GkSeries.com

Computer Awareness MCQs | Computer Multiple Choice Questions with Answers

(1) Which of the following network devices is also called a concentrator?
[A] Switch
[B] Router
[C] Brouter
[D] Hub
Answer: Hub

Sol. A hub contains several ports for connecting multiple computers to form a small network. A simple hub is also called a concentrator.

(2) Internet access by transmitting digital data over the wires of a local telephone network is provided by
[A] Leased line
[B] Digital subscriber line
[C] Digital signal line
[D] MODEM
Answer: Digital subscriber line

Sol. Digital subscriber line (DSL or digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.

(3) What is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host?
[A] Identity Theft
[B] Forging
[C] IP Spoofing
[D] Pharming
Answer: IP Spoofing

Sol. Spoofing: It is a type of scam where an intruder attempts to gain unauthorized access to a user's system or information by pretending to be the user. The main purpose is to trick the user into releasing sensitive information.

(4) Portrait and Landscape are
[A] Page Orientation
[B] page layout
[C] page size
[D] page view
Answer: Page Orientation

Sol. Page orientation is the way in which a rectangular page is oriented for normal viewing.

(5) Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
[A] Program thievery
[B] Data snatching
[C] Software piracy
[D] Program looting
Answer: Software piracy

Sol. Software piracy is the illegal copying, distribution, or use of software.

(6) Which of the following topologies has the highest reliability?
[A] Star topology
[B] Bus topology
[C] Ring topology
[D] Mesh topology
Answer: Mesh topology

Sol. In the mesh topology, each computer is connected to the other with a separate physical link in a network. It is most reliable topology as the network does not get down in case one of the nodes is failed.

(7) Computer language COBOL is appropriate for—
[A] Commercial purpose
[B] Graphic purpose
[C] Scientific purpose
[D] None of these
Answer: Commercial purpose

Sol. COBOL (Common Business Oriented Language) is a programming language that reads like regular English and is often used for business and administrative purposes.

(8) Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?
[A] Shareware
[B] Public domain software
[C] Application software
[D] Operating system software
Answer: Operating system software

Sol. An operating system (OS) is a program or software that manages and coordinates the functions of all the components of a computer. It also acts as an interface between the user and the hardware of a computer.

(9) What is the term that refers to an ad hidden inside software that you downloaded from an internet site?
[A] Spam
[B] Cookie
[C] Phish
[D] Adware
Answer: Adware

Sol. Adware is software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.

(10) Decryption & Encryption of data are the responsibility of which layer
[A] Physical
[B] Data Link
[C] Presentation
[D] Session
Answer: Presentation

Sol. Presentation layer is responsible for character-code translation, data conversion, data encryption and decryption, and data translation.

(11) A barcode is ________ code that represents data with bars of varying widths or heights.
[A] Optical
[B] Magnetic
[C] Laser
[D] Read/write
Answer: Optical

Sol. A barcode is an optical, machine-readable, representation of data; the data usually describes something about the object that carries the barcode.

(12) The abbreviation ISP stands for___
[A] International spy project
[B] Indian social planning
[C] Internet solution provider
[D] Internet service provider
Answer: Internet service provider

Sol. An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.

(13) Which of the following language defines commands GRANT and REVOKE?
[A] DDL
[B] DML
[C] DCL
[D] DQL
Answer: DCL

Sol. DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema. DCL use two commands to control access- GRANT and REVOKE.

(14) Which of the following key is a minimal super key?
[A] Primary key
[B] Alternate key
[C] Candidate key
[D] Secondary key
Answer: Candidate key

Sol. A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.

(15) Which IEEE Standards is used for Wi-Fi system?
[A] 802.11
[B] 802.1
[C] 802.2
[D] 802.3
Answer: 802.11

Sol. Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area network(LAN) technology designed to provide in-building broadband coverage.

(16) Which protocol is used to convert IP addresses to MAC addresses?
[A] IP
[B] RARP
[C] In ARP
[D] ARP
Answer: ARP

Sol. The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address. ARP maintains a cache (table) in which MAC addresses are mapped to IP addresses.

(17) The __________ shows a brief description and, optionally, keyboard shortcuts of commands of dialog box launchers.
[A] Context menu
[B] KeyTip
[C] Screen Tip
[D] Live Preview
Answer: Screen Tip

Sol. ScreenTip is a small window that appears when the pointer is rolled over a command or control. It shows the descriptive text for that command or control.

(18) You cannot save an Excel file in a/an __________ format
[A] PDF
[B] PSD
[C] TXT
[D] XML
Answer: PSD

Sol. PSD is an extension for Photoshop files.

(19) In a Windows-based application, when you click the Maximize button, it changes to the
[A] Minimize button
[B] Close button
[C] Open button
[D] Restore Down button
Answer: Restore Down button

Sol. The user interface of a Windows-based application contains Window control buttons, namely, Minimize, Maximize and Restore Down, and Close buttons. When the Maximize button is clicked, it is changed to the Restore Down button. Similarly, when the Restore Down button is clicked, the name of the button is changed to the Maximize button.

(20) In Excel, a new workbook contains __________ worksheets by default
[A] One
[B] Three
[C] Five
[D] Ten
Answer: Three

Sol. A new workbook contains only three worksheets, namely, Sheet 1, Sheet 2 and Sheet 3, by default. You can rename your worksheets at any point according to your requirements.

View All Computer Awareness Questions Sets

Please share this page

Click Here to Read more questions

Teacher Eligibility Test