Computer Fundamentals MCQs
Questions
1. What is the brain of a computer called?
- a) RAM
- b) CPU
- c) Monitor
- d) Keyboard
2. Which of the following is the primary memory of a computer?
- a) Hard disk
- b) ROM
- c) RAM
- d) CD-ROM
3. What is the smallest unit of data in a computer?
- a) Byte
- b) Bit
- c) Nibble
- d) Word
4. Which of the following is an example of an input device?
- a) Printer
- b) Monitor
- c) Keyboard
- d) Speaker
5. Which of the following is an example of an output device?
- a) Mouse
- b) Scanner
- c) Projector
- d) Joystick
6. What is the full form of CPU?
- a) Central Processing Unit
- b) Computer Processing Unit
- c) Control Processing Unit
- d) None of these
7. Which of the following is not a type of computer?
- a) Supercomputer
- b) Mainframe
- c) Minicomputer
- d) Calculator
8. Which generation of computers used integrated circuits?
- a) First
- b) Second
- c) Third
- d) Fourth
9. What is the binary equivalent of decimal number 10?
- a) 1010
- b) 1100
- c) 1001
- d) 0110
10. Which of the following is not a programming language?
- a) Python
- b) Java
- c) C++
- d) Microsoft Word
- What is the main function of an operating system?
- a) Manage hardware and software resources
- b) Control input/output devices
- c) Provide user interface
- d) All of the above
- Which of the following is not an operating system?
- a) Windows
- b) Linux
- c) macOS
- d) Microsoft Word
- What is the process of converting analog data into digital data called?
- a) Digitization
- b) Analogization
- c) Modulation
- d) Demodulation
- Which of the following is a secondary storage device?
- a) RAM
- b) ROM
- c) Hard disk
- d) Cache memory
- What is the basic unit of data storage in a computer?
- a) Bit
- b) Byte
- c) Kilobyte
- d) Megabyte
- Which of the following is not a type of computer network?
- a) LAN
- b) MAN
- c) WAN
- d) PAN
- The internet is a network of networks. True or False?
- a) True
- b) False
- Which protocol is used for sending emails?
- a) HTTP
- b) FTP
- c) SMTP
- d) TCP
- What is the full form of HTML?
- a) Hyper Text Markup Language
- b) Hyper Transfer Markup Language
- c) Hyper Text Machine Language
- d) Hyper Text Media Language
- Which of the following is a search engine?
- a) Google
- b) Microsoft Word
- c) Photoshop
- d) Excel
- What is the purpose of an antivirus software?
- a) To protect the computer from viruses
- b) To speed up the computer
- c) To enhance graphics performance
- d) To improve internet speed
- Which of the following is a common type of malware?
- a) Virus
- b) Worm
- c) Trojan horse
- d) All of the above
- What is the process of converting data into a code that cannot be easily understood called?
- a) Encryption
- b) Decryption
- c) Compression
- d) Decompression
- Which of the following is a popular image file format?
- a) JPEG
- b) MP3
- c) DOC
- d) XLS
- What is the main function of a database management system (DBMS)?
- a) To create and manage databases
- b) To write computer programs
- c) To design websites
- d) To play multimedia files
- Which of the following is not a type of database?
- a) Relational database
- b) Hierarchical database
- c) Network database
- d) Object-oriented database
- What is the process of finding information in a database called?
- a) Searching
- b) Querying
- c) Indexing
- d) Sorting
- Which of the following is a popular web browser?
- a) Google Chrome
- b) Microsoft Word
- c) Adobe Photoshop
- d) Excel
- What does the acronym HTML stand for?
- a) Hyper Text Markup Language
- b) Hyper Transfer Markup Language
- c) Hyper Text Machine Language
- d) Hyper Text Media Language
- Which of the following is not a social networking website?
- a) Facebook
- b) Twitter
- c) LinkedIn
- d) Microsoft Word
- What is the full form of URL?
- a) Uniform Resource Locator
- b) Universal Resource Locator
- c) Unique Resource Locator
- d) United Resource Locator
- Which protocol is used to transfer files between computers on a network?
- a) FTP
- b) HTTP
- c) SMTP
- d) TCP/IP
- Which of the following is not a network topology?
- a) Bus
- b) Star
- c) Ring
- d) Tree
- What is the process of converting analog signals into digital signals called?
- a) Modulation
- b) Demodulation
- c) Amplification
- d) Attenuation
- Which of the following is a broadband internet connection?
- a) Dial-up
- b) DSL
- c) Cable internet
- d) Both b and c
- What is the main function of a firewall?
- a) To protect a computer from unauthorized access
- b) To speed up internet connection
- c) To improve computer performance
- d) To enhance graphics
- Which of the following is a type of malware?
- a) Virus
- b) Worm
- c) Trojan horse
- d) All of the above
- What is the process of recovering deleted files called?
- a) Data recovery
- b) Data backup
- c) Data compression
- d) Data encryption
- Which of the following is a cloud computing service model?
- a) SaaS
- b) PaaS
- c) IaaS
- d) All of the above
- What is the purpose of a search engine?
- a) To find information on the internet
- b) To create websites
- c) To send emails
- d) To play games
- Which of the following is not a component of a CPU?
- a) Control Unit
- b) Arithmetic Logic Unit (ALU)
- c) Memory Unit
- d) Register
- What is the binary equivalent of decimal number 5?
- a) 101
- b) 0101
- c) 110
- d) 011
- Which type of memory is non-volatile?
- a) RAM
- b) ROM
- c) Cache
- d) Registers
- What is the full form of BIOS?
- a) Basic Input Output System
- b) Binary Input Output System
- c) Basic Internal Output System
- d) None of these
- Which of the following is a secondary storage device?
- a) Hard disk
- b) RAM
- c) ROM
- d) Cache
- What is the process of transferring data from a computer to a remote location called?
- a) Uploading
- b) Downloading
- c) Browsing
- d) Streaming
- Which of the following is a network topology?
- a) Bus
- b) Star
- c) Ring
- d) All of the above
- What is the protocol used for secure communication over the internet?
- a) HTTP
- b) FTP
- c) HTTPS
- d) Telnet
- Which of the following is a popular email service?
- a) Gmail
- b) Yahoo
- c) Outlook
- d) All of the above
- What is the term used to describe unsolicited email messages?
- a) Spam
- b) Phishing
- c) Malware
- d) Virus
- Which of the following is a popular software suite for office productivity?
- a) Microsoft Office
- b) Adobe Photoshop
- c) CorelDRAW
- d) AutoCAD
- What is the process of converting data into a code that cannot be easily understood called?
- a) Encryption
- b) Decryption
- c) Compression
- d) Decompression
- Which of the following is a type of malware?
- a) Virus
- b) Worm
- c) Trojan horse
- d) All of the above
- What is the process of recovering deleted files called?
- a) Data recovery
- b) Data backup
- c) Data compression
- d) Data encryption
- Which of the following is a cloud computing service model?
- a) SaaS
- b) PaaS
- c) IaaS
- d) All of the above
- What is the purpose of a search engine?
- a) To find information on the internet
- b) To create websites
- c) To send emails
- d) To play games
- Which of the following is a popular social networking website?
- a) Facebook
- b) Twitter
- c) LinkedIn
- d) All of the above
- What is the term used to describe unsolicited email messages?
- a) Spam
- b) Phishing
- c) Malware
- d) Virus
- Which of the following is a type of database?
- a) Relational database
- b) Hierarchical database
- c) Network database
- d) All of the above
- What is the process of finding information in a database called?
- a) Searching
- b) Querying
- c) Indexing
- d) Sorting
- Which of the following is not a component of a CPU?
- a) Control Unit
- b) Arithmetic Logic Unit (ALU)
- c) Memory Unit
- d) Register
- What is the binary equivalent of decimal number 15?
- a) 1111
- b) 1011
- c) 0111
- d) 1101
- Which type of memory is non-volatile?
- a) RAM
- b) ROM
- c) Cache
- d) Registers
- What is the full form of BIOS?
- a) Basic Input Output System
- b) Binary Input Output System
- c) Basic Internal Output System
- d) None of these
- Which of the following is a secondary storage device?
- a) Hard disk
- b) RAM
- c) ROM
- d) Cache
- What is the process of transferring data from a computer to a remote location called?
- a) Uploading
- b) Downloading
- c) Browsing
- d) Streaming
- Which of the following is a network topology?
- a) Bus
- b) Star
- c) Ring
- d) All of the above
- What is the protocol used for secure communication over the internet?
- a) HTTP
- b) FTP
- c) HTTPS
- d) Telnet
- Which of the following is a popular email service?
- a) Gmail
- b) Yahoo
- c) Outlook
- d) All of the above
- What is the term used to describe unsolicited email messages?
- a) Spam
- b) Phishing
- c) Malware
- d) Virus
- Which of the following is a popular software suite for office productivity?
- a) Microsoft Office
- b) Adobe Photoshop
- c) CorelDRAW
- d) AutoCAD
- What is the process of converting data into a code that cannot be easily understood called?
- a) Encryption
- b) Decryption
- c) Compression
- d) Decompression
- Which of the following is a type of malware?
- a) Virus
- b) Worm
- c) Trojan horse
- d) All of the above
- What is the process of recovering deleted files called?
- a) Data recovery
- b) Data backup
- c) Data compression
- d) Data encryption
- Which of the following is a cloud computing service model?
- a) SaaS
- b) PaaS
- c) IaaS
- d) All of the above
- What is the purpose of a search engine?
- a) To find information on the internet
- b) To create websites
- c) To send emails
- d) To play games
- Which of the following is a popular social networking website?
- a) Facebook
- b) Twitter
- c) LinkedIn
- d) All of the above
- What is the term used to describe unsolicited email messages?
- a) Spam
- b) Phishing
- c) Malware
- d) Virus
- Which of the following is a type of database?
- a) Relational database
- b) Hierarchical database
- c) Network database
- d) All of the above
- What is the process of finding information in a database called?
- a) Searching
- b) Querying
- c) Indexing
- d) Sorting
- Which of the following is not a computer network topology?
- a) Bus
- b) Star
- c) Ring
- d) Tree
- What is the process of converting analog signals into digital signals called?
- a) Modulation
- b) Demodulation
- c) Amplification
- d) Attenuation
- Which of the following is a broadband internet connection?
- a) Dial-up
- b) DSL
- c) Cable internet
- d) Both b and c
- What is the main function of a firewall?
- a) To protect a computer from unauthorized access
- b) To speed up internet connection
- c) To improve computer performance
- d) To enhance graphics
- Which of the following is a type of malware?
- a) Virus
- b) Worm
- c) Trojan horse
- d) All of the above
- What is the process of recovering deleted files called?
- a) Data recovery
- b) Data backup
- c) Data compression
- d) Data encryption
- Which of the following is a cloud computing service model?
- a) SaaS
- b) PaaS
- c) IaaS
- d) All of the above
- What is the purpose of a search engine?
- a) To find information on the internet
- b) To create websites
- c) To send emails
- d) To play games
- Which of the following is a popular social networking website?
- a) Facebook
- b) Twitter
- c) LinkedIn
- d) All of the above
- What is the term used to describe unsolicited email messages?
- a) Spam
- b) Phishing
- c) Malware
- d) Virus
- Which of the following is not a component of a CPU?
- a) Control Unit
- b) Arithmetic Logic Unit (ALU)
- c) Memory Unit
- d) Register
- What is the binary equivalent of decimal number 25?
- a) 11001
- b) 11101
- c) 10011
- d) 11011
- Which type of memory is non-volatile?
- a) RAM
- b) ROM
- c) Cache
- d) Registers
- What is the full form of BIOS?
- a) Basic Input Output System
- b) Binary Input Output System
- c) Basic Internal Output System
- d) None of these
- Which of the following is a secondary storage device?
- a) Hard disk
- b) RAM
- c) ROM
- d) Cache
- What is the process of transferring data from a computer to a remote location called?
- a) Uploading
- b) Downloading
- c) Browsing
- d) Streaming
- Which of the following is a network topology?
- a) Bus
- b) Star
- c) Ring
- d) All of the above
- What is the protocol used for secure communication over the internet?
- a) HTTP
- b) FTP
- c) HTTPS
- d) Telnet
- Which of the following is a popular email service?
- a) Gmail
- b) Yahoo
- c) Outlook
- d) All of the above
- What is the term used to describe unsolicited email messages?
- a) Spam
- b) Phishing
- c) Malware
- d) Virus
Answers to Computer Fundamentals MCQs
Questions 1-20
- b) CPU
- c) RAM
- a) Bit
- c) Keyboard
- c) Projector
- a) Central Processing Unit
- d) Calculator
- c) Third
- a) 1010
- d) Microsoft Word
- d) All of the above
- d) Microsoft Word
- a) Digitization
- c) Hard disk
- a) Bit
- d) PAN
- a) True
- c) SMTP
- a) Hyper Text Markup Language
- a) Google
Questions 21-40
- a) To protect the computer from viruses
- d) All of the above
- a) Encryption
- a) JPEG
- a) To create and manage databases
- d) Object-oriented database
- b) Querying
- a) Google Chrome
- a) Hyper Text Markup Language
- d) Microsoft Word
- a) Uniform Resource Locator
- a) FTP
- d) Tree
- a) Modulation
- d) Both b and c
- a) To protect a computer from unauthorized access
- d) All of the above
- a) Data recovery
- d) All of the above
- a) To find information on the internet
Questions 41-60
- c) Memory Unit
- a) 1111
- b) ROM
- a) Basic Input Output System
- a) Hard disk
- a) Uploading
- d) All of the above
- c) HTTPS
- d) All of the above
- a) Spam
- a) Microsoft Office
- a) Encryption
- d) All of the above
- a) Data recovery
- d) All of the above
- a) To find information on the internet
- d) All of the above
- a) Spam
- d) All of the above
- b) Querying
Questions 61-80
- c) Memory Unit
- a) 11001
- b) ROM
- a) Basic Input Output System
- a) Hard disk
- a) Uploading
- d) All of the above
- c) HTTPS
- d) All of the above
- a) Spam
- a) Microsoft Office
- a) Encryption
- d) All of the above
- a) Data recovery
- d) All of the above
- a) To find information on the internet
- d) All of the above
- a) Spam
- d) All of the above
- b) Querying
Questions 81-100
- d) Tree
- a) Modulation
- d) Both b and c
- a) To protect a computer from unauthorized access
- d) All of the above
- a) Data recovery
- d) All of the above
- a) To find information on the internet
- d) All of the above
- a) Spam
- c) Memory Unit
- b) 11101
- b) ROM
- a) Basic Input Output System
- a) Hard disk
- a) Uploading
- d) All of the above
- c) HTTPS
- d) All of the above
- a) Spam