The document covers fundamental concepts in computer science, including hardware components like CPU and RAM, networking protocols such as HTTP and DNS, and operating systems. It also discusses Microsoft Office functionalities, programming basics like HTML and IDE, and cybersecurity topics including malware types and firewalls. Each section contains multiple-choice questions with correct answers provided.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
30 views
Basics of Computer Science
The document covers fundamental concepts in computer science, including hardware components like CPU and RAM, networking protocols such as HTTP and DNS, and operating systems. It also discusses Microsoft Office functionalities, programming basics like HTML and IDE, and cybersecurity topics including malware types and firewalls. Each section contains multiple-choice questions with correct answers provided.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7
Basics of Computer Science
1. Which of the following is the brain of the computer?
a) RAM b) CPU c) Hard Drive d) GPU Answer: b) CPU 2. What does RAM stand for? a) Read Access Memory b) Random Access Memory c) Reliable Access Module d) Random Allocation Module Answer: b) Random Access Memory 3. Which type of software controls the hardware of a computer? a) System Software b) Application Software c) Malware d) Firmware Answer: a) System Software 4. Which of the following is volatile memory? a) ROM b) SSD c) RAM d) HDD Answer: c) RAM 5. Binary number system uses which two digits? a) 0 and 9 b) 1 and 9 c) 0 and 1 d) 1 and 2 Answer: c) 0 and 1
Networking
6. Which protocol is used to browse the web?
a) FTP b) HTTP c) SMTP d) DHCP Answer: b) HTTP 7. What does IP stand for in networking? a) Internal Protocol b) Internet Protocol c) Integrated Protocol d) Initial Protocol Answer: b) Internet Protocol 8. Which device is used to connect multiple computers in a network? a) Router b) Switch c) Modem d) Printer Answer: b) Switch 9. What does DNS stand for? a) Domain Numbering System b) Direct Network Service c) Domain Name System d) Distributed Network System Answer: c) Domain Name System 10. The OSI model has how many layers? a) 5 b) 6 c) 7 d) 8 Answer: c) 7
Operating Systems
11. Which of the following is not an operating system?
a) Windows b) Linux c) Oracle d) macOS Answer: c) Oracle 12. The primary purpose of an operating system is to: a) Manage software applications b) Handle user inputs and outputs c) Manage computer hardware resources d) All of the above Answer: d) All of the above 13. What is the full form of GUI? a) Graphic User Interface b) Graphical User Integration c) Graphic Universal Interaction d) General User Interface Answer: a) Graphic User Interface 14. Which of the following is a command-line operating system? a) Windows b) DOS c) macOS d) Android Answer: b) DOS 15. A collection of programs that control a computer is called: a) Software b) Firmware c) Hardware d) Peripheral Answer: a) Software
MS Office
16. Which shortcut key is used to copy text in MS Word?
a) Ctrl + X b) Ctrl + V c) Ctrl + C d) Ctrl + Z Answer: c) Ctrl + C 17. Which function is used to calculate the sum of a range in MS Excel? a) =SUM() b) =ADD() c) =TOTAL() d) =COUNT() Answer: a) =SUM() 18. In PowerPoint, which shortcut is used to start a slideshow? a) F2 b) F5 c) F7 d) F10 Answer: b) F5 19. What is the extension of an MS Excel file? a) .docx b) .pptx c) .xlsx d) .pdf Answer: c) .xlsx 20. Which feature in MS Word is used to align text evenly between margins? a) Left Align b) Right Align c) Center Align d) Justify Answer: d) Justify
Programming Basics
21. Which of the following is not a programming language?
a) Python b) HTML c) Java d) C++ Answer: b) HTML 22. What does 'HTML' stand for? a) HyperText Markup Language b) HighText Machine Language c) HyperText Markdown Language d) HyperTool Markup Language Answer: a) HyperText Markup Language 23. Which symbol is used to end a statement in C language? a) . b) ; c) : d) , Answer: b) ; 24. What is the full form of IDE in programming? a) Integrated Development Environment b) Integrated Design Environment c) Initial Development Engine d) Interactive Development Editor Answer: a) Integrated Development Environment 25. In Python, what data type does the function type(3.14) return? a) int b) float c) str d) complex Answer: b) float
Cybersecurity
26. A computer program that replicates itself is called a:
a) Trojan b) Virus c) Worm d) Spyware Answer: c) Worm 27. What does SSL stand for? a) Secure Socket Layer b) Secured System Link c) System Security Level d) Secure Server Layer Answer: a) Secure Socket Layer 28. What is the purpose of a firewall? a) To enhance hardware performance b) To block unauthorized access c) To repair system errors d) To encrypt data Answer: b) To block unauthorized access 29. Phishing attacks are targeted towards: a) Hardware systems b) Websites c) Users' personal information d) Network hardware Answer: c) Users' personal information 30. Which of the following is NOT a type of malware? a) Ransomware b) Spyware c) Adware d) Firmware Answer: d) Firmware