top of page

Computer mcq for competitive exams

1. Which of the following generation of computers is associated with artificial

intelligence?

1. First

2. Second

3. Third

4. Fourth

5. Fifth

Answer – “5”

2. A file which has not been altered, compressed, or manipulated in any way by

the computer is called?

1. temp file

2. raw file

3. permanent file

4. directory files

5. ordinary files

Answer– “2”

3. In a computer file system which among the following is top or first in hierarchy?

1. root directory

2. parent directory

3. home directory

4. working directory

5. Current directory

Answer– “1”

4. When some unidentified / unknown person / firm sends you mail in a trustworthy / lucrative way asking for sensitive banks and online payment information, this is a case of __________ ?

1. spam

2. hacking

3. Phishing

4. Theft

5. Cyber crime

Answer– “3”

5. A network that is connected to the Internet, but uses encryption to scramble all the data sent through the Internet is called?

1. Universal network

2. Wireless Network

3. Social Network

4. Personal Area Network

5. Virtual private Network

Answer– “5”

6. ________________ is a communication technology used by some incoming mail servers.

1. TCP

2. POP

3. FTP

4. Telnet

5. IP

Answer– “2”

7. The process of transferring files from a computer on the Internet to your computer is called?

1. downloading

2. Uploading

3. FTP

4. JPEG

5. PNG

Answer– “3”

8. ___________________ is an area of a computer that temporarily holds data waiting to be processed, stored or output.

1. Storage

2. Motherboard

3. CPU

4. Memory

5. Peripherals

Answer– “4’

9. _________________________ is a collection of data that is organized so that its contents can easily be accessed manage and updated.

1. Data warehouse

2. Data mining

3. Database

4. Data dictionary

5. Directory

Answer– “3”

10. _____________________________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

1. The platform

2. The motherboard

3. Application software

4. The operating system

5. System software

Answer– “4”

11. Unauthorized copying of software to be used for personal gain instead of for personal backups is called

1. program thievery

2. data snatching

3. software piracy

4. program looting

5. data looting

Answer– “3”

12. _______________________ is collection of web pages and ________________ is the very first page that we see on opening of a website.

1. Home page, Webpage

2. Website, Homepage

3. Login page, Homepage

4. Webpage, Website

5. Homepage, Login page

Answer– “2”

13. Which of the following is not example of Utility Software?

1. Backup software

2. Antivirus software

3. Disk tools

4. Media Players

5. None of the above

Answer– “4’

14. To move data from one part of the document to another, which of the following is used?

1. Cut and Insert

2. Copy and Paste

3. Copy and Delete

4. Copy and Undo

5. Cut and Paste

Answer– “5”

15. The speed of computer is defined in

1. Clock speed

2. Access speed

3. Frequency

4. Access time

5. Response speed

Answer– “1”

16. The vertical blocks in a table is known as

1. Row

2. Column

3. Cell

4. Room

5. Sheet

Answer– “2”

17. A GUID is a 128-bit (16 byte) number used by software programs to uniquely identify the location of a data object. What is correct full form?

1. Graphical User Identifier

2. Globally Unique Identifier

3. Globally Unique Internet

4. Global User Identifier

5. None of these

Answer– “2”

18. Which among the following is the chat program that lets users communicate in real time?

1. WhatsApp

2. Google chat

3. Google plus

4. Instant messaging

5. Google mail

Answer– “4”

19. Software that disrupts the normal function of computer is known as

1. Malware

2. Virus

3. Hacker

4. Trojan horse

5. None of these

Answer– “1”

20. If the computer is not able to connect with other computers, it is said to be

1. Communication gap

2. Offline

3. Sleeping mode

4. Switch off mode

5. Boot mode

Answer– “2”

21. If you want to insert a chart in your slide, you will go to

1. File

2. Home

3. Insert

4. Font

5. Edit

Answer– “3”

22. An internet service provider that provides multimedia interface to available resources is known as

1. telnet

2. Ethernet

3. Intranet

4. World wide web

5. None of these

Answer– “4”

23. Which among the following is known as semiconductor memory in a computer?

1. ROM

2. EEPROM

3. RAM

4. DRAM

5. CD-ROM

Answer– “3”

24. The step-by-step procedure for executing the task is known as

1. Execution cycle

2. Algorithm

3. Assess cycle

4. Full cycle

5. flowchart

Answer– “2”

6 views0 comments

Recent Posts

See All
bottom of page