Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 8

1.

Which among the following is a self-contained step-by-step set of operations to be performed?

   A.) System Software
   B.) Algorithm
   C.) Network topology
   D.) Application software

Answer: Option 'B'

Algorithm is a self-contained step-by-step set of operations.

2.

Which one of the following provides the ability to query information from the database and to insert tuples into, delete tuples from, and modify tuples in the database?

   A.) DML
   B.) Query
   C.) DDL
   D.) Relational Schema

Answer: Option 'A'

DML

3.

What is Remote Desktop Connection?

   A.) It was known as Terminal Services in Windows Server 2008 and earlier, it is one of the components of Microsoft Windows.
   B.) a technology that allows you to carry your computer in remote areas.
   C.) a technology that allows you to sit at the client computer and connect to the host remote computer in a different location
   D.) both (a) and (c)

Answer: Option 'D'

Remote Desktop Services (RDS), known as Terminal Services in Windows Server 2008 and earlier, is one of the components of Microsoft Windows that allows a user to take control of a remote computer or virtual machine over a network connection.

4.

Of the 5 words listed below, which is the odd one out? 

   A.) Applications
   B.) Peripherals
   C.) Programs
   D.) Software

Answer: Option 'B'

Except for peripherals, all other options are examples of intangible instructions given to a computer to perform a specific type of task in on orderly manner.

5.

Department(dept_id, emp_id, dept_name)
Here the cdept_id,emp_id and dept_name are __________ and Department is a _________.

   A.) Relations, Attribute
   B.) Attributes, Relation
   C.) Tuple, Relation
   D.) Tuple, Attributes

Answer: Option 'B'

Attributes, Relation

6.

An example of a telecommunications device is a ________.

   A.) keyboard
   B.) modem
   C.) printer
   D.) mouse

Answer: Option 'B'

​modem

7.

Which of the following image formats was developed for CompuServe?

   A.) JPEG Image
   B.) GIF Image
   C.) PNG Image
   D.) BMP Image

Answer: Option 'B'

The GIF image format was developed for CompuServe (an online information service). Converting an image to a GIF image format is safe as no data is lost at the time of conversion. 

8.

In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:

   A.) Eight kilobytes.
   B.) Eight bits
   C.) Eight bytes
   D.) Eight characters

Answer: Option 'B'

Eight bits

9.

What is the smallest and largest font size available in Font Size tool of MS World on formatting toolbar?

   A.) 8 and 72
   B.) 8 and 68
   C.) 6 and 72
   D.) 6 and 68

Answer: Option 'A'

8 and 72 are the smallest and the largest font size available in Word for formatting.

10.

What is the blinking symbol on the screen that shows where the next character will appear? 

   A.) Cursor
   B.) Delete key
   C.) Arrow key
   D.) Return key

Answer: Option 'A'

In computer user interfaces, a cursor is an indicator used to show the current position for user interaction on a computer monitor or other display device that will respond to input from a text input or pointing device. 

11.

Changing desktop wallpaper is a simple task which can be accessed through ________ section of all control panel items. 

   A.) Graphics
   B.) Image
   C.) Personalize
   D.) Windows

Answer: Option 'C'

Wallpapers can be changed by the personalize section of all control panel items.

12.

A ____________ is approximately one billion bytes.

   A.) megabyte
   B.) gigabyte
   C.) kilobyte
   D.) bit

Answer: Option 'B'

gigabyte

Basic Computer Knowledge Quiz

13.

Who among the following is known as the Father of The Internet?

   A.) Tim Berners-Lee
   B.) Raymond Tomilson
   C.) Charles Babbage
   D.) Vint Cerf

Answer: Option 'D'

Tim Berners-Lee- Inventor of the World Wide Web.  Berners-Lee is the director of the World Wide Web Consortium (W3C), which oversees the continued development of the Web.
Raymond Tomilson-Sent the first e-mail (to himself)
Douglas Englebart- Father of computer mouse
Charles Babbage- Father of computers, inventor of analytical engine and difference engine
Vint Cerf- Father of the Internet. Cerf is the co-designer of the TCP/IP protocols and the architecture of the Internet.

14.

BIOS stands for  _________

   A.) Basic Input Output Service 
   B.) Basic Inner Output System 
   C.) Basic Input Output System 
   D.) Better Input Output System 

Answer: Option 'C'

BIOS is the acronym for Basic Input Output. The BIOS is a type of firmware used to perform hardware initialization during the booting.

15.

Which disk is used to cold boot a PC?  

   A.) Setup disk 
   B.) System disk 
   C.) Diagnostic Disk 
   D.) Program disk 

Answer: Option 'B'

System disk is used to cold boot a PC.

16.

A program embedded in a semiconductor chip during manufacture is called ____________ . 

   A.) Humanware
   B.) Liveware
   C.) Firmware
   D.) Software

Answer: Option 'C'

Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.  

17.

Trackball is an example of a/an ______.

   A.) Programming device
   B.) Pointing device
   C.) Output device
   D.) Software device

Answer: Option 'B'

Trackball is an example of a pointing device (mouse).

18.

___________ is a kind of cyber-attack that involves hackers taking control of a computer system and blocking access to it until a certain amount of money is paid.

   A.) Network
   B.) Ransomware
   C.) Encryption
   D.) Pirated Software

Answer: Option 'B'

Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.  Wanna Decryptor, also known as WannaCry or wcry, is a specific ransomware program that locks all the data on a computer system and leaves the user with only two files: instructions on what to do next and the Wanna Decryptor program itself. When the software is opened it tells computer users that their files have been encryted, and gives instructions on how to buy it, and provides a Bitcoin address to send it to.

19.

The subset of the super key is a candidate key under what condition?

   A.) No proper subset is a super key
   B.) All subsets are super keys
   C.) Each subset is a super key
   D.) Subset is a super key

Answer: Option 'A'

No proper subset is a super key

20.

Which of the following HTML tags is used to create a horizontal line on a Web page? 

   A.) <hr>
   B.) <tr>
   C.) <line>
   D.) <line direction = “horizontal”>

Answer: Option 'A'

In HTML, you can create a horizontal line on a Web page by using the <hr>tag. The purpose of the <hr> tag is to separate paragraphs or sections on a Web page.


Computer Quiz Set - 8 Download Pdf

Recent Posts