The process of converting digital signals into analog signals is called:

19 / 50

What represents the overall data transmission capacity of a computer network?

20 / 50

‘Pairing’ of devices is done in:

21 / 50

In which of the following transmission mode, information is transmitted in both directions but not simultaneously?

22 / 50

UNIX was developed for use on ______.

23 / 50

LAN stands for:

24 / 50

Which of the following is NOT included in guided media?

25 / 50

Which of the following is used for short-distance communication?

26 / 50

It can be viewed as a resource manager.

27 / 50

The process of converting analog signals into digital signals is called:

28 / 50

Which of the following device is used for connecting computers together in wireless local area networks?

29 / 50

MS-DOS was replaced by:

30 / 50

____________ is the set of rules between the two communicating devices.

31 / 50

VLC media player is an example of:

32 / 50

Which of the following device is used for connecting computers together in wired local area networks?

33 / 50

Microsoft introduced the MS-DOS in ______.

34 / 50

The operating system gives full control over a computer system to a person known as:

35 / 50

Rate of change of electrical signals per second is called:

36 / 50

The name of built-in anti-virus software in Windows 10 is:

37 / 50

The first antivirus software was developed by Bernd Fix in: 

38 / 50

In which of the following network, every computer can act as a client, server, or both at the same time?

39 / 50

Which of the following is similar between Synchronous and Asynchronous transmission?

40 / 50

In which of the following transmission, time interval between the characters is always same?

41 / 50

It loads programs into memory and executes them.

42 / 50

______ invented the world’s first microprocessor in November 1971.

43 / 50

Which transmission media uses light waves for transmitting information?

44 / 50

 It is a multi-user CLI operating system.

45 / 50

In which of the following impairment, the strength of signal falls off with distance?

46 / 50

Which folder in Windows is the default folder where the user saves files?

47 / 50

For installation of Windows 10 operating system, while booting  the computer, make sure DVD is set as the:

48 / 50

Antivirus software is an example of:

49 / 50

ENIAC stands for:

50 / 50

Which of the following impairment refers to undesired signals that enter the path of the transmitted signal due to electromagnetic radiation?

Your score is

0%

Please rate this quiz and give your feedback.


342

Class 9 Computer Science
Grand MCQs Practice Test 3

1 / 52

Which malware spreads automatically in computer networks and replicates itself

2 / 52

WI–FI uses:

3 / 52

The operating system which processes information and produces response within a specified time is

4 / 52

Modulator/Demodulator refers to ________ device.

5 / 52

If an electrical signal has four states then it will _________ the bit transfer rate.

6 / 52

Which of the following authentication method is used for opening security gates?

7 / 52

Which of the following network topology uses a device called terminator?

8 / 52

What is a person who uses special tools for breaking into computer systems called?

9 / 52

What is the ready state of a process?

10 / 52

Which of the following is not a type of computer on the basis of operation?

11 / 52

_____________ is designed to solve a specific problem or to do a specific task.

12 / 52

Transmitting and receiving antennas must be with in the line of sight in ____________.

13 / 52

Which of the following is not the state of a process?

14 / 52

Which of the following provides high speed Internet connection?

15 / 52

Which of the following topology is most expensive to implement?

16 / 52

Which one of the following errors will be handle by the operating system?

17 / 52

By operating system, the resource management can be done viav__________.

18 / 52

Which of the following is not a process state?

19 / 52

The processor which can perform all the operations and calculations is called:

20 / 52

Which of the following authentication method is most reliable?

21 / 52

Assembler is used as a translator for:

22 / 52

Which of the following network provides centralized security?

23 / 52

Which of the following network is used to provide Cable TV and Internet services?

24 / 52

Which of the following is not an example of system software?

25 / 52

______________ are used for solving complex application such as Global Weather Forecasting.

26 / 52

Which of the following malware gathers information about user activities on computer?

27 / 52

VLSI stands for :

28 / 52

__________ network device is used to connect computers in a wireless local area network.

29 / 52

They normally interact with the system via the user interface provided by the application software.

30 / 52

A set of processes is deadlock if __________

31 / 52

_________ is a processing system in which jobs are collected, enters into a computer altogether and then computer executes them one by one

32 / 52

What is a person who illegally breaks into others’ computer systems called?

33 / 52

A term that defines the direction of flow of information between devices.

34 / 52

If the signal to noise ratio is higher than 1:1 that means:

35 / 52

In which of the following network topology, a switch is required?

36 / 52

A light-sensitive device that converts drawing, printed text, or other printed images into digital form is:

37 / 52

Which is the correct association between a computer hardware component and a computer function?

38 / 52

An alternative of mouse present in laptop computers is:

39 / 52

Which one of the following is open-source software?

40 / 52

Start and stop bits are not used in ______________ transmission.

41 / 52

Which of the following authentication methodology is used to draw cash from ATM?

42 / 52

The solution to attenuation is:

43 / 52

Components used for interconnecting dissimilar networks that use different communication protocols.

44 / 52

Which of the following authentication method is based on features of individual such as face, fingerprint and voice?

45 / 52

Which of the following computer shares resources on a network for others to use?

46 / 52

Which of the following is designed to control the operations of a computer?

47 / 52

Which one of them is not a non-impact printer?

48 / 52

What is making illegal copies of copyright software for use on other computers or sale called?

49 / 52

A transmission impairment that refers to change in shape or frequency of digital signal is ____________.

50 / 52

What do you call a program in execution?

51 / 52

Which of following network connects computers across cities, countries and continents?

52 / 52

Which of the following malware displays advertisements on the screen?

Your score is

0%

Please rate this quiz and give your feedback.


Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *