Home
MCQS
UPSC,PCS,CDS,NDA MCQ Quiz Hub
Computer Awareness MCQ Competitive Exam - Computer
Choose a topic to test your knowledge and improve your UPSC,PCS,CDS,NDA skills
1. An area of a computer that temporarily holds data waiting to be processed is..........
CPU
Memory
Storage
File
2. is the key to close a selected drop -down list; cancel a command and close a dialog box
TAB
SHIFT
ESC
F10
3. is the key we use to run the selected command
SHIFT
TAB
ENTER
CTRL
4. Is the functional key to display save-as box
F5
F6
F9
F12
5. Data becomes ................ when it is presented in a format that people can understand and use
processed
graphs
information
presentation
6. The term ............. designates equipment that might be added to a computer system to enhance its functionality.
digital device
system add-on
disk pack
peripheral device
7. A ............ is a microprocessor -based computing device.
personal computer
mainframe
workstation
server
8. RAM can be treated as the for the computer's processor
factory
operating room
waiting room
planning room
9. Which of the following are the functions of a operating system
Allocates resources
Monitors Activities
Manages disks and files
All of the above
10. To move a copy of file from one computer to another over a communication channel is called?
File transfer
File encryption
File modification
File copying
11. The primary function of the ............ is to set up the hardware and load and start an operating system
System Programs
BIOS
CP
Memory
12. What kind of memory is both static and non -volatile?
RAM
ROM
BIOS
CACHE
13. is computer software designed to operate the computer hardware and to provide platform for running application software
Application software
System software
Software
Operating system
14. The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second
data migration rate
data digitizing rate
data transfer rate
data access rate
15. A device, which is not connected to CPU, is called as .......
land-line device
On-line device
Off-line device
Device
16. What is the other name for programmed chip?
RAM
ROM
LSIC
PROM
17. On-line real time systems become popular in ........... generation
First Generation
Second Generation
Third Generation
Fourth Generation
18. You use a(n) ....., such as a keyboard or mouse, to input information
output device
input device
storage device
processing device
19. is the ability of a device to jump directly to the requested data
Sequential access
Random access
Quick access
All of the above
20. provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
Multitasking
Multithreading
Multiprocessing
Multicomputing
21. The task of performing operations like arithmetic and logical operations is called......
Processing
Storing
Editing
Sorting
22. ALU and Control Unit jointly known as
RAM
ROM
CPU
PC
23. RAM is an example of
Secondary memory
Primary memory
Main memory
Both (1) and (2)
24. Magnetic disk is an example of
Secondary memory
Primary memory
Main memory
Both (1) and (2)
25. Which one of the following is NOT a computer language
MS-Excel
BASIC
COBOL
C++
26. RAM is also called as
Read / Write Memory
Long Memory
Long Memory
Primary Memory
27. Store data or information temporarily and pass it on as directed by the control unit
Address
Register
Number
Memory
28. Select the Odd one
Operating system
Interpreter
Compiler
Assembler
29. A ............ is an additional set of commands that the computer displays after you make a selection from the main menu
dialog box
submenu
menu selection
All of the above
30. COBOL is an acronym for.............
Common Business Oriented Language
Computer Business Oriented Language
Common Business Operated Language
Common Business Organized Language
31. All of the following are examples of real security and privacy risks EXCEPT
hackers
Spam
Viruses
identity theft
32. Which of the following is NOT one of the four major data processing functions of a computer?
gathering data
processing data into information
analyzing the data or information
storing the data or information
33. All of the following are examples of storage devices EXCEPT
hard disk drives
printers
floppy disk drives
CD drives
34. The CPU and memory are located on the
expansion board
motherboard
storage device
output device
35. is the science that attempts to produce machines that display the same type of intelligence that humans do
Nanoscience
Nanotechnology
Simulation
Artificial intelligence (Al)
36. Servers are computers that provide resources to other computers connected to a
networked
mainframe
supercomputer
client
37. When creating a computer program, the ......... designs the structure of the program
. End user
System Analyst
Programmer
All of the above
38. A computer program that converts an entire program into machine language at one time is called a/ an
Interpreter
simulator
characters
compiler
39. Computers process data into information by working exclusively with
multimedia
word
numbers
characters
40. The difference between people with access to computers and the Internet and those without this access is known as the
digital divide
Internet divide
Web divide
E-illiteracy
41. Computers manipulate data in many ways, and this manipulation is called......
upgrading
processing
batching
utilizing
42. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called
robotics
simulation
computer forensics
animation
43. Where does most data go first with in a computer memory hierarchy ?
RAM
ROM
BIOS
CACHE
44. The………….data mining technique derives rules from real-world case examples
Rule discover
Signal processing
Neural nets
Case-based reasoning
45. …………….are used to identify a user who returns to a Website
Cookies
Plug-ins
Scripts
ASPs
46. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-
an ASCII code
a magnetic tape
an OCR scanner
a bar code
47. Why is it unethical to share copyrighted files with your friends?
It is not unethical, because it is legal.
It is unethical because the files are being given for free.
Sharing copyrighted files without permission breaks copyright laws.
It is not unethical because the files are being given for free.
48. Reusable optical storage will typically have the acronym-
CD
DVD
ROM
RW
49. The most common type of storage devices are
Steel
optical
magnetic
flash
50. A device that connects to a network without the use of cables is said to be
Distributed
free
centralized
none of these
51. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a
Hacker
spammer
instant messenger
programmer
52. To access properties of an object, the mouse technique to use is
Dragging
dropping
right-clicking
shift-clicking
53. A DVD is an example of a (n
hard disk
optical disc
output device
solid-state storage device
54. The process of transferring files from a computer on the Internet to your computer is called
Downloading
uploading
FTP
JPEG
55. is the process of dividing the disk into tracks and sectors
Tracking
Formatting
Crashing
Allotting
56. Help Menu is available at which button?
End
Start
Turnoff
Restart
57. The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as
CISC
RISC
CD-ROM
Wi-Fi
58. Which is not a basic function of a computer?
Store data
Accept input
Process data
Copy text
59. ASCII is a coding system that provides
256 different characters
512 different characters
1024 different characters
128 different characters
60. Which part of the computer is directly involved in executing the instructions of the computer program?
The scanner
The main storage
The secondary storage
The processor
61. When a computer is switched on, the booting process performs
Integrity Test
Power-On Self-Test
Correct Functioning Test
Reliability Test
62. A computer system that is old and perhaps not satisfactory is referred to as a(n)
Ancient system
Historical system
Age old system
Legacy system
63. Which of the following is not a binary number?
1
101
202
110
64. Which of the following does not store data permanently?
ROM
RAM
Floppy Disk
Hard Disk
65. Which of the following is the smallest storage?
Megabyte
Gigabyte
Terabyte
None of these
66. Which of the following contains permanent data and gets updated during the processing of transactions?
Operating System File
Transaction file
Software File
Master file
67. Which of the following helps to protect floppy disks from data getting accidentally erased?
Access notch
Write-protect notch
Entry notch
Input notch
68. A modem is connected to
a telephone line
a keyboard
a printer
a monitor
69. Large transaction processing systems in automated organisations use
Online processing
Batch Processing
Once-a-day Processing
End-of-day processing
70. In a computer, most processing takes place in
Memory
RAM
motherboard
CPU
71. Which of the following is not a storage medium?
Hard disk
Flash drive
DVD
scanner
72. The computer abbreviation KB usually means
Key Block
Kernel Boot
Kilo
Kit Bit
73. The typical computer criminal is a(n):
Young hacker
Trusted employee with no criminal record
Trusted employee with a long, but unknown criminal record.
Overseas young cracker.
74. The common name for the crime of stealing passwords is:
Jacking
Identity theft
Spoofing
Hacking
75. Collecting personal information and effectively posing as another individual is known as the crime of
Spoofing
Identity theft
Spoofing
Hacking
76. Malicious software is known as:
Badware
Malware
Maliciousware
Illegalware
77. A program that performs a useful task while simultaneously allowing destructive acts is a
Worm
Trojan horse
Virus
Macro Virus
78. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
Trojan horse
Virus
Time bomb
Time-related bomb sequence
79. In 1999, the Melissa virus was a widely publicised:
E-mail virus
Macro virus
Trojan horse
Time bomb.
80. What type of virus uses computer hosts to reproduce itself?
Time bomb
Worm
Melissa virus
Macro virus
81. The thing that eventually terminates a worm virus is a lack of:
Memory or disk space
Time
CD drives space
CD-RW
82. When a logic bomb is activated by a time-related event, it is known as a:
Time-related bomb sequence
Virus.
Time bomb
Trojan horse
83. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a
Time-related bomb sequence
Virus
Time bomb
Trojan horse
84. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A virus
Spybot
Logic bomb
Security patch
85. ------ is the measurement of things such as fingerprints and retinal scans used for security access
Biometrics
Bio measurement
Computer security
Smart weapon machinery
86. What is the most common tool used to restrict access to a computer system?
Hacker-proof program
Passwords
Computer keys
Access-control software
87. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
Hacker-proof program
Firewall
Hacker-resistant server
Encryption safe wall.
88. The scrambling of code is known as:
Encryption
a firewall
Scrambling
Password proofing
89. To prevent the loss of data during power failures, use a(n):
Encryption program
Surge protector
Firewall
UPS
90. ------Is defined as any crime completed through the use of computer technology
Computer forensics
Computer crime
Hacking
Cracking
91. ------ refers to electronic trespassing or criminal hacking
Cracking
Switching device of fifth generation computer is-
Spoofing
Smarming
92. The first electronic computer was developed by
J.V. Attansoff
Bill Gates
Simur Cray
Winton Serf
93. Snowbol is an/a---------
Operating system
HLL
Software
Search engine
94. Switching device of fifth generation computer is-
Vacuum tubes
Transistors
IC
VLSI
95. ---------- computers operates essentially by counting
Portable computer
Hybrid computer
Analog computer
Digital computer
96. ---------- computer is small general purpose micro computer, but larger than portable computer
Hybrid
Digital
Desktop
Laptop
97. Cathode Ray Tube is a form of.......
Keyboard
Mouse
Monitor
Mother board
98. Trackball is a...........
Input device
Output device
Programming language
Software
99. computer is a medium sized computer
Micro
Mainframe
Super
Mini
100. computer are of large size
Micro
Mainframe
Super
Mini
101. Note book, laptop,palm,hand-held computers are coming under the category of......... computer
Digital computer
Mainframe computer
Portable computer
Hybrid computer
102. Light pen and joystick are............
Algorithm
Input devices
Output devices
Portals
103. Touch Screen is............
Input device
Output device
Both a & b above
None of these
104. printer is the cheapest in terms of price and operating cost
Inkjet
Laser
Thermal
Dot matrix
105. printer is a non-impact printer and is quite in working
Inkjet
Laser
Thermal
Dot matrix
106. are high-end printers
Inkjet
Laser
Thermal
Dot matrix
107. are used for plotting graphs and design on papers
Trackball
Joystick
Light pen
Plotters
108. Daisy wheel, Drum, chain etc are the .............
Flow chart
Mouse School of Distance Education
Key board
Printers
109. are specific to users’ needs
System software
Application software
Assemblers
Compilers
110. Joshy, Perfumes are examples of.............
Operating system
Computer languages
Computer viruses
Web portals
111. Which of the following is/ are operating systems
Windows
Unix
OS/2
All of these
112. MAN stands for
Maximum Area Network
Minimum Area Network
Maximum Area Network
Metropolitan Area Network
113. Which of the following is a network topology
LAN
WAN
MAN
BUS
114. Which of the following is a type of network
Ring
Bus
Star
PAN
115. VOIP stands for.........
Voice over IP
Video over IP
Viruses over IP
Virtual over IP
116. The first web browser is
Mosaic
Netscape
Internet explorer
Collabra
117. LAN stands for..............
Limited Area Network
Logical Area Network
Local Area Network
Large Area Network
118. are set of rules and procedures to control the data transmission over the internet
IP address
Domains
Protocol
Gateway
119. NOS stands for
Node operating system
Non-open software
Network Operating system
Non-operating software
120. are system software to facilitate editing of text and data
MS Word
Editors
PowerPoint
MS publisher
121. Computers, combine both measuring and counting, are called
Analog
Digital
Hybrid
All of these
122. In world today, most of the computers are
Digital
Hybrid
Analog
Complex
123. Physical structure of computer is called
Software
Hardware
Human ware
All of these
124. In which type of computer, data are represented as discrete signals.
Analog computer
Digital computer
both
Hybrid Computer
125. Which of the following is available in the form of a PC now?
Mainframe
Microcomputer
Minicomputer
Both (B) & (C)
Submit