JOIN ADRE 2.0 Telegram Group

Computer Awareness MCQs | Computer Multiple Choice Questions with Answers

Questions
1 What happens when you click on Insert >> Picture >> Clip Art
A It inserts a clipart picture into document
B It lets you choose clipart to insert into document
C It opens Clip Art taskbar
D It insert a Smart Art graphics

Answer: It opens Clip Art taskbar

Sol. Insert >> Picture >> Clip Art series of action opens clip art taskbar.

2 What is a motion path?
A A type of animation entrance effect
B A method of advancing slides
C A method of moving items on a slide
D All of the above

Answer: A method of moving items on a slide

Sol. Motion path is a method of moving items on a slide.

3 Distributed processing involves
A Solving computer component problems from a different computer
B Solving computing problems by breaking them into smaller parts that are separately processed by different computers
C Allowing users to share files on a network
D Allowing users to access network resources away from the office

Answer: Solving computing problems by breaking them into smaller parts that are separately processed by different computers

Sol. Distributed processing is a phrase used to refer to a variety of computer systems that use more than one computer (or processor) to run an application. This includes parallel processing in which a single computer uses more than one CPU to execute programs.

4 The first electro-mechanical computer MARK-1 was invented by ___________.
A Charles Pascal
B John W Mauchly
C Howard Aiken
D Clifford Berry

Answer: Howard Aiken

Sol. MARK-1 invented was by Howard Aiken.

5 A router is a networking device that forwards data packets and is connected to two or more data lines from different networks. Which among the following was the earliest device which had almost the same functionality as that of a router?
A Interface Delay Device
B Interface Traffic Manager
C Interface Routing Processor
D Interface Message Processor

Answer: Interface Message Processor

Sol. The very first device that had fundamentally the same functionality as a router does today was the Interface Message Processor (IMP); IMPs were the devices that made up the ARPANET, the first TCP/IP network.

6 In Computer programming API is set of subroutine definitions, protocols, and tools for building software and applications. Which among the following is an application programming interface for the programming language Java, which defines how a client may access a database?
A J2EE
B JDK
C JAVA SE
D JDBC

Answer: JDBC

Sol. Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database. It is part of the Java Standard Edition platform, from Oracle Corporation.

7 What is the current version of IMAP?
A IMAP version 2
B IMAP version 3
C IMAP version 4
D IMAP version 5

Answer: IMAP version 4

Sol. IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.

8 Which of the following software posts unwanted advertisements on client’s computer?
A Virus
B Malware
C Worm
D Adware

Answer: Adware

Sol. Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.

9 Which among the following add clicking malware created a buzz around the world with affecting millions of Android device users?
A WannaCry
B Judy
C Diva
D TrickBot

Answer:Judy

Sol. Recently nearly 41 Android apps, developed by Korea-based Kiniwini and published under the moniker ENISTUDIO Corp., set into motion fraudulent activities on the devices they were downloaded on. Judy malware infected devices to generate large amounts of fraudulent clicks on advertisements, generating revenues for the perpetrators behind it.

10 Asymmetric cryptography, also known as public key cryptography, uses __________ and _________ keys to encrypt and decrypt data.
A Pattern, coder
B Coder, user
C Public, private
D Hypo, hyper

Answer: Public, private

Sol. Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in the pair can be shared with everyone; it is called the public key. The other key in the pair is kept secret; it is called the private key.

11 Which among the following is the act of hacking a website or computer network in an effort to convey a social or political message?
A Spamming
B Hacktivism
C Phising
D Hacking

Answer: Hacktivism

Sol. Hacktivism is the act of hacking a website or computer network in an effort to convey a social or political message. The person who carries out the act of hacktivism is known as a hacktivist. In contrast to a malicious hacker who hacks a computer with the intent to steal private information or cause other harm, hacktivists engage in similar forms of disruptive activities to highlight political or social causes.

12 The first Computer Virus is __________
A Creeper
B Sasser
C Blaster
D All of the above

Answer: Creeper

Sol. Creeper virus is a computer virus that is most commonly recognized as the first computer virus

13 Which of the following image formats was developed for CompuServe?
A JPEG Image
B GIF Image
C PNG Image
D BMP Image

Answer: GIF Image

Sol. The GIF image format was developed for CompuServe (an online information service). Converting an image to a GIF image format is safe as no data is lost at the time of conversion.

14 Which of the following statements is correct about EPROM?
A It is a type of ROM from which the stored data cannot be erased
B In this memory, data can be erased by electronic emission
C It is a type of RAM
D Ultraviolet rays are used to erase the data stored in the memory

Answer: Ultraviolet rays are used to erase the data stored in the memory

Sol. Erasable Programmable Read-Only Memory (EPROM) is a type of ROM from which the stored data can be erased using ultraviolet rays.

15 Which of the following views shows thumbnail versions of all the slides and organizes them in horizontal rows?
A Normal View
B Outline View
C Slide Sorter View
D Notes Page View

Answer: Slide Sorter View

Sol. Normal View is used for editing a presentation slide by slide. Outline view is used to edit and jump between slides. Slide Sorter View is used to view thumbnail versions of all the sliders collectively. Notes Page View is used to view the look of the presentation when printed with notes.

16 Changing desktop wallpaper is a simple task which can be accessed through ________ section of all control panel items.
A Graphics
B Image
C Personalize
D Windows

Answer: Personalize

Sol. Wallpapers can be changed by the personalize section of all control panel items.

.
17 Assembly is a _______ based low-level language replacing binary machine-code instructions, which are very hard to remember, it is the classic and uncontroversial example of a low level language
A Memory
B High Level
C Key
D Mnemonic

Answer: Mnemonic
18 China now has more of the world's fastest supercomputers than other countries. Which among the following is a Chinese super computer?
A BlueGene/Q system
B Cray XC30
C Shaheen II
D Tianhe-2

Answer: Tianhe-2
19 What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
A CMOS
B RAM
C DRAM
D CPU

Answer: CMOS

Sol. The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the on board battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy. Additionally, the system clock resets when the CMOS loses power.

20 What is SQL?
A Language used to communicate with database
B Language used for object oriented programming
C Language used to program system software
D Language used to hack into other systems

Answer: Language used to communicate with database

View All Computer Awareness Questions Sets

ADRE 2.0 MOCK TEST

Take Mock Tests

Government Schemes Mock Test Start Test!
Political Science Mock Test – 42 Start Test
History Test – 190 Start Test
Quantitative Aptitude Test Start Test!
Trigonometry - Mock Test Start Test!
Data Interpretation - Mock Test Start Test!
General Awareness - Mock Test Start Test!
Reasoning Ability - Mock Test Start Test!
Englist(Antonyms) Mock Test 1 Start Test!
Quantitative Aptitude (Percentage) Mock Test Start Test!
Economy Mock Test 1 Unlock Test!
Books & Authors - Test 2 Unlock Test!
Advertisement