157
93.1k

2100+ Important Computer MCQs For Competitive Exams part-1 Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Common Topics in Competitive and Entrance exams , Union Public Service Commission (UPSC) , Indian Administrative Service (IAS) .

1601.

Which of the following is not a type of computer software which can be bought?

A. Off-the-shelf
B. Tailor-made
C. Custom-developed
D. Off-the-shelf with alterations
E. All of these can be purchased
Answer» E. All of these can be purchased
1602.

You can use………….to copy selected text, and………….to paste it in a document.

A. CTRL + C, CTRL + V
B. CTRL + C, CTRL + P
C. CTRL + S, CTRL + S
D. SHIFT + C, ALT + P
E. CTRL + D, CTRL + A
Answer» A. CTRL + C, CTRL + V
1603.

Video processors consists of………and ………..which store and process images.

A. CPU and VGA
B. CPU and memory
C. VGA and memory
D. VGI and DVI
E. VGA and VGI
Answer» D. VGI and DVI
1604.

Hard disk drives are considered……… storage.

A. flash
B. nonvolatile
C. temporary
D. nonpermanent
E. None of these
Answer» B. nonvolatile
1605.

A(n)……….uses laser technology to store large amounts of information

A. floppy disk
B. compact disk read-only memory (CD- ROM)
C. hard disk
D. extended disc read-only memory (ED- ROM)
E. None of these
Answer» B. compact disk read-only memory (CD- ROM)
1606.

A(n)………is a combination of hardware and software that facilitates the sharing of information between computing devices.

A. network
B. peripheral
C. expansion board
D. digital device
E. None of these
Answer» A. network
1607.

When sending an e-mail the………the describes the contents of the message.

A. to
B. subject
C. contents
D. CC
E. None of these
Answer» B. subject
1608.

A program designed to destroy data on your computer which can travel to ‘infect’ other computers is called a…………

A. disease
B. torpedo
C. hurricane
D. virus
E. None of these
Answer» D. virus
1609.

What are bas, xis, and htm examples of?

A. Databases
B. Domains
C. Extensions
D. Protocols
E. None of these
Answer» C. Extensions
1610.

The side bar in a window or word processor that has an arrow on both ends and a box in the middle that you use your mouse to move the pages up or down……….

A. scroll bar
B. roll bar
C. page bar
D. box bar
E. None of these
Answer» A. scroll bar
1611.

A(n)………is a device that electronically processes data, converting it to information.

A. algorithm
B. computer
C. software
D. program
E. None of these
Answer» B. computer
1612.

The place where the computer stores programs and data is called…………

A. Memory
B. Storehouse
C. Storage unit
D. Backup
E. None of these
Answer» A. Memory
1613.

Why is the Caps Lock key refered to as a toggle key?

A. Because its function goes back and forth every time it is pressed
B. Because it cannot be used for entering numbers.
C. Because it cannot be used to delete
D. Because it cannot be used to insert
E. None of these
Answer» A. Because its function goes back and forth every time it is pressed
1614.

One puts information into the computer by pressing this key……….

A. caps lock
B. tab
C. enter
D. esc
E. None of these
Answer» C. enter
1615.

To add or put into your document such as a picture or text use………..

A. TV
B. insert
C. push in
D. squeeze in
E. None of these
Answer» B. insert
1616.

A key that must be pressed each time a new command or information is entered………..

A. esc
B. enter
C. delete
D. home
E. None of these
Answer» B. enter
1617.

Computers use the………….system to process data.

A. processing
B. kilobyte
C. binary
D. representational
E. None of these
Answer» C. binary
1618.

These provide expansion capability for a computer system.

A. sockets
B. slots
C. bytes
D. bays
E. None of these
Answer» B. slots
1619.

A(n)………..allows sharing of a broadband internet connection.

A. hub
B. adapter
C. router
D. switch
E. plug
Answer» C. router
1620.

The clock rate of a processor is measured in………..

A. milliseconds
B. microhertz
C. megabytes or gigabytes
D. nanoseconds
E. megahertz or gigahertz
Answer» E. megahertz or gigahertz
1621.

A computer virus normally attaches itself to another computer program known as a…….

A. backdoor program
B. target program
C. trojan horse
D. host program
E. Bluetooth
Answer» C. trojan horse
1622.

These devices translate data and programs that humans can understand into a form that the computer can process.

A. display
B. input
C. output
D. pointer
E. None of these
Answer» B. input
1623.

The amount of time required by a storage device to retrieve data and programs is its……

A. retrieval speed
B. capacity
C. memory
D. storage
E. access speed
Answer» E. access speed
1624.

A 32-bit word computer can access bytes at a time.

A. 4
B. 8
C. 16
D. 32
E. 30
Answer» A. 4
1625.

A megabyte is actually equal to………. kilobytes.

A. 100
B. 1000
C. 1024
D. 1024 x 1024
E. None of these
Answer» C. 1024
1626.

The main memory of a computer must be large enough to contain the active parts of……..

A. the operating system
B. the applications
C. input/output storage & working storage
D. All of these
E. None of these
Answer» C. input/output storage & working storage
1627.

This type of memory improves processing by acting as a temporary high-speed holding area between the memory and the CPU.

A. RAM
B. ROM
C. cache memory
D. flash memory
E. EPROM
Answer» C. cache memory
1628.

The smallest unit in a digital system is a………

A. Byte
B. Kilobyte
C. Word
D. Character
E. bit
Answer» C. Word
1629.

……….ports connect special types of music instruments to sound cards.

A. BUS
B. CPU
C. USB
D. MIDI
E. MINI
Answer» D. MIDI
1630.

Software you can use to create a budget is called……….

A. word processing software
B. graphics software
C. utility software
D. spreadsheet software
E. None of these
Answer» D. spreadsheet software
1631.

The mouse …………usually appears in the shape of an arrow.

A. indicator
B. marker
C. meter
D. pointer
E. None of these
Answer» D. pointer
1632.

If a processor has a word size of 32 bits, compared to a processor with a word size of 16 bits, it can process……….at a time.

A. thrice as much
B. half as much
C. a fourth as much
D. the same amount
E. twice as much
Answer» E. twice as much
1633.

The most common storage device for the personal computer is the………

A. floppy disk
B. USB thumb drive
C. zip disk
D. hard disk drive
E. Pen drive
Answer» D. hard disk drive
1634.

Numbers and formulae entered in a cell are called……….

A. labels
B. numeric entries
C. intersection
D. text
E. fillers
Answer» B. numeric entries
1635.

What is software?

A. A type of computer code
B. A computer language
C. A set of instructions for your computer
D. A cover for the computer
E. None of these
Answer» C. A set of instructions for your computer
1636.

Thick, rigid metal platters that are capable of storing and retrieving information at a high rate of speed are known as……….

A. hard disks
B. soft disks
C. flash memory
D. SAN
E. None of these
Answer» A. hard disks
1637.

What is windows explorer?

A. A drive
B. A PC
C. A Web browser
D. A network
E. A file manager
Answer» E. A file manager
1638.

………is the most popular internet activity.

A. Art
B. Shopping
C. Searching
D. Entertainment
E. Communicator
Answer» C. Searching
1639.

Computers process binary numbers, which are composed of…………

A. 1s and 2s
B. 2s and 4s
C. 1s and 10s
D. 2s and 3s
E. 0s and 1s
Answer» C. 1s and 10s
1640.

A DVD is an example of a(n)…………

A. hard disk
B. optical disc
C. output device
D. solid-state storage device
E. None of these
Answer» B. optical disc
1641.

URL stands for…………

A. Universal Research List
B. Universal Resource List
C. Uniform Research List
D. Uniform Research Locator
E. Uniform Resource Locator
Answer» E. Uniform Resource Locator
1642.

When data changes in multiple lists and all lists are not updated, this causes……….

A. data redundancy
B. information overload
C. duplicate data
D. data inconsistency
E. data repetition
Answer» D. data inconsistency
1643.

What is a backup?

A. Restoring the information backup
B. An exact copy of a sys em’s information
C. The ability to get a system up and running in the event of a system crash or failure
D. All of these
E. None of these
Answer» B. An exact copy of a sys em’s information
1644.

The Internet is…………

A. a large network of networks
B. an internal communication system for a business
C. a communication system for the Indian government
D. a communication system for some states of India
E. a communication system for some cities of India
Answer» A. a large network of networks
1645.

What is the storage area for email messages called?

A. A folder
B. A mailbox
C. A directory
D. The hard disk
E. None of these
Answer» B. A mailbox
1646.

One advantage of dial-up Internet access is………….

A. it utilizes broadband technology
B. it is Indian
C. it uses a router for security
D. modem speeds are very fast
E. it utilizes existing telephone service
Answer» E. it utilizes existing telephone service
1647.

An error in a computer program……….

A. Crash
B. Power Failure
C. bug
D. Virus
E. Fatal error
Answer» C. bug
1648.

Access control based on a person’s fingerprints is an example of………..

A. biometric identification
B. characteristic identification
C. characteristic security
D. fingerprint security
E. logistics
Answer» A. biometric identification
1649.

The patterns of printed lines on most products are called…………

A. prices
B. striping
C. scanners
D. OCR
E. barcodes
Answer» E. barcodes
1650.

Most mail programs automatically complete the following two parts in an e-mail…………

A. From : and Body :
B. From : and Date :
C. From : and To :
D. From : and Subject :
E. None of these
Answer» B. From : and Date :

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.