Computer MCQ for Railway Exams. We covered all the Computer MCQ for Railway Exams in this post for free so that you can practice well for the exam.
Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.
These types of competitive MCQs appear in exams like SSC, Railway, Bank, Delhi Police, UPSSSC, UPSC (Pre), State PCS, CDS, NDA, Assistant Commandant, and other Competitive Examinations, etc.
We created all the competitive exam MCQs into several small posts on our website for your convenience.
You will get their respective links in the related posts section provided below.
Related Posts:
- Computer MCQ Practice Tests Online
- How to Prepare for Computer MCQ Exams
- Computer Science MCQ for Gate Exam
Computer MCQ for Railway Exams Students
Which of the following is Stuxnet?
(a) Trojan
(b) Antivirus
(c) Worm
(d) Virus
Option c – Worm
Which of the following ethical hacking techniques is used for determining which operating system (OS) is running on a remote computer? ( Computer MCQ for Railway Exams )
(a) Operating System fingerprinting
(b) Operating System penetration testing
(c) Digital-printing
(d) Machine printing
Option a – Operating System fingerprinting
Which of the following can diminish the chance of data leakage?
(a) Steganography
(b) Chorography
(c) Cryptography
(d) Authentication
Option a – Steganography
In which of the following, a person is constantly followed or chased by another person or group of several people? ( Computer MCQ for Railway Exams )
(a) Phishing
(b) Bullying
(c) Stalking
(d) Identity theft
Option c – Stalking
Which one of the following can be considered as a class of computer threats?
(a) DoS Attack
(b) Phishing
(c) Soliciting
(d) Both A and C
Option a – DoS Attack
Which of the following is considered unsolicited commercial email? ( Computer MCQ for Railway Exams )
(a) Virus
(b) Malware
(c) Spam
(d) All of the above
Option c – Spam
Which of the following usually observes each activity on the internet of the victim, gathers all information in the background, and sends it to someone else?
(a) Malware
(b) Spyware
(c) Adware
(d) All of the above
Option b – Spyware
Which of the following actions compromise cybersecurity?
(a) Vulnerability
(b) Attack
(c) Threat
(d) Exploit
Option c – Threat
Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic? ( Computer MCQ for Railway Exams )
(a) Pharming
(b) Website-Duplication
(c) Mimicking
(d) Spamming
Option a – Pharming
Which of the following is not a type of peer-to-peer cyber-crime?
(a) MiTM
(b) Injecting Trojans to a target victim
(c) Credit card details leak in the deep web
(d) Phishing
Option c – Credit card details leak in the deep web
A cyber-criminal or penetration tester uses additional data that stores certain special instructions in memory for activities to break the system in which of the following attacks? ( Computer MCQ for Railway Exams )
(a) Clickjacking
(b) Buffer-overflow
(c) Phishing
(d) MiTM
Option b – Buffer-overflow
Which of the following do cyber attackers commonly target for fetching the IP address of a target or victim user?
(a) IP tracker
(b) Emails
(c) Websites
(d) Web pages
Option c – Websites
Which of the following is defined as an attempt to harm, damage, or cause a threat to a system or network? ( Computer MCQ for Railway Exams )
(a) Digital crime
(b) Threats
(c) System hijacking
(d) Cyber Attack
Option d – Cyber Attack
Nefarious hackers whose main motive is to gain financial profit by committing cyber crimes are known as:
(a) White Hat Hackers
(b) Black Hat Hackers
(c) Hacktivists
(d) Gray Hat Hackers
Option b – Black Hat Hackers
IT security in any firm or organization is maintained and handled by: ( Computer MCQ for Railway Exams )
(a) Software Security Specialist
(b) CEO of the organization
(c) Security Auditor
(d) IT Security Engineer
Option d – IT Security Engineer
Where did the term “hacker” originate?
(a) MIT
(b) New York University
(c) Harvard University
(d) Bell’s Lab
Option a – MIT
What is the existence of weakness in a system or network known as? ( Computer MCQ for Railway Exams )
(a) Attack
(b) Exploit
(c) Vulnerability
(d) Threat
Option c – Vulnerability
Which of the following is an internet scam where users are digitally convinced by cyber-criminals to provide confidential information?
(a) MiTM attack
(b) Phishing attack
(c) Website attack
(d) DoS attack
Option b – Phishing attack
Which of the following is not a step followed by cyber-criminals in data breaching?
(a) Exfiltration
(b) Research & info-gathering
(c) Attack the system
(d) Fixing the bugs
Option d – Fixing the bugs
Which of the following online service’s privacy cannot be protected using Tor? ( Computer MCQ for Railway Exams )
(a) Browsing data
(b) Instant messaging
(c) Login using ID
(d) Relay chats
Option c – Login using ID
Which of the following terms refers to a group of hackers who are both white and black hat?
(a) Yellow Hat Hackers
(b) Grey Hat Hackers
(c) Red Hat Hackers
(d) White-Black Hat Hackers
Option b – Grey Hat Hackers
(a) Mail Password
(b) Email Finder Pro
(c) Mail Pass View
(d) Sendinc
Option d – Sendinc
Which of the following DDoS attacks in mobile systems wait for the owner to trigger the cyber attack?
(a) Botnets
(b) Programs
(c) Virus
(d) Worms
Option a – Botnets
Which of the following is the least strong security encryption standard? ( Computer MCQ for Railway Exams )
(a) WPA3
(b) WPA2
(c) WPA
(d) WEP
Option d – WEP
Each record is constituted by a number of individual data items which are called:
(a) Fields
(b) Data Types
(c) Relations
(d) Tables
Option a – Fields
Which of the following is not a database object in MS Access?
(a) Tables
(b) Query
(c) Report
(d) Relationship
Option d – Relationship
A database object in MS Access that stores a question about the data in the database is:
(a) Table
(b) Form
(c) Query
(d) Report
Option c – Query
The complete information about an entity in a database is called:
(a) Data
(b) Information
(c) Field
(d) Record
Option d – Record
Which of the following statement is true?
(a) Reports can be used to retrieve data from tables & calculate
(b) Queries can be printed in well-formatted manner & presented as the information
(c) Queries can include calculated fields that do not exist in a table
(d) Reports & forms are similar, but forms are used to print while reports display on the screen only
Option c – Queries can include calculated fields that do not exist in a table
It is a query that, when run, displays its own dialog box prompting you for information, such as:
(a) Select
(b) Crosstab
(c) Parameter
(d) Append
Option c – Parameter
It is used to calculate & restructure data for easier analysis of your data. It calculates the sum:
(a) Parameter
(b) Select
(c) Crosstab
(d) Append
Option c – Crosstab
What is the maximum length a text field can be?
(a) 120
(b) 255
(c) 265
(d) 75
Option b – 255
Which of the following statement is true?
(a) Foreign key fields don’t allow duplicate values
(b) In the primary key field, you can enter duplicate values
(c) In an indexed field, you may or may not enter duplicate values depending on the setting
(d) All statements are true
Option c – In an indexed field, you may or may not enter duplicate values depending on the setting
Microsoft Access is a:
(a) RDBMS
(b) OODBMS
(c) ORDBMS
(d) Network database model
Option a – RDBMS
If you need to edit a relationship:
(a) Right-click the relationship line & choose Edit Relationship
(b) Double-click the relationship line
(c) Both of the above
(d) None of the above
Option c – Both of the above
DCL provides commands to perform actions like:
(a) Change the structure of tables
(b) Insert, update, or delete records & data values
(c) Authorizing access & other control over the database
(d) None of the above
Option c – Authorizing access & other control over the database
Which of the following stores commands to retrieve data from a database?
(a) Forms
(b) Reports
(c) Queries
(d) Tables
Option c – Queries
Both conditions display on the same row in the design grid when the operator is in use:
(a) OR
(b) IN
(c) AND
(d) LIKE
Option c – AND
If you write criteria values vertically (one in a row), it will mean:
(a) OR conditions
(b) AND conditions
(c) NOT condition
(d) None of the above
Option a – OR conditions
The key uniquely identifies each record in a table:
(a) Primary key
(b) Keyword
(c) Field name
(d) All of the above
Option a – Primary key
What do you mean by a one-to-many relationship between the Student & Class table?
(a) One student can have many classes
(b) One class may have many students
(c) Many classes may have many students
(d) Many students may have many classes
Option a – One student can have many classes
A part of a database that stores only one type of data is:
(a) Report
(b) Field
(c) Query
(d) Record
Option b – Field
Which of the following may not be a database?
(a) Data presented in a table in an MS Word document
(b) Data entered in an Excel spreadsheet
(c) A presentation created in PowerPoint
(d) A telephone diary
Option c – A presentation created in PowerPoint
A database can be best described as:
(a) Organized collection of data
(b) Useful presentation of data
(c) Graphical representation of data
(d) All of the above
Option a – Organized collection of data
(a) Attributes
(b) Tuples
(c) Relationship
(d) Columns
Option d – Columns
(a) File
(b) Bench
(c) Table
(d) Relationship
Option a – File
The task of arranging data in order is called:
(a) Searching
(b) Sorting
(c) Ordering
(d) Shorting
Option b – Sorting
Cascade-update option:
(a) Means do not change the value in the primary key field if that record has related records in another table
(b) Means change all the related records in child tables if the record in the parent table is changed
(c) Both of the above
(d) None of the above
Option c – Both of the above
You can set a control’s border type to make the border invisible:
(a) Transparent
(b) Invisible
(c) Do not display
(d) No border
Option c – Do not display
The database language that allows you to access or maintain data in a database:
(a) DCL
(b) DML
(c) DDL
(d) None of the above
Option b – DML
Referential integrity means:
(a) Do not enter a value in the foreign key field of a child table if that value does not exist in the primary key of the parent table
(b) Do not enter a value in the primary key field of the child table if that value does not exist in the primary key of the parent table
(c) Do not enter a value in the foreign key field of a parent table if that value does not exist in the primary key of the child table
(d) All of the above
Option a – Do not enter a value in the foreign key field of a child table if that value does not exist in the primary key of the parent table
To duplicate a control’s formatting, you can use:
(a) Manager
(b) Wizard
(c) Painter
(d) Control
Option c – Painter
Which field type will you select when creating a new table if you require to enter long text in that field?
(a) Text
(b) Memo
(c) Currency
(d) Hyperlink
Option b – Memo
(a) Indicate Primary Key
(b) Indicate Current Row
(c) Both of the above
(d) None of the above
Option c – Both of the above
What does the “Show” checkbox in the query design window indicate?
(a) Whether the field is to be used or not
(b) Whether the field is to be displayed in the query result or not
(c) Whether the field names are to be displayed in the query result or not
(d) None of the above
Option b – Whether the field is to be displayed in the query result or not
Which of the following is not a type of relationship that can be applied in an Access database?
(a) One to One
(b) One to Many
(c) Many to Many
(d) All of the above can be applied
Option d – All of the above can be applied
This option allows you to build a new table by entering data directly into the datasheet:
(a) Datasheet view
(b) Design view
(c) Link table
(d) None of the above
Option a – Datasheet view
To create queries in Access:
(a) You can drag & drop fields on query builders
(b) You can type the SQL command in SQL view
(c) You can use query wizard or design view
(d) All of the above
Option d – All of the above
Following is not a database model:
(a) Network database model
(b) Relational database model
(c) Object-oriented database model
(d) None
Option d – None
In table design view, which key can be used to switch between the field names & properties panels?
(a) F3
(b) F4
(c) F5
(d) F6
Option d – F6
Which of the following is NOT a type of Microsoft Access database object?
(a) Table
(b) Form
(c) Worksheets
(d) Modules
Option c – Worksheets
Which field has a width of 8 bytes?
(a) Memo
(b) Number
(c) Date/Time
(d) Hyperlink
Option c – Date/Time
Which is not a view to display a table in Access?
(a) Datasheet View
(b) Design View
(c) Pivot Table & Pivot Chart View
(d) None of the above
Option d – None of the above
Which of the following database objects hold data?
(a) Forms
(b) Reports
(c) Queries
(d) Tables
Option d – Tables
(a) Subform/subreport
(b) Relationships
(c) Select objects
(d) More controls
Option a – Subform/subreport
The Expression Builder is an Access tool that controls an expression for entering an expression:
(a) Table
(b) Box
(c) Cell
(d) Palette
Option b – Box
A query enables you to view data from a table based on a specific criterion:
(a) Form
(b) Query
(c) Macro
(d) Report
Option b – Query
Which of the following database objects produces the final result to present?
(a) Forms
(b) Reports
(c) Queries
(d) Tables
Option b – Reports
The default & maximum size of a text field in Access:
(a) 50 & 255 Characters
(b) 8 & 1 GB
(c) 266 Characters & 64,000 Characters
(d) None of the above
Option a – 50 & 255 Characters
We covered all the Computer MCQ for Railway Exams above in this post for free so that you can practice well for the exam.
Check out the latest MCQ content by visiting our mcqtube website homepage.
Also, check out:
- Computer Fundamentals MCQ for Bank Exams
- Basic Computer MCQ for Competitive Exams
- Computer Science MCQ for Beginners with Answers