Download PDF
Free download in PDF Computer Awareness Multiple Choice Questions(MCQs) & Answers. These multiple choice questions on Computer Science are very useful for NIELIT, BCA, B.Sc. MCA, M.Sc. B.Tech, M.Tech, BE, ME students an interview for various positions like Web Developer, System Analyst etc.
(1)
What is gutter margin?
[A]
Margin that is added to right margin when printing
[B]
Margin that is added to the left margin when printing
[C]
Margin that is added to the outside of the page when printing
[D]
Margin that is added to the binding side of page when printing
Answer: Margin that is added to the binding side of page when printing
(2)
In MS-Word,_____is a series of commands and instructions that you group together as a single command to accomplish a task automatically.
[A]
Macro
[B]
Template
[C]
Balloons
[D]
None of the above
(3)
Which software allows user to perform calculations on row and columns of data?
[A]
A electronic spreadsheet
[B]
A workbook
[C]
A worksheet
[D]
A calculator
Answer: A electronic spreadsheet
(4)
What is the mounting of file system?
[A]
Crating of a filesystem
[B]
Deleting a filesystem
[C]
Removing portion of the file system into a directory structure
[D]
Attaching portion of the file system into a directory structure
Answer: Attaching portion of the file system into a directory structure
(5)
Which is the full form of VoIP?
[A]
Voice of Internet Power
[B]
Voice over Internet Protocol
[C]
Voice on Internet Protocol
[D]
Very optimized Internet Protocol
Answer: Voice over Internet Protocol
(6)
Why do you log off from your computer when going out from your office?
[A]
Someone might steal your files, passwords etc
[B]
In order to save electricity
[C]
Logging off is essential to increase performance
[D]
Logging off is mandatory you before go out
Answer: Someone might steal your files, passwords etc
(7)
Which of the following is not responsible for the performance of the computer?
[A]
No of keys in the keyboard
[B]
Name of the video/graphics card
[C]
Memory in the video/graphics card
[D]
The clock speed of the processor
Answer: No of keys in the keyboard
(8)
TWhich of the following is the type of software that has self-replicating software that causes damage to files and system?
[A]
Viruses
[B]
Trojan horses
[C]
Bots
[D]
Worms
(9)
Which of the following is a valid email address?
[A]
Name.website@info@ed
[B]
Name.website@info.in
[C]
Name@website.info.com
[D]
Website.name@website.com
Answer: Website.name@website.com
(10)
Which of the following character set supports Japanese and Chinese font?
[A]
EBCDIC
[B]
ASCII
[C]
EDCBI
[D]
Unicode
(11)
Which of the following is the text alignment available in word processing software that adjusts the left margin while keeping the right margin in any way?
[A]
Justify
[B]
Left Justify
[C]
Right Justify
[D]
Centre
(12)
Which of the following is false about the clock of the system?
[A]
It is the property of the toolbar
[B]
The system can periodically refresh the time by synchronizing with a time source
[C]
System time is the current date and time of day
[D]
The system keeps time so that your applications have ready access to accurate time
Answer: It is the property of the toolbar
(13)
Which software allows a user to perform calculations on row and columns of data?
[A]
An electronic spreadsheet
[B]
A Workbook
[C]
An Analyzer
[D]
A calculator
Answer: An electronic spreadsheet
(14)
Which term refers to the extent of detail provided in information? For instance, some information may provide summary information while others may provide a great amount of detail?
[A]
Information Depth
[B]
Aggregate Data
[C]
Information Granularity
[D]
Data Detail
Answer: Information Granularity
(15)
Which of the following is a subset of a data warehouse?
[A]
Relational database
[B]
OLAP
[C]
Intelligent Agent
[D]
Data mart
(16)
When two companies are linked together by computers and they send business transactions through these computers, they are probably using _____
[A]
Digital wallets
[B]
Electronic data interchange
[C]
B2C
[D]
Smart cards
Answer: Electronic data interchange
(17)
Which of the following is the standard security technology for establishing an encrypted link between a web server and a browser?
[A]
SSL
[B]
TCP/IP
[C]
WWW
[D]
HTTP
(18)
Twisted pair wires are commonly used in?
[A]
Telephones networks
[B]
Cable TV Networks
[C]
Computer networks
[D]
Both (a) and (b)
Answer: Telephones networks
(19)
Which of the following layers of the OSI model provides access protocol?
[A]
Physical
[B]
Presentation
[C]
Session
[D]
Data Link
(20)
What is the current version of IMAP?
[A]
Version2
[B]
Version3
[C]
Version4
[D]
Version5
Please share this page