Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 8

1.

Who among the following is/were inventor of transistors?

   A.) Walter Houser Brattain
   B.) John William
   C.) John Bardeen
   D.) Both (a) and (c)

Answer: Option 'D'

Walter Houser Brattain was an American physicist, along with John Bardeen and William Shockley, invented the point-contact transistor.

2.

Trackball is an example of a/an ______.

   A.) Programming device
   B.) Pointing device
   C.) Output device
   D.) Software device

Answer: Option 'B'

Trackball is an example of a pointing device (mouse).

3.

Which of the following is a term for the process of trading goods over the Internet?

   A.) e-selling-n-buying
   B.) e-trading
   C.) e-finance
   D.) e-commerce

Answer: Option 'D'

Electronic commerce, commonly written as e-commerce or e-commerce, is the trading or facilitation of trading in products or services using computer networks, such as the Internet or online social networks.

4.

Here is an infix expression: 3 + 13*(60*376-12). The maximum number of symbols that will appear on the stack AT ONE TIME during the conversion of infix to postfix notation of this expression is?

   A.) 1
   B.) 2
   C.) 3
   D.) 4

Answer: Option 'D'

4

5.

Computers use the ____________ language to process data.

   A.) processing
   B.) binary
   C.) relational
   D.) megabyte

Answer: Option 'B'

binary

6.

What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?

   A.) CMOS
   B.) RAM
   C.) DRAM
   D.) CPU

Answer: Option 'A'

The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the on board battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy. Additionally, the system clock resets when the CMOS loses power.

7.

Which of the following HTML tags is used to create a horizontal line on a Web page? 

   A.) <hr>
   B.) <tr>
   C.) <line>
   D.) <line direction = “horizontal”>

Answer: Option 'A'

In HTML, you can create a horizontal line on a Web page by using the <hr>tag. The purpose of the <hr> tag is to separate paragraphs or sections on a Web page.

8.

________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

   A.) Application software
   B.) The platform
   C.) The operating system
   D.) The motherboard

Answer: Option 'C'

The operating system

9.

Which among the following is a Super computer series developed by Indian scientists?

   A.) Param
   B.) Super30l
   C.) Compaq Presario
   D.) Cray YMP

Answer: Option 'A'

PARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. The latest machine in the series is the PARAM Kanchenjunga.

10.

The subset of the super key is a candidate key under what condition?

   A.) No proper subset is a super key
   B.) All subsets are super keys
   C.) Each subset is a super key
   D.) Subset is a super key

Answer: Option 'A'

No proper subset is a super key

11.

Which program, installed on the user’s computer help him to communicate or send request on the network? 

   A.) Paint
   B.) File Manager
   C.) Browser
   D.) Word

Answer: Option 'C'

A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing information resources on the World Wide Web. 

12.

The two ways to arrange multiple windows on the desktop are:

   A.) cascade and tile
   B.) drag and drop
   C.) point and click
   D.) minimize and maximize

Answer: Option 'A'

cascade and tile are two ways to arrange multiple windows on the desktop.

13.

______ key combination is used to reverse the last Undo.

   A.) Ctrl+A
   B.) Ctrl+C
   C.) Ctrl+W
   D.) Ctrl+Y

Answer: Option 'D'

Ctrl+A- to select all
Ctrl+C- to copy
Ctrl+W- to close currently focused tab/window
Ctrl+Y- used to reverse last undo
Ctrl+Z- to reverse last action i.e. to perform undo operation

14.

Verizon Communications on July 2016, announced plans to acquire Yahoo for $4.8 billion in cash. Yahoo (www.yahoo.com) is a _________.

   A.) Website for Consumers
   B.) E-mail service
   C.) E-commerce website
   D.) Web Portal

Answer: Option 'D'

A Web portal is a specially designed website that often serves as the single point of access for information.
The first Web portals were online services, such as AOL, that provided access to the Web, but by now most of the traditional search engines have transformed themselves into Web portals to attract and keep a larger audience.

15.

Which type of system can learn and adjust to new circumstances by themselves?

   A.) Database management system
   B.) Expert systems
   C.) Geographical systems
   D.) Neural networks 

Answer: Option 'D'

Neural networks can adjust to new circumstances by themselves.

16.

All of the following are examples of real security and privacy risks EXCEPT:

   A.) Spam
   B.) Hackers
   C.) Identity theft
   D.) Viruses

Answer: Option 'A'

Spam

Basic Computer Knowledge Quiz

17.

What is Telnet? 

   A.) Network or Telephones
   B.) Television Network
   C.) Remote Login
   D.) All of these

Answer: Option 'C'

Telnet is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

18.

Which among the following is the extension of font file?

   A.) .ff
   B.) .fnf
   C.) .fnt
   D.) .font

Answer: Option 'C'

The file extension for a font file is .fnt

19.

In MS-Word, a ruler can help to perform which of the following actions?

   A.) to set tabs
   B.) to set indents
   C.) to change page margins
   D.) All of the above

Answer: Option 'D'

All the given activities can be performed by using a ruler in MS Word.

20.

___________ is a kind of cyber-attack that involves hackers taking control of a computer system and blocking access to it until a certain amount of money is paid.

   A.) Network
   B.) Ransomware
   C.) Encryption
   D.) Pirated Software

Answer: Option 'B'

Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.  Wanna Decryptor, also known as WannaCry or wcry, is a specific ransomware program that locks all the data on a computer system and leaves the user with only two files: instructions on what to do next and the Wanna Decryptor program itself. When the software is opened it tells computer users that their files have been encryted, and gives instructions on how to buy it, and provides a Bitcoin address to send it to.


Computer Quiz Set - 8 Download Pdf

Recent Posts