Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 1

21.

In Excel, what two keys must be pressed to enter multiple lines of text in one cell?

   A.) ALT + Enter
   B.) Ctrl + Enter
   C.) Shift + Enter
   D.) Shift + Tab

Answer: Option 'A'

ALT + Enter

22.

Which of the following layer is responsible for the source-to-destination delivery of a packet across multiple network?

   A.) Presentation layer
   B.) Data link layer
   C.) Transport layer
   D.) Network Layer

Answer: Option 'D'

Network Layer

23.

An email feature, which is used to send a copy of an email to one or many other people at the same time that you are sending it to the main recipient/s is called

   A.) CC
   B.) BCC
   C.) To
   D.) None of these

Answer: Option 'A'

CC

24.

The path of the creation of an executable program is _______

   A.) coding, linking, compiling, parsing
   B.) coding, parsing, compiling, linking
   C.) coding, compiling, parsing, linking
   D.) coding, compiling, linking, parsing

Answer: Option 'D'

coding, compiling, linking, parsing

25.

______ is a way to quickly access a favorite website by saving it in your browser

   A.) Cookie
   B.) Bookmark
   C.) blog
   D.) Both (1) and (2)

Answer: Option 'B'

Bookmark

26.

Which of the following allows end-to-end notification of network congestion without dropping packets?

   A.) Transport Layer Security
   B.) Explicit Congestion Notification
   C.) Resource Reservation Notification(RRN)
   D.) All of these

Answer: Option 'B'

Explicit Congestion Notification

27.

The storage device used to compensate for the difference in rates of flow of data from one device to another is known as ______

   A.) floppy
   B.) buffer
   C.) chip
   D.) All of these

Answer: Option 'B'

​buffer

28.

To create a new slide you choose a ______

   A.) Layout
   B.) Theme
   C.) View
   D.) Picture

Answer: Option 'A'

Layout

29.

Layer which manages flow control & ensures reliable delivery of data packets in sequence with no losses or duplications is known as ______

   A.) Presentation Layer
   B.) Transport Layer
   C.) Session Layer
   D.) None of these

Answer: Option 'B'

Transport Layer

30.

News websites deliver customized ‘feeds’ of content to their readers via RSS, which stands for :

   A.) Really Simple Syndication
   B.) Real Social Syndication
   C.) Registered Subscriber Syndication
   D.) Really Simple Synchronization

Answer: Option 'A'

Really Simple Syndication

31.

This dialog box specifies or modifies the worksheet cell range containing data to be charted __________

   A.) Chart Location
   B.) Chart Style
   C.) Chart Options
   D.) Chart Source Data

Answer: Option 'D'

Chart Source Data

32.

________ is a method of providing website content such as news stories or software updates.

   A.) RSS
   B.) Upgrading
   C.) Piracy
   D.) Both (1) and (2)

Answer: Option 'A'

RSS

33.

Which of the following involves deliberate attacks intended to disable computers or networks?

   A.) Piggybacking
   B.) Sabotage
   C.) Phishing
   D.) All of these

Answer: Option 'B'

Sabotage

34.

Which of the following is used to create a bullet point quickly?

   A.) Ctrl + Shift + F
   B.) Ctrl + Shift + L
   C.) Ctrl + W
   D.) Ctrl + U

Answer: Option 'B'

Ctrl + Shift + L

35.

The amount of digital data that is moved from one place to another in a given time

   A.) data transfer rate
   B.) data access rate
   C.) data migration rate
   D.) All of these

Answer: Option 'A'

data transfer rate

36.

To move the insertion point to the address bar or to select the URL in the address bar, We have to press ____ keys

   A.) Ctrl + D
   B.) Ctrl + E
   C.) Alt + D
   D.) Alt + E

Answer: Option 'C'

Alt + D

37.

To insert a page break in a Word document, the following options are used _______

   A.) Insert and copy
   B.) Insert and Enter
   C.) Insert and Page Layout
   D.) Insert and Break

Answer: Option 'D'

Insert and Break

38.

The act of secretly removing RAM chips from computers is known as ______

   A.) Cyber crime
   B.) Memory shaving
   C.) Synflooding
   D.) All of these

Answer: Option 'B'

Memory shaving

39.

Companies use ______ vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves.

   A.) Open source vendors
   B.) Alliances
   C.) Application service providers
   D.) All of the above

Answer: Option 'C'

​Application service providers

40.

Press _________ to move the insertion point to the Address box, or to highlight the URL in the Address box.

   A.) CTRL + S
   B.) ALT + A
   C.) ALT + D
   D.) TAB + CTRL

Answer: Option 'C'

​ALT + D


Computer Quiz Set - 1 Download Pdf

Recent Posts