We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12
Section 1: Fundamentals of Computer Science
1. What does CPU stand for?
a) Central Processing Unit b) Computer Processing Unit c) Control Processing Unit d) Central Program Unit Answer: a) Central Processing Unit 2. Which of the following is a primary storage device? a) Hard Disk b) CD-ROM c) RAM d) USB Answer: c) RAM 3. What is the full form of ROM? a) Random Operating Memory b) Read-Only Memory c) Read Operating Memory d) Random Only Memory Answer: b) Read-Only Memory 4. Which part of the computer is responsible for arithmetic and logic operations? a) Control Unit b) ALU (Arithmetic Logic Unit) c) Register d) Cache Answer: b) ALU 5. What type of software is an operating system? a) Application Software b) Utility Software c) System Software d) Development Software Answer: c) System Software 6. Which generation of computers used vacuum tubes? a) First b) Second c) Third d) Fourth Answer: a) First 7. Which of the following is an output device? a) Mouse b) Printer c) Scanner d) Keyboard Answer: b) Printer 8. What does BIOS stand for? a) Basic Input Output System b) Binary Input Output System c) Basic Interconnect Operating System d) Binary Integrated Operating System Answer: a) Basic Input Output System 9. What is the primary function of an operating system? a) To manage hardware and software resources b) To provide a platform for application software c) To control peripheral devices d) All of the above Answer: d) All of the above 10. Which of the following is not an example of hardware? a) Monitor b) Motherboard c) Operating System d) Hard Disk Answer: c) Operating System
Section 2: Programming and Algorithms
11. Which language is considered a low-level language?
a) Python b) Assembly Language c) Java d) C++ Answer: b) Assembly Language 12. What is the result of 5 % 2 in most programming languages? a) 0 b) 1 c) 2 d) 5 Answer: b) 1 13. Which of these is a loop structure? a) if-else b) for c) switch-case d) try-catch Answer: b) for 14. What does HTML stand for? a) Hyper Text Markup Language b) High-Level Text Machine Language c) Hyper Text Managing Links d) Hyper Text Main Language Answer: a) Hyper Text Markup Language 15. Which of these data structures is LIFO? a) Queue b) Stack c) Array d) Linked List Answer: b) Stack 16. Which sorting algorithm has the best average-case complexity? a) Bubble Sort b) Quick Sort c) Selection Sort d) Insertion Sort Answer: b) Quick Sort 17. In object-oriented programming, what is encapsulation? a) Combining data and methods into a single unit b) Hiding implementation details c) Inheriting features from another class d) Dividing programs into functions Answer: a) Combining data and methods into a single unit 18. Which of these is a key feature of Python? a) Compiled b) Case-sensitive c) Low-level d) Static typing Answer: b) Case-sensitive 19. What does SQL stand for? a) Standard Query Language b) Structured Query Language c) Sequential Query Language d) Server Query Language Answer: b) Structured Query Language 20. Which of the following is not a relational database? a) MySQL b) PostgreSQL c) Oracle d) MongoDB Answer: d) MongoDB
Section 3: Computer Networks
21. What does IP stand for in networking?
a) Internet Protocol b) Internal Protocol c) Internet Process d) Interconnection Protocol Answer: a) Internet Protocol 22. Which protocol is used to send emails? a) HTTP b) SMTP c) FTP d) SNMP Answer: b) SMTP 23. What is the maximum number of IP addresses in IPv4? a) 2^16 b) 2^32 c) 2^64 d) 2^128 Answer: b) 2^32 24. What is the main purpose of a router? a) To connect multiple networks b) To provide power to devices c) To store data d) To encrypt data Answer: a) To connect multiple networks 25. Which topology uses a central hub? a) Ring b) Mesh c) Star d) Bus Answer: c) Star
Section 4: Cybersecurity
26. What is phishing?
a) A type of virus b) Fraudulent attempts to obtain sensitive information c) A method of encrypting data d) A form of firewall Answer: b) Fraudulent attempts to obtain sensitive information 27. What does HTTPS stand for? a) Hyper Text Transfer Protocol Secure b) Hyper Transfer Text Protocol Security c) High Text Transfer Protocol Secure d) Hyperlink Text Transfer Protocol Security Answer: a) Hyper Text Transfer Protocol Secure 28. What is a firewall? a) A device that prevents overheating b) A barrier that blocks unauthorized access c) A tool for compressing files d) A type of virus Answer: b) A barrier that blocks unauthorized access 29. What is the strongest encryption type? a) DES b) AES c) SHA-1 d) MD5 Answer: b) AES 30. What is two-factor authentication? a) A password management system b) Using two methods to verify identity c) Encrypting data twice d) Storing data in two locations Answer: b) Using two methods to verify identity
Section 1: Fundamentals of Computer Science
1. What does CPU stand for?
a) Central Processing Unit b) Computer Processing Unit c) Control Processing Unit d) Central Program Unit Answer: a) Central Processing Unit 2. Which of these is an input device? a) Monitor b) Keyboard c) Printer d) Speaker Answer: b) Keyboard 3. What does ROM stand for? a) Random Operating Memory b) Read-Only Memory c) Read Operating Memory d) Random Only Memory Answer: b) Read-Only Memory 4. What is the full form of BIOS? a) Binary Input Output System b) Basic Input Output System c) Basic Interconnect Operating System d) Binary Integrated Operating System Answer: b) Basic Input Output System 5. Which of the following is an example of system software? a) Microsoft Word b) Operating System c) Antivirus d) Photoshop Answer: b) Operating System 6. Which generation of computers used transistors? a) First b) Second c) Third d) Fourth Answer: b) Second 7. What type of storage is volatile? a) Hard Disk b) SSD c) RAM d) CD-ROM Answer: c) RAM 8. Which device is used to connect multiple networks? a) Switch b) Router c) Hub d) Modem Answer: b) Router 9. What does GUI stand for? a) Graphical User Interface b) General User Integration c) Graphical Universal Interface d) General Universal Integration Answer: a) Graphical User Interface 10. Which of the following is an example of an optical storage device? a) Floppy Disk b) Hard Disk c) CD-ROM d) SSD Answer: c) CD-ROM
Section 2: Programming and Algorithms
11. What does OOP stand for?
a) Object-Oriented Programming b) Objective-Oriented Programming c) Operational-Oriented Programming d) Online Object Programming Answer: a) Object-Oriented Programming 12. What is the output of 10 % 3 in most programming languages? a) 0 b) 1 c) 3 d) 10 Answer: b) 1 13. Which language is primarily used for web development? a) Python b) JavaScript c) C++ d) Assembly Answer: b) JavaScript 14. Which of these is not a programming language? a) HTML b) Java c) C# d) Python Answer: a) HTML 15. Which data structure uses LIFO (Last In, First Out)? a) Queue b) Stack c) Array d) Linked List Answer: b) Stack 16. What does SQL stand for? a) Structured Query Language b) Sequential Query Language c) Standard Query Language d) Simple Query Language Answer: a) Structured Query Language 17. Which algorithm is used to find the shortest path in a graph? a) Merge Sort b) Dijkstra’s Algorithm c) Quick Sort d) Binary Search Answer: b) Dijkstra’s Algorithm 18. Which of these is a sorting algorithm? a) Bubble Sort b) Binary Tree c) Hash Map d) Stack Answer: a) Bubble Sort 19. Which of these is not a looping construct? a) for b) while c) switch d) do-while Answer: c) switch 20. What does IDE stand for? a) Integrated Development Environment b) Internal Debugging Engine c) Independent Development Editor d) Integrated Debugging Environment Answer: a) Integrated Development Environment
Section 3: Databases and Networks
21. What is a primary key in a database?
a) A unique identifier for records b) A foreign key c) A backup key d) A default key Answer: a) A unique identifier for records 22. Which of these is a NoSQL database? a) MySQL b) MongoDB c) Oracle d) PostgreSQL Answer: b) MongoDB 23. What does IP stand for? a) Internet Protocol b) Internal Protocol c) Internet Process d) Interconnection Protocol Answer: a) Internet Protocol 24. Which protocol is used to transfer files over the internet? a) FTP b) HTTP c) SMTP d) SNMP Answer: a) FTP 25. What is the maximum length of an IPv4 address? a) 64 bits b) 128 bits c) 16 bits d) 32 bits Answer: d) 32 bits 26. What is a firewall used for? a) Enhancing computer speed b) Blocking unauthorized access c) Monitoring system temperature d) Running antivirus scans Answer: b) Blocking unauthorized access 27. Which topology uses a central hub? a) Ring b) Star c) Mesh d) Bus Answer: b) Star 28. What is the function of a DNS? a) Translates domain names into IP addresses b) Provides internet security c) Creates database entries d) Encrypts data Answer: a) Translates domain names into IP addresses 29. Which device amplifies and retransmits network signals? a) Hub b) Repeater c) Router d) Switch Answer: b) Repeater 30. What does MAC in MAC address stand for? a) Media Access Control b) Machine Access Control c) Media Access Communication d) Machine Access Communication Answer: a) Media Access Control
Section 4: Advanced Topics
31. What does AI stand for?
a) Artificial Intelligence b) Automated Integration c) Advanced Interconnect d) Artificial Integration Answer: a) Artificial Intelligence 32. What is the primary use of Big Data? a) Analyzing large datasets b) Storing small datasets c) Optimizing operating systems d) Encrypting data Answer: a) Analyzing large datasets 33. Which of the following is a machine learning library? a) TensorFlow b) NumPy c) Flask d) Django Answer: a) TensorFlow 34. What does IoT stand for? a) Internet of Things b) Input/Output Technology c) Integration of Tools d) Internet of Technology Answer: a) Internet of Things 35. What does "cloud computing" refer to? a) Computing using weather data b) Storing and accessing data over the internet c) High-speed local computing d) Designing weather systems Answer: b) Storing and accessing data over the internet 36. What is overfitting in machine learning? a) A model performs well on training data but poorly on new data b) A model performs poorly on all datasets c) A model with excessive data inputs d) A model designed for real-time tasks Answer: a) A model performs well on training data but poorly on new data 37. Which of these is an example of supervised learning? a) Classification b) Clustering c) Principal Component Analysis d) Market Basket Analysis Answer: a) Classification 38. What is the primary purpose of encryption? a) To improve performance b) To secure data c) To analyze data d) To compress files Answer: b) To secure data 39. Which of these is a cybersecurity attack? a) Phishing b) Sorting c) Debugging d) Compiling Answer: a) Phishing 40. What is two-factor authentication? a) Verifying identity using two methods b) Using two passwords c) Encrypting data twice d) Running two antivirus scans Answer: a) Verifying identity using two methods ection 4: Advanced Topics (Continued)
41. What does "open source" mean in software?
a) Software that is free of cost b) Software with source code that is freely available and modifiable c) Software that is only available online d) Software with no copyright Answer: b) Software with source code that is freely available and modifiable 42. What is virtualization in computing? a) Creating virtual versions of hardware or software environments b) Using virtual reality in applications c) Simulating physical systems d) Running programs without hardware Answer: a) Creating virtual versions of hardware or software environments 43. Which of the following is an example of a cloud storage service? a) Dropbox b) Visual Studio c) Eclipse d) Apache Answer: a) Dropbox 44. What does SaaS stand for? a) Software as a Service b) Security as a Service c) Systematic Application Software d) Storage and Application Services Answer: a) Software as a Service 45. What is the primary goal of data mining? a) To extract useful patterns and knowledge from large datasets b) To store data securely c) To clean corrupted data d) To compress large datasets Answer: a) To extract useful patterns and knowledge from large datasets 46. What is blockchain technology primarily used for? a) Decentralized and secure record-keeping b) High-speed computing c) Cloud storage d) Software development Answer: a) Decentralized and secure record-keeping 47. Which of the following is an example of an embedded system? a) A smartwatch b) A desktop computer c) A web server d) A supercomputer Answer: a) A smartwatch 48. What is the function of a hypervisor? a) Manages virtual machines on a host system b) Monitors CPU performance c) Provides antivirus protection d) Compresses large datasets Answer: a) Manages virtual machines on a host system 49. What is a botnet? a) A network of computers infected with malware and controlled remotely b) A type of database c) A software development environment d) A collection of AI algorithms Answer: a) A network of computers infected with malware and controlled remotely 50. What does GDPR stand for? a) General Data Protection Regulation b) Global Data Privacy Rights c) General Digital Privacy Regulation d) Global Database Protection Rule Answer: a) General Data Protection Regulation