GkSeries.com

Computer Awareness MCQs | Computer Multiple Choice Questions with Answers

(1) What happens when you click on Insert >> Picture >> Clip Art
[A] It inserts a clipart picture into document
[B] It lets you choose clipart to insert into document
[C] It opens Clip Art taskbar
[D] It insert a Smart Art graphics
Answer: It opens Clip Art taskbar

Sol. Insert >> Picture >> Clip Art series of action opens clip art taskbar.

(2) What is a motion path?
[A] A type of animation entrance effect
[B] A method of advancing slides
[C] A method of moving items on a slide
[D] All of the above
Answer: A method of moving items on a slide

Sol. Motion path is a method of moving items on a slide.

(3) Distributed processing involves
[A] Solving computer component problems from a different computer
[B] Solving computing problems by breaking them into smaller parts that are separately processed by different computers
[C] Allowing users to share files on a network
[D] Allowing users to access network resources away from the office
Answer: Solving computing problems by breaking them into smaller parts that are separately processed by different computers

Sol. Distributed processing is a phrase used to refer to a variety of computer systems that use more than one computer (or processor) to run an application. This includes parallel processing in which a single computer uses more than one CPU to execute programs.

(4) The first electro-mechanical computer MARK-1 was invented by ___________.
[A] Charles Pascal
[B] John W Mauchly
[C] Howard Aiken
[D] Clifford Berry
Answer: Howard Aiken

Sol. MARK-1 invented was by Howard Aiken.

(5) A router is a networking device that forwards data packets and is connected to two or more data lines from different networks. Which among the following was the earliest device which had almost the same functionality as that of a router?
[A] Interface Delay Device
[B] Interface Traffic Manager
[C] Interface Routing Processor
[D] Interface Message Processor
Answer: Interface Message Processor

Sol. The very first device that had fundamentally the same functionality as a router does today was the Interface Message Processor (IMP); IMPs were the devices that made up the ARPANET, the first TCP/IP network.

(6) In Computer programming API is set of subroutine definitions, protocols, and tools for building software and applications. Which among the following is an application programming interface for the programming language Java, which defines how a client may access a database?
[A] J2EE
[B] JDK
[C] JAVA SE
[D] JDBC
Answer: JDBC

Sol. Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database. It is part of the Java Standard Edition platform, from Oracle Corporation.

(7) What is the current version of IMAP?
[A] IMAP version 2
[B] IMAP version 3
[C] IMAP version 4
[D] IMAP version 5
Answer: IMAP version 4

Sol. IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.

(8) Which of the following software posts unwanted advertisements on client’s computer?
[A] Virus
[B] Malware
[C] Worm
[D] Adware
Answer: Adware

Sol. Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.

(9) Which among the following add clicking malware created a buzz around the world with affecting millions of Android device users?
[A] WannaCry
[B] Judy
[C] Diva
[D] TrickBot
Answer: Judy

Sol. Recently nearly 41 Android apps, developed by Korea-based Kiniwini and published under the moniker ENISTUDIO Corp., set into motion fraudulent activities on the devices they were downloaded on. Judy malware infected devices to generate large amounts of fraudulent clicks on advertisements, generating revenues for the perpetrators behind it.

(10) Asymmetric cryptography, also known as public key cryptography, uses __________ and _________ keys to encrypt and decrypt data.
[A] Pattern, coder
[B] Coder, user
[C] Public, private
[D] Hypo, hyper
Answer: Public, private

Sol. Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in the pair can be shared with everyone; it is called the public key. The other key in the pair is kept secret; it is called the private key.

(11) Which among the following is the act of hacking a website or computer network in an effort to convey a social or political message?
[A] Spamming
[B] Hacktivism
[C] Phising
[D] Hacking
Answer: Hacktivism

Sol. Hacktivism is the act of hacking a website or computer network in an effort to convey a social or political message. The person who carries out the act of hacktivism is known as a hacktivist. In contrast to a malicious hacker who hacks a computer with the intent to steal private information or cause other harm, hacktivists engage in similar forms of disruptive activities to highlight political or social causes.

(12) The first Computer Virus is __________
[A] Creeper
[B] Sasser
[C] Blaster
[D] All of the above
Answer: Creeper

Sol. Creeper virus is a computer virus that is most commonly recognized as the first computer virus

(13) Which of the following image formats was developed for CompuServe?
[A] JPEG Image
[B] GIF Image
[C] PNG Image
[D] BMP Image
Answer: GIF Image

Sol. The GIF image format was developed for CompuServe (an online information service). Converting an image to a GIF image format is safe as no data is lost at the time of conversion.

(14) Which of the following statements is correct about EPROM?
[A] It is a type of ROM from which the stored data cannot be erased
[B] In this memory, data can be erased by electronic emission
[C] It is a type of RAM
[D] Ultraviolet rays are used to erase the data stored in the memory
Answer: Ultraviolet rays are used to erase the data stored in the memory

Sol. Erasable Programmable Read-Only Memory (EPROM) is a type of ROM from which the stored data can be erased using ultraviolet rays.

(15) Which of the following views shows thumbnail versions of all the slides and organizes them in horizontal rows?
[A] Normal View
[B] Outline View
[C] Slide Sorter View
[D] Notes Page View
Answer: Slide Sorter View

Sol. Normal View is used for editing a presentation slide by slide. Outline view is used to edit and jump between slides. Slide Sorter View is used to view thumbnail versions of all the sliders collectively. Notes Page View is used to view the look of the presentation when printed with notes.

(16) Changing desktop wallpaper is a simple task which can be accessed through ________ section of all control panel items.
[A] Graphics
[B] Image
[C] Personalize
[D] Windows
Answer: Personalize

Sol. Wallpapers can be changed by the personalize section of all control panel items.

.
(17) Assembly is a _______ based low-level language replacing binary machine-code instructions, which are very hard to remember, it is the classic and uncontroversial example of a low level language
[A] Memory
[B] High Level
[C] Key
[D] Mnemonic
Answer: Mnemonic
(18) China now has more of the world's fastest supercomputers than other countries. Which among the following is a Chinese super computer?
[A] BlueGene/Q system
[B] Cray XC30
[C] Shaheen II
[D] Tianhe-2
Answer: Tianhe-2
(19) What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
[A] CMOS
[B] RAM
[C] DRAM
[D] CPU
Answer: CMOS

Sol. The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the on board battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy. Additionally, the system clock resets when the CMOS loses power.

(20) What is SQL?
[A] Language used to communicate with database
[B] Language used for object oriented programming
[C] Language used to program system software
[D] Language used to hack into other systems
Answer: Language used to communicate with database

View All Computer Awareness Questions Sets

Please share this page

Click Here to Read more questions

Teacher Eligibility Test