Computer Awareness MCQs | Computer Multiple Choice Questions with Answers

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
1 Which of the following statements is incorrect about the UNIQUE KEY constraint?
A Unique key columns do not accept duplicate values
B One table can have only one unique key
C By default, unique key columns accept null values unless the NOT NULL constraint is specified
D The same combinations of columns should not make both unique and primary keys

Answer: One table can have only one unique key

Sol. Since one table can have at the most one primary key to avoid duplicates in other columns of the table, unique key can be defined. We can make one or more unique keys in a single table.

2 What does DDoS stand for?
A Data Denial-of-Service
B Distributed Denial-of-Service
C Distributed Data of Server
D Distribution of Data Service

Answer: Distributed Denial-of-Service

Sol. Distributed Denial-of-Service (DDoS) attack is a type of attack that is carried out by using multiple computers. These DDoS attacks aim at targeting computer networks of an organisation, such as Digital Subscriber Line (DSL) and cable.

3 Which of the following statements is false in the context of client/server network?
A It is expensive to set up
B It requires a specialized server
C It is a slow network
D It is highly secure

Answer: It is a slow network

Sol. The client/server network contains a centralised server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system. It is highly secure and processes good speed. However, it becomes congested when more clients simultaneously request for a service to the server.

4 Which of the following will set text in selected cells to italics?
A Pressing Ctrl + I on the keyboard
B Using the Tools – Wizard – Web Form menu item
C Using the Format – Cells – Font menu item
D Both (a) and (c)

Answer: Both (a) and (c)

Sol. Pressing Ctrl + I on the keyboard and Using the Format – Cells – Font menu item; both of these actions can help to set text in selected cells to italics.

5 What does the LOOKUP function do?
A Looks up text that contain ‘UP’
B Used to look in a single row or column and find a value from the same position in a second row or column
C Finds irrelevant records
D All of above

Answer: Used to look in a single row or column and find a value from the same position in a second row or column

Sol. LOOKUP function is used to look in a single row or column and find a value from the same position in a second row or column.

6 Which of the following components represent the parts of a Central Processing Unit(CPU)? (a) Input, output and processing
A Control unit, primary storage and secondary storage
B Control unit, arithmetic logic unit and primary storage
C Control unit, processing and primary storage
D None of these

Answer: Control unit, arithmetic logic unit and primary storage

Sol. Control unit, arithmetic-logic unit and primary storage are the parts of the CPU. The storage unit deals with the allocation of memory to the processed data, the Control Unit (CU) controls the flow and processing of the data and the Arithmetic Logic Unit (ALU) carries out the arithmetic operations of calculations of the computer system.

7 Which one of the following statements is not true for data Buffer?
A A data buffer is a region of a physical memory storage used to temporarily store data
B A buffer often adjusts timing by implementing a queue (or FIFO) algorithm in memory
C A majority of buffers are implemented in software, which typically use the ROM to store temporary data
D Buffers are often used in conjunction with I/O to hardware, such as disk drives, sending or receiving data to or from a network

Answer: A majority of buffers are implemented in software, which typically use the ROM to store temporary data

Sol. Majority of buffers use the faster RAM to store temporary data, not the ROM, due to the much faster access time compared with hard disk drives.

8 By an intranet we mean
A A LAN of an organization
B A Wide Area Network connecting all branches of an organization
C A network connecting all computers of an organization and using the internet protocol
D A corporate computer network

Answer: A network connecting all computers of an organization and using the internet protocol

Sol. An intranet is a private network accessible only to an organization's staff.

9 How many rows are there in latest version of MS Excel?
A 65536
B 16,384
C 1,048,576
D 1,050,000

Answer: 1,048,576

Sol. In latest version there are 1,048,576 rows by 16,384 columns.

10 Which type of device is used by banking websites to enter the password and prevent keystroke legging?
A Scanner
B Reader
C Virtual keyboard
D Light Pen

Answer: Virtual keyboard

Sol. A virtual keyboard is used for entering characters in a computer like a regular keyboard. However, unlike a regular keyboard, it is a software component.

11 Which of the following general purpose software allows you to do mathematical or financial calculation?
A Word processing program
B Spreadsheet program
C Presentation program
D DTP program

Answer: Spreadsheet program

Sol. A spreadsheet program is general-purpose software that allows you to do mathematical or financial calculation. An example of a spreadsheet program is MS excel

12 What is the function of the AutoCorrect feature across all MS Office applications?
A Replacing misspelled words with the correct ones while typing
B Replacing grammatically incorrect words with the correct ones
C Replacing repetitive words with the word ‘same’
D Replacing selected words with the word ‘auto’

Answer: Replacing misspelled words with the correct ones while typing

Sol. The AutoCorrect feature is used to correct typo errors and miss-spelled words automatically according to the words given in the list for the AutoCorrect feature.

13 Name the type of memory which clears everything when the power of a computer gets switched off.
A Volatile
B Non-volatile
C ROM
D Google Drive

Answer: Volatile

Sol. Volatile memory is a type of memory that clears everything when the power of a computer gets switched off, whereas nonvolatile memory retains the data even when the power gets switched off. Moreover, ROM and flash memory also retain the data in case the power gets switched off.

14 Which command is used to set a name to a disk in DOS?
A VOLUME
B VOL
C LABEL
D DISKLABEL

Answer: LABEL

Sol. Label (command) in computing, label is a command included with some operating systems (e.g., DOS, OS/2 and Microsoft Windows). It is used to create, change, or delete a volume label on a logical drive, such as a hard disk partition or a floppy disk.

15 What is the meaning of .EXE?
A Command File
B Express File
C Executable Files
D System File

Answer: Executable Files

Sol. EXE is extension for executable files

16 Which communication mode allows both the sender and the receiver to transmit data at the same time over a single communication channel?
A Simplex mode
B Half-duplex mode
C Full-duplex mode
D Semi-duplex mode

Answer: Full-duplex mode

Sol. In the simplex mode, communication is always unidirectional, for example television. In the half-duplex mode, communication is bidirectional but one at a time, which means only one of the parties can send data at a time. Walkie-talkie is an example of half duplex communication. In the full-duplex mode, communication is bidirectional, which means both the parties can transmit data simultaneously. Telephone is an example of full-duplex communication. The semi-duplex mode is not and type of communication mode.

.
17 Which of the following committees administers and provides long-range technical direction for Internet development?
A IBSF
B IAB
C ARPA
D ISO

Answer: IAB

Sol. Internet Architecture Board (IAB) administers and provides long-range technical direction for Internet development.

18 Which of the following is a software used for Remote Connection?
A TeamViewer
B Picasa
C Prisma
D Intel Connect

Answer: TeamViewer

Sol. TeamViewer is a proprietary computer software package for remote connection, desktop sharing, online meetings, web conferencing and file transfer between computers.

19 HTML tags are the hidden keywords within a web page that define how the browser must format and display the content. Which type of brackets makes an HTML tag?
A Flower brackets { }
B Angular brackets < >
C Parentheses ( )
D Square brackets [ ]

Answer: Angular brackets < >

Sol. Most tags in HTML must have two parts, an opening and a closing part. For example, is the opening tag and is the closing tag.

20 E-R modelling technique uses which approach?
A Top-down approach
B Bottom-up approach
C Left-right approach
D Both top-down and bottom-up

Answer: Top-down approach

Sol. E-R model uses top-down approach; Bottom-up approach is known as normalization.

View All Computer Awareness Questions Sets

Assam Direct Recruitment Test Series

Computer Science Topics