Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
2 views

Computer Knowledge Mcqs

The document consists of multiple-choice questions (MCQs) related to computer knowledge, covering topics such as computer hardware, software, and basic concepts. It includes questions about the history of computers, types of computers, memory, and various input/output devices. The document serves as a study guide for individuals preparing for exams in computer knowledge.

Uploaded by

pranav4260
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Computer Knowledge Mcqs

The document consists of multiple-choice questions (MCQs) related to computer knowledge, covering topics such as computer hardware, software, and basic concepts. It includes questions about the history of computers, types of computers, memory, and various input/output devices. The document serves as a study guide for individuals preparing for exams in computer knowledge.

Uploaded by

pranav4260
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM

COMPUTER KNOWLEDGE
BASICS OF COMPUTER (b) Semen Korsakov
11. What is the IQ level of a computer? (c) Herman Hollerith
(a) Zero (b) 100 (d) Joseph Marie Jacquard
1. The first electronic digital computer
(c) infinite (d) 1024 Sol. (c)
contained _________ ?
Sol. (a)
(a) Electronic Valves
22. In banking, railways etc which computers
(b) Neural Networks
12. A hybrid computer are used ?
(c) Fuzzy Logic
(a) Resembles digital computer (a) Mini Computers (b) Micro Computers
(d) Semiconductor memory
(b) Resembles analogue computer (c) Main Frames (d) Super Computers
Sol. (a)
(c) Resembles Both A Digital And Analogue Sol. (c)
Computer
2. What is the sequence of events that occurs in
(d) None of the above 23. In which of the following number systems
the computer when it is interpreting and
Sol. (c) only 1’s and 0's exist?
executing an instruction known as?
(a) Hexadecimal (b) Octal
(a) Execution cycle (b) Instruction Cycle
13.Which of the following IC was used in third (c) Binary (d) Decimal
(c) Working cycle (d) Execute cycle
generation of computers? Sol. (c)
Sol. (b)
(a) SSI (b) MSI
(c) LSI (d) BOTH A AND B 24. Which of the following features are not
3. __________ computers represent data as
Sol. (d) supported by CPU?
variable points along a continuous spectrum of
(a) It performs all kind of Data processing
values.
14. A dumb terminal has operations.
(a) Analog (b) Digital
(a) an embedded microprocessor (b) It stores data, immediate results and
(c) Precise (d) Mainframe
(a) extensive memory instructions.
Sol. (a)
(c) independent processing capability (c) It controls the operation of all parts of
(d) A Keyboard And Screen computers.
4. Computers use the __________ number
Sol. (d) (d) It Can Design The Software Programs By
system to store data and perform calculations.
Itself.
(a) decimal (b) hexadecimal
15. Which of the following was a special Sol. (d)
(c) Binary (d) octa
purpose computer?
Sol. (c)
(a) ABC (b) ENIAC 25. A silicone piece with millions of transistors
(c) EDVAC (d) All of the above in it is known as
5. Which of the following technology was used
Sol. (a) (a) Chip (b) Circuit
in Second Generation of Computer?
(c) Digital Gate (d) Multiplexer
(a) electronic valves (b) Transistors
16. In most of the IBM PCs, the CPU, the device Sol. (a)
(c) SSI (d) VLSI
drivers, memory, expansion slots and active
Sol. (b)
components are mounted on a single board. 26. How can we execute the Machine
What is the name of the board? language?
6. The concept of multiprocessing was
(a) Motherboard (b) Daughterboard (a) It cannot be executed
introduced in which generation of computer?
(c) Bredboard (d) Fatherboard (b) It can be executed using separate machine
(a) first (b) second
Sol. (a) (c) It Can Be Directly Executed By Cpu
(c) third (d) Fourth
(d) We use special assembler
Sol. (d)
17. Which level language is Assembly Language Sol. (c)
?
7. Which of the following languages was used
(a) high-level programming language 27. Which of the given options is NOT the
for scientific calculations?
(b) medium-level programming language basic/major function of Computer System?
(a) BASIC (b) FORTRAN
(c) Low-Level Programming Language (a) A computer displays the processed data in
(c) COBOL (d) UNIVAC
(d) machine language the form of output
Sol. (b)
Sol. (c) (b) A computer accepts the input from the user
(c) A Computer Scours The Internet For Content
8. _______________ endeavours to simulate
18. ____________ stores all the data and the (d) A computer processes the data given by the
the natural intelligence of human beings into
instructions required for processing. user
machines, thus making them behave
(a) ALU (b) CU Sol. (c)
intelligently.
(c) MEMORY (d) NONE OF THESE
(a) Meta Intelligence
Sol. (c) 28. FORTRAN stands for __________.
(b) Artificial Intelligence
(a) For Translation
(c) Systematic Intelligence
19. Which one is not a characteristic of (b) Format Transformation
(d) Natural Intelligence
computer? (c) Fork Transformation
Sol. (b)
(a) ACCURACY (b) DILIGENCY (d) Formula Translation
(c) IQ (d) RELIABILITY Sol. (d)
9. Out of the following, which one is still useful
Sol. (c)
if we want to add numbers?
29. Which is used for manufacturing chips?
(a) UNIVAC (b) ABACUS
20. Blaise Pascal a French scientist invented an (a) Bus (b) Control unit
(c) ENIAC (d) EDSAC
adding machine called_________. (c) Semiconductors (d) (a) and (b) only
Sol. (b)
(a) Pascal’s calculator (b) Blaise calculator Sol. (c)
(c) Abacus (d) Arithmetic computer
10. Which of the following is not a type of
Sol. (a) 30. Properly arranged data is called
computer code?
(a) Field (b) Words
(a) EDIC (b) ASCII
21. Who invented the punch card? (d) Information (d) File
(c) BCD (d) EBCDIC
(a) Charles Babbage Sol. (c)
Sol. (a)

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 1


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
12. Which printer is used to print only (c) External Mass Memory
COMPUTER HARDWARE characters and symbols and cannot print (d) Static Memory.
graphics? Sol. (a)
(a) Ink-jet Printer (b) Thermal Printer
1. DTP stands for
(c) Laser Printer (d) Daisywheel Printer 24. Data is written to and read from the disk via
(a) Desktop Publishing Software
Sol. (d) a magnetic head mechanism in the floppy drive.
(b) Device to Publish
(a) Cylinder (b) Cluster
(c) Database to Software
13. When a key is pressed on the keyboard, (c) Read/Write (d) None of these
(d) None of these
which standard is used for converting the Sol. (c)
Sol. (a)
keystroke into corresponding bits?
(a) ANSI (b) EBCDIC 25. A hard disk is divided into tracks which are
2. Why do we need a Computer Monitor?
(c) ASCII (d) ISO further subdivided into:
(a) To keep the computer overheating
Sol. (c) (a) clusters (b) Sectors
(B) To See What The Computer Is Doing
(c) vectors (d) heads
(c) Because it is like the brain of the computer
14. Which type of devices are speakers or Sol. (b)
(d) None of these
computer headphones?
Sol. (b)
(a) Input (b) Output 26. During the boot process, the ____________
(c) Input/Output (d) Software looks for the system files.
3. The Joystick is a stick that moves the graphic
Sol. (b) (a) CD (b) BIOS
cursor in the direction the stick is moved.
(c) CPU (d) DVD
(a) Parallel (b) Horizontal
15. Optical Mouse was introduced by Sol. (b)
(c) Straight (d) Vertical
(a) Dell, 1526 (b) Dell, 1835
Sol. (d)
(c) Microsoft, 1999 (d) Microsoft, 1995 27. The barcode which is used on all types of
Sol. (c) items, is read by a scanning device directly into
4. The device primarily used to provide
the computer. What is the name of this
hardcopy is the
16. Which is the smallest Unit of Computer scanning device?
(a) CRT (b) Computer Console
Memory? (a) LASER SCANNER (b) Wand
(c) Printer (d) card reader
(a) Nibble (b) Kilobyte (c) OCR (d) MICR
Sol. (c)
(c) Byte (d) BIT Sol. (a)
Sol. (d)
5. Which among the device that converts
28. The resolution of a monitor is measured in
computer output into a form that can be
17. Half of the Byte is called as (a) Megabits (b) Hz
transmitted over a telephone line?
(a) Nibble (b) Bits (c) Pixels Per Inch (PPI) (d) Inches (diagonal)
(a) Teleport (b) Multiplexer
(c) Kilobyte (d) Megabyte Sol. (c)
(c) Concentrator (d) MODEM
Sol. (a)
Sol. (d)
29. Which of the following memories must be
18. The smallest and Fastest memory of the refreshed many times per second?
6. A light sensitive device that converts
computer is? (a) EPROM (b) ROM
drawing, printed text of other images into
(a) RAM (b) Cache Memory (c) Static RAM (d) DYNAMIC RAM
digital form is:-
(c) Registers (d) ROM Sol. (d)
(a) Keyboard (b) Plotter
Sol. (c)
(C) Scanner (d) OMR
30. Laser Jet printer speeds are measured in
Sol. (c)
19. _____ are the temporary memory units that pages per minute (ppm) what do we use to
store data and are located in the processor. measure dot-matrix printers?
7. Which among the following is not the type of
(a) Cache Memory (b) REGISTERS (a) lines per inch
keys on Keyboard?
(c) RAM (d) ROM (b) lines per sheet
(a) Alphabet Keys (A-Z)
Sol. (b) (c) characters per inch
(b) Numeric Keys (0-9)
(d) Characters Per Second
(c) Function Keys (F1 to F12)
20. What is the abbreviation of EPROM? Sol. (d)
(d) Roaster Keys (R1 & R2)
(a) Electronic Programmable Read Only
Sol. (d)
Memory
(b) Electronic Erasable Programmable Read only
COMPUTER SOFTWARE
8. Which key is used to exit from any
Memory
application? 01. The component which makes a computer to
(c) Electrically Programming Random only
(a) Esc Key (b) Spacebar Key work through commands is called _____.
Memory.
(c) Caps Lock Key (d) Insert Key (a) SOFTWARE (b) hardware
(d) NONE OF THESE
Sol. (a) (c) malware (d) junkware
Sol. (d)
Sol. (a)
9. Which input device is used to read data
21. What is the name given to the memory
character by character, typed or handwritten? 02. Which of the following is not a type of
which works on time sharing principle in order
(a) OMR (b) MICR software?
to create an illusion of infinite memory space?
(c) OCR (d) BCR (a) System software (b) Application software
(a) Cache Memory (b) VIRTUAL MEMORY
Sol. (c) (c) Utility software (d) DRIVER SOFTWARE
(c) Register (d) Primary Memory
Sol. (b) Sol. (d)
10. Which among the following is used in
banking industry cheque Evaluation? 03. Which software is used to manage and
22. Which type of ROM can be erased by UV
(a) BCR (b) MICR control the hardware components and allows
Light?
(c) QR (d) OMR interaction between the hardware and the
(a) ROM (b) Mask ROM
Sol. (b) other different types of software?
(c) EPROM (d) EEPROM
Sol. (c) (a) Application software (b) System Software
11. Which among the following device is also (c) Utility software (d) Operating system
called as Print Scanner or Point of Sale? Sol. (b)
23. Which of the following is normally used to
(a) BCR (b) MICR
initialize a computer system's hardware?
(c) QR (d) JOYSTICK 04. The process of finding errors/defects/bugs
(a) Bootstrap Memory
Sol. (a) in the software program is called
(b) Volatile Memory

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 2


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(a) Debugging (b) Interpreting 15. The legal right to use software based on (b) More Interactive, Close To The User,
(c) Compiling (d) Testing specific restrictions is granted via a ………… Generally Written In High-Level Language .
Sol. (a) (a) Software privacy policy (c) Easy to carry, Installation is Complex
(b) Software License (d) Low Level Language, Easy to install and
05. Which of the following is not application (c) Software password manager highly compact
software? (d) Software log Sol. (b)
(a) MS-Word (b) Google Docs Sol. (b)
(c) Adobe Acrobat (d) Compiler 26. Which of the following is not an open
Sol. (d) 16. When you turn on the computer, the boot source software?
routine will perform this test- (a) LibreOffice
06. Which of the following are known as office- (a) RAM test (b) Disk drive test (b) Microsoft Office
oriented application software? (c) Memory test (d) Power-On-Self-Test (c) GNU image manipulation
(a) Interpreters, Compilers, editors Sol. (d) (d) MySQL
(b) Network software, backup system Sol. (b)
(c) Word Processors, Spreadsheets, Database 17. Copying computer program or software
(d) Both a and c without permission of its author is called – 27. Developing open source software can mean
Sol. (c) (a) Highway robbery (b) Larceny _____________.
(c) Software Piracy (d) Embezzlement (a) basing it on open source technologies and
07. What is the full form of GUI? Sol. (c) open standards.
(a) Graphical Universal Interface (b) working collaboratively with other groups.
(b) Graphical User Interface 18. Antivirus software is an example of …….. (c) To Redistribute The Source Code Widely.
(c) General Utility Interface (a) business software (b) an operating system (d) to use the source code widely.
(d) General Universal Interface (c) A Security Utility (d) an office suite Sol. (c)
Sol. (b) Sol. (c)
28. What is another name given to 'proprietary
08. Which among the following is not a type of 19. _____ is a software that is distributed free software'?
utility system software? on a trial basis with the understanding that the (a) Open source software
(a) Antivirus (b) Firewalls user may need or want to pay for it later. (b) Bespoke software
(c) Disk defragmenter (d) MS-DOS (a) openware (b) Shareware (c) Tailor Made software
Sol. (d) (c) adware (d) Open source (d) Closed Source Software
Sol. (b) Sol. (d)
09. Which utility software or program is used to
reduce the size of files to increase the amount 20. The simultaneous execution of two or more 29. A ___________ is a computer program that
of disk space in the computer system? instructions is called takes one or more object files generated by a
(a) Disk cleanup (a) sequential access compiler and combines them into one,
(b) File Compression (b) reduced instruction set computing executable program.
(c) Disk fragmentation (c) Multiprocessing (a) Linker (b) loader
(d) Troubleshooting program (d) disk mirroring (c) utility software (d) none of these.
Sol. (b) Sol. (c) Sol. (a)

10. Which of the following Windows utilities 21. By firmware we understand _______ 30. ____________ is the first layer of software
scans the entire hard drive and erase (or (a) physical equipment used in a computer loaded into computer memory on the time of
delete) any unnecessary files such as temporary system booting (Starts Up).
files from the Internet, and cookies (b) a set of instructions that causes a computer (a) linker (b) application
downloaded while visiting webpages? to perform one or more tasks. (c) Operating System (d) none of these
(a) Disk defragmenter (c) the people involved in the computing Sol. (c)
(B) DISK CLEANUP process.
(c) Backup and Restore wizard (d) A Set Of Programs That Is Pre-Installed Into
(d) All of the above The Read Only Memory Of A Computer During OPERATING SYSTEM
Sol. (b) The Time Of Manufacturing.
Sol. (d) 01. What is an operating system?
11. Linux is an example of ….. (a) interface between the hardware and
(a) Freeware (b) Open Sources Software 22. OSS stands for:- application programs
(c) Shareware (d) Complimentary a) Open System Service (b) collection of programs that manages
Sol. (b) b) Open Source Software hardware resources
c) Open System Software (c) system service provider to the application
12. A computer converts a high level program d) Open Synchronized Software programs
into a low level program with the help of …… Sol. (b) (d) All Of The Mentioned
(a) compiler (b) interpreter Sol. (d)
(c) (A) AND (B) BOTH (d) package 23. A _________is a software program which
Sol. (c) allows us to access the Internet and view web 02. Which one of the following is not true?
pages on our computer. (a) kernel remains in the memory during the
13. Programs written in an assembly language (a) Computer program (b) Internet protocol entire computer session
are converted into machine language in a (c) Web Browser (d) Website (b) Kernel Is Made Of Various Modules Which
computer by …………. Sol. (c) Can Not Be Loaded In Running Operating
(a) Assembler (b) compiler System
(c) interpreter (d) processor 24. Which of the following is an example for (c) kernel is the first part of the operating
Sol. (a) Application Software? system to load into memory during booting
(a) MS-DOS (b) LINUX (d) kernel is the program that constitutes the
14. Any program translated into machine (c) Adobe Photoshop (d) UNIX central core of the operating system
language is called ………. Sol. (c) Sol. (b)
(a) analog program (b) Object Code
(c) personal program (d) official program 25. What are features of application software? 03. Which one of the following errors will be
Sol. (b) (a) Generic usability, Reliability and Supported handle by the operating system?
environment (a) lack of paper in printer

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 3


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(b) connection failure in the network Sol. (b) (a) Makes it complicated for the user to use the
(c) Power Failure computer system
(d) all of the mentioned 15. Linux is a (b) De-allocates the memory when the process
Sol. (c) (a) Multi User Operating System needs it or still running
(b) Single user Operating System (c) Acts as a blocking wall between hardware
04. The main memory accommodates ____ (c) Real time Operating System and its user
(a) CPU (b) user processes (d) Batch Processing Operating System (d) To Manage The Resources Of The Computer
(c) operating system (d) all of the mentioned Sol. (a) System
Sol. (a) Sol. (d)
16. What are common services provided by an
05. Linux is a/an ____ . operating system ? 24. Which of the following works by dividing
(a) Application software i) Program execution the processor’s time?
(b) Word processor ii) I/O operations (a) single task operating system
(c) Database management system iii) File System manipulation (b) Multitask Operating System
(d) Operating Software iv) Communication (c) kernel
Sol. (d) v) Error Detection (d) applications
(a) I, II, III, IV, V (b) Only i and v Sol. (b)
06. DOS stands for_____. (c) Only i, ii and v (d) Only ii, iii and iv
(a) Disk Operating System Sol. (a) 25. __________ manages device
(b) Drive operating system communication via their respective drivers.
(c) Disk operation socket 17. Based on the implementation of threads, (a) Device drivers (b) Interpreters
(d) disk open supply Operating System classifies the threads as (c) Proess (d) Operating System
Sol. (a) (a) Mainframe and Motherboard Level Sol. (d)
(b) Kernel And User Level
07. In a single unit of computer we can use (c) Security and Memory Level INTERNET & E-MAIL
more than ___OS But at a time we may run (d) OS and CPU Level
only one OS. Sol. (b)
1. Who is known as the father of email ?
(a) One (b) Two
(a) Bill Rogers (b) Tim Berners Lee
(c) Three (d) None 18. What are major activities of an operating
(c) Babbage (d) Raymond Tomlinson
Sol. (a) system with respect to resource management?
Sol. (d)
(a) OS provides authentication features for each
08. UNIX stands for __. user by means of passwords.
2. Who is known as the founder of WWW?
(a) union interface Xerox (b) OS ensures that external I/O devices are
(a) Bill Rogers (b) Tim Berners Lee
(b) user normal interface protected from invalid access
(c) Babbage (d) Raymond Tomlinson
(c) user normal interface attempts.
Sol. (b)
(D) UNICODE INFORMATION COMPUTING (c) OS constantly checks for possible error and
SYSTEM, SOURCE the OS takes an appropriate
3. A __________ is a reference to data that the
Sol. (d) action to ensure correct and consistent
reader can follow by clicking or tapping.
computing.
(a) Domain (b) URL
09. Ken Thompson and Dennis Ritchie (d) Os Manages All Kinds Of Resources Using
(c) Hyperlink (d) Landing Page
developed an operating system name__ Schedulers & Cpu Scheduling Algorithms Are
Sol. (c)
(a) MAC (b) window Used For Better Utilization Of Cpu.
(c) UNIX (d) Linux Sol. (d)
4. Find the odd one out
Sol. (c)
(a) UC (b) Opera
19. What is considered as the heart of the
(c) Safari (d) ESET
10. MAC operating system was developed by operating system, which provides the basic
Sol. (d)
____. foundation, memory management file systems,
(a) Steve Jobs (b) Abhinandan program execution?
5. Bluetooth is an example of?
(c) sunder pichai (d) Dennis Richie (a) ALU (b) paging
(a) LAN (b) SAN
Sol. (a) (c) Kernel (d) Shell
(c) PAN (d) WAN
Sol. (c)
Sol. (c)
11. What else is a command interpreter called?
(a) prompt (b) kernel 20. Any device connected to an Operating
6. Storage area for E-mail messages is called
(c) Shell (d) command system is controlled by using ?
(a) folder (b) file
Sol. (c) (a) Device Monitors (b) Device Drivers
(c) MAIL BOX (d) directory
(c) Device Trackers (d) Device Units
Sol. (c)
12. A _________ is a lightweight process and Sol. (b)
forms the basic unit of CPU utilization.
7. An E-mail address typically consists of a user
(a) Process (b) Thread 21. A systematic procedure for moving the CPU
ID followed by the.........sign and the domain
(c) Kernal (d) None of these. to new process is known as?
name that manages the user's electronic post
Sol. (b) (a) Synchronization (b) Context Switching
office box.
(c) Deadlock (d) Starvation
(a) # (b) @ (c) & (d) $
13. BIOS is used? Sol. (b)
Sol. (b)
(a) By Operating System
(b) By compiler 22. Which of the following is TRUE for system
8. Documents converted to..... .can be
(c) By interpreter software in comparison with application
published to the Web.
(d) By application software software?
(a) .doc file (b) http
Sol. (a) (a) They are slower in speed
(c) machine language (d) HTML
(b) They Are Less Interactive
Sol. (d)
14. Which of the following services are NOT (c) They are bigger in size
provide by operating system? (d) They are easier to design and understand
9. The home page of a Website is
(a) Memory Management Sol. (b)
(a) the largest page
(b) People Management
(b) the last page
(c) Device Management 23. Which one of the following is an objective
(c) THE FIRST PAGE
(d) Process Management of the operating system?
(d) the most colourful page

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 4


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
Sol. (c) 20. What is WWWW full form? Sol. (d)
(a) World Wide Women's Web
10. The common name for a modulator- (b) World Wide Wildlife Web 31. The standard protocol of the Internet is
demodulator is (c) WORLD WIDE WEB WORM. (a) TCP/IP (b) Java
(a) MODEM (b) jointer (d) World Wide Women's Week (c) HTML (d) flash
(c) networker (d) connector Sol. (c) Sol. (a)
Sol. (a)
21. What are the differences between Internet 32. Which of the following is the
11. Which is not the feature of Internet? and Intranet? communication protocol that sets the standard
(a) E-mail (b) Newsgroup (a) Intranet is not as safe as Internet. Internet used by every computer that accesses Web-
(c) Chat (d) DESIGNING can be safely privatized as per the need. based information?
Sol. (d) (b) Intranet is general to PCs all over the world (a) XML (b) DML
whereas Internet is specific to few PCs. (c) HTTP (d) HTML
12. Which among the following is a search (c) Internet sites are accessible via the web Sol. (c)
engine? browser in a similar way as websites in the
(a) Internet Explorer (b) Flash intranet, however, only members of internet 33. Which of the following is used by the
(c) GOOGLE (d) Firefox network can access intranet hosted sites. browser to connect to the location of the
Sol. (c) (d) INTERNET PROVIDES A WIDER AND BETTER Internet resources?
ACCESS TO WEBSITES TO A LARGE (a) Linkers (b) protocol
13. Which of the following is true statements POPULATION, WHEREAS INTRANET IS (c) Cable (d) URL
about modems? RESTRICTED. Sol. (d)
(a) Modems use the telephone lines Sol. (d)
(b) A modem's fastest transfer rate is 56 kbps 34. Which of the following is required to create
(c) Modems are no longer used in secure 22. Which of the following service is used to log an HTML document?
network on to remote computer that is attached to (a) Browser (b) Internet
(d) None of these internet? (c) TEXT EDITOR (d) Search engine
Sol. (a) (a) Telnet (b) VoIP Sol. (c)
(c) IRC (d) FTP
14. ....... is the encompassing term that involves Sol. (a) 35. A ......... is the term used when a search
the use of electronic platforms-intranets, engine returns a Web page that matches the
extranets and the Internet-to conduct a 23. Which of the following protocols are used in search criteria.
company's business. Email? (a) blog (b) HIT
(a) E-commerce (b) E-marketing (a) FTP (b) DHCP (c) link (d) view
(c) E-procurement (d) E-business (c) SMTP (d) ARP Sol. (b)
Sol. (a) Sol. (c)
36. A cookie
15. FTP can transfer files between any 24. Which one of the following protocols (a) STORES INFORMATION ABOUT THE USER'S
computers that have an Internet connection. assigns IP addresses automatically? WEB ACTIVITY
Here, FTP stands for (a) DHCP (b) IP (b) stores software developed by the user
(a) FILE TRANSFER PROTOCOL (c) TCP (d) RCP (c) stores the password of the user
(b) Fast Text Processing Sol. (a) (d) stores the combmands used by the user
(c) File Transmission Program Sol. (a)
(d) Fast Transmission Processor 25. IPv6 addresses are:–
Sol. (a) (a) 32 bits (b) 64 bits 37. The last three letters of the domain name
(c) 128 bits (d) 256 bits describes the type of:-
16. The WWW is made up of the set of Sol. (c) (a) ORGANISATION (DOMAIN NAME)
interconnected ......... that are linked together (b) connectivity
over the Internet. 26. Which of the following displays the name of (c) server
(a) electronic documents (b) WEB PAGES the web page in internet explorer browser? (d) protocol
(c) files (d) All of these (a) Menu bar (b) Title bar Sol. (a)
Sol. (b) (c) Address bar (d) Standard tool bar
Sol. (b) 38. Junk E-mail is also called:-
17. ......... is collection of Web pages and ......... (a) crap (b) spoof
is the very first page that we seen on opening 27. BCC in E-mail means: (c) snifter script (d) SPAM
of Website. (a) Black Composer Copy Sol. (d)
(a) Home page, Web page (b) Blind Composer Copy
(b) WEBSITE, HOME PAGE (c) Black Carbon Copy 39. In HTML, tags consists of keywords enclosed
(c) Web page, home page34 (d) Blind Carbon Copy. within
(d) Web page, Website Sol. (d) (a) flower brackets (b) ANGULAR BRACKETS <>
Sol. (b) (c) parentheses () (d) square brackets [ ]
28. The first browser was invented by………….. Sol. (b)
18. DNS is a host name to IP address translation (a) Robert Cailliau (b) TIM BERNERS-LEE
service. DNS stands for (c) Vint cerf (d) Ted Nelson 40. A stored link to a Web page, in order to
(a) Data Network Server Sol. (b) have a quick an easy access to is later, is called
(b) Domain Network Service .............
(c) DOMAIN NAME SERVER 29. Where broadband connections are (a) WP-Link (b) BOOKMARK
(d) Data Name Server unavailable, _______ are used for wireless (c) Field (d) Length
Sol. (c) Internet connectivity. Sol. (b)
(a) Mobile networks (b) wi-fi
19. Which of the following is NOT an an email (c) SATELLITES (d) Hotspots MS-WORD
client? Sol. (c)
(a) Microsoft Outlook (b) OS X Mail
(c) Lotus (d) HTTP 30. DSL is an example of which connection? 1. Microsoft Word is a
Sol. (d) (a) Network (b) Wireless (a) WORD PROCESSING PROGRAM
(c) Slow (d) BROADBAND (b) Spreadsheet Program

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 5


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(c) Presentation Program 12. What is the shortcut key to create a "New" 24. To start the next page at the current
(d) None of the above document ? position, use-
Sol. (a) (a) Shift + N (b) CTRL + N (a) Blank page (b) Cover page
(c) Alt + N (d) Shift + Ctrl + N (c) PAGE BREAK (d) None of these.
2. What was the initial name of Microsoft Word Sol. (b) Sol. (c)
when it was released?
(a) Multi-Technique Word 13. What is the shortcut key to "Select" a whole 25. Moves the cursor to the beginning of the
(b) Multi-Transition Word document ? document
(c) Multi-Type Word (a) Ctrl + S (b) Ctrl + W (a) Ctrl + Del (b) Ctrl + Backspace
(d) MULTI-TOOL WORD (c) Ctrl + P (d) CTRL + A (c) Ctrl + End (d) CTRL + HOME
Sol. (d) Sol. (d) Sol. (d)

3. Office Button is symbolized with which 14. Which tool can be opted for a synonym 26. Shortcut for 1.5 line spacing is-
feature on MS Word? word in a document? (a) CTRL + 5 (b) Ctrl + 2
(a) Paper (b) RIBBON (a) Auto text (b) Replace (c) Ctrl + 1 (d) None of these
(c) Arrow (d) Office (c) THESAURUS (d) Restore Sol. (a)
Sol. (b) Sol. (c)
27. Ctrl + H is used for-
4. The ___ works with the standard Copy and 15. Values of normal margin (in inches) in ms- (a) OPEN REPLACE BOX (b) Open dialogue box
Paste commands. word is (c) Find (d) none
(a) View tab (a) left-0.5, right-0.5, top-0.5, bottom-0.5 Sol. (a)
(b) Paragraph dialog box (b) left-0.75, right-0.75, top-0.5, bottom-0.5
(c) OFFICE CLIPBOARD (c) LEFT-1, RIGHT-1, TOP-1, BOTTOM-1 28. Quick Access Toolbar is present at ______
(d) All of these (d) left-1.5, right-1.5, top-1, bottom-1 of Office Button in MS Word.
Sol. (c) Sol. (c) (a) Up (b) Down
(c) Left (d) RIGHT
5. What is the blank space outside the printing 16. Which items are placed at the end of a Sol. (d)
area on a page? document
(a) Clipart (b) MARGINS (a) END NOTE (b) Footer 29. Which of the following document settings
(c) Header (d) Footer (c) Foot Note (d) Header can be changed from Home tab?
Sol. (b) Sol. (a) (a) Font Size (b) Adding Bullets
(c) Adjusting Styles (d) ALL OF THE ABOVE
6. Which enables us to send the same letter to 17. We can change the thickness of a line from - Sol. (d)
different people? (a) Line Thick (b) Line Height
(a) Macros (b) Template (c) Line width (d) LINE STYLE 30. In order to select a single word –
(c) MAIL MERGE (d) None of above Sol. (d) (a) Single Click within the word
Sol. (c) (b) DOUBLE CLICK WITHIN THE WORD
18. The minimum number of rows and columns (c) Right Click within the word
7. Word wrap means in MS Word document is (d) Scroll in Word
(a) aligning text with the right margin (a) 1 AND 1 (b) 2 and 1 Sol. (b)
(b) inserting spaces between words (c) 1 and 2 (d) 2 and 2
(c) MOVING TEXT AUTOMATICALLY TO THE Sol. (a) MS - POWERPOINT
NEXT LINE
(d) None of the above 19. How many columns can you insert in a word
1. Microsoft PowerPoint is a presentation
Sol. (c) document in maximum?
program, created by ___________________at a
(a) 40 (b) 45 (c) 63 (d) 55
software company named Forethought, Inc.
8. What is the default file extension for all Sol. (c)
(a) Robert Gaskins and Dennis Austin
Word documents ?
(b) Ada Lovelace
(a).txt (b).xlsx 20. Which of the following is used to create a
(c) Steve Jobs
(c).docs (d).DOCX large capital letter a the beginning of a
(d) Steve wozniak
Sol. (d) paragraph?
Sol. (a)
(a) Text box (b) Word art
9. How can you increase the font size of (c) DROP CAP (d) None of these.
2. __________ is used to write title of slide.
selected text by one point every time ? Sol. (c)
(a) Title Placeholder (b) Text Placeholder
(a) By pressing Ctrl + ;
(c) Object Placeholder (d) None of these
(b) By pressing Ctrl + , 21. What is the default number of lines to drop
Sol. (a)
(c) By pressing Ctrl + [ for drop cap?
(d) BY PRESSING CTRL + ] (a) 3 (b) 10 (c) 15 (d) 20
3. Which key combination is used to duplicate
Sol. (d) Sol. (a)
the current slide?
(a) CTRL + Shift + R (b) CTRL + D
10. What is by default the smallest and largest 22. In Microsoft Word shortcut key CTRL+W is
(c) CTRL + Shift + M (d) Alt + K
font size available in Font Size tool on used for
Sol. (b)
formatting toolbar? (a) open the Print dialog box
(a) 8 AND 72 (b) 8 and 70 (b) Update the current Web page
4. Which of the following fill effects can you use
(c) 8 and 82 (d) 10 and 72 (c) CLOSE THE CURRENT WINDOW
for the slide background?
Sol. (a) (d) None of these
(a) Gradient (b) Texture
Sol. (c)
(c) Picture (d) All of above
11. To select a sentence, click anywhere 23. If a word is typed that is not in MS Word’s
Sol. (d)
on the sentence while holding the following dictionary, a wavy underline appears below the
key. word. What is the colour of the underline that
5. A chart can be put as a part of the
(a) Shift (b) CTRL appears in this situation?
presentation using
(c) Alt (d) Esc (a) BLUE (b) Red
(a) Insert -> Chart
Sol. (b) (c) Green (d) Black
(b) Insert -> Pictures -> Chart
Sol. (a)
(c) Edit -> Chart
(d) View -> Chart

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 6


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
Sol. (a) (a) Alt+I (b) Alt+M (a) insert tab (b) Home tab
(c) Ctrl+M (d) Ctrl+S (c) Design tab (d) Slide show
6. A ………. pre-designed document that already Sol. (c) Sol. (c).
has coordinating fonts, a layout, and a
background. 18. Which shortcut is used to justify the MS – EXCEL
(a) Guide (b) Model selected text in PowerPoint 2019?
(c) Ruler (d) Template (a) Ctrl+J (b) Ctrl+G
Sol. (d) (c) Ctrl+B (d) Ctrl+A 1. What is the intersection of a column and a
Sol. (a) row on a worksheet called ?
7. Which of the following are action you can (a) Column (b) Value
assign to an action button or slide object? 19. In Microsoft PowerPoint 2019 which key is (c) Address (d) Cell
(a) Run a macro (b) Play a sound used to open the animations tab? Sol. (d)
(c) Hyperlink (d) All of above (a) Ctrl+A (b) Alt+A
Sol. (d) (c) Ctrl+B (d) Ctrl+X 2. Which function in Excel tells how many
Sol. (b) numeric entries are there ?
8. What is a trigger, in context of animations ? (a) AVERAGE (b) COUNT
(a) An object to be inserted in the presentation 20. Special effects used to introduce slides in a (c) SUM (d) CHKNUM
(b) An action button that advances to the next presentation are called Sol. (b)
slide (a) Present animations (b) Transitions
(c) The name of a motion path (c) Custom animations (d) Effects 3. In Excel, Columns are labeled as ___
(d) An item on the slide that performs an action Sol. (b) (a) A, B, C, etc (b) 1,2,3 etc
when clicked . (c) A1, A2, etc. (d) $A$1, $A$2, etc.
Sol. (d) 21. Press ___ to end a presentation. Sol. (a)
(a) Tab (b) Esc (c) P (d) E
9. Which of the following is the default page Sol. (b) 4. How many sheets are there, by default, when
setup orientation for slides in PowerPoint ? we create a new Excel file ?
(a) Vertical (b) Portrait 22. What is the default PowerPoint standard (a) 1 (b) 3 (c) 5 (d) 10
(c) Landscape (d) Horizontal layout? Sol. (b)
Sol. (c) (a) Blank (b) Title slide
(c) Title only (d) Comparison 5. What is the total number of rows in Ms
10. Which option allows you to select line, Sol. (b) excel?
curve, freeform or scribble tools? (a) 16,384 (b) 1,048,576
(a) Draw custom path (b) Create effect 23. Which PowerPoint feature allows the user (c) 1,035,360 (d) 65,556
(c) Insert motion path (d) All of the above to create a simple presentation quickly _______ Sol. (b)
Sol. (a) ?
(a) AutoContent Wizard (b) Transition Wizard 6. The name box
11. To add a special visual or sound effect to (c) Chart Wizard (d) Animations (a) Shows the location of the previously active
text or an object is called____________. Sol. (a) cell
(a) Animation. (b) Transition (b) Appears to the left of the formula bar
(c) Both of these (d) None of these 24. Which tab is not available on left panel (c) Appears below the status bar
Sol. (c) when you open a presentation? (d) Appears below the menu bar
(a) Outline (b) Slides Sol. (b)
12. Press ___ to start presentation from the (c) Notes (d) All of above
beginning. Sol. (c) 7. In a worksheet you can select
(a) F5 (b) F6 (c) F7 (d) F8 (a) The entire worksheet (b) Rows
Sol. (a) 25. Want your logo in the same position on (c) Columns (d) All of the above
every slide, automatically? Insert it on the Sol. (d)
13. The minimum zoom size in MS PowerPoint (a) Handout master (b) Notes master
is ____ (c) Slide master (d) All of the above 8. MS Excel function, ISOWEEKNUM(date)
(a) 0 (b) 10 (c) 30 (d) 100 Sol. (c) returns
Sol. (b) (a) ISO week number of the year for a given
26. ___________ Open the Design tab and date
14. _________ slide background option in apply themes and customize slides. (b) Gives the 1ST of the date
PowerPoint lets you want to select a uniform (a) ALT + G (b) ALT + A (c) geographical location of the equator on the
pattern that gives the impression that the slide (c) ALT + R (d) ALT + S given date
is displayed on a material such as cloth or Sol. (a) (d) current time in Indian Standard Office for
stone. the given date
(a) Solid (b) Clipart 27. _______ Delete one character to the left. Sol. (a)
(c) Pattern (d) Gradient (a) Backspace (b) Ctrl+Backspace
Sol. (c) (c) Delete (d) Ctrl+Delete 9. Which key combination is used to hide the
Sol. (a) selected columns?
15. In which of the following presentation views (a) Alt + Shift + Down arrow (b) CTRL + 0
allows you to see thumbnails of all the slides in 28. What is a motion path? (c) Alt + Enter + K (d) CTRL + ALT + M
your presentation to easily rearrange them? (a) A type of animation entrance effect Sol. (b)
(a) Normal view (b) Box view (b) A method of advancing slides
(c) Notes page view (d) Slide sorter view (c) A method of moving items on a slide 10. What is the default alignment of numbers
Sol. (d) (d) All of the above and text in excel?
Sol. (c) (a) Both to the left
16. Which shortcut is used to open the help (b) Both to the right
window in PowerPoint? 29. To insert decorative text __________ (c) Number to left and text to right
(a) F7 (b) F1 (c) F4 (d) F2 (a) SmartArt (b) Text box (d) Number to right and text to left
Sol. (b) (c) Word art (d) None of these Sol. (d)
Sol. (c)
17. In MS PowerPoint which shortcut key is 11. What symbol is used before beginning of
used to insert a new slide? 30. Format background option can be found in each formula in MS Excel?

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 7


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(a) Percentage (%) (b) Equal to (=) Sol. (c) 10. How can you define a field so that when
(c) Dollar ($) (d) Ampersand (&) entering data for that field it will display **
Sol. (b) 24. Another name for a pre-programmed instead of actual typed text
formula in Excel is (a) Input mask
12. How do you display current date only in MS (a) Cell (b) Graph (b) Validation Rule
Excel? (c) Function (d) Range (c) Indexed
(a) Date () (b) Today () Sol. (c) (d) IME Mode
(c) Now () (d) Time () Sol. (b)
Sol. (b) 25. This function merges or joins several text
strings into one text string. 11. Which field type can store photos?
13. What does COUNTA () function do? (a) LEN (b) CONCATENATE (a) Hyperlink
(a) Counts cells having alphabets (c) SUM (d) MAX (b) OLE
(b) Counts empty cells Sol. (b) (c) Both of these can be used
(c) Counts cells having number (d) Access tables can’t store photos
(d) Counts non-empty cells MS – ACCESS Sol. (b)
Sol. (d)
12. The task of arranging data in order is called
14. What is the short cut key to highlight the 1. A database can be best described as (a) Searching (b) Sorting
entire column? (a) Organized collection of data (c) Ordering (d) Shorting
(a) Ctrl + C (b) Ctrl + Enter (b) Useful presentation of data Sol. (b)
(c) Ctrl + Page Up (d) Ctrl + Space Bar (c) Graphical representation of data
Sol. (d) (d) All of above 13. Which of the following database object
Sol. (a) produces the final result to present?
15. __________ is used to Hide the selected (a) Tables (b) Reports
columns. 2. Microsoft Access is a (c) Queries (d) None of the above
(a) Ctrl+0 (b) Alt+M (a) RDBMS (b) OODBMS Sol. (b)
(c) Ctrl+9 (d) none of these. (c) ORDBMS (d) Network database model
Sol. (a) Sol. (a) 14. Old version of MS Access file extension is
changed from .mdb to
16. The __ feature of ms excel quickly 3. What are the columns in a Microsoft Access (a) .mdc (b) .mfc (c) .net (d) .accdb
completes a series of data. table called? Sol. (d)
(a) Auto Filter (b) Auto Complete (a) Rows (b) Records
(c) Auto Fill (d) Auto Sum (c) Fields (d) Columns 15. Which of the following data types
Sol. (c) Sol. (c) automatically generates a consecutive number?
(a) Autonumber (b) Memo
17. In MS Excel, keyboard shortcut keys to 4. What is a form in MS Access? (c) Number (d) Text
create a new workbook is _____ (a) It is a printed page where users will write Sol. (a)
(a) Tab+N (b) Fn+N their data to fill it up
(c) Alt+N (d) Ctrl+N (b) It is an input screen designed to make the 16. In MS Access, Field Value may contain
Sol. (d) vieing and entering data easier (a) Text (b) Date & Time
(c) This is an important part of database used (c) Picture (d) All of the Above
18. Open workbooks can easily be switched by analysts to draw conclusions Sol. (d)
using _____ (d) All of above
(a) Ctrl+S (b) Alt+S Sol. (b) 17. Which of the following expresses correct
(c) Ctrl+Alt (d) Ctrl+Tab order?
Sol. (d) 5. Which of the following database object hold (a) Characters, Fields, Records, Tables, Files,
data? Databases
19. ________is the best alternative to MS Excel (a) Forms (b) Reports (b) Characters, Fields, Records, Tables,
offered by Google Inc. (c) Queries (d) Tables Database, Files
(a) Google Slides (b) Google Sheets Sol. (d) (c) Databases, Tables, Files, Records, Field,
(c) Google Files (d) Google Keep Character
Sol. (b) 6. This data type allows alphanumeric (d) Files, Databases, Tables, Records, Fields,
characters and special symbols. Characters
20. A file that contains one or more worksheets (a) text (b) memo Sol. (a)
to organize data is known as _______ (c) auto number (d) None of the above
(a) Workbook (b) Excelbook Sol. (a) 18. A subset of characters within a data field is
(c) Datasheet (d) Spreadsheet known as
Sol. (b) 7. Which of the following is not a database (a) Byte (b) File
object? (c) Record (d) Data string
21. __________is NOT a Function in Microsoft (a) Tables (b) Queries Sol. (d)
Excel spreadsheets. (c) Relationships (d) Reports
(a) HYPERLINK (b) COUNTIF Sol. (c) 19. Press _____ to quit MS Access.
(c) MIN (d) AVG (a) Tab +F4 (b) Esc+ W
Sol. (d) 8. The size of Yes No field is always (c) Ctrl +F4 (d) Alt+F4
(a) 1 bit (b) 1 byte Sol. (d)
22. _______ are used to add a note or explain a (c) 1 character (d) 1 GB
formula in a cell. Sol. (a) 20. The checking operation performed on input
(a) Excel formula (b) Excel comments data is called the
(c) Excel sheet (d) None of these. 9. This key uniquely identifies each record (a) Control of data (b) Validation of data
Sol. (b) (a) primary key (b) key record (c) Cross check (d) Verification of data
(c) unique key (d) field name Sol. (b)
23. ________ appear at the bottom of the Sol. (a)
Excel window. ROLE OF IT IN
(a) Title bar (b) Formula bar
(c) Work sheet tabs (d) Name box GOVERNANCE

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 8


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
10. Which of the following is the part of the opportunity to contribute towards good
four main types for e-commerce? governance.
1. What is the full form of IT? (a) B2B (b) B2C (a) MyGov. (b) E-kranti
(a) Interest Tracking (c) C2B (d) All of the Above (c) M-governance (d) None of these.
(b) Information Technic Sol. (d) Sol. (a)
(c) Information Technology
(d) Internet technology 11. ………………is any transaction, involving the 23. Full form of UMANG is:-
Sol. (c) transfer or rights to use goods and services, (a) Unified Mobile Application for New-age
which is initiated and or completed by using Governance
2. Which of the following is not a feature of mobile access to computer mediated networks (b) Unified Mobile Application for New-age
smart governance? with the help of an electronic device. Government
(a) Transparent (b) responsive (a) Mobile Commerce (b) e-commerce (c) Unique Mobile Application for New-age
(c) accountable (d) inaccessible (c) both of these (d) none of these Governance
Sol. (d) Sol. (a) (d) Unified Mobile Application for New
Governance
3. ___________ e implies government 12. Which one is disadvantage of E- Sol. (a)
functioning with the application of ICT governance?
(Information and Communications Technology). (a) Real time update (b) Cost reduction 24. Which is not an advantage of e-
(a) E- technology (b) E- governance (c) Accessibility (d) Digital divide governance?
(c) E- admin (d) None of these Sol. (d) (a) Increased access to information
Sol. (c) (b) Convenience
13. When was digital india program launched? (c) Improved Customer Service
4. National E-governance plan was established (a) 02 july 2006 (b) 01 july 2005 (d) None of these
in ______ ? (c) 01 july 2015 (d) 15 july 2005 Sol. (d)
(a) 18 june 2006 (b) 18 july 2008 Sol. (c)
(c) 18 may 2003 (d) 18 may 2006 25. Full form of CSC?
Sol. (d) 14. Digital india has ________ pillers. (a) Common Services Centers
(a) 12 (b) 15 (c) 9 (d) 10 (b) Customer Services Center
5. E-commerce involves buying and selling of: Sol. (c) (c) Common Services Customer
(a) International goods (d) None of these.
(b) Electronic goods 15. Which of the following is/are pillar of digital Sol. (a)
(c) Products related to computers India Program?
(d) Products and services over the Internet
Sol. (d)
(a) Broadband Highways IMPORTANT MCQS
(b) Public Internet Access Programme
(c) eKranti - Electronic delivery of services
6. Which of the following is related to the 1. Every device on the Internet has a
(d) All of above
National Super Computing Mission of the unique______ address (also called an “Internet
Sol. (d)
Government of India? address”) that identifies it in the same way that
(a) Param 8000 (b) Param 10000 a street address identifies the location of a
16. First Digital state in India?
(c) Param Dhavak (d) Param Shivay house.
(a) Delhi (b) Mumbai
Sol. (d) (a) DH (b) DA (c) IP (d) IA
(c) Kerala (d) Banglore
Sol. (c)
Sol. (c)
7. Regarding E-governance, which of the
following statements is/are correct? 2. To send another station a message, the main
17. How many types of e-governance are
(A) Decreasing transparency is an ICT enabled thing a user has to know is
there?
advantage of E-Governance. (a) how the network works
(a) 4 (b) 5 (c) 6 (d) 7
(B) E-governance is related to the (b) the other station’s address
Sol. (a)
implementation of ICT in government processes (c) whether the network is packet-switched or
and functions. circuit switched
18. Interaction between the government and
(C) Common Service Centres (CSC’s) help in (d) whether this is a voice or data network
the citizens is ___.
providing and using E-Governance related Sol. (b)
(a) G2G (b) G2B (c) G2C (d) G2E
services. Sol. (c)
Choose the correct option: 3. Which of the following is the extension of
(a) (A), (B) and (C) (b) (B) and (C) only Notepad?
19. What is G2G in e-governance?
(c) (B) and (C) only (d) (A) and (B) only (a).txt (b).xls (c).ppt (d).bmp
(a) Government to Governor
Sol. (c) Sol. (a)
(b) Government to Government
(c) Government to guide
8. Which of the following are the benefits of e- 4. When you save a presentation,(a) all slides in
(d) Government to goal
governance system? a presentation are saved in the same file
Sol. (b)
1. Simplicity, efficiency and accountability (b) two files are created; one for graphics and
2. Quality service to citizens one for content
20. What type of interaction are Aadhar,
3. Better access to information (c) a file is created for each slide
UMANG ?
4. expanded reach of governance (d) a file is created for each animation or
(a) G2G (b) G2B (c) G2C (d) G2E
(a) 1, 2 and 3 only (b) 1, 2 and 4 only graphic
Sol. (c)
(c) 3 and 4 only (d) 1, 2, 3 and 4 Sol. (a)
Sol. (d) 21. AEPS stands for-
5. Bringing data from a word processing
(a) Aadhar Enabled Payment system
9. Which of the following mobile payment program into a database program is known as:
(b) Aadhar Enabled Penalty system
application is developed by the National (a) exporting (b) batch processing
(c) Aadhar Enabled Payment school
Payments Corporation of India based on UPI? (c) importing (d) mining
(d) None of these
(a) MYGOV (b) BHIM Sol. (c)
Sol. (a)
(c) UMANG (d) PhonePe
Sol. (b) 6. Storing same data in many places is called
22. _____________ is a technology-driven
(a) iteration (b) concurrency
platform that would provide people with the
(c) redundancy (d) enumeration
Sol. (c)

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 9


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(b) Integrated Services Digital Network
7. _________ servers store and manages files 18. The pattern of printed lines on most (c) Internet Services Digital Network
for network users. products are called . (d) Integrated System Digital Network
(a) Authentication (b) Main (a) prices (b) OCR Sol. (b)
(c) Web (d) File (c) scanners (d) barcodes
Sol. (d) Sol. (d) 30. BASIC is a computer programming language.
It Stands for ____________.
8. Which of the following uses a handheld 19. Most mail programmes automatically (a) Beginners All-purpose Symbolic Instruction
operating system ? complete the following two parts in an e-mail? Code.
(a) A super computer (b) A personal computer (a) From : and Body: (b) From: and Date: (b) Basic All-purpose Symbolic Instruction Code
(c) A laptop (d) A PDA (c) From: and To: (d) From and Subject: (c) Beginners All-purpose System Instruction
Sol. (d) Sol. (b) Code .
(d) Beginners All-purpose Symbolic Instruction
9. To display the contents of a folder in 20. The number of pixels displayed on a screen Character .
Windows Explorer you should– is known as the screen– Sol. (a)
(a) click on it (b) collapse it (a) resolution (b) colour depth
(c) name it (d) give it a password (c) refresh rate (d) viewing size 31. What is the full form of ‘MAN’?
Sol. (a) Sol. (a) (a) Man Area Network
(b) Meter Area Network
10. …………….. devices convert human- 21 . Word processing , spreadsheet , and photo- (c) Metropolitan Area Network
understandable data and programs into a form editing are example of – (d) Manage Area Network
that the computer can process. (a) application software Sol. (c)
(a) Printing (b) Output (b) system software
(c) Solid state (d) Input (c) operating system software 32. What is the term used to denote the
Sol. (d) (d) platform software repetition of data in DBMS?
Sol. (a) (a) Repeating (b) Restrict
11. The software that is used to create text- (c) Reappear (d) Redundancy
based documents are referred to as– 22. If you wish to extend the length of the Sol. (d)
(a) DBMS (b) suites network without having the signal degrade, you
(c) spreadsheets (d) word Processors would use a — 33. Raw, unprocessed facts, including text,
Sol. (d) (a) repeater (b) router numbers, images, and sounds, are called
(c) gateway (d) switch ______
12. …………….. is a Windows utility program that Sol. (a) (a) Applets (b) Data
locates and eliminates unnecessary fragments (c) Metaware (d) Product
and rearranges files and unused-disk space to 23. A—-------- is approximately a million bytes. Sol. (b)
optimize operations. (A) gigabyte (b) kilobyte
(a) Backup (b) Disk Cleanup (c) megabyte (d) terabyte 34. Which of the following is necessary to track
(c) Disk Defragmenter (d) Restore Sol. (a) computer, while connecting to Internet?
Sol. (c) (a) System Number (b) Memory
24. The time it takes a device to locate data and (c) IP (d) VP
13. A (n) …………….. appearing on a web page instructions and make them available to CPU is Sol. (c)
opens another document when clicked. known as –
(a) anchor (b) URL (a) clock speed (b) a processing cycle 35. What is the maximum number, that each of
(c) hyperlink (d) reference (c) CPU speed (d) access time the four parts of an IP Address can have?
Sol. (c) Sol. (d) (a) 345 (b) 255 (c) 197 (d) 301
Sol. (b)
14. Which of the following is used to write 25. ——– controls the way in which the
WebPages? computer system functions and provides a 36. Which of the following extension is used to
(a) HTML (b) Telnet means by which users are interact with the save image in the computer?
(c) HTTP (d) URL computer. (a) .cmd (b) .xls (c) .vlc (d) .jpeg
Sol. (a) (a) The platform Sol. (d)
(b) The operating system
15. The ALU and control unit of most of the (c) Application software 37. SRAM retains data as long as power is
microcomputer are combined and (d) The motherboard provided to the memory chip and need not be
manufactured in a single silicon chip. What it is Sol. (b) refreshed periodically. What does ‘S’
called? represents?
(a) ALU (b) Touchpad 26. ——– means that the data contained in a (a) Stagnant (b) Storage
(c) Control Unit (d) Microprocessor database is accurate and reliable. (c) Simple (d) Static
Sol. (d) (a) Data redundancy (b) Data integrity Sol. (d)
(c) Data reliability (d) Data consistency
16. A characteristic of a file server is which of Sol. (b) 38. The computer’s capability of distinguishing
the following? spoken words is called _________.
(a) Manages file operations and is shared on a 27. A(n) —— is a private corporate network, (a) Voice analysis
network used exclusively by company employees. (b) Speech acknowledgment
(b) Manages file operations and is limited to (a) Internet (b) local area network (c) Speech interpretation
one PC (c) peer-to-peer (d) intranet (d) Voice recognition
(c) Acts as fat client and is shared on a network Sol. (d) Sol. (d)
(d) Acts as fat client and is limited to one PC
Sol. (a) 28. Fullform of ALGOL is 39. A(n) -----system is a small, wireless
(a) Algorithmic language (b) Arithmatic Logic handheld computer that scans an item’s tag
17. Which key is used in combination with (c) Algorithm Logica (d) None of these and pulls up the current price (and any special
another key to perform a specific task ? Sol. (b) offers) as you shop.
(a) function (b) space bar (a) PSS (b) POS
(c) arrow (d) control 29. ISDN stands for __________ (c) Inventory (d) data mining
Sol. (d) (a) Integrated Services Digital Net Sol. (a)

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 10


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
Sol. (a) (a) larger the pixels.
40. What happens when you click on (b) closer together the pixels.
insert>Picture>Clip Art 51. The point at which the flow of text in a (c) further apart the pixels.
(a) It inserts a clipart picture into document document moves to the top of a new page– (d) less clear the screen is.
(b) It lets you choose clipart to insert into (a) Page insert (b) Page break Sol. (b)
document (c) Page format (d) All of the above
(c) It opens Clip Art taskbar Sol. (b) 63. In laser printers, printing is achieved by
(d) It inserts symbols deflecting laser beam on to __________ surface
Sol. (b) 52. Main memory works in conjunction with of a drum.
_________. (a) Magnetic (b) Electric
41. _____ and _____ refers to the action of (a) Special function cards (b) RAM (c) Photosensitive (d) None of the Above
clicking and holding down the mouse button (c) CPU (d) Intel Sol. (c)
while moving the mouse and realign it Sol. (c)
(a) Drag, Click (b) Drop, Drag 64. Bar-code readers use light to read ______
(c) Drag, Drop (d) Click, Right Click 53. Two or more computers connected to each (a) UPCs (b) UPSs
Sol. (c) other for sharing information form a ________. (c) POSs (d) optical marks
(a) Router (b) Server Sol. (a)
42. A pixel is_____ (c) Network (d) Tunnel
(a) Picture element or dot on a screen Sol. (c) 65. Which of the following is an example for
(b) Point of ink on a user printed paper Character printer?
(c) Point of ink on a inkjet printed page 54. What action is performed by pressing Ctrl + (a) Laser (b) Drum
(d) Light beam used in printing paper E in MS-WORD? (c) ink-jet (d) Daisy Wheel
Sol. (a) (a) Exit Application (b) Select All Sol. (d)
(c) Clear All (d) Align Center
43. The speed of Which Generation Computer Sol. (d) 66. _________ is a device which recognises
was in Pico Seconds? physical or behavioural traits of the individual.
(a) First (b) Second 55. Which of the following is any malicious (a) Smart Card Reader
(c) Fourth (d) Fifth computer program which is used to hack into a (b) Optical Character Reader(OCR)
Sol. (c) computer by misleading users of its true intent? (c) Optical Mark Reader(OCR)
(a) Worm (b) Spyware (d) Biometric Sensor
44. Which Storage devices is used in Fourth (c) Trojan horse (d) Keylogger Sol. (d)
Generation Computer? Sol. (c)
(a) Magnetic drum 67. The toner or ink in a Laser printer is
(b) Magnetic core technology 56. First Generation computers used ______ for ________ .
(c) Semiconductor memory Circuitry and ________ for memory (a) dry (b) wet
(d) Primary Storage medium (a) Transistor and Magnetic Core (c) Either (A) or (B) (d) None of the Above
Sol. (c) (b) IC and Magnetic Memory Sol. (a)
(c) Vacuum tubes and Magnetic drum
45. When we run program in HTML coding, (d) IC and Magnetic Core 68. ________ is the process of dividing the disk
……..is used as backend and……….works as Sol. (c) into tracks and sectors.
frontend. (a) Formatting (b) Tracking
(a) Notepad, Internet Explorer 57. FLOPS stands for______ (c) Allotting (d) None of the Above
(b) Notepad, MSN messenger (a) Floating Point Operation Per Second Sol. (a)
(c) MS Word, Internet Explorer (b) File Processing Operation Per Second
(d) Both (a) and (c) (c) Floating Processing Operation Per Second 69. Speed of hard disk is measured in ____
Sol. (a) (d) File Loading Operation Per Second (a) RRP (b) RPM (c) PPM (d) RMP
Sol. (a) Sol. (b)
46. The rate at which data is written to disk or
read from disk is called as ____ 58. A _______ terminal can display images as 70. In which language UNIX is written?
(a) Data Transfer rate (b) Track well as text. (a) C++ (b) C (c) JAVA (d) Python
(c) Sector (d) Hard disk (a) text (b) dumb Sol. (c)
Sol. (a) (c) graphical (d) None of the Above
Sol. (c) 71. Which of the following is not true about
47. The Characteristics of any entity are called it Unix?
as ________ 59. Which language is used for Artificial (a) UNIX was not written in ‘C’ language
(a) Attributes (b) Relationship Intelligence (AI)? (b) Linux is also known as a version of UNIX
(c) Entity set (d) Information (a) FORTRAN (b) COBOL (c) A user can run multiple programs at the
Sol. (a) (c) C (d) PROLOG same time; hence UNIX is called a multitasking
Sol. (d) environment
48. Which one of the following domain is used (d) Many people can use a UNIX based
by Non-Profit Organisation? 60. The most frequently used instructions of a computer at the same time; hence UNIX is
(a) .com (b) .gov (c) .org (d) .edu computer program are likely to be fetched from called as a multiuser system
Sol. (c) ______ Sol. (a)
(a) Hard disk (b) ROM
49. A…………’s main purpose is to prohibit (c) RAM (d) Cache 72. Computer menu is a collection of
unauthorized access to your computer via the Sol. (c) (a) COMMANDS (b) ORDERS
Internet. (c) INSTRUCTIONS (d) ICONS
(a) popup blocker (b) firewall 61. Which Unit is used to measure the speed of Sol. (a)
(c) spyware blocker (d) spam assassin a printer?
Sol. (b) (a) DPI (b) CPM 73. Computer mouse event is
(c) PPM (d) None of the Above (a) LEFT CLICK (b) RIGHT CLICK
50. Which one is not a Necessary condition for Sol. (c) (c) DOUBLE CLICK (d) ALL OF ABOVE
deadlock? Sol. (d)
(a) Non pre-emptive (b) Pre-emptive 62. The higher the resolution of a monitor, the
(c) Partial allocation (d) Circular wait _________

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 11


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
74. Virus which executes when computer Sol. (c) 95. What type of technology allows you to
starts? verbally speak with someone over the Internet?
(a) MACRO (b) FILE INFECTOR 85. In Windows operating system these are (a) Wiki (b) Ephone
(c) BOOT SECTOR (d) MEMORY RESIDENT small pictures that represent files, folders, (c) Social network (d) VoIP
Sol. (c) programs, and other items. Each one is used to Sol. (d)
make the computer do something.
75. Computer can be linked to the internet (a) Sidebar (b) Icons 96. Which memory appears to exist as main
through ______. (c) Taskbar (d) None of these storage although most of it is supported by data
(a) Phone line modem (b) DSL Sol. (b) held in secondary storage?
(c) cable modem (d) All of these. (a) Core memory (b) Virtual memory
Sol. (d) 86. The __________ of software contains lists (c) RAM (d) Dynamic memory
of commands and options. Sol. (b)
78. What is Cyber Security? (a) menu bar (b) title bar
(a) Cyber Security provides security against (c) formula bar (d) tool bar 97. A __________ represents approximately
malware Sol. (a) one billion memory location.
(b) Cyber Security provides security against (a) Kilobyte (b) Megabyte
cyber-terrorists 87. The term “user interface” refers to (c) Gigabyte (d) Terabyte
(c) Cyber Security protects a system from cyber (a) what the user sees on the screen and how Sol. (c)
attacks they can interact with it.
(d) All of the mentioned (b) how the operating system responds to user 98. Which feature helps to search the text
Sol. (d) commands. through reference material such as dictionaries,
(c) the means by which the user interacts with encyclopaedias and translation services?
77. Who is the father of computer security? the peripheral devices on the computer. (a) Translation (b) Research
(a) August Kerckhoffs (b) Bob Thomas (d) All of these (c) Find (d) Font
(c) Robert (d) Charles Sol. (a) Sol. (b)
Sol. (a)
88. What is the main folder on a storage device 99. Which keystroke will take you at the
78. Radha receives an email claiming that her called? beginning or the end of a long document?
credit card account is about to be suspended (a) Platform (b) Interface (a) Ctrl + PageUp and Ctrl + PageDown
unless she emails her credit card details and (c) Root Directory (d) Home Page (b) Shift + Home and Shift + End
personal identification number (PIN) Sol. (c) (c) Ctrl + Home and Ctrl + End
immediately. What is this an example of? (d) The only way is by using the right scroll bar
(a) Spamming (b) Phishing 89. What was the name of program Robert Sol. (c)
(c) Virus (d) Scanning Thomas created?
Sol. (b) (a) Virus (b) Wireshark 100. Which of the following does not exist in
(c) Nessus (d) Creeper taskbar?
79. Which of the following best describes Sol. (d) (a) Quick Launch (b) Start Menu
uploading information? (c) My Documents (d) Address bar
(a) Sorting data on a disk drive 90. ISPs stands for? Sol. (c)
(b) Sending information to a host computer (a) Intranet service providers
(c) Receiving information from a host computer (b) Internet service providers 101. Which of the following is a process of
(d) Sorting data on a hard drive (c) interneted service providers translates the IP addresses of computers in a
Sol. (b) (d) Information service provider local network to a single IP address?
Sol. (b) (a) Gateway (b) NAT
80. Software programs that allow you to legally (c) Packet filtering (d) Spooling
copy files and give them away at no cost are 91. What is Trojan-Horse Sol. (d)
called which of the following? (a) Are hacker programs that do not show up on
(a) Probe ware (b) Timeshare the system 102. What is the term used for measurement of
(c) Shareware (d) Public domain (b) Are legitimate programs that allow other?
Sol. (d) unauthorized access (a) data per unit (b) bits per second
(c) Really do not usually work (c) bits per hour (d) ratio per bit
81. In addition to the basic typing keys, desktop (d) Usually are immediately discovered Sol. (b)
and note book computer keyboards include Sol. (b)
a(n) ........... keypad to efficiently move the 103. Which of the following is the fastest media
screen based insertion point 92. Which of the following is not an external of data transfer?
(a) editing (b) number threat to a computer or a computer network (a) Co-axial Cable (b) Untwisted Wire
(a) locked (d) docked (a) Ignorance (b) Trojan horses (c) Telephone Lines (d) Fiber Optic
Sol. (b) (c) Adware (d) Crackers Sol. (d)
Sol. (a)
82. A program embedded in a semiconductor 104. Different components on the motherboard
chip during their manufacture is called 93. The following is true for Auxiliary Storage– of a PC unit are linked together by sets of
(a) humanware (b) firmware (a) It has an operating speed far slower than parallel electrical conducting lines. What are
(c) liveware (d) hardware that of the primary storage. these lines called?
Sol. (b) (b) It has an operating speed faster than that of (a) Conductors (b) Buses
the primary storage. (c) Connectors (d) Consecutives
83. Which out of the following is not a DBMS (c) It has an operating speed equivalent than Sol. (b)
software? that of the primary storage.
(a) dBASE (b) FOXPRO (d) All of the above 105. The blank white area near the edges of
(c) ORACLE (d) Data base 2000 Sol. (a) every page in a word document is known as a
Sol. (d) ________.
94. ALGOL is the (a) cut mark (b) margin
84. Ctrl, shift and alt are called __________ (a) High-level language (b) Low level language (c) new area (d) gutter
keys. (c) Machine language (d) All of the above Sol. (b)
(a) adjustment (b) function Sol. (a)
(c) modifier (d) alphanumeric

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 12


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM

PREVIOUS YEAR SSC reorganize, group, count, total or average data


stored in a database. It allows its users to
13. ________ is the smallest unit of data in a
computer.
MCQ’S transform columns into rows and rows into (a) Gigabyte (b) Bit
columns. It allows grouping by any data field. (c) Byte (d) Terabyte
Sol. (b). Bit is the smallest unit of data in
1. AIX is the operating system of which 7. Which of the following is NOT one of the a computer.
company? tools of Robotics Process Automation? 8 bit = 1 byte
(a) Apple (b) Unisys (a) Blue Prism (b) Ui Path 1024 byte = 1 Kilobyte
(c) IBM (d) Microsoft (c) Automation Anywhere (d) Power Center 1024 Kilobyte = 1 Megabyte
Sol.(c). AIX (Advanced Interactive executive) is Sol. (d). Power center is not the tool of 1024 Megabyte = Gigabyte
“an open operating system from IBM that is RPA. Others are popular tools for RPA. 1024 Gigabytes = 1 Terabyte
based on a version of UNIX. AIX/ESA was
designed for IBM's System/390 or large server 8. A database used by Microsoft Windows for 14. In computing, ________ is a network
hardware platform. storing configuration information is known as: security system that monitors and controls
(a) Registry (b) Record incoming and outgoing network traffic based on
2. In which year was Google incorporated as a (c) Cookie (d) Cache predetermined security rules.
private company? Sol. (a). The system registry is one of the most (a) cookie (b) spyware
(a) 2000 (b) 2005 important parts of a Windows-based computer (c) spam (d) firewall
(c) 2002 (d) 1998 system. Not to be tampered with lightly, the Sol. (d). A Firewall is a network security device
Sol. (d). Google is incorporated, September 4, registry is a system-defined database used by that monitors and filters incoming and outgoing
1998. Google was incorporated as a privately- the Windows operating system to store network traffic based on an organization's
held company on September 4, 1998, by configuration information. previously established security policies. At its
founders Larry Page and Sergey Brin. most basic, a firewall is essentially the barrier
9. Who among the following invented the that sits between a private internal network
3. A region of computer memory where Computer language, COBOL? and the public Internet.
frequently accessed data can be stored for (a) Grace Murray Hopper (b) John McCarthy
rapid access is called:- (c) Guido van Rossum (d) Brendan Eich 15. Who among the following invented the
(a) Cookie (b) Plug-in Sol. (a). COBOL was designed in 1959 by World Wide Web (www) in 1989?
(c) Token (d) Cache CODASYL and was partly based on previous (a) Bill Gates (b) Steve Wozniak
Sol. (d). A region of computer memory where programming language design work by Grace (c) Tim Berners-Lee (d) Charles Babbage
frequently accessed data can be stored for Hopper, commonly referred to as "the Sol. (c). Tim Berners-Lee, a British scientist,
rapid access is called Cache. Cache is a (grand)mother of COBOL". It was created as invented the World Wide Web (WWW) in 1989,
collection of data duplicating original values part of a US Department of Defense effort to while working at CERN. The web was originally
stored elsewhere or computed earlier, where create a portable programming language for conceived and developed to meet the demand
the original data is expensive to fetch (owing to data processing. for automated information-sharing between
longer access time) or to compute, compared scientists in universities and institutes around
to the cost of reading the cache. In other 10. Second Generation computers can be the world.
words, a cache is a temporary storage area characterized largely by their use
where frequently accessed data can be stored of : 16. Which of the following is NOT an anti-virus
for rapid access. (a) Integrated Circuits (b) Vacuum Tubes software?
(c) Microprocessors (d) Transistors (a) Avast (b) Linux
4. In computer terminology, what is the full Sol. (d). Generations of computers are (c) Norton (d) Kaspersky
form of RAM? characterized by their technology. First Sol. (b). Linux is not an antivirus Software. It is
(a) Random Access Memory generation digital computers, developed an open source operating software. Rest all
(b) Repeated Access Memory mostly in the U.S. after World War II, used others are antivirus software for Microsoft
(c) Rapid Access Memory vacuum tubes and were enormous. The second Windows, macOS, Android and iOS.
(d) Regular Access Memory generation, introduced in 1960, used
Sol. (a). RAM is an acronym for random access transistors and were the first successful 17. Which of the following is a supercomputer
memory, a type of computer memory that can commercial computers. developed by India?
be accessed randomly; that is, any byte of (a) Param Yuva 2 (b) Onshape
memory can be accessed without touching the 11. Who among the following pioneered Binary (c) Venngage (d) Pixir
preceding bytes. RAM is found in servers, PCs, Logic and Arithmetic in Computers Sol. (a). Paramyuva 2 is a supercomputer
tablets, smartphones and other devices, such Programming? developed by India. It has a memory of
as printers. (a) Noam Chomsky (b) Leslie Lamport 14144GB and is one the oldest supercomputers
(c) John Backus (d) Claude Shannon of India.
5. In the world of Computers, what is ‘Ubuntu’? Sol. (d). Claude Shannon not only pioneered
(a) A firewell developed by Microsoft binary logic and arithmetic, he invented a 18. In the context of digital computer, which of
(b) Open Source Linux Operating System whole new subject area information theory and the following pairs of digits is referred to as
(c) An ERP system from SAP still had time to have fun with computer chess binary code?
(d) Latest financial software package by Infosys and Theseus, the amazing maze running relay (a) 3 and 4 (b) 0 and 1
Sol. (b) Ubuntu is an open-source operating mouse. (c) 2 and 3 (d) 1 and 2
system (OS) based on the Debian GNU/Linux Sol. (b). In the context of digital computer, 0
distribution. Ubuntu is primarily designed to be 12. Desktop Computers, Laptop Computers, and 1 is referred to as binary code.
used on personal computers, although a server tablets and smartphones are different types of
edition does also exist. Ubuntu is an African ________. 19. In the field of information and
word that literally means "humanity to others." (a) Supercomputers (b) Mainframe Computers communication technology, what is the
(c) Microcomputers (d) Minicomputers full form of FDD?
6. ‘Pivot Table’ is a feature of which of the Sol. (c). Desktop computers, laptops, personal (a) Folder Disk Drive (b) Floppy Disk Drive
following softwares? digital assistants (PDA), tablets & smartphones (c) Folder Data Drive (d) Floppy Data Drive
(a) Microsoft Excel (b) Microsoft Word are all types of microcomputers. The micro- Sol. (b). The full form of FDD in the field of
(c) Microsoft Access (d) Microsoft Powerpoint computers are widely used & the fastest Information and Communication Technology is
Sol. (a) ‘Pivot Table’ is a feature of Microsoft growing computers. These computers are the Floppy Disk Drive.It is a type of disk storage
Excel. A pivot table is a data summarization tool cheapest among the other three types of composed of a disk of thin and flexible
that is used in the context of data processing. computers. magnetic storage medium, sealed in a
Pivot tables are used to summarize, sort, rectangular plastic enclosure lined with fabric

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 13


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
that removes dust particles. Floppy disks are (a) high level language (b) assembly language Sol. (c). A firewall is a security device -computer
read and written by a Floppy Disk Drive (FDD). (c) low level language (d) machine language hardware or software that can help protect
Sol. (a). Python is a high level language. your network by filtering traffic and blocking
20. In the context of digital computer, which of outsiders from gaining unauthorized access to
the following pairs of digits is referred to as 29. Linux is ______. the private data on your computer.
binary code? (a) an interpreter
(a) 3 and 4 (b) 0 and 1 (b) an operating system 36. Which technology do third generation
(c) 2 and 3 (d) 1 and 2 (c) an assembly language computers use?
Sol. (b). In computers all data is represented as (d) a high level language (a) Integrated circuits (b) Transistors
binary codes. That is, all data is represented as Sol. (b). Linux is an operating system. (c) Microprocessors (d) Vacuum tubes
strings of 0s and 1s. Sol. (a) *First Generation Computers -
30. In the context of memory size in computer Vacuum tube based .
21. What is 'Roadeo'? data storage, one gigabyte is equal to how * Second Generation Computers -
(a) A robot that cleans city roads many megabytes? Transistor based .
(b) A robot that fills potholes (a) 32 MB (b) 1012 MB *Third Generation Computers - Integrated
(c) A robot that drives taxis (c) 64 MB (d) 1024 MB Circuit based .
(d) A robot that helps maintain traffic Sol. (d). In the context of memory size in * Fourth Generation Computers - VLSI
Sol. (d). A Roadeo is a competitive driving event computer data storage, one gigabyte is Microprocessor based .
for motor vehicle drivers. Typically, drivers equal to 1024 MB.
compete to pass through a variety of obstacles 37. In the field of computing, what does VRML
in the smallest amount of time, although the 31. A hard disk is an example of which type of stand for?
competitions may include other components, data storage device? (a) Virtual Reality MarkUp Language
such as a written test. (a) Primary Storage (b) Secondary Storage (b) Visual Reality MarkUp Language
(c) Offline Storage (d) Tertiary Storage (c) Virtual Reality Machine Language
22. Which shortcut key is used for previewing Sol. (b). Secondary storage devices are storage (d) Visual Reality Machine Language
the page before printing? devices that operate alongside the computer’s Sol. (a). Virtual Reality MarkUp Language
(a) CTRL + F6 (b) CTRL + F10 primary storage, RAM and cache memory. (VRML) is an open-standard programming
(c) CTRL + F2 (d) CTRL + F5 Examples include external hard drives, USB language created to design three-dimensional
Sol. (c). Ctrl + F2 is used for previewing the flash drives and tape drives. and Web-based models, textures and illusion.
page before printing.
32. Which of the following is an input device 38. Which function key is used for opening
23. Who designed the first analog computer in that utilises a light sensitive detector to select help?
India? objects on a display screen? (a) F4 (b) F3
(a) Samarendra Kumar Mitra (a) Light pen (c) F1 (d) F2
(b) Deb Kumar Bose (b) Barcode reader Sol. (c). F1 is used for opening help.
(c) Subodh Chandra Das Gupta (c) Optical mark recognition (OMR)
(d) Bimal Kumar Bhattacharyya (d) Magnetic ink character recognition 39. In the field of computing, what does VGA
Sol. (a). Samarendra Kumar Mitra was an Indian (MICR) stand for?
scientist and mathematician. He designed Sol. (a). A light pen is a computer input device (a) Visual Graphics Array
India’s first computer in 1954 at Indian in the form of a light-sensitive wand used in (b) Video Graphics Array
Statistical Institute, Calcutta. conjunction with a computer’s cathode-ray (c) Video Graphics Audio
tube display. It allows the user to point to (d) Visual Graphics Audio
24. Which of the following is NOT an e- displayed objects or draw on the screen in a Sol. (b). VGA stands for Video Graphics Array. It
commerce website? similar way to a touchscreen but with greater is a high-resolution standard for displaying text,
(a) Uber (b) Swiggy positional accuracy. graphics and colors on computer monitors.
(c) Flipkart (d) Google Maps
Sol. (d). An e-commerce website is a site that 33. The speed of the Central Processing Unit 40. In a computer, which unit is responsible for
sells products and services through means of (CPU) is measured in_________, which processing data and is also called the electronic
data transfer and funds over the internet. represents a CPU cycle. brain of the computer?
(a) Gigabyte (GB) (b) Hertz (Hz) (a) CPU (b) Hard Disk
25. The first barcode system was developed (c) Terabyte (TB) (d) Kilobyte (KB) (c) RAM (d) Keyboard
by:- Sol. (b). The speed of the Central Processing Sol. (a).Central Processing Unit is considered as
(a) Norman Joseph Woodland Unit (CPU) is measured in Hertz (Hz), which the electronic brain of the computer. It consists
(b) John Mc Carthy represents a CPU cycle. of a Memory, Control Unit and Arithmetic Logic
(c) John Barger Unit. The CPU performs basic arithmetic, logic,
(d) David Bradley 34. Which unit of the computer is considered as controlling and input/output (I/O) operations
Sol. (a). In 1952, Norman Joseph Woodland the brain of the computer? specified by the instructions in the program.
developed the first barcode system. (a) Memory unit (b) Input unit
(c) CPU (d) Output unit 41. The F7 key is commonly used in Microsoft
26. 'Nibble' in computer terminology is also Sol. (c). Central Processing Unit (CPU) is programs such as Microsoft Word, Outlook, etc.
called _________. considered as the brain of the computer for:-
(a) Bit (b) Half bit because it contains all the circuitry needed to (a) opening help
(c) Half byte (d) Byte process input, store data and output results. (b) checking spellings and grammar
Sol. (c). Nibble is also called Half byte. (c) searching content in various apps
35. Which of the following options correctly (d) renaming files and folders
27. Which company manufactured the first defines a firewall (in the context of computing)? Sol. (b). The F7 key is commonly used in
microprocessor 4004? (a) It is the name of a software. Microsoft programs such as Microsoft Word,
(a) ENOcean Private Company (b) It is a hardware device. Outlook, etc. for checking spellings and
(b) NVIDIA Corporation (c) It is a combination of both software and grammar.
(c) PLX Devices hardware devices to permit or deny network
(d) INTEL Corporation transmission based on a set of rules. 42. In the field of computing, what does ENIAC
Sol. (d). INTEL Corporation manufactured the (d) It is a combination of software and stand for?
first microprocessor 4004. hardware-based devices to permit any and (a) Electronic Numerical Integrator and
every network transmission. Computer
28. Python is a _______. (b) Electronic Numerical Integrated

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 14


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
Advanced Computer Sol. (a). Cache Memory is a very high-speed
(c) Electronic Numerals Integration and 48. Which of the following converts analogue memory and is used to speed up and
Computing information into digital form? synchronize with high-speed CPU.
(d) Electronic Numbers Integration and (a) Optical Mark Reading (b) Barcode reader
Computer (c) Digitizer (d) Gamepad 55. Which of the following consists of an
Sol. (a). ENIAC stands for Electronic Numerical Sol. (c). A digitizer is a machine that converts an electronic writing area and a special ‘pen’ that
Integrator and Computer. It was the first analog object, image or signal into a digital works with it?
programmable, electronic, general-purpose (computer- readable) format. (a) Trackball (b) Plotters
digital computer. It was Turing-complete and (c) Abacus (d) Graphics Tablet
able to solve a large class of numerical 49. In the context of computing, what is the full Sol. (d). A graphics tablet is a computer
problems through reprogramming. form of URL? input device that enables a user to hand-draw
CHSL 14/10/2020 (Afternoon) images, animations and graphics, with a special
43. Which of the following statements about (a) Undistributed Resource Locator pen like stylus, similar to the way a person
firewall (in the context of computing) is (b) Unified Resource Locator draws images with a pencil and paper.
INCORRECT? (c) Uniform Resource Locator
(a) It permits network transmission based on a (d) Uniform Region Locator 56. ______ is a small, portable flash memory
set of rules. Sol. (c). A Uniform Resource Locator (URL) is a card that plugs into a computer’s USB port and
(b) It is a combination of both software and reference to a web resource that specifies its functions as a portable hard drive.
hardware devices. location on a computer network and a (a) Flash drive (b) CD-RW
(c) It is frequently used to protect a computer mechanism for retrieving it. (c) DVD-ROM (d) CD-ROM
network from unauthorized. Sol. (a) A USB flash drive is a plug and play
(d) It is unable to permit legitimate 50. Which of the following is used to receive portable storage device that uses flash
communication to pass. and send computer files over telephone lines? memory. A USB flash drive can be used in place
Sol. (d). In computing, a firewall is a network (a) Modem (b) MICR device of a compact disc. When a user plugs the flash
security system that monitors and controls (c) Floppy disk (d) Light pen memory device into the USB port, the
incoming and outgoing network traffic based on Sol. (a). Modulator Demodulator (Modem) is a computer’s operating system recognizes the
predetermined security rules. It establishes a hardware component that allows a computer or device as a removable drive and assigns it a
barrier between a trusted network and an another device, such as a router or switch, to drive letter.
untrusted network. Firewalls are categorized as connect to the Internet. It converts or
a network-based or a host-based system. “modulates” an analog signal from a telephone 57. ______ is the fastest to read from and write
Network-based firewalls can be positioned or cable wire to digital data that a computer to than the other kinds of storage in computer.
anywhere within a LAN or WAN. They are either can recognize. Similarly, it converts digital data (a) CD ROM (b) Floppy Disk
a software appliance running on general from a computer or other device into an analog (c) RAM (d) Hard Disk
purpose hardware, a hardware appliance signal that can be sent over standard telephone Sol. (c). RAM (Random Access Memory) is a
running on special-purpose hardware, or a lines. form of computer memory that can be read and
virtual appliance running on a virtual host. changed in any order, typically used to store
Host-based firewalls are deployed directly on 51. Which of the following is an input device working data and machine code. A random-
the host itself to control network traffic or used to enter motion data in computers or access memory device allows data items to be
other computing resources. other electronic devices? read or written in almost the same amount of
(a)Monitor (b)Trackball time irrespective of the physical location of
44. What is the full form of PROM? (c)Plotter (d)Joystick data inside the memory.
(a) Program read-only memory Sol. (b). A trackball is a pointing input device. It
(b) Primary read-only memory consists of a ball held by a socket containing 58. ______ is a diagrammatic representation of
(c) Programmable read-only memory sensors to detect a rotation of the ball about a program logic.
(d) Program read-output memory two axes. The user rolls the ball with the (a) Process (b) Flowchart
Sol. (c). PROM or Programmable read-only thumb, fingers or the palm of the hand to move (c) Data (d) Legend
memory is a computer memory chip that can a cursor. Sol. (b). A flowchart is simply a graphical
be programmed once after it is created. Once representation of steps. It shows steps in
the PROM is programmed, the information 52. In the context of computing, a byte is equal sequential order and is widely used in
written is permanent and cannot be erased or to ______ bits. presenting the flow of algorithms, workflow or
deleted. (a) 4 (b) 16 processes. A flowchart shows the steps as
(c) 24 (d) 8 boxes of various and their order by connecting
45. Which function key displays the Print Sol. (d). In the context of computing, a byte is them with arrows.
Preview window in Microsoft Office? equal to 8 bits.
(a) Alt+F2 (b) Alt+Ctrl+F2 59. Which of the following symbols must be
(c) Ctrl+F2 (d) Shift+F2 53. Which of the following is a type of memory used before a formula in a Microsoft Excel
Sol. (c). Ctrl +F2 displays the Print Preview and is similar to RAM? It is used by computers sheet?
window in Microsoft Office. to move data between the RAM and the CPU. (a) = (b) & (c) $ (d) @
(a) Hypertext Link (b) ROM Sol. (a). ‘=’ must be used before a formula in a
46. In which year did the Java Script (c) Cache (d) I Beam Microsoft Excel sheet.
Programming language come into existence? Sol. (c). Cache Memory is a very high-speed
(a) 2000 (b) 1990 (c) 1995 (d) 1999 memory and is used to speed up and 60. What is the full form of BASIC in context of
Sol. (c). JavaScript Programming language came synchronize with high-speed CPU. It is an the BASIC computer language?
into existence in 1995. extremely fast memory type that acts as a (a) Beginner’s All-purpose Symbolic Input Code
buffer between RAM and the CPU. It holds (b) Beginner’s All-purpose Systematic
47. Which of the following is a lever that can be frequently requested data and instructions so Instruction Code
moved in several directions to control the that they are immediately available to the (c) Beginner’s All-purpose Symbolic Input-
movement of an image on a computer monitor CPU when needed. output Code
or similar display screen? (d) Beginner’s All-purpose Symbolic Instruction
(a) MIDI Devices (b) Optical Mark Reader 54. Which of the following is a very high-speed Code
(c) Joystick (d) Visual Display Unit semiconductor memory which can speed up Sol. (d). BASIC stands for “Beginner’s All-
Sol. (c). Joystick is an input device consisting of the CPU? purpose Symbolic Instruction Code”. It is a
a lever that can be moved in several directions (a) Cache Memory (b) Main Memory computer programming language that was
to control the movement of an image on a (c) Secondary Memory (d) Primary Memory developed to provide a way for students to
computer monitor or similar display screen. write simple computer programs.

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 15


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
69. In the context of computers, WORM is an Sol. (c). Hybrid computers exhibit features of
61. Third generation computers used: acronym of: analog computers and digital computers.
(a) vacuum tubes (b) integrated circuits (a) Write Once, Read Many Hybrid computers are used to control air traffic
(c) Transistors (d) VLSI technique (b) Wireless Operating, Read Module and radar of national defence.
Sol. (b). *First generation: Vacuum tube based. (c) Word Optical, Recognition Malware
*Second generation: Transistor based. (d) Word On, RAM Memory 77. ______ was a web browser developed by
*Third generation: Integrated circuit based. Sol. (a). WORM is an acronym for “Write Once, the National Centre for Supercomputing
* Fourth generation: VLSI microprocessor Read Many”. It is an optical storage technology Application (NCSA).
based. that allows a disc to be written only once but (a) Opera (b) Mosaic
* Fifth generation: ULSI microprocessor based. read an unlimited number of times. (c) Navigator (d) Safari
Sol. (b). Mosaic was a web browser developed
62. ____ is the central server in computer 70. Who has developed the Automatically by the National Centre for Supercomputing
network which lets the concerned user utilize Programmable Tool (APT)? Application(NCSA).
the storage capacity of the server. (a) Gary Kildall (b) Douglas T Ross
(a) Application Server (b) File Server (c) Ralph H Baer (d) Jonathan Fletcher 78. How many function keys are present on a
(c) Print Server (d) Web Server Sol. (b). Automatically Programmable Tool standard PC keyboard?
Sol. (b). A file server is a central server in a (APT) has been developed by Douglas T Ross. It (a) 10 (b) 9 (c) 12 (d) 15
computer network that provides file systems or is a program which consists Sol. (c). There are 12 function keys on a
at least parts of a file system to connected instructions/statements which are used to standard PC keyboard.
clients. File servers therefore offer users a specify the path of the tool to follow for
central storage place for files on internal data producing a given part. 79. Which of the following pairs is NOT
media, which is accessible to all authorized matched correctly?
clients. 71. 1 Petabyte (PB) = 1024_____. (a) Alt + E – Edit options in current program
(a) Zettabytes (b) Exabytes (b) Alt + Shift + D – Insert the current date
63. Which of the following devices is NOT used (c) Terabytes (d) Gigabytes (c) Ctrl + K – Cut selected text
to enter data into a computer? Sol. (c). 1 Petabyte (PB) = 1024 Terabytes (TB). (d) Ctrl + A – Select all text
(a) Mouse (b) Keyboard Sol. (c). Ctrl + X is used to cut selected text. Ctrl
(c) Scanner (d) Monitor 72. What does HLL stand for in computing? + K is used to insert a hyperlink in MS word.
Sol. (d). Monitor is an output device. (a) High Low Language
(b) Hyper Level Language 80. Who has created LISP, the Programming
64. What is the shortcut key for the central (c) High Level List Language for Artificial Intelligence?
alignment of a line or text in MS Office (d) High Level Language (a) Grace Hopper (b) John McCarthy
software? Sol. (d) A High Level Language (HLL) is a (c) Charles Bachman (d) Leslie Lamport
(a) Ctrl+E (b) Ctrl+C programming language such as C, FORTRAN or Sol. (b.) John McCarthy has created LISP, the
(c) Ctrl+G (d) Ctrl+A PASCAL that enables a programmer to write Programming Language for Artificial
Sol. (a). ‘Ctrl+E’ is the shortcut key for the programs that are more or less independent of Intelligence.
central alignment of a line or text in MS Office a particular type of computer. Such languages
software. are considered high-level because they are 81. A computer on the Internet that uses HTTP
close to human languages and further from protocol is known as:
65. Which of the following is an input device of machine languages. (a) LAN (b) Web Server
a computer? (c) WAP (d) WLAN
(a) Speaker (b) Printer 73. In which of the following countries was the Sol. (b). A computer on the Internet that uses
(c) Scanner (d) Monitor first Electronic Numerical Integrator and HTTP protocol is known as Web Server.
Sol. (c). Scanner is an input device. Computer, the first programmable general
purpose electronic digital computer,developed? 82. Which of the following is an extension of a
66. Which of the following is NOT a portable (a) United Kingdom (b) China temporary file?
device? (c) Japan (d) USA (a) .tnt (b) .tar
(a) iPods (b) Laptops Sol. (d). ENIAC was developed in the USA. It (c) .tmp (d) .txt
(c) Desktop computers (d) Thumb drives was invented at the University of Pennsylvania Sol. (c). .tmp is an extension of a temporary file.
Sol. (c). A portable device is any device that can to calculate artillery firing tables for the United The full form of JPG or JPEG is Joint
be carried easily. Desktop computers are not States Army’s Ballistic Research Laboratory. Photographic Expert Group. PDF stands for
portable devices. Portable Document Format.
74. Trackball is which of the following devices?
67. Transistors belong to which of the following (a) Input device (b) Touchpad 83. Which of the following is NOT an open-
generations of the computers? (c) Output device (d) Barcode reader source operating system?
(a) First (b) Second Sol. (a) A trackball is a pointing input device. It (a) Windows (b) Ubuntu
(c) Third (d) Fourth consists of a ball held by a socket containing (c) Linux (d) Drupal
Sol. (b). *First Generation -Vacuum Tubes . sensors to detect a rotation of the ball about Sol. (a). An Open-source Operating System is
*Second Generation - Transistors . two axes. The user rolls the ball with the the Operating System in which source code is
*Third Generation - Integrated Circuits . thumb, fingers or the palm of the hand to move visible publicly and editable. The generally
*Fourth Generation – Microprocessors. a cursor. known Operating Systems like Microsoft’s
Windows, Apple’s iOS, and Mac OS, are closed
68. Which of the following is not a softcopy 75. In Microsoft Office 2016, which shortcut key Operating systems.
devices? is used to open the Design tab?
(a) Plotter (b) Projector (a) Ctrl + A (b) Shift + F3 84. What do you call an event where a
(c) Monitor (d) Speaker (c) Alt + G (d) Ctrl + K computer becomes unresponsive due to either
Sol. (a). Soft copy devices allow the viewing of Sol. (c). In Microsoft Office 2016, ‘Alt + G’ is a program or the system itself becoming
information that can be rearranged, modified used to open the Design tab. unresponsive and no longer taking input?
or corrected to suit your needs. Some examples (a) Booting (b) Hanging
of soft copy output devices are monitors, 76. Which type of computers is used to control (c) Ejecting (d) Moving
projectors, video display terminals. Soft copy is air traffic and radar of national defence? Sol. (b). Hanging. Booting is the process of
an electronic display of digital information, (a) Personal computers starting a computer.
such as files viewed on the pc monitor. (b) Analogue computers
(c) Hybrid computers 85. In the context of computers, what is
(d) Digital computers Ubuntu?

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 16


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
(a) An open-source operating system sponsored computer without his knowledge and runs image format on the internet, having the ability
by Canonical Ltd. against his wishes? to display transparent backgrounds.
(b) A search engine by Mozilla Foundation. (a) adware (b) phishing
(c) An anti-virus software by Microsoft. (c) trojan horse (d) computer virus 99. In which year was the first-ever version of
(d) An android-based search engine by Sol. (d). A computer virus is a type of computer Microsoft Word - Word 1.0 launched?
Microsoft. program that, when executed, replicates itself (a) 1985 (b) 1996 (c) 1992 (d) 1983
Sol. (a). Ubuntu is an open-source operating by modifying other computer programs and Sol. (d). The first Word version, Word 1.0, was
system sponsored by Canonical Ltd. inserting its own code. If this replication released in October 1983 for Xenix and MS-
succeeds, the affected areas are then said to be DOS. It was followed by four very similar
86. A file with the ______ file extension is a "infected" with a computer virus, a metaphor versions that were not very successful.
Word Open XML Macro-Enabled Document file. derived from biological viruses.
(a) .docm (b) .pdf 100. JPEG is a commonly used method of lossy
(c) .docx (d) .org 93. Which of the following languages is an compression for digital images. What is the full
Sol. (a). A file with the ‘.docm’ file extension is a example of a fourth-generation language in form of JPEG?
Word Open XML Macro-Enabled Document computer programming? (a) Jet Prints Editing Graphics
file. (a) ALGOL (b) SQL (b) Joint Photographic Experts Group
(c) SNOBOL (d) Pascal (c) Jet Protocol Experts Group
87. Which of the following is the output device Sol. (b). The fourth-generation language is also (d) Joint Pages Enhanced Graphics
of a computer? called a non–procedural language/ 4GL. It Sol. (b). JPEG stands for “Joint Photographic
(a) Plotter (b) Pen drive enables users to access the database. Experts Group”. It's a standard image format
(c) Joystick (d) Scanner Examples: SQL, Foxpro, Focus, etc. Many for containing lossy and compressed image
Sol. (a). An output device is any piece of fourth-generation languages use Structured data. Despite the huge reduction in file size,
computer hardware equipment that Query Language (SQL) as the basis for JPEG images maintain reasonable image
converts information into human-readable operations. SQL was developed at IBM to quality.
form. It can be text, graphics, tactile, audio, and develop information stored in relational
video. Some of the output devices are Monitor, databases. 101. Which of the following is a small piece of
Printer graphic Output devices, Plotters, software that uses computer networks and
Speakers, etc. 94. LCD is a basic type of monitor. What is the security holes to replicate itself?
full form of LCD? (a) Trojan horse (b) Application
88. A ______ is an ordered list in which all (a) Laser Crystal Display (c) Worm (d) Operating System
insertions and deletions are made at one end. (b) Liquid Crystal Diode Sol. (c). Worm is a small piece of Software that
(a) front (b) rear (c) Light Component Device uses computer networks and security holes to
(c) stack (d) queue (d) Liquid Crystal Display replicate itself. A copy of the worm scans the
Sol. (c.) A stack is an ordered list in which all Sol. (d) LCD is a basic type of monitor and the network for another machine that has a specific
insertions and deletions are made at one end. full form of LCD is Liquid Crystal Display. It is a security hole. A Trojan horse is a type of
type of flat panel display which uses liquid malware that downloads onto a computer
89. While working in MS Office software, which crystals in its primary form of operation. disguised as a legitimate program.
of the following commands will you give on a
US keyboard layout to undo the previous 95. Chad Hurley and Steve Chen are computer 102. Which of the following operating systems
action? innovators credited with co-founding ______. guarantees a response within specified time
(a) Ctrl + U (b) Ctrl + Z (a) Instagram (b) Facebook constraints?
(c) Ctrl + C (d) Ctrl + N (c) WhatsApp (d) YouTube (a) Time sharing operating system
Sol. (b) Ctrl + Z Sol. (d). Steve Chen, Chad Hurley, and Jawed (b) Distributed operating system
Karim launched YouTube in February 2005 and (c) Real-time operating system
90. ______ is the easy way to check your In October 2006, at a later time, YouTube was (d) Interactive operating system
favorite websites for updates without having to bought by Google for $1.65 billion. Sol. (c). A real-time operating
visit them all. SSC systemguarantees a response within specified
(a) PDF (b) RSS 96. In which year was Microsoft’s Windows time constraints. A real-time operating system
(c) HTML (d) URI operating system first introduced? (RTOS) is an operating system(OS) intended to
Sol. (b). RSS (RDF Site Summary or Really (a) 1985 (b) 1989 (c) 1991 (d) 1993 serve real-time applications that process data
Simple Syndication) is a web feed that allows Sol. (a) Microsoft introduced an operating as it comes in, typically without buffer delays.
users and applications to access updates to environment named Windows on November Processing time requirements (including any OS
websites in a standardized, computer-readable 20, 1985, as a graphical operating system shell delay) are measured in tenths of seconds or
format, is the easy way to check your favorite for MS-DOS in response to the growing interest shorter increments of time.
websites for updates without having to visit in graphical user interfaces (GUIs).
them all. Subscribing to RSS feeds can allow a 103. GIMP is a/an ______.
user to keep track of different websites in a 97. Which of the following is the core of an (a) application software
single news aggregator, which constantly operating system? (b) diagnostic utility program
monitors sites for new content, removing the (a) Kernel (b) Xenix (c) text editor
need for the user to manually check them. (c) Device Driver (d) Ventura (d) operating system
Sol. (a). The kernel is a computer program at Sol. (a). GIMP stands for “GNU Image
91. Which of the following is a pointing device the core of a computer's operating system and Manipulation Program”, a self-explanatory
used to move an object on the screen of a has complete control over everything in the name for an application that processes digital
computer in any direction? system. It is the "portion of the operating graphics. GIMP is a free and open-source raster
(a) Modem (b) Joystick system code that is always resident in graphics editor used for image manipulation
(c) Floptical (d) Server memory", and facilitates interactions between and image editing, free-form drawing,
Sol. (b). The isotonic joystick is a handle stick hardware and software components. transcoding between different image file
which is a pointing device used to move an formats, and more specialized tasks.
object on the screen of a computer in any 98. What kind of file has the extension .png?
direction where the user can freely change the (a) Document file (b) Video file 104. A ______ is a software program that
position of the stick, with more or less constant (c) Audio file (d) Image file travels the web locating and indexing websites
force. Sol. (d). A PNG file is an image saved in the for search engines.
Portable Network Graphic (PNG) format. It is (a) bug (b) spider
92. Which type of malware is a program or the most frequently used uncompressed raster (c) python (d) penguin
piece of code that is loaded onto a person's

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 17


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
Sol. (b.) A search engine spider, also known as a scanners, cameras, joysticks, and microphones. 116. Which of the following devices accepts the
web crawler, is an Internet bot that crawls results produced by the computer in a machine-
websites and stores information for the search 110. A topology for a Local Area Network in readable form?
engine to index. Their purpose is to index the which all nodes are individually connected to a (a) Microphone (b) Printer
content of websites all across the internet so central connection point like a hub or switch is (c) Graphics tablet (d) Mouse
that those websites can appear in search called: Sol. (b). The printer accepts the results
engine results. (a) star topology (b) tree topology produced by the computer in a machine-
(c) ring topology (d) bus topology readable form. A printer is a peripheral
105. Which of the following is the full form of Sol. (a) A topology for a Local Area Network in machine that makes a persistent representation
ASCII? which all nodes are individually conn ected to a of graphics or text, usually on paper. T he first
(a) American Standard Code for Information central connection point like a hub or switch is electronic printer was the EP-101, invented by
Interchange called star topology. Japanese company Epson and released in 1968.
(b) Asian Standard Code for Information
Interchange 111. ______ is the process of turning on a 117. Which of the following is one of the file
(c) Analytical Scientific Code for Information computer and powering up the system. formats used for web graphics?
Interchange (a) Booting (b) Loading (a) gif (b) .exe (c) .txt (d) .docx
(d) Analytical Standard Code for Intermitted (c) Saving (d) Execution Sol. (a). gif is one of the file formats used for
Information Sol. (a). Booting is the process of turning on a web graphics. GIF or Graphics Interchange
Sol. (a). The full form of ASCII: American computer and powering up the system. When Format files are widely used for web graphics,
Standard Code for Information Interchange. we start our computer then there is an because they are limited to only 256 colors, can
American Standard Code for Information operation which is performed automatically by allow for transparency, and can be animated.
Interchange, is a character encoding standard the computer which is also called Booting.
for electronic communication. ASCII codes 118. Which of the following is a single user
represent text computers,telecommunications 112. What do you call a key on a computer operating system?
equipment, and other devices. keyboard that is used to move the pointer (a) Windows 7 (b) MS-DOS
(cursor) around on the screen? (c) Windows NT (d) Linux
106. An/A ______ is a finite set of instructions (a) Navigation key (b) Numeric key Sol. (b). T he single-user operating system is the
which, when followed, accomplish a particular (c) Function key (d) Control key operating system in which only one user can
task. Sol. (a). A navigation key is a key on a computer access the computer system at a time, and Ms-
(a) array (b) algorithm keyboard that is used to move the pointer DOS is the best example of a single-user
(c) data (d) node (cursor) around on the screen. They include the operating system.
Sol. (b). An algorithm is a finite set of four Arrow keys, PageUp, PageDown, Home
instructions that, when followed, accomplish a and End keys. 119. How many terabytes are in a petabyte?
particular task. The algorithm is a finite (a) 1048 (b) 1042
sequence of well-defined, computer- 113. Which of the following keyboard shortcuts (c) 1084 (d) 1024
implementable instructions, typically to solve a will you press in order to minimise all programs Sol. (d). There are 1,024 terabytes (TB) in a
class of specific problems or to perform a on a computer screen and display the desktop? petabyte. A petabyte is a measure of memory
computation. (a) Windows + C (b) Windows + M or data storage capacity that is equal to 2 to the
(c) Windows + F (d) Windows + D 50th power of bytes. A Terabyte (TB) is a
107. A ______ is a computer program that can Sol. (d). Windows + D should be pressed in measure of computer storage capacity that is
self-replicate and propagate over the network order to minimize all programs on a computer approximately 2 to the 40th power
with or without human intervention and has screen and display the desktop.
malicious intent. 120. Which type of storage device is a hard
(a) kernel (b) virus 114. CorelDraw is an example of a/an: disk?
(c) trojan horse (d) worm (a) database software (a) Secondary (b) Tertiary
Sol. (d). A worm is a computer program that (b) accounting software (c) Off-line (d) Primary
can self-replicate and propagate over the (c) spreadsheet software Sol. (a). The hard drive is the secondary storage
network with or without human intervention (d) desktop publishing software standard in modern computing. It is usually
and has malicious intent. It often uses a Sol. (d). CorelDraw is an example of a desktop installed internally in a computer, attached
computer network to spread itself relying on publishing software. CorelDraw is developed by directly to the disk controller of the computer's
security failures on the target computer to an Ottawa-based software company, allows motherboard.
access it. users to do things like adding special effects
such as borders to images, in addition to 121. What is the use of the functional key F7 in
108. A User Interface is the part of ______ that allowing for contrast adjustment, color Microsoft Word 2010?
allows the user to enter and receive balancing, and more. (a) It is used to open the Help window.
information. (b) It is used to run spell-check and grammar
(a) computer network (b) operating system 115. Which of the following is the full form of check.
(c) computer hardware (d) data science EBCDIC? (c) It is used for renaming files and folders.
Sol. (b). A User Interface is the part of the (a) Extended Binary-Coded-Decimal Interchange (d) It is used as a search key.
operating system that allows the user to enter Code Sol. (b). F7 key is most often used to run spell-
and receive information. An operating system (b) Extended Binary-Control-Device Interchange check and grammar check.
(OS) is system software that manages computer Code
hardware, software resources, and provides (c) Electronic Binary-Coded-Device Interchange 122. Which of the following file formats does
common services for computer programs. Code MS Paint use to open and save files in
Popular Operating Systems include Microsoft (d) Electronic Binary-Control-Decimal Windows?
Windows, Mac OS X, and Linux. Interchange Code (a) .DOC (b) .XlS
Sol. (a). EBCDIC, in full extended binary-coded (c) .JPEG (d) .PPT
109. Which of the following is an input device? decimal interchange code, data-encoding Sol. (c) .JPEG file formats MS Paint use to open
(a) Speaker (b) Scanner system, developed by IBM and used mostly on and save files in Windows.
(c) Projector (d) Monitor its computers, that uses a unique eight-bit
Sol. (b). An input device is a piece of equipment binary code for each number and alphabetic 123. Which of the following is a computer
used to provide data and control signals to an character as well as punctuation marks and application software?
information processing system such as a accented letters and non-alphabetic characters. (a) Word processor (b) RAM
computer or information appliance. Examples (c) Visual Basic (d) Java
of input devices include keyboards, mouse,

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 18


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
Sol. (a). Word processor is a Sol. (c). Climate research and weather (d) Magnetic ink character recognition
computerapplication software. A word forecasting requires exceedingly high-speed Sol. (d). Magnetic ink character recognition is
processor is a software or a device that allows computations. Therefore, Supercomputers are an input device used to verify the legitimacy or
users to create, edit, and print documents. used in climate, scientific and engineering work. originality of paper documents, especially
cheques.
124. Which keyboard shortcut in Microsoft 131. Which of the following keys will you press
Excel 2016 should you use to insert a new in Windows 10 to turn the volume up? 140. What is the other name for 'transistor
worksheet for Windows 10 operating system? (a) F4 (b) F5 (c) F6 (d) F8 computer'?
(a) Shift + F12 (b) Shift + F7 Sol. (d). F8 key is pressed to turn the volume up (a) First Generation Computer
(c) Shift + F5 (d) Shift + F11 in Windows 10. Also, F9 is pressed to turn the (b) Third Generation Computer
Sol. (a). F11 keyboard shortcut in Microsoft volume down. (c) Second Generation Computer
Excel 2016 should be used toinsert a new (d) Fourth Generation Computer
worksheet for Windows 10 operating system. 132. On a computer keyboard, the Shift and Alt Sol. (c). *First Generation: 1946-1959. Vacuum
F11 also has other uses depending on the keys are examples of: tube-based.
computer and program (a) numeric keys (b) modifier keys *Second Generation: 1959-1965. Transistor-
(c) function keys (d) cursor movement keys based.
125. Which of the following was the first Sol. (b). The Shift and Alt keys are examples of *Third Generation: 1965-1971. Integrated
operating system written in 'C' language? modifier keys on a computer keyboard. Circuit based.
(a) UNIX (b) Windows 95 *Fourth Generation: 1971-1980. VLSI
(c) Xenix (d) LINUX 133. Which of the following is the slowest type microprocessor-based.
Sol. (a). The C programming language came out of internet connection? *Fifth Generation: 1980-onwards. ULSI
of Bell Labs in the early 1970s by Dennis Ritchie. (a) Dial-up (b) Satellite microprocessor-based.
The C programming language was devised in (c) Cable (d) Digital subscriber line (DSL)
the early 1970s as a system implementation Sol. (a). Internet connection speed in 141. Who created FORTRAN — the first high-
language for the nascent Unix operating decreasing order:- Fiber - Cable - Satellite - DSL- level computer programming language?
system. Wireless - Dial-up. (a) Dan Bricklin (b) Marc Andreessen
(c) Larry Ellison (d) John Backus
126. Which of the following is a primary storage 134. The ______ is a three or four letter Sol. (d). John Backus
device in a personal computer? abbreviation that signifies the file type.
(a) Hard disk (b) Compact disk (a) extension (b) search 142. Which of the following is a method of
(c) Pen drive (d) Random-access memory (c) virus (d) name describing computer algorithms using a
Sol. (d). Random-access memory. RAM is a Sol. (a). The extension is a three or four letter combination of natural language and
form of computer memory that can be read and abbreviation that signifies the file type. programming language?
changed in any order, typically used to store (a) Node (b) Pseudocode
working data and machine code. 135. Which of the following ports is used to (c) Flowchart (d) Array
connect a computer to a wired network? Sol. (b). Pseudocode is a method of describing
127. Which one of the following is a computer (a) Universal serial bus port computer algorithms using a combination of
virus? (b) Ethernet port natural language and programming language.
(a) Penguin (b) Panda (c) Parallel port
(c) Spider (d) Creeper (d) Super-video port 143. ______ is an interpreted, high-level and
Sol. (d). The Creeper virus is the first computer Sol. (b). Ethernet is a family of wired computer general-purpose programming language.
virus ever developed by Bob in 1971. networking technologies commonly used in (a) Python (b) Spider
local area networks (LAN), metropolitan area (c) Penguin (d) Cookie
128. Second-generation computers (1955-1964) networks (MAN) and wide area networks Sol. (a). Python is an interpreted, high-level and
were made of: (WAN). general-purpose programming language.
(a) large scale integrated circuit chips
(b) vacuum tubes 136. Where in a computer would you use a 144. ______ contains and manages all the
(c) transistors 'joystick' for computer games and assistive programs and applications that a computer or
(d) small scale integrated circuit chips technology? other device is able to run.
Sol. (c). Second Generation computers used (a) Mail merge (b) Cursor control (a) Data Science (b) Operating system
transistors. While first-generation computers (c) Increase memory (d) Storage space (c) Computer hardware (d) Computer software
used vacuum tubes, third-generation Sol. (b). Cursor control Sol. (b). Operating system
computers used integrated circuits, fourth-
generation computers used microprocessors 137. Which of the following is a part of the 145. What is the keyboard shortcut to add a
and fifth-generation computers are based on central processing unit of a computer? new row above a given row in Microsoft Excel?
Artificial Intelligence(AI). (a) Mouse (b) Scanner (a) Alt + I + R (b) Alt + C + I
(c) Memory registers (d) Joystick (b) Shift + Spacbar (d) Shift + I + R
129. A message that tries to trick a person into Sol. (c). The memory address register (MAR) is Sol. (a). Alt + I + R. Shift+Space Bar - Select Row
providing information such as his social security the CPU register that either stores the memory in Excel.
number, bank account information or login address from which data will be fetched to the
username and password for a website is a type CPU or the address to which data will be sent 146. Which of the following is NOT an example
of malware called: and stored. of an optical disk?
(a) Worms (b) Zombie (a) Blue Ray Disk (b) PROM
(c) Macro Virus (d) Phishing 138. Which of the following is an open-source (c) CD ROM (d) DVD
Sol. (d). Phishing is the fraudulent practice of operating system? Sol. (b). An optical disc is most commonly used
sending emails purporting to be from reputable (a) Windows 10 (b) Windows Vista as a CD player, CD-RW, DVD, Blu-ray player
companies in order to induce individuals to (c) Android (d) iOS
reveal personal information such as passwords Sol. (c) Android 147. A device or program that enables a
and credit card numbers. computer to transmit data over telephone or
139. Which of the following is an input device cable lines is called:
130. Which of the following types of computer used to verify the legitimacy or originality of (a) motherboard (b) modem
is used in climate research and weather paper documents, especially cheques? (c) monitor (d) mouse
forecasting? (a) Non-impact printer Sol. (b). modem
(a) Mainframe computers (b) Micro-computers (b) Optical mark reader
(c) Supercomputers (d) Mini-computers (c) Electronic card reader

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 19


COMPUTER KNOWLEDGE MCQS- BY TANIA MA’AM
148. In the field of Information and (a) travel (b) Training Convention on Climate Change. The Convention
Communication Technology , what is the full (c) to transform (d) to move has near-universal membership (197 Parties)
form of EEPROM? Sol. (c). The National Institution for and is the parent treaty of the 2015 Paris
(a) Electrically Erasable Programmable Read Transforming India, also called NITI Aayog, was Agreement.
Only Memory formed via a resolution of the Union Cabinet on
(b) Electrically Efficient Portable Read only January 1, 2015. NITI Aayog is the premier 160. Which of the following is the correct full
Memory policy 'Think Tank' of the Government of India, form of JPEG?
(c) Electrically Efficient Programmable Read providing both directional and policy inputs. (a) Joint Pixel Experts Group
Only Memory (b) Joint Photographic Experts Group
(d) Enhanced Electrical Portable Read only 154. What does 'T' stand for in ATM? (c) Joint Pixel Exports Group
Memory (a)Teller (b)Trunk (d) Joint Photography Exports Group
Sol. (a). EEPROM stands for Electrically Erasable (c)Translation (d)Transfer Sol. (b). JPEG:- Joint Photographic Experts
Programmable Read-Only Memory and is a type Sol. (a). The full form of ATM is Automated Group.
of non-volatile memory used in computers, Teller Machine. An ATM is an electro-
integrated in microcontrollers for smart cards mechanical machine that is used for making 161. CSIR as an autonomous body is the largest
and remote keyless systems, and other financial transactions from a bank account. research and development organisation in
electronic devices to store relatively small These machines are used to withdraw money India. What does CSIR stands for?
amounts of data. from personal bank accounts. (a) Council of Scientific and Industrial
Research
149. In the context of Cloud Computing , what 155. In DASD, what is the full form of ‘A’? (b) Council of Space and Industrial
is the full form of PaaS? (a) Around (b) Accessible Research
(a) Protocol as a Service (c) Arithmetic (d) Access (c) Centre of Space and Industrial
(b) Performance as a Service Sol. (d). A Direct-access storage device is a Research
(c) Payment as a Service secondary storage device in which each (d) Chamber of States and Industrial
(d) Platform as a Service physical record has a discrete location and a Research
Sol. (d). Platform as a service (PaaS) is a cloud unique address. DASD includes hard disk, Sol. (a). CSIR - Council of Scientific and
computing model in which a third-party magnetic drums, optical discs etc. Industrial Research. Headquarters - New Delhi,
provider delivers hardware and software tools, Established on - 26 September 1942.
usually those needed for application 156. Which of the following abbreviations
development -- to users over the internet. A related to categories of Indian Civil Services is 162. What does UNDP stand for in the context
PaaS provider hosts the hardware and software INCORRECT? of Economics?
on its own infrastructure. (a) IAS (b) ICS (c) IPS (d) IFS (a) United Nations Disinflation Programme
Sol. (b). IAS (Indian Administrative Services), IFS (b) United Nations Development Programme
150. In the context of IT services , what is the (Indian Foreign Services), IPS (Indian Police (c) United Nations Defaulting Programme
full form of BCP? Services) are categories of Indian Civil Services. (d) United Nations Deregulation Programme
(a) Business Continuity Plan Sol. (b). In the context of Economics, UNDP
(b) Business Confirmation Protocol 157. In the context of the banking sector, what stands for United Nations Development
(c) Business Continuity Protocol does ‘F’ stand for in IFSC? Programme. UNDP helps countries eliminate
(d) Business Confirmation Plan (a) Functional (b) Forum poverty and achieve sustainable economic
Sol. (a). Business continuity planning (BCP) is (c) Fiscal (d) Financial growth and human development. It’s
the process a company undergoes to create a Sol. (d). IFSC stands for Indian Financial system headquarter is in New York City, USA. UNDP
prevention and recovery system from potential Code.It is an 11 digit alphanumeric code used to annually publishes the Human Development
threats such as natural disasters or cyber- uniquely identify bank branches within the Report.
attacks. BCP is designed to protect personnel National Electronic Funds transfer (NEFT)
and assets and make sure they can function network by the central bank. 163. In the context of BHIM UPI, what does 'I'
quickly when disaster strikes. stand for in BHIM?
158. ICAR is an autonomous body responsible (a) Insurance (b) Identity
151. The full form INTACH is : for coordinating agriculture and research in (c) Interfere (d) Interface
(a) Indian National Trust for Art and Culture India. What is the full form of ICAR? Sol. (d). In the context of BHIM UPI, 'I' stands
Heritage (a) Institute of Central Aviation Research for Interface in BHIM. Bharat Interface for
(b) Indian National Trust for Archaeological and (b) Indian Centre of Agriculture and Research Money (BHIM) is an app that lets you make
Cooperative Heritage. (c) Indian Council of Agricultural Research simple, easy, and quick payment transactions
(c) Indian National Trust for Architectural and (d) Institute of Central Agricultural Research using Unified Payments Interface (UPI).
Calligraphic Heritage. Sol. (c). The ICAR (Indian Council of Agricultural
(d) Indian National Trust for Art and Research) has its headquarters in New Delhi. 164. What does the letter 'V' stand for in HVJ
Cooperative Heritage The Council is the apex body for coordinating, pipeline, which is India's first inter-state inland
Sol. (a). The Indian National Trust for Art and guiding, and managing research and education natural gas pipeline?
Cultural Heritage (INTACH) is a non-profit in agriculture including horticulture, fisheries, (a) Vadodara (b) Vaikom
charitable organisation registered under the and animal sciences in the entire country. (c) Vadnagar (d) Vijaipur
Societies Registration Act, 1860. Sol. (d). The letter 'V' stands for Vijaipur in the
159. India has engaged actively in the HVJ pipeline, which is India's first inter-state
152. What is the full form of MoU? multilateral negotiations in the UNFCCC. What inland natural gas pipeline. The pipeline runs
(a) Monetary of Union Territory is the full form of UNFCCC? from Hazira, Gujarat through Vijaipur, Madhya
(b) Memorandum of Understanding (a) United Nations Framework of Central Pradesh to Jagdishpur, Uttar Pradesh.
(c) Memory of Undertaking Climate Change
(d) Memory of Understanding (b) United Nations Fellowship of Central
Sol. (b). A memorandum of understanding Climate Change
(MoU) is a type of agreement between two (c) United Nations Framework Convention on
(bilateral) or more (multilateral) parties. It Climate Change
expresses a convergence of will between the (d) United Nations Fellowship Convention on
parties, indicating an intended common line of Climate Change
action. Sol. (c). India has engaged actively in
multilateral negotiations in the UNFCCC.
153. In the context of NITI Aayog, what does 'T' UNFCCC stands for United Nations Framework
stand for in NITI?

DOWNLOAD JK EXAM CRACKER APP FROM PLAYSTORE Page 20

You might also like