JOIN ADRE 2.0 Telegram Group

Computer Awareness MCQs | Computer Multiple Choice Questions with Answers

Questions
1 Which of the following network devices is also called a concentrator?
A Switch
B Router
C Brouter
D Hub

Answer: Hub

Sol. A hub contains several ports for connecting multiple computers to form a small network. A simple hub is also called a concentrator.

2 Internet access by transmitting digital data over the wires of a local telephone network is provided by
A Leased line
B Digital subscriber line
C Digital signal line
D MODEM

Answer: Digital subscriber line

Sol. Digital subscriber line (DSL or digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.

3 What is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host?
A Identity Theft
B Forging
C IP Spoofing
D Pharming

Answer: IP Spoofing

Sol. Spoofing: It is a type of scam where an intruder attempts to gain unauthorized access to a user's system or information by pretending to be the user. The main purpose is to trick the user into releasing sensitive information.

4 Portrait and Landscape are
A Page Orientation
B page layout
C page size
D page view

Answer: Page Orientation

Sol. Page orientation is the way in which a rectangular page is oriented for normal viewing.

5 Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A Program thievery
B Data snatching
C Software piracy
D Program looting

Answer: Software piracy

Sol. Software piracy is the illegal copying, distribution, or use of software.

6 Which of the following topologies has the highest reliability?
A Star topology
B Bus topology
C Ring topology
D Mesh topology

Answer: Mesh topology

Sol. In the mesh topology, each computer is connected to the other with a separate physical link in a network. It is most reliable topology as the network does not get down in case one of the nodes is failed.

7 Computer language COBOL is appropriate for—
A Commercial purpose
B Graphic purpose
C Scientific purpose
D None of these

Answer: Commercial purpose

Sol. COBOL (Common Business Oriented Language) is a programming language that reads like regular English and is often used for business and administrative purposes.

8 Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?
A Shareware
B Public domain software
C Application software
D Operating system software

Answer: Operating system software

Sol. An operating system (OS) is a program or software that manages and coordinates the functions of all the components of a computer. It also acts as an interface between the user and the hardware of a computer.

9 What is the term that refers to an ad hidden inside software that you downloaded from an internet site?
A Spam
B Cookie
C Phish
D Adware

Answer: Adware

Sol. Adware is software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.

10 Decryption & Encryption of data are the responsibility of which layer
A Physical
B Data Link
C Presentation
D Session

Answer: Presentation

Sol. Presentation layer is responsible for character-code translation, data conversion, data encryption and decryption, and data translation.

11 A barcode is ________ code that represents data with bars of varying widths or heights.
A Optical
B Magnetic
C Laser
D Read/write

Answer: Optical

Sol. A barcode is an optical, machine-readable, representation of data; the data usually describes something about the object that carries the barcode.

12 The abbreviation ISP stands for___
A International spy project
B Indian social planning
C Internet solution provider
D Internet service provider

Answer: Internet service provider

Sol. An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.

13 Which of the following language defines commands GRANT and REVOKE?
A DDL
B DML
C DCL
D DQL

Answer: DCL

Sol. DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema. DCL use two commands to control access- GRANT and REVOKE.

14 Which of the following key is a minimal super key?
A Primary key
B Alternate key
C Candidate key
D Secondary key

Answer: Candidate key

Sol. A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.

15 Which IEEE Standards is used for Wi-Fi system?
A 802.11
B 802.1
C 802.2
D 802.3

Answer: 802.11

Sol. Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area network(LAN) technology designed to provide in-building broadband coverage.

16 Which protocol is used to convert IP addresses to MAC addresses?
A IP
B RARP
C In ARP
D ARP

Answer: ARP

Sol. The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address. ARP maintains a cache (table) in which MAC addresses are mapped to IP addresses.

17 The __________ shows a brief description and, optionally, keyboard shortcuts of commands of dialog box launchers.
A Context menu
B KeyTip
C Screen Tip
D Live Preview

Answer: Screen Tip

Sol. ScreenTip is a small window that appears when the pointer is rolled over a command or control. It shows the descriptive text for that command or control.

18 You cannot save an Excel file in a/an __________ format
A PDF
B PSD
C TXT
D XML

Answer: PSD

Sol. PSD is an extension for Photoshop files.

19 In a Windows-based application, when you click the Maximize button, it changes to the
A Minimize button
B Close button
C Open button
D Restore Down button

Answer: Restore Down button

Sol. The user interface of a Windows-based application contains Window control buttons, namely, Minimize, Maximize and Restore Down, and Close buttons. When the Maximize button is clicked, it is changed to the Restore Down button. Similarly, when the Restore Down button is clicked, the name of the button is changed to the Maximize button.

20 In Excel, a new workbook contains __________ worksheets by default
A One
B Three
C Five
D Ten

Answer: Three

Sol. A new workbook contains only three worksheets, namely, Sheet 1, Sheet 2 and Sheet 3, by default. You can rename your worksheets at any point according to your requirements.

View All Computer Awareness Questions Sets

ADRE 2.0 FULL LENGTH MOCK TEST

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!
Advertisement
Assam Direct Recruitment Test Series