Questions ▼
Computer MCQ for Railway Exams. We covered all the Computer MCQ for Railway Exams in this post for free so that you can practice well for the exam.
Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.
These types of competitive MCQs appear in exams like SSC, Railway, Bank, Delhi Police, UPSSSC, UPSC (Pre), State PCS, CDS, NDA, Assistant Commandant, and other Competitive Examinations, etc.
We created all the competitive exam MCQs into several small posts on our website for your convenience.
You will get their respective links in the related posts section provided below.
Related Posts:
- Computer MCQ Practice Tests Online
- How to Prepare for Computer MCQ Exams
- Computer Science MCQ for Gate Exam
Computer MCQ for Railway Exams Students
Quick Quiz
What is Stuxnet categorized as?
a. Trojan
b. Antivirus
c. Worm
d. Virus
Option c – Worm
Which ethical hacking method identifies the OS on a remote system?
a. Operating System fingerprinting
b. Operating System penetration testing
c. Digital-printing
d. Machine printing
Option a – Operating System fingerprinting
Which method helps reduce the risk of data leaks?
a. Steganography
b. Chorography
c. Cryptography
d. Authentication
Option a – Steganography
What term describes the act of being continuously followed by an individual or group?
a. Phishing
b. Bullying
c. Stalking
d. Identity theft
Option c – Stalking
Which of the following is considered a type of computer threat?
a. DoS Attack
b. Phishing
c. Soliciting
d. Both A and C
Option a – DoS Attack
What is the term for unsolicited promotional emails?
a. Virus
b. Malware
c. Spam
d. All of the above
Option c – Spam
Which software monitors user activity online and secretly sends data to another party?
a. Malware
b. Spyware
c. Adware
d. All of the above
Option b – Spyware
What compromises cybersecurity?
a. Vulnerability
b. Attack
c. Threat
d. Exploit
Option c – Threat
What is the technique of faking websites to mislead users?
a. Pharming
b. Website-Duplication
c. Mimicking
d. Spamming
Option a – Pharming
Which of the following does not qualify as a peer-to-peer cybercrime?
a. MiTM
b. Injecting Trojans into targets
c. Credit card detail leaks on the deep web
d. Phishing
Option c – Credit card detail leaks on the deep web
Which attack type uses extra data to overload memory and disrupt systems?
a. Clickjacking
b. Buffer-overflow
c. Phishing
d. MiTM
Option b – Buffer-overflow
What source do hackers often use to retrieve a target’s IP address?
a. IP tracker
b. Emails
c. Websites
d. Web pages
Option c – Websites
What is defined as an attempt to damage or disrupt a computer system or network?
a. Digital crime
b. Threats
c. System hijacking
d. Cyber Attack
Option d – Cyber Attack
What type of hacker is driven primarily by financial motives?
a. White Hat Hackers
b. Black Hat Hackers
c. Hacktivists
d. Gray Hat Hackers
Option b – Black Hat Hackers
Who is responsible for handling cybersecurity in an organization?
a. Software Security Specialist
b. CEO of the organization
c. Security Auditor
d. IT Security Engineer
Option d – IT Security Engineer
The term “hacker” was first used at which institution?
a. MIT
b. New York University
c. Harvard University
d. Bell’s Lab
Option a – MIT
What is the term for a security flaw in a system or network?
a. Attack
b. Exploit
c. Vulnerability
d. Threat
Option c – Vulnerability
What type of cybercrime involves tricking users into revealing private information?
a. MiTM attack
b. Phishing attack
c. Website attack
d. DoS attack
Option b – Phishing attack
Which of these is not a phase in a data breach process?
a. Exfiltration
b. Research & info-gathering
c. Attack the system
d. Fixing the bugs
Option d – Fixing the bugs
Which online activity cannot be fully protected through the Tor network?
a. Browsing data
b. Instant messaging
c. Login using ID
d. Relay chats
Option c – Login using ID
What term is used for hackers who operate with both ethical and unethical motives?
a. Yellow Hat Hackers
b. Grey Hat Hackers
c. Red Hat Hackers
d. White-Black Hat Hackers
Option b – Grey Hat Hackers
Which of these is not used for hacking emails?
a. Mail Password
b. Email Finder Pro
c. Mail Pass View
d. Sendinc
Option d – Sendinc
In mobile-based DDoS attacks, what waits for user action to launch the attack?
a. Botnets
b. Programs
c. Virus
d. Worms
Option a – Botnets
Which of these encryption methods offers the weakest security?
a. WPA3
b. WPA2
c. WPA
d. WEP
Option d – WEP
In database terminology, what are the individual components of a record called?
a. Fields
b. Data Types
c. Relations
d. Tables
Option a – Fields
Which item is not considered a database object in MS Access?
a. Tables
b. Query
c. Report
d. Relationship
Option d – Relationship
Which MS Access object is used to ask a question about data?
a. Table
b. Form
c. Query
d. Report
Option c – Query
What term is used for all the information about one entry in a database?
a. Data
b. Information
c. Field
d. Record
Option d – Record
Which of the following statements is accurate?
a. Reports help retrieve data and perform calculations
b. Queries can be printed with formatting for presentation
c. Queries may include calculated data not stored in tables
d. Forms are used for printing while reports are for display only
Option c – Queries may include calculated data not stored in tables
What type of query asks the user for input before running?
a. Select
b. Crosstab
c. Parameter
d. Append
Option c – Parameter
Which query type summarizes and rearranges data for easier analysis, often using totals?
a. Parameter
b. Select
c. Crosstab
d. Append
Option c – Crosstab
What is the maximum number of characters allowed in a text field?
a. 120
b. 255
c. 265
d. 75
Option b – 255
Which of the following is a correct statement?
a. Foreign keys must contain unique values
b. Primary keys may have duplicate entries
c. Indexed fields can allow duplicates, depending on settings
d. All of the above statements are valid
Option c – Indexed fields can allow duplicates, depending on settings
What type of system is Microsoft Access?
a. RDBMS
b. OODBMS
c. ORDBMS
d. Network database model
Option a – RDBMS
How can you edit a relationship in MS Access?
a. Right-click the line and select Edit Relationship
b. Double-click the relationship line
c. Both of the above
d. None of the above
Option c – Both of the above
What does DCL (Data Control Language) help with?
a. Altering table structures
b. Modifying or removing data entries
c. Managing user access and permissions
d. None of the above
Option c – Managing user access and permissions
Which component contains instructions to extract information from a database?
a. Forms
b. Reports
c. Queries
d. Tables
Option d – Tables
When the logical operator AND is used in a query, how are the conditions shown?
a. OR
b. IN
c. AND
d. LIKE
Option c – AND
Writing multiple criteria one per row in the design grid implies:
a. OR conditions
b. AND conditions
c. NOT condition
d. None of the above
Option a – OR conditions
Which key ensures that each entry in a table is unique?
a. Primary key
b. Keyword
c. Field name
d. All of the above
Option a – Primary key
What does a one-to-many relationship mean between Student and Class tables?
a. One student can be enrolled in many classes
b. A class can have multiple students
c. Many classes can have many students
d. Students and classes have a many-to-many connection
Option a – One student can be enrolled in many classes
What stores a single piece of information in a database?
a. Report
b. Field
c. Query
d. Record
Option b – Field
Which of these examples is not a database?
a. Table data in a Word document
b. Information stored in Excel
c. PowerPoint presentation
d. Phone contact list
Option c – PowerPoint presentation
What best defines a database?
a. Structured collection of data
b. Clear presentation of data
c. Data shown through visuals
d. All of the above
Option a – Structured collection of data
Which term is least associated with database systems?
a. Attributes
b. Tuples
c. Relationship
d. Columns
Option d – Columns
A group of related records in a database is called a:
a. File
b. Bench
c. Table
d. Relationship
Option a – File
What is the process of organizing data in a specific sequence called?
a. Searching
b. Sorting
c. Ordering
d. Shorting
Option b – Sorting
What does the cascade update feature do?
a. Prevents changes in the primary key if related records exist in other tables
b. Updates all related records in connected tables when the primary table is modified
c. Both a and b
d. None of the above
Option c – Both a and b
Which border style option makes a control’s border invisible?
a. Transparent
b. Invisible
c. Do not display
d. No border
Option c – Do not display
Which type of database language lets you modify and manage data?
a. DCL
b. DML
c. DDL
d. None of the above
Option b – DML
What does referential integrity ensure?
a. A foreign key in a child table must match an existing primary key in the parent table
b. The primary key in the child table must match the parent table
c. A foreign key in the parent table must match the child table
d. All of the above
Option a – A foreign key in a child table must match an existing primary key in the parent table
What tool can you use to copy the formatting of one control to another?
a. Manager
b. Wizard
c. Painter
d. Control
Option c – Painter
Which field type should be used to store large text entries?
a. Text
b. Memo
c. Currency
d. Hyperlink
Option b – Memo
In the design view of a table, what is the first column of buttons used for?
a. To identify the primary key
b. To highlight the current row
c. Both a and b
d. None of the above
Option c – Both a and b
What is the purpose of the “Show” checkbox in query design?
a. To include the field in the query
b. To show the field in the output of the query
c. To show only the field names
d. None of the above
Option b – To show the field in the output of the query
Which of the following relationship types cannot be used in Access?
a. One to One
b. One to Many
c. Many to Many
d. All of these are supported
Option d – All of these are supported
What option allows direct data entry into a new table?
a. Datasheet view
b. Design view
c. Link table
d. None of the above
Option a – Datasheet view
How can you create queries in MS Access?
a. By dragging and dropping fields
b. By writing SQL in SQL view
c. By using the query wizard or design view
d. All of the above
Option d – All of the above
Which of the following is not a type of database model?
a. Network database model
b. Relational database model
c. Object-oriented database model
d. None
Option d – None
In table design view, which key switches between the field name and properties panel?
a. F3
b. F4
c. F5
d. F6
Option d – F6
Which of the following is not a database object in Microsoft Access?
a. Table
b. Form
c. Worksheets
d. Modules
Option c – Worksheets
Which field type uses 8 bytes of storage?
a. Memo
b. Number
c. Date/Time
d. Hyperlink
Option c – Date/Time
Which is not a view option for tables in Access?
a. Datasheet View
b. Design View
c. Pivot Table & Pivot Chart View
d. None of the above
Option d – None of the above
Which database object actually stores data?
a. Forms
b. Reports
c. Queries
d. Tables
Option d – Tables
Which toolbox button displays information from a related table?
a. Subform/subreport
b. Relationships
c. Select objects
d. More controls
Option a – Subform/subreport
The Expression Builder in Access appears in what element?
a. Table
b. Box
c. Cell
d. Palette
Option b – Box
What object allows you to display data based on certain conditions?
a. Form
b. Query
c. Macro
d. Report
Option b – Query
Which database object is typically used to present final results?
a. Forms
b. Reports
c. Queries
d. Tables
Option b – Reports
What is the default and maximum length of a text field in Access?
a. 50 & 255 Characters
b. 8 & 1 GB
c. 266 & 64,000 Characters
d. None of the above
Option a – 50 & 255 Characters
We covered all the Computer MCQ for Railway Exams above in this post for free so that you can practice well for the exam.
Check out the latest MCQ content by visiting our mcqtube website homepage.
Also, check out: