You are on page 1of 22

COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM

BASICS OF COMPUTER Sol. (a) Sol. (c)

12. A hybrid computer 23. In which of the following number systems


1. The first electronic digital computer
(a) Resembles digital computer only 1’s and 0's exist?
contained _________ ?
(a) Electronic Valves (b) Resembles analogue computer (a) Hexadecimal (b) Octal
(c) Resembles Both A Digital And Analogue (c) Binary (d) Decimal
(b) Neural Networks
Computer Sol. (c)
(c) Fuzzy Logic
(d) None of the above
(d) Semiconductor memory
Sol. (c) 24. Which of the following features are not
Sol. (a)
supported by CPU?
2. What is the sequence of events that occurs in 13.Which of the following IC was used in third (a) It performs all kind of Data processing
generation of computers? operations.
the computer when it is interpreting and
(a) SSI (b) MSI (b) It stores data, immediate results and
executing an instruction known as?
(c) LSI (d) BOTH A AND B instructions.
(a) Execution cycle (b) Instruction Cycle
Sol. (d) (c) It controls the operation of all parts of
(c) Working cycle (d) Execute cycle
computers.
Sol. (b)
14. A dumb terminal has (d) It Can Design The Software Programs By
(a) an embedded microprocessor Itself.
3. __________ computers represent data as
(a) extensive memory Sol. (d)
variable points along a continuous spectrum of
(c) independent processing capability
values.
(d) A Keyboard And Screen 25. A silicone piece with millions of transistors
(a) Analog (b) Digital
Sol. (d) in it is known as
(c) Precise (d) Mainframe
(a) Chip (b) Circuit
Sol. (a)
15. Which of the following was a special (c) Digital Gate (d) Multiplexer
purpose computer? Sol. (a)
4. Computers use the __________ number
(a) ABC (b) ENIAC
system to store data and perform calculations.
(a) decimal (b) hexadecimal (c) EDVAC (d) All of the above 26. How can we execute the Machine
(c) Binary (d) octa Sol. (a) language?
Sol. (c) (a) It cannot be executed
16. In most of the IBM PCs, the CPU, the device (b) It can be executed using separate machine
drivers, memory, expansion slots and active (c) It Can Be Directly Executed By Cpu
5. Which of the following technology was used
components are mounted on a single board. (d) We use special assembler
in Second Generation of Computer?
(a) electronic valves (b) Transistors What is the name of the board? Sol. (c)
(c) SSI (d) VLSI (a) Motherboard (b) Daughterboard
(c) Bredboard (d) Fatherboard 27. Which of the given options is NOT the
Sol. (b)
Sol. (a) basic/major function of Computer System?
(a) A computer displays the processed data in
6. The concept of multiprocessing was
17. Which level language is Assembly Language the form of output
introduced in which generation of computer?
? (b) A computer accepts the input from the user
(a) first (b) second
(a) high-level programming language (c) A Computer Scours The Internet For Content
(c) third (d) Fourth
(b) medium-level programming language (d) A computer processes the data given by the
Sol. (d)
(c) Low-Level Programming Language user
7. Which of the following languages was used (d) machine language Sol. (c)
for scientific calculations? Sol. (c)
28. FORTRAN stands for __________.
(a) BASIC (b) FORTRAN
18. ____________ stores all the data and the (a) For Translation
(c) COBOL (d) UNIVAC
instructions required for processing. (b) Format Transformation
Sol. (b)
(a) ALU (b) CU (c) Fork Transformation
(c) MEMORY (d) NONE OF THESE (d) Formula Translation
8. _______________ endeavours to simulate
Sol. (c) Sol. (d)
the natural intelligence of human beings into
machines, thus making them behave
19. Which one is not a characteristic of 29. Which is used for manufacturing chips?
intelligently.
computer? (a) Bus (b) Control unit
(a) Meta Intelligence
(a) ACCURACY (b) DILIGENCY (c) Semiconductors (d) (a) and (b) only
(b) Artificial Intelligence
(c) IQ (d) RELIABILITY Sol. (c)
(c) Systematic Intelligence
Sol. (c)
(d) Natural Intelligence
30. Properly arranged data is called
Sol. (b)
20. Blaise Pascal a French scientist invented an (a) Field (b) Words
9. Out of the following, which one is still useful adding machine called_________. (d) Information (d) File
if we want to add numbers? (a) Pascal’s calculator (b) Blaise calculator Sol. (c)
(c) Abacus (d) Arithmetic computer
(a) UNIVAC (b) ABACUS
(c) ENIAC (d) EDSAC
Sol. (a)
COMPUTER HARDWARE
Sol. (b)
21. Who invented the punch card?
1. DTP stands for
(a) Charles Babbage
10. Which of the following is not a type of (a) Desktop Publishing Software
(b) Semen Korsakov
computer code? (b) Device to Publish
(c) Herman Hollerith
(a) EDIC (b) ASCII (c) Database to Software
(d) Joseph Marie Jacquard
(c) BCD (d) EBCDIC (d) None of these
Sol. (c)
Sol. (a) Sol. (a)
22. In banking, railways etc which computers
11. What is the IQ level of a computer? 2. Why do we need a Computer Monitor?
are used ?
(a) Zero (b) 100 (a) To keep the computer overheating
(a) Mini Computers (b) Micro Computers
(c) infinite (d) 1024 (B) To See What The Computer Is Doing
(c) Main Frames (d) Super Computers

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(c) Because it is like the brain of the computer Sol. (c) 25. A hard disk is divided into tracks which are
(d) None of these further subdivided into:
Sol. (b) 14. Which type of devices are speakers or (a) clusters (b) Sectors
computer headphones? (c) vectors (d) heads
3. The Joystick is a stick that moves the graphic (a) Input (b) Output Sol. (b)
cursor in the direction the stick is moved. (c) Input/Output (d) Software
(a) Parallel (b) Horizontal Sol. (b) 26. During the boot process, the ____________
(c) Straight (d) Vertical looks for the system files.
Sol. (d) 15. Optical Mouse was introduced by (a) CD (b) BIOS
(a) Dell, 1526 (b) Dell, 1835 (c) CPU (d) DVD
4. The device primarily used to provide (c) Microsoft, 1999 (d) Microsoft, 1995 Sol. (b)
hardcopy is the Sol. (c)
(a) CRT (b) Computer Console 27. The barcode which is used on all types of
(c) Printer (d) card reader 16. Which is the smallest Unit of Computer items, is read by a scanning device directly into
Sol. (c) Memory? the computer. What is the name of this
(a) Nibble (b) Kilobyte scanning device?
5. Which among the device that converts (c) Byte (d) BIT (a) LASER SCANNER (b) Wand
computer output into a form that can be Sol. (d) (c) OCR (d) MICR
transmitted over a telephone line? Sol. (a)
(a) Teleport (b) Multiplexer 17. Half of the Byte is called as
(c) Concentrator (d) MODEM (a) Nibble (b) Bits 28. The resolution of a monitor is measured in
Sol. (d) (c) Kilobyte (d) Megabyte (a) Megabits (b) Hz
Sol. (a) (c) Pixels Per Inch (PPI) (d) Inches (diagonal)
6. A light sensitive device that converts Sol. (c)
drawing, printed text of other images into 18. The smallest and Fastest memory of the
digital form is:- computer is? 29. Which of the following memories must be
(a) Keyboard (b) Plotter (a) RAM (b) Cache Memory refreshed many times per second?
(C) Scanner (d) OMR (c) Registers (d) ROM (a) EPROM (b) ROM
Sol. (c) Sol. (c) (c) Static RAM (d) DYNAMIC RAM
Sol. (d)
7. Which among the following is not the type of 19. _____ are the temporary memory units that
keys on Keyboard? store data and are located in the processor. 30. Laser Jet printer speeds are measured in
(a) Alphabet Keys (A-Z) (a) Cache Memory (b) REGISTERS pages per minute (ppm) what do we use to
(b) Numeric Keys (0-9) (c) RAM (d) ROM measure dot-matrix printers?
(c) Function Keys (F1 to F12) Sol. (b) (a) lines per inch
(d) Roaster Keys (R1 & R2) (b) lines per sheet
Sol. (d) 20. What is the abbreviation of EPROM? (c) characters per inch
(a) Electronic Programmable Read Only (d) Characters Per Second
8. Which key is used to exit from any Memory Sol. (d)
application? (b) Electronic Erasable Programmable Read only
(a) Esc Key (b) Spacebar Key Memory
(c) Caps Lock Key (d) Insert Key (c) Electrically Programming Random only
COMPUTER SOFTWARE
Sol. (a) Memory.
01. The component which makes a computer to
(d) NONE OF THESE
9. Which input device is used to read data Sol. (d) work through commands is called _____.
character by character, typed or handwritten? (a) SOFTWARE (b) hardware
(a) OMR (b) MICR 21. What is the name given to the memory (c) malware (d) junkware
(c) OCR (d) BCR which works on time sharing principle in order Sol. (a)
Sol. (c) to create an illusion of infinite memory space?
02. Which of the following is not a type of
(a) Cache Memory (b) VIRTUAL MEMORY
software?
10. Which among the following is used in (c) Register (d) Primary Memory
banking industry cheque Evaluation? Sol. (b) (a) System software (b) Application software
(a) BCR (b) MICR (c) Utility software (d) DRIVER SOFTWARE
(c) QR (d) OMR 22. Which type of ROM can be erased by UV Sol. (d)
Sol. (b) Light?
(a) ROM (b) Mask ROM 03. Which software is used to manage and
control the hardware components and allows
11. Which among the following device is also (c) EPROM (d) EEPROM
called as Print Scanner or Point of Sale? Sol. (c) interaction between the hardware and the
other different types of software?
(a) BCR (b) MICR
(a) Application software (b) System Software
(c) QR (d) JOYSTICK 23. Which of the following is normally used to
Sol. (a) initialize a computer system's hardware? (c) Utility software (d) Operating system
(a) Bootstrap Memory Sol. (b)
12. Which printer is used to print only (b) Volatile Memory
characters and symbols and cannot print (c) External Mass Memory 04. The process of finding errors/defects/bugs
graphics? (d) Static Memory. in the software program is called
(a) Debugging (b) Interpreting
(a) Ink-jet Printer (b) Thermal Printer Sol. (a)
(c) Compiling (d) Testing
(c) Laser Printer (d) Daisywheel Printer
Sol. (a)
Sol. (d) 24. Data is written to and read from the disk via
a magnetic head mechanism in the floppy drive.
13. When a key is pressed on the keyboard, (a) Cylinder (b) Cluster 05. Which of the following is not application
which standard is used for converting the (c) Read/Write (d) None of these software?
keystroke into corresponding bits? Sol. (c) (a) MS-Word (b) Google Docs
(c) Adobe Acrobat (d) Compiler
(a) ANSI (b) EBCDIC
Sol. (d)
(c) ASCII (d) ISO

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
16. When you turn on the computer, the boot 26. Which of the following is not an open
06. Which of the following are known as office- routine will perform this test- source software?
oriented application software? (a) RAM test (b) Disk drive test (a) LibreOffice
(a) Interpreters, Compilers, editors (c) Memory test (d) Power-On-Self-Test (b) Microsoft Office
(b) Network software, backup system Sol. (d) (c) GNU image manipulation
(c) Word Processors, Spreadsheets, Database (d) MySQL
(d) Both a and c 17. Copying computer program or software Sol. (b)
Sol. (c) without permission of its author is called –
(a) Highway robbery (b) Larceny 27. Developing open source software can mean
07. What is the full form of GUI? (c) Software Piracy (d) Embezzlement _____________.
(a) Graphical Universal Interface Sol. (c) (a) basing it on open source technologies and
(b) Graphical User Interface open standards.
(c) General Utility Interface 18. Antivirus software is an example of …….. (b) working collaboratively with other groups.
(d) General Universal Interface (a) business software (b) an operating system (c) To Redistribute The Source Code Widely.
Sol. (b) (c) A Security Utility (d) an office suite (d) to use the source code widely.
Sol. (c) Sol. (c)
08. Which among the following is not a type of
utility system software? 19. _____ is a software that is distributed free 28. What is another name given to 'proprietary
(a) Antivirus (b) Firewalls on a trial basis with the understanding that the software'?
(c) Disk defragmenter (d) MS-DOS user may need or want to pay for it later. (a) Open source software
Sol. (d) (a) openware (b) Shareware (b) Bespoke software
(c) adware (d) Open source (c) Tailor Made software
09. Which utility software or program is used to Sol. (b) (d) Closed Source Software
reduce the size of files to increase the amount Sol. (d)
of disk space in the computer system? 20. The simultaneous execution of two or more
(a) Disk cleanup instructions is called 29. A ___________ is a computer program that
(b) File Compression (a) sequential access takes one or more object files generated by a
(c) Disk fragmentation (b) reduced instruction set computing compiler and combines them into one,
(d) Troubleshooting program (c) Multiprocessing executable program.
Sol. (b) (d) disk mirroring (a) Linker (b) loader
Sol. (c) (c) utility software (d) none of these.
10. Which of the following Windows utilities Sol. (a)
scans the entire hard drive and erase (or 21. By firmware we understand _______
delete) any unnecessary files such as temporary (a) physical equipment used in a computer 30. ____________ is the first layer of software
files from the Internet, and cookies system loaded into computer memory on the time of
downloaded while visiting webpages? (b) a set of instructions that causes a computer booting (Starts Up).
(a) Disk defragmenter to perform one or more tasks. (a) linker (b) application
(B) DISK CLEANUP (c) the people involved in the computing (c) Operating System (d) none of these
(c) Backup and Restore wizard process. Sol. (c)
(d) All of the above (d) A Set Of Programs That Is Pre-Installed Into
Sol. (b) The Read Only Memory Of A Computer During
The Time Of Manufacturing. OPERATING SYSTEM
11. Linux is an example of ….. Sol. (d)
(a) Freeware (b) Open Sources Software 01. What is an operating system?
(c) Shareware (d) Complimentary 22. OSS stands for:- (a) interface between the hardware and
Sol. (b) a) Open System Service application programs
b) Open Source Software (b) collection of programs that manages
12. A computer converts a high level program c) Open System Software hardware resources
into a low level program with the help of …… d) Open Synchronized Software (c) system service provider to the application
(a) compiler (b) interpreter Sol. (b) programs
(c) (A) AND (B) BOTH (d) package (d) All Of The Mentioned
Sol. (c) 23. A _________is a software program which Sol. (d)
allows us to access the Internet and view web
13. Programs written in an assembly language pages on our computer. 02. Which one of the following is not true?
are converted into machine language in a (a) Computer program (b) Internet protocol (a) kernel remains in the memory during the
computer by …………. (c) Web Browser (d) Website entire computer session
(a) Assembler (b) compiler Sol. (c) (b) Kernel Is Made Of Various Modules Which
(c) interpreter (d) processor Can Not Be Loaded In Running Operating
Sol. (a) 24. Which of the following is an example for System
Application Software? (c) kernel is the first part of the operating
14. Any program translated into machine (a) MS-DOS (b) LINUX system to load into memory during booting
language is called ………. (c) Adobe Photoshop (d) UNIX (d) kernel is the program that constitutes the
(a) analog program (b) Object Code Sol. (c) central core of the operating system
(c) personal program (d) official program Sol. (b)
Sol. (b) 25. What are features of application software?
(a) Generic usability, Reliability and Supported 03. Which one of the following errors will be
15. The legal right to use software based on environment handle by the operating system?
specific restrictions is granted via a ………… (b) More Interactive, Close To The User, (a) lack of paper in printer
(a) Software privacy policy Generally Written In High-Level Language . (b) connection failure in the network
(b) Software License (c) Easy to carry, Installation is Complex (c) Power Failure
(c) Software password manager (d) Low Level Language, Easy to install and (d) all of the mentioned
(d) Software log highly compact Sol. (c)
Sol. (b) Sol. (b)

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
04. The main memory accommodates ____ (b) Single user Operating System (b) De-allocates the memory when the process
(a) CPU (b) user processes (c) Real time Operating System needs it or still running
(c) operating system (d) all of the mentioned (d) Batch Processing Operating System (c) Acts as a blocking wall between hardware
Sol. (a) Sol. (a) and its user
(d) To Manage The Resources Of The Computer
05. Linux is a/an ____ . 16. What are common services provided by an System
(a) Application software operating system ? Sol. (d)
(b) Word processor i) Program execution
(c) Database management system ii) I/O operations 24. Which of the following works by dividing
(d) Operating Software iii) File System manipulation the processor’s time?
Sol. (d) iv) Communication (a) single task operating system
v) Error Detection (b) Multitask Operating System
06. DOS stands for_____. (a) I, II, III, IV, V (b) Only i and v (c) kernel
(a) Disk Operating System (c) Only i, ii and v (d) Only ii, iii and iv (d) applications
(b) Drive operating system Sol. (a) Sol. (b)
(c) Disk operation socket
(d) disk open supply 17. Based on the implementation of threads, 25. __________ manages device
Sol. (a) Operating System classifies the threads as communication via their respective drivers.
(a) Mainframe and Motherboard Level (a) Device drivers (b) Interpreters
07. In a single unit of computer we can use (b) Kernel And User Level (c) Proess (d) Operating System
more than ___OS But at a time we may run (c) Security and Memory Level Sol. (d)
only one OS. (d) OS and CPU Level
(a) One
(c) Three
(b) Two
(d) None
Sol. (b)
INTERNET & E-MAIL
Sol. (a) 18. What are major activities of an operating
1. Who is known as the father of email ?
system with respect to resource management?
(a) Bill Rogers (b) Tim Berners Lee
08. UNIX stands for __. (a) OS provides authentication features for each (c) Babbage (d) Raymond Tomlinson
(a) union interface Xerox user by means of passwords. Sol. (d)
(b) user normal interface (b) OS ensures that external I/O devices are
(c) user normal interface protected from invalid access
2. Who is known as the founder of WWW?
(D) UNICODE INFORMATION COMPUTING attempts.
(a) Bill Rogers (b) Tim Berners Lee
SYSTEM, SOURCE (c) OS constantly checks for possible error and
(c) Babbage (d) Raymond Tomlinson
Sol. (d) the OS takes an appropriate Sol. (b)
action to ensure correct and consistent
09. Ken Thompson and Dennis Ritchie computing.
3. A __________ is a reference to data that the
developed an operating system name__ (d) Os Manages All Kinds Of Resources Using
reader can follow by clicking or tapping.
(a) MAC (b) window Schedulers & Cpu Scheduling Algorithms Are
(a) Domain (b) URL
(c) UNIX (d) Linux Used For Better Utilization Of Cpu.
(c) Hyperlink (d) Landing Page
Sol. (c) Sol. (d)
Sol. (c)
10. MAC operating system was developed by 19. What is considered as the heart of the
4. Find the odd one out
____. operating system, which provides the basic (a) UC (b) Opera
(a) Steve Jobs (b) Abhinandan foundation, memory management file systems, (c) Safari (d) ESET
(c) sunder pichai (d) Dennis Richie program execution? Sol. (d)
Sol. (a) (a) ALU (b) paging
(c) Kernel (d) Shell
5. Bluetooth is an example of?
11. What else is a command interpreter called? Sol. (c)
(a) LAN (b) SAN
(a) prompt (b) kernel
(c) PAN (d) WAN
(c) Shell (d) command 20. Any device connected to an Operating
Sol. (c)
Sol. (c) system is controlled by using ?
(a) Device Monitors (b) Device Drivers 6. Storage area for E-mail messages is called
12. A _________ is a lightweight process and (c) Device Trackers (d) Device Units
(a) folder (b) file
forms the basic unit of CPU utilization. Sol. (b)
(c) MAIL BOX (d) directory
(a) Process (b) Thread
Sol. (c)
(c) Kernal (d) None of these. 21. A systematic procedure for moving the CPU
Sol. (b) to new process is known as?
7. An E-mail address typically consists of a user
(a) Synchronization (b) Context Switching
ID followed by the.........sign and the domain
13. BIOS is used? (c) Deadlock (d) Starvation
name that manages the user's electronic post
(a) By Operating System Sol. (b) office box.
(b) By compiler (a) # (b) @ (c) & (d) $
(c) By interpreter 22. Which of the following is TRUE for system
Sol. (b)
(d) By application software software in comparison with application
Sol. (a) software?
8. Documents converted to..... .can be
(a) They are slower in speed
published to the Web.
14. Which of the following services are NOT (b) They Are Less Interactive
(a) .doc file (b) http
provide by operating system? (c) They are bigger in size
(c) machine language (d) HTML
(a) Memory Management (d) They are easier to design and understand
Sol. (d)
(b) People Management Sol. (b)
(c) Device Management
9. The home page of a Website is
(d) Process Management 23. Which one of the following is an objective
(a) the largest page
Sol. (b) of the operating system?
(b) the last page
(a) Makes it complicated for the user to use the
(c) THE FIRST PAGE
15. Linux is a computer system
(d) the most colourful page
(a) Multi User Operating System

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
Sol. (c) (a) Network (b) Wireless
20. What is WWWW full form? (c) Slow (d) BROADBAND
10. The common name for a modulator- (a) World Wide Women's Web Sol. (d)
demodulator is (b) World Wide Wildlife Web
(a) MODEM (b) jointer (c) WORLD WIDE WEB WORM. 31. The standard protocol of the Internet is
(c) networker (d) connector (d) World Wide Women's Week (a) TCP/IP (b) Java
Sol. (a) Sol. (c) (c) HTML (d) flash
Sol. (a)
11. Which is not the feature of Internet? 21. What are the differences between Internet
(a) E-mail (b) Newsgroup and Intranet? 32. Which of the following is the
(c) Chat (d) DESIGNING (a) Intranet is not as safe as Internet. Internet communication protocol that sets the standard
Sol. (d) can be safely privatized as per the need. used by every computer that accesses Web-
(b) Intranet is general to PCs all over the world based information?
12. Which among the following is a search whereas Internet is specific to few PCs. (a) XML (b) DML
engine? (c) Internet sites are accessible via the web (c) HTTP (d) HTML
(a) Internet Explorer (b) Flash browser in a similar way as websites in the Sol. (c)
(c) GOOGLE (d) Firefox intranet, however, only members of internet
Sol. (c) network can access intranet hosted sites. 33. Which of the following is used by the
(d) INTERNET PROVIDES A WIDER AND BETTER browser to connect to the location of the
13. Which of the following is true statements ACCESS TO WEBSITES TO A LARGE Internet resources?
about modems? POPULATION, WHEREAS INTRANET IS (a) Linkers (b) protocol
(a) Modems use the telephone lines RESTRICTED. (c) Cable (d) URL
(b) A modem's fastest transfer rate is 56 kbps Sol. (d) Sol. (d)
(c) Modems are no longer used in secure
network 22. Which of the following service is used to log 34. Which of the following is required to create
(d) None of these on to remote computer that is attached to an HTML document?
Sol. (a) internet? (a) Browser (b) Internet
(a) Telnet (b) VoIP (c) TEXT EDITOR (d) Search engine
14. ....... is the encompassing term that involves (c) IRC (d) FTP Sol. (c)
the use of electronic platforms-intranets, Sol. (a)
extranets and the Internet-to conduct a 35. A ......... is the term used when a search
company's business. 23. Which of the following protocols are used in engine returns a Web page that matches the
(a) E-commerce (b) E-marketing Email? search criteria.
(c) E-procurement (d) E-business (a) FTP (b) DHCP (a) blog (b) HIT
Sol. (a) (c) SMTP (d) ARP (c) link (d) view
Sol. (c) Sol. (b)
15. FTP can transfer files between any
computers that have an Internet connection. 24. Which one of the following protocols 36. A cookie
Here, FTP stands for assigns IP addresses automatically? (a) STORES INFORMATION ABOUT THE USER'S
(a) FILE TRANSFER PROTOCOL (a) DHCP (b) IP WEB ACTIVITY
(b) Fast Text Processing (c) TCP (d) RCP (b) stores software developed by the user
(c) File Transmission Program Sol. (a) (c) stores the password of the user
(d) Fast Transmission Processor (d) stores the combmands used by the user
Sol. (a) 25. IPv6 addresses are:– Sol. (a)
(a) 32 bits (b) 64 bits
16. The WWW is made up of the set of (c) 128 bits (d) 256 bits 37. The last three letters of the domain name
interconnected ......... that are linked together Sol. (c) describes the type of:-
over the Internet. (a) ORGANISATION (DOMAIN NAME)
(a) electronic documents (b) WEB PAGES 26. Which of the following displays the name of (b) connectivity
(c) files (d) All of these the web page in internet explorer browser? (c) server
Sol. (b) (a) Menu bar (b) Title bar (d) protocol
(c) Address bar (d) Standard tool bar Sol. (a)
17. ......... is collection of Web pages and ......... Sol. (b)
is the very first page that we seen on opening 38. Junk E-mail is also called:-
of Website. 27. BCC in E-mail means: (a) crap (b) spoof
(a) Home page, Web page (a) Black Composer Copy (c) snifter script (d) SPAM
(b) WEBSITE, HOME PAGE (b) Blind Composer Copy Sol. (d)
(c) Web page, home page34 (c) Black Carbon Copy
(d) Web page, Website (d) Blind Carbon Copy. 39. In HTML, tags consists of keywords enclosed
Sol. (b) Sol. (d) within
(a) flower brackets (b) ANGULAR BRACKETS <>
18. DNS is a host name to IP address translation 28. The first browser was invented by………….. (c) parentheses () (d) square brackets [ ]
service. DNS stands for (a) Robert Cailliau (b) TIM BERNERS-LEE Sol. (b)
(a) Data Network Server (c) Vint cerf (d) Ted Nelson
(b) Domain Network Service Sol. (b) 40. A stored link to a Web page, in order to
(c) DOMAIN NAME SERVER have a quick an easy access to is later, is called
(d) Data Name Server 29. Where broadband connections are .............
Sol. (c) unavailable, _______ are used for wireless (a) WP-Link (b) BOOKMARK
Internet connectivity. (c) Field (d) Length
19. Which of the following is NOT an an email (a) Mobile networks (b) wi-fi Sol. (b)
client? (c) SATELLITES (d) Hotspots
(a) Microsoft Outlook (b) OS X Mail Sol. (c)
MS-WORD
(c) Lotus (d) HTTP
Sol. (d) 30. DSL is an example of which connection?

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
1. Microsoft Word is a (c) Alt (d) Esc (a) BLUE (b) Red
(a) WORD PROCESSING PROGRAM Sol. (b) (c) Green (d) Black
(b) Spreadsheet Program Sol. (a)
(c) Presentation Program 12. What is the shortcut key to create a "New"
(d) None of the above document ? 24. To start the next page at the current
Sol. (a) (a) Shift + N (b) CTRL + N position, use-
(c) Alt + N (d) Shift + Ctrl + N (a) Blank page (b) Cover page
2. What was the initial name of Microsoft Word Sol. (b) (c) PAGE BREAK (d) None of these.
when it was released? Sol. (c)
(a) Multi-Technique Word 13. What is the shortcut key to "Select" a whole
(b) Multi-Transition Word document ? 25. Moves the cursor to the beginning of the
(c) Multi-Type Word (a) Ctrl + S (b) Ctrl + W document
(d) MULTI-TOOL WORD (c) Ctrl + P (d) CTRL + A (a) Ctrl + Del (b) Ctrl + Backspace
Sol. (d) Sol. (d) (c) Ctrl + End (d) CTRL + HOME
Sol. (d)
3. Office Button is symbolized with which 14. Which tool can be opted for a synonym
feature on MS Word? word in a document? 26. Shortcut for 1.5 line spacing is-
(a) Paper (b) RIBBON (a) Auto text (b) Replace (a) CTRL + 5 (b) Ctrl + 2
(c) Arrow (d) Office (c) THESAURUS (d) Restore (c) Ctrl + 1 (d) None of these
Sol. (b) Sol. (c) Sol. (a)

4. The ___ works with the standard Copy and 15. Values of normal margin (in inches) in ms- 27. Ctrl + H is used for-
Paste commands. word is (a) OPEN REPLACE BOX (b) Open dialogue box
(a) View tab (a) left-0.5, right-0.5, top-0.5, bottom-0.5 (c) Find (d) none
(b) Paragraph dialog box (b) left-0.75, right-0.75, top-0.5, bottom-0.5 Sol. (a)
(c) OFFICE CLIPBOARD (c) LEFT-1, RIGHT-1, TOP-1, BOTTOM-1
(d) All of these (d) left-1.5, right-1.5, top-1, bottom-1 28. Quick Access Toolbar is present at ______
Sol. (c) Sol. (c) of Office Button in MS Word.
(a) Up (b) Down
5. What is the blank space outside the printing 16. Which items are placed at the end of a (c) Left (d) RIGHT
area on a page? document Sol. (d)
(a) Clipart (b) MARGINS (a) END NOTE (b) Footer
(c) Header (d) Footer (c) Foot Note (d) Header 29. Which of the following document settings
Sol. (b) Sol. (a) can be changed from Home tab?
(a) Font Size (b) Adding Bullets
6. Which enables us to send the same letter to 17. We can change the thickness of a line from - (c) Adjusting Styles (d) ALL OF THE ABOVE
different people? (a) Line Thick (b) Line Height Sol. (d)
(a) Macros (b) Template (c) Line width (d) LINE STYLE
(c) MAIL MERGE (d) None of above Sol. (d) 30. In order to select a single word –
Sol. (c) (a) Single Click within the word
18. The minimum number of rows and columns (b) DOUBLE CLICK WITHIN THE WORD
7. Word wrap means in MS Word document is (c) Right Click within the word
(a) aligning text with the right margin (a) 1 AND 1 (b) 2 and 1 (d) Scroll in Word
(b) inserting spaces between words (c) 1 and 2 (d) 2 and 2 Sol. (b)
(c) MOVING TEXT AUTOMATICALLY TO THE Sol. (a)
NEXT LINE
(d) None of the above 19. How many columns can you insert in a word
MS - POWERPOINT
Sol. (c) document in maximum?
1. Microsoft PowerPoint is a presentation
(a) 40 (b) 45 (c) 63 (d) 55
program, created by ___________________at a
8. What is the default file extension for all Sol. (c)
software company named Forethought, Inc.
Word documents ? (a) Robert Gaskins and Dennis Austin
(a).txt (b).xlsx 20. Which of the following is used to create a
(b) Ada Lovelace
(c).docs (d).DOCX large capital letter a the beginning of a
(c) Steve Jobs
Sol. (d) paragraph?
(d) Steve wozniak
(a) Text box (b) Word art
Sol. (a)
9. How can you increase the font size of (c) DROP CAP (d) None of these.
selected text by one point every time ? Sol. (c)
2. __________ is used to write title of slide.
(a) By pressing Ctrl + ;
(a) Title Placeholder (b) Text Placeholder
(b) By pressing Ctrl + , 21. What is the default number of lines to drop (c) Object Placeholder (d) None of these
(c) By pressing Ctrl + [ for drop cap? Sol. (a)
(d) BY PRESSING CTRL + ] (a) 3 (b) 10 (c) 15 (d) 20
Sol. (d) Sol. (a)
3. Which key combination is used to duplicate
the current slide?
10. What is by default the smallest and largest 22. In Microsoft Word shortcut key CTRL+W is
(a) CTRL + Shift + R (b) CTRL + D
font size available in Font Size tool on used for
(c) CTRL + Shift + M (d) Alt + K
formatting toolbar? (a) open the Print dialog box
Sol. (b)
(a) 8 AND 72 (b) 8 and 70 (b) Update the current Web page
(c) 8 and 82 (d) 10 and 72 (c) CLOSE THE CURRENT WINDOW
4. Which of the following fill effects can you use
Sol. (a) (d) None of these
for the slide background?
Sol. (c)
(a) Gradient (b) Texture
11. To select a sentence, click anywhere 23. If a word is typed that is not in MS Word’s
(c) Picture (d) All of above
on the sentence while holding the following dictionary, a wavy underline appears below the
Sol. (d)
key. word. What is the colour of the underline that
(a) Shift (b) CTRL appears in this situation?

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
5. A chart can be put as a part of the 16. Which shortcut is used to open the help Sol. (c)
presentation using window in PowerPoint?
(a) Insert -> Chart (a) F7 (b) F1 (c) F4 (d) F2 29. To insert decorative text __________
(b) Insert -> Pictures -> Chart Sol. (b) (a) SmartArt (b) Text box
(c) Edit -> Chart (c) Word art (d) None of these
(d) View -> Chart 17. In MS PowerPoint which shortcut key is Sol. (c)
Sol. (a) used to insert a new slide?
(a) Alt+I (b) Alt+M 30. Format background option can be found in
6. A ………. pre-designed document that already (c) Ctrl+M (d) Ctrl+S (a) insert tab (b) Home tab
has coordinating fonts, a layout, and a Sol. (c) (c) Design tab (d) Slide show
background. Sol. (c).
(a) Guide (b) Model 18. Which shortcut is used to justify the
(c) Ruler
Sol. (d)
(d) Template selected text in PowerPoint 2019?
(a) Ctrl+J (b) Ctrl+G
MS – EXCEL
(c) Ctrl+B (d) Ctrl+A
7. Which of the following are action you can Sol. (a) 1. What is the intersection of a column and a
assign to an action button or slide object? row on a worksheet called ?
(a) Run a macro (b) Play a sound 19. In Microsoft PowerPoint 2019 which key is (a) Column (b) Value
(c) Hyperlink (d) All of above used to open the animations tab? (c) Address (d) Cell
Sol. (d) (a) Ctrl+A (b) Alt+A Sol. (d)
(c) Ctrl+B (d) Ctrl+X
8. What is a trigger, in context of animations ? Sol. (b) 2. Which function in Excel tells how many
(a) An object to be inserted in the presentation numeric entries are there ?
(b) An action button that advances to the next 20. Special effects used to introduce slides in a (a) AVERAGE (b) COUNT
slide presentation are called (c) SUM (d) CHKNUM
(c) The name of a motion path (a) Present animations (b) Transitions Sol. (b)
(d) An item on the slide that performs an action (c) Custom animations (d) Effects
when clicked . Sol. (b) 3. In Excel, Columns are labeled as ___
Sol. (d) (a) A, B, C, etc (b) 1,2,3 etc
21. Press ___ to end a presentation. (c) A1, A2, etc. (d) $A$1, $A$2, etc.
9. Which of the following is the default page (a) Tab (b) Esc (c) P (d) E Sol. (a)
setup orientation for slides in PowerPoint ? Sol. (b)
(a) Vertical (b) Portrait 4. How many sheets are there, by default, when
(c) Landscape (d) Horizontal 22. What is the default PowerPoint standard we create a new Excel file ?
Sol. (c) layout? (a) 1 (b) 3 (c) 5 (d) 10
(a) Blank (b) Title slide Sol. (b)
10. Which option allows you to select line, (c) Title only (d) Comparison
curve, freeform or scribble tools? Sol. (b) 5. What is the total number of rows in Ms
(a) Draw custom path (b) Create effect excel?
(c) Insert motion path (d) All of the above 23. Which PowerPoint feature allows the user (a) 16,384 (b) 1,048,576
Sol. (a) to create a simple presentation quickly _______ (c) 1,035,360 (d) 65,556
? Sol. (b)
11. To add a special visual or sound effect to (a) AutoContent Wizard (b) Transition Wizard
text or an object is called____________. (c) Chart Wizard (d) Animations 6. The name box
(a) Animation. (b) Transition Sol. (a) (a) Shows the location of the previously active
(c) Both of these (d) None of these cell
Sol. (c) 24. Which tab is not available on left panel (b) Appears to the left of the formula bar
when you open a presentation? (c) Appears below the status bar
12. Press ___ to start presentation from the (a) Outline (b) Slides (d) Appears below the menu bar
beginning. (c) Notes (d) All of above Sol. (b)
(a) F5 (b) F6 (c) F7 (d) F8 Sol. (c)
Sol. (a) 7. In a worksheet you can select
25. Want your logo in the same position on (a) The entire worksheet (b) Rows
13. The minimum zoom size in MS PowerPoint every slide, automatically? Insert it on the (c) Columns (d) All of the above
is ____ (a) Handout master (b) Notes master Sol. (d)
(a) 0 (b) 10 (c) 30 (d) 100 (c) Slide master (d) All of the above
Sol. (b) Sol. (c) 8. MS Excel function, ISOWEEKNUM(date)
returns
14. _________ slide background option in 26. ___________ Open the Design tab and (a) ISO week number of the year for a given
PowerPoint lets you want to select a uniform apply themes and customize slides. date
pattern that gives the impression that the slide (a) ALT + G (b) ALT + A (b) Gives the 1ST of the date
is displayed on a material such as cloth or (c) ALT + R (d) ALT + S (c) geographical location of the equator on the
stone. Sol. (a) given date
(a) Solid (b) Clipart (d) current time in Indian Standard Office for
(c) Pattern (d) Gradient 27. _______ Delete one character to the left. the given date
Sol. (c) (a) Backspace (b) Ctrl+Backspace Sol. (a)
(c) Delete (d) Ctrl+Delete
15. In which of the following presentation views Sol. (a) 9. Which key combination is used to hide the
allows you to see thumbnails of all the slides in selected columns?
your presentation to easily rearrange them? 28. What is a motion path? (a) Alt + Shift + Down arrow (b) CTRL + 0
(a) Normal view (b) Box view (a) A type of animation entrance effect (c) Alt + Enter + K (d) CTRL + ALT + M
(c) Notes page view (d) Slide sorter view (b) A method of advancing slides Sol. (b)
Sol. (d) (c) A method of moving items on a slide
(d) All of the above

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
10. What is the default alignment of numbers
and text in excel? 22. _______ are used to add a note or explain a 8. The size of Yes No field is always
(a) Both to the left formula in a cell. (a) 1 bit (b) 1 byte
(b) Both to the right (a) Excel formula (b) Excel comments (c) 1 character (d) 1 GB
(c) Number to left and text to right (c) Excel sheet (d) None of these. Sol. (a)
(d) Number to right and text to left Sol. (b)
Sol. (d) 9. This key uniquely identifies each record
23. ________ appear at the bottom of the (a) primary key (b) key record
11. What symbol is used before beginning of Excel window. (c) unique key (d) field name
each formula in MS Excel? (a) Title bar (b) Formula bar Sol. (a)
(a) Percentage (%) (b) Equal to (=) (c) Work sheet tabs (d) Name box
(c) Dollar ($) (d) Ampersand (&) Sol. (c) 10. How can you define a field so that when
Sol. (b) entering data for that field it will display **
24. Another name for a pre-programmed instead of actual typed text
12. How do you display current date only in MS formula in Excel is (a) Input mask
Excel? (a) Cell (b) Graph (b) Validation Rule
(a) Date () (b) Today () (c) Function (d) Range (c) Indexed
(c) Now () (d) Time () Sol. (c) (d) IME Mode
Sol. (b) Sol. (b)
25. This function merges or joins several text
13. What does COUNTA () function do? strings into one text string. 11. Which field type can store photos?
(a) Counts cells having alphabets (a) LEN (b) CONCATENATE (a) Hyperlink
(b) Counts empty cells (c) SUM (d) MAX (b) OLE
(c) Counts cells having number Sol. (b) (c) Both of these can be used
(d) Counts non-empty cells (d) Access tables can’t store photos
Sol. (d) MS – ACCESS Sol. (b)

14. What is the short cut key to highlight the 12. The task of arranging data in order is called
entire column? 1. A database can be best described as (a) Searching (b) Sorting
(a) Ctrl + C (b) Ctrl + Enter (a) Organized collection of data (c) Ordering (d) Shorting
(c) Ctrl + Page Up (d) Ctrl + Space Bar (b) Useful presentation of data Sol. (b)
Sol. (d) (c) Graphical representation of data
(d) All of above 13. Which of the following database object
15. __________ is used to Hide the selected Sol. (a) produces the final result to present?
columns. (a) Tables (b) Reports
(a) Ctrl+0 (b) Alt+M 2. Microsoft Access is a (c) Queries (d) None of the above
(c) Ctrl+9 (d) none of these. (a) RDBMS (b) OODBMS Sol. (b)
Sol. (a) (c) ORDBMS (d) Network database model
Sol. (a) 14. Old version of MS Access file extension is
16. The __ feature of ms excel quickly changed from .mdb to
completes a series of data. 3. What are the columns in a Microsoft Access (a) .mdc (b) .mfc (c) .net (d) .accdb
(a) Auto Filter (b) Auto Complete table called? Sol. (d)
(c) Auto Fill (d) Auto Sum (a) Rows (b) Records
Sol. (c) (c) Fields (d) Columns 15. Which of the following data types
Sol. (c) automatically generates a consecutive number?
17. In MS Excel, keyboard shortcut keys to (a) Autonumber (b) Memo
create a new workbook is _____ 4. What is a form in MS Access? (c) Number (d) Text
(a) Tab+N (b) Fn+N (a) It is a printed page where users will write Sol. (a)
(c) Alt+N (d) Ctrl+N their data to fill it up
Sol. (d) (b) It is an input screen designed to make the 16. In MS Access, Field Value may contain
vieing and entering data easier (a) Text (b) Date & Time
18. Open workbooks can easily be switched (c) This is an important part of database used (c) Picture (d) All of the Above
using _____ by analysts to draw conclusions Sol. (d)
(a) Ctrl+S (b) Alt+S (d) All of above
(c) Ctrl+Alt (d) Ctrl+Tab Sol. (b) 17. Which of the following expresses correct
Sol. (d) order?
5. Which of the following database object hold (a) Characters, Fields, Records, Tables, Files,
19. ________is the best alternative to MS Excel data? Databases
offered by Google Inc. (a) Forms (b) Reports (b) Characters, Fields, Records, Tables,
(a) Google Slides (b) Google Sheets (c) Queries (d) Tables Database, Files
(c) Google Files (d) Google Keep Sol. (d) (c) Databases, Tables, Files, Records, Field,
Sol. (b) Character
6. This data type allows alphanumeric (d) Files, Databases, Tables, Records, Fields,
20. A file that contains one or more worksheets characters and special symbols. Characters
to organize data is known as _______ (a) text (b) memo Sol. (a)
(a) Workbook (b) Excelbook (c) auto number (d) None of the above
(c) Datasheet (d) Spreadsheet Sol. (a) 18. A subset of characters within a data field is
Sol. (b) known as
7. Which of the following is not a database (a) Byte (b) File
21. __________is NOT a Function in Microsoft object? (c) Record (d) Data string
Excel spreadsheets. (a) Tables (b) Queries Sol. (d)
(a) HYPERLINK (b) COUNTIF (c) Relationships (d) Reports
(c) MIN (d) AVG Sol. (c) 19. Press _____ to quit MS Access.
Sol. (d) (a) Tab +F4 (b) Esc+ W

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(c) Ctrl +F4 (d) Alt+F4 4. expanded reach of governance (a) G2G (b) G2B (c) G2C (d) G2E
Sol. (d) (a) 1, 2 and 3 only (b) 1, 2 and 4 only Sol. (c)
(c) 3 and 4 only (d) 1, 2, 3 and 4
20. The checking operation performed on input Sol. (d) 21. AEPS stands for-
data is called the (a) Aadhar Enabled Payment system
(a) Control of data (b) Validation of data 9. Which of the following mobile payment (b) Aadhar Enabled Penalty system
(c) Cross check (d) Verification of data application is developed by the National (c) Aadhar Enabled Payment school
Sol. (b) Payments Corporation of India based on UPI? (d) None of these
(a) MYGOV (b) BHIM Sol. (a)
ROLE OF IT IN (c) UMANG (d) PhonePe
Sol. (b) 22. _____________ is a technology-driven
GOVERNANCE platform that would provide people with the
10. Which of the following is the part of the opportunity to contribute towards good
four main types for e-commerce? governance.
1. What is the full form of IT?
(a) B2B (b) B2C (a) MyGov. (b) E-kranti
(a) Interest Tracking
(c) C2B (d) All of the Above (c) M-governance (d) None of these.
(b) Information Technic
Sol. (d) Sol. (a)
(c) Information Technology
(d) Internet technology
11. ………………is any transaction, involving the 23. Full form of UMANG is:-
Sol. (c)
transfer or rights to use goods and services, (a) Unified Mobile Application for New-age
which is initiated and or completed by using Governance
2. Which of the following is not a feature of
mobile access to computer mediated networks (b) Unified Mobile Application for New-age
smart governance?
with the help of an electronic device. Government
(a) Transparent (b) responsive
(a) Mobile Commerce (b) e-commerce (c) Unique Mobile Application for New-age
(c) accountable (d) inaccessible
(c) both of these (d) none of these Governance
Sol. (d)
Sol. (a) (d) Unified Mobile Application for New
Governance
3. ___________ e implies government
12. Which one is disadvantage of E- Sol. (a)
functioning with the application of ICT
governance?
(Information and Communications Technology).
(a) Real time update (b) Cost reduction 24. Which is not an advantage of e-
(a) E- technology (b) E- governance
(c) Accessibility (d) Digital divide governance?
(c) E- admin (d) None of these
Sol. (d) (a) Increased access to information
Sol. (c)
(b) Convenience
13. When was digital india program launched? (c) Improved Customer Service
4. National E-governance plan was established
(a) 02 july 2006 (b) 01 july 2005 (d) None of these
in ______ ?
(c) 01 july 2015 (d) 15 july 2005 Sol. (d)
(a) 18 june 2006 (b) 18 july 2008
Sol. (c)
(c) 18 may 2003 (d) 18 may 2006
25. Full form of CSC?
Sol. (d)
14. Digital india has ________ pillers. (a) Common Services Centers
(a) 12 (b) 15 (c) 9 (d) 10 (b) Customer Services Center
5. E-commerce involves buying and selling of:
Sol. (c) (c) Common Services Customer
(a) International goods
(d) None of these.
(b) Electronic goods
15. Which of the following is/are pillar of digital Sol. (a)
(c) Products related to computers
India Program?
(d) Products and services over the Internet
Sol. (d)
(a) Broadband Highways
(b) Public Internet Access Programme
IMPORTANT MCQS
(c) eKranti - Electronic delivery of services
6. Which of the following is related to the 1. Every device on the Internet has a
(d) All of above
National Super Computing Mission of the unique______ address (also called an “Internet
Sol. (d)
Government of India? address”) that identifies it in the same way that
(a) Param 8000 (b) Param 10000 a street address identifies the location of a
16. First Digital state in India? house.
(c) Param Dhavak (d) Param Shivay
(a) Delhi (b) Mumbai
Sol. (d) (a) DH (b) DA (c) IP (d) IA
(c) Kerala (d) Banglore
Sol. (c)
Sol. (c)
7. Regarding E-governance, which of the
following statements is/are correct? 2. To send another station a message, the main
17. How many types of e-governance are
(A) Decreasing transparency is an ICT enabled thing a user has to know is
there?
advantage of E-Governance. (a) how the network works
(a) 4 (b) 5 (c) 6 (d) 7
(B) E-governance is related to the (b) the other station’s address
Sol. (a) (c) whether the network is packet-switched or
implementation of ICT in government processes
and functions. circuit switched
18. Interaction between the government and
(C) Common Service Centres (CSC’s) help in (d) whether this is a voice or data network
the citizens is ___.
providing and using E-Governance related Sol. (b)
(a) G2G (b) G2B (c) G2C (d) G2E
services.
Sol. (c)
Choose the correct option: 3. Which of the following is the extension of
(a) (A), (B) and (C) (b) (B) and (C) only Notepad?
19. What is G2G in e-governance?
(c) (B) and (C) only (d) (A) and (B) only (a).txt (b).xls (c).ppt (d).bmp
(a) Government to Governor
Sol. (c) Sol. (a)
(b) Government to Government
(c) Government to guide
8. Which of the following are the benefits of e- 4. When you save a presentation,(a) all slides in
(d) Government to goal
governance system? a presentation are saved in the same file
Sol. (b)
1. Simplicity, efficiency and accountability (b) two files are created; one for graphics and
2. Quality service to citizens one for content
20. What type of interaction are Aadhar,
3. Better access to information (c) a file is created for each slide
UMANG ?

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(d) a file is created for each animation or 16. A characteristic of a file server is which of (c) Data reliability (d) Data consistency
graphic the following? Sol. (b)
Sol. (a) (a) Manages file operations and is shared on a
network 27. A(n) —— is a private corporate network,
5. Bringing data from a word processing (b) Manages file operations and is limited to used exclusively by company employees.
program into a database program is known as: one PC (a) Internet (b) local area network
(a) exporting (b) batch processing (c) Acts as fat client and is shared on a network (c) peer-to-peer (d) intranet
(c) importing (d) mining (d) Acts as fat client and is limited to one PC Sol. (d)
Sol. (c) Sol. (a)
28. Fullform of ALGOL is
6. Storing same data in many places is called 17. Which key is used in combination with (a) Algorithmic language (b) Arithmatic Logic
(a) iteration (b) concurrency another key to perform a specific task ? (c) Algorithm Logica (d) None of these
(c) redundancy (d) enumeration (a) function (b) space bar Sol. (b)
Sol. (c) (c) arrow (d) control
Sol. (d) 29. ISDN stands for __________
7. _________ servers store and manages files (a) Integrated Services Digital Net
for network users. 18. The pattern of printed lines on most (b) Integrated Services Digital Network
(a) Authentication (b) Main products are called . (c) Internet Services Digital Network
(c) Web (d) File (a) prices (b) OCR (d) Integrated System Digital Network
Sol. (d) (c) scanners (d) barcodes Sol. (b)
Sol. (d)
8. Which of the following uses a handheld 30. BASIC is a computer programming language.
operating system ? 19. Most mail programmes automatically It Stands for ____________.
(a) A super computer (b) A personal computer complete the following two parts in an e-mail? (a) Beginners All-purpose Symbolic Instruction
(c) A laptop (d) A PDA (a) From : and Body: (b) From: and Date: Code.
Sol. (d) (c) From: and To: (d) From and Subject: (b) Basic All-purpose Symbolic Instruction Code
Sol. (b) (c) Beginners All-purpose System Instruction
9. To display the contents of a folder in Code .
Windows Explorer you should– 20. The number of pixels displayed on a screen (d) Beginners All-purpose Symbolic Instruction
(a) click on it (b) collapse it is known as the screen– Character .
(c) name it (d) give it a password (a) resolution (b) colour depth Sol. (a)
Sol. (a) (c) refresh rate (d) viewing size
Sol. (a) 31. What is the full form of ‘MAN’?
10. …………….. devices convert human- (a) Man Area Network
understandable data and programs into a form 21 . Word processing , spreadsheet , and photo- (b) Meter Area Network
that the computer can process. editing are example of – (c) Metropolitan Area Network
(a) Printing (b) Output (a) application software (d) Manage Area Network
(c) Solid state (d) Input (b) system software Sol. (c)
Sol. (d) (c) operating system software
(d) platform software 32. What is the term used to denote the
11. The software that is used to create text- Sol. (a) repetition of data in DBMS?
based documents are referred to as– (a) Repeating (b) Restrict
(a) DBMS (b) suites 22. If you wish to extend the length of the (c) Reappear (d) Redundancy
(c) spreadsheets (d) word Processors network without having the signal degrade, you Sol. (d)
Sol. (d) would use a —
(a) repeater (b) router 33. Raw, unprocessed facts, including text,
12. …………….. is a Windows utility program that (c) gateway (d) switch numbers, images, and sounds, are called
locates and eliminates unnecessary fragments Sol. (a) ______
and rearranges files and unused-disk space to (a) Applets (b) Data
optimize operations. 23. A—-------- is approximately a million bytes. (c) Metaware (d) Product
(a) Backup (b) Disk Cleanup (A) gigabyte (b) kilobyte Sol. (b)
(c) Disk Defragmenter (d) Restore (c) megabyte (d) terabyte
Sol. (c) Sol. (a) 34. Which of the following is necessary to track
computer, while connecting to Internet?
13. A (n) …………….. appearing on a web page 24. The time it takes a device to locate data and (a) System Number (b) Memory
opens another document when clicked. instructions and make them available to CPU is (c) IP (d) VP
(a) anchor (b) URL known as – Sol. (c)
(c) hyperlink (d) reference (a) clock speed (b) a processing cycle
Sol. (c) (c) CPU speed (d) access time 35. What is the maximum number, that each of
Sol. (d) the four parts of an IP Address can have?
14. Which of the following is used to write (a) 345 (b) 255 (c) 197 (d) 301
WebPages? 25. ——– controls the way in which the Sol. (b)
(a) HTML (b) Telnet computer system functions and provides a
(c) HTTP (d) URL means by which users are interact with the 36. Which of the following extension is used to
Sol. (a) computer. save image in the computer?
(a) The platform (a) .cmd (b) .xls (c) .vlc (d) .jpeg
15. The ALU and control unit of most of the (b) The operating system Sol. (d)
microcomputer are combined and (c) Application software
manufactured in a single silicon chip. What it is (d) The motherboard 37. SRAM retains data as long as power is
called? Sol. (b) provided to the memory chip and need not be
(a) ALU (b) Touchpad refreshed periodically. What does ‘S’
(c) Control Unit (d) Microprocessor 26. ——– means that the data contained in a represents?
Sol. (d) database is accurate and reliable. (a) Stagnant (b) Storage
(a) Data redundancy (b) Data integrity (c) Simple (d) Static

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
Sol. (d) Sol. (a) (a) FORTRAN (b) COBOL
(c) C (d) PROLOG
38. The computer’s capability of distinguishing 48. Which one of the following domain is used Sol. (d)
spoken words is called _________. by Non-Profit Organisation?
(a) Voice analysis (a) .com (b) .gov (c) .org (d) .edu 60. The most frequently used instructions of a
(b) Speech acknowledgment Sol. (c) computer program are likely to be fetched from
(c) Speech interpretation ______
(d) Voice recognition 49. A…………’s main purpose is to prohibit (a) Hard disk (b) ROM
Sol. (d) unauthorized access to your computer via the (c) RAM (d) Cache
Internet. Sol. (c)
39. A(n) -----system is a small, wireless (a) popup blocker (b) firewall
handheld computer that scans an item’s tag (c) spyware blocker (d) spam assassin 61. Which Unit is used to measure the speed of
and pulls up the current price (and any special Sol. (b) a printer?
offers) as you shop. (a) DPI (b) CPM
(a) PSS (b) POS 50. Which one is not a Necessary condition for (c) PPM (d) None of the Above
(c) Inventory (d) data mining deadlock? Sol. (c)
Sol. (a) (a) Non pre-emptive (b) Pre-emptive
(c) Partial allocation (d) Circular wait 62. The higher the resolution of a monitor, the
40. What happens when you click on Sol. (a) _________
insert>Picture>Clip Art (a) larger the pixels.
(a) It inserts a clipart picture into document 51. The point at which the flow of text in a (b) closer together the pixels.
(b) It lets you choose clipart to insert into document moves to the top of a new page– (c) further apart the pixels.
document (a) Page insert (b) Page break (d) less clear the screen is.
(c) It opens Clip Art taskbar (c) Page format (d) All of the above Sol. (b)
(d) It inserts symbols Sol. (b)
Sol. (b) 63. In laser printers, printing is achieved by
52. Main memory works in conjunction with deflecting laser beam on to __________ surface
41. _____ and _____ refers to the action of _________. of a drum.
clicking and holding down the mouse button (a) Special function cards (b) RAM (a) Magnetic (b) Electric
while moving the mouse and realign it (c) CPU (d) Intel (c) Photosensitive (d) None of the Above
(a) Drag, Click (b) Drop, Drag Sol. (c) Sol. (c)
(c) Drag, Drop (d) Click, Right Click
Sol. (c) 53. Two or more computers connected to each 64. Bar-code readers use light to read ______
other for sharing information form a ________. (a) UPCs (b) UPSs
42. A pixel is_____ (a) Router (b) Server (c) POSs (d) optical marks
(a) Picture element or dot on a screen (c) Network (d) Tunnel Sol. (a)
(b) Point of ink on a user printed paper Sol. (c)
(c) Point of ink on a inkjet printed page 65. Which of the following is an example for
(d) Light beam used in printing paper 54. What action is performed by pressing Ctrl + Character printer?
Sol. (a) E in MS-WORD? (a) Laser (b) Drum
(a) Exit Application (b) Select All (c) ink-jet (d) Daisy Wheel
43. The speed of Which Generation Computer (c) Clear All (d) Align Center Sol. (d)
was in Pico Seconds? Sol. (d)
(a) First (b) Second 66. _________ is a device which recognises
(c) Fourth (d) Fifth 55. Which of the following is any malicious physical or behavioural traits of the individual.
Sol. (c) computer program which is used to hack into a (a) Smart Card Reader
computer by misleading users of its true intent? (b) Optical Character Reader(OCR)
44. Which Storage devices is used in Fourth (a) Worm (b) Spyware (c) Optical Mark Reader(OCR)
Generation Computer? (c) Trojan horse (d) Keylogger (d) Biometric Sensor
(a) Magnetic drum Sol. (c) Sol. (d)
(b) Magnetic core technology
(c) Semiconductor memory 56. First Generation computers used ______ for 67. The toner or ink in a Laser printer is
(d) Primary Storage medium Circuitry and ________ for memory ________ .
Sol. (c) (a) Transistor and Magnetic Core (a) dry (b) wet
(b) IC and Magnetic Memory (c) Either (A) or (B) (d) None of the Above
45. When we run program in HTML coding, (c) Vacuum tubes and Magnetic drum Sol. (a)
……..is used as backend and……….works as (d) IC and Magnetic Core
frontend. Sol. (c) 68. ________ is the process of dividing the disk
(a) Notepad, Internet Explorer into tracks and sectors.
(b) Notepad, MSN messenger 57. FLOPS stands for______ (a) Formatting (b) Tracking
(c) MS Word, Internet Explorer (a) Floating Point Operation Per Second (c) Allotting (d) None of the Above
(d) Both (a) and (c) (b) File Processing Operation Per Second Sol. (a)
Sol. (a) (c) Floating Processing Operation Per Second
(d) File Loading Operation Per Second 69. Speed of hard disk is measured in ____
46. The rate at which data is written to disk or Sol. (a) (a) RRP (b) RPM (c) PPM (d) RMP
read from disk is called as ____ Sol. (b)
(a) Data Transfer rate (b) Track 58. A _______ terminal can display images as
(c) Sector (d) Hard disk well as text. 70. In which language UNIX is written?
Sol. (a) (a) text (b) dumb (a) C++ (b) C (c) JAVA (d) Python
(c) graphical (d) None of the Above Sol. (c)
47. The Characteristics of any entity are called it Sol. (c)
as ________ 71. Which of the following is not true about
(a) Attributes (b) Relationship 59. Which language is used for Artificial Unix?
(c) Entity set (d) Information Intelligence (AI)? (a) UNIX was not written in ‘C’ language

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(b) Linux is also known as a version of UNIX (a) editing (b) number 92. Which of the following is not an external
(c) A user can run multiple programs at the (a) locked (d) docked threat to a computer or a computer network
same time; hence UNIX is called a multitasking Sol. (b) (a) Ignorance (b) Trojan horses
environment (c) Adware (d) Crackers
(d) Many people can use a UNIX based 82. A program embedded in a semiconductor Sol. (a)
computer at the same time; hence UNIX is chip during their manufacture is called
called as a multiuser system (a) humanware (b) firmware 93. The following is true for Auxiliary Storage–
Sol. (a) (c) liveware (d) hardware (a) It has an operating speed far slower than
Sol. (b) that of the primary storage.
72. Computer menu is a collection of (b) It has an operating speed faster than that of
(a) COMMANDS (b) ORDERS 83. Which out of the following is not a DBMS the primary storage.
(c) INSTRUCTIONS (d) ICONS software? (c) It has an operating speed equivalent than
Sol. (a) (a) dBASE (b) FOXPRO that of the primary storage.
(c) ORACLE (d) Data base 2000 (d) All of the above
73. Computer mouse event is Sol. (d) Sol. (a)
(a) LEFT CLICK (b) RIGHT CLICK
(c) DOUBLE CLICK (d) ALL OF ABOVE 84. Ctrl, shift and alt are called __________ 94. ALGOL is the
Sol. (d) keys. (a) High-level language (b) Low level language
(a) adjustment (b) function (c) Machine language (d) All of the above
74. Virus which executes when computer (c) modifier (d) alphanumeric Sol. (a)
starts? Sol. (c)
(a) MACRO (b) FILE INFECTOR 95. What type of technology allows you to
(c) BOOT SECTOR (d) MEMORY RESIDENT 85. In Windows operating system these are verbally speak with someone over the Internet?
Sol. (c) small pictures that represent files, folders, (a) Wiki (b) Ephone
programs, and other items. Each one is used to (c) Social network (d) VoIP
75. Computer can be linked to the internet make the computer do something. Sol. (d)
through ______. (a) Sidebar (b) Icons
(a) Phone line modem (b) DSL (c) Taskbar (d) None of these 96. Which memory appears to exist as main
(c) cable modem (d) All of these. Sol. (b) storage although most of it is supported by data
Sol. (d) held in secondary storage?
86. The __________ of software contains lists (a) Core memory (b) Virtual memory
78. What is Cyber Security? of commands and options. (c) RAM (d) Dynamic memory
(a) Cyber Security provides security against (a) menu bar (b) title bar Sol. (b)
malware (c) formula bar (d) tool bar
(b) Cyber Security provides security against Sol. (a) 97. A __________ represents approximately
cyber-terrorists one billion memory location.
(c) Cyber Security protects a system from cyber 87. The term “user interface” refers to (a) Kilobyte (b) Megabyte
attacks (a) what the user sees on the screen and how (c) Gigabyte (d) Terabyte
(d) All of the mentioned they can interact with it. Sol. (c)
Sol. (d) (b) how the operating system responds to user
commands. 98. Which feature helps to search the text
77. Who is the father of computer security? (c) the means by which the user interacts with through reference material such as dictionaries,
(a) August Kerckhoffs (b) Bob Thomas the peripheral devices on the computer. encyclopaedias and translation services?
(c) Robert (d) Charles (d) All of these (a) Translation (b) Research
Sol. (a) Sol. (a) (c) Find (d) Font
Sol. (b)
78. Radha receives an email claiming that her 88. What is the main folder on a storage device
credit card account is about to be suspended called? 99. Which keystroke will take you at the
unless she emails her credit card details and (a) Platform (b) Interface beginning or the end of a long document?
personal identification number (PIN) (c) Root Directory (d) Home Page (a) Ctrl + PageUp and Ctrl + PageDown
immediately. What is this an example of? Sol. (c) (b) Shift + Home and Shift + End
(a) Spamming (b) Phishing (c) Ctrl + Home and Ctrl + End
(c) Virus (d) Scanning 89. What was the name of program Robert (d) The only way is by using the right scroll bar
Sol. (b) Thomas created? Sol. (c)
(a) Virus (b) Wireshark
79. Which of the following best describes (c) Nessus (d) Creeper 100. Which of the following does not exist in
uploading information? Sol. (d) taskbar?
(a) Sorting data on a disk drive (a) Quick Launch (b) Start Menu
(b) Sending information to a host computer 90. ISPs stands for? (c) My Documents (d) Address bar
(c) Receiving information from a host computer (a) Intranet service providers Sol. (c)
(d) Sorting data on a hard drive (b) Internet service providers
Sol. (b) (c) interneted service providers 101. Which of the following is a process of
(d) Information service provider translates the IP addresses of computers in a
80. Software programs that allow you to legally Sol. (b) local network to a single IP address?
copy files and give them away at no cost are (a) Gateway (b) NAT
called which of the following? 91. What is Trojan-Horse (c) Packet filtering (d) Spooling
(a) Probe ware (b) Timeshare (a) Are hacker programs that do not show up on Sol. (d)
(c) Shareware (d) Public domain the system
Sol. (d) (b) Are legitimate programs that allow 102. What is the term used for measurement of
unauthorized access other?
81. In addition to the basic typing keys, desktop (c) Really do not usually work (a) data per unit (b) bits per second
and note book computer keyboards include (d) Usually are immediately discovered (c) bits per hour (d) ratio per bit
a(n) ........... keypad to efficiently move the Sol. (b) Sol. (b)
screen based insertion point

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
103. Which of the following is the fastest media tablets, smartphones and other devices, such 11. Who among the following pioneered Binary
of data transfer? as printers. Logic and Arithmetic in Computers
(a) Co-axial Cable (b) Untwisted Wire Programming?
(c) Telephone Lines (d) Fiber Optic 5. In the world of Computers, what is ‘Ubuntu’? (a) Noam Chomsky (b) Leslie Lamport
Sol. (d) (a) A firewell developed by Microsoft (c) John Backus (d) Claude Shannon
(b) Open Source Linux Operating System Sol. (d). Claude Shannon not only pioneered
104. Different components on the motherboard (c) An ERP system from SAP binary logic and arithmetic, he invented a
of a PC unit are linked together by sets of (d) Latest financial software package by Infosys whole new subject area information theory and
parallel electrical conducting lines. What are Sol. (b) Ubuntu is an open-source operating still had time to have fun with computer chess
these lines called? system (OS) based on the Debian GNU/Linux and Theseus, the amazing maze running relay
(a) Conductors (b) Buses distribution. Ubuntu is primarily designed to be mouse.
(c) Connectors (d) Consecutives used on personal computers, although a server
Sol. (b) edition does also exist. Ubuntu is an African 12. Desktop Computers, Laptop Computers,
word that literally means "humanity to others." tablets and smartphones are different types of
105. The blank white area near the edges of ________.
every page in a word document is known as a 6. ‘Pivot Table’ is a feature of which of the (a) Supercomputers (b) Mainframe Computers
________. following softwares? (c) Microcomputers (d) Minicomputers
(a) cut mark (b) margin (a) Microsoft Excel (b) Microsoft Word Sol. (c). Desktop computers, laptops, personal
(c) new area (d) gutter (c) Microsoft Access (d) Microsoft Powerpoint digital assistants (PDA), tablets & smartphones
Sol. (b) Sol. (a) ‘Pivot Table’ is a feature of Microsoft are all types of microcomputers. The micro-
Excel. A pivot table is a data summarization tool computers are widely used & the fastest
PREVIOUS YEAR SSC that is used in the context of data processing.
Pivot tables are used to summarize, sort,
growing computers. These computers are the
cheapest among the other three types of
MCQ’S reorganize, group, count, total or average data computers.
stored in a database. It allows its users to
transform columns into rows and rows into 13. ________ is the smallest unit of data in a
1. AIX is the operating system of which columns. It allows grouping by any data field. computer.
company? (a) Gigabyte (b) Bit
(a) Apple (b) Unisys 7. Which of the following is NOT one of the (c) Byte (d) Terabyte
(c) IBM (d) Microsoft tools of Robotics Process Automation? Sol. (b). Bit is the smallest unit of data in
Sol.(c). AIX (Advanced Interactive executive) is (a) Blue Prism (b) Ui Path a computer.
“an open operating system from IBM that is (c) Automation Anywhere (d) Power Center 8 bit = 1 byte
based on a version of UNIX. AIX/ESA was Sol. (d). Power center is not the tool of 1024 byte = 1 Kilobyte
designed for IBM's System/390 or large server RPA. Others are popular tools for RPA. 1024 Kilobyte = 1 Megabyte
hardware platform. 1024 Megabyte = Gigabyte
8. A database used by Microsoft Windows for 1024 Gigabytes = 1 Terabyte
2. In which year was Google incorporated as a storing configuration information is known as:
private company? (a) Registry (b) Record 14. In computing, ________ is a network
(a) 2000 (b) 2005 (c) Cookie (d) Cache security system that monitors and controls
(c) 2002 (d) 1998 Sol. (a). The system registry is one of the most incoming and outgoing network traffic based on
Sol. (d). Google is incorporated, September 4, important parts of a Windows-based computer predetermined security rules.
1998. Google was incorporated as a privately- system. Not to be tampered with lightly, the (a) cookie (b) spyware
held company on September 4, 1998, by registry is a system-defined database used by (c) spam (d) firewall
founders Larry Page and Sergey Brin. the Windows operating system to store Sol. (d). A Firewall is a network security device
configuration information. that monitors and filters incoming and outgoing
3. A region of computer memory where network traffic based on an organization's
frequently accessed data can be stored for 9. Who among the following invented the previously established security policies. At its
rapid access is called:- Computer language, COBOL? most basic, a firewall is essentially the barrier
(a) Cookie (b) Plug-in (a) Grace Murray Hopper (b) John McCarthy that sits between a private internal network
(c) Token (d) Cache (c) Guido van Rossum (d) Brendan Eich and the public Internet.
Sol. (d). A region of computer memory where Sol. (a). COBOL was designed in 1959 by
frequently accessed data can be stored for CODASYL and was partly based on previous 15. Who among the following invented the
rapid access is called Cache. Cache is a programming language design work by Grace World Wide Web (www) in 1989?
collection of data duplicating original values Hopper, commonly referred to as "the (a) Bill Gates (b) Steve Wozniak
stored elsewhere or computed earlier, where (grand)mother of COBOL". It was created as (c) Tim Berners-Lee (d) Charles Babbage
the original data is expensive to fetch (owing to part of a US Department of Defense effort to Sol. (c). Tim Berners-Lee, a British scientist,
longer access time) or to compute, compared create a portable programming language for invented the World Wide Web (WWW) in 1989,
to the cost of reading the cache. In other data processing. while working at CERN. The web was originally
words, a cache is a temporary storage area conceived and developed to meet the demand
where frequently accessed data can be stored 10. Second Generation computers can be for automated information-sharing between
for rapid access. characterized largely by their use scientists in universities and institutes around
of : the world.
4. In computer terminology, what is the full (a) Integrated Circuits (b) Vacuum Tubes
form of RAM? (c) Microprocessors (d) Transistors 16. Which of the following is NOT an anti-virus
(a) Random Access Memory Sol. (d). Generations of computers are software?
(b) Repeated Access Memory characterized by their technology. First (a) Avast (b) Linux
(c) Rapid Access Memory generation digital computers, developed (c) Norton (d) Kaspersky
(d) Regular Access Memory mostly in the U.S. after World War II, used Sol. (b). Linux is not an antivirus Software. It is
Sol. (a). RAM is an acronym for random access vacuum tubes and were enormous. The second an open source operating software. Rest all
memory, a type of computer memory that can generation, introduced in 1960, used others are antivirus software for Microsoft
be accessed randomly; that is, any byte of transistors and were the first successful Windows, macOS, Android and iOS.
memory can be accessed without touching the commercial computers.
preceding bytes. RAM is found in servers, PCs, 17. Which of the following is a supercomputer
developed by India?

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(a) Param Yuva 2 (b) Onshape Sol. (d). An e-commerce website is a site that
(c) Venngage (d) Pixir sells products and services through means of 33. The speed of the Central Processing Unit
Sol. (a). Paramyuva 2 is a supercomputer data transfer and funds over the internet. (CPU) is measured in_________, which
developed by India. It has a memory of represents a CPU cycle.
14144GB and is one the oldest supercomputers 25. The first barcode system was developed (a) Gigabyte (GB) (b) Hertz (Hz)
of India. by:- (c) Terabyte (TB) (d) Kilobyte (KB)
(a) Norman Joseph Woodland Sol. (b). The speed of the Central Processing
18. In the context of digital computer, which of (b) John Mc Carthy Unit (CPU) is measured in Hertz (Hz), which
the following pairs of digits is referred to as (c) John Barger represents a CPU cycle.
binary code? (d) David Bradley
(a) 3 and 4 (b) 0 and 1 Sol. (a). In 1952, Norman Joseph Woodland 34. Which unit of the computer is considered as
(c) 2 and 3 (d) 1 and 2 developed the first barcode system. the brain of the computer?
Sol. (b). In the context of digital computer, 0 (a) Memory unit (b) Input unit
and 1 is referred to as binary code. 26. 'Nibble' in computer terminology is also (c) CPU (d) Output unit
called _________. Sol. (c). Central Processing Unit (CPU) is
19. In the field of information and (a) Bit (b) Half bit considered as the brain of the computer
communication technology, what is the (c) Half byte (d) Byte because it contains all the circuitry needed to
full form of FDD? Sol. (c). Nibble is also called Half byte. process input, store data and output results.
(a) Folder Disk Drive (b) Floppy Disk Drive
(c) Folder Data Drive (d) Floppy Data Drive 27. Which company manufactured the first 35. Which of the following options correctly
Sol. (b). The full form of FDD in the field of microprocessor 4004? defines a firewall (in the context of computing)?
Information and Communication Technology is (a) ENOcean Private Company (a) It is the name of a software.
Floppy Disk Drive.It is a type of disk storage (b) NVIDIA Corporation (b) It is a hardware device.
composed of a disk of thin and flexible (c) PLX Devices (c) It is a combination of both software and
magnetic storage medium, sealed in a (d) INTEL Corporation hardware devices to permit or deny network
rectangular plastic enclosure lined with fabric Sol. (d). INTEL Corporation manufactured the transmission based on a set of rules.
that removes dust particles. Floppy disks are first microprocessor 4004. (d) It is a combination of software and
read and written by a Floppy Disk Drive (FDD). hardware-based devices to permit any and
28. Python is a _______. every network transmission.
20. In the context of digital computer, which of (a) high level language (b) assembly language Sol. (c). A firewall is a security device -computer
the following pairs of digits is referred to as (c) low level language (d) machine language hardware or software that can help protect
binary code? Sol. (a). Python is a high level language. your network by filtering traffic and blocking
(a) 3 and 4 (b) 0 and 1 outsiders from gaining unauthorized access to
(c) 2 and 3 (d) 1 and 2 29. Linux is ______. the private data on your computer.
Sol. (b). In computers all data is represented as (a) an interpreter
binary codes. That is, all data is represented as (b) an operating system 36. Which technology do third generation
strings of 0s and 1s. (c) an assembly language computers use?
(d) a high level language (a) Integrated circuits (b) Transistors
21. What is 'Roadeo'? Sol. (b). Linux is an operating system. (c) Microprocessors (d) Vacuum tubes
(a) A robot that cleans city roads Sol. (a) *First Generation Computers -
(b) A robot that fills potholes 30. In the context of memory size in computer Vacuum tube based .
(c) A robot that drives taxis data storage, one gigabyte is equal to how * Second Generation Computers -
(d) A robot that helps maintain traffic many megabytes? Transistor based .
Sol. (d). A Roadeo is a competitive driving event (a) 32 MB (b) 1012 MB *Third Generation Computers - Integrated
for motor vehicle drivers. Typically, drivers (c) 64 MB (d) 1024 MB Circuit based .
compete to pass through a variety of obstacles Sol. (d). In the context of memory size in * Fourth Generation Computers - VLSI
in the smallest amount of time, although the computer data storage, one gigabyte is Microprocessor based .
competitions may include other components, equal to 1024 MB.
such as a written test. 37. In the field of computing, what does VRML
31. A hard disk is an example of which type of stand for?
22. Which shortcut key is used for previewing data storage device? (a) Virtual Reality MarkUp Language
the page before printing? (a) Primary Storage (b) Secondary Storage (b) Visual Reality MarkUp Language
(a) CTRL + F6 (b) CTRL + F10 (c) Offline Storage (d) Tertiary Storage (c) Virtual Reality Machine Language
(c) CTRL + F2 (d) CTRL + F5 Sol. (b). Secondary storage devices are storage (d) Visual Reality Machine Language
Sol. (c). Ctrl + F2 is used for previewing the devices that operate alongside the computer’s Sol. (a). Virtual Reality MarkUp Language
page before printing. primary storage, RAM and cache memory. (VRML) is an open-standard programming
Examples include external hard drives, USB language created to design three-dimensional
23. Who designed the first analog computer in flash drives and tape drives. and Web-based models, textures and illusion.
India?
(a) Samarendra Kumar Mitra 32. Which of the following is an input device 38. Which function key is used for opening
(b) Deb Kumar Bose that utilises a light sensitive detector to select help?
(c) Subodh Chandra Das Gupta objects on a display screen? (a) F4 (b) F3
(d) Bimal Kumar Bhattacharyya (a) Light pen (c) F1 (d) F2
Sol. (a). Samarendra Kumar Mitra was an Indian (b) Barcode reader Sol. (c). F1 is used for opening help.
scientist and mathematician. He designed (c) Optical mark recognition (OMR)
India’s first computer in 1954 at Indian (d) Magnetic ink character recognition 39. In the field of computing, what does VGA
Statistical Institute, Calcutta. (MICR) stand for?
Sol. (a). A light pen is a computer input device (a) Visual Graphics Array
24. Which of the following is NOT an e- in the form of a light-sensitive wand used in (b) Video Graphics Array
commerce website? conjunction with a computer’s cathode-ray (c) Video Graphics Audio
(a) Uber (b) Swiggy tube display. It allows the user to point to (d) Visual Graphics Audio
(c) Flipkart (d) Google Maps displayed objects or draw on the screen in a Sol. (b). VGA stands for Video Graphics Array. It
similar way to a touchscreen but with greater is a high-resolution standard for displaying text,
positional accuracy. graphics and colors on computer monitors.

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(d) Program read-output memory sensors to detect a rotation of the ball about
40. In a computer, which unit is responsible for Sol. (c). PROM or Programmable read-only two axes. The user rolls the ball with the
processing data and is also called the electronic memory is a computer memory chip that can thumb, fingers or the palm of the hand to move
brain of the computer? be programmed once after it is created. Once a cursor.
(a) CPU (b) Hard Disk the PROM is programmed, the information
(c) RAM (d) Keyboard written is permanent and cannot be erased or 52. In the context of computing, a byte is equal
Sol. (a).Central Processing Unit is considered as deleted. to ______ bits.
the electronic brain of the computer. It consists (a) 4 (b) 16
of a Memory, Control Unit and Arithmetic Logic 45. Which function key displays the Print (c) 24 (d) 8
Unit. The CPU performs basic arithmetic, logic, Preview window in Microsoft Office? Sol. (d). In the context of computing, a byte is
controlling and input/output (I/O) operations (a) Alt+F2 (b) Alt+Ctrl+F2 equal to 8 bits.
specified by the instructions in the program. (c) Ctrl+F2 (d) Shift+F2
Sol. (c). Ctrl +F2 displays the Print Preview 53. Which of the following is a type of memory
41. The F7 key is commonly used in Microsoft window in Microsoft Office. and is similar to RAM? It is used by computers
programs such as Microsoft Word, Outlook, etc. to move data between the RAM and the CPU.
for:- 46. In which year did the Java Script (a) Hypertext Link (b) ROM
(a) opening help Programming language come into existence? (c) Cache (d) I Beam
(b) checking spellings and grammar (a) 2000 (b) 1990 (c) 1995 (d) 1999 Sol. (c). Cache Memory is a very high-speed
(c) searching content in various apps Sol. (c). JavaScript Programming language came memory and is used to speed up and
(d) renaming files and folders into existence in 1995. synchronize with high-speed CPU. It is an
Sol. (b). The F7 key is commonly used in extremely fast memory type that acts as a
Microsoft programs such as Microsoft Word, 47. Which of the following is a lever that can be buffer between RAM and the CPU. It holds
Outlook, etc. for checking spellings and moved in several directions to control the frequently requested data and instructions so
grammar. movement of an image on a computer monitor that they are immediately available to the
or similar display screen? CPU when needed.
42. In the field of computing, what does ENIAC (a) MIDI Devices (b) Optical Mark Reader
stand for? (c) Joystick (d) Visual Display Unit 54. Which of the following is a very high-speed
(a) Electronic Numerical Integrator and Sol. (c). Joystick is an input device consisting of semiconductor memory which can speed up
Computer a lever that can be moved in several directions the CPU?
(b) Electronic Numerical Integrated to control the movement of an image on a (a) Cache Memory (b) Main Memory
Advanced Computer computer monitor or similar display screen. (c) Secondary Memory (d) Primary Memory
(c) Electronic Numerals Integration and Sol. (a). Cache Memory is a very high-speed
Computing 48. Which of the following converts analogue memory and is used to speed up and
(d) Electronic Numbers Integration and information into digital form? synchronize with high-speed CPU.
Computer (a) Optical Mark Reading (b) Barcode reader
Sol. (a). ENIAC stands for Electronic Numerical (c) Digitizer (d) Gamepad 55. Which of the following consists of an
Integrator and Computer. It was the first Sol. (c). A digitizer is a machine that converts an electronic writing area and a special ‘pen’ that
programmable, electronic, general-purpose analog object, image or signal into a digital works with it?
digital computer. It was Turing-complete and (computer- readable) format. (a) Trackball (b) Plotters
able to solve a large class of numerical (c) Abacus (d) Graphics Tablet
problems through reprogramming. 49. In the context of computing, what is the full Sol. (d). A graphics tablet is a computer
form of URL? input device that enables a user to hand-draw
43. Which of the following statements about CHSL 14/10/2020 (Afternoon) images, animations and graphics, with a special
firewall (in the context of computing) is (a) Undistributed Resource Locator pen like stylus, similar to the way a person
INCORRECT? (b) Unified Resource Locator draws images with a pencil and paper.
(a) It permits network transmission based on a (c) Uniform Resource Locator
set of rules. (d) Uniform Region Locator 56. ______ is a small, portable flash memory
(b) It is a combination of both software and Sol. (c). A Uniform Resource Locator (URL) is a card that plugs into a computer’s USB port and
hardware devices. reference to a web resource that specifies its functions as a portable hard drive.
(c) It is frequently used to protect a computer location on a computer network and a (a) Flash drive (b) CD-RW
network from unauthorized. mechanism for retrieving it. (c) DVD-ROM (d) CD-ROM
(d) It is unable to permit legitimate Sol. (a) A USB flash drive is a plug and play
communication to pass. 50. Which of the following is used to receive portable storage device that uses flash
Sol. (d). In computing, a firewall is a network and send computer files over telephone lines? memory. A USB flash drive can be used in place
security system that monitors and controls (a) Modem (b) MICR device of a compact disc. When a user plugs the flash
incoming and outgoing network traffic based on (c) Floppy disk (d) Light pen memory device into the USB port, the
predetermined security rules. It establishes a Sol. (a). Modulator Demodulator (Modem) is a computer’s operating system recognizes the
barrier between a trusted network and an hardware component that allows a computer or device as a removable drive and assigns it a
untrusted network. Firewalls are categorized as another device, such as a router or switch, to drive letter.
a network-based or a host-based system. connect to the Internet. It converts or
Network-based firewalls can be positioned “modulates” an analog signal from a telephone 57. ______ is the fastest to read from and write
anywhere within a LAN or WAN. They are either or cable wire to digital data that a computer to than the other kinds of storage in computer.
a software appliance running on general can recognize. Similarly, it converts digital data (a) CD ROM (b) Floppy Disk
purpose hardware, a hardware appliance from a computer or other device into an analog (c) RAM (d) Hard Disk
running on special-purpose hardware, or a signal that can be sent over standard telephone Sol. (c). RAM (Random Access Memory) is a
virtual appliance running on a virtual host. lines. form of computer memory that can be read and
Host-based firewalls are deployed directly on changed in any order, typically used to store
the host itself to control network traffic or 51. Which of the following is an input device working data and machine code. A random-
other computing resources. used to enter motion data in computers or access memory device allows data items to be
other electronic devices? read or written in almost the same amount of
44. What is the full form of PROM? (a)Monitor (b)Trackball time irrespective of the physical location of
(a) Program read-only memory (c)Plotter (d)Joystick data inside the memory.
(b) Primary read-only memory Sol. (b). A trackball is a pointing input device. It
(c) Programmable read-only memory consists of a ball held by a socket containing

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
58. ______ is a diagrammatic representation of (a) Speaker (b) Printer 73. In which of the following countries was the
a program logic. (c) Scanner (d) Monitor first Electronic Numerical Integrator and
(a) Process (b) Flowchart Sol. (c). Scanner is an input device. Computer, the first programmable general
(c) Data (d) Legend purpose electronic digital computer,developed?
Sol. (b). A flowchart is simply a graphical 66. Which of the following is NOT a portable (a) United Kingdom (b) China
representation of steps. It shows steps in device? (c) Japan (d) USA
sequential order and is widely used in (a) iPods (b) Laptops Sol. (d). ENIAC was developed in the USA. It
presenting the flow of algorithms, workflow or (c) Desktop computers (d) Thumb drives was invented at the University of Pennsylvania
processes. A flowchart shows the steps as Sol. (c). A portable device is any device that can to calculate artillery firing tables for the United
boxes of various and their order by connecting be carried easily. Desktop computers are not States Army’s Ballistic Research Laboratory.
them with arrows. portable devices.
74. Trackball is which of the following devices?
59. Which of the following symbols must be 67. Transistors belong to which of the following (a) Input device (b) Touchpad
used before a formula in a Microsoft Excel generations of the computers? (c) Output device (d) Barcode reader
sheet? (a) First (b) Second Sol. (a) A trackball is a pointing input device. It
(a) = (b) & (c) $ (d) @ (c) Third (d) Fourth consists of a ball held by a socket containing
Sol. (a). ‘=’ must be used before a formula in a Sol. (b). *First Generation -Vacuum Tubes . sensors to detect a rotation of the ball about
Microsoft Excel sheet. *Second Generation - Transistors . two axes. The user rolls the ball with the
*Third Generation - Integrated Circuits . thumb, fingers or the palm of the hand to move
60. What is the full form of BASIC in context of *Fourth Generation – Microprocessors. a cursor.
the BASIC computer language?
(a) Beginner’s All-purpose Symbolic Input Code 68. Which of the following is not a softcopy 75. In Microsoft Office 2016, which shortcut key
(b) Beginner’s All-purpose Systematic devices? is used to open the Design tab?
Instruction Code (a) Plotter (b) Projector (a) Ctrl + A (b) Shift + F3
(c) Beginner’s All-purpose Symbolic Input- (c) Monitor (d) Speaker (c) Alt + G (d) Ctrl + K
output Code Sol. (a). Soft copy devices allow the viewing of Sol. (c). In Microsoft Office 2016, ‘Alt + G’ is
(d) Beginner’s All-purpose Symbolic Instruction information that can be rearranged, modified used to open the Design tab.
Code or corrected to suit your needs. Some examples
Sol. (d). BASIC stands for “Beginner’s All- of soft copy output devices are monitors, 76. Which type of computers is used to control
purpose Symbolic Instruction Code”. It is a projectors, video display terminals. Soft copy is air traffic and radar of national defence?
computer programming language that was an electronic display of digital information, (a) Personal computers
developed to provide a way for students to such as files viewed on the pc monitor. (b) Analogue computers
write simple computer programs. (c) Hybrid computers
69. In the context of computers, WORM is an (d) Digital computers
61. Third generation computers used: acronym of: Sol. (c). Hybrid computers exhibit features of
(a) vacuum tubes (b) integrated circuits (a) Write Once, Read Many analog computers and digital computers.
(c) Transistors (d) VLSI technique (b) Wireless Operating, Read Module Hybrid computers are used to control air traffic
Sol. (b). *First generation: Vacuum tube based. (c) Word Optical, Recognition Malware and radar of national defence.
*Second generation: Transistor based. (d) Word On, RAM Memory
*Third generation: Integrated circuit based. Sol. (a). WORM is an acronym for “Write Once, 77. ______ was a web browser developed by
* Fourth generation: VLSI microprocessor Read Many”. It is an optical storage technology the National Centre for Supercomputing
based. that allows a disc to be written only once but Application (NCSA).
* Fifth generation: ULSI microprocessor based. read an unlimited number of times. (a) Opera (b) Mosaic
(c) Navigator (d) Safari
62. ____ is the central server in computer 70. Who has developed the Automatically Sol. (b). Mosaic was a web browser developed
network which lets the concerned user utilize Programmable Tool (APT)? by the National Centre for Supercomputing
the storage capacity of the server. (a) Gary Kildall (b) Douglas T Ross Application(NCSA).
(a) Application Server (b) File Server (c) Ralph H Baer (d) Jonathan Fletcher
(c) Print Server (d) Web Server Sol. (b). Automatically Programmable Tool 78. How many function keys are present on a
Sol. (b). A file server is a central server in a (APT) has been developed by Douglas T Ross. It standard PC keyboard?
computer network that provides file systems or is a program which consists (a) 10 (b) 9 (c) 12 (d) 15
at least parts of a file system to connected instructions/statements which are used to Sol. (c). There are 12 function keys on a
clients. File servers therefore offer users a specify the path of the tool to follow for standard PC keyboard.
central storage place for files on internal data producing a given part.
media, which is accessible to all authorized 79. Which of the following pairs is NOT
clients. 71. 1 Petabyte (PB) = 1024_____. matched correctly?
(a) Zettabytes (b) Exabytes (a) Alt + E – Edit options in current program
63. Which of the following devices is NOT used (c) Terabytes (d) Gigabytes (b) Alt + Shift + D – Insert the current date
to enter data into a computer? Sol. (c). 1 Petabyte (PB) = 1024 Terabytes (TB). (c) Ctrl + K – Cut selected text
(a) Mouse (b) Keyboard (d) Ctrl + A – Select all text
(c) Scanner (d) Monitor 72. What does HLL stand for in computing? Sol. (c). Ctrl + X is used to cut selected text. Ctrl
Sol. (d). Monitor is an output device. (a) High Low Language + K is used to insert a hyperlink in MS word.
(b) Hyper Level Language
64. What is the shortcut key for the central (c) High Level List 80. Who has created LISP, the Programming
alignment of a line or text in MS Office (d) High Level Language Language for Artificial Intelligence?
software? Sol. (d) A High Level Language (HLL) is a (a) Grace Hopper (b) John McCarthy
(a) Ctrl+E (b) Ctrl+C programming language such as C, FORTRAN or (c) Charles Bachman (d) Leslie Lamport
(c) Ctrl+G (d) Ctrl+A PASCAL that enables a programmer to write Sol. (b.) John McCarthy has created LISP, the
Sol. (a). ‘Ctrl+E’ is the shortcut key for the programs that are more or less independent of Programming Language for Artificial
central alignment of a line or text in MS Office a particular type of computer. Such languages Intelligence.
software. are considered high-level because they are
close to human languages and further from 81. A computer on the Internet that uses HTTP
65. Which of the following is an input device of machine languages. protocol is known as:
a computer? (a) LAN (b) Web Server

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(c) WAP (d) WLAN action? 95. Chad Hurley and Steve Chen are computer
Sol. (b). A computer on the Internet that uses (a) Ctrl + U (b) Ctrl + Z innovators credited with co-founding ______.
HTTP protocol is known as Web Server. (c) Ctrl + C (d) Ctrl + N (a) Instagram (b) Facebook
Sol. (b) Ctrl + Z (c) WhatsApp (d) YouTube
82. Which of the following is an extension of a Sol. (d). Steve Chen, Chad Hurley, and Jawed
temporary file? 90. ______ is the easy way to check your Karim launched YouTube in February 2005 and
(a) .tnt (b) .tar favorite websites for updates without having to In October 2006, at a later time, YouTube was
(c) .tmp (d) .txt visit them all. SSC bought by Google for $1.65 billion.
Sol. (c). .tmp is an extension of a temporary file. (a) PDF (b) RSS
The full form of JPG or JPEG is Joint (c) HTML (d) URI 96. In which year was Microsoft’s Windows
Photographic Expert Group. PDF stands for Sol. (b). RSS (RDF Site Summary or Really operating system first introduced?
Portable Document Format. Simple Syndication) is a web feed that allows (a) 1985 (b) 1989 (c) 1991 (d) 1993
users and applications to access updates to Sol. (a) Microsoft introduced an operating
83. Which of the following is NOT an open- websites in a standardized, computer-readable environment named Windows on November
source operating system? format, is the easy way to check your favorite 20, 1985, as a graphical operating system shell
(a) Windows (b) Ubuntu websites for updates without having to visit for MS-DOS in response to the growing interest
(c) Linux (d) Drupal them all. Subscribing to RSS feeds can allow a in graphical user interfaces (GUIs).
Sol. (a). An Open-source Operating System is user to keep track of different websites in a
the Operating System in which source code is single news aggregator, which constantly 97. Which of the following is the core of an
visible publicly and editable. The generally monitors sites for new content, removing the operating system?
known Operating Systems like Microsoft’s need for the user to manually check them. (a) Kernel (b) Xenix
Windows, Apple’s iOS, and Mac OS, are closed (c) Device Driver (d) Ventura
Operating systems. 91. Which of the following is a pointing device Sol. (a). The kernel is a computer program at
used to move an object on the screen of a the core of a computer's operating system and
84. What do you call an event where a computer in any direction? has complete control over everything in the
computer becomes unresponsive due to either (a) Modem (b) Joystick system. It is the "portion of the operating
a program or the system itself becoming (c) Floptical (d) Server system code that is always resident in
unresponsive and no longer taking input? Sol. (b). The isotonic joystick is a handle stick memory", and facilitates interactions between
(a) Booting (b) Hanging which is a pointing device used to move an hardware and software components.
(c) Ejecting (d) Moving object on the screen of a computer in any
Sol. (b). Hanging. Booting is the process of direction where the user can freely change the 98. What kind of file has the extension .png?
starting a computer. position of the stick, with more or less constant (a) Document file (b) Video file
force. (c) Audio file (d) Image file
85. In the context of computers, what is Sol. (d). A PNG file is an image saved in the
Ubuntu? 92. Which type of malware is a program or Portable Network Graphic (PNG) format. It is
(a) An open-source operating system sponsored piece of code that is loaded onto a person's the most frequently used uncompressed raster
by Canonical Ltd. computer without his knowledge and runs image format on the internet, having the ability
(b) A search engine by Mozilla Foundation. against his wishes? to display transparent backgrounds.
(c) An anti-virus software by Microsoft. (a) adware (b) phishing
(d) An android-based search engine by (c) trojan horse (d) computer virus 99. In which year was the first-ever version of
Microsoft. Sol. (d). A computer virus is a type of computer Microsoft Word - Word 1.0 launched?
Sol. (a). Ubuntu is an open-source operating program that, when executed, replicates itself (a) 1985 (b) 1996 (c) 1992 (d) 1983
system sponsored by Canonical Ltd. by modifying other computer programs and Sol. (d). The first Word version, Word 1.0, was
inserting its own code. If this replication released in October 1983 for Xenix and MS-
86. A file with the ______ file extension is a succeeds, the affected areas are then said to be DOS. It was followed by four very similar
Word Open XML Macro-Enabled Document file. "infected" with a computer virus, a metaphor versions that were not very successful.
(a) .docm (b) .pdf derived from biological viruses.
(c) .docx (d) .org 100. JPEG is a commonly used method of lossy
Sol. (a). A file with the ‘.docm’ file extension is a 93. Which of the following languages is an compression for digital images. What is the full
Word Open XML Macro-Enabled Document example of a fourth-generation language in form of JPEG?
file. computer programming? (a) Jet Prints Editing Graphics
(a) ALGOL (b) SQL (b) Joint Photographic Experts Group
87. Which of the following is the output device (c) SNOBOL (d) Pascal (c) Jet Protocol Experts Group
of a computer? Sol. (b). The fourth-generation language is also (d) Joint Pages Enhanced Graphics
(a) Plotter (b) Pen drive called a non–procedural language/ 4GL. It Sol. (b). JPEG stands for “Joint Photographic
(c) Joystick (d) Scanner enables users to access the database. Experts Group”. It's a standard image format
Sol. (a). An output device is any piece of Examples: SQL, Foxpro, Focus, etc. Many for containing lossy and compressed image
computer hardware equipment that fourth-generation languages use Structured data. Despite the huge reduction in file size,
converts information into human-readable Query Language (SQL) as the basis for JPEG images maintain reasonable image
form. It can be text, graphics, tactile, audio, and operations. SQL was developed at IBM to quality.
video. Some of the output devices are Monitor, develop information stored in relational
Printer graphic Output devices, Plotters, databases. 101. Which of the following is a small piece of
Speakers, etc. software that uses computer networks and
94. LCD is a basic type of monitor. What is the security holes to replicate itself?
88. A ______ is an ordered list in which all full form of LCD? (a) Trojan horse (b) Application
insertions and deletions are made at one end. (a) Laser Crystal Display (c) Worm (d) Operating System
(a) front (b) rear (b) Liquid Crystal Diode Sol. (c). Worm is a small piece of Software that
(c) stack (d) queue (c) Light Component Device uses computer networks and security holes to
Sol. (c.) A stack is an ordered list in which all (d) Liquid Crystal Display replicate itself. A copy of the worm scans the
insertions and deletions are made at one end. Sol. (d) LCD is a basic type of monitor and the network for another machine that has a specific
full form of LCD is Liquid Crystal Display. It is a security hole. A Trojan horse is a type of
89. While working in MS Office software, which type of flat panel display which uses liquid malware that downloads onto a computer
of the following commands will you give on a crystals in its primary form of operation. disguised as a legitimate program.
US keyboard layout to undo the previous

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
102. Which of the following operating systems (a) Windows + C (b) Windows + M
guarantees a response within specified time 107. A ______ is a computer program that can (c) Windows + F (d) Windows + D
constraints? self-replicate and propagate over the network Sol. (d). Windows + D should be pressed in
(a) Time sharing operating system with or without human intervention and has order to minimize all programs on a computer
(b) Distributed operating system malicious intent. screen and display the desktop.
(c) Real-time operating system (a) kernel (b) virus
(d) Interactive operating system (c) trojan horse (d) worm 114. CorelDraw is an example of a/an:
Sol. (c). A real-time operating Sol. (d). A worm is a computer program that (a) database software
systemguarantees a response within specified can self-replicate and propagate over the (b) accounting software
time constraints. A real-time operating system network with or without human intervention (c) spreadsheet software
(RTOS) is an operating system(OS) intended to and has malicious intent. It often uses a (d) desktop publishing software
serve real-time applications that process data computer network to spread itself relying on Sol. (d). CorelDraw is an example of a desktop
as it comes in, typically without buffer delays. security failures on the target computer to publishing software. CorelDraw is developed by
Processing time requirements (including any OS access it. an Ottawa-based software company, allows
delay) are measured in tenths of seconds or users to do things like adding special effects
shorter increments of time. 108. A User Interface is the part of ______ that such as borders to images, in addition to
allows the user to enter and receive allowing for contrast adjustment, color
103. GIMP is a/an ______. information. balancing, and more.
(a) application software (a) computer network (b) operating system
(b) diagnostic utility program (c) computer hardware (d) data science 115. Which of the following is the full form of
(c) text editor Sol. (b). A User Interface is the part of the EBCDIC?
(d) operating system operating system that allows the user to enter (a) Extended Binary-Coded-Decimal Interchange
Sol. (a). GIMP stands for “GNU Image and receive information. An operating system Code
Manipulation Program”, a self-explanatory (OS) is system software that manages computer (b) Extended Binary-Control-Device Interchange
name for an application that processes digital hardware, software resources, and provides Code
graphics. GIMP is a free and open-source raster common services for computer programs. (c) Electronic Binary-Coded-Device Interchange
graphics editor used for image manipulation Popular Operating Systems include Microsoft Code
and image editing, free-form drawing, Windows, Mac OS X, and Linux. (d) Electronic Binary-Control-Decimal
transcoding between different image file Interchange Code
formats, and more specialized tasks. 109. Which of the following is an input device? Sol. (a). EBCDIC, in full extended binary-coded
(a) Speaker (b) Scanner decimal interchange code, data-encoding
104. A ______ is a software program that (c) Projector (d) Monitor system, developed by IBM and used mostly on
travels the web locating and indexing websites Sol. (b). An input device is a piece of equipment its computers, that uses a unique eight-bit
for search engines. used to provide data and control signals to an binary code for each number and alphabetic
(a) bug (b) spider information processing system such as a character as well as punctuation marks and
(c) python (d) penguin computer or information appliance. Examples accented letters and non-alphabetic characters.
Sol. (b.) A search engine spider, also known as a of input devices include keyboards, mouse,
web crawler, is an Internet bot that crawls scanners, cameras, joysticks, and microphones. 116. Which of the following devices accepts the
websites and stores information for the search results produced by the computer in a machine-
engine to index. Their purpose is to index the 110. A topology for a Local Area Network in readable form?
content of websites all across the internet so which all nodes are individually connected to a (a) Microphone (b) Printer
that those websites can appear in search central connection point like a hub or switch is (c) Graphics tablet (d) Mouse
engine results. called: Sol. (b). The printer accepts the results
(a) star topology (b) tree topology produced by the computer in a machine-
105. Which of the following is the full form of (c) ring topology (d) bus topology readable form. A printer is a peripheral
ASCII? Sol. (a) A topology for a Local Area Network in machine that makes a persistent representation
(a) American Standard Code for Information which all nodes are individually conn ected to a of graphics or text, usually on paper. T he first
Interchange central connection point like a hub or switch is electronic printer was the EP-101, invented by
(b) Asian Standard Code for Information called star topology. Japanese company Epson and released in 1968.
Interchange
(c) Analytical Scientific Code for Information 111. ______ is the process of turning on a 117. Which of the following is one of the file
Interchange computer and powering up the system. formats used for web graphics?
(d) Analytical Standard Code for Intermitted (a) Booting (b) Loading (a) gif (b) .exe (c) .txt (d) .docx
Information (c) Saving (d) Execution Sol. (a). gif is one of the file formats used for
Sol. (a). The full form of ASCII: American Sol. (a). Booting is the process of turning on a web graphics. GIF or Graphics Interchange
Standard Code for Information Interchange. computer and powering up the system. When Format files are widely used for web graphics,
American Standard Code for Information we start our computer then there is an because they are limited to only 256 colors, can
Interchange, is a character encoding standard operation which is performed automatically by allow for transparency, and can be animated.
for electronic communication. ASCII codes the computer which is also called Booting.
represent text computers,telecommunications 118. Which of the following is a single user
equipment, and other devices. 112. What do you call a key on a computer operating system?
keyboard that is used to move the pointer (a) Windows 7 (b) MS-DOS
106. An/A ______ is a finite set of instructions (cursor) around on the screen? (c) Windows NT (d) Linux
which, when followed, accomplish a particular (a) Navigation key (b) Numeric key Sol. (b). T he single-user operating system is the
task. (c) Function key (d) Control key operating system in which only one user can
(a) array (b) algorithm Sol. (a). A navigation key is a key on a computer access the computer system at a time, and Ms-
(c) data (d) node keyboard that is used to move the pointer DOS is the best example of a single-user
Sol. (b). An algorithm is a finite set of (cursor) around on the screen. They include the operating system.
instructions that, when followed, accomplish a four Arrow keys, PageUp, PageDown, Home
particular task. The algorithm is a finite and End keys. 119. How many terabytes are in a petabyte?
sequence of well-defined, computer- (a) 1048 (b) 1042
implementable instructions, typically to solve a 113. Which of the following keyboard shortcuts (c) 1084 (d) 1024
class of specific problems or to perform a will you press in order to minimise all programs Sol. (d). There are 1,024 terabytes (TB) in a
computation. on a computer screen and display the desktop? petabyte. A petabyte is a measure of memory

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
or data storage capacity that is equal to 2 to the 127. Which one of the following is a computer 135. Which of the following ports is used to
50th power of bytes. A Terabyte (TB) is a virus? connect a computer to a wired network?
measure of computer storage capacity that is (a) Penguin (b) Panda (a) Universal serial bus port
approximately 2 to the 40th power (c) Spider (d) Creeper (b) Ethernet port
Sol. (d). The Creeper virus is the first computer (c) Parallel port
120. Which type of storage device is a hard virus ever developed by Bob in 1971. (d) Super-video port
disk? Sol. (b). Ethernet is a family of wired computer
(a) Secondary (b) Tertiary 128. Second-generation computers (1955-1964) networking technologies commonly used in
(c) Off-line (d) Primary were made of: local area networks (LAN), metropolitan area
Sol. (a). The hard drive is the secondary storage (a) large scale integrated circuit chips networks (MAN) and wide area networks
standard in modern computing. It is usually (b) vacuum tubes (WAN).
installed internally in a computer, attached (c) transistors
directly to the disk controller of the computer's (d) small scale integrated circuit chips 136. Where in a computer would you use a
motherboard. Sol. (c). Second Generation computers used 'joystick' for computer games and assistive
transistors. While first-generation computers technology?
121. What is the use of the functional key F7 in used vacuum tubes, third-generation (a) Mail merge (b) Cursor control
Microsoft Word 2010? computers used integrated circuits, fourth- (c) Increase memory (d) Storage space
(a) It is used to open the Help window. generation computers used microprocessors Sol. (b). Cursor control
(b) It is used to run spell-check and grammar and fifth-generation computers are based on
check. Artificial Intelligence(AI). 137. Which of the following is a part of the
(c) It is used for renaming files and folders. central processing unit of a computer?
(d) It is used as a search key. 129. A message that tries to trick a person into (a) Mouse (b) Scanner
Sol. (b). F7 key is most often used to run spell- providing information such as his social security (c) Memory registers (d) Joystick
check and grammar check. number, bank account information or login Sol. (c). The memory address register (MAR) is
username and password for a website is a type the CPU register that either stores the memory
122. Which of the following file formats does of malware called: address from which data will be fetched to the
MS Paint use to open and save files in (a) Worms (b) Zombie CPU or the address to which data will be sent
Windows? (c) Macro Virus (d) Phishing and stored.
(a) .DOC (b) .XlS Sol. (d). Phishing is the fraudulent practice of
(c) .JPEG (d) .PPT sending emails purporting to be from reputable 138. Which of the following is an open-source
Sol. (c) .JPEG file formats MS Paint use to open companies in order to induce individuals to operating system?
and save files in Windows. reveal personal information such as passwords (a) Windows 10 (b) Windows Vista
and credit card numbers. (c) Android (d) iOS
123. Which of the following is a computer Sol. (c) Android
application software? 130. Which of the following types of computer
(a) Word processor (b) RAM is used in climate research and weather 139. Which of the following is an input device
(c) Visual Basic (d) Java forecasting? used to verify the legitimacy or originality of
Sol. (a). Word processor is a (a) Mainframe computers (b) Micro-computers paper documents, especially cheques?
computerapplication software. A word (c) Supercomputers (d) Mini-computers (a) Non-impact printer
processor is a software or a device that allows Sol. (c). Climate research and weather (b) Optical mark reader
users to create, edit, and print documents. forecasting requires exceedingly high-speed (c) Electronic card reader
computations. Therefore, Supercomputers are (d) Magnetic ink character recognition
124. Which keyboard shortcut in Microsoft used in climate, scientific and engineering work. Sol. (d). Magnetic ink character recognition is
Excel 2016 should you use to insert a new an input device used to verify the legitimacy or
worksheet for Windows 10 operating system? 131. Which of the following keys will you press originality of paper documents, especially
(a) Shift + F12 (b) Shift + F7 in Windows 10 to turn the volume up? cheques.
(c) Shift + F5 (d) Shift + F11 (a) F4 (b) F5 (c) F6 (d) F8
Sol. (a). F11 keyboard shortcut in Microsoft Sol. (d). F8 key is pressed to turn the volume up 140. What is the other name for 'transistor
Excel 2016 should be used toinsert a new in Windows 10. Also, F9 is pressed to turn the computer'?
worksheet for Windows 10 operating system. volume down. (a) First Generation Computer
F11 also has other uses depending on the (b) Third Generation Computer
computer and program 132. On a computer keyboard, the Shift and Alt (c) Second Generation Computer
keys are examples of: (d) Fourth Generation Computer
125. Which of the following was the first (a) numeric keys (b) modifier keys Sol. (c). *First Generation: 1946-1959. Vacuum
operating system written in 'C' language? (c) function keys (d) cursor movement keys tube-based.
(a) UNIX (b) Windows 95 Sol. (b). The Shift and Alt keys are examples of *Second Generation: 1959-1965. Transistor-
(c) Xenix (d) LINUX modifier keys on a computer keyboard. based.
Sol. (a). The C programming language came out *Third Generation: 1965-1971. Integrated
of Bell Labs in the early 1970s by Dennis Ritchie. 133. Which of the following is the slowest type Circuit based.
The C programming language was devised in of internet connection? *Fourth Generation: 1971-1980. VLSI
the early 1970s as a system implementation (a) Dial-up (b) Satellite microprocessor-based.
language for the nascent Unix operating (c) Cable (d) Digital subscriber line (DSL) *Fifth Generation: 1980-onwards. ULSI
system. Sol. (a). Internet connection speed in microprocessor-based.
decreasing order:- Fiber - Cable - Satellite - DSL-
126. Which of the following is a primary storage Wireless - Dial-up. 141. Who created FORTRAN — the first high-
device in a personal computer? level computer programming language?
(a) Hard disk (b) Compact disk 134. The ______ is a three or four letter (a) Dan Bricklin (b) Marc Andreessen
(c) Pen drive (d) Random-access memory abbreviation that signifies the file type. (c) Larry Ellison (d) John Backus
Sol. (d). Random-access memory. RAM is a (a) extension (b) search Sol. (d). John Backus
form of computer memory that can be read and (c) virus (d) name
changed in any order, typically used to store Sol. (a). The extension is a three or four letter 142. Which of the following is a method of
working data and machine code. abbreviation that signifies the file type. describing computer algorithms using a
combination of natural language and
programming language?

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(a) Node (b) Pseudocode 150. In the context of IT services , what is the Sol. (b). IAS (Indian Administrative Services), IFS
(c) Flowchart (d) Array full form of BCP? (Indian Foreign Services), IPS (Indian Police
Sol. (b). Pseudocode is a method of describing (a) Business Continuity Plan Services) are categories of Indian Civil Services.
computer algorithms using a combination of (b) Business Confirmation Protocol
natural language and programming language. (c) Business Continuity Protocol 157. In the context of the banking sector, what
(d) Business Confirmation Plan does ‘F’ stand for in IFSC?
143. ______ is an interpreted, high-level and Sol. (a). Business continuity planning (BCP) is (a) Functional (b) Forum
general-purpose programming language. the process a company undergoes to create a (c) Fiscal (d) Financial
(a) Python (b) Spider prevention and recovery system from potential Sol. (d). IFSC stands for Indian Financial system
(c) Penguin (d) Cookie threats such as natural disasters or cyber- Code.It is an 11 digit alphanumeric code used to
Sol. (a). Python is an interpreted, high-level and attacks. BCP is designed to protect personnel uniquely identify bank branches within the
general-purpose programming language. and assets and make sure they can function National Electronic Funds transfer (NEFT)
quickly when disaster strikes. network by the central bank.
144. ______ contains and manages all the
programs and applications that a computer or 151. The full form INTACH is : 158. ICAR is an autonomous body responsible
other device is able to run. (a) Indian National Trust for Art and Culture for coordinating agriculture and research in
(a) Data Science (b) Operating system Heritage India. What is the full form of ICAR?
(c) Computer hardware (d) Computer software (b) Indian National Trust for Archaeological and (a) Institute of Central Aviation Research
Sol. (b). Operating system Cooperative Heritage. (b) Indian Centre of Agriculture and Research
(c) Indian National Trust for Architectural and (c) Indian Council of Agricultural Research
145. What is the keyboard shortcut to add a Calligraphic Heritage. (d) Institute of Central Agricultural Research
new row above a given row in Microsoft Excel? (d) Indian National Trust for Art and Sol. (c). The ICAR (Indian Council of Agricultural
(a) Alt + I + R (b) Alt + C + I Cooperative Heritage Research) has its headquarters in New Delhi.
(b) Shift + Spacbar (d) Shift + I + R Sol. (a). The Indian National Trust for Art and The Council is the apex body for coordinating,
Sol. (a). Alt + I + R. Shift+Space Bar - Select Row Cultural Heritage (INTACH) is a non-profit guiding, and managing research and education
in Excel. charitable organisation registered under the in agriculture including horticulture, fisheries,
Societies Registration Act, 1860. and animal sciences in the entire country.
146. Which of the following is NOT an example
of an optical disk? 152. What is the full form of MoU? 159. India has engaged actively in the
(a) Blue Ray Disk (b) PROM (a) Monetary of Union Territory multilateral negotiations in the UNFCCC. What
(c) CD ROM (d) DVD (b) Memorandum of Understanding is the full form of UNFCCC?
Sol. (b). An optical disc is most commonly used (c) Memory of Undertaking (a) United Nations Framework of Central
as a CD player, CD-RW, DVD, Blu-ray player (d) Memory of Understanding Climate Change
Sol. (b). A memorandum of understanding (b) United Nations Fellowship of Central
147. A device or program that enables a (MoU) is a type of agreement between two Climate Change
computer to transmit data over telephone or (bilateral) or more (multilateral) parties. It (c) United Nations Framework Convention on
cable lines is called: expresses a convergence of will between the Climate Change
(a) motherboard (b) modem parties, indicating an intended common line of (d) United Nations Fellowship Convention on
(c) monitor (d) mouse action. Climate Change
Sol. (b). modem Sol. (c). India has engaged actively in
153. In the context of NITI Aayog, what does 'T' multilateral negotiations in the UNFCCC.
148. In the field of Information and stand for in NITI? UNFCCC stands for United Nations Framework
Communication Technology , what is the full (a) travel (b) Training Convention on Climate Change. The Convention
form of EEPROM? (c) to transform (d) to move has near-universal membership (197 Parties)
(a) Electrically Erasable Programmable Read Sol. (c). The National Institution for and is the parent treaty of the 2015 Paris
Only Memory Transforming India, also called NITI Aayog, was Agreement.
(b) Electrically Efficient Portable Read only formed via a resolution of the Union Cabinet on
Memory January 1, 2015. NITI Aayog is the premier 160. Which of the following is the correct full
(c) Electrically Efficient Programmable Read policy 'Think Tank' of the Government of India, form of JPEG?
Only Memory providing both directional and policy inputs. (a) Joint Pixel Experts Group
(d) Enhanced Electrical Portable Read only (b) Joint Photographic Experts Group
Memory 154. What does 'T' stand for in ATM? (c) Joint Pixel Exports Group
Sol. (a). EEPROM stands for Electrically Erasable (a)Teller (b)Trunk (d) Joint Photography Exports Group
Programmable Read-Only Memory and is a type (c)Translation (d)Transfer Sol. (b). JPEG:- Joint Photographic Experts
of non-volatile memory used in computers, Sol. (a). The full form of ATM is Automated Group.
integrated in microcontrollers for smart cards Teller Machine. An ATM is an electro-
and remote keyless systems, and other mechanical machine that is used for making 161. CSIR as an autonomous body is the largest
electronic devices to store relatively small financial transactions from a bank account. research and development organisation in
amounts of data. These machines are used to withdraw money India. What does CSIR stands for?
from personal bank accounts. (a) Council of Scientific and Industrial
149. In the context of Cloud Computing , what Research
is the full form of PaaS? 155. In DASD, what is the full form of ‘A’? (b) Council of Space and Industrial
(a) Protocol as a Service (a) Around (b) Accessible Research
(b) Performance as a Service (c) Arithmetic (d) Access (c) Centre of Space and Industrial
(c) Payment as a Service Sol. (d). A Direct-access storage device is a Research
(d) Platform as a Service secondary storage device in which each (d) Chamber of States and Industrial
Sol. (d). Platform as a service (PaaS) is a cloud physical record has a discrete location and a Research
computing model in which a third-party unique address. DASD includes hard disk, Sol. (a). CSIR - Council of Scientific and
provider delivers hardware and software tools, magnetic drums, optical discs etc. Industrial Research. Headquarters - New Delhi,
usually those needed for application Established on - 26 September 1942.
development -- to users over the internet. A 156. Which of the following abbreviations
PaaS provider hosts the hardware and software related to categories of Indian Civil Services is 162. What does UNDP stand for in the context
on its own infrastructure. INCORRECT? of Economics?
(a) IAS (b) ICS (c) IPS (d) IFS (a) United Nations Disinflation Programme

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(b) United Nations Development Programme
(c) United Nations Defaulting Programme
(d) United Nations Deregulation Programme
Sol. (b). In the context of Economics, UNDP
stands for United Nations Development
Programme. UNDP helps countries eliminate
poverty and achieve sustainable economic
growth and human development. It’s
headquarter is in New York City, USA. UNDP
annually publishes the Human Development
Report.

163. In the context of BHIM UPI, what does 'I'


stand for in BHIM?
(a) Insurance (b) Identity
(c) Interfere (d) Interface
Sol. (d). In the context of BHIM UPI, 'I' stands
for Interface in BHIM. Bharat Interface for
Money (BHIM) is an app that lets you make
simple, easy, and quick payment transactions
using Unified Payments Interface (UPI).

164. What does the letter 'V' stand for in HVJ


pipeline, which is India's first inter-state inland
natural gas pipeline?
(a) Vadodara (b) Vaikom
(c) Vadnagar (d) Vijaipur
Sol. (d). The letter 'V' stands for Vijaipur in the
HVJ pipeline, which is India's first inter-state
inland natural gas pipeline. The pipeline runs
from Hazira, Gujarat through Vijaipur, Madhya
Pradesh to Jagdishpur, Uttar Pradesh.

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE CONTACT US AT :- 9469860788, 9906300788

You might also like