Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 1


A type of phishing attack where mobile phone users receive text messages containing a Web site hyperlink is called _____

   A.) Pharming
   B.) Smishing
   C.) Vishing
   D.) All of these

Answer: Option 'B'



Which of the following layer is responsible for the source-to-destination delivery of a packet across multiple network?

   A.) Presentation layer
   B.) Data link layer
   C.) Transport layer
   D.) Network Layer

Answer: Option 'D'

Network Layer


Which of the following activity can be termed as software piracy?

   A.) Soft loading
   B.) Renting
   C.) Counterfeiting
   D.) All of these

Answer: Option 'D'

All of these


Which of the following routing technique is used in distributed operating system?

   A.) fixed routing
   B.) virtual routing
   C.) dynamic routing
   D.) All of these

Answer: Option 'D'

All of these


Front end processor is frequently used in ________

   A.) Multiprogramming
   B.) Virtual storage
   C.) Time sharing
   D.) Multiprocessing

Answer: Option 'C'

Time sharing


Press _________ to move the insertion point to the Address box, or to highlight the URL in the Address box.

   A.) CTRL + S
   B.) ALT + A
   C.) ALT + D
   D.) TAB + CTRL

Answer: Option 'C'

​ALT + D


Which of the following is used to move your paragraph closer to margin?

   A.) change case
   B.) increase indent
   C.) decrease indent
   D.) Both (1) and (2)

Answer: Option 'C'

​decrease indent


Which is the standard monitor or display interface used in most PCs?

   A.) VGA
   B.) NIC
   C.) RAM
   D.) Router

Answer: Option 'A'



_______represents the use of links between information of all sorts whether text, graphics, video or audio based.

   A.) Hypertext
   B.) Hypermedia
   C.) Hyperimage
   D.) HyperCard

Answer: Option 'B'



A USB communication device that supports data encryption for secure wireless communication for notebook users is called a ______

   A.) USB Wireless Network adapter
   B.) wireless switch
   C.) wireless hub
   D.) router

Answer: Option 'A'

USB Wireless Network adapter


To move the insertion point to the address bar or to select the URL in the address bar, We have to press ____ keys

   A.) Ctrl + D
   B.) Ctrl + E
   C.) Alt + D
   D.) Alt + E

Answer: Option 'C'

Alt + D


_____ is a process in which pages of data are not copied from disk to RAM until they are needed.

   A.) Paging
   B.) Demand paging
   C.) Segmentation
   D.) Swapping

Answer: Option 'B'

​Demand paging


Which of the following allows end-to-end notification of network congestion without dropping packets?

   A.) Transport Layer Security
   B.) Explicit Congestion Notification
   C.) Resource Reservation Notification(RRN)
   D.) All of these

Answer: Option 'B'

Explicit Congestion Notification


Which of the following displays the contents of the active cell in Excel?

   A.) Name box
   B.) Column heading
   C.) Formula Bar
   D.) Task panel

Answer: Option 'C'

Formula Bar


Vendor-created program modifications are called _______

   A.) patches
   B.) antiviruses
   C.) holes
   D.) None of these

Answer: Option 'A'



Which of the following is the smallest and fastest computer imitating brain working?

   A.) Super Computer
   B.) Quantum Computer
   C.) Param 1000
   D.) All of these

Answer: Option 'B'

Quantum Computer


Which of the following is used to create a bullet point quickly?

   A.) Ctrl + Shift + F
   B.) Ctrl + Shift + L
   C.) Ctrl + W
   D.) Ctrl + U

Answer: Option 'B'

Ctrl + Shift + L


Which of the following is the technique that extends storage capacities of main memory beyond the actual size of the main memory?

   A.) Switching
   B.) Virtual Storage
   C.) Multi-tasking
   D.) All of these

Answer: Option 'B'

Virtual Storage


A program either audio or music that is made available in digital format for automatic download over the internet is called a _____

   A.) wiki
   B.) podcast
   C.) broadcast
   D.) vodcast

Answer: Option 'B'



Programs that automatically submit your search request to several search engines simultaneously are called _______

   A.) Metasearch engines
   B.) Spiders
   C.) Web crawlers
   D.) Hits

Answer: Option 'A'

Metasearch engines

Computer Quiz Set - 1 Download Pdf

Recent Posts