Basic computer knowledge Questions And Answers

Basic computer knowledge MCQs


computer basic questions and answers, basic computer question and answer, basic questions in computer, computer basic questions and answers

basic questions on computer, computer basics exam questions, computer basic questions, simple computer questions

basic computer knowledge questions, basic computer course question and answer, basic knowledge of computer question and answer, computer knowledge questions

questions on computer knowledge, basic computer knowledge questions and answers, question for computer, questions on computer

computers questions and answers, basic computer application questions and answers, computer basics questions with answers, computer questions and answers

computer questions, computer question and answers, question of computer, question answer computer

S.No. Question Answer
1. Who is the father of Computer science? Charles Babbage
2. In a computer, most processing takes place in _______? CPU
3. The most widely used computer device is.? Internal hard disk
4. Scientific Name of Computer? Sillico sapiens
5. The difference between people with access to computers and the Internet and those without this access is known as the: Digital divide
6. Computers, combine both measuring and counting, are called _______? Hybrid Computer
7. __________is the process of dividing the disk into tracks and sectors. Formatting
8. To read the system messages and warnings, access the __________ in Windows. event viewer
9. If you wished to limit what you would see on an Excel worksheet, what data function would you use? Filter
10. Who is the father of personal computer? Edward Robert
11. EEPROM stands for _______? Electronic Erasable Programmable Read Only Memory
12. What type of graphical model is used to define a database? Organizational model
13. Which programming languages are classified as low level languages? Assembly Language
14. The __________ is a special database that holds information about the computers user, installed programs and hardware devices. Windows Registry
15. First page of Website is termed as _______? Homepage
16. IBM stands for _______? International Business Machines
17. Office LANs, which are scattered geographically on large scale, can be connected by the use of corporate _______? WAN ( wide area network )
18. To move a copy of file from one computer to another over a communication channel is called? File Transfer
19. Large transaction processing systems in automated organisations use _______? Batch Processing
20. MICR stands for _______? Magnetic Ink Character Recognition
21. To save an existing document with a different name_____? use the save as command
22. No. of different characters in ASCII coding system? 1024
23. LAN stands for Local area network
24. Which of the following are computers that can be carried around easily? Laptops
25. FTP is better than HTTP because _____. It uses separate channels for data transmission and flow control
26. A fault in a computer program which prevents it from working correctly is known as _______? Bug
27. Which button makes alphabets/letters in uppercase and lowercase and numbers to symbols? Shift
28. When a computer is switched on, the booting process performs _______? Power on self test
29. What is the software frequently utilized by end users called (like Word, PowerPoint)? Application Software
30. _________ are words that a programming language has set aside for its own use. Reserved words
31. Operating system is a(n) _____. System software
32. The unit KIPS is used to measure the speed of _______? Processor
33. DOS stands for _______? Disk Operating System
34. In addition to keying data directly into a database, data entry can be done from a(n) input form
35. In 1999, the Melissa virus was a widely publicized _______? E-mail virus
36. Which of the following commands is given to reboot the computer? Ctrl+Alt+Del
37. What is correcting errors in a program called? Debugging
38. BCD is _______? Binary Coded Decimal
39. SMTP, FTP and DNS are applications of the ____ layer.? application
40. SMTP, FTP and DNS are applications of the _______ layer? Application
41. Which command is used to select the whole document? Ctrl+A
42. COBOL is an acronym for _______? Common Business Oriented Language
43. The ability of an OS to run more than one application at a time is called? Multitasking
44. An affordable technology that uses existing telephone lines to provide high-speed connections is called ________ DSL
45. Full form of NOS? Network Operating system
46. Which of the following is not a design principle of BASIC? It is not interactive
47. A modem is connected to a _______? Telephone Line
48. Refresh Rate of monitor is measured in? Hertz
49. What was the chief component of first generation computer? Vacuum tube & Valves
50. Name the Father of Computer Mouse? Douglas Engelbart
51. The word 'computer' usually refers to the central processor unit plus? internal memory
52. The geometric arrangement of devices on the network is called _______? Topology
53. The basic goal of computer process is to convert data into _______? Information
54. Communication channel is shared by all the machines on the network in: broadcast network
55. Who is known as the founder of IBM Company? Thomas J. Watson
56. An image on a computer screen is made up of _______? Pixels
57. Full form of MAN? Metropolitan Area Network
58. Identify the volatile storage device amongst the following devices? RAM
59. A computer program that converts an entire program into machine language atone time is called _______? Characters
60. Which of the following statements is incorrect about the UNIQUE KEY constraint? One table can have only one unique key.
61. What is the personal computer operating system that organizes and uses a graphic desktop environment? Windows
62. What are Light pen and joystick? Input Devices
63. To which of the following categories do operating systems and debuggers belong? System software
64. SMPS stands for _______? Switched mode Power Supply
65. What do we use to change the appearance and positioning of text document in MSWord? Formatting
66. A _______ is approximately a million bytes? Megabyte
67. Daisy wheel, Drum, chain etc are the _______? Printers
68. XML stands for _______? Extensible Markup Language
69. What kind of scheme is the HTTP protocol? Request/Response
70. In Computer programming API is set of subroutine definitions, protocols, and tools for building software and applications. Which among the following is an application programming interface for the programming language Java, which defines how a client may access a database? JDBC
71. What is the meaning of OSI, in terms of computers ? Open system Interconnection
72. Which type of storage device is a BIOS ? Primary
73. What is the extension type of the excel 2007 files? .xlsx
74. Collecting personal information and effectively posing as another individual is known as the crime of _______? Identity theft
75. The amount of vertical space between lines of text in a document is called _______? Line Spacing
76. A computer cannot ‘boot’ if it does not have the _______? Operating system
77. What is the other name for programmed chip? LSIC
78. A normal CD- ROM usually can store up to _______ data? 680 MB
79. What does DMA stand for? Direct Memory Access
80. Full form of LAN? Local Area Network
81. ASCII stands for _______? American Standard Code for Information Interchange
82. Second Generation computers were developed during _______? 1956-65
83. The area of coverage of a satellite radio beam is called its….? footprint
84. What kind of memory is both static and non-volatile? ROM
85. What Excel tool allows you to create quickly and automatically summary data from a large data set? Pivot tables
86. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as _______? Spam
87. The common name for the crime of stealing passwords is _______? Spoofing
88. BIOS stands for _______? Basic Input Output System
89. Who is regarded as Father of “C” programming language? Dennis Ritchie
90. RAM can be treated as the _______ for the computer’s processor. Waiting Room
91. Computers manipulate data in many ways, and this manipulation is called _______? Processing
92. Which of the following is the organized collection of large amount of interrelated data stored in a meaningfully way used for manipulation and updating? Database
93. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called _______? Computer Forensics
94. Where does most data go first with in a computer memory hierarchy? RAM
95. Communication using a modulated carrier to apply a data signal to a transmission medium in analog form is Broad band networking
96. Which file contains permanent data and gets updated during the processing of transactions? Master File
97. A DVD is an example of an _______? Optical Disc
98. The uniform resource locator (URL) is case sensitive in the ____. Directory
99. A matrix in which number of zero elements are much higher than the number of non zero elements is called? Sparse Matrix
100. _____ contains the information about an array used in a program.? Dope vector

MS Excel Questions and Answers updated daily – Computer Knowledge MCQs

S.No. Question Answer
1. Which function will you use to enter current time in a woksheet cell? =now()
2. One cell format can be copied to another cell by using ____. Format Painter
3. How many recent files you can display on File menu at maximum? 9
4. Which of the following format you can decide to apply or not in AutoFormat dialog box? Number format, Border format, Font format
5. You can set Page Border in Excel from You can not set page border in Excel
6. You can check the conditions against __________ when applying conditional formatting Cell value, Formula
7. Which of the following is not true regarding Conditional Formatting? You can set condition to look for Bold and apply Italics on them
8. You can use the formula palette to Create and edit formula containing functions
9. How do you display current date only in MS Excel? Today ()
10. How do you wrap the text in a cell? Format cells alignment
11. What does COUNTA () function do? Counts non-empty cells
12. What is the short cut key to highlight the entire column? Ctrl + Space Bar
13. You can convert existing excel worksheet data an charts to an HTML document by using Internet assistant wizard
14. A circular reference is A formula that either directly or indirectly depends on itself
15. Which of following is Not one of Excel’s what-if function? Auto Outline
16. You can check the conditions against __________ when applying conditional formatting Cell value, Formula
17. You can use the formula palette to Create and edit formula containing functions
18. Which of the following format you can decide to apply or not in AutoFormat dialog box? Number format, Border format, Font format
19. How can you remove borders applied in cells? Choose None on Border tab of Format cells, Open the list on Border tool in Format Cell toolbar then choose first tool (none)
20. You can set Page Border in Excel from You can not set page border in Excel

Security Questions and Answers updated daily – Computer Knowledge

S.No. Question Answer
1. Verification of a Login name and password is known as________. Authentication
2. All of the following are example of real security and privacy risks except. Spam
3. A hacker contacts you by phone or email and attempts to acquire your password is known as _______-. phishing
4. A clerk in a bank has to access data in customer account. Logical access control for these users would be use of individual passwords
5. All of the following are example of real security and privacy risks except. Spam
6. Le-Hard virus is effect of a ___________. Command.com
7. Le-Hard virus is effect of a ___________. Command.com
8. A hacker contacts you by phone or email and attempts to acquire your password is known as _______-. phishing
9. Choose the right sequence of virus stages _________. Dormancy, Propagation,Triggering, Damage
10. A sender must not be able to deny that he sent a specific message when he in fact did. This is an aspect of security called ______.. non-repudiation
11. In digital Signature the private key used for ________ and the public key for ______ Encryption ,decryption
12. _______ refers to a family of IEEE standards dealing with local area network and metropolitan area network. 802
13. If 20 people need to communicate using symmetric-key cryptography, __ symmetric keys are needed. 190
14. The altering of data so that it is not usable unless the changes are undone is _______ Ergonomics
15. ________ are viruses that are triggered by the passage of time or on a certain date. Time bombs
16. A polymorphic virus _______. modifies its program code each time it attaches itself to another program or file
17. ___________ are viruses that are triggered by the passage of time or on a certain date. Time bombs
18. Antivirus software is an example of ______ a security utility
19. What type of virus use computer hosts to reproduces it? worm
20. Cyberspace is being governed by a system of law and regulation called? Criminal Law

To Whom this Free Online Mock Test Basic computer knowledge - Computer Basic Skils Questions and Answerss Free Online exams in Telugu Free Free Online Mock Test pdf free download Question and Answers section is beneficial?

Students can learn and improve on their skillset for using Free Online Mock Test Basic computer knowledge - Computer Basic Skils Questions and Answerss Free Online exams in Telugu Free Free Online Mock Test effectively and can also prepare for competitive examinations like...

  • All I.B.P.S and Public Sector Bank Competitive Exam
  • Common Aptitude Test (CAT) Exams
  • UPSC rrb ntpc online telugu-II or CSAT Exams
  • SSC Competitive Exams
  • Defence Competitive Exams
  • L.I.C / G.I.C AAO and Clerk Competitive Exams
  • RRB NTPC onlile mock test exam in hindi Competitive Exam
  • University Grants Commission (UGC)
  • Career Aptitude Test (IT Companies) and etc.