Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 1

1.

A type of phishing attack where mobile phone users receive text messages containing a Web site hyperlink is called _____

   A.) Pharming
   B.) Smishing
   C.) Vishing
   D.) All of these

Answer: Option 'B'

Smishing

2.

Which of the following layer is responsible for the source-to-destination delivery of a packet across multiple network?

   A.) Presentation layer
   B.) Data link layer
   C.) Transport layer
   D.) Network Layer

Answer: Option 'D'

Network Layer

3.

Which of the following activity can be termed as software piracy?

   A.) Soft loading
   B.) Renting
   C.) Counterfeiting
   D.) All of these

Answer: Option 'D'

All of these

4.

Which of the following routing technique is used in distributed operating system?

   A.) fixed routing
   B.) virtual routing
   C.) dynamic routing
   D.) All of these

Answer: Option 'D'

All of these

5.

Front end processor is frequently used in ________

   A.) Multiprogramming
   B.) Virtual storage
   C.) Time sharing
   D.) Multiprocessing

Answer: Option 'C'

Time sharing

6.

Press _________ to move the insertion point to the Address box, or to highlight the URL in the Address box.

   A.) CTRL + S
   B.) ALT + A
   C.) ALT + D
   D.) TAB + CTRL

Answer: Option 'C'

​ALT + D

7.

Which of the following is used to move your paragraph closer to margin?

   A.) change case
   B.) increase indent
   C.) decrease indent
   D.) Both (1) and (2)

Answer: Option 'C'

​decrease indent

8.

Which is the standard monitor or display interface used in most PCs?

   A.) VGA
   B.) NIC
   C.) RAM
   D.) Router

Answer: Option 'A'

​VGA

9.

_______represents the use of links between information of all sorts whether text, graphics, video or audio based.

   A.) Hypertext
   B.) Hypermedia
   C.) Hyperimage
   D.) HyperCard

Answer: Option 'B'

​Hypermedia

10.

A USB communication device that supports data encryption for secure wireless communication for notebook users is called a ______

   A.) USB Wireless Network adapter
   B.) wireless switch
   C.) wireless hub
   D.) router

Answer: Option 'A'

USB Wireless Network adapter

11.

To move the insertion point to the address bar or to select the URL in the address bar, We have to press ____ keys

   A.) Ctrl + D
   B.) Ctrl + E
   C.) Alt + D
   D.) Alt + E

Answer: Option 'C'

Alt + D

12.

_____ is a process in which pages of data are not copied from disk to RAM until they are needed.

   A.) Paging
   B.) Demand paging
   C.) Segmentation
   D.) Swapping

Answer: Option 'B'

​Demand paging

13.

Which of the following allows end-to-end notification of network congestion without dropping packets?

   A.) Transport Layer Security
   B.) Explicit Congestion Notification
   C.) Resource Reservation Notification(RRN)
   D.) All of these

Answer: Option 'B'

Explicit Congestion Notification

14.

Which of the following displays the contents of the active cell in Excel?

   A.) Name box
   B.) Column heading
   C.) Formula Bar
   D.) Task panel

Answer: Option 'C'

Formula Bar

15.

Vendor-created program modifications are called _______

   A.) patches
   B.) antiviruses
   C.) holes
   D.) None of these

Answer: Option 'A'

patches

16.

Which of the following is the smallest and fastest computer imitating brain working?

   A.) Super Computer
   B.) Quantum Computer
   C.) Param 1000
   D.) All of these

Answer: Option 'B'

Quantum Computer

17.

Which of the following is used to create a bullet point quickly?

   A.) Ctrl + Shift + F
   B.) Ctrl + Shift + L
   C.) Ctrl + W
   D.) Ctrl + U

Answer: Option 'B'

Ctrl + Shift + L

18.

Which of the following is the technique that extends storage capacities of main memory beyond the actual size of the main memory?

   A.) Switching
   B.) Virtual Storage
   C.) Multi-tasking
   D.) All of these

Answer: Option 'B'

Virtual Storage

19.

A program either audio or music that is made available in digital format for automatic download over the internet is called a _____

   A.) wiki
   B.) podcast
   C.) broadcast
   D.) vodcast

Answer: Option 'B'

podcast

20.

Programs that automatically submit your search request to several search engines simultaneously are called _______

   A.) Metasearch engines
   B.) Spiders
   C.) Web crawlers
   D.) Hits

Answer: Option 'A'

Metasearch engines


Computer Quiz Set - 1 Download Pdf

Recent Posts