Join our Telegram Channel

Computer Awareness MCQs | Computer Multiple Choice Questions with Answers

1 Charles Babbage is known to have conceived which of the following earliest Computing machine?
A Analytical engine
D All of the above

Answer: Analytical engine

The Analytical Engine was a proposed mechanical general-purpose computer designed by English mathematician and computer pioneer Charles Babbage. It was first described in 1837 as the successor to Babbage's difference engine, a design for a mechanical computer.

2 What is the blinking symbol on the screen that shows where the next character will appear?
A Cursor
B Delete key
C Arrow key
D Return key

Answer: Cursor

In computer user interfaces, a cursor is an indicator used to show the current position for user interaction on a computer monitor or other display device that will respond to input from a text input or pointing device.

3 Which among the following is a language directly understood by CPU?
A Machine
C C++

Answer: Machine

CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.

4 Which of the following options is the name of the main folder on a storage device?
A Platform
B Interface
C Root directory
D Device driver

Answer: Root directory

The root directory is the first or top-most directory in a hierarchy. It can be likened to the trunk of a tree, as the starting point where all branches originate from. The root file system is the file system contained on the same disk partition on which the root directory is located; it is the file system on top of which all other file systems are mounted as the system boots up.

5 Which among the following is a term for one or more defects or problems that prevent the software from working as intended or working at all?
A Bug
B Bot
C Programming language
D Fuzzy logic

Answer: Bug

A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.

6 In which generation did multi-programming start?
A First generation
B Second generation
C Third generation
D Fourth generation

Answer: Third generation

Multi-programming started in third generation.

7 ________ is usually recorded and played, displayed, or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance.
A Virus
B BIOS software
C Multimedia
D None of these

Answer: Multimedia

Multimedia is content that uses a combination of different content forms such as text, audio, images, animation, video and interactive content. Multimedia can be recorded and played, displayed, dynamic, interacted with or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance.

8 A repair for a known software bug, usually available at no charge on the internet, is called a(n)
A Version
B Patch
C Tutorial

Answer: Patch

A patch is a piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually called bug fixes, and improving the usability or performance.

9 Which among the following refers to the overall structure of the database?
A View
B Conceptual
C Schema
D Data Independence

Answer: Schema

A database schema is the skeleton structure that represents the logical view of the entire database. It defines how the data is organized and how the relations among them are associated. It formulates all the constraints that are to be applied on the data.

10 What is Direct X?
A Operating system
B Software that drives graphics hardware
C Web browser
D Word processing software

Answer: Software that drives graphics hardware

Microsoft DirectX is a collection of application programming interfaces (APIs) for handling tasks related to multimedia, especially game programming and video, on Microsoft platforms.

11 A key that will erase information from the computer’s memory and characters on the screen.
A Edit
B Delete key
C Dummy out
D Trust key

Answer: Delete key

Delete key is used to delete data.

12 Which of the following is/are modifier keys in a computer?
A Ctrl
B Alt
C Shift
D All of the above

Answer: All of the above

Modifier keys include Alt, Ctrl, Shift. A modifier key is a key that modifies the action of another key when the two are pressed together.

13 Inheritance is the ability of an object to pass on its characteristics to its ____________.
A subclasses
B off-spring
C super classes
D parents

Answer: subclasses

A superclass passes its characteristics to it's subclass in concept of inheritance in programming languages.

14 WORM stands for?
A Write Once Read Many
B Wanted Once Read Memory
C Wanted Original Read Memory
D Write Original Read Memory

Answer: Write Once Read Many

In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data. The discs are intentionally not rewritable, because they are especially intended to store data that the user does not want to erase accidentally.

15 Which among the following is a Super computer series developed by Indian scientists?
A Param
B Super30l
C Compaq Presario
D Cray YMP

Answer: Param

PARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. The latest machine in the series is the PARAM Kanchenjunga.

16 Which among the following is software application commonly used to prepare a presentation/slide show?
A Adobe
B Power Point
C Outlook Express
D Internet Explorer

Answer: Power Point

PowerPoint is used to make presentations/slide shows.

17 ________key is the example of Toggle key
A Alt
B Shift
C Control
D Caps Lock

Answer: Caps Lock

A Toggle key is a key that is operated the same way but with opposite effect on successive occasions.

18 Some viruses have delayed payload, which is sometimes called a ____.
A time
B anti-virus
C bomb
D action

Answer: bomb

Some viruses have a delayed payload, which is sometimes called a bomb. For example, a virus might display a message on a specific day or wait until it has infected a certain number of hosts. A time bomb occurs during a particular date or time, and a logic bomb occurs when the user of a computer takes an action that triggers the bomb.

19 Network Firewalls are used to protect against _________.
A Unauthorised Attacks
B Virus Attacks
C Data Driven Attacks
D Fire Attacks

Answer: Unauthorised Attacks

Firewall protects against Unauthorised Attacks. Network firewalls may be hardware devices, software programs, or a combination of the two. Network firewalls guard an internal computer network against malicious access from the outside. Network firewalls may also be configured to restrict access to the outside from internal users.

20 The process that deals with the technical and management issues of software development is ______.
A Delivery process
B Control process
C Software process
D Testing process

Answer: Software process

Software process deals with the technical and management issues of software development.

View All Computer Awareness Questions Sets


Miscellaneous GK Questions

Today's Top Current Affairs

current affairs 2022 pdf plan

Current Affairs MCQs

State-wise Current Affairs

General Knowledge

Month-wise Current Affairs 2022

Category-wise Current Affairs

Jobs by Qualification

Free Mock Test