TOP 200 MCQS: Computer Awareness
TOP 200 MCQS: Computer Awareness
COMPUTER
AWARENESS
MCQS
1. Palmtop computers
2. Micro computers
3. Macro computers
4. Super computers
5. Mainframe computers
1. 2
2. 4
3. 8
4. 16
5. 32
Correct Answer – “3”
1. Simple
2. Series
3. Serial
4. Specification
5. Sorted
1 .tmp
2 .bin
3 .dbf
4 .com
5. .doc
5. WORM is a data storage technology that prevents the drive from erasing the
data. What is the full form of WORM?
1. Database
2. Spreadsheets
3. Graphics Package
4. Document Processor
5. Slide Presentation
1. Light pen
2. Plotter
3. Track ball
4. Microphone
5. Keyboard
1. Transistors
2. Integrated circuits
3. Vacuum tubes
4. VLSI
5. Semiconductor
1. Byte<KB<MB<GB<TB<XB<PB<ZB<YB
2. Byte<KB<MB<GB <TB<PB<XB<ZB<YB
3. Byte<KB<MB<GB<TB<XB<YB<ZB<PB
4. Byte<KB<MB<GB<TB<YB<PB<ZB<XB
5. None of the above
10. Which among the following language can be read like regular English?
1. PASCAL
2. COBOL
3. C
4. PROLOG
5. BASIC
11. Which one of the following software applications would be the most
appropriate for performing numerical and statistical calculations?
1. Database
2. Spreadsheets
3. Graphics Package
4. Document Processor
5. Slide Presentation
1. Page layout
2. Page break
3. Page access
4. Page facility
5. Page indent
1. Adlof Garrifield
2. Tim Berners Lee
3. Adder Tiff
4. Douglas Engelbart
5. Vint Cerf
15. In which of the following topology, each device is connected to every other
device on a network through a dedicated point-to-point link?
1. Star topology
2. Mesh topology
3. Hybrid topology
4. Bus topology
5. Ring topology
16. Which of the following enters computer through an email or free programs
that have been downloaded from the internet and cause plenty of damage?
1. Time bomb
2. Trojan horse
3. Worm
4. Both 1 & 2
5. Virus
1. NewDocument
2. 1Document
3. NewDoc
4. DocumentNew
5. Document1
1. Trash bin
2. Span
3. Junk
4. Recycle bin
5. Spam
1. Assembly level
2. Low level
3. High level
4. Computer logic
5. Machine Language
20. The errors that can be pointed out by the compiler are
1. Semantic errors
2. Memory Allocation errors
3. Logical errors
4. Syntax errors
5. Runtime errors
1. Daniel Cougher
2. Vint Cerf
3. Robert Zawecki
Top 200 Computer Awareness Questions Free e-book
4. William English
5. Douglas Engelbart
22. Which of the devices converts drawing, printed text or other images into
digital form?
1. Keyboard
2. Scanner
3. Plotter
4. OMR
5. Photocopier
1. Google
2. Microsoft
3. Amazon
4. IBM
5. Yahoo
24. Which menu option is used to add Header and Footer in a document?
1. File
2. Review
3. References
4. Insert
5. Mailings
25. What do we call the pictorial representation that uses predefined symbols to
describe either the logic of a computer program or the data flow and
processing steps of a system?
1. Flowchart
2. Algorithm
3. Block diagram
4. Loop
5. Array
26. Which among the following is a device, that is used in computers to add
external components?
27. Which among the following is the most common source of Viruses to the hard
disk of your computer?
1. Incoming Email
2. Outgoing Email
3. CD-ROM
4. Websites
5. Web Pages
28. Which among the following is used for removing a software bug / defect
which is available for free of cost from the software provider?
1. Version
2. Update
3. Help
4. Patch
5. Upgrade
29. Which of the following Key is not found in normal computers / laptops?
1. turn
2. alt
3. del
4. Shift
5. ctrl
30. Structured programming languages such as C, COBOL and FORTRAN were used
in which of the following computers?
1. First
2. Second
3. Third
4. Fourth
5. Fifth
32. A file which has not been altered, compressed, or manipulated in any way by
the computer is called?
1. temp file
2. raw file
3. permanent file
4. directory files
5. ordinary files
33. In a computer file system which among the following is top or first in
hierarchy?
1. root directory
2. parent directory
3. home directory
4. working directory
5. Current directory
Correct Answer – “1”
34. When some unidentified / unknown person / firm sends you mail in a
trustworthy / lucrative way asking for sensitive banks and online payment
information, this is a case of __________ ?
1. spam
2. hacking
3. Phishing
4. Theft
5. Cyber crime
35. A network that is connected to the Internet, but uses encryption to scramble all
the data sent through the Internet is called?
1. Universal network
2. Wireless Network
3. Social Network
4. Personal Area Network
5. Virtual private Network
36. The terms Goodput, Throughput and Maximum throughput are most closely
associated with which among the following in computers?
1. Bit Rate
2. Response Time
3. Command Line Interface
4. Random memory
5. Real Time
1. TCP
2. POP
3. FTP
4. Telnet
5. IP
Correct Answer – “2”
38. The process of transferring files from a computer on the Internet to your
computer is called?
1. downloading
2. Uploading
3. FTP
4. JPEG
5. PNG
1. Storage
2. Motherboard
3. CPU
4. Memory
5. Peripherals
1. Data warehouse
2. Data mining
3. Database
4. Data dictionary
5. Directory
1. The platform
2. The motherboard
3. Application software
4. The operating system
5. System software
42. The basic unit of a worksheet into which you enter data in Excel is called a
1. tab
2. cell
3. box
4. Range
5. row
1. File
2. Guide
3. Template
4. user guide file
5. None of these
44. Unauthorized copying of software to be used for personal gain instead of for
personal backups is called
1. program thievery
2. data snatching
3. software piracy
4. program looting
5. data looting
45. When you are working on a document on PC, where is the document
temporarily stored?
1. RAM
2. ROM
3. CPU
4. CD-ROM
5. Motherboard
1. batch processing
2. multithreading
3. multiprogramming
4. networking
5. All of the above
1. Backup software
2. Antivirus software
3. Disk tools
4. Media Players
5. None of the above
49. To move data from one part of the document to another, which of the
following is used?
1. Clock speed
2. Access speed
3. Frequency
4. Access time
5. Response speed
1. Row
2. Column
3. Cell
4. Room
5. Sheet
52. A GUID is a 128-bit (16 byte) number used by software programs to uniquely
identify the location of a data object. What is correct full form?
53. Which among the following is the chat program that lets users communicate in
real time?
1. WhatsApp
2. Google chat
3. Google plus
4. Instant messaging
5. Google mail
1. Malware
2. Virus
3. Hacker
4. Trojan horse
5. None of these
55. If the computer is not able to connect with other computers, it is said to be
1. Communication gap
2. Offline
3. Sleeping mode
4. Switch off mode
5. Boot mode
1. telnet
2. Railnet
3. Internet
4. Ethernet
5. intranet
1. File
2. Home
3. Insert
4. Font
Top 200 Computer Awareness Questions Free e-book
5. Edit
1. telnet
2. Ethernet
3. Intranet
4. World wide web
5. None of these
1. ROM
2. EEPROM
3. RAM
4. DRAM
5. CD-ROM
1. Execution cycle
2. Algorithm
3. Assess cycle
4. Full cycle
5. flowchart
61. Which of the following type of network is highly reliable on phone lines?
1. LAN
2. MAN
3. WAN
4. CAN
5. TAN
62. What is the maximum number of Operating System that can work in a
computer at a time?
1. One
2. Two
3. Three
4. Four
5. Five
1. Screen saver
2. Desktop
3. Background information
4. Software background
5. Wallpaper
64. Which among the following type of computer is rare because of the size and
cost of it?
1. Mini computer
2. Super computer
3. Mainframe computer
4. Server computer
5. Micro computer
65. Which among the following is the programming language used in first
generation computers?
1. FORTRAN
2. Machine Language
3. High Level Language
4. Low Level Language
5. Assembly Language
66. Smart Art is the feature of which among the following versions of MS Office
application suite?
1. MS Office 2003
2. MS Office 2007
3. MS Office 2009
4. MS Office 2010
5. MS Office 2011
67. How many types of semiconductor memory a computer can have that it uses
for the purpose of storage of information?
1. Two
2. Three
3. Four
4. Five
5. More than five
68. If you are not able to download something from a website because of traffic, it
is known as
69. What is the maximum capacity of the single layer Blu Ray Disk?
1. 50 GB
2. 75 GB
3. 60 GB
4. 25 GB
5. 40 GB
1. Five
2. Seven
3. Nine
4. Eight
5. Eleven
1. Color Boson
2. HPC
3. PARAM Ishan
4. PARAM 2000
5. PARAM 8000
1. Pie
2. KitKat
3. Nougat
4. Android Q
5. Jellybean
73. Which among of the following counting device was developed in China had
rectangular wooden frame and beads on it?
74. Which of the following printers work by melting the solid ink that applies the
images to the paper?
1. Impact printer
2. Non-Impact printer
3. Solid Ink printer
Top 200 Computer Awareness Questions Free e-book
4. LED printer
5. Plotter
1. Deleting a cell
2. Clear all data
3. Divide function
4. Bold the text
5. Redo
1. Impact Printer
2. Non-Impact Printer
3. Band Printer
4. Drum Printer
5. Chain Printer
78. Which among the following stores data of frequently used information from
main memory?
1. Hard disk
2. RAM
3. ROM
4. Cache memory
5. Primary memory
1. CAN
2. PAN
3. LAN
4. WAN
5. MAN
80. If you want your computer to start at the stage in which it was turned off, you
have to put it in
1. Access mode
2. Address mode
3. Hibernate mode
4. Destroy mode
5. Switch off mode
81. In case of computer, which type of menu will show further sub-choices?
1. Push application
2. Pull down
3. Bow down
4. Drag
5. Drag down
82. Which is the program on your computer that appears as genuine application
but actually causes damage to executable programs?
1. Trojan horse
2. Sunday
3. Cascade
4. Cars
5. Attest
83. In a database, which feature will allow to search for any record contained in it?
84. Which among the following is used to check whether the user of a website has
accessed the content but it works usually invisibly?
1. Website
2. Web Crawler
3. Web Page
4. Web Beacon
5. None of the above
1. Seven
2. Six
3. Eight
4. Five
5. Four
86. There are seven layers in OSI model. What is ‘S’ in OSI?
1. Secure
2. Service
3. Systems
4. Software
5. Source
87. What are the programs which can replicate themselves and at the same time
slow down the hard drive by consuming space in it?
1. Computer worms
2. Computer memory
3. Computer space
Top 200 Computer Awareness Questions Free e-book
4. Computer software
5. Computer firewall
88. Name the device which is used for directing and dispatching data packets
between various networks.
1. Hub
2. Switch
3. Router
4. Repeater
5. Signal
89. What is called as a management system of texts in which references are given
to various texts by creating associations between them?
1. Text document
2. Hypertext
3. Text users
4. Text application
5. Text access
1. Grammar mistake
2. Spelling error
3. Font change
4. None of these
5. Repeated word
91. Name the software that is required to run any hardware component in a
computer system.
1. Hardware driver
2. Device driver
3. Direct driver
4. Device component driver
5. Device disk
1. FORTRAN
2. C
3. C++
4. Java
5. .NET
93. Which of the following is a column, or set of columns, in a table that can
uniquely identify any database record without referring to any other data?
1. Super key
2. Candidate key
3. Primary key
4. Alternate key
5. Foreign key
94. AGP slot on a motherboard provides for a direct connection between the card
and memory. What does ‘A’ stands for AGP?
1. Aerial
2. Automated
3. Advanced
4. Accelerated
5. Asynchronous
1. CD-ROM
2. Floppy Disk Drive
3. Pen drive
4. RAM
5. Hard Disk Drive
96. In which type of network topology, all the nodes are connected to a single hub
through a cable?
1. Bus topology
2. Ring topology
3. Mesh topology
4. Tree topology
5. Star topology
97. What do we call the pictorial representation that uses predefined symbols to
describe either the logic of a computer program or the data flow and
processing steps of a system?
1. Flowchart
2. Algorithm
3. Block diagram
4. Loop
5. Array
98. OMR is an electronic method that scans a document and reads the data from
the marked fields. What does ‘M’ stands for in OMR?
1. Memory
2. Manager
3. Machine
4. Mark
5. Multiple
99. Which of the following shortcut key save the open document in MS Word like
‘Ctrl + S’?
1. Shift + F7
2. Shift + F3
3. Shift + F12
4. Ctrl + Shift + F12
5. Ctrl + Shift + F6
100. Which of the following MS Power Point tab holds commands related to the
presence of slides like page setup and slide orientation?
1. Transition
2. Insert
3. Design
4. Animation
5. Review
101. World Wide Web is a collection of all information, resources, pictures, sounds
and multimedia on the internet which is accessed through
1. HTML
2. FTP
3. UDP
4. HTTP
5. SMTP
1. Transistors
2. Vacuum tubes
3. Microprocessor
4. Integrated circuit
5. None of these
1. Scrollbar
2. Page up key
3. Tab key
4. Home Key
5. Page down key
104. Which ports connect special types of music instruments to sound cards?
1. BUS
2. CPU
3. USB
4. MIDI
5. UPS
106. Which type of memory gets lost when you switch off?
1. RAM
2. ROM
3. Cache
4. Dynamic
5. Static
1. an external device
2. an adjunct device
3. a peripheral device
4. a ribbon cable
5. An internal device
108. A computer program that converts an entire program into machine language
is called a/an
1. Simulator
2. Interpreter
3. Compiler
4. Commander
5. Convertor
1. Home Page
2. Frame Page
3. Site Map
4. Error Page
5. Web Page
111. To convert all text in a word document to bold, which keys should be used?
1. Ctrl + U
2. Ctrl + C
3. Ctrl + Shift + B
4. Ctrl + F
5. Ctrl + B
112. Most Web pages seen on the web have the extension HTML. HTML stands for
1. C
2. C++
3. Java
4. .NET
5. Python
1. Click
2. Double click
3. Right click
4. Left click
5. Drag & Drop
1. Track ball
2. Joystick
3. Light pen
4. Touch screen
5. Both 1 & 2
1. NOR
2. NAND
3. AND
4. OR
5. NOT
1. Manager
2. Management
3. Machine
4. Marker
5. Method
119. If you wish to extend the length of the network without having the signal
degrade, you would use a _______.
1. Repeater
2. Router
3. Gateway
3. Switch
5. None of these
1. Memory
2. ALU
3. Flag Register
4. CU
5. Calculator
121. To delete the selected item permanently, which of the following shortcut key
combination should be used?
1. Alt + Delete
2. Shift + D
3. Shift + Delete
4. Alt + D
5. Alt + Shift + Delete
1. Starting
2. Entering
3. Formatting
4. None of these
5. Booting
1. Edit menu
2. Tools menu
3. File menu
4. Insert menu
5. View menu
1. Go to
2. Table
3. Chart
4. Diagram
5. Formula and Function
1. Computer system
2. Computer architecture
3. Computer programming
4. Computer algorithm
5. Computer flow chart
127. If internet services are provided by transmitting data over the wires of
telephone network, which of the following is used?
1. Anodes
2. Digital Subscriber Line
3. Digital Anodes
4. Wireless Diodes
5. Wires
128. Where does encryption and decryption of data take place in OSI model?
1. Transport layer
2. Presentation layer
3. Session layer
4. Application layer
5. physical layer
129. What key links records from one database table to a record or records in
another database table?
1. Primary key
2. Principal key
3. Foreign key
4. Link key
5. Candidate key
130. What is that computer program called which translates one program
instruction at a time into machine language?
1. Compiler
2. CPU
3. Assembler
4. Simulator
5. Interpreter
131. The _________ button on the Quick Access Toolbar allows you to cancel your
recent commands or activities.
1. Search
2. Cut
3. Undo
4. Redo
5. Shift
1. page set-up
2. buttons
3. diagrams
4. charts
5. worksheets
133. Which PowerPoint view displays each slide of the presentation as a thumbnail
and is useful for rearranging slides?
1. Slide Sorter
2. Slide Show
3. Slide Master
4. Notes Page
5. Slide Design
135. The software that is used to create text based documents is referred as
1. DBMS
2. Suite
3. Spreadsheets
4. Presentation software
5. Word processor
1. UPS address
2. proxy server
3. IP address
4. domain name
5. URL
1. Pointing Device
2. Scanning Device
3. Sensing Device
4. Moving Device
Top 200 Computer Awareness Questions Free e-book
1. Exit Application
2. Select All
3. Clear All
4. Align Center
5. Minimize
1. Programming Language
2. Operating system
3. Storage Device
4. Output Device
5. Processor
140. Which key is used to delete one character at a time to the left?
1. DEL
2. CAPS LOCK
3. CTRL
4. SHIFT
5. BACKSPACE
1. 100%
2. 200%
3. 400%
4. 500%
5. 300%
1. Netscape
2. Chrome
3. Firefox
4. Both (b) and (c)
5. All of the above
1. high-level language
2. machine language
3. hypertext language
4. low-level language
5. assembly language
144. Two or more computers connected to each other for sharing information
form a ______________.
1. Router
2. Server
3. Network
4. Tunnel
5. Pipeline
1. TML
2. COBOL
3. JAVA
4. C++
5. TCP/IP
146. Which of the following key are used to open file menu of current program?
1. Ctrl + F
2. Shift + F
3. Alt + F
4. Ctrl +Alt + F
Top 200 Computer Awareness Questions Free e-book
5. Alt + Shift + F
147. In second generation, which type of primary memory was used to store data?
1. Paper tapes
2. IC
3. Magnetic core
4. Magnetic tape
5. Magnetic disk
1. News Group
2. Trash
3. Backbone
4. Spam
5. Phishing
1. Insert – Chart
2. Home – Chart
3. Format – Chart
4. Table – Chart
5. None of these
1. label
2. cell
3. field
4. value
5. None of these
151. The _____________ menu contains the options to add symbols in a Word
document.
1. Home
2. Insert
3. Review
4. Mailing
5. View
152. A word in a web page that, when clicked, opens another document.
1. anchor
2. URL
3. hyperlink
4. reference
5. None of these
153. Which of the following refers to the forging of the return address on an e-
mail so that the e-mail message appears to come from someone other than the
actual sender?
1. Spoofing
2. Redacting
3. Spamming
4. Pharming
5. Ransomware
1. LAN
2. FAN
3. TAN
4. WAN
5. VPN
1. Datalink Layer
2. Network Layer
3. Session
4. Presentation
5. Application
156. Which among the following device performs modulation and demodulation?
1. Modem
2. Fiber optic
3. Satellite
4. Coaxial Cable
5. Repeater
1. Plotter
2. Slide presentation
3. Bookmark
4. Pie Chart
5. Microsoft Excel
158. How can you access the font size tool on font dialog box in MS Word?
1. Ctrl + S
2. Ctrl + Shift + S
3. Ctrl + P
4. Ctrl + Shift + P
5. Alt + P
159. Networking such as LAN, MAN started from which generation of computers?
160. HTML tags are the hidden keywords within a web page that define how the
browser must format and display the content. Which type of brackets makes an
HTML tag?
1. Flower brackets { }
2. Angular brackets < >
3. Parentheses ( )
4. Square brackets [ ]
5. Inverted Comma ” “
1. Laser
2. TWAIN
3. Cartridge
4. Browser
5. Both (a) and (b)
1. 4 bits
2. A value equal to a kilobyte
3. A value equal to a megabyte
4. The smallest unit of digital information
5. The same things as a pixel
1. 15
2. 12
3. 11
4. 16
5. 10
164. Coded entries which are used to gain access to a computer system are called
___________.
1. Entry codes
2. Passwords
3. Security commands
4. Code words
5. Encryption
1. CD
2. DVD
3. ROM
4. RW
5. RAM
1. ENIAC
2. EDSAC
3. EDVAC
4. UNIVAC
5. PASCAL
168. What do you call the programs that are used to find out possible faults and
their causes?
1. CPU
2. Software
3. Hardware
4. Peripheral
5. Motherboard
171. Which of the following techniques can be used to store a large number of
files in a small amount of storage space?
1. File adjustment
2. File copying
3. File compatibility
Top 200 Computer Awareness Questions Free e-book
4. File compression
5. File maintenance
1. Alt
2. Shift
3. Control
4. Escape
5. Caps Lock
174. Which of the following Office programs offers the animation feature?
1. Word
2. Excel
3. PowerPoint
4. Access
5. Paint
175. In MS Word, ______________ is a predefined decorative text that you can add to
a document.
1. ClipArt
2. SmartArt
3. Charts
4. WordArt
5. Comment
176. Which of the following places the common data elements in order from
smallest to largest?
1. Primary key
2. Alternate key
3. Candidate key
4. Secondary key
5. Foreign Key
180. A barcode is a/an ________ code that represents data with bars of varying
widths or heights.
1. optical
2. magnetic
3. laser
Top 200 Computer Awareness Questions Free e-book
4. read/write
5. printed
1. Co-axial Cable
2. Untwisted Wire
3. Telephone Lines
4. Fiber Optic
5. USB
1. 32 bits
2. 128 bytes
3. 64 bits
4. 128 bits
5. 16 Bits
1. LAN of an organization
2. a Wide Area Network connecting all branches of an organization
3. a corporate computer network
4. a network connecting all computers of an organization and using the
internet protocol
5. None of these
185. ______________ is the set of programs that enables your computer’s hardware
devices and application software to work together.
186. Which output device transfers processed information into a printed page?
1. Scanner
2. Printer
3. Monitor
4. CD-ROM
5. Digital Camera
187. Identify the volatile storage device amongst the following devices?
1. RAM
2. Hard disc
3. Magnetic tape
4. ROM
5. Floppy Disk
1. Rows
2. Key
3. Attribute
4. Fields
5. Value
189. What is the blinking symbol on the screen that shows where the next
character will appear?
1. Cursor
2. Delete key
3. Arrow key
4. Return key
5. Hyperlink
190. Which of the following computers exhibits the features of both analog and
the digital computers?
1. Super computer
2. Mini computer
3. Laptop
4. Mainframe computer
5. Hybrid computer
1. RAM
2. Printer
3. Monitor
4. ROM
5. Mouse
192. Who among the following is considered the father of modern computing?
193. Which among the following is the smallest unit in an image in a computer
screen?
1. Unit
2. Pixel
3. Array
4. Resolution
5. Clip
1. File
2. Home
3. Insert
4. Review
5. References
195. In MS Word document, how can spelling and grammar errors be detected?
1. Press Shift + F7
2. Press Ctrl + F7
3. Press Alt + F7
4. Press F7
5. Press Ctrl + F1
1. GIF
2. BMP
3. TXT
4. LMP
5. TIF
Correct Answer – “1”
197. Which among the following carries signals that control the actions of the
computer?
1. Control Bus
2. Data Bus
3. Memory Unit
Top 200 Computer Awareness Questions Free e-book
4. NIC
5. Address Bus
1. Processing Websites
2. Database Sharing
3. Storage
4. Word Processing
5. Email Processing
Correct Answer – “4”
1. volatile data
2. non volatile data
3. permanent data
4. temporary data
5. intermediate data
BLOG FORUM
www.OliveBoard.in