Download PDF
Free download in PDF Computer Awareness Multiple Choice Questions(MCQs) & Answers. These multiple choice questions on Computer Science are very useful for NIELIT, BCA, B.Sc. MCA, M.Sc. B.Tech, M.Tech, BE, ME students an interview for various positions like Web Developer, System Analyst etc.
(1)
Computers gather data, which means that they allow users to ________ data.
[A]
present
[B]
input
[C]
output
[D]
store
(2)
What is the responsibility of the logical unit in the CPU of a computer?
[A]
Producing result
[B]
Comparing numbers
[C]
Controlling flow of information
[D]
Performing mathematical operations
Answer: Comparing numbers
(3)
If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be ___
[A]
216
[B]
65,536
[C]
64K
[D]
128K
(4)
The terminal device that functions as a cash register, computer terminal and OCR reader is:
[A]
Data collection terminal
[B]
OCR register terminal
[C]
Video Display terminal
[D]
POS terminal
(5)
People often call ______ as the brain of computer system.
[A]
Control Unit
[B]
Arithmetic Logic Unit
[C]
Central Processing Unit
[D]
Storage Unit
Answer: Central Processing Unit
(6)
The first computer introduced in Nepal was ___
[A]
IBM 1400
[B]
IBM 1401
[C]
IBM 1402
[D]
IBM 1406
(7)
The telephone is an example of a(n)____ signal.
[A]
analog
[B]
digital
[C]
modulated
[D]
demodulated
(8)
A modem that doesn't need to be connected to a telephone line is the ___ modem.
[A]
external
[B]
internal
[C]
wireless
[D]
DSL
(9)
A relatively new technology that allows wireless connectivity:
[A]
Bluetooth
[B]
Black tooth
[C]
Blue band
[D]
Broadband
(10)
Which of the following controls the way in which the computer system functions and provides a means by which users can interact with the computer?
[A]
O/S
[B]
Motherboard
[C]
Platform
[D]
I/O gateway
(11)
Which of the following is not a database object?
[A]
Table
[B]
Queries
[C]
Reports
[D]
Relationship
(12)
When you are typing the text in a document, you would need to hit the enter key at the end of every ____________.
[A]
Line
[B]
Sentence
[C]
Paragraph
[D]
Word
(13)
___________ is the detailed written description of the programming cycle and the program accompanied by the test results and a printout of the program.
[A]
Output
[B]
Spec Sheets
[C]
Documentation
[D]
Report
(14)
The mirror image of the whole hard disk including the OS, applications, files and data is created by a ______________________.
[A]
Utility program
[B]
Driver
[C]
Backup software
[D]
OS
(15)
_________ are usually downloaded into the folder carrying Temporary Internet Files and are written into the computer by the websites you visit.
[A]
Anonymous Files
[B]
Cookies
[C]
Banner Ads
[D]
Images
(16)
________ is an invalid type of database key.
[A]
Structured primary key
[B]
Atomic primary key
[C]
Primary key
[D]
Composite primary key
Answer: Structured primary key
(17)
Customers, facilities, knowledge workers, business information, communication infrastructure and computer equipment are all considerations in a good _______ plan.
[A]
Hacker
[B]
Disaster recovery
[C]
Security
[D]
Risk management
(18)
Traffic in a VPN is not ______
[A]
invisible from public networks
[B]
logically separated from other traffic
[C]
accessible from unauthorised public networks
[D]
restricted to a single protocol in IP Sec
Answer: Logically separated from other traffic
(19)
A sender must not be able to deny that he sent a specific message when he in fact did. This is an aspect of security called ______
[A]
privacy
[B]
authentication
[C]
integrity
[D]
non-repudiation
(20)
How can you link excel worksheet data to a word document?
[A]
With a hyperlink
[B]
With a copy and paste buttons on the standard toolbar
[C]
With a right drag method
[D]
With a copy and paste special command
Please share this page