Join our Telegram Channel

Computer Awareness MCQs | Computer Multiple Choice Questions with Answers

1 Why we use “Alt + E” key on keyboard?
A Edit options
B Extract Options
C Escape Options
D Enter Options

Answer: Edit options
2 We use the “Ctrl + C” shortcut key for?
A Cut selected item
B Clear selected item
C Copy selected item
D Close selected item

Answer: Copy selected item
3 “Ctrl + O” use in Computer for which purpose?
A Open a file
B Edit a File
C Extract a File
D Open Option

Answer: Open a file
4 To move the cursor to the end of the document press
A Ctrl + Alt
B Ctrl + End
C Ctrl + V
D Ctrl + B

Answer: Ctrl + End
5 The shortcut key to print documents is
A Ctrl + Y
B Ctrl + V
C Ctrl + P
D Ctrl + C

Answer: Ctrl + P
6 First layer in the OSI reference model is
A Data link
B Session
C Physical
D Application

Answer: Physical
7 Data security threats include
A Hardware failure
B Privacy invasion
C Fraudulent manipulation of data

Answer: Privacy invasion
8 What do you call the rules of a programming language?
A Procedures
B Authentication
C Assembly
D Syntax

Answer: Syntax
9 What is the address given to a computer connected to a network called?
A System unit
C Process ID
D IP Address

Answer: Process ID
10 When you purchase a product over a Mobile Phone, the transaction is called ___
B E-Commerce
C M-Commerce
D Mobile Purchases

Answer: M-Commerce
11 The ATM cell is
A 48 bytes long
B 53 bytes long
C 64 bytes long
D 69 bytes long

Answer: 53 bytes long
12 IP address in B class is given by

13 Which of the following is not described as a typical network classification?
A Local area network
B Wide area network
C Metropolitan area Network
D County area network

Answer: County area network
14 Programs such as Internet Explorer that serve as navigable windows into the Web are called
A Hypertext
B Networks
C Hyperlink
D Web browsers

Answer: Web browsers
15 A Web ……… consists of one or more Web pages located on a Web server
A Hub
B Site
C Address
D Template

Answer: Site
16 A USB communication device that supports data encryption for secure wireless communication for notebook users is called a _______
A USB wireless network adapter
B wireless switch
C wireless
D None of The Above

Answer: USB wireless network adapter
17 Which media have the ability to have data/information stored (written) on them by users more than once?
A Compact disks
B CD-RW disks
C Zip disks
D Optical Disks

Answer: CD-RW disks
18 How do you save changes to a PowerPoint presentation?
A Pull down the File menu and click the Save command
B Click the Save button on the Standard toolbar
C Click on view bar
D Either (a) and (b)

Answer: Either (a) and (b)
19 .…………defines how one Internet-connected computer can contact another to exchange control and confirmation messages
A Privacy rules
B Internet rules
C Transmission Control Protocol (TCP)
D Internet Protocol (IP)

Answer: Transmission Control Protocol (TCP)
20 A(n) …………. is a numerical identification and logical address that is assigned todevices participating in a computer network
A Top-level domain (TLD) name
C Domain name
D Internet Protocol address (IP address)

Answer: Internet Protocol address (IP address)

View All Computer Awareness Questions Sets


Miscellaneous GK Questions

Today's Top Current Affairs

current affairs 2022 pdf plan

Current Affairs MCQs

State-wise Current Affairs

General Knowledge

Month-wise Current Affairs 2022

Category-wise Current Affairs

Jobs by Qualification

Free Mock Test