CCCComputer Cource 100+ MCQ & Answer CCC | page-02 | Computer Course MCQ And Answer January 28, 2025 DSN MARATHI 11. The most common type of storage devices are … A. Persistent. B. Optical. C. Magnetic. D. Flash. Answer Option : C 12. There are ….. parts to a computer system. A. 2. B. 4. C. 16. D. 100. Answer Option : B 13. During the ….. portion of the information Processing Cycle, the computer accquires data from some source. A. Processing. B. Storage. C. Input. D. Output. Answer Option : C 14. The ……. tells the computer how to use its components. A. Utility. B. Network. C. Operating system. D. Mother bread. Answer Option : C 15. An output device that lets you see what the computer in doing ……. A. A disk drive. B. Monitor-screen. C. Shift key. D. Printer. Answer Option : B 16. All of the are examples of real security and privacy risks EXCEPT. A. Hackers. B. Spam C. Viruses. D. Identify theft. Answer Option : B 17. A process known as ……. is used by large retailers to study trends. A. Data mining. B. Data selection. C. POS. D. Data conversion. Answer Option : A 18. ……… terminals (formerly known as cash registers) are often connected to complex inventory and sales computer. A. Data. B. Point-of-scale (POS). C. Sales. D. Query. Answer Option : B
11. The most common type of storage devices are … A. Persistent. B. Optical. C. Magnetic. D. Flash. Answer Option : C
13. During the ….. portion of the information Processing Cycle, the computer accquires data from some source. A. Processing. B. Storage. C. Input. D. Output. Answer Option : C
14. The ……. tells the computer how to use its components. A. Utility. B. Network. C. Operating system. D. Mother bread. Answer Option : C
15. An output device that lets you see what the computer in doing ……. A. A disk drive. B. Monitor-screen. C. Shift key. D. Printer. Answer Option : B
16. All of the are examples of real security and privacy risks EXCEPT. A. Hackers. B. Spam C. Viruses. D. Identify theft. Answer Option : B
17. A process known as ……. is used by large retailers to study trends. A. Data mining. B. Data selection. C. POS. D. Data conversion.
18. ……… terminals (formerly known as cash registers) are often connected to complex inventory and sales computer. A. Data. B. Point-of-scale (POS). C. Sales. D. Query.
19. ……… system is a small , wireless handheld computer that scans and item’s tag and pulls up the current price (and any special offers) as you shop. A. PSS. B. POS. C. Inventory. D. Data mining.
20. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called. A. Robotics. B. Simulation. C. Computer forensics. D. Animation.