Computer MCQ'S
Computer MCQ'S
software are the commonly known software. b) Fix Point Operations Per Second
a) System c) Float Point Operations Per Second
b) Operating d) Feet Point Operations Per Second
c) Application Simplex, half-duplex and duplex are
d) Communication The different types of data transmission .
The is plugged into motherboard generates image for display. a) modes
a) Video card b) media
b) Fan c) topology
c) Sound card d) speed
d) Network card What is the full form MICR input device?
The speed of a supercomputer is generally measured in a) Magnetic-Ink Character Recognition
a) FLOPS b) Magnetic-Inkjet Character Recognition
b) BLOPS c) Map-Ink Character Recognition
c) ELOPS d) Master-Ink Character Recognition
d) TLOPS Leased line is a special conditioned Telephone line Connecting
In MS Word 2019, which of the following shortcut keys is used two computer or two-line terminating equipment directly and
to close the document? permanently. It is also known as
a) Ctrl + C a) Switched line
b) Ctrl + S b) Dial-up line
c) Ctrl + W c) Dedicated line
d) Ctrl + O d) Integrated line
How many antiviruses should run at a time in a computer register holds an instruction while it is being executed.
system? a) Input
a) 4 b) Instruction
b) 5 c) Inner
c) 3 d) Internal
d) 1 What is the full form of DSS in context of information
is a real-world object that exists physically or systems?
conceptually. a) Decision Support System
a) Entity B. Table b) Drawing Support System
b) Record D. Attribute c) Detail Support System
In MS Excel 2019, which of the following shortcut key is used to d) Draft Support System
open the format cells dialog? What is the full form of EPROM?
a) Ctrl + 1 a) Electrically Programmable ROM
b) Ctrl + 2 b) Erasable Programmable ROM
c) Ctrl + 3 c) Extended Programmable ROM
d) Ctrl + 4 d) Easy Programmable ROM
A ____is a soft copy output device used to display text and is an electronic device that
graphics information generated by a computer through a video receives a signal and retransmits it at a higher
card. lever so that signal can cover longer distance.
a) Printer a) Modulator
b) Projector b) Repeaters
c) Plotter c) Oscillator
d) Monitor d) Amplifier
Mouse, Trackball, Electronic, pen etc., are Which part of computer performs all major
which type of input device? calculation and comparison and also activates
a) Keyboard devices and controls the operations of other units of
b) Vision based devices the computer system?
c) Point-and-draw devices a) Memory Unit
d) Speech recognition devices
b) Input Unit
IPv4 is a bit numeric address.
c) Output Unit
a) 64
d) CPU
b) 16
Which of the following is antivirus software?
c) 128
a) Blocks
d) 32
b) AVG
Which of the following is a file extension
c) Coffee Cup
in MS Word 2019 template?
d) Wix
a) dopx is the process of entering data and
b) osx instructions into a computer system.
c) dotx a) Controlling
d) doix
b) Storing
c) Inputting
What is the full form of FLOPS in the context
d) Processing
of speed of supercomputer?
An/ A . is written, which is an English-like explanation of A. 1999
the solution. B. 1995
a) Flowchart C. 1997
b) Pseudo code D. 1993
c) Algorithm 35. Which one is used as guided media for data transmission?
d) Solution A. Microwave
In MS PowerPoint 2019, format background can be found under B. Twisted pair
which tab? C. Radio
a) View b) Design D. Infrared
c) Transition d ) Animations 36. How many bits are there in a nibble?
Control unit and arithmetic logic unit of a computer system are A. 2
together known as: B. 1
1. Memory Unit C. 3
2. Input Unit D. 4
3. Output Unit 37. Which register holds address of the active memory
4. Central Processing Unit location?
refers to the physical devices of a computer system. A. Memory Buffer Register
1. Adware B. Memory Backup Register
2. Hardware C. Memory Access Register
3. Firmware D. Memory Address Register
4. Software 38. The gradual deterioration of signal strength across long
Arrange the steps of SDLC in ascending order. distance is called____.
1. Requirement Specification A. Noise
2. Maintenance B. Sampling
C. Disturbance
3. Analysis and Design D. Attenuation
a) 1-3-2
39. Machine language is written as strings of. ____and ______.
b) 1-2-3
A. 2, 3
c) 2-3-1
B. 0, 1
d) 3-2-1
C. 3, 4
What is the full form ASCII?
D. 1, 2
a) America Standard Code for Input Interchange
40. Which inputs device is used to recognize a pre-specified
b) American Standard Code for Information Interchange
type of mark made by pencil or pen?
c) Asian Standard Code for Information Interchange
A. Mouse
d) African Standard Code for Information Interchange
B. Magnetic-Ink Character Recognition
29. Data _____means the storing the same data at multiple
C. Optical Mark Reader
locations
D. Bar Code Reader
A. Independence
41. _____is processed manipulated and interpreted data. A.
B. Redundancy
Facts
C. Inconsistency
B. Information
D. Shared
C. Data
30. In MS Excel 2019, which of the following shortcut key is
D. Knowledge
used to bold the text of selected cell?
42. In context of computer devices, ___ is used to input data
A. Ctrl + 3
directly into the computer from the source document without
B. Ctrl + 4
copying and typing the data.
C. Ctrl + 5
A. Monitor
D. Ctrl + 2
B. Hard disk
31.____ device is an electromechanical device that accepts data
C. Joystick
from outside world and translate them into a form computer
D. Scanner 4
can interpret.
43. Which of the following is sequential access device?
A. Controlling
A. CD-ROM
B. Output
B. DVD
C. Input
C. Magnetic tape
D. Accessing
D. Memory card
32. Which worm is also known as the Great Worm?
44. What is the full form of CAM?
A. Nimda
A. Computer Add Manufacturing
B. Morris worm
B. Computer Aided Mining
C. ILOVEYOU
C. Computer Add Mining
D. Code Red
D. Computer Aided Manufacturing
33. A ____communication system can transmit data in one
45. Notebook computer, desktop computer and handheld
direction only.
computer are the example of which type of computer?
A. complete
A. Minicomputer
B. connected
B. Microcomputer
C. Duplex
C. Mainframe
D. simplex
D. Supercomputer
34. In which year was the first version of Wi-Fi standard
46. A._____.is a text file containing a string of information
introduced?
which stores browsing information on the hard disk of your moves, nozzles spray ink on it, forming characters and images?
computer. A. Drum
A. cookies B. chain
B. node C. Laser
C. add-on D. Inkjet
D. plug-ins 58. Which of the following is a European standard font for OCR?
47. Which of the following is a type of view in MS PowerPoint A. OCR-B
2019? B. OCR -C
A. Draft C. OCR-D
B. Print Layout D. OCR - A
C. Reading view 59.____. port transmits one bit of data through a single wire
D. Web layout and is used to connect external modems, plotters
48. In MS Excel 2019, which of the following shortcut keys is A. Serial
used to select an entire column in worksheet? B. Glass
A. Ctrl + Spacebar C. Number
B. Tab + Spacebar D. VDU
C. Alt + Spacebar 60. How many function keys are there in a QWERTY keyboard?
D. Shift + Spacebar A. 8
49. Primary storage is also known as: B. 12
A. Main memory C. 10
B. Auxiliary storage D. 9
C. Secondary memory 61. 1 Petabyte = ________bytes.
D. Prime memory A. 1015
50. ______is used to define the structure of a database. B. 109
A. Report generator C. 1012
B. Data manipulation language D. 1018
C. Query language 62. In case of operational amplifiers, the term CMRR stands
D. Data definition language for____.
51. Which software are used to make a copy of the information A. Collector mode real ratio
stored on a disk? B. Common mode random ratio
A. System manager C. Collector mode rejection ratio
B. Registry manager D. Common mode rejection ratio
C. File manager 63. PLL stands for____.
D. Backup utilities A. Phase Locked Logic
52.___ in a computer system is a method of bypassing normal B. Phase Locked Loop
authentication securing remote access to computer obtaining C. Primary Locked Loop
access to plain text and so on while attempting to remain D. Primary Logic Loop
undetected. 64. What is the full form of PSTN in context of networks?
A. Root kits A. Public Signal Telephone Network
B. Spyware B. Personal Switched Telephone Network
C. Botnet C. Private Switched Telephone Network
D. Backdoors D. Public Switched Telephone Network
53. In MS Access 2019, relationships can be found under which 65. What is the full form of DDL in database management
tab? System?
A. Database tools A. Domain Definition Language
B. External data B. Data Demand Language
C. Create C. Data Destination Language
D. Home D. Data Definition Language
54._____ is software for hardware. 66. ______allow data entry into a computer by processing a set
A. Firmware of keys.
B. Middleware A. Keyboard device
C. Adware B. OCR device
D. Spyware C. Point-and-draw devices
55. A.____ is an electromechanical device which is used to D. Image scanner
input alphanumeric data into a computer. 67. 1 picosecond =____seconds.
A. Keyboard A. 10-6
B. Trackball B. 10-9
C. Mouse C. 10-12
D. Joystick D. 10-15
56. Which of the following is a property of a virus program? 68. ____is a software code intentionally included into a system
A. It never spreads across any network with the intention to harm the system
B. Virus doesn't infect an executable file or program A. Spyware
C. It can never be attached to other healthy programs B. Firmware
D. It is difficult to trace a virus after it has spread across a C. Malware
network D. Adware
57. Which printer consist of tiny nozzles and as the paper 69. Which input device is used to convert bitmap images of
characters to equivalent ASCII code? B. Satellite transmission
A. Barcode Device C. Microwave transmission
B. MICR Device D. Radio transmission
C. OMR Device 82. What is the full form of OMR?
D. OCR Device 7 A. Optic Marks Reader
70. What is the shortcut key to expand or collapse the ribbon in B. Optical Mark Recognition
MS- PowerPoint? C. Optical Mask Recognition
A. Ctrl+F4 D. Optic Masks Recognizer
B. Ctrl+F1 83. Seek time is_________.
C. Ctrl+F2 A. time for data reading
D. Ctrl+F3 B. time taken for desired sector of the track to come under
71. What is the full form of OSS? read/write head
A. Open Signal Software C. time taken to move the read/write head to desired track D.
B. Open-Source Software time for data transfer
C. Open Store Software 84.___ is the diagrammatic representation of the logic for
D. Open System Software solving a task
72. What is the function of Ctrl+O in the MS-Word? A. Program
A. Create a document B. Pseudo code
B. Open the document C. Flowchart
C. Close the document D. Software
D. Save the document 85. In MS PowerPoint 2019, which of the following shortcut key
73. What is the full form of ALU? is used to open or replace the dialog box?
A. Analog Logic Unit A. Ctrl + H
B. Alternate Logic Unit B. Shift + H
C. Algorithmic Logic Unit C. Shift + R
D. Arithmetic Logic Unit D. Ctrl + R
74. _______is the brain of a computer system. 86. Among the following Antivirus software is:
A. Memory unit A. Weebly
B. Input unit B. Avast
C. Central processing unit C. Creo
D. Output unit D. BugsBee
75. In which year domain name system was introduced? 87.____are used to identify coding errors at different stages of
A. 1983 software development.
B. 1987 A. Translator
C. 1981 B. Linker
D. 1981 C. Debugger
76. Packet sniffing, E-mail hacking and password cracking are D. Loader
used to___ access to the system. 88. Keyboard device, Point-and-draw devices, Data Scanning
A. self devices etc., are the classification of which type of devices?
B. personal A. Output
C. authorized B. Memory
D. unauthorized C. Input
77. Electronic systems that transfer data from one point to D. Printer
another are called_____. 89. _____ is the process of storing data and instructions to
A. data collecting system make them readily available for initial or additional processing
B. data communication system as and when required.
C. data storage system A. Inputting
D. data controlling system B. Arranging
78. Which shortcut key is used to close the workbook in the C. Storing
MS-Excel? D. Executing
A. Ctrl+ O 90. Word-processing software, spread sheet software, database
B. Alt+ W software is the example of_______.
C. Ctrl+ W A. application software
D. Alt+ C B. operating system
79. What is the full form of RAM? C. system software
A. Random Access Memory D. translator
B. Read Access Memory 91. RJ 45 is a _____ pin connector that is used exclusively with
C. Real Access Memory Ethernet cables for networking:
D. Random Alternate Memory A. 10
80. Which of the following is application software? B. 6
A. Utility programs C. 8
B. Operating system D. 4
C. Spread sheet software 92. ____is a malware, that looks like legitimate software and
D. Programming language translators once it tricks a user into installing it:
81.____.is an example of guided data transmission media. A. A. Trojan
Twisted pair B. Spyware
C. Ransomware C. Machine language
D. Adware D. Assembly language
93. Magnetic disk, Magnetic tape, optical disk are example of 104. These are the minority carriers in case of n-type
which type of memory? semiconductors
A. Main A. Neutrons
B. Primary B. Electrons
C. Cache C. Holes
D. Secondary D. Photons
94. OCR-A is the one of the standard form fonts of OCR. What is 105. In SSL Digital Certificate, what is the full form of SSL? A.
the full form of A? Single Socket Layer
A. Australian B. Secure Socket Layer
B. Asian C. Single Stable Layer
C. American D. Secure Stable Layer
D. African 106. What is the full form of BIOS?
95. In MS Excel 2019, sort & filter can be found under which of A. Board Input Output System
the following tabs? B. Basic Input Output System
A. Data C. Based Input Output System
B. View D. Booting Input Output System
C. Formulas 107. In MS Word 2019, which of the following shortcut keys is
D. Insert used to copy the selected formatting?
96. Data ____means having different data values for the A. Ctrl + Shift + C
common fields in different file. B. Ctrl + C
A. Backup C. Ctrl + Alt + C
B. Redundancy D. Alt + Shift + C
C. Inconsistency 108. In MS Excel 2019, which of the following shortcut key is
D. Integrity used to go to the view tab?
97. All computer systems stores receive and share information. A. Alt + W
Such information stored in units is called? B. Ctrl + W
A. Record C. Alt + V
B. Structure D. Ctrl + V
C. Arrays 109. Personal computer, laptop, tablets are the example of
D. Files which type of the computer?
98. The degradation of signal due to internal or external A. Supercomputer
disturbance is called_____. B. Mainframe
A. repetition C. Microcomputer
B. distortion D. Minicomputer
C. modulation 110. What is the full form of FDM in 3D printing?
D. amplification A. Fused Direct Making
99. What is the full form of PDA? B. Fused Deposition Modeling
A. Personal Discrete Assistant C. Fused Deposition Making
B. Personal Data Assistant D. Fused Direct Modeling
C. Personal Digit Assistant 111. Which database model organizes its data elements as
D. Personal Digital Assistants multiple tables with rows and columns?
100. Which register holds information on its way to and from A. Hierarchical B. Relational
memory? C. Network
A. Memory Backup Register D. Object oriented
B. Memory Buffer Register 112. What is the full form of FSK in context of data modulation
C. Memory Bank Register technique?
D. Memory Address Register A. Frequency Sign Keying
101. When entire CPU (both CU and ALU) is contained on a B. Frequency Shift Keying
single tiny silicon chip it is known as: C. Frequency Shape Keying
A. Macroprocessor D. Frequency Signal Keying
B. Middle processor 113. Which software are used to clean and optimize the
C. Miniprocessor windows registry by deleting the old registry keys that are no
D. Microprocessor longer in use?
102. _______. represents alphanumeric data by a combination A. Space cleaner
of adjacent vertical lines by varying their width and the spacing B. Registry cleaner
between them. C. Disk cleaner
A. Line code D. Window cleaner
B. Cheque code 114.___ contains a photocell in a small tube and is used to
C. C Mark code select objects directly on the computer screen
D. Bar code A. Touch screen
103. Which type of language a computer understands without B. Light pen
using a translation program? C. Joystick
A. High level language D. Mouse
B. Middle level language
115. In MS Excel 2019, DMAX is a.______ function. D. Compiler
A. database 127._____ is a collection of people, procedures, software,
B. statistical databases and devices that supports problem specific decision
C. Date and time making.
D. financial A. Domain specific system
116. Which of the following represents a valid email id? B. Domain support system
A. user@gmail@com C. Decision support system
B. user.gmail.com D. Decision supply system
C. user.gmail@com 128. Which of following is file extension in MS Excel 2019?
D. [email protected] A.xpbs
117. Which of the following is antivirus software? B.xlds
A. Tally C..xlsb
B. Photoshop D.xlci
C. EtherCale 129. Ethical hackers are also called as ___hackers.
D. Norton A. White hat
118. A ____. is a non-impact printer which uses a laser beam to B. Grey hat
produce an image on a negatively charged cylindrical drum. C. Black hat
A. chain D. Yellow hat
B. drum 130. In database approach, where the data descriptions are
C. inkjet stored in central location known as
D. laser A. symbol table
119. Which of the following is a semiconductor? B. data dictionary
A. Silicon C. data table
B. Carbon D. data record
C. Thorium 131. A_____ is a display screen that can identify the occurrence
D. Copper and position of a touch inside the display region.
120. If a letter is to be typed in capital, then which of the A. Trackball
following key is used with that letter? B. Joystick
A. Alt C. Stylus
B. Ctrl D. Touch screen
C. Tab 132. What is the full form of SDLC?
D. Shift A. Software Development Life Cycle
121. What is the full form of FDM in context of multiplexing B. System Development Life Cycle
technique? C. System Deployment Life Cycle
A. Frequency Duplex Multiplexing D. System Design Life Cycle
B. Frequency Double Multiplexing 133. What is the minimum and maximum zoom size in MS
C. Frequency Division Multiplexing PowerPoint 2019?
D) Frequency Divide Multiplexing A. 5 percent and 400 percent
122. In._____. transmission, a communication system groups B. 10 percent and 400 percent
characters into blocks and then adds a header trailer to each C. 5 percent and 500 percent
block to convert it into a frame. D. 10 percent and 500 percent
A. half duplex 134. Process management, memory management, file
B. Synchronous management etc, are the main function of____.
C. simplex A. Utilities
D. asynchronous B. Operating System
123. which of the following is a nonimpact printer? C. Word Processor
A. Daisy wheel D. Translator
B. Line 135. Baud is equivalent to_____.
C. Dot matrix A. nibble per second
D. Inkjet B. byte per second
124. Which of the following is a logical order of system C. word per second
architecture? D. bits per second
A. Hardware, application software, system software, user B. 136. Which of following is antivirus software?
Hardware, user, system software, application software C. A. Solid works
Hardware, system software, application software, user D. B. Bluefish
Hardware, user, application software, system software C. Viral Boost
125. Which of the following is system software? D. Quick Heal
A. Database 137. Second generation computer uses
B. Word processing A. integrated circuit
C. Operating system B. transistor
D. Spread sheet C. vacuum tubes
126.______links several object modules and libraries to a single D. resistor
executable program. 138. The time required by the read/write head of magnetic
A. Assembler tape to position itself on the specified track/cylinder is called?
B. Loader A. Latency time
C. Linker B. Transfer time
C. Delay time type?
D. Seek time A. Operator
139. Each MAC (Media Access Control) address is._____ bits in B. Sign
length. C. Opcode
A. 24 D. Operands
B. 32 151._____ refers to a sequence of instruction (software)
C. 48 substituted for hardware.
D. 16 A. Firmware
140. What is the full form of GUI? B. Middleware
A. Graph User Interface C. Adware
B. Graphical User Interface D. Spyware
C. Graphics User Interpret 152.____ attack involves altering raw data just before it is
D. General User Interface processed by a computer and then changing it back after the
141. In MS PowerPoint 2019, which of the following shortcut processing is completed.
key is used to open the font dialog box? A. Web Jacking
A. Shift + F B. Salami Attack
B. Shift + T C. Data diddling
C. Ctrl + F D. Internet time theft
D. Ctrl + T 153. Narrowband, Voice band and Broadband are the different
142. _____.is the amount of work that a system is able to do types of data transmission
per unit time. A. Speed
A. Data time B. media
B. Throughput C. Modes
C. Seek time D. channel
D. Latency time 154. IPv6 is a ___bit numeric address.
143. Which register is used to accumulate results and data to A. 32
be operated upon? B. 256
A. Subtractor C. 128
B. Accumulator D. 64
C. Adder 155. An _____describe some property or characteristics of the
D. Instruction entity.
144. The program written in high- level language is referred to A. Row
as the A. Machine code B. Tuple
B. Binary code C. Record
C. Source code D. Attribute
D. Assembly code 156.______ is an unauthorised real-time interception or
145. In a___ media, the data as are sent along a specific path monitoring of private communication between two entities
through a wire or a cable. over a network.
A. guided A. DoS
B. unguided B. Snooping
C. unguided C. DDoS
D. non-guided D. Eavesdropping
146.____is any device or a circuit that changes, usually 157. In MS PowerPoint 2019, which of the following shortcut
increases the amplitude of an analog signal keys is used to show or hide the grids?
A. Repeater A. Alt + F9
B. Amplifier B. Ctrl+ F9
C. Modifier C. Tab + F9
D. Sampler D. Shift +F9
147. A______.is a program in execution. 158. What is the full form of LCD in context of output devices?
A. record A. Lime crystal display
B. file B. Liquid crystal display
C. tuple C. Laser crystal display
D. process D. Light crystal display
148. Every CPU has built-in ability to execute a set of machine 159. Scheduling the manner and sequence in which the
instruction called its ____set. operations are performed is known as
A. machine A. Spooling
B. program B. Searching
C. instruction C. Storing
D. operation D. Controlling
149. What is the full form of CBIS in context of information 160. In MS Word 2019, which of the following shortcut keys is
systems? used to increase the font size by 1 point?
A. Computer Based Information System A. Ctrl +]
B. Computer Biased Information System B. Ctrl + [
C. Controller Based Information System C. Ctrl + {
D. Central Basic Information System D. Ctrl +}
150. Which part of instruction specifies the basic instruction 161. Which software is used to divide an individual drive into
multiple logical drives, each with its own file system? A. File
manager .WMA Window media audio file
B. Disk space analyser VIDEO FILE
C. Disk partition editor .AVI Audio Video Interleave File
D. Disk compression .MP4 MPEG-4 Video File
162. What is the full form of TPS in context of information
.MPG MPEG Video File
systems?
.FLV OR SWF Flash Video
A. Travel Program System
B. Trivial Program System .MOV QuickTime Movie file format
C. Transaction Process System .AVCHD Advanced Video Coding, High Definition
D. Transaction Play System .WMV Windows Media Video File
163. Which input device is used by banking industry for faster .RM Real Media Format
processing of large volumes of cheques? OTHER
A. MICR .EXE Windows Executable File
B. OCR
.JAR Android Package File
C. OMR
D. Card Render .APK Hypertext Markup Language File
164. What is the full form of ISDN in context of data .HTML Windows System File
transmission services? .SIS Windows Initialization File
A. Integrated Switched Dial Network .INI Backup File
B. Internal Switched Dial Network BAK Temporary File
C. Internal Services Digital Network TMP Document Type Definition File
D. Integrated Services Digital Network
.DTD Dynamic Link Library
165. What is the full form of DRAM?
A. Dynamic Random Access Memory .DLL Office
B. Different Random Access Memory .PST Ms Outlook
C. Double Random Access Memory .RA Real Audio
D. Distance Random Access Memory .WMA Windows Media Audio
166. Prior to their transmission the information signal and the .CDR Coral Draw File
carrier signal are combined and the process of combining these
ANSWERS
two signals is called
A. modulation
B. demodulation
C. amplification
D. distortion
TEXT FILE
.Doc. Microsoft Word Document
.DOCX Microsoft Word Open XML Document
.LOG Log File
.MSG Outlook Mail Message →
.ODT Open Document Text Document
.PAGES Pages Document
.RTF Rich Text Format File
.TXT Plain Text File
.DAT Data file
.WPD Word perfect Document
.WPS Microsoft works word processor document
IMAGE FILE
.BMP Bitmap Image File →
.GIFVAC Graphical Interchange Format File
.JPEG Joint Photography Expert Group
.PNG Portable Network Graphic
.PSD Adobe Photoshop Document
.TIFF Tagged Image File Format
AUDIO FILE
.AIF Audio Interchange File Format
.IFF Interchange File Format
.M3U Media Playlist File
.M4A MP3 Audio File
.MIDI MIDI File (Musical Instrument Digital Interface)
.MP3 Mp3 Audio File
.WAV WAVE Audio File (Waveform Audio File Format)