https://prikshaprep.com/?p=6677&preview=true

Computer Fundamentals MCQs with ANSWER

Computer Fundamentals MCQs

 

Questions

 

1. What is the brain of a computer called?

  • a) RAM
  • b) CPU
  • c) Monitor
  • d) Keyboard

2. Which of the following is the primary memory of a computer?

  • a) Hard disk
  • b) ROM
  • c) RAM
  • d) CD-ROM

3. What is the smallest unit of data in a computer?

  • a) Byte
  • b) Bit
  • c) Nibble
  • d) Word

4. Which of the following is an example of an input device?

  • a) Printer
  • b) Monitor
  • c) Keyboard
  • d) Speaker

5. Which of the following is an example of an output device?

  • a) Mouse
  • b) Scanner
  • c) Projector
  • d) Joystick

6. What is the full form of CPU?

  • a) Central Processing Unit
  • b) Computer Processing Unit
  • c) Control Processing Unit
  • d) None of these

7. Which of the following is not a type of computer?

  • a) Supercomputer
  • b) Mainframe
  • c) Minicomputer
  • d) Calculator

8. Which generation of computers used integrated circuits?

  • a) First
  • b) Second
  • c) Third
  • d) Fourth

9. What is the binary equivalent of decimal number 10?

  • a) 1010
  • b) 1100
  • c) 1001
  • d) 0110

10. Which of the following is not a programming language?

  • a) Python
  • b) Java
  • c) C++
  • d) Microsoft Word
  1. What is the main function of an operating system?
  • a) Manage hardware and software resources
  • b) Control input/output devices
  • c) Provide user interface
  • d) All of the above
  1. Which of the following is not an operating system?
  • a) Windows
  • b) Linux
  • c) macOS
  • d) Microsoft Word
  1. What is the process of converting analog data into digital data called?
  • a) Digitization
  • b) Analogization
  • c) Modulation
  • d) Demodulation
  1. Which of the following is a secondary storage device?
  • a) RAM
  • b) ROM
  • c) Hard disk
  • d) Cache memory
  1. What is the basic unit of data storage in a computer?
  • a) Bit
  • b) Byte
  • c) Kilobyte
  • d) Megabyte
  1. Which of the following is not a type of computer network?
  • a) LAN
  • b) MAN
  • c) WAN
  • d) PAN
  1. The internet is a network of networks. True or False?
  • a) True
  • b) False
  1. Which protocol is used for sending emails?
  • a) HTTP
  • b) FTP
  • c) SMTP
  • d) TCP
  1. What is the full form of HTML?
  • a) Hyper Text Markup Language
  • b) Hyper Transfer Markup Language
  • c) Hyper Text Machine Language
  • d) Hyper Text Media Language
  1. Which of the following is a search engine?
  • a) Google
  • b) Microsoft Word
  • c) Photoshop
  • d) Excel
  1. What is the purpose of an antivirus software?
  • a) To protect the computer from viruses
  • b) To speed up the computer
  • c) To enhance graphics performance
  • d) To improve internet speed
  1. Which of the following is a common type of malware?
  • a) Virus
  • b) Worm
  • c) Trojan horse
  • d) All of the above
  1. What is the process of converting data into a code that cannot be easily understood called?
  • a) Encryption
  • b) Decryption
  • c) Compression
  • d) Decompression
  1. Which of the following is a popular image file format?
  • a) JPEG
  • b) MP3
  • c) DOC
  • d) XLS
  1. What is the main function of a database management system (DBMS)?
  • a) To create and manage databases
  • b) To write computer programs
  • c) To design websites
  • d) To play multimedia files
  1. Which of the following is not a type of database?
  • a) Relational database
  • b) Hierarchical database
  • c) Network database
  • d) Object-oriented database
  1. What is the process of finding information in a database called?
  • a) Searching
  • b) Querying
  • c) Indexing
  • d) Sorting
  1. Which of the following is a popular web browser?
  • a) Google Chrome
  • b) Microsoft Word
  • c) Adobe Photoshop
  • d) Excel
  1. What does the acronym HTML stand for?
  • a) Hyper Text Markup Language
  • b) Hyper Transfer Markup Language
  • c) Hyper Text Machine Language
  • d) Hyper Text Media Language
  1. Which of the following is not a social networking website?
  • a) Facebook
  • b) Twitter
  • c) LinkedIn
  • d) Microsoft Word

  1. What is the full form of URL?
  • a) Uniform Resource Locator
  • b) Universal Resource Locator
  • c) Unique Resource Locator
  • d) United Resource Locator
  1. Which protocol is used to transfer files between computers on a network?
  • a) FTP
  • b) HTTP
  • c) SMTP
  • d) TCP/IP
  1. Which of the following is not a network topology?
  • a) Bus
  • b) Star
  • c) Ring
  • d) Tree
  1. What is the process of converting analog signals into digital signals called?
  • a) Modulation
  • b) Demodulation
  • c) Amplification
  • d) Attenuation
  1. Which of the following is a broadband internet connection?
  • a) Dial-up
  • b) DSL
  • c) Cable internet
  • d) Both b and c
  1. What is the main function of a firewall?
  • a) To protect a computer from unauthorized access
  • b) To speed up internet connection
  • c) To improve computer performance
  • d) To enhance graphics
  1. Which of the following is a type of malware?
  • a) Virus
  • b) Worm
  • c) Trojan horse
  • d) All of the above
  1. What is the process of recovering deleted files called?
  • a) Data recovery
  • b) Data backup
  • c) Data compression
  • d) Data encryption
  1. Which of the following is a cloud computing service model?
  • a) SaaS
  • b) PaaS
  • c) IaaS
  • d) All of the above
  1. What is the purpose of a search engine?
  • a) To find information on the internet
  • b) To create websites
  • c) To send emails
  • d) To play games

  1. Which of the following is not a component of a CPU?
  • a) Control Unit
  • b) Arithmetic Logic Unit (ALU)
  • c) Memory Unit
  • d) Register
  1. What is the binary equivalent of decimal number 5?
  • a) 101
  • b) 0101
  • c) 110
  • d) 011
  1. Which type of memory is non-volatile?
  • a) RAM
  • b) ROM
  • c) Cache
  • d) Registers
  1. What is the full form of BIOS?
  • a) Basic Input Output System
  • b) Binary Input Output System
  • c) Basic Internal Output System
  • d) None of these
  1. Which of the following is a secondary storage device?
  • a) Hard disk
  • b) RAM
  • c) ROM
  • d) Cache
  1. What is the process of transferring data from a computer to a remote location called?
  • a) Uploading
  • b) Downloading
  • c) Browsing
  • d) Streaming
  1. Which of the following is a network topology?
  • a) Bus
  • b) Star
  • c) Ring
  • d) All of the above
  1. What is the protocol used for secure communication over the internet?
  • a) HTTP
  • b) FTP
  • c) HTTPS
  • d) Telnet
  1. Which of the following is a popular email service?
  • a) Gmail
  • b) Yahoo
  • c) Outlook
  • d) All of the above
  1. What is the term used to describe unsolicited email messages?
  • a) Spam
  • b) Phishing
  • c) Malware
  • d) Virus

  1. Which of the following is a popular software suite for office productivity?
  • a) Microsoft Office
  • b) Adobe Photoshop
  • c) CorelDRAW
  • d) AutoCAD
  1. What is the process of converting data into a code that cannot be easily understood called?
  • a) Encryption
  • b) Decryption
  • c) Compression
  • d) Decompression
  1. Which of the following is a type of malware?
  • a) Virus
  • b) Worm
  • c) Trojan horse
  • d) All of the above
  1. What is the process of recovering deleted files called?
  • a) Data recovery
  • b) Data backup
  • c) Data compression
  • d) Data encryption
  1. Which of the following is a cloud computing service model?
  • a) SaaS
  • b) PaaS
  • c) IaaS
  • d) All of the above
  1. What is the purpose of a search engine?
  • a) To find information on the internet
  • b) To create websites
  • c) To send emails
  • d) To play games
  1. Which of the following is a popular social networking website?
  • a) Facebook
  • b) Twitter
  • c) LinkedIn
  • d) All of the above
  1. What is the term used to describe unsolicited email messages?
  • a) Spam
  • b) Phishing
  • c) Malware
  • d) Virus
  1. Which of the following is a type of database?
  • a) Relational database
  • b) Hierarchical database
  • c) Network database
  • d) All of the above
  1. What is the process of finding information in a database called?
  • a) Searching
  • b) Querying
  • c) Indexing
  • d) Sorting
  1. Which of the following is not a component of a CPU?
  • a) Control Unit
  • b) Arithmetic Logic Unit (ALU)
  • c) Memory Unit
  • d) Register
  1. What is the binary equivalent of decimal number 15?
  • a) 1111
  • b) 1011
  • c) 0111
  • d) 1101
  1. Which type of memory is non-volatile?
  • a) RAM
  • b) ROM
  • c) Cache
  • d) Registers
  1. What is the full form of BIOS?
  • a) Basic Input Output System
  • b) Binary Input Output System
  • c) Basic Internal Output System
  • d) None of these
  1. Which of the following is a secondary storage device?
  • a) Hard disk
  • b) RAM
  • c) ROM
  • d) Cache
  1. What is the process of transferring data from a computer to a remote location called?
  • a) Uploading
  • b) Downloading
  • c) Browsing
  • d) Streaming
  1. Which of the following is a network topology?
  • a) Bus
  • b) Star
  • c) Ring
  • d) All of the above
  1. What is the protocol used for secure communication over the internet?
  • a) HTTP
  • b) FTP
  • c) HTTPS
  • d) Telnet
  1. Which of the following is a popular email service?
  • a) Gmail
  • b) Yahoo
  • c) Outlook
  • d) All of the above
  1. What is the term used to describe unsolicited email messages?
  • a) Spam
  • b) Phishing
  • c) Malware
  • d) Virus
  1. Which of the following is a popular software suite for office productivity?
  • a) Microsoft Office
  • b) Adobe Photoshop
  • c) CorelDRAW
  • d) AutoCAD
  1. What is the process of converting data into a code that cannot be easily understood called?
  • a) Encryption
  • b) Decryption
  • c) Compression
  • d) Decompression
  1. Which of the following is a type of malware?
  • a) Virus
  • b) Worm
  • c) Trojan horse
  • d) All of the above
  1. What is the process of recovering deleted files called?
  • a) Data recovery
  • b) Data backup
  • c) Data compression
  • d) Data encryption
  1. Which of the following is a cloud computing service model?
  • a) SaaS
  • b) PaaS
  • c) IaaS
  • d) All of the above
  1. What is the purpose of a search engine?
  • a) To find information on the internet
  • b) To create websites
  • c) To send emails
  • d) To play games
  1. Which of the following is a popular social networking website?
  • a) Facebook
  • b) Twitter
  • c) LinkedIn
  • d) All of the above
  1. What is the term used to describe unsolicited email messages?
  • a) Spam
  • b) Phishing
  • c) Malware
  • d) Virus
  1. Which of the following is a type of database?
  • a) Relational database
  • b) Hierarchical database
  • c) Network database
  • d) All of the above
  1. What is the process of finding information in a database called?
  • a) Searching
  • b) Querying
  • c) Indexing
  • d) Sorting
  1. Which of the following is not a computer network topology?
  • a) Bus
  • b) Star
  • c) Ring
  • d) Tree
  1. What is the process of converting analog signals into digital signals called?
  • a) Modulation
  • b) Demodulation
  • c) Amplification
  • d) Attenuation
  1. Which of the following is a broadband internet connection?
  • a) Dial-up
  • b) DSL
  • c) Cable internet
  • d) Both b and c
  1. What is the main function of a firewall?
  • a) To protect a computer from unauthorized access
  • b) To speed up internet connection
  • c) To improve computer performance
  • d) To enhance graphics
  1. Which of the following is a type of malware?
  • a) Virus
  • b) Worm
  • c) Trojan horse
  • d) All of the above
  1. What is the process of recovering deleted files called?
  • a) Data recovery
  • b) Data backup
  • c) Data compression
  • d) Data encryption
  1. Which of the following is a cloud computing service model?
  • a) SaaS
  • b) PaaS
  • c) IaaS
  • d) All of the above
  1. What is the purpose of a search engine?
  • a) To find information on the internet
  • b) To create websites
  • c) To send emails
  • d) To play games
  1. Which of the following is a popular social networking website?
  • a) Facebook
  • b) Twitter
  • c) LinkedIn
  • d) All of the above
  1. What is the term used to describe unsolicited email messages?
  • a) Spam
  • b) Phishing
  • c) Malware
  • d) Virus
  1. Which of the following is not a component of a CPU?
  • a) Control Unit
  • b) Arithmetic Logic Unit (ALU)
  • c) Memory Unit
  • d) Register
  1. What is the binary equivalent of decimal number 25?
  • a) 11001
  • b) 11101
  • c) 10011
  • d) 11011
  1. Which type of memory is non-volatile?
  • a) RAM
  • b) ROM
  • c) Cache
  • d) Registers
  1. What is the full form of BIOS?
  • a) Basic Input Output System
  • b) Binary Input Output System
  • c) Basic Internal Output System
  • d) None of these
  1. Which of the following is a secondary storage device?
  • a) Hard disk
  • b) RAM
  • c) ROM
  • d) Cache
  1. What is the process of transferring data from a computer to a remote location called?
  • a) Uploading
  • b) Downloading
  • c) Browsing
  • d) Streaming
  1. Which of the following is a network topology?
  • a) Bus
  • b) Star
  • c) Ring
  • d) All of the above
  1. What is the protocol used for secure communication over the internet?
  • a) HTTP
  • b) FTP
  • c) HTTPS
  • d) Telnet
  1. Which of the following is a popular email service?
  • a) Gmail
  • b) Yahoo
  • c) Outlook
  • d) All of the above
  1. What is the term used to describe unsolicited email messages?
  • a) Spam
  • b) Phishing
  • c) Malware
  • d) Virus

Answers to Computer Fundamentals MCQs

Questions 1-20

  1. b) CPU
  2. c) RAM
  3. a) Bit
  4. c) Keyboard
  5. c) Projector
  6. a) Central Processing Unit
  7. d) Calculator
  8. c) Third
  9. a) 1010
  10. d) Microsoft Word
  11. d) All of the above
  12. d) Microsoft Word
  13. a) Digitization
  14. c) Hard disk
  15. a) Bit
  16. d) PAN
  17. a) True
  18. c) SMTP
  19. a) Hyper Text Markup Language
  20. a) Google

Questions 21-40

  1. a) To protect the computer from viruses
  2. d) All of the above
  3. a) Encryption
  4. a) JPEG
  5. a) To create and manage databases
  6. d) Object-oriented database
  7. b) Querying
  8. a) Google Chrome
  9. a) Hyper Text Markup Language
  10. d) Microsoft Word
  11. a) Uniform Resource Locator
  12. a) FTP
  13. d) Tree
  14. a) Modulation
  15. d) Both b and c
  16. a) To protect a computer from unauthorized access
  17. d) All of the above
  18. a) Data recovery
  19. d) All of the above
  20. a) To find information on the internet

Questions 41-60

  1. c) Memory Unit
  2. a) 1111
  3. b) ROM
  4. a) Basic Input Output System
  5. a) Hard disk
  6. a) Uploading
  7. d) All of the above
  8. c) HTTPS
  9. d) All of the above
  10. a) Spam
  11. a) Microsoft Office
  12. a) Encryption
  13. d) All of the above
  14. a) Data recovery
  15. d) All of the above
  16. a) To find information on the internet
  17. d) All of the above
  18. a) Spam
  19. d) All of the above
  20. b) Querying

Questions 61-80

  1. c) Memory Unit
  2. a) 11001
  3. b) ROM
  4. a) Basic Input Output System
  5. a) Hard disk
  6. a) Uploading
  7. d) All of the above
  8. c) HTTPS
  9. d) All of the above
  10. a) Spam
  11. a) Microsoft Office
  12. a) Encryption
  13. d) All of the above
  14. a) Data recovery
  15. d) All of the above
  16. a) To find information on the internet
  17. d) All of the above
  18. a) Spam
  19. d) All of the above
  20. b) Querying

Questions 81-100

  1. d) Tree
  2. a) Modulation
  3. d) Both b and c
  4. a) To protect a computer from unauthorized access
  5. d) All of the above
  6. a) Data recovery
  7. d) All of the above
  8. a) To find information on the internet
  9. d) All of the above
  10. a) Spam
  11. c) Memory Unit
  12. b) 11101
  13. b) ROM
  14. a) Basic Input Output System
  15. a) Hard disk
  16. a) Uploading
  17. d) All of the above
  18. c) HTTPS
  19. d) All of the above
  20. a) Spam

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top