GkSeries.com

Computer Awareness MCQs | Computer Multiple Choice Questions with Answers

(1) What is gutter margin?
[A] Margin that is added to right margin when printing
[B] Margin that is added to the left margin when printing
[C] Margin that is added to the outside of the page when printing
[D] Margin that is added to the binding side of page when printing
Answer: Margin that is added to the binding side of page when printing
(2) In MS-Word,_____is a series of commands and instructions that you group together as a single command to accomplish a task automatically.
[A] Macro
[B] Template
[C] Balloons
[D] None of the above
Answer: Macro
(3) Which software allows user to perform calculations on row and columns of data?
[A] A electronic spreadsheet
[B] A workbook
[C] A worksheet
[D] A calculator
Answer: A electronic spreadsheet
(4) What is the mounting of file system?
[A] Crating of a filesystem
[B] Deleting a filesystem
[C] Removing portion of the file system into a directory structure
[D] Attaching portion of the file system into a directory structure
Answer: Attaching portion of the file system into a directory structure
(5) Which is the full form of VoIP?
[A] Voice of Internet Power
[B] Voice over Internet Protocol
[C] Voice on Internet Protocol
[D] Very optimized Internet Protocol
Answer: Voice over Internet Protocol
(6) Why do you log off from your computer when going out from your office?
[A] Someone might steal your files, passwords etc
[B] In order to save electricity
[C] Logging off is essential to increase performance
[D] Logging off is mandatory you before go out
Answer: Someone might steal your files, passwords etc
(7) Which of the following is not responsible for the performance of the computer?
[A] No of keys in the keyboard
[B] Name of the video/graphics card
[C] Memory in the video/graphics card
[D] The clock speed of the processor
Answer: No of keys in the keyboard
(8) TWhich of the following is the type of software that has self-replicating software that causes damage to files and system?
[A] Viruses
[B] Trojan horses
[C] Bots
[D] Worms
Answer: Worms
(9) Which of the following is a valid email address?
[A] Name.website@info@ed
[B] Name.website@info.in
[C] Name@website.info.com
[D] Website.name@website.com
Answer: Website.name@website.com
(10) Which of the following character set supports Japanese and Chinese font?
[A] EBCDIC
[B] ASCII
[C] EDCBI
[D] Unicode
Answer: Unicode
(11) Which of the following is the text alignment available in word processing software that adjusts the left margin while keeping the right margin in any way?
[A] Justify
[B] Left Justify
[C] Right Justify
[D] Centre
Answer: Left Justify
(12) Which of the following is false about the clock of the system?
[A] It is the property of the toolbar
[B] The system can periodically refresh the time by synchronizing with a time source
[C] System time is the current date and time of day
[D] The system keeps time so that your applications have ready access to accurate time
Answer: It is the property of the toolbar
(13) Which software allows a user to perform calculations on row and columns of data?
[A] An electronic spreadsheet
[B] A Workbook
[C] An Analyzer
[D] A calculator
Answer: An electronic spreadsheet
(14) Which term refers to the extent of detail provided in information? For instance, some information may provide summary information while others may provide a great amount of detail?
[A] Information Depth
[B] Aggregate Data
[C] Information Granularity
[D] Data Detail
Answer: Information Granularity
(15) Which of the following is a subset of a data warehouse?
[A] Relational database
[B] OLAP
[C] Intelligent Agent
[D] Data mart
Answer: Data mart
(16) When two companies are linked together by computers and they send business transactions through these computers, they are probably using _____
[A] Digital wallets
[B] Electronic data interchange
[C] B2C
[D] Smart cards
Answer: Electronic data interchange
(17) Which of the following is the standard security technology for establishing an encrypted link between a web server and a browser?
[A] SSL
[B] TCP/IP
[C] WWW
[D] HTTP
Answer: SSL
(18) Twisted pair wires are commonly used in?
[A] Telephones networks
[B] Cable TV Networks
[C] Computer networks
[D] Both (a) and (b)
Answer: Telephones networks
(19) Which of the following layers of the OSI model provides access protocol?
[A] Physical
[B] Presentation
[C] Session
[D] Data Link
Answer: Data Link
(20) What is the current version of IMAP?
[A] Version2
[B] Version3
[C] Version4
[D] Version5
Answer: Version4

View All Computer Awareness Questions Sets

Please share this page

Click Here to Read more questions

Teacher Eligibility Test