250+ TOP MCQs on Unicode and Answers

Computer Fundamentals Multiple Choice Questions on “Unicode”.

1. The numbers used to represent numeric values in EBCDIC are _______
a) zoned
b) unsigned
c) packed
d) eb

Answer: a
Clarification: Zoned numbers represent the numeric values under EBCDIC (Extended Binary Coded Decimal Interchange Code). In zoned format, there is only one digit per byte.

2. Unicode provides a consistent way of encoding multilingual plain text.
a) True
b) False

Answer: a
Clarification: Unicode defines codes for characters used in all major languages of the world.
It is a coding system which supports almost all the languages. It defines special codes for different characters, symbols, diacritics, etc.

3. Which of the following is not a type of numeric value in zoned format?
a) Positive
b) Negative
c) Double
d) Unsigned

Answer: c
Clarification: The zoned format can represent numeric values of type Positive, negative and unsigned numbers. A sign indicator is used in the zone position of the rightmost digit.

4. The sign indicator of unsigned numbers is ____________
a) C
b) D
c) F
d) X

Answer: c
Clarification: A sign indicator is used in the zone position of the rightmost digit. A sign indicator C is used for positive, D for negative and F is used for negative numbers.

5. The EBCDIC value of the number 345 in zoned format is __________
a) F3F4F5
b) E3E4E5
c) F3F4C5
d) F3F4D5

Answer: a
Clarification: F is used for the representation of unsigned numbers therefore, F3F4F5 represents 345. F3F4C5 represents +345 . F3F4D5 represents -345.

6. Which of the following is a valid encoding format?
a) UTF-1
b) UTF-8
c) UTF-A
d) UTF-4

Answer: b
Clarification: The various encoding formats are UTF-8, UTF-16 and UTF-32. UTF stands for Unicode Transformation Format. It is basically an encoding system that supports all languages.

7. _________________ defines the assigned ordering among the characters used by the computer.
a) Unicode
b) Collating Sequence
c) Accumulation
d) Sorting

Answer: b
Clarification: Collating sequence is the term used for ordering among characters. It may vary depending upon the type of code used by a computer.

8. The sorting sequence of the strings A1,23,1A will be ______________
a) 23 > A1 > 1A
b) 23 < 1A > A1
c) A1 > 1A > 23
d) A1 < 1A < 23

Answer: d
Clarification: The sorting order is A1, 1A, 23. Numeric characters are given a greater preference in EBCDIC as compared to the alphabets.

9. The default character coding in HTML-5 is _____________
a) UTF-8
b) UTF-16
c) UTF-4
d) UTF-32

Answer: a
Clarification: HTML5 which is the hypertext markup language generally uses the UTF-8 format as its default encoding. Unicode covers all the characters and symbols in all the different languages.

10. Numbers used in packed decimal format can be used for _____________ operations.
a) logical
b) relational
c) arithmetic
d) bitwise

Answer: c
Clarification: The packed numbers can be used for arithmetic operations. The packed numbers also require the lesser number of bytes as compared to zoned numbers.

250+ TOP MCQs on Sequential & Direct Access and Answers

Computer Fundamentals test on “Sequential & Direct Access”.

1. Computer has a built-in system clock that emits millions of regularly spaced electric pulses per _____ called clock cycles.
a) second
b) millisecond
c) microsecond
d) minute

Answer: a
Clarification: The regularly spaced electric pulses per second are referred to as the clock cycles. All the jobs performed by the processor are on the basis of clock cycles.

2. It takes one clock cycle to perform a basic operation.
a) True
b) False

Answer: a
Clarification: It takes exactly one clock cycle to perform a basic operation, such as moving a byte of memory from a location to another location in the computer.

3. The operation that does not involves clock cycles is ____________
a) Installation of a device
b) Execute
c) Fetch
d) Decode

Answer: a
Clarification: Normally, several clock cycles are required to fetch, execute and decode a particular program. Installation of a device is done by the system on its own.

4. The number of clock cycles per second is referred as ______
a) Clock speed
b) Clock frequency
c) Clock rate
d) Clock timing

Answer: a
Clarification: The number of clock cycles per second is the clock speed. It is generally measured in gigahertz(109 cycles/sec) or megahertz (106 cycles/sec).

5. CISC stands for ___________
a) Complex Information Sensed CPU
b) Complex Instruction Set Computer
c) Complex Intelligence Sensed CPU
d) Complex Instruction Set CPU

Answer: b
Clarification: CISC is a large instruction set computer. It has variable length instructions. It also has a variety of addressing modes.

6. Which of the following processor has a fixed length of instructions?
a) CISC
b) RISC
c) EPIC
d) Multi-core

Answer: b
Clarification: The RISC which stands for Reduced Instruction set computer has a fixed length of instructions. It has a small instruction set. Also has reduced references to memory to retrieve operands.

7. Processor which is complex and expensive to produce _________
a) RISC
b) EPIC
c) CISC
d) multi-core

Answer: c
Clarification: CISC stands for complex instruction set computer. It is mostly used in personal computers. It has a large instruction set and a variable length of instructions.

8. The architecture that uses a tighter coupling between the compiler and the processor.
a) EPIC
b) Multi-core
c) RISC
d) CISC

Answer: a
Clarification: EPIC stands for Explicitly parallel instruction computing. It has a tighter coupling between the compiler and the processor. It enables the compiler to extract maximum parallelism in the original code.

9. HLDA stands for _______
a) High level data
b) High level data acknowledgment
c) Hold Acknowledgement
d) Hold Data

Answer: c
Clarification: The HOLD signal is given to the CPU whenever an interrupt is to be served. If the CPU is ready to give the control of the bus, it gives the HLDA command which is Hold Acknowledgement.

10. Word length of a personal computer ___________
a) 64bits
b) 16 bits
c) 8 bits
d) 32 bits

Answer: c
Clarification: The word length which is the size of a word is generally 8 bits in a personal computer. Word Size is generally the number of bits that can be processed in one go by the CPU.

250+ TOP MCQs on Pseudo Code and Answers

Computer Fundamentals Multiple Choice Questions on “Pseudo Code”.

1. Keep the statement language ______________ while writing a pseudo code.
a) Dependent
b) Independent
c) Case sensitive
d) Capitalized

Answer: b
Clarification: The statement’s language should be independent. Other rules are to write only one statement per line and end multiline structures.

2. Capitalize initial keyword – This is a rule while writing a pseudo code.
a) True
b) False

Answer: a
Clarification: The statement is true. It is an important rule to capitalize the initial keyword while writing a pseudo code.

3. Which of the following is not a keyword?
a) Read
b) Write
c) start
d) endif

Answer: c
Clarification: Start is not a Keyword. Other words like read, write, if, else, etc are keywords and convey a special meaning.

4. ______________ is used to show hierarchy in a pseudo code.
a) Indentation
b) Curly Braces
c) Round Brackets
d) Semicolon

Answer: a
Clarification: Each design structure uses a particular indentation pattern.
Indentation should be considered in the following cases:
Sequence
Selection
Loop.

5. The statement that tells the computer to get a value from an input device and store it in a memory location.
a) read
b) write
c) READ
d) WRITE

Answer: c
Clarification: The READ statement is used to take the input. READ being a keyword should be in capital letters.

6. _____________ are identified by their addresses, we give them names (field names / variable names) using words.
a) Memory variables
b) Memory Locations
c) Memory Addresses
d) Data variables

Answer: b
Clarification: Memory locations are identified by their addresses, we give them names (field names/variable names) using words descriptive to us such as ctr as opposed to a location addresses such as 19087.

7. ____________ begins with lower case letters.
a) Keywords
b) Variables
c) Tokens
d) Functions

Answer: b
Clarification: Variables begin with a lowercase. They contain no spaces. They also involve the consistent use of names.

8. Another notation for exponentiation.
a) *
b) **
c) ***
d) *^

Answer: b
Clarification: Double asterisk sign is also used for exponentiation. The general notation is ^ sign.

9. A symbol used for grouping.
a) ()
b) {}
c) [].
d) ” ”

Answer: a
Clarification: Parenthesis is used for grouping while working with fields. There are other symbols like *, +, -, **, etc.

10. A statement used to close the IF block.
a) ELSE
b) ELSEIF
c) END
d) ENDIF

Answer: d
Clarification: The answer is ENDIF. It is used to close the IF block. ENDIF statement should be in line with the IF statement.

250+ TOP MCQs on File Management and Answers

Computer Fundamentals Multiple Choice Questions on “File Management”.

1. A basic element of data in a file.
a) Memory
b) Record
c) Field
d) Value

Answer: c
Clarification: Fields are the basic elements of data in a file. e.g. student’s last name. It contains a single value.

2. Records are treated as a unit.
a) True
b) False

Answer: a
Clarification: The statement is true. Records are a collection of related fields. They are treated as a unit.

3. __________________ refers to the logical structuring of records.
a) Physical organisation
b) Logical organisation
c) Structural organisation
d) File organisation

Answer: d
Clarification: File organisation refers to the logical structuring of records. It is determined bi the way in which files are accessed.

4. Which of the following is not an appropriate criterion for file organisation?
a) Larger access time
b) ease of update
c) simple maintenance
d) economy of storage

Answer: a
Clarification: The answer is Larger access time. The access time should be short. It is an important criteria for file organisation.

5. ___________ itself is a file owned by the operating system
a) Logical file
b) Record
c) Database
d) Directory

Answer: d
Clarification: Directory is the file owned by the operating system. File directory contains various important information.

6. Which of the following isn’t a part of the file directory?
a) Attributes
b) Protocol
c) Location
d) Ownership

Answer: b
Clarification: File directory contains important information like: Attributes, Location and Ownership.

7. Allocated size of a file comes under?
a) basic information
b) address information
c) access control information
d) usage information

Answer: b
Clarification: Allocated size comes under the address information of a file. Address information consists of volume, starting address, size used and size allocated.

8. Which of the following is not a part of the usage information?
a) data created
b) identity of creator
c) owner
d) last date modified

Answer: c
Clarification: Owner is a part of the access control information. Other options are a part of usage information of a file.

9. When access is granted to append or update a file to more than one user, the OS or file management system must enforce discipline. This is _________
a) Simultaneous access
b) Compaction
c) External Fragmentation
d) Division

Answer: a
Clarification: When access is granted to append or update a file to more than one user, the OS or file management system must enforce discipline. It is referred as simultaneous access.

10. The user can load and execute a program but cannot copy it. This process is?
a) Execution
b) Appending
c) Reading
d) Updating

Answer: a
Clarification: Execution is a process that user can load and execute a program but cannot copy it. Other processes are updation, changing protection, etc.

250+ TOP MCQs on FTP & HTTP and Answers

Computer Fundamentals Multiple Choice Questions on “FTP & HTTP”.

1. A program that can retrieve files from the world wide web and render text, images or sounds encoded in the files.
a) Browser
b) Internet
c) Server
d) Web Server

Answer: a
Clarification: A browser or a web browser is a program that can retrieve files from the world wide web. Certain examples are IE, Mozilla, etc.

2. An HTML file is a text file containing small markup tags.
a) True
b) False

Answer: a
Clarification: The statement is true. HTML stands for Hyper Text Markup Language. It is a text file containing small markup tags.

3. Which of the following is not a type of browser?
a) Netscape
b) Web
c) IE
d) Mozilla

Answer: b
Clarification: Others except web are web browsers. Web is a type of server. Application that works on client requests.

4. Both client and server release _________ connection after a page has been transferred.
a) IP
b) TCP
c) Hyperlink
d) Network

Answer: b
Clarification: The answer is TCP. TCP stands for Transmission Control Protocol. Servers receive requests from clients.

5. In HTML, the tags that tell the browser how to display the page.
a) markup
b) style
c) body
d) head

Answer: a
Clarification: Markup is a general term used to refer the types of tags in HTML. The markup tags tell the browser how to display the page.

6. FTP stands for?
a) File Text Protocol
b) File Transfer Protocol
c) Firm Transfer Protocol
d) File Transplant Protocol

Answer: b
Clarification: FTP stands for File Transfer Protocol. It is a type of internet service use for the transmission of files.

7. A section in HTML that contains generic information about the document.
a) body
b) title
c) head
d) style

Answer: c
Clarification: The head segment contains a generic info about the document. The head section must come before the body section in an HTML document.

8. A tag similar to that of the italic tag.
a)
b)
c)
d)

Answer: b
Clarification: is a container tag in html that is citation generally in italics. Other tags like or emphasize is also used for this purpose.

9. A _________ partitions a web browser window so that multiple web documents can be displayed simultaneously.
a) Frame
b) set
c) Frameset
d) div

Answer: c
Clarification: A frameset partitions a web browser window so that multiple web documents can be displayed simultaneously. Frameset can have attributes like cols.

10. The _________ attribute specifies the web page to be placed in the frame initially.
a) name
b) src
c) cols
d) rows

Answer: b
Clarification: The src attribute or the source specifies the web page to be placed in the frame initially. It may be subsequently overwritten.

250+ TOP MCQs on Cryptography and Answers

Computer Fundamentals Multiple Choice Questions on “Cryptography”.

1. These ciphers replace a character or characters with a different character or characters, based on some key.
a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Mono alphabetic substitution based

Answer: d
Clarification: In mono alphabetic substitution-based cipher, a character is replaced with some other character or multiple characters, based on some key.

2. Encryption is the study of creating and using decryption techniques.
a) True
b) False

Answer: b
Clarification: The statement is false. Cryptography is the study of creating and using encryption and decryption techniques.

3. A type of cipher that uses multiple alphabetic strings.
a) Substitution based
b) Transposition-based
c) Polyalphabetic substitution based
d) Mono alphabetic substitution based

Answer: c
Clarification: These ciphers are similar to that of mono alphabetic ciphers. Multiple strings are used to encode the plain text.

4. An encryption technique with 2 keys is ______________
a) Monoalphabetic Cipher
b) Cryptography
c) Private key cryptography
d) Public key cryptography

Answer: d
Clarification: It is called as public key cryptography. It has 2 keys: a private key and a public key.

5. In public key cryptography, a key that decrypts the message.
a) public key
b) unique key
c) private key
d) security key

Answer: c
Clarification: Public key cryptography has 2 keys. They are private key and a public key. The public key encrypts the message. The private key decrypts the message.

6. DES stands for?
a) Data Encryption Standard
b) Data Encryption Statistics
c) Data Encryption System
d) Data Encryption Sequence

Answer: a
Clarification: DES stands for Data Encryption Standard. It was created in 1977 and went into operation from 1990s.

7. Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption.
a) 64
b) 8
c) 16
d) 4

Answer: c
Clarification: The answer is 16. It was subjected to 16 levels of encryption. DES is the data encryption standard.

8. Triple-DES has ______ keys.
a) 1
b) 2
c) 5
d) 4

Answer: b
Clarification: There are 2 keys in triple DES as well. The private and the public key. It can also have 3 unique keys.

9. Encryption standard that is selected by the US government to replace DES.
a) AES
b) BES
c) CES
d) DES

Answer: a
Clarification: AES is Advanced Encryption Standard. It was selected by the US government. It is used to replace DES.

10. An electronic document that establishes your credentials when you are performing transactions.
a) Digital code
b) OTP
c) E-mail
d) Digital certificate

Answer: d
Clarification: Digital certificate is an electronic document that is responsible for secure internet transactions.