GkSeries.com

Computer Awareness MCQs | Computer Multiple Choice Questions with Answers

(1) Who first developed QWERTY keyboard used in computers and phones?
[A] Raphael Finkel
[B] Wim Ebbinkhuijsen
[C] Shafi Goldwasser
[D] Christopher Latham Sholes
Answer: Christopher Latham Sholes
(2) Linus Torvalds develop which operating system?
[A] Windows
[B] Mac OS
[C] UNIX
[D] Linux
Answer: Linux

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

(3) You must install a (n) ......... on a network if you want to share a broadband Internet connection
[A] router
[B] modem
[C] node
[D] cable
Answer: router
(4) Which of the following places the common data elements in order from smallest to largest
[A] character, file, record, field, database
[B] character, record, field, database, file
[C] character, field, record, file, database
[D] Bit, byte, character, record, field, file, database
Answer: character, field, record, file, database
(5) A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a
[A] hacker
[B] analyst
[C] instant messenger
[D] programmer
Answer: hacker
(6) To instruct Word to fit the width of a column to the contents of a table automatically, click the________ button and then point to AutoFit Contents.
[A] Fit to Form
[B] Format
[C] Auto-size
[D] Auto Fit
Answer: Auto Fit
(7) The_____stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
[A] BIOS
[B] API
[C] device driver
[D] supervisor program
Answer: BIOS
(8) A device operating at the physical layer is called a :
[A] Bridge
[B] Router
[C] Repeater
[D] All of the above
Answer: Repeater
(9) To get to the ‘Symbol’ dialog box, click on the ……… menu and choose ‘Symbol’.
[A] Insert
[B] Format
[C] Tools
[D] Table
Answer: Insert
(10) What are the instructions called that tell a system what, how, and when to do something?
[A] Object-oriented technology approach
[B] Object-oriented database
[C] Program
[D] Database management
Answer: Program
(11) What is it called when you are rerouted from your requested internet site to another, undesired site?
[A] Phishing
[B] Pharming
[C] Redirecting
[D] Hijacking
Answer: Redirecting
(12) Who is the person who typically manages the software development project?
[A] Software engineer
[B] Project manager
[C] IT manager
[D] Technology director
Answer: Project manager
(13) If you wish to extend the length of the network withouthaving the signal degrade, you would use a
[A] repeater
[B] switch
[C] gateway
[D] router
Answer: switch
(14) Office LANs that are spread geographically apart on alarge scale can be connected using a corporate ——
[A] CAN
[B] WAN
[C] DAN
[D] LAN
Answer: WAN
(15) Which of the following communication modessupport -two-way traffic but in only one direction at a time?
[A] half duplex
[B] simplex
[C] three-quarters duplex
[D] all of the above
Answer: half duplex
(16) When you are working on a document on PC, where is the document temporarily stored?
[A] RAM
[B] ROM
[C] The CPU
[D] Flash memory
Answer: RAM
(17) One can move between two or more open Excel files by using-
[A] ctrl + tab
[B] ctrl + page up
[C] ctrl + page down
[D] ctrl + F9
Answer: ctrl + tab
(18) _____________ is a facility whereby all the contents in a specified storage areas are written as Output.
[A] Dumping
[B] Chumping
[C] Logging
[D] Scheduling
Answer: Dumping
(19) Which of the following people probably has the least amount of technical knowledge?
[A] Programmer
[B] User
[C] System analyst
[D] Computer operator
Answer: User
(20) A(n) __________ converts all the source code into machine code, creating an executable file.
[A] linker
[B] compiler
[C] assembler
[D] interpreter
Answer: compiler

View All Computer Awareness Questions Sets

Please share this page

Click Here to Read more questions

Teacher Eligibility Test