Professional Documents
Culture Documents
TOP 500
COMPUTER
AWARENESS
MCQs
For Different Banking
& Government Exam
Top 500 Computer Awareness MCQs Free PDF
10: How you can manually break up 15. Which is not a type of operating
the line breakup in MS-Word? system?
a) Space + Enter (A) Real Value Operating System
b) Ctrl + Enter (B) Distributes Operating System
c) Alt + Enter (C) Network Operating System
d) Shift + Enter (D) Time-Sharing Operating System
e) None (E) None
Ans (D) Shift + Enter Ans (A) Real Value Operating System
11: To split a table in MS-Word, which 16. Which is not a Network device?
shortcut key is used? (A) Switch
a) Alt + Shit + Ctrl (B) Hub
b) Alt + Shift + Del (C) Star
c) Ctrl + Shift + Enter (D) Router
d) Alt + Ctrl + Enter (E) None
e) None Ans (C) Star
Ans (C) Ctrl + Shift + Enter
17. Which network security feature
12: What is the Portrait & Landscape prevents users on a network from
are called in MS-Word? using
A. Page Size program and information that is
B. Paper Layout unauthorized?
C. Page Orientation A. Firewall
D. All of these B. Antivirus
E. None C. Jammer
Ans (C) Page Orientation D. Security Plus
E. None
13: The shortcuts keys, Ctrl+ Shift + Ans (A) Firewall
plus sign are used for character
formatting 18. In MS-Word, you can detect
of the following: spelling and grammar errors by
A. Underline Words, Not Spaces pressing the key(s):
B. Superscript a) Shift + F7
C. Case of Letters b) Ctrl + F7
D. All Capitals Letters c) Alt + F7
E. None d) F7
Ans (B) Superscript e) None
Pressing the same key combination Ans (D) F7
again makes the text normal.
Ctlr + = is used for subscript.
Top 500 Computer Awareness MCQs Free PDF
39. The files can be saved in which of 44. Dot Matrix Printer is an example of:
the following device? (a) Input Device
(A) Monitor (b) Output Device
(B) Compact Disc (c) Processing Unit
(C) Printer (d) Integral Device
(D) Speaker (e) None
(E) None Ans (b) Output Device
Ans (B) Compact Disc
45. Which of the following technique is
40. In MS Word, Thesaurus tool has popular in academic testing?
made for the Purpose of _______ (A) OMR
(A) Spell Checking (B) OLE
(B) Synonyms and Antonyms words (C) OCR
(C) Spelling Suggestions (D) MICR
(D) Grammar Correction (E) None
(E) None Ans (A) OMR
Ans (B) Synonyms and Antonyms OMR stands for Optical mark
words recognition
41. The virus attacks on the computer 46. One Mega Byte (MB) is equal to
can be stopped or prevented with the which of the following:
help of which one of the following? (A) 1 trillion bytes
(A) Security Wall (B) 1048 bytes
(B) Virus eliminator software (C) 1024 KB
(C) Antivirus Software (D) 256 KB
(D) Firewall (E) None
(E) None Ans (C) 1024 KB
Ans (C) Antivirus Software
47. Speed of CPU is measured in
42. Network Interface Card is (A) MHz
a(n)________ device: (B) GHz
A. Input (C) Hz
B. Output (D) All of these
C. Input/Output (E) None
D. Storage (D) All of these
E. None Ans: B
Ans (C) Input/Output
48. Which of the following is an
43. The most popular technique used advantage of the view in databases?
to automate sending of a customized A) Data Security
letter to different recipients where most B) Hiding of Complex Queries
of the content is the same except C) Derived Columns
the customer address of MS Word? D) All of the Above
(A) Send mail to all E) None
(B) Mail Merge Ans (D) All of the Above
(C) Design, review and send
(D) Bulk customized mail
(E) None
Ans (B) Mail Merge
Top 500 Computer Awareness MCQs Free PDF
74. The basic architecture of computer 79. Sometimes sudden power failure
was developed by lead to the loss of data if a desktop
A. John Von Neumann computer is directly connected to the
B. Charles Babbage power plug. Which device should be
C. Blaise Pascal attached to the computer for saving
D. Robert Noyce this kind of data loss?
E. None (A) Printer
Top 500 Computer Awareness MCQs Free PDF
(B) Hard Disk 85. You can merge the main document
(C) UPS with data source in Excel. In mail
(D) Nuclear Power Plant merge operation, Word is usually
(E) None A. server
Ans (C) UPS B. source
C. client
80. Which of the following will you D. none of above
option for saving the file E. All of the above
A. Save button standard toolbar Ans (C) client
B. Save button from file menu
C. By pressing Ctrl + S 86. Blinking point which shows your
D. All of these position in the text is called
E. None A. Cursor
Ans (D) All of these B. position
C. Blinker
81. By default the top margin in the D. None of these
word document is E. None
A. 1 inch Ans (A) Cursor
B. 2 inch
C. 3 inch 87. You can use the formula palette to
D. 1½ inch A. Format cells containing numbers
E. None B. create and edit formula containing
Ans (A) 1 inch functions
C. enter assumptions data
82. By default the right margin in the D. copy a range of cells
word document is E. None
A. 1 inch Ans (B) create and edit formula
B. 2 inch containing functions
C. 3 inch
D. 1 ¼ inch 88. The Name box on to the left of
E. None formula bar
Ans (D) 1 ¼ inch A. shows the name of workbook
currently working on
83. The Field names are enclosed B. shows the name of worksheet
within currently working on
A. <<>> C. shows the name of cell address or
B. >><< range currently working on
C. >>>> D. None of above
D. <<<< E. All are wrong
E. None Ans (C) shows the name of cell
Ans (A) <<>> address or range currently working on
84. You can use the following objects 89. Which of the following is not the
created in MS-word in a web page correct method of editing the cell
A. Auto-shapes content?
B. Bullets A. Press the Alt key
C. tables and charts B. Press the F2 key
D. All of these C. Click the formula bar
E. None D. Double click the cell
Ans (D) All of these E. None
Top 500 Computer Awareness MCQs Free PDF
Ans (A) Press the Alt key 95. It is a collection of logically related
information
90. Which command lists the contents A. Folder
of current directory of a disk B. Information
A. Copy C. Processing
B. Tree D. File
C. CD E. None
D. Dir Ans (D) File
E. None
Ans (D) Dir 96. COUNT command is used to
A. Count the number of data fields in
91. ______ Devices accept the spoken an active database file
word through a microphone and B. Count the number of data files
convert it into binary code that can be which are active
understood by the computer. C. Count the records which are update
A. Speech recognition D. Count the number of records in an
B. Handwriting recognition active data base files
C. Peripheral E. None
D. All of the above Ans (D) Count the number of records
E. None of these in an active data base files
Ans (A) Speech recognition
97. The computer holds data and:
92. Which of the cell pointer indicates (A) Bytes
you that you can make selection? (B) Programs
A. Doctors symbol (Big Plus) (C) Registers
B. small thin plus icon (D) Bits
C. Mouse Pointer with anchor at the tip (E) None
D. None of above Ans (B) Programs
E. None
Ans (A) Doctors symbol (Big Plus) 98. Special set of characters that
computer associates with specific user
93. When a customer makes an online identification is classified as
hotel booking, the data base is A. password
update in B. identity code
A. Batch mode C. inquiry code
B. Pseudo real- time D. dump code
C. 2 Days E. None
D. All of these Ans (A) password
E. None
Ans (B) Pseudo real- time 99. Creating a data files means
A. Designing base and defining the
94. DBMS is structure of the database
A. Collection of data B. Getting the information about
B. Set of programs to access those database
data C. Selecting data from database
C. Set of program to update those data D. Deleting data from database
D. All of these E. None
E. None Ans (A) Designing base and defining
Ans (D) All of these the structure of the database
Top 500 Computer Awareness MCQs Free PDF
100. Function of running and loading 105. It run on computer hardware and
programs by use of peripherals is serve as platform for the others
function of software to run on
A. operating system A. Operating system
B. inquiry system B. Application software
C. dump programs C. System software
D. function system D. All of these
E. None E. None
Ans (A) operating system Ans (A) Operating system
101. Each individual data items of 106. The primary purpose of the
record is called a operating system is
A. Data base A. to allow people to use the computer
B. Field B. to keep system programmers
C. Comment employed
D. All of these C. to make the most efficient use of
E. None computer hardware
Ans (B) Field D. to make computers easier to use
E. None
102. Large collections of files are Ans (C) to make the most efficient use
called of computer hardware
A. Fields
B. Records 107. The time command is used to
C. Data Base display
D. File system A. American (US) time
E. None B. Greenwich mean time
Ans (C) Database C. Julian time
D. System time
103. Cache memory is– E. None
A. Smaller and faster than main Ans (D) System time
storage
B. Bigger and slower than main 108. Which command can be used to
storage create the disk track and sectors
C. Smaller but slower than main A. FDISK
memory B. FORMAT
D. Bigger and faster than main C. CHKDSK
memory D. ATTRIB
E. None of these E. None
Ans (A) Smaller and faster than main Ans (B) FORMAT
storage
109. If you do not know the current
104. Which statement is not valid time, which command do you use to
indexing display
A. It stores the index fields A. Copy
B. It stores the corresponding record B. Very
number C. Time
C. It maintains the alphabetically order D. Format
D. It duplicates the database file E. None
E. None Ans (C) Time
Ans (D) It duplicates the database file
Top 500 Computer Awareness MCQs Free PDF
130. The _______ layer links the 134. The two major components of
network support layers and the user system software are:
support layers. (A) The operating system and system
A) transport utilities
B) network (B) Application software and system
C) data link utilities
D) session (C) Primary memory and storage
E) None (D) The operating system and
Ans (A) applications software
(E) None of these
131. The _______ layer coordinates Ans (A) The operating system and
the functions required to transmit a bit system utilities
stream over a physical medium.
A) transport 135. Which of the following may be
B) network necessary for you to do after you
C) data link install new
D) physical application software?
E) None (A) Turn the computer power switch off
Ans (D) and then back on
(B) Do a cold boot
132. The physical, data link, and (C) Press Shift + Alt + Del
network layers are the ______ support (D) Do a warm boot
layers. (E) None of these
A) user Ans (D) Do a warm boot
B) network
C) both (a) and (b)
D) neither (a) nor (b)
E) None
Top 500 Computer Awareness MCQs Free PDF
136. The power-on self-test--------------. (C) be used for data storage only
(A) Checks for upgrades to the (D) be used to both read and write
application software data
(B) Verifies that the computer (E) None of these
hardware is working properly Ans (B)
(C) Is able to provide easy-to-follow
on-screen instructions to correct 141. The session, presentation, and
hardware problems application layers are the ____ support
(D) Is conducted after the BIOS layers.
instructions are placed in memory A) user
(E) None of these B) network
Ans (B) Verifies that the computer C) both (a) and (b)
hardware is working properly D) neither (a) nor (b)
E) None
137. Which of the following is NOT Ans (A)
part of the motherboard?
(A) System clock 142. In Excel, this is a prerecorded
(B) Connector formula that provides a shortcut for
(C) CPU complex
(D) Chipset calculations.........
(E) None of these (A) Value
Ans (B) Connector (B) Data Series
(C) Function
138. Which of the following is the (D) Field
advantage of Assembly language over (E) None of these
Machine Ans (C) Function
language?
(A) Easy to use 143. Which of the following is a circuit
(B) Easy to understand that issue signals at regular
(C) Easy to modify intervals...?
(D) All the above (A) Circuit board
(E) None of these (B) Clock
Ans (D) (C) Circuit card
(D) Gates
139. An example of a wireless medium (E) None of these
that sends data through the air or Ans (B) Clock
space is:
(A) Fiber-optic cable. 144. The ______ layer establishes,
(B) Coaxial cable. maintains, and synchronizes the
(C) Twisted pair. interactions
(D) Microwaves. between communicating devices.
(E) None of these A) transport
Ans (D) Microwaves. B) network
C) session
140. If a memory chip is volatile, it D) physical
will....... E) None
(A) explode if exposed to high Ans (C)
temperatures
(B) lose its contents if current is turned
off
Top 500 Computer Awareness MCQs Free PDF
145. Which of the following animations 150. This printer places an image on a
cannot be done in PowerPoint? page without physically touching the
(A) bullet list, revealed one bullet point page.
at a time A. Line printer
(B) clip art - Fly in from the bottom B. Impact printer
(C) table, revealed row by row C. Non-impact printer
(D) chart, revealed by series D. Dot-matrix printer
(E) None of these E. None
Ans (C) table, revealed row by row Ans (C)
146. .......... is the key we use to run 151. Which of the following refers to
the selected command. too much electricity and may cause a
(A) SHIFT voltage surge?
(B) TAB a) Anomaly
(C) ENTER b) Shock
(D)CTRL c) Spike
(E) None of these d) Virus
Ans (C) ENTER e) None of these
Ans (C)
147. Which one of the following was
world’s first commercial computer? 152. A function inside another function
A) ENIAC is called a ….. Function.
B) EDVAC (A) Nested
C) EDSAC (B) Round
D) UNIVAC (C) Sum
E) None of these (D) Text
Ans (D) (E) None of the above
Ans (A) Nested
148. Which of the following displays
the contents of the active cell?
(A) Active cell 153. CPU can directly understand this
(B) Formula bar language
(C) Menu bar A. C
(D) Name box B. C++
(E) None of the above C. Assembly
Ans (B) Formula bar D. Java
E. None of these
149. The purpose of the primary key in Ans (E) None of these
a database is to :
(A) unlock the database 154. World’s first microprocessor was
(B) provide a map of the data A. Intel 4000
(C) uniquely identify a record B. Intel 4002
(D) establish constraints on database C. Intel 4004
operations D. Intel 4008
(E) None of these E. None of these
Ans (C) uniquely identify a record Answer: C
Top 500 Computer Awareness MCQs Free PDF
165. Which of the following is not true 170. Technique of using fixed words
for primary storage? for machine code functions is
(A) It is a part of the CPU classified as
(B) It allows very fast access of data A. mnemonics
(C) It is relatively more expensive than B. nemonics
other storage devices. C. compiler
(D) Can be removed and transported. D. Translator
(E) All of the above E. None
Answer: A Ans (A) mnemonics
D) Automatic D) Ring
E) None E) None
Answer: A Answer: C
185. The technique where digital 190. Which of the following protocol is
signals are converted to its analog used for transferring electronic
form mail message from one machine to
for transmission over an analog facility another?
is called– A) SNMP
(A) Modulation B) SLIP
(B) Digitization C) POP
(C) Demodulation D) SMTP
(D) All of the above E) None
(E) None of these Answer: D
Ans (A) Modulation
191. Internet-like networks within an
186. In a _______ connection, more enterprise known as- ?
than two devices can share a single A) Extranet
link. B) Internet
A) point-to-point C) Intranet
B) multipoint D) PAN
C) primary E) None
D) secondary Answer: C
E) None
Answer: B 192. A………is a collection of data that
is stored electronically as a series of
187. Which topology requires a records in a table.
multipoint connection? (A) spreadsheet
A) Mesh (B) presentation
B) Star (C) Database
C) Bus (D) web page
Top 500 Computer Awareness MCQs Free PDF
203. Which of the following process is 208. Which of the following is/are
used by the computer to ensure example(s) of Word Processors?
that all the devices connect to it is in A. Microsoft Word
working condition? B. WordPerfect
A) Verifying C. Both (A) and (B)
B) Hibernating D. None of the above
C) Starting Answer : C
D) Booting
Answer: D 209. Which of the following is/are
example(s) of Spreadsheets?
204. Technique of using disk space to A. Microsoft Excel
make programs believe that the B. Lotus 1-2-3
system contains more Random Access C. Both (A) and (B)
Memory(RAM) than is actually D. None of the above
available is called ___ Answer : C
A. Random Access Memory
B. Primary Memory 210. __________ is the software
C. Secondary Memory which comes with the permission for
D. Virtual Memory people to redistribute copies for a
Answer : D limited period.
A. Freeware
205. A ____ device receives the B. Shareware
results from the CPU and provides C. Open Source Software
them to D. Public Domain Software
the liveware. Answer : B
A) Input
B) Output 211. The _________ digits are 0 to 9
C) Memory and A to F.
D) Processing A) Decimal
Answer: B B) Hexadecimal
C) Binomial
206. EAROM stands for ______ D) Trinomial
A. Electrically Altered Read Only Answer: B
Memory
B. Electrically Accepted Read Only 212. What does EULA stand for?
Memory A. Exit User License Agreement
C. Electronically Alterable Read Only B. Exit Utility License Agreement
Memory C. End Utility License Agreement
D. Electrically Alterable Read Only D. End User License Agreement
Top 500 Computer Awareness MCQs Free PDF
238. Segmentation and reassembly 243. A byte can represent any number
are performed by which layer of OSI between 0 and _____ .
model? A) 8
A) Layer 3 B) 255
B) Layer 4 C) 256
C) Layer 2 D) 1024
D) Layer 7 E) None of these
E) None of these Correct Answer: “B”
Answer : B
Top 500 Computer Awareness MCQs Free PDF
244. The type of software that controls 249. In case of entity integrity, the
the internal operations in the primary key should be
computer, and control how the a) not Null
computer works with all its parts, is b) Null
which of the following c) both Null & not Null.
(A) Shareware d) any value.
(B) Operating System e) None of these
(C) Application software Correct Answer: “a”
(D) Public domain software
(E) None of these 250. The language used in application
Correct Answer: “B” programs to request data from
the DBMS is referred to as the ……….
245. The database schema is written a) DML
in b) DDL
a) HLL c) VDL
b) DML d) SDL
c) DDL e) None of these
d) DCL Correct Answer: “a”
e) None of these
Correct Answer: “C” 251. In an E-R diagram attributes are
represented by
246. Architecture of the database can a) Rectangle.
be viewed as b) Square.
A. Two levels. c) Ellipse.
B. Four levels. d) Triangle.
C. Three levels. e) None of these
D. One level. Correct Answer: “c”
E. None of these
Correct Answer: “C” 252. Related fields in a database are
grouped to form a
247. Key to represent relationship a) data file.
between tables is called ……….. b) data record.
a) Primary key c) menu.
b) Secondary Key d) bank.
c) Foreign Key e) None of these
d) Both A and C Correct Answer: “b”
e) None of these
Correct Answer: “C” 253. ..…… is mainly responsible for
allocating the resources as per
248. Which symbol is used in Excel to process requirement?
denote exponential numbers? (A) RAM
(1) * (B) Compiler
(2) ^ (C) Hardware
(3) & (D) Software
(4) $ (E) None of these
(5) None of these Correct Answer: “E”
Correct Answer: “2”
Top 500 Computer Awareness MCQs Free PDF
255. A primary key if combined with a 260. Which symbol is used in Excel to
foreign key creates denote exponential numbers?
a) Parent-Child relationship between (1) *
the tables that connect them (2) ^
b) Many to many relationship between (3) &
the tables that connect them (4) $
c) Network model between the tables (5) None of these
that connect them. Correct Answer: “2”
d) None of the above.
Correct Answer: “a” 261. In case of entity integrity, the
primary key should be
256. The type of software that controls a) not Null
the internal operations in the b) Null
computer, and control how the c) both Null & not Null.
computer works with all its parts, is d) any value.
which of the following e) None of these
(A) Shareware Correct Answer: “a”
(B) Operating System
(C) Application software 262. The language used in application
(D) Public domain software programs to request data from
(E) None of these the DBMS is referred to as the ……….
Correct Answer: “B” a) DML
b) DDL
257. The database schema is written c) VDL
in d) SDL
a) HLL e) None of these
b) DML Correct Answer: “a”
c) DDL
d) DCL 263. In an E-R diagram attributes are
e) None of these represented by
Correct Answer: “”c a) Rectangle.
b) Square.
258. Architecture of the database can c) Ellipse.
be viewed as d) Triangle.
A. Two levels. e) None of these
B. Four levels. Correct Answer: “c”
C. Three levels.
D. One level. 264. Related fields in a database are
E. None of these grouped to form a
Correct Answer: “C” a) data file.
b) data record.
Top 500 Computer Awareness MCQs Free PDF
285. You can use the ____________ 290. What is used in most programs
bar to type URL and display a Web that is a part of a program and guides
page, the user through certain steps?
or type a keyword to display a list of a) Software
related Web pages. b) Word
a) Menu c) Wiki
b) Title d) Wizard
c) Search e) None of the above
d) Standard bar Correct Answer: “d”
e) None
Correct Answer: “e” 291. Panther, Jaguar, Puma, and
Cheetah are examples of what kind of
286. Which part interprets program operating system?
instructions and initiate control a) Windows OS
operations? b) Mac OS
a) Input c) Linux Operating Systems
b) Storage unit d) Android Operating Systems
c) Logic unit e) None of these
d) Control unit Correct Answer: “b”
e) None of the above
Correct Answer: “d” 292. As a person working in internet
banking environment, why you should
287. How do you display current date be aware of the “Dictionary attack”?
and time in MS Excel? a) It is used to inject worms or viruses
a) date () in the system
b) Today () b) It is used to determine a password
c) Datetime () c) It is used to access customer’s
d) time () account by determining other details
e) None of these d) It is used for stealing info from the
Correct Answer: “e” Credit Card
e) None of these
288. In a Hierarchical model records Correct Answer: “b”
are organized as
a) Graph. 293. Most of the internet banking sites
b) List. provide which of the following feature
c) Links. to reduce the risk of keystroke logging
d) Tree. for the password entry?
e) None of these a) Virtual keyboard
Correct Answer: “d” b) Finger Touching
c) Touch screen
289. An entity set that does not have d) Shape Writer
sufficient attributes to form a primary e) None of these
key is a………………… Correct Answer: “a”
a) Strong entity set.
b) Weak entity set. 294. Modern computers follow a
c) Simple entity set. generalized set of instructions to
d) Primary entity set. perform any function. What are these
e) None of these instructions better known as?
Correct Answer: “b” a) Language
b) Instructions
Top 500 Computer Awareness MCQs Free PDF
309. Which device typically attachable 314. The term ________ refers to data
to computer keyboard that allows storage systems that make it possible
a blind people to read? for a computer or electronic device to
A. Light Pen store and retrieve data.
B. Joystick A. input technology
C. Touch screen B. output technology
D. Braille display C. storage technology
E. None D. None of the Above
Top 500 Computer Awareness MCQs Free PDF
318. A Proxy server is used for which 323. The process of rewriting parts of
of the following? a file in contiguous sectors on a hard
(A) To provide security against disk to increase the speed of access
unauthorized users and retrieval is known as:
(B) To process client requests for web (A) Format
pages (B) Defragmentation
(C) To provide TCP/IP (C) File Allocation Table (FAT)
(D) To process client requests for (D) Configuration
database access Correct Answer: “B”
(E) None of these
Correct Answer: “B” 324. in MS WORD what is gutter
margin?
319. The operating system that is self- a. margin that is added to the left
contained in a device and resident margin when printing.
in the ROM is ______ b. margin that is added to right margin
(1) Batch Operating System when printing.
(2) Real - time Operating System c. margin that is added to blindside
(3) Embedded Operating System binding side of page when printing.
(4) Multi Operating System d. margin that is added to outside of
(5) None of these the page when printing
Correct Answer: “3” Correct Answer: “c”
Top 500 Computer Awareness MCQs Free PDF
329. In Word you can force a page 334. The simultaneous processing of
break– two or more programs by multiple
(1) By positioning your cursor at the processors is ___
appropriate place and pressing the F1 (A) multiprogramming
key (B) multitasking
(2) By positioning your cursor at the (C) time-sharing
appropriate place and pressing Ctrl (D) multiprocessing
+Enter (E) None of these
(3) By using the Insert/Section Break Correct Answer: “D”
Top 500 Computer Awareness MCQs Free PDF
376. The software used in the banking 381. What does C stands for in
system will be correctly defined as? WWWC (W3C)?
A) System software A) Computer
B) Application software B) Congress
C) 5th generation software C) Consortium
D) Interpreters D) Community
E) None of these E) None of these
Correct Answer: “B” Correct Answer: “C”
377. Letter ‘G’ is a valid in direct form 382. While typing the URL of a
in which of the following number website the term HTTP is followed by?
system? A) ://
A) Binary B) :\\
B) Decimal C) :/
C) Hexadecimal D) :\
D) All of these E) None of these
E) None of these Correct Answer: “A”
Correct Answer: “E”
383. Which virus affects the boot
378. A note or drawing added to a sector of a hard disk by altering the
slide during a presentation in MS boot data?
PowerPoint is called A) Macro Virus
A) footnote B) Cavity Virus
B) annotation C) File Viruses
C) notation D) Cluster Virus
D) explanation E) None of these
E) comment Correct Answer: “E”
Correct Answer: “B”
384. Virus affecting the instructions
379. The technology of connecting to that are capable of performing series
the Internet via a phone line is called? of task in a single go are called?
A) WiMax A) Macro Virus
B) VoLTE B) Boot Sector Virus
C) DSL C) Memory Resident Virus
D) Telnet D) Overwrite Viruses
E) None of these E) None of these
Correct Answer: “C” Correct Answer: “A”
386. The program which appear to be 391. The startup check by a computer
useful software but will actually do to ensure the proper working of all
damage once installed are termed as? attached
A) Shareware device is known as?
B) Worms A) BIOS
C) Trojans B) POST
D) Wrong ware C) CMOS
E) None of these D) SMPS
Correct Answer: “C” E) None of these
Correct Answer: “B”
387. A type of virus which replicates
very fast without the need of host file is 392. The transaction processing
called? system in which the transaction is
A) Worms processed immediately without
B) Trojan accumulation of transaction is known
C) Multipartite virus as?
D) FAT Virus A) Batch processing
E) None of these B) OLTP
Correct Answer: “A” C) Universal processing
D) Operational processing
388. How many character can be E) None of these
represent at a time by using 8 Bits? Correct Answer: “B”
A) 8
B) 256 393. Which of the following is an
C) 255 example of decentralized, distributed
D) 1024 database that maintains a
E) None of these continuously-growing list of ordered
Correct Answer: “E” records and a link to a previous
record?
389. A computer which provides its A) Relational Database
services to other computer on a B) Blockchain
network is termed as? C) LTE Database
A) Backend system D) Procedural Database
B) Client E) None of these
C) Server Correct Answer: “B”
D) Gateway
E) None of these
Correct Answer: “C”
Top 500 Computer Awareness MCQs Free PDF
417. The distortion caused in signals 423. The principle that Internet service
over network channel is termed as? providers should enable access to all
A) Repeaters content and applications equally
B) Attenuation regardless of the source is known as?
C) Gateways A) Net Servicing
D) Bridges B) Net Equality
Correct Answer: “ B” C) Net Neutrality
D) Fair Usage Policy
418. The point of inter connections in a Correct Answer: “C”
network is known as ____ ?
A) protocol 424. The device used to carry out card
B) nodes payment at retail location is known as?
C) client A) PoS
D) bus B) OMR
Correct Answer: “B” C) ATM
D) CDM
Correct Answer: “A”
419. When a computer is booted,
BIOS retrieves its information from 425. Which of the following is not an
____? Impact Printer?
A) RAM A) Dot Matrix
B) CMOS chip B) Line Printer
C) Hard Disk C) Daisy Wheel Printer
D) Cache D) Thermal Printer
Correct Answer: “B” Correct Answer: “D”
420. Find the odd one out 426. Name the device which keeps the
A) .doc computer units powered up during time
B) .txt of
Top 500 Computer Awareness MCQs Free PDF
457. The statement “If you feed wrong (1) News group
data to the computer, it will give you (2) Use net
the wrong output” is best described in? (3) Backbone
A) FIFO (4) Flaming
B) GIGO (5) Spam
C) LIFO Correct Answer: 5
D) LILO
E) None of these 453. When sending an e-mail, the
Correct Answer: “B” _____ line describes the contents of
the message.
458. Which of the following is not a (1) to
programming language? (2) subject
A) LISP (3) contents
B) MIPS (4) CC
C) SQL (5) None of these
D) Java Script Correct Answer: 2
E) None of these
Correct Answer: “B” 454. The _____ key will launch the
start buttons.
459. All of the following are considered (1) Esc
to be storage devices EXCEPT______ (2) Shift
(1) floppy disk (3) Logo
(2) CPU (4) Shortcut
(3) CD (5) None of these
(4) hard disk drive Correct Answer: 3
(5) none of these
Correct Answer: 2 455. What is object of UPS?
(1) Using for storage
450. One megabyte equals (2) To increase the speed of a
approximately ___________ computer
1) 1,000 bits (3) Provides backup power
2) 1,000 bytes (4) All of these
3) 1 million bytes (5) None of these
4) 1 million bits Correct Answer: 3
5) 2,000 bytes
Correct Answer: 3 456. Documents converted to ..........
can be published to the Web.
451. A computer checks the _____ of (1) .doc file
user names and passwords for a (2) http
match before (3) machine language
granting access. (4) HTML
(1) Website (5) none of these
(2) Network Correct Answer: 4
(3) Backup file
(4) Data base 457. Which of the following printers
(5) None of these generates character from a grid?
Correct Answer: 4 (1) Inkjet
(2) Laser
452. What is the term for unsolicited e- (3) Daisy wheel
mail? (4) Dot matrix
Top 500 Computer Awareness MCQs Free PDF
460. Which of the following best 465. Your position in the text is shown
defines embedded system? by a ..........
(1) A program that comes wrapped in (1) Blinker
a box (2) Cursor
(2) A program that is permanent part of (3) Causer
a computer (4) Pointer
(3) A computer that is a part of a larger (5) None of these
computer Correct Answer: “2”
(4) A computer and software system
that controls a machine 466. When the pointer is positioned on
(5) None of these a……….it is shaped like a hand.
Correct Answer: 4 (1) Grammar error
(2) Formatting error
461. Digital video consists of a series (3) Screen Tip
of_____ (4) Spelling error
(1) Media clips (5) hyperlink
(2) Captures Correct Answer: “5”
(3) Frames
(4) Pictures 467. A device, which is not connected
(5) none of these to CPU, is called as .......
Correct Answer: 3 (1) land-line device
(2) On-line device
462. Which of the following is NOT an (3) Off-line device
example of system maintenance? (4) Device
(1) Replacing user interfaces (5) None of the above
(2) Making backup copies of files Correct Answer: “3”
(3) Adding, deleting, adjusting records
(4) Providing system security
(5) none of these
Correct Answer: 1
Top 500 Computer Awareness MCQs Free PDF
468. The first graphical web browser (1) Where many CPU under a
are? common control
(1) BING (2) Consisting of more than one input
(2) EDGE devices under common control
(3) Alltheweb (3) Where many output devices under
(4) Mosaic (4) All of the above
(5) WWW (5) None of these
Correct Answer: “4” Correct Answer: “1”
470. Rotational delay time is also 475. Ctrl + D is short cut used for ?
known as (A) Open Dialogue Box
(1) Seek time (B) Font Dialogue Box
(2) Shift time (C) Save as Dialogue Box
(3) Latency (D) Save Dialogue Box
(4) Access time Correct Answer : B
(5) None of these
Correct Answer: “3” 476. WORM is a data storage
technology that prevents the drive from
471. Pascal is erasing the data. What is the full form
(1) A high-level programming language of WORM?
(2) Named after Blaise Pascal
(3) Named after mathematician that 1. Write Out, Read Many
facilitates structured programming 2. Write Once, Read More
techniques 3. Write Once, Read Much
(4) All of the above 4. Write Over, Read Mode
(5) None of these 5. Write Once, Read Many
Correct Answer: “4”
Correct Answer – “5”
472. The point at which the flow of text
477. Which one of the following
in a document moves to the top of a
software applications would be the
new page–
most appropriate for performing
(1) Page insert
numerical and statistical calculations?
(2) Page break
(3) Page format 1. Database
(4) All of the above 2. Spreadsheets
(5) None of these 3. Graphics Package
Correct Answer: “2” 4. Document Processor
5. Slide Presentation
473. Multiprocessor is a computer
system– Correct Answer – “2”
Top 500 Computer Awareness MCQs Free PDF
1. Storage
2. Motherboard
3. CPU
4. Memory
5. Peripherals
498. _________________________ is
a collection of data that is organized so
that its contents can easily be
accessed, managed and updated.
1. Data warehouse
2. Data mining
3. Database
4. Data dictionary
5. Directory
BLOG FORUM
www.OliveBoard.in