Basic Computer Interview Questions and Answers pdf | MCQs | 07 - 02 - 2019

1.

An error in a computer program is called a _________.

   A.) crash
   B.) power failure
   C.) bug
   D.) virus

Answer: Option 'C'

bug

2.

Which of the following are computers that can be carried around easily?

   A.) Minicomputers
   B.) Supercomputers
   C.) PCs
   D.) Laptops

Answer: Option 'D'

Laptops are portable and easy to carry around.

3.

Formatting a disk results in all the data being?

   A.) Saved to the disk
   B.) Copied from the disk
   C.) Difficult to recover
   D.) All of the above

Answer: Option 'C'

Formatting a disk does not erase the data on the disk, only the address tables. It makes it much more difficult to recover the files.

4.

Which of the following is not a binary number?

   A.) 10100
   B.) 10100
   C.) 20000
   D.) 11001

Answer: Option 'C'

20000

5.

Different components on the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?

   A.) Conductors
   B.) Buses
   C.) Connectors
   D.) Consecutive

Answer: Option 'B'

In computer architecture, a bus is a communication system that transfers data between components inside a computer, or between computers. Early computer buses were parallel electrical wires with multiple connections, but the term is now used for any physical arrangement that provides the same logical function as a parallel electrical bus. Modern computer buses can use both parallel and bit serial connections.

6.

Which among the following is a Super computer series developed by Indian scientists?

   A.) Param
   B.) Super30l
   C.) Compaq Presario
   D.) Cray YMP

Answer: Option 'A'

PARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. The latest machine in the series is the PARAM Kanchenjunga. 

7.

A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.

   A.) email
   B.) virus
   C.) web beacon
   D.) spam

Answer: Option 'C'

Common uses of web beacon are email tracking and page tagging for web analytics. Its alternative names are web bug, tracking bug, tag, or page tag.

8.

What is the keyboard shortcut to centralise the selected text in Word?

   A.) Ctrl + Esc
   B.) Ctrl + C
   C.) Alt + C
   D.) Ctrl + E

Answer: Option 'D'

Ctrl+E is the short cut key to centralise selected text in MS Word.

9.

MS PowerPoint is a software of ________.

   A.) Apple
   B.) Android
   C.) Microsoft
   D.) Google

Answer: Option 'C'

MS Powerpoint is in Microsoft Office Suite.

10.

What are different views to display a table in MS Access?

   A.) Pivot Table & Pivot Chart View
   B.) Design View
   C.) Datasheet View
   D.) All of the above

Answer: Option 'D'

All are views to display a table in MS Access

11.

Which among the following statement is true about motherboard?

   A.) Motherboard usually contains significant sub-systems such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components
   B.) Motherboard specifically refers to a PCB with expansion capability
   C.) It is the main printed circuit board (PCB) found in general purpose microcomputers and other expandable systems
   D.) All of the above

Answer: Option 'D'

All of the above statements are true about Motherboard

12.

Mobile Commerce is best described as

   A.) The use of kiosks in marketing
   B.) Transporting products
   C.) Buying and selling goods/services through wireless handheld devices
   D.) Using notebook PCs in marketing

Answer: Option 'C'

M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal digital assistants (PDAs). Known as next-generation e-commerce, m-commerce enables users to access the Internet without needing to find a place to plug in.

13.

What type of web technology creates an online community where people can make statements and others can read and respond to those statements?

   A.) I-Journal 
   B.) Podcast
   C.) ASP
   D.) Blog 

Answer: Option 'D'

A blog is a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.

14.

When the pointer is positioned which of the following, it is shaped like a hand?

   A.) Grammar error
   B.) Hyperlink
   C.) Screen Tip
   D.) Spelling error

Answer: Option 'B'

A pointer changes its shape to a hand when it is placed on a hyperlink.

15.

ARP (address resolution protocol) is________.

   A.) A TCP/IP protocol used to dynamically bind a high level IP address to a low level physical hardware address
   B.) ATCP/IP high level protocols for transferring files from one machine to another
   C.) a protcol used to monitor computers
   D.) a protocol that handles error and control messages

Answer: Option 'A'

A TCP/IP protocol used to dynamically bind a high level IP address to a low level physical hardware address

16.

Which tracking program records every keystroke you make on the computer?

   A.) Key logger
   B.) eFollow
   C.) ITrack/ULead
   D.) Stalking software

Answer: Option 'A'

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored

17.

Which of the following is the correct option that allows users to bring together copies of workbooks that other users have worked on independently in MS Excel?

   A.) Copying
   B.) Merging
   C.) Pasting
   D.) Compiling

Answer: Option 'B'

Merging allows users to bring together copies of workbooks in Excel

18.

Any hardware component that allows you to enter data or instructions into a computer is called a(n) _________.

   A.) printer
   B.) storage device
   C.) input device
   D.) system unit

Answer: Option 'C'

Input Device is that hardware component through which we enter data or provide input to computers.

19.

What type of monitoring file is commonly used on and accepted from Internet sites?

   A.) Smart ware
   B.) Phishes
   C.) Cookies 
   D.) Trojans

Answer: Option 'C'

A HTTP cookie (also called web cookie, Internet cookie, browser cookie or simply cookie, the latter which is not to be confused with the literal definition), is a small piece of data sent from a website and stored in a user's web browser while the user is browsing that website.

20.

EBCDIC stands for?

   A.) Extended Binary Coded Decimal Interchange Code
   B.) Enlarged Binary Code Digital Interchange Code
   C.) Extended Bilingual Coded Decimal Interchange Code
   D.) Encoded Bilingual Coded Division Interchange Code

Answer: Option 'A'

Extended Binary Coded Decimal Interchange Code


Basic Computer Interview Questions and Answers pdf | MCQs Download Pdf

Recent Posts