Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 8


All of the following are examples of real security and privacy risks EXCEPT:

   A.) Spam
   B.) Hackers
   C.) Identity theft
   D.) Viruses

Answer: Option 'A'


Basic Computer Knowledge Quiz


In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:

   A.) Eight kilobytes.
   B.) Eight bits
   C.) Eight bytes
   D.) Eight characters

Answer: Option 'B'

Eight bits


All of the following are examples of input devices EXCEPT a:

   A.) keyboard
   B.) mouse
   C.) scanner
   D.) printer

Answer: Option 'D'



Word processing, spreadsheet, and photo-editing are examples of:

   A.) platform software.
   B.) operating system software
   C.) system software
   D.) application software

Answer: Option 'D'

application software


The difference between people with access to computers and the Internet and those without this access is known as the:

   A.) digital divide
   B.) cyberway divide
   C.) Web divide
   D.) Internet divide

Answer: Option 'A'

digital divide


________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

   A.) Application software
   B.) The platform
   C.) The operating system
   D.) The motherboard

Answer: Option 'C'

The operating system


Servers are computers that provide resources to other computers connected to a:

   A.) client
   B.) network
   C.) supercomputer
   D.) mainframe

Answer: Option 'B'



A ____________ is approximately one billion bytes.

   A.) megabyte
   B.) gigabyte
   C.) kilobyte
   D.) bit

Answer: Option 'B'


Basic Computer Knowledge Quiz


__________ is data that has been organized or presented in a meaningful way.

   A.) Storage
   B.) A process
   C.) Information
   D.) Software

Answer: Option 'C'



Computers use the ____________ language to process data.

   A.) processing
   B.) binary
   C.) relational
   D.) megabyte

Answer: Option 'B'



Transmission control protocol is:

   A.) connection oriented protocol
   B.) uses a three way handshake to establish a connection
   C.) recievs data from application as a single stream
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned


Department(dept_id, emp_id, dept_name)
Here the cdept_id,emp_id and dept_name are __________ and Department is a _________.

   A.) Relations, Attribute
   B.) Attributes, Relation
   C.) Tuple, Relation
   D.) Tuple, Attributes

Answer: Option 'B'

Attributes, Relation


The subset of the super key is a candidate key under what condition?

   A.) No proper subset is a super key
   B.) All subsets are super keys
   C.) Each subset is a super key
   D.) Subset is a super key

Answer: Option 'A'

No proper subset is a super key


In cryptography, what is cipher?

   A.) algorithm for performing encryption and decryption
   B.) encrypted message
   C.) source text
   D.) both (a) and (b)

Answer: Option 'A'

algorithm for performing encryption and decryption


Here is an infix expression: 3 + 13*(60*376-12). The maximum number of symbols that will appear on the stack AT ONE TIME during the conversion of infix to postfix notation of this expression is?

   A.) 1
   B.) 2
   C.) 3
   D.) 4

Answer: Option 'D'



Which one of the following provides the ability to query information from the database and to insert tuples into, delete tuples from, and modify tuples in the database?

   A.) DML
   B.) Query
   C.) DDL
   D.) Relational Schema

Answer: Option 'A'



Which one of the following is a transport layer protocol?

   A.) stream control transmission protocol
   B.) internet control message protocol
   C.) neighbor discovery protocol
   D.) dynamic host configuration protocol

Answer: Option 'A'

stream control transmission protocol


Pokémon Go app, an immensely popular game which allowed people to wander around their hometowns and score points by interacting with characters, within the confines of a game, then going to real-life places to make progress in virtual environments. Which of the following is related technology?

   A.) Artificial Intelligence
   B.) Virtual Reality
   C.) Augmented Reality
   D.) Sleeker

Answer: Option 'C'

Augmented reality is a technology that superimposes a computer-generated image on a user's view of the real world.


Which type of system can learn and adjust to new circumstances by themselves?

   A.) Database management system
   B.) Expert systems
   C.) Geographical systems
   D.) Neural networks

Answer: Option 'D'

Neural networks can learn and adjust to new circumstances by themselves.


In 2014, Apple decided to invent a programming language. What is the name of that programming language?

   A.) Cyanogen
   B.) Ruby
   C.) Oxygen
   D.) Swift

Answer: Option 'D'

Swift is a general-purpose, multi-paradigm, compiled programming language developed by Apple Inc.

Computer Quiz Set - 8 Download Pdf

Recent Posts