Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 1

  • 1. The _______ icon and bold message heading indicating that the e-mail message has not been read.
   A.) Highlighted Envelope
   B.) Closed Envelope
   C.) Opened Envelope
   D.) All of these

Answer: Option 'B'

Closed Envelope

  • 2. Which of the following is a method of transferring information between digital devices, especially audio and video equipment?
   A.) USB
   B.) Integrated Drive Electronics (IDE)
   C.) Small Computer System Interface(SCSI)
   D.) Firewire

Answer: Option 'D'

Firewire

  • 3. Which of the following is a specification that combines video and audio into a single digital interface?
   A.) MHL
   B.) HDMI
   C.) Serial Port
   D.) All of these

Answer: Option 'B'

​HDMI

  • 4. ________ is a method of providing website content such as news stories or software updates.
   A.) RSS
   B.) Upgrading
   C.) Piracy
   D.) Both (1) and (2)

Answer: Option 'A'

RSS

  • 5. ______ is a way to quickly access a favorite website by saving it in your browser
   A.) Cookie
   B.) Bookmark
   C.) blog
   D.) Both (1) and (2)

Answer: Option 'B'

Bookmark

  • 6. Which of the following is used to move your paragraph closer to margin?
   A.) change case
   B.) increase indent
   C.) decrease indent
   D.) Both (1) and (2)

Answer: Option 'C'

​decrease indent

  • 7. In Excel, what two keys must be pressed to enter multiple lines of text in one cell?
   A.) ALT + Enter
   B.) Ctrl + Enter
   C.) Shift + Enter
   D.) Shift + Tab

Answer: Option 'A'

ALT + Enter

  • 8. ________ is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users.
   A.) PC virtualization
   B.) Server virtualization
   C.) Desktop virtualization
   D.) All of these

Answer: Option 'B'

​Server virtualization

  • 9. Microsoft’s Access and Corel’s Paradox are both examples of which type of software?
   A.) Network database systems
   B.) Relational database systems
   C.) Flat-file database systems
   D.) Hierarchical database systems

Answer: Option 'B'

​Relational database systems

  • 10. Which of the following is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites?
   A.) server accelerator card
   B.) smart card
   C.) PCMCIA card
   D.) network interface card

Answer: Option 'A'

server accelerator card

  • 11. Storing same data in many places is called _______
   A.) Data Enumeration
   B.) Data Redundancy
   C.) Data Iteration
   D.) Data Concurrency

Answer: Option 'B'

Data Redundancy

  • 12. Virtual memory is ______
   A.) an extremely large main memory
   B.) an illusion of extremely large main memory
   C.) a type of memory
   D.) All of these

Answer: Option 'B'

an illusion of extremely large main memory

  • 13. Companies use ______ vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves.
   A.) Open source vendors
   B.) Alliances
   C.) Application service providers
   D.) All of the above

Answer: Option 'C'

​Application service providers

  • 14. Which of the following displays the contents of the active cell in Excel?
   A.) Name box
   B.) Column heading
   C.) Formula Bar
   D.) Task panel

Answer: Option 'C'

Formula Bar

  • 15. By default, your documents print in ________ mode
   A.) Page setup
   B.) Portrait
   C.) Landscape
   D.) Print preview

Answer: Option 'B'

Portrait

  • 16. The path of the creation of an executable program is _______
   A.) coding, linking, compiling, parsing
   B.) coding, parsing, compiling, linking
   C.) coding, compiling, parsing, linking
   D.) coding, compiling, linking, parsing

Answer: Option 'D'

coding, compiling, linking, parsing

  • 17. The amount of digital data that is moved from one place to another in a given time
   A.) data transfer rate
   B.) data access rate
   C.) data migration rate
   D.) All of these

Answer: Option 'A'

data transfer rate

  • 18. When data changes in multiple lists and all lists are not updated this causes _____
   A.) data redundancy
   B.) data inconsistency
   C.) duplicate data
   D.) data overload

Answer: Option 'B'

​data inconsistency

  • 19. The storage device used to compensate for the difference in rates of flow of data from one device to another is known as ______
   A.) floppy
   B.) buffer
   C.) chip
   D.) All of these

Answer: Option 'B'

​buffer

  • 20. When a website automatically retrieves information from another website is known as ________
   A.) Push
   B.) Pull
   C.) Receive
   D.) All of these

Answer: Option 'B'

​Pull

  • 21. The load instruction is mostly used to designate a transfer from memory to a processor register known as ______
   A.) Program counter
   B.) instruction register
   C.) accumulator
   D.) All of these

Answer: Option 'C'

accumulator

  • 22. Which of the following is the delivery of information through the internet that is initiated by the server rather than by Client?
   A.) Push
   B.) Pull
   C.) Receive
   D.) All of these

Answer: Option 'A'

Push

  • 23. Signals can be analog or digital and a computer that processes the both type of signals is known as?
   A.) Analog computer
   B.) Digital Computer
   C.) Hybrid Computer
   D.) Mainframe Computer

Answer: Option 'C'

Hybrid Computer

  • 24. _________ video is content sent in compressed form over the Internet and displayed by the viewer in real time.
   A.) Pushing
   B.) Uploading
   C.) Pulling
   D.) Streaming

Answer: Option 'D'

Streaming

  • 25. Which one of the following is a cryptographic protocol used to secure http concession?
   A.) Transport Layer Security
   B.) Explicit Congestion Notification
   C.) Resource Reservation Notification (RRN)
   D.) All of these

Answer: Option 'A'

Transport Layer Security

Computer Quiz Set - 1 Download Pdf