Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 7


Which of the following is an example of a binary number?

   A.) 100101
   B.) B1SCD0
   C.) 568974
   D.) 001365

Answer: Option 'A'



A Web site's main page is called

   A.) Bookmark
   B.) Browser Page
   C.) Home Page
   D.) Search Page

Answer: Option 'C'

Home Page


The basic unit of a worksheet into which you enter data in Excel is called a

   A.) column
   B.) box
   C.) cell
   D.) table

Answer: Option 'C'


Basic Computer Knowledge Quiz


Which of the following is a correct format of Email address?

   C.) sales@website@com

Answer: Option 'B'


What does HTTP stands for?

   A.) Hypertext Transfer Plotter
   B.) Hypertext Transfer Plot
   C.) Hypertext Transfer Protocol
   D.) Head Tail Transfer Protocol

Answer: Option 'C'

Hypertext Transfer Protocol


Java is a

   A.) Programming Language
   B.) The platform
   C.) The operating system
   D.) The motherboard

Answer: Option 'A'

Programming Language


What is the shortcut key of printing a document for computer having windows?

   A.) Ctrl + Shift + P
   B.) Alt + P
   C.) Ctrl + Alt + P
   D.) Ctrl + P

Answer: Option 'D'

Ctrl + P


The term 'Pentium' is related to

   A.) DVD
   B.) Hard Disk
   C.) Microprocessor
   D.) Mouse

Answer: Option 'C'



'LAN' means

   A.) Light Area Network
   B.) Local Area Network
   C.) Large Area Network
   D.) Least Area Network

Answer: Option 'B'

Local Area Network

Basic Computer Knowledge Quiz


Computer software includes

   A.) Packaged programs
   B.) Operating system programs
   C.) Application programs
   D.) All of these

Answer: Option 'D'

All of these


Which among the following is not a mobile Operating System?

   A.) Bada
   B.) Safari
   C.) WebOS
   D.) MeeGo

Answer: Option 'B'

Safari is a web browser


Which among the following key can be used as a shortcut to rename a folder in Microsoft Windows 8 and higher versions?

   A.) F2
   B.) F4
   C.) F6
   D.) F11

Answer: Option 'A'

F2 is a shortcut to rename selected object in MS windows 8 and higher versions


AT&T designed its first commercial modem, specifically for converting digital computer data to analog signals for transmission across its long distance network. What is the name of the modem?

   A.) Telex
   B.) Memex
   C.) CompuServe
   D.) Dataphone

Answer: Option 'D'

In 1960's AT&T introduces its Dataphone, the first commercial modem. The first commercial modem made for converting digital computer data at analog signals for transmission across long distance networks


Integrated Chips or IC’s were started to be in use from which generation of Computers?

   A.) 1st Generation
   B.) 2nd Generation
   C.) 3rd Generation
   D.) 4th Generation

Answer: Option 'C'

IC were started to be in use from 3rd generation of computers. In third generation of computer, IC (Integrated circuits) was used as the electronic component for computers. The development of IC gave birth to a new field of microelectronics. The main advantage of IC is not only its small size but its superior performance and reliability than the previous circuits. It was first developed by T.S Kilby. This generation of computer has huge storage capacity and higher calculating speed.


In Computer programming there is set of subroutine definitions, protocols, and tools for building software and applications. Which among the following is a term for sets of requirements that govern how one application can talk to another?

   A.) UPS
   B.) API
   C.) J2EE
   D.) OLE

Answer: Option 'B'

An API may be for a web-based system, operating system, database system, computer hardware, or software library. It is an acronym for Application Programming Interface. An API specifies how software components should interact and APIs are used when programming graphical user interface (GUI) components.


BSoDs can be caused by poorly written device drivers or malfunctioning hardware, such as faulty memory, power supply issues, overheating of components, or hardware running beyond its specification limits. Which color screen is displayed when encountered a BSOD Error?

   A.) Red
   B.) Green
   C.) Blue
   D.) Black

Answer: Option 'C'

BSODs appear when Microsoft Windows encounters a critical error it can’t recover from, requiring a reboot and possibly resulting in lost work. It stands for blue screen of death. Blue screens are generally caused by problems with your computer’s hardware or issues with its hardware driver software. A blue screen occurs when Windows encounters a “STOP Error.” This critical failure causes Windows to crash and stop working


Microsoft Word is a word processor developed by Microsoft. In MS Word Spelling Check is a feature available in which tab?

   A.) File
   B.) Home
   C.) Review
   D.) References

Answer: Option 'C'

In MS Word Spelling and Grammar check is available in Review Tab. Some other options available in Review are: Research, Thesaurus, Word Count, Translate, Language, New Comment, Tracking, Compare and Protect.


Which among the following is the smallest unit in an image in a computer screen?

   A.) Resolution
   B.) Array
   C.) Pixel
   D.) Clip

Answer: Option 'C'

In digital imaging, a pixel, pel, or picture element is a physical point in a raster image, or the smallest addressable element in an all points addressable display device; so it is the smallest controllable element of a picture represented on the screen.


Which among the following is not an Object Oriented Programming Language?

   A.) Python
   C.) Ruby
   D.) Java

Answer: Option 'B'

Pascal is an imperative and procedural programming language, designed in 1968/1969 and published in 1970 by Niklaus Wirth as a small and efficient language intended to encourage good programming practices using structured programming and data structuring.


If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of ______.

   A.) Authentication
   B.) Decryption
   C.) Encryption
   D.) Firewall

Answer: Option 'A'

The process of identifying an individual usually based on a username and password. In security systems, authentication is distinct from authorization, which is the process of giving individuals access to system objects based on their identity.

Computer Quiz Set - 7 Download Pdf

Recent Posts