Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 8

  • 1. All of the following are examples of real security and privacy risks EXCEPT:
   A.) Spam
   B.) Hackers
   C.) Identity theft
   D.) Viruses

Answer: Option 'A'

Spam

Basic Computer Knowledge Quiz

  • 2. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
   A.) Eight kilobytes.
   B.) Eight bits
   C.) Eight bytes
   D.) Eight characters

Answer: Option 'B'

Eight bits

  • 3. All of the following are examples of input devices EXCEPT a:
   A.) keyboard
   B.) mouse
   C.) scanner
   D.) printer

Answer: Option 'D'

printer

  • 4. Word processing, spreadsheet, and photo-editing are examples of:
   A.) platform software.
   B.) operating system software
   C.) system software
   D.) application software

Answer: Option 'D'

application software

  • 5. The difference between people with access to computers and the Internet and those without this access is known as the:
   A.) digital divide
   B.) cyberway divide
   C.) Web divide
   D.) Internet divide

Answer: Option 'A'

digital divide

  • 6. ________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
   A.) Application software
   B.) The platform
   C.) The operating system
   D.) The motherboard

Answer: Option 'C'

The operating system

  • 7. Servers are computers that provide resources to other computers connected to a:
   A.) client
   B.) network
   C.) supercomputer
   D.) mainframe

Answer: Option 'B'

network

  • 8. A ____________ is approximately one billion bytes.
   A.) megabyte
   B.) gigabyte
   C.) kilobyte
   D.) bit

Answer: Option 'B'

gigabyte

Basic Computer Knowledge Quiz

  • 9. __________ is data that has been organized or presented in a meaningful way.
   A.) Storage
   B.) A process
   C.) Information
   D.) Software

Answer: Option 'C'

Information

  • 10. Computers use the ____________ language to process data.
   A.) processing
   B.) binary
   C.) relational
   D.) megabyte

Answer: Option 'B'

binary

  • 11. Transmission control protocol is:
   A.) connection oriented protocol
   B.) uses a three way handshake to establish a connection
   C.) recievs data from application as a single stream
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned

  • 12. Department(dept_id, emp_id, dept_name)
    Here the cdept_id,emp_id and dept_name are __________ and Department is a _________.
   A.) Relations, Attribute
   B.) Attributes, Relation
   C.) Tuple, Relation
   D.) Tuple, Attributes

Answer: Option 'B'

Attributes, Relation

  • 13. The subset of the super key is a candidate key under what condition?
   A.) No proper subset is a super key
   B.) All subsets are super keys
   C.) Each subset is a super key
   D.) Subset is a super key

Answer: Option 'A'

No proper subset is a super key

  • 14. In cryptography, what is cipher?
   A.) algorithm for performing encryption and decryption
   B.) encrypted message
   C.) source text
   D.) both (a) and (b)

Answer: Option 'A'

algorithm for performing encryption and decryption

  • 15. Here is an infix expression: 3 + 13*(60*376-12). The maximum number of symbols that will appear on the stack AT ONE TIME during the conversion of infix to postfix notation of this expression is?
   A.) 1
   B.) 2
   C.) 3
   D.) 4

Answer: Option 'D'

4

  • 16. Which one of the following provides the ability to query information from the database and to insert tuples into, delete tuples from, and modify tuples in the database?
   A.) DML
   B.) Query
   C.) DDL
   D.) Relational Schema

Answer: Option 'A'

DML

  • 17. Which one of the following is a transport layer protocol?
   A.) stream control transmission protocol
   B.) internet control message protocol
   C.) neighbor discovery protocol
   D.) dynamic host configuration protocol

Answer: Option 'A'

stream control transmission protocol

  • 18. Pokémon Go app, an immensely popular game which allowed people to wander around their hometowns and score points by interacting with characters, within the confines of a game, then going to real-life places to make progress in virtual environments. Which of the following is related technology?
   A.) Artificial Intelligence
   B.) Virtual Reality
   C.) Augmented Reality
   D.) Sleeker

Answer: Option 'C'

Augmented reality is a technology that superimposes a computer-generated image on a user's view of the real world.

  • 19. Which type of system can learn and adjust to new circumstances by themselves?
   A.) Database management system
   B.) Expert systems
   C.) Geographical systems
   D.) Neural networks

Answer: Option 'D'

Neural networks can learn and adjust to new circumstances by themselves.

  • 20. In 2014, Apple decided to invent a programming language. What is the name of that programming language?
   A.) Cyanogen
   B.) Ruby
   C.) Oxygen
   D.) Swift

Answer: Option 'D'

Swift is a general-purpose, multi-paradigm, compiled programming language developed by Apple Inc.

  • 21. Which among the following is the appropriate term to find specific information on a website?
   A.) Analytical research
   B.) MDX querying
   C.) Drill down
   D.) Scroll down

Answer: Option 'C'

In information technology to drill down means to move from one place to another, information to detailed data by focusing in on something.

  • 22. Verizon Communications on July 2016, announced plans to acquire Yahoo for $4.8 billion in cash. Yahoo (www.yahoo.com) is a _________.
   A.) Website for Consumers
   B.) E-mail service
   C.) E-commerce website
   D.) Web Portal

Answer: Option 'D'

A Web portal is a specially designed website that often serves as the single point of access for information.
The first Web portals were online services, such as AOL, that provided access to the Web, but by now most of the traditional search engines have transformed themselves into Web portals to attract and keep a larger audience.

  • 23. A __________’s main purpose is to prohibit unauthorized access to your computer via the Internet.
   A.) Popup blocker
   B.) Firewall
   C.) Spyware blocker
   D.) Spam assassin

Answer: Option 'B'

A firewall acts as a barrier between a trusted network and an untrusted network. A firewall controls access to the resources of a network through a positive control model. This means that the only traffic allowed onto the network is defined in the firewall policy; all other traffic is denied. 
Firewalls can be implemented in both hardware and software, or a combination of both.

  • 24. Word is a word processor developed by Microsoft. In MS Word spelling check is a feature available in which tab?
   A.) Page Layout
   B.) Home
   C.) Review
   D.) References

Answer: Option 'C'

​Review

  • 25. __________ is the automatic addition of names and addresses from a database to letters and envelopes in order to facilitate sending mail especially advertising, to many addresses.
   A.) mail merge
   B.) bcc
   C.) balloons
   D.) New

Answer: Option 'A'

Mail merge is used to create multiple documents at once. These documents have identical layout, formatting, text, and graphics. Only specific sections of each document vary and are personalised.



Computer Quiz Set - 8 Download Pdf