50 Computer Awareness MCQs - Quiz 14
50 Computer Awareness MCQs - Quiz 14
Dear Readers, Here we are providing Very Useful Computer Awarness Multiple Choice Question and Answers - MCQ that frequently used in our day life. This is very helpful for various competitive exams across the world example; IETL, GRE, ICET, UPSC, UPPSC, IFS, SSC CGL, CHSL, Bank PO, Clerks, IBPS, RRB, Insurance exams ... etc. This is very helpful Interviews if your attending, different entrance examination etc.
A) Database
B) Document Processor
C) Graphic Package
D) Spread Sheet
Answer: D) Spread Sheet
2) _____________ is a collection of data values of same types having a common name.
A) Object
B) String
C) Array
D) Numbers
Answer: C) Array
3) An example of Full Duplex communication channel.
A) Radio Broadcasting
B) Television Broadcasting
C) Walkie-Talkie
D) Telephone conversation
Answer: D) Telephone conversation
4) Which is NOT an Operating System?
A) OS X
B) Windows 7
C) DOS
D) C++
Answer: D) C++
5) Which company manufactured the first microprocessor 4004?
A) NVIDIA Corporation
B) PLX Devices
C) INTEL Corporation
D) ENOcean Private Company
Answer: C) INTEL Corporation
6) First Generation computers Based on which technology?
A) LSI
B) VLSI
C) Vaccum Tube
Answer : C) Vaccum Tube
7) What is an e-mail?
A) An internet standard, which aqllow users to upload and download files
B) An online area on which a user can converse in written form about any special subject
C) Transmission of files and messages through computer network
D) A real time typed conversation
Answer: C) Transmission of files and messages through computer network
8) A test to determine processor speed is?
A) a gesture
B) flat panel
C) a benchmark
D) None of the above
Answer: C) a benchmark
9) Which of the following is not among the three different forms of 'if' statement?
A) if...
B) if...else
C) if...and
D) if...else if...else
Answer: C) if...and
10) There is a network that can connect networks ranging from small location or area to a bigger range including public packet network and large corporate networks. That networks enterprise allows users to share access to applications,services and other centrally located resources. Its ability for a huge geographical access has transformed networking.Which among the following is that network?
A) SAN
B) CAN
C) LAN
D) WAN
Answer: D) WAN
11) Whose trademark is the operating system unix?
A) Ashton Tate
B) Microsoft
C) INTEL
D) BELL Laboratories
Answer: D) BELL Laboratories
12) Which is a feature included in Microsoft PowerPointsoftware that allows the user to see all the slides in apresentation at one time?
A) Slide Sorter
B) Slide Master
C) Handout Master
D) Slide Header
Answer: A) Slide Sorter
13) Who Invented the computer mouse?
A) Gene Dolgoff
B) Brendan Eich
C) Douglas Engelbart
D) Federico Faggin
Answer: C) Douglas Engelbart
14) Which of the following is not true about remote desktop?
A) Windows firewall can block Remote Desktop connections
B) you can start the remote desktop client using the mstsc command
C) by default all users can access Remote Desktop
D) the client can be running any version of Windows 7
Answer: C) by default all users can access Remote Desktop
15) Which of the following memories needs refresh ?
A) DRAM
B) ROM
C) SRAM
D) All of the above
Answer: A) DRAM
16) How many layers are there in the OSI networking model?
A) 13
B) 11
C) 9
D) 7
Answer: D) 7
17) ___________ provides network backbone and e-governance support to government bodies in India.
A) NIC
B) NASSCOM
C) Department of Information Technology
D) State Bank of India
Answer: A) NIC
18) Operating system is the most common type of
A) Application software
B) Word processing
C) System software
D) Communication software
Answer: C) System software
19) GUI stands for
A) Graphical Universal Interface
B) Graph Use Interface
C) Graphical Unique Interface
D) Graphical User Interface
Answer: D) Graphical User Interface
20) Which unit holds data temporarily?
A) Secondary storage unit
B) Output Unit
C) Primary Memory Unit
D) Input unit
Answer: C) Primary Memory Unit
21) 'Start' menu in a standard personal computer is
A) Part of the hardware
B) A set of options and commands
C) Nothing but the status bar
D) Network related
Answer: B) A set of options and commands
22) ________ is not a storage device.
A) iPod
B) Pen drives
C) Linux
D) Flash Disks
Answer: C) Linux
23) Bold, Italics, Underline are examples of
A) Task bar
B) Formatting tool bar
C) Menu bar
D) None
Answer: B) Formatting tool bar
24) The term computer is derived from
A) Latin language
B) Sanskrit language
C) Greek language
D) German language
Answer: A) Latin language
25) Which memory is stored permanently?
A) RAM
B) Computer cache
C) Hard drive
D) All of the above
Answer: C) Hard drive
26) Which of the following is graphics solution for word processors?
A) Clip Art
B) Drop Cap
C) Word Art
D) All of the above
Answer: A) Clip Art
27) Which key on a windows keyboard sets to full screen mode in most browsers?
A) F1
B) F10
C) F11
D) F12
Answer: C) F11
28) In which graphics, digital photos and scanned images are typically stored with extensions such as.bmp, .png, .jpg, .tif or.gif?
A) Bitmap
B) Pixels
C) Plane
D) Both Bitmap and Pixels
Answer: A) Bitmap
29) Computer system which do not not require any storage device?
A) Analog
B) Digital
C) Hybrid
D) Third generation computer
Answer: A) Analog
30) Hard Drive capacity is measured in
A) Newton
B) GB
C) THz
D) Gwallior
Answer: B) GB
31) What is the full form of BASIC in context of the BASIC computer language?
A) Beginner’s All-purpose Systematic Instruction Code
B) Beginner’s All-purpose Symbolic Instruction Code
C) Beginner’s All-purpose Symbolic Input Code
D) Beginner’s All-purpose Symbolic Input-output Code
Answer: B) Beginner’s All-purpose Symbolic Instruction Code
32) Who governs the INTERNET ?
A) ISOC
B) IETF
C) IAB
D) All of the above
Answer: D) All of the above
33) In IT terminology failure in the kernel is called as
A) crash
B) crash dump
C) dump
D) Kernel error
Answer: A) crash
34) Which of the following is used to protect objects in computer system, in the absence of more complete protection schemes?
A) digital certificate
B) digital signature
C) passwords
D) tokens
Answer: C) passwords
35) Which operation is not performed by computer?
A) Understanding
B) Controlling
C) Processing
D) Inputting
Answer: A) Understanding
36) The term _____ designates equipment that might be added to a computer system to enhance its functionality
A) digital device
B) system add-on
C) disk pack
D) peripheral device
Answer: D) peripheral device
37) Which of the following is not purely output device?
A) Printer
B) Speaker
C) Plotter
D) Screen
Answer: D) Screen
38) Which of the following is NOT a Software?
A) Compiler
B) Adobe
C) Microsoft Office
D) Drivers
Answer: A) Compiler
39) ______________ among the following is a Language of JavaScript.
A) text/JavaScript
B) text/ecmascript
C) text/vbscript
D) JavaScript vbscript
Answer: D) JavaScript vbscript
40) The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is that called as _____
A) Keylogger
B) Worm
C) Time Bomb
D) Cracker
Answer: B) Worm
41) Which of the following commercial software products are examples of operatingsystem software and application software respectively?
A) Microsoft Windows XP and Microsoft Word
B) Microsoft OfficeXPand Microsoft WindowsXP
C) MS DOS and Microsoft Windows XP
D) UNIX and LINUX
Answer: A) Microsoft Windows XP and Microsoft Word
42) In IT, means that the data available in the database is both accurate and consistent.
A) Data Security
B) Data Availability
C) Data Binding
D) Data Integrity
Answer: D) Data Integrity
43) In the field of computing, what does ENIAC stand for?
A) Electronic Numerical Integrated Advanced Computer
B) Electronic Numerical Integrator and Computer
C) Electronic Numbers Integration and Computer
D) Electronic Numerals Integration and Computing
Answer: B) Electronic Numerical Integrator and Computer
44) A series of instructions that tells a computer what to do and how to do it is called a _______
A) Program
B) Command
C) User response
D) Processor
Answer: A) Program
45) Size of the primary memory of a pc ranges between
A) 256 kb to 640 kb
B) 64 kb to 256 kb
C) 256 kb to 512 kb
D) 2 kb to 8 kb
Answer: A) 256 kb to 640 kb
46) On the basis of memory size & performance, which type of computer is known as "Big Iron"?
A) Micro computer
B) Mini computer
C) Main Frame
D) Supercomputer
Answer: C) Main Frame
47) Cache memory acts between
A) CPU and Hard disc
B) RAM and ROM
C) CPU and RAM
D) None of the above
Answer: C) CPU and RAM
48) What is an error in a program called
A) Power fail
B) Crash
C) Virus
D) Bug
Answer: D) Bug
49) Operating system functions may include
A) multiprogramming
B) input/output control
C) virtual storage
D) All the above
Answer: D) All the above
50) A computer cannot "boot" if it does not have the _____
A) Compiler
B) Loader
C) Operating system
D) Assembler
Answer: C) Operating system
Computer Awareness: Also Read:
7) What is an e-mail?
A) An internet standard, which aqllow users to upload and download files
B) An online area on which a user can converse in written form about any special subject
C) Transmission of files and messages through computer network
D) A real time typed conversation
Answer: C) Transmission of files and messages through computer network
8) A test to determine processor speed is?
A) a gesture
B) flat panel
C) a benchmark
D) None of the above
Answer: C) a benchmark
9) Which of the following is not among the three different forms of 'if' statement?
A) if...
B) if...else
C) if...and
D) if...else if...else
Answer: C) if...and
10) There is a network that can connect networks ranging from small location or area to a bigger range including public packet network and large corporate networks. That networks enterprise allows users to share access to applications,services and other centrally located resources. Its ability for a huge geographical access has transformed networking.Which among the following is that network?
A) SAN
B) CAN
C) LAN
D) WAN
Answer: D) WAN
11) Whose trademark is the operating system unix?
A) Ashton Tate
B) Microsoft
C) INTEL
D) BELL Laboratories
Answer: D) BELL Laboratories
12) Which is a feature included in Microsoft PowerPointsoftware that allows the user to see all the slides in apresentation at one time?
A) Slide Sorter
B) Slide Master
C) Handout Master
D) Slide Header
Answer: A) Slide Sorter
13) Who Invented the computer mouse?
A) Gene Dolgoff
B) Brendan Eich
C) Douglas Engelbart
D) Federico Faggin
Answer: C) Douglas Engelbart
14) Which of the following is not true about remote desktop?
A) Windows firewall can block Remote Desktop connections
B) you can start the remote desktop client using the mstsc command
C) by default all users can access Remote Desktop
D) the client can be running any version of Windows 7
Answer: C) by default all users can access Remote Desktop
15) Which of the following memories needs refresh ?
A) DRAM
B) ROM
C) SRAM
D) All of the above
Answer: A) DRAM
16) How many layers are there in the OSI networking model?
A) 13
B) 11
C) 9
D) 7
Answer: D) 7
17) ___________ provides network backbone and e-governance support to government bodies in India.
A) NIC
B) NASSCOM
C) Department of Information Technology
D) State Bank of India
Answer: A) NIC
18) Operating system is the most common type of
A) Application software
B) Word processing
C) System software
D) Communication software
Answer: C) System software
19) GUI stands for
A) Graphical Universal Interface
B) Graph Use Interface
C) Graphical Unique Interface
D) Graphical User Interface
Answer: D) Graphical User Interface
20) Which unit holds data temporarily?
A) Secondary storage unit
B) Output Unit
C) Primary Memory Unit
D) Input unit
Answer: C) Primary Memory Unit
21) 'Start' menu in a standard personal computer is
A) Part of the hardware
B) A set of options and commands
C) Nothing but the status bar
D) Network related
Answer: B) A set of options and commands
22) ________ is not a storage device.
A) iPod
B) Pen drives
C) Linux
D) Flash Disks
Answer: C) Linux
23) Bold, Italics, Underline are examples of
A) Task bar
B) Formatting tool bar
C) Menu bar
D) None
Answer: B) Formatting tool bar
24) The term computer is derived from
A) Latin language
B) Sanskrit language
C) Greek language
D) German language
Answer: A) Latin language
25) Which memory is stored permanently?
A) RAM
B) Computer cache
C) Hard drive
D) All of the above
Answer: C) Hard drive
26) Which of the following is graphics solution for word processors?
A) Clip Art
B) Drop Cap
C) Word Art
D) All of the above
Answer: A) Clip Art
27) Which key on a windows keyboard sets to full screen mode in most browsers?
A) F1
B) F10
C) F11
D) F12
Answer: C) F11
28) In which graphics, digital photos and scanned images are typically stored with extensions such as.bmp, .png, .jpg, .tif or.gif?
A) Bitmap
B) Pixels
C) Plane
D) Both Bitmap and Pixels
Answer: A) Bitmap
29) Computer system which do not not require any storage device?
A) Analog
B) Digital
C) Hybrid
D) Third generation computer
Answer: A) Analog
30) Hard Drive capacity is measured in
A) Newton
B) GB
C) THz
D) Gwallior
Answer: B) GB
31) What is the full form of BASIC in context of the BASIC computer language?
A) Beginner’s All-purpose Systematic Instruction Code
B) Beginner’s All-purpose Symbolic Instruction Code
C) Beginner’s All-purpose Symbolic Input Code
D) Beginner’s All-purpose Symbolic Input-output Code
Answer: B) Beginner’s All-purpose Symbolic Instruction Code
32) Who governs the INTERNET ?
A) ISOC
B) IETF
C) IAB
D) All of the above
Answer: D) All of the above
33) In IT terminology failure in the kernel is called as
A) crash
B) crash dump
C) dump
D) Kernel error
Answer: A) crash
34) Which of the following is used to protect objects in computer system, in the absence of more complete protection schemes?
A) digital certificate
B) digital signature
C) passwords
D) tokens
Answer: C) passwords
35) Which operation is not performed by computer?
A) Understanding
B) Controlling
C) Processing
D) Inputting
Answer: A) Understanding
36) The term _____ designates equipment that might be added to a computer system to enhance its functionality
A) digital device
B) system add-on
C) disk pack
D) peripheral device
Answer: D) peripheral device
37) Which of the following is not purely output device?
A) Printer
B) Speaker
C) Plotter
D) Screen
Answer: D) Screen
38) Which of the following is NOT a Software?
A) Compiler
B) Adobe
C) Microsoft Office
D) Drivers
Answer: A) Compiler
39) ______________ among the following is a Language of JavaScript.
A) text/JavaScript
B) text/ecmascript
C) text/vbscript
D) JavaScript vbscript
Answer: D) JavaScript vbscript
40) The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is that called as _____
A) Keylogger
B) Worm
C) Time Bomb
D) Cracker
Answer: B) Worm
41) Which of the following commercial software products are examples of operatingsystem software and application software respectively?
A) Microsoft Windows XP and Microsoft Word
B) Microsoft OfficeXPand Microsoft WindowsXP
C) MS DOS and Microsoft Windows XP
D) UNIX and LINUX
Answer: A) Microsoft Windows XP and Microsoft Word
42) In IT, means that the data available in the database is both accurate and consistent.
A) Data Security
B) Data Availability
C) Data Binding
D) Data Integrity
Answer: D) Data Integrity
43) In the field of computing, what does ENIAC stand for?
A) Electronic Numerical Integrated Advanced Computer
B) Electronic Numerical Integrator and Computer
C) Electronic Numbers Integration and Computer
D) Electronic Numerals Integration and Computing
Answer: B) Electronic Numerical Integrator and Computer
44) A series of instructions that tells a computer what to do and how to do it is called a _______
A) Program
B) Command
C) User response
D) Processor
Answer: A) Program
45) Size of the primary memory of a pc ranges between
A) 256 kb to 640 kb
B) 64 kb to 256 kb
C) 256 kb to 512 kb
D) 2 kb to 8 kb
Answer: A) 256 kb to 640 kb
46) On the basis of memory size & performance, which type of computer is known as "Big Iron"?
A) Micro computer
B) Mini computer
C) Main Frame
D) Supercomputer
Answer: C) Main Frame
47) Cache memory acts between
A) CPU and Hard disc
B) RAM and ROM
C) CPU and RAM
D) None of the above
Answer: C) CPU and RAM
48) What is an error in a program called
A) Power fail
B) Crash
C) Virus
D) Bug
Answer: D) Bug
49) Operating system functions may include
A) multiprogramming
B) input/output control
C) virtual storage
D) All the above
Answer: D) All the above
50) A computer cannot "boot" if it does not have the _____
A) Compiler
B) Loader
C) Operating system
D) Assembler
Answer: C) Operating system
Computer Awareness: Also Read:
50 Computer Awareness MCQs - Quiz 14
Reviewed by SSC NOTES
on
July 21, 2023
Rating: