Computer MCQ
Computer MCQ
Disclaimer:
The information provided in this book is intended for educational and informational purposes
only. While every effort has been made to ensure the accuracy and completeness of the
content, the author and publisher assume no responsibility for errors, omissions, or damages
resulting from the use of this information.
The procedures and guidelines presented are based on current knowledge and standards
available at the time of publication. However, due to the rapid pace of technological change,
some information may become outdated or not applicable to newer systems or software.
The author and publisher do not endorse or recommend any specific software, hardware, or
other products mentioned in this book. All trademarks, registered trademarks, and product
names are the property of their respective owners.
Use this book at your own risk. The author and publisher are not responsible for any losses,
damages, or issues arising from the implementation of the techniques or methods described
herein.
MS Word
1. What is the default file extension for a Word document?
A) .docx
B) .txt
MS Excel
1. What is the default file extension for Excel 2016 workbooks?
a) .xls
b) .xlsx
c) .xlsm
d) .xlr
Answer: b) .xlsx
2. Which of the following is a valid Excel formula?
a) =SUM(A1)
b) SUM(A1)
c) =SUM(A1, A10)
d) SUM(A1)
Answer: a) =SUM(A1)
3. How can you add a new worksheet in Excel?
a) Right-click on a sheet tab and select "Insert"
b) Click on the “New Worksheet” button in the ribbon
c) Press “Ctrl + N”
d) Click the "+" icon next to the sheet tabs
Answer: d) Click the "+" icon next to the sheet tabs
4. Which of the following shortcuts will select the entire column in Excel?
a) Ctrl + A
b) Shift + Space
c) Ctrl + Space
MS Power point
1. What is the default file extension for a PowerPoint 2016 presentation?
A) .ppt
B) .pptx
C) .pps
D) .ppx
Answer: B) .pptx
2. Which view in PowerPoint allows you to see all the slides in your presentation?
A) Slide Show
B) Slide Sorter
MS Access
1. Which of the following is used to store data in MS Access?
a) Forms
b) Queries
c) Tables
d) Reports
Answer: c) Tables
2. What is a primary key in MS Access?
a) A key that uniquely identifies each record in a table
b) A key used for encryption
c) A key that can be used multiple times
d) A key to open the database
Answer: a) A key that uniquely identifies each record in a table
3. Which view is used to enter data directly into a table in MS Access?
a) Design View
b) Datasheet View
c) Query View
d) Report View
Answer: b) Datasheet View
Internet
1. What does the acronym "URL" stand for?
A) HTTP
B) FTP
C) SMTP
D) TCP
Answer: B) FTP
B) To encrypt data
C) To transfer files
D) To check email
Answer: A) To convert domain names into IP addresses
B) Fiber optic
C) Cable
D) Satellite
Answer: B) Fiber optic
A) Wireless Fidelity
B) Wireless Field
C) Wired Fidelity
D) Wireless Internet
Answer: A) Wireless Fidelity
A) Internet Process
B) Internet Protocol
C) Internal Program
D) International Protocol
Answer: B) Internet Protocol
8. Which protocol is responsible for securely transmitting data over the internet?
A) FTP
B) HTTP
C) HTTPS
D) POP3
Answer: C) HTTPS
A) A search engine
A) Yahoo
B) Bing
C) Google
D) DuckDuckGo
Answer: C) Google
A) To store files
C) To process data
D) To encrypt data
Answer: B) To connect different networks
A) Bing
B) Twitter
C) Facebook
D) YouTube
Answer: A) Bing
A) google.com
B) google.net
C) google.org
D) google.co
Answer: A) google.com
A) IP address
B) URL
C) SMTP
D) MAC address
Answer: B) URL
A) SMTP
B) POP3
C) FTP
D) HTTP
Answer: A) SMTP
A) DSL
B) Fiber Optic
C) Dial-up
D) Satellite
Answer: C) Dial-up
A) 21
B) 22
C) 80
D) 443
Answer: C) 80
B) Image file
C) Audio file
A) To locate a website
C) To send emails
D) To transfer files
Answer: B) To identify a device on a network
30. Which of the following is the main purpose of the HTTP protocol?
C) A type of malware
B) To store files
C) No security
D) Slower performance
Answer: B) Larger address length
34. What is the maximum speed of a typical fiber optic internet connection?
A) 10 Mbps
B) 100 Mbps
C) 1 Gbps
D) 10 Gbps
Answer: D) 10 Gbps
35. What is the primary difference between the internet and the web?
A) The internet refers to all hardware, while the web is just a collection of websites.
B) The internet refers to websites, while the web is the physical infrastructure.
A) Two-Factor Authentication
D) Two-Factor Authorization
Answer: A) Two-Factor Authentication
37. What does the acronym "URL" typically represent in a web browser?
A) Mozilla
B) Microsoft
C) Google
D) Apple
Answer: B) Microsoft
40. Which protocol is used for email retrieval from a mail server?
A) FTP
B) HTTP
C) POP3
D) IMAP
Answer: C) POP3
A) Wireless Fidelity
A) Vimeo
B) LinkedIn
C) Pinterest
D) Spotify
Answer: A) Vimeo
A) .com
B) .org
C) .info
D) .sys
Answer: D) .sys
A) Process email
B) Store web pages and provide access to them over the internet
A) Zoom
B) MySpace
C) Blogger
D) Craigslist
Answer: A) Zoom
49. Which encryption protocol is used to secure data sent over HTTPS?
A) SSL/TLS
B) RSA
C) DES
D) AES
Answer: A) SSL/TLS
A) 2^32
B) 2^128
C) 2^64
D) 2^256
Answer: A) 2^32
A) HTTP
B) BitTorrent
C) FTP
D) SSL
Answer: B) BitTorrent
52. Which of the following is used to protect a website from DDoS attacks?
A) VPN
C) Proxy server
D) SSL certificate
Answer: B) Web Application Firewall (WAF)
A) Encrypt data
C) Host a website
B) Using remote servers to store and process data over the internet
A) LinkedIn
B) Bing
D) Dropbox
Answer: A) LinkedIn
A) Google Drive
B) Spotify
C) GitHub
D) Adobe Photoshop
Answer: A) Google Drive
A) Bing
B) Facebook
C) Instagram
D) Amazon
Answer: A) Bing
A) SMTP
B) POP3
C) DNS
D) HTTP
Answer: B) POP3
B) To manage IP addresses
A) To store websites
A) IP Address Filtering
B) Port Scanning
C) Ping Testing
D) DNS Spoofing
Answer: A) IP Address Filtering
63. Which protocol is primarily used for transferring web pages over the internet?
A) FTP
B) SMTP
C) HTTP
D) POP3
Answer: C) HTTP
65. What is the main purpose of "cloud storage" services like Dropbox or Google Drive?
D) To create websites
Answer: A) To store files online for easy access and sharing
A) Send email
C) Transfer files
D) Stream videos
Answer: B) Connect wirelessly to the internet
B) Google Search
C) Yahoo Mail
D) Netflix
Answer: A) Amazon Web Services (AWS)
A) PayPal
C) Yahoo
D) GitHub
Answer: A) PayPal
A) Amazon
B) Reddit
C) LinkedIn
D) Pinterest
Answer: A) Amazon
A) CAPTCHA
B) Proxy servers
C) DNS resolution
D) Data encryption
Answer: A) CAPTCHA
B) To encrypt data
A) A digital virus
A) Facebook
B) WordPress
C) Gmail
D) Dropbox
Answer: A) Facebook
C) Adobe Acrobat
D) Spotify
Answer: A) AWS (Amazon Web Services)
79. Which of the following is an example of a peer-to-peer protocol used in file sharing?
A) FTP
B) HTTP
C) BitTorrent
D) SMTP
Answer: C) BitTorrent
A) Dropbox
B) Windows 10
C) MySQL
D) Cisco
Answer: A) Dropbox
85. Which of the following is a security risk where a website is tricked into delivering
confidential information to attackers?
A) Phishing
B) DDoS
D) Malware
Answer: C) XSS (Cross-site scripting)
88. Which of these is a popular email protocol used for sending emails?
A) IMAP
B) SMTP
C) POP3
D) HTTP
Answer: B) SMTP
A) To host websites
90. What is the primary benefit of using a "Content Delivery Network" (CDN)?
C) It distributes website content across multiple servers to increase load times and
availability
91. What is the most common use for the protocol HTTPS?
A) To transfer emails
93. Which of the following is the most popular operating system for web servers?
A) Linux
B) Windows
C) macOS
D) Android
Answer: A) Linux
94. Which of these technologies is used for secure communication over the internet?
A) SSL/TLS
B) HTTP
C) DNS
D) FTP
Answer: A) SSL/TLS
B) The traceable data you leave behind while using the internet
97. What is the primary purpose of the "DMZ" (Demilitarized Zone) in network security?
98. Which type of internet connection uses a modem to connect to the internet over
telephone lines?
A) Fiber optic
B) Cable
C) DSL
D) Satellite
Answer: C) DSL
100. Which of the following is a basic form of website protection from hackers?
A) Password protection
a) Python
b) Java
c) HTML
d) C++
Answer: c) HTML
a) 2ndValue
b) Value_2
c) Value-2
d) @Value
Answer: b) Value_2
Answer: b) #
python
Copy code
print(2 + 3 * 4)
a) 14
b) 20
c) 24
d) 11
Answer: a) 14
a) List
b) Dictionary
c) Set
d) Pointer
Answer: d) Pointer
10. In which language would you typically use the keyword "def" to define a function?
a) Python
b) Java
c) C++
d) JavaScript
Answer: a) Python
110 | P a g e Mr. Sanjeeb Das
11. What is the correct syntax to create a function in Python?
a) function myFunction():
b) def myFunction():
c) create myFunction():
d) function: myFunction()
a) for
b) while
c) do-while
d) All of the above
python
Copy code
x = 10
y = 5
print(x // y)
a) 2
b) 2.0
c) 5
d) 5.0
Answer: a) 2
a) class
b) def
c) structure
d) function
Answer: a) class
Answer: c) Array
a) print()
b) input()
c) read()
d) scan()
Answer: b) input()
a) list(1, 2, 3)
b) [1, 2, 3]
c) {1, 2, 3}
d) (1, 2, 3)
Answer: b) [1, 2, 3]
20. In which language would you typically use the keyword "public" to define the visibility of
a class member?
Answer: b) Java
Answer: b) Skips the current iteration and continues to the next one
a) Inheritance
b) Polymorphism
c) Encapsulation
d) All of the above
23. Which of the following keywords is used for error handling in Python?
a) exception
b) error
c) try
d) catch
Answer: c) try
24. Which of the following is the correct way to write an 'if' statement in Python?
a) if x = 10
b) if x == 10:
c) if x 10:
d) if (x == 10)
Answer: b) if x == 10:
26. Which of the following statements will NOT result in an error in Python?
a) x = 10 + "hello"
b) x = 10 + 5
c) x = "hello" + 5
d) x = 5 - "hello"
Answer: b) x = 10 + 5
27. What is the default return value of a function in Python that does not explicitly return
anything?
a) None
b) 0
c) False
d) ""
Answer: a) None
a) &&
b) and
c) +
d) **
Answer: b) and
a) func
b) function
c) return
d) void
Answer: d) void
a) +
b) -
c) *
d) %
Answer: d) %
a) print()
b) echo()
c) println()
d) write()
Answer: c) println()
python
Copy code
print(3 ** 2)
Answer: b) 9
36. Which of the following operators is used to compare two values in Python?
a) =
b) ==
c) !=
d) Both b and c
python
Copy code
x = [1, 2, 3]
x.append(4)
print(x)
a) [1, 2, 3]
b) [1, 2, 3, 4]
c) (1,
a) return
b) break
c) exit
d) stop
Answer: a) return
python
Copy code
x = "Hello"
a) H
b) e
c) l
d) o
Answer: b) e
a) import "module"
b) import module
c) include module
d) use module
a) while
b) for
c) until
d) do-while
Answer: c) until
a) // comment
b) /* comment */
c) ''' comment '''
d) # comment
57. Which of the following operators is used for logical AND in Python?
Answer: b) and
58. In C, which library function is used to read input from the user?
a) read()
b) scanf()
c) input()
d) get()
Answer: b) scanf()
a) catch
b) error
c) try
d) throw
Answer: c) try
python
Copy code
x[1] = 20
print(x)
a) function
b) class
Answer: b) class
a) &
b) +
c) %
d) &&
Answer: b) +
a) for
b) while
c) repeat
d) do-while
Answer: c) repeat
python
Copy code
x = [2, 4, 6]
a) 2
b) 4
c) 6
d) Error
Answer: c) 6
67. Which of the following is the correct syntax for defining a function in C++?
a) void functionName()
b) functionName() void
c) function functionName()
d) def functionName()
68. Which of the following data types is used to store a single character in C++?
a) string
b) char
c) int
d) float
Answer: b) char
javascript
Copy code
let x = 10;
let y = 5;
console.log(x + y);
a) 105
b) 15
c) x + y
d) Error
Answer: b) 15
70. Which of the following is a correct syntax for a for loop in Python?
72. In Python, which of the following functions is used to convert a string to an integer?
a) str()
b) int()
c) float()
d) list()
Answer: b) int()
Answer: b) Skips the rest of the current loop iteration and moves to the next iteration
75. Which of the following is a valid Python data type for handling true/false values?
a) bool
b) integer
Answer: a) bool
a) include()
b) <include>
c) #include
d) include<>
Answer: c) #include
python
Copy code
x = 10
y = 3
print(x % y)
a) 3
b) 1
c) 0
d) 10
Answer: b) 1
78. In C, which of the following functions is used to print output to the console?
a) printf()
b) print()
c) output()
d) display()
Answer: a) printf()
a) int x = 5;
b) 5 = int x;
c) x int = 5;
d) var int x = 5;
80. Which of the following is the correct syntax for a comment in JavaScript?
a) // This is a comment
b) # This is a comment
c) /* This is a comment */
d) Both a and c
a) 0
b) null
c) Undefined
d) Garbage value
Answer: b) null
a) constant
b) const
c) final
d) Python does not have a keyword for constants
python
Copy code
print(4 * 3 // 2)
a) 6
b) 5
c) 12
d) 7
Answer: a) 6
84. Which of the following can be used to perform bitwise AND in Python?
a) &&
b) &
Answer: b) &
a) **
b) ^
c) *
d) %
Answer: a) **
a) 2 bits
b) 4 bits
c) 8 bits
d) 16 bits
Answer: c) 8 bits
87. Which data type does not allow duplicate elements in Python?
a) List
b) Tuple
c) Set
d) Dictionary
Answer: c) Set
a) try-catch block
b) if-else block
c) switch-case block
d) for-each loop
a) C++
b) Java
c) Python
d) Swift
Answer: c) Python
a) To declare a constant
b) To define an unchangeable class
c) To define an unchangeable method
d) All of the above
a) 2 bytes
b) 4 bytes
c) 8 bytes
d) 16 bytes
Answer: b) 4 bytes
a) List
b) Tuple
c) Dictionary
d) Set
Answer: c) Dictionary
95. Which of the following is used to iterate over a sequence of elements in Python?
125 | P a g e Mr. Sanjeeb Das
a) while loop
b) for loop
c) range function
d) Both b and c
a) new ClassName()
b) ClassName.new()
c) ClassName()
d) instance = ClassName.new()
Answer: c) ClassName()
97. Which of the following can be used to store a sequence of values in JavaScript?
a) array
b) tuple
c) list
d) object
Answer: a) array
a) x = 10 + 5
b) x = "10" + 5
c) x = 10 * "hello"
d) x = 10 - "hello"
Answer: b) x = "10" + 5
99. Which of the following is the correct syntax for defining a class in Python?
a) class MyClass:
b) class = MyClass():
c) def MyClass():
d) class MyClass():
Artificial Intelligence
16. Which of the following is a popular dataset used for image classification tasks?
o A. IMDB
o B. MNIST
o C. Reuters
o D. Gutenberg
Answer: B
17. What is “feature extraction” in computer vision?
o A. The process of categorizing text
o B. Identifying edges, shapes, or colors in images
o C. Converting text to vectors
o D. Filtering irrelevant data
Answer: B
18. Which type of neural network is primarily used in image processing?
o A. CNN (Convolutional Neural Network)
o B. RNN (Recurrent Neural Network)
o C. MLP (Multilayer Perceptron)
o D. KNN (K-Nearest Neighbors)
Answer: A
31. Which neural network architecture is best suited for sequential data?
o A. CNN
o B. RNN
o C. MLP
o D. GAN
Answer: B
32. In a neural network, which layer type is commonly used for non-linearity?
o A. Input Layer
o B. Activation Layer
o C. Pooling Layer
o D. Output Layer
Answer: B
33. Which of these deep learning techniques is used for generating new data
samples?
o A. CNN
o B. RNN
o C. GAN (Generative Adversarial Network)
o D. DNN (Deep Neural Network)
Answer: C
34. What is the primary purpose of dropout in neural networks?
o A. To add more neurons to the network
o B. To prevent overfitting
o C. To improve computational efficiency
o D. To increase the model's capacity
Answer: B
35. Which optimizer is commonly used for training deep neural networks?
o A. Adam
o B. Gradient Boosting
o C. Mean Shift
o D. Stochastic Gradient Clustering
Answer: A
36. What type of neural network is typically used in image recognition tasks?
o A. Recurrent Neural Network (RNN)
o B. Convolutional Neural Network (CNN)
o C. Decision Tree
o D. Random Forest
Answer: B
37. Which of the following is a type of pooling in CNNs?
o A. Average Pooling
o B. Density Pooling
o C. Weighted Pooling
o D. Distribution Pooling
Answer: A
11. Which component provides the foundation for all computer components to
communicate?
o A) CPU
o B) Motherboard
o C) PSU
o D) Network Card
Answer: B) Motherboard
12. A CPU socket is found on:
o A) Motherboard
o B) Hard Disk
o C) Power Supply
o D) RAM
Answer: A) Motherboard
13. What type of component is connected to a PCIe slot?
o A) Graphics Card
o B) Hard Disk
o C) RAM
o D) BIOS
Answer: A) Graphics Card
14. What does CMOS stand for?
o A) Complementary Metal-Oxide Semiconductor
o B) Central Memory Operating System
o C) Current Mode of System
o D) Control Memory Operating System
Answer: A) Complementary Metal-Oxide Semiconductor
15. The Northbridge on a motherboard primarily handles communication with the:
o A) CPU and RAM
o B) Hard Drive and SSD
o C) USB Ports
o D) Network Card
Answer: A) CPU and RAM
21. In which topology does each computer connect to every other computer?
o A) Star
o B) Mesh
o C) Bus
o D) Ring
Answer: B) Mesh
22. The topology where each node is connected to a single central device is:
o A) Ring
o B) Star
o C) Mesh
o D) Bus
Answer: B) Star
23. The Internet is an example of a:
o A) LAN
o B) WAN
o C) MAN
o D) PAN
Answer: B) WAN
24. A PAN typically connects devices within:
o A) A country
o B) A building