50 Computer Awareness MCQs - Quiz 5
50 Computer Awareness MCQs - Quiz 5
Dear Readers, Here we are providing Very Useful Computer Awarness Multiple Choice Question and Answers - MCQ that frequently used in our day life. This is very helpful for various competitive exams across the world example; IETL, GRE, ICET, UPSC, UPPSC, IFS, SSC CGL, CHSL, Bank PO, Clerks, IBPS, RRB, Insurance exams ... etc. This is very helpful Interviews if your attending, different entrance examination etc.
1) You can use the tab key to ________A) move a cursor across the screen
B) indent a paragraph
C) move the cursor down the screen
D) both (a) and (b)
Answer: D) both (a) and (b)
2) Which of the following is an example of system software?
A) Microsoft word
B) Calculator
C) Operating system
D) RAM
Answer: C) Operating system
3) MPG extension refers usually to what kind of file?
A) MS Office document
B) Image file
C) Word Perfect Document file
D) Animation/movie file
Answer: D) Animation/movie file
4) What does
A) Wireless Local Area Network
B) Wide Local Area Network
C) Wind Light Atmospheric Nature
D) Wireless Local Area Node
Answer: A) Wireless Local Area Network
5) In HTML, ______________ creates a place wherein one line of information can be typed.
A) TYPE="TEXT"
B) TYPE="PASSWORD"
C) TYPE="RADIO"
D) TYPE="CHECKBOX"
Answer: A) TYPE="TEXT"
6) Which of the following statements about firewall (in the context of computing) is INCORRECT?
A) It is frequently used to protect a computer network from unauthorised access.
B) It is a combination of both, software and hardware devices.
C) It is unable to permit legitimate communication to pass.
D) It permits network transmission based on a set of rules.
Answer: C) It is unable to permit legitimate communication to pass.
7) In Microsoft Word, ____________ view shows formatting such as line spacing, font, point size and italics.
A) Web Layout
B) Normal Layout
C) Reading Layout
D) Print Layout
Answer: B) Normal Layout
8) The symbols used in an assembly language are called ?
A) Assembler
B) Mnemonics
C) Codes
D) All of the above
Answer: B) Mnemonics
9) Which is not an external storage device?
A) CD-ROM
B) DVD-ROM
C) Pen Drive
D) RAM
Answer: D) RAM
10) Which of the following is not an operating system
A) Android
B) Vista
C) iOS
D) Opera
Answer: D) Opera
11) Is MS Word an operating system?
A) TRUE
B) FALSE
Answer: B) FALSE
12) Which of the following data structure is linear type?
A) Tree
B) Binary Tree
C) Queue
D) Graph
Answer: C) Queue
13) "OS" computer abbreviation means
A) Open Software
B) Order of significance
C) Optical Sensor
D) Operating System
Answer: D) Operating System
14) Computer storage units smallest to largest?
15) Which of the following is the output device of a computer?
A) Plotter
B) Pen drive
C) Joystick
D) Scanner
Answer: A) Plotter
16) Today __________ are seen as personal accessory - portable, powerful and simple to operate.
A) e-mail
B) e-business
C) e-content
D) Computers
Answer: D) Computers
17) In IT the technique that is used to increase the bandwidth is
A) Memory Management
B) Memory Interleaving
C) Memory Intraleaving
D) Memory Leaving
Answer: B) Memory Interleaving
18) The web uses the __________ to request and serve web pages and programs.
A) Hyper Text Marketing Language
B) Hyper Text Markup Language
C) Hotmail Text Markup Language
D) Home Text Markup Language
Answer: B) Hyper Text Markup Language
19) Junk e-mail is also called ______
A) Spam
B) Spoof
C) Sniffer script
D) Spool
Answer: A) Spam
20) What are the four things needed to connect to the internet?
A) telephone line, modem, computer, and an ISP
B) modem, computer, PDA, and ISP
C) telephone line, modem, computer, and PDA
D) computer, ISP, modem, and communication software
Answer: D) computer, ISP, modem, and communication software
21) Which file format can be added to a powerpoint show?
A) .Gif
B) .Wav
C) .Jpg
D) All of the above
Answer: D) All of the above
22) In computer network nodes are
A) the computer that terminates the data
B) the computer that originates the data
C) the computer that routes the data
D) all of the mentioned
Answer: D) all of the mentioned
23) VPN's are implemented to provide
A) A secure connection through public networks
B) Additional security for selected computers
C) A secure connection within a private network
D) Additional encryption by using IPSec
Answer: A) A secure connection through public networks
24) ______ is a small, portable flash memory card that plugs into a computer’s USB port and functions as a portable hard drive.
A) DVD-ROM
B) Flash drive
C) CD-ROM
D) CD-RW
Answer: B) Flash drive
25) Second generation computers were developed during
A) 1956 - 1963
B) 1970 - 1975
C) 1975 - 1980
D) 1990 - 2000
Answer: A) 1956 - 1963
26) McAfee is a
A) Anti-virus software
B) Programming language
C) Output device
D) Computer device
Answer: A) Anti-virus software
27) Which of the following refers to the number of pixels per inch, printed on a page?
A) Print Margin
B) Resolution
C) Filter
D) Colour mode
Answer: B) Resolution
28) If you are going to a site you use often, instead of having to type in the address every time, you should_______
A) Save it as a file
B) Make a copy of it
C) Bookmark it
D) None of these
Answer: C) Bookmark it
29) Fifth generation computer is also known as
A) Very Large Scale Integration (VLSI)
B) Knowledge information processing system
C) Both A & B
D) None of the above
Answer: B) Knowledge information processing system
30) Which of the following is NOT a storage device?
A) Hard Disk
B) CD ROM
C) Flash Drive
D) Modem
Answer: D) Modem
31) A computer port is used to
A) Donwload files
B) Communicate with other computer peripherals
C) Communicate with hard disks
D) All of the above
Answer: B) Communicate with other computer peripherals
32) RAM is used as a short memory because it is
A) expensive
B) volatile
C) has small capacity
D) programmable
Answer: B) volatile
33) Which among the following is a 'Modifier key'?
A) Control
B) Shift
C) Alt
D) All options are correct
Answer: D) All options are correct
34) The Incident Command System (ICS) is
35) Memory is made up of
A) Large number of cells
B) Set of wires
C) Set of circuits
D) None of the above
Answer: A) Large number of cells
36) You organize files by storing them in
A) Lists
B) Archives
C) Folders
D) Indexes
Answer: C) Folders
37) Find the odd statement out in relation to firewall.
A) Firewall can be a software
B) Firewall can be a hardware
C) Firewall can be a combination of software & hardware
D) Firewall protects computer from fire
Answer: C) Firewall can be a combination of software & hardware
38) ______ Disk Encryption is a technology (hardware or software) where data is encrypted before storage.
A) Half
B) Whole
C) Double
D) Triple
Answer: B) Whole
39) _________ is a specialized server that enables the client to share application and data across the network.
A) Mass Server
B) File server
C) Data Server
D) Host Server
Answer: B) File server
40) The function of BIOS is to
A) Initialize the system hardware components
B) Update the system
C) Ensure system performance
D) Save the system from crashing
Answer: A) Initialize the system hardware components
41) Cache memory is a form of ROM.
A) TRUE
B) FALSE
Answer: B) FALSE
42) Why ABC computer is called so ?
A) Because it was thought to be the first computer so named with first alphabets of English
B) Because it was developed by Atanasoff and Berry
C) Both of above are the reason to name the computer ABC
D) None of the above
Answer: A) Because it was thought to be the first computer so named with first alphabets of English
43) BSoDs can be caused by poorly written device drivers ormalfunctioning hardware, such as faulty memory, powersupply issues, overheating of components, or hardwarerunning beyond its specification limits. Which color screenis displayed wh en en coun ter ed a BSOD Er r or ?
A) Red
B) Grey
C) Black
D) Blue
Answer: D) Blue
44) Pressing F8 key for three times selects
A) a sentence
B) a word
C) a document
D) a paragraph
Answer: A) a sentence
45) A locked file can be
A) modified by user with the correct password
B) is used to hide sensative
C) accessed by only one user
D) Both B & C
Answer: C) accessed by only one user
46) Digitized information can be used by computers.
A) TRUE
B) FALSE
Answer: A) TRUE
47) A computer consists of
A) motherboard
B) hard disk drive
C) central processing unit
D) All of the above
Answer: D) All of the above
48) Storage and memory differ with respect to which of the following characteristics?
A) Price
B) Reliability
C) Speed
D) All of these
Answer: D) All of these
49) Which cloud is a cloud computing environment that uses amix of on-premises, private cloud and third-party, publiccloud services with orchestration between the two platformsand it is particularly valuable for dynamic or highlychangeable workloads?
A) Dynamic Cloud
B) Advance Cloud
C) Hybrid Cloud
D) Sharing Cloud
Answer: C) Hybrid Cloud
50) Which invention allowed computers to be smaller?
A) Integrated Circuits
B) RAM
C) Vacuum Tubes
D) CPU
Answer: A) Integrated Circuits
Computer Awareness: Also Read:
50 Computer Awareness MCQs - Quiz 5
Reviewed by SSC NOTES
on
July 21, 2023
Rating: