Computer mcq for competitive exams
1. Which of the following generation of computers is associated with artificial
intelligence?
1. First
2. Second
3. Third
4. Fourth
5. Fifth
Answer – “5”
2. A file which has not been altered, compressed, or manipulated in any way by
the computer is called?
1. temp file
2. raw file
3. permanent file
4. directory files
5. ordinary files
Answer– “2”
3. In a computer file system which among the following is top or first in hierarchy?
1. root directory
2. parent directory
3. home directory
4. working directory
5. Current directory
Answer– “1”
4. When some unidentified / unknown person / firm sends you mail in a trustworthy / lucrative way asking for sensitive banks and online payment information, this is a case of __________ ?
1. spam
2. hacking
3. Phishing
4. Theft
5. Cyber crime
Answer– “3”
5. A network that is connected to the Internet, but uses encryption to scramble all the data sent through the Internet is called?
1. Universal network
2. Wireless Network
3. Social Network
4. Personal Area Network
5. Virtual private Network
Answer– “5”
6. ________________ is a communication technology used by some incoming mail servers.
1. TCP
2. POP
3. FTP
4. Telnet
5. IP
Answer– “2”
7. The process of transferring files from a computer on the Internet to your computer is called?
1. downloading
2. Uploading
3. FTP
4. JPEG
5. PNG
Answer– “3”
8. ___________________ is an area of a computer that temporarily holds data waiting to be processed, stored or output.
1. Storage
2. Motherboard
3. CPU
4. Memory
5. Peripherals
Answer– “4’
9. _________________________ is a collection of data that is organized so that its contents can easily be accessed manage and updated.
1. Data warehouse
2. Data mining
3. Database
4. Data dictionary
5. Directory
Answer– “3”
10. _____________________________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
1. The platform
2. The motherboard
3. Application software
4. The operating system
5. System software
Answer– “4”
11. Unauthorized copying of software to be used for personal gain instead of for personal backups is called
1. program thievery
2. data snatching
3. software piracy
4. program looting
5. data looting
Answer– “3”
12. _______________________ is collection of web pages and ________________ is the very first page that we see on opening of a website.
1. Home page, Webpage
2. Website, Homepage
3. Login page, Homepage
4. Webpage, Website
5. Homepage, Login page
Answer– “2”
13. Which of the following is not example of Utility Software?
1. Backup software
2. Antivirus software
3. Disk tools
4. Media Players
5. None of the above
Answer– “4’
14. To move data from one part of the document to another, which of the following is used?
1. Cut and Insert
2. Copy and Paste
3. Copy and Delete
4. Copy and Undo
5. Cut and Paste
Answer– “5”
15. The speed of computer is defined in
1. Clock speed
2. Access speed
3. Frequency
4. Access time
5. Response speed
Answer– “1”
16. The vertical blocks in a table is known as
1. Row
2. Column
3. Cell
4. Room
5. Sheet
Answer– “2”
17. A GUID is a 128-bit (16 byte) number used by software programs to uniquely identify the location of a data object. What is correct full form?
1. Graphical User Identifier
2. Globally Unique Identifier
3. Globally Unique Internet
4. Global User Identifier
5. None of these
Answer– “2”
18. Which among the following is the chat program that lets users communicate in real time?
1. WhatsApp
2. Google chat
3. Google plus
4. Instant messaging
5. Google mail
Answer– “4”
19. Software that disrupts the normal function of computer is known as
1. Malware
2. Virus
3. Hacker
4. Trojan horse
5. None of these
Answer– “1”
20. If the computer is not able to connect with other computers, it is said to be
1. Communication gap
2. Offline
3. Sleeping mode
4. Switch off mode
5. Boot mode
Answer– “2”
21. If you want to insert a chart in your slide, you will go to
1. File
2. Home
3. Insert
4. Font
5. Edit
Answer– “3”
22. An internet service provider that provides multimedia interface to available resources is known as
1. telnet
2. Ethernet
3. Intranet
4. World wide web
5. None of these
Answer– “4”
23. Which among the following is known as semiconductor memory in a computer?
1. ROM
2. EEPROM
3. RAM
4. DRAM
5. CD-ROM
Answer– “3”
24. The step-by-step procedure for executing the task is known as
1. Execution cycle
2. Algorithm
3. Assess cycle
4. Full cycle
5. flowchart
Answer– “2”
Recent Posts
See AllThe formula A=P×(1+r×t)A=P×(1+r×t) is used to calculate the total amount AA accumulated after applying simple interest. This formula...