Computer Science General Knowledge Questions and Answers
1. How many Bits make one Byte?
A. 16 bits
B. 32 bits
C. 64 bits
D. 8 bits
Answer: D) 8 bits
Explanation: 4 bits equal to 1 nibble and 8 bits is equal to 1 byte.
2. Google is a Browser or a Search Engine?
A. Browser
B. Search Engine
C. Both Browser and Search Engine
D. Neither Browser nor Search Engine
Answer: B) Search Engine
Explanation: Google is a Search Engine. It's the most popular search engine used to search for
user queries. Its URL is https://www.google.co.in/
3. Printer is an example of which types of device, Output or Input?
A. Input
B. Output
C. Storage
D. None of the above mentioned
Answer: B) Output
Explanation: The printer is an example of the output device. This device is used to print the
output on pages.
4. What is the full form of RAM?
A. Random Access Memory
B. Read And Memory
C. Random All Memory
D. None of the above mentioned
Answer: A) Random Access Memory
Explanation: RAM stands for Random Access Memory. It is used to store data that needs to be
accessed quickly.
5. Who is the founder of Facebook?
A. Andrew Maclin
B. Mark Adon
C. Mark Zuckerberg
D. None of the above mentioned
Answer: C) Mark Zuckerberg
Explanation: Mark Zuckerberg is the founder of Facebook. This was founded in 2004.
6. Which electronic component was used in the first generation of computers?
A. Vaccum tubes
B. Red tubes
C. Abacus
D. Transistors
Answer: A) Vaccum tubes
Explanation: The duration of the first generation computer was from 1946-1959. Vacuum tubes
were used in this generation as basic components for memory and circuitry for the CPU. Learn
more on Computer Generations.
7. All mathematical and logical functions in the computer are done by?
A. Central Processing Unit
B. Arithmetic and Logical Unit
C. Control Unit
D. Memory Unit
Answer: B) Arithmetic and Logical Unit
Explanation: The Arithmetic and Logical Unit performs Arithmetic (addition, subtraction,
multiplication, division), and logic (OR and AND) operations.
8. Attempts made by individuals to obtain confidential information from you by falsifying
their identity are called?
A. Phishing scams
B. Information stealing
C. Network congestion
D. None of the above mentioned
Answer: A) Phishing scams
Explanation: Attempts made by individuals to obtain confidential information from you by
falsifying their identity are called Phishing scams. In Phishing attacks, the sender sends
fraudulent communications that appear to come from a reputable source. This practice is usually
done through email.
9. Who was the programmer of the MS-DOS operating system?
A. Tim Paterson
B. Andrew N.
C. Bill Gates
D. Dennis Ritchie
Answer: A) Tim Paterson
Explanation: MS-DOS was created by Tim Paterson and introduced by Microsoft in August
1981; it was last updated in 1994 with the release of MS-DOS 6.22.
10. The first program that runs on a computer when the computer boots up is?
A. Software Program
B. Operating System
C. Utilities
D. None of the above mentioned
Answer: B) Operating System
Explanation: During the booting process Operating System runs on a computer.
11. Cache and main memory will lose their contents when the power is off because?
A. They are volatile
B. They are nonvolatile
C. They are progressive
D. None of the above mentioned
Answer: A) They are volatile
Explanation: Cache and main memory will lose their contents when the power is off because
they are volatile.
12. What is the full form of VIRUS?
A. Vital Information Rest Under System
B. Vital Information Rest Under Siege
C. Virtual Information Resources Under Siege
D. Vital Information Resources Under Siege
Answer: D) Vital Information Resources Under Siege
Explanation: VIRUS stands for Vital Information Resources under Siege. It is a type of
malicious software or malware that can cause to damage your data, files, and software.
13. The process of transferring files from the Internet to your computer is called?
A. Downloading
B. Uploading
C. Storing
D. All of the above
Answer: A) Downloading
Explanation: Downloading is a process of transferring files from the Internet to your computer.
14. The process of transferring files from your computer to the Internet is called?
A. Downloading
B. Uploading
C. Storing
D. All of the above
Answer: B) Uploading
Explanation: Uploading is a process of transferring files from your computer to the internet.
15. Buying and selling products and services over the Internet is called?
A. E-Computer
B. F-Commerce
C. E-Commerce
D. None of the above
Answer: C) E-Commerce
Explanation: Buying and selling products and services over the Internet is called E-Commerce.
Sometimes, it is referred to as electronic commerce.
16. 1 Kilobyte is equal to how many bytes?
A. 1024 bytes
B. 512 bytes
C. 256 bytes
D. 128 bytes
Answer: A) 1024 bytes
Explanation: 1 Kilobyte is equal to 1024 bytes.
17. Who is called the Father of the Computer?
A. Andrew N.
B. Dinnis Ritchie
C. Mark Zuckerberg
D. Charles Babbage
Answer: D) Charles Babbage
Explanation: Charles Babbage is known as the father of computer. He originated the concept of
a digital programmable computer.
18. Who invented the first mechanical calculator?
A. Abraham Sturn
B. Blaise Pascal
C. Riochee
D. None of the above mentioned
Answer: B) Blaise Pascal
Explanation: Blaise Pascal invented the first mechanical calculator. He invented this device in
the year 1642 when he was only at the age of 18.
19. When you purchase a product over a Mobile Phone, the transaction is called?
A. E-Commerce
B. G-Commerce
C. M-Commerce
D. F-Commerce
Answer: C) M-Commerce
Explanation: When you purchase a product over a Mobile Phone, the transaction is called M-
Commerce. M-commerce, also called "mobile commerce," is the getting and selling of things
and services using mobile devices like smartphones and tablets.
20. Keyboard, Mouse, and Joystick are examples of Output devices or Input Devices?
A. Output devices
B. Input devices
C. Storage devices
D. None of the above mentioned
Answer: B) Input devices
Explanation: An input device is a hardware device that is used to send data to a computer.
Keyboard, Mouse, and Joystick are examples of input devices.
21. An address given to a computer connected to a network is called?
A. Local address
B. Localhost
C. Network address
D. IP address
Answer: D) IP address
Explanation: An address given to a computer connected to a network is called an IP address. IP
stands for "Internet Protocol," which is a set of rules which make sure how data is sent over the
internet or a local network.
22. What is the name of the software that allows us to browse through web pages called?
A. Webpage
B. Website
C. Browser
D. Search engine
Answer: C) Browser
Explanation: Browser programs allow us to browse through web pages on the web server.
23. Who is the founder of Oracle Corporation?
A. Lawrence J. Ellison
B. Andrew N.
C. Marc Anderson
D. None of the above mentioned
Answer: A) Lawrence J. Ellison
Explanation: Lawrence J. Ellison is the founder of Oracle Corporation. He was an American
billionaire business magnate and investor.
24. Which technology is used in a CDROM Drive?
A. Glass
B. Hybrid
C. Optical
D. All of the above
Answer: C) Optical
Explanation: Optical technology is used in a CDROM Drive. An optical disc is used to store
data that can be written to and read from using a low-powered laser beam.
25. A program that translates High-Level Language to a Machine Level Language is
called?
A. Compiler
B. Interpreter
C. Assembler
D. Operating system
Answer: A) Compiler
Explanation: A compiler is a program that translates High-Level Language to Machine Level
Language.
26. The process to find an error in a software code is called?
A. Debugging
B. Compiling
C. Error
D. None of the above
Answer: A) Debugging
Explanation: The process to find errors in a software code is called debugging. The debugging
process in software development starts when a developer successfully identifies a coding fault
within a computer program and is able to replicate it.
27. What contains specific rules and words that express the logical steps of an algorithm?
A. Semantic
B. No method
C. Syntax
D. Comment
Answer: C) Syntax
Explanation: Syntax contains some set of rules and words that express the logical steps of an
algorithm.
28. Data that is copied from an application is stored in?
A. Hard Disk
B. Clipboard
C. RAM
D. CD
Answer: B) Clipboard
Explanation: Data that is copied from an application is stored in Clipboard. It is a place where
information from a computer file is stored for a short time until it is added to another file.
29. The simultaneous execution of two or more instructions is called?
A. Multiprocessing
B. Multiprogramming
C. Multithreading
D. Hybridthreading
Answer: A) Multiprocessing
Explanation: The simultaneous execution of two or more instructions is called multiprocessing.
It is a process of running two or more programs or sequences of instructions simultaneously by a
computer with more than one central processor.
30. Amongst which of the following can understand the difference between Data and
programs?
A. Micro engine
B. Micro program
C. Micro storage
D. Microprocessor
Answer: D) Microprocessor
Explanation: Microprocessors can understand the difference between data and programs.
31. Servers are computers that provide resources to other computers connected to a ____.
A. Network
B. Bluetooth
C. WiFi
D. MAN
Answer: A) Network
Explanation: Servers are computers that provide resources to other computers connected to a
network.
32. Excel spreadsheet, Powerpoint, and Word processing are examples of which type of
software?
A. Application software
B. System software
C. Utility program
D. Firmware
Answer: A) Application software
Explanation: Excel spreadsheet, Powerpoint, and Word processing are examples of application
software.
33. How many MB (Megabyte) makes one GB (Gigabyte)?
A. 1024 MB
B. 1000 MB
C. 512 MB
D. None of the above mentioned
Answer: A) 1024 MB
Explanation: 1024 MB makes one GB (Giga Byte).
34. Data that has been organized or presented in a meaningful way is called?
A. Data
B. Files
C. Information
D. Instructions
Answer: C) Information
Explanation: Data that has been organized or presented in a meaningful way is called
information. Information is processed data that has meaningful facts or insights.
35. In the binary language each letter of the alphabet, each number, and each special
character is made up of a unique combination of?
A. 32 bits
B. 16 bits
C. 8 bits
D. 128 buts
Answer: C) 8 bits
Explanation: In the binary language each letter of the alphabet, each number, and each special
character is made up of a unique combination of 8 bits.
36. Windows operating system 'Windows 8' is the product of which American company?
A. Oracle
B. Microsoft
C. IBM
D. Apple
Answer: B) Microsoft
Explanation: Windows operating system 'Windows 8' is the product of Microsoft Corporation.
37. The term 'Pentium' is related to?
A. Microprocessor
B. CMOS
C. Motherboard
D. OS
Answer: A) Microprocessor
Explanation: The term 'Pentium' is related to Microprocessor. A microprocessor is a processing
device where the data processing logic and control are included on a single integrated circuit
(IC), or a small number of ICs.
38. C, Java, PHP, and C++ are examples of?
A. Software types
B. Firmware
C. Programming languages
D. Programming translators
Answer: C) Programming languages
Explanation: C, Java, PHP, and C++ are examples of programming languages. Software's
developed using programming languages.
39. What is the shortcut key for printing a document in Windows?
A. Ctrl + P
B. SHIFT + P
C. ALT + P
D. CTRL + SHIFT + P
Answer: A) Ctrl + P
Explanation: Ctrl + P is a shortcut key for printing a document in Windows.
40. A Website's main page is called?
A. Middle Page
B. Index Page
C. Blog
D. Home Page
Answer: D) Home Page
Explanation: The home page is the main page of any website. Generally, it appears first on the
website when visitors successfully load its URL (Uniform Resource Locator).
41. Where does most of the processing in a computer take place?
A. CPU
B. Memory
C. Hard drive
D. Motherboard
Answer: A) CPU
Explanation: Central Processing Unit is often referred to as the "brain" of the computer and it is
responsible for carrying out the instructions of the computer program within a system.
42. In which type of computer, data are represented as discrete signals?
A. Hybrid computer
B. Analog computer
C. Digital computer
D. None of the above
Answer: C) Digital computer
Explanation: Digital computers represent data as discrete signals, which means that they are
represented as a sequence of numbers.
43. What is the scientific name of the computer?
A. Homo silicium
B. Homo digitalis
C. Homo computatrix
D. Silico sapiens
Answer: D) Silico sapiens
Explanation: "Silico sapiens" was coined by John R. Pierce. The term signifies that computer's
ICs or integrated circuits are made of Silicon so that is one of the reasons for calling computer
Silico sapiens.
44. What is the name of the display feature that highlights are of the screen which requires
operator attention?
A. High contrast
B. Reverse video
C. Blinking text
D. Pop up notification
Answer: B) Reverse video
Explanation: "Reverse Video" is a feature that changes the colors of the highlighted screen area,
making it stand out by using contrasting colors. This helps users notice important information or
alerts easily.
45. What is the term for computers that integrate both measuring and counting
functionalities?
A. Analog computer
B. Digital computer
C. Hybrid computer
D. Mainframe computer
Answer: C) Hybrid computer
Explanation: Hybrid Computers combine both analog and digital features, allowing them to
handle both measuring (analog) and counting (digital) tasks effectively.
46. What translates and executes the program at run-time line by line?
A. Interpreter
B. Compiler
C. Assembler
D. Executor
Answer: A) Interpreter
Explanation: The interpreter translates and executes a program line by line in real time,
converting the source code into machine code and immediately executing each line without
creating a separate executable file.
47. Who is the father of personal computer?
A. Bill Gates
B. Steve Jobs
C. Alan Turing
D. Ed Robert
Answer: D) Ed Robert
Explanation: Ed Robert created the Altair 8800 microcomputer kit in the mid-1970s. This
computer kit was one of the first commercially successful personal computers.
48. Who developed the first electronic computer?
A. John Presper Eckert
B. John Mauchly
C. Charles Babbage
D. Both A and B
Answer: D) Both A and B
Explanation: They developed the Electronic Numerical Integrator and Computer (ENIAC) in
the 1940s, often considered the first general-purpose electronic computer.
49. Which programming languages are classified as low-level languages?
A. Machine language
B. C language
C. Assembly language
D. Python
Answer: C) Assembly language
Explanation: Assembly language is a low-level programming language that provides a direct
correspondence between the instructions understood by the computer's hardware and the
instructions written by the programmer.
50. Which was the first web browser?
A. World Wide Web
B. Mosaic
C. Lynx
D. Netscape Navigator
Answer: A) World Wide Web
Explanation: World Wide Web Developed by Sir Tim Berners-Lee in 1990, it was not only a
web browser but also the first web editor and the first server.
51. What does IBM stand for?
A. International Business Machines
B. Integrated Business Modules
C. Internet Business Management
D. Information and Business Management
Answer: A) International Business Machines
Explanation: IBM is an abbreviation for "International Business Machines," reflecting the
company's name and origin. It was founded on June 16, 1911.
52. What technology is used to connect widely distributed office LANs on a large scale
within a corporation?
A. Local Area Network (LAN)
B. Wide Area Network (WAN)
C. Bluetooth
D. Virtual Private Network
Answer: B) Wide Area Network (WAN)
Explanation: WAN is a technology that links far-apart office LANs over a big area, which
works well for connecting distant office networks.
53. To move a copy of the file from one computer to another over a communication channel
is called?
A. Data Exchange
B. Communication Sharing
C. File Transfer
D. Network Switching
Answer: C) File Transfer
Explanation: "File Transfer" refers to the process of copying a file from one computer to
another through a communication channel, allowing data to be shared and accessed between
different devices over a network or the internet.
54. What do large transaction processing systems in automated organizations use?
A. Batch Processing
B. Database Management System
C. Text Editor
D. Graphic User Interface
Answer: A) Batch Processing
Explanation: Batch processing involves collecting a large number of transactions or data items
and then processing them together in a batch. This method helps in the efficient utilization of
resources.
55. What does MICR stand for?
A. Magnified Image Character Recognition
B. Multilingual Image Coding and Recognition
C. Machine Input Code Reader
D. Magnetic Ink Character Recognition
Answer: D) Magnetic Ink Character Recognition
Explanation: MICR stands for Magnetic Ink Character Recognition, it describes the technology
used for reading characters printed with magnetic ink on financial documents like checks.
56. How many characters are there in ASCII?
A. 1024
B. 128
C. 256
D. 512
Answer: B) 128
Explanation: The ASCII (American Standard Code for Information Interchange) coding system
employs a 7-bit binary code to represent a wide range of characters. With 7 bits, there are 2^7
(128) possible combinations.
57. What does MSIC stand for?
A. Microscopic Silicon Integrated Chips
B. Miniature System Interface Controller
C. Multifunctional Signal Interface Converter
D. Medium Scale Integrated Circuits
Answer: D) Medium Scale Integrated Circuits
Explanation: MSIC refers to integrated circuits that contain a moderate number of components,
more than SSI (Small Scale Integration) but fewer than LSI (Large Scale Integration).
58. What term describes the action of code scrambling?
A. Encryption
B. Obfuscation
C. Segmentation
D. Aggregation
Answer: A) Encryption
Explanation: Encryption is similar to scrambling a message into a secret code that only
someone with the right key can unscramble. This keeps the information hidden from anyone who
doesn't have the key.
59. Which method was employed to program the earliest computers?
A. Punch cards
B. Machine language
C. High-level language
D. Voice commands
Answer: B) Machine language
Explanation: The earliest computers were programmed using machine code, which directly
corresponds to the computer's hardware instructions.
60. What term is used to describe a computer program issue that causes it to function
improperly?
A. Bug
B. Error
C. Virus
D. Glitch
Answer: A) Bug
Explanation: A "bug" is a term commonly used in the realm of software development to denote
a flaw or issue within a computer program that leads to its malfunction.
61. Which button makes alphabets/letters in uppercase and lowercase and numbers to
symbols?
A. Control button
B. Caps lock button
C. Shift button
D. Alt button
Answer: C) Shift button
Explanation: The button that is typically used to switch between uppercase and lowercase
letters, as well as numbers to symbols, is the "Shift" key on a keyboard. By holding down the
"Shift" key and then pressing a letter key, you can type the uppercase version of that letter.
62. Upon powering on a computer, the booting process undertakes which essential sequence
of actions?
A. BIOS/UEFI Initialization
B. Power-On Self-Test (POST)
C. Bootloader Activation
D. Kernel Initialization
Answer: B) Power-On Self-Test (POST)
Explanation: When a computer is powered on, the initial phase of the booting process involves
a critical procedure known as the Power-On Self-Test (POST).
63. Unit of measurement of the output quality of a printer?
A. Pixels per inch
B. Megapixels
C. Lines per inch
D. Dot per sq inch
Answer: D) Dot per sq inch
Explanation: Dot per sq inch is the standard unit of measurement used to assess the output
quality of printers. It indicates the density of dots that a printer can produce per inch.
64. In fifth-generation computers, the primary switching device utilized is?
A. Vacuum tubes
B. Relays
C. Very Large Scale Integration (VLSI)
D. Diodes
Answer: C) Very Large Scale Integration (VLSI)
Explanation: VLSI refers to the technology of integrating a large number of transistors and
other components onto a single microchip, enabling higher performance and greater
computational power.
65. The unit KIPS is used to measure the speed of?
A. Processors
B. Computer Instruction Execution
C. Internet Connection
D. Sound Waves
Answer: A) Processors
Explanation: KIPS is indeed used to measure the speed of processors, specifically the speed at
which a computer's central processing unit (CPU) can execute instructions.
66. What is a joystick primarily in computers used?
A. Word Processing
B. Navigating Web Pages
C. Spreadsheets
D. Gaming
Answer: D) Gaming
Explanation: A joystick is primarily used for gaming. It provides analog control over movement
and actions in video games, offering a more immersive experience compared to traditional
keyboard or mouse controls.
67. In 1999, the Melissa virus was widely publicized what?
A. Internet meme
B. E-mail virus
C. Music album
D. Online shopping trend
Answer: B) E-mail virus
Explanation: E-mail virus is spread through infected email attachments and caused significant
disruptions by overloading email systems.
68. Which of the following commands is given to reboot the computer?
A. Alt + F4
B. Ctrl + Shift + Esc
C. Ctrl + Alt + Delete
D. Windows Key + R
Answer: C) Ctrl + Alt + Delete
Explanation: This keyboard shortcut is used to access various system options, including the
ability to lock the computer, switch users, log out, change a password, open the Task Manager,
and shut down or restart the computer.
69. What is correcting errors in a program called?
A. Debugging
B. Optimizing
C. Compiling
D. Interpreting
Answer: A) Debugging
Explanation: Debugging is the process of identifying and correcting errors or issues in a
program's code. It involves finding and fixing bugs to ensure the program runs as intended.
70. What does BCD stand for?
A. Bitwise Code Decimal
B. Binary Coded Decimal
C. Binary Code Deduction
D. Base Conversion Determinant
Answer: B) Binary Coded Decimal
Explanation: BCD stands for Binary Coded Decimal. It is a way of representing decimal
numbers using binary encoding, where each decimal digit (0-9) is represented by a fixed number
of binary digits.
71. What type of virus uses computer hosts to reproduce itself?
A. Spyware
B. Adware
C. Worn
D. Trojan
Answer: C) Worn
Explanation: A worm is a type of virus that uses computer hosts to reproduce itself. It spreads
by exploiting vulnerabilities in networks or systems and can replicate without needing to attach
to files.
72. SMTP, FTP, and DNS are applications of the ____ layer.
A. Application
B. Physical
C. Data link
D. Network
Answer: A) Application
Explanation: SMTP (Simple Mail Transfer Protocol), FTP (File Transfer Protocol), and DNS
(Domain Name System) are applications that operate at the application layer of the OSI model.
73. Which command is used to select the whole document?
A. Shift + A
B. Ctrl + A
C. Alt + A
D. Alt + Shift + A
Answer: B) Ctrl + A
Explanation: The keyboard shortcut "Ctrl + A" is used to select the entire document or text
within most applications. "Ctrl" stands for the Control key on the keyboard, and "A" represents
"All."
74. What does the acronym COBOL stand for?
A. Computer Binary Operation Language
B. Common Business-Oriented Language
C. Code-Based Object Logic
D. Controlled Binary Operation Lexicon
Answer: B) Common Business-Oriented Language
Explanation: COBOL stands for Common Business Oriented Language, which is a
programming language primarily used for business, finance, and administrative systems.
75. The ability of an OS to run more than one application at a time is called?
A. Multithreading
B. Multi-user
C. Multi-Processing
D. Multitasking
Answer: D) Multitasking
Explanation: Multitasking is the ability of an operating system to run more than one application
simultaneously. It allows users to switch between different programs and tasks without having to
close and reopen them.
76. What is the functional key to display the save-as box?
A. F1
B. F2
C. F10
D. F12
Answer: D) F12
Explanation: The F12 key is commonly used to display the "Save As" dialog box, allowing you
to specify a new filename or location when saving a file.
77. What is the full form of NOS in the context of Computer Networking?
A. Network Operating System
B. New Operating System
C. Node-Oriented System
D. Numerical Operating System
Answer: A) Network Operating System
Explanation: NOS stands for Network Operating System, which is specialized software
designed to manage and coordinate network resources and services.
78. What term is used to describe something that has easily understood instructions?
A. Analog Data
B. User Friendly
C. Clear and concise
D. Intuitive
Answer: A) Analog Data
Explanation: Analog data refers to information that is represented in a continuous and variable
form. It can take on any value within a certain range. Examples of analog data include
temperature readings, sound waves, and voltage levels.
79. A modem is connected to a ____.
A. Router
B. Computer
C. Telephone Line
D. Satellite Dish
Answer: C) Telephone Line
Explanation: A modem is a device that connects digital devices, like computers, to
communication networks. It's usually connected to a telephone line. It converts digital data from
computers into analog signals for transmission over the line.
80. The refresh rate of the monitor is measured in?
A. Pixels
B. Frames per Second (FPS)
C. Inches
D. Hertz (Hz)
Answer: D) Hertz (Hz)
Explanation: The refresh rate of a monitor is typically measured in Hertz (Hz), which indicates
the number of times the screen is refreshed per second.
81. What was the chief component of the first-generation computer?
A. Vacuum Tubes and Valves
B. Transistors
C. Microprocessors
D. Integrated Circuits
Answer: A) Vacuum Tubes and Valves
Explanation: They were early electronic components used as switches and amplifiers in first-
generation computers. They were the primary means of performing logical operations and
calculations in these early computing machines.
82. What was the name of the Father of the Computer Mouse?
A. Alan Turing
B. Tim Berners-Lee
C. Douglas Engelbart
D. John von Neumann
Answer: C) Douglas Engelbart
Explanation: Douglas Engelbart is often credited as the inventor of the computer mouse, among
other contributions to human-computer interaction and computing technology.
83. What is a term used to describe a program that performs a useful task while
simultaneously allowing destructive acts?
A. Trojan Horse
B. Worm
C. Malware
D. Virus
Answer: A) Trojan Horse
Explanation: A Trojan Horse is a type of malicious software that disguises itself as a legitimate
program but contains harmful code that can perform destructive actions while appearing to serve
a useful purpose.
84. What term is used to refer to the geometric arrangement of devices on a network?
A. Architecture
B. Topology
C. Configuration
D. Infrastructure
Answer: B) Topology
Explanation: The term topology refers to the geometric arrangement of devices on a network as
"topology". It describes how devices are connected and organized within a network.
85. The basic goal of computer process is to convert data into ____.
A. Knowledge
B. Instructions
C. Programs
D. Information
Answer: D) Information
Explanation: The fundamental goal of a computer process is to convert data into meaningful
information that can be processed, analyzed, and used for various purposes.
86. Where are the CPU and memory located?
A. Motherboard
B. Monitor
C. Keyboard
D. Printer
Answer: A) Motherboard
Explanation: The motherboard is the central hub that connects the CPU, memory, storage
devices, expansion cards, and other essential components, allowing them to work together to
perform various tasks and operations.
87. Who is known as the founder of the IBM Company?
A. Steve Jobs
B. Bill Gates
C. Thomas J. Watson
D. Mark Zuckerberg
Answer: C) Thomas J. Watson
Explanation: Thomas J. Watson is known as the founder of IBM (International Business
Machines) Corporation, which is a multinational technology and consulting company.
88. What is an image on a computer screen composed of?
A. Bytes
B. Pixels
C. Lines of Code
D. Digital Paint
Answer: B) Pixels
Explanation: An image on a computer screen is made up of pixels, which are tiny dots of color
that come together to form the visual representation. These pixels form the images you see on
your computer screen, phone, TV, or any other electronic display.
89. What is the full form of MAN in the context of Computer Networks?
A. Multi-Access Network
B. Modern Area Network
C. Micro Area Network
D. Metropolitan Area Network
Answer: D) Metropolitan Area Network
Explanation: MAN stands for Metropolitan Area Network, which is a network that spans a
larger geographic area than a local area network (LAN) but is smaller than a wide area network
(WAN).
90. Which command in DOS can be used to recover accidentally deleted files?
A. RECOVER
B. RESTORE
C. UNDELETE
D. RETRIEVE
Answer: C) UNDELETE
Explanation: The UNDELETE command is a utility used to recover accidentally deleted files
from storage media like hard drives, memory cards, or USB drives. It's typically provided by
third-party file recovery software.
91. What is the term for a computer program that converts an entire program into machine
language all at once?
A. Assembler
B. Compiler
C. Interpreter
D. Debugger
Answer: B) Compiler
Explanation: A compiler is a computer program that translates an entire source code written in a
high-level programming language into machine code or executable code all at once.
92. In which year, the Microsoft company was founded?
A. 1972
B. 1975
C. 1980
D. 1982
Answer: B) 1975
Explanation: Microsoft Corporation was founded by Bill Gates and Paul Allen on April 4, 1975.
93. What is the personal computer operating system that organizes and uses a graphic
desktop environment?
A. DOS
B. Linux
C. Windows
D. macOS
Answer: C) Windows
Explanation: The Windows operating system is known for providing a graphic desktop
environment, complete with icons, windows, menus, and graphical user interfaces (GUI) that
make it user-friendly and visually organized.
94. What are the light pen and joystick?
A. Input Device
B. Output Device
C. Scanner
D. Printer
Answer: A) Input Device
Explanation: A light pen is an input device that allows users to interact with a computer screen
by pointing at it and a joystick is an input device used for controlling the movement of objects or
characters in computer games and simulations.
95. What is a half-byte also called?
A. Nibble
B. Bit
C. Bytelet
D. Trit
Answer: A) Nibble
Explanation: A nibble is a unit of digital data that consists of four bits. It is half of a standard
byte, which contains eight bits. Nibbles are often used in computing and data processing when
dealing with groups of four bits at a time.
96. What does SMPS stand for?
A. Simple Mode Power Supply
B. Single Mode Power Source
C. Switch Mode Power Supply
D. System Mode Power Saver
Answer: C) Switch Mode Power Supply
Explanation: SMPS stands for Switch Mode Power Supply, which is a type of power supply
unit used in computers and electronic devices to efficiently convert and regulate electrical power.
97. What do we use to change the appearance and positioning of text documents in MS
Word?
A. Templates
B. Font Styles
C. Page Layout
D. Formatting Toolbar
Answer: D) Formatting Toolbar
Explanation: In Microsoft Word, the Formatting Toolbar provides options to change the
appearance and positioning of text within a document, including font styles, alignment,
indentation, and more.
98. What term is used to represent approximately a million bytes?
A. Gigabyte
B. Megabyte
C. Kilobyte
D. Terabyte
Answer: B) Megabyte
Explanation: A megabyte (MB) is a unit of digital information storage that represents
approximately one million bytes. One megabyte is equivalent to 1,000 kilobytes (KB) or
1,000,000 bytes.
99. What term is used to describe devices like the Daisy wheel, Drum, and Chain?
A. Printer
B. Scanner
C. Keyboard
D. Mouse
Answer: A) Printer
Explanation: Daisy wheel, Drum, and Chain - are associated with various types of printers.
These devices are components or mechanisms within printers that help generate printed text and
images.
100. What does XML stand for?
A. Extensible Markup Language
B. Extra Mobile Link
C. Extended Modulation Level
D. Extreme Media Library
Answer: A) Extensible Markup Language
Explanation: XML stands for Extensible Markup Language, which is a widely used format for
structuring and storing data in a human-readable format that is also machine-readable.
101. What kind of scheme is the HTTP protocol?
A. Client-Server
B. Request-Response
C. Data-Transfer
D. File-Share
Answer: B) Request-Response
Explanation: The HTTP protocol operates on a request-response scheme, where clients send
requests to servers for specific resources, and servers respond with the requested data.
102. What category does a magnetic disk belong to?
A. Input Device
B. Output Device
C. Secondary Memory
D. Processing Device
Answer: C) Secondary Memory
Explanation: A magnetic disk, such as a hard disk drive (HDD) or a solid-state drive (SSD),
falls under the category of secondary memory or storage devices used to store data persistently in
a computer system.
103. What is the meaning of OSI, in terms of computers?
A. Open Source Interface
B. Operational System Integration
C. Optical Sensor Interface
D. Open Systems Interconnection
Answer: D) Open Systems Interconnection
Explanation: OSI stands for Open Systems Interconnection, which refers to a conceptual
framework used to standardize and understand how different networking protocols and
technologies interact within a networked environment.
104. Which type of storage device is a BIOS?
A. Primary
B. Secondary
C. Tertiary
D. Cache
Answer: A) Primary
Explanation: The BIOS (Basic Input/Output System) is stored in a chip on the motherboard and
is a type of firmware that provides essential low-level functions for the computer's hardware. It is
part of the computer's primary memory.
105. What is the extension type of the Excel 2007 files?
A. .xls
B. .docx
C. .pptx
D. .xlsx
Answer: D) .xlsx
Explanation: The ".xlsx" file extension refers to the file format used by Microsoft Excel for
spreadsheets created with Excel 2007 and later versions. Files with the ".xlsx" extension contain
data organized in rows and columns, formulas, charts, and other features commonly associated
with spreadsheet applications.
106. What term is used to describe the act of collecting personal information and effectively
posing as another individual?
A. Identity Theft
B. Cyberbullying
C. Digital Fraud
D. Data Breach
Answer: A) Identity Theft
Explanation: Identity theft involves the unauthorized collection of personal information with the
intention of posing as another individual, often for financial gain or fraudulent activities.
107. What is the term used to describe the amount of vertical space between lines of text in
a document?
A. Indentation
B. Spacing
C. Line Spacing
D. Alignment
Answer: C) Line Spacing
Explanation: Line spacing refers to the amount of vertical space between lines of text in a
document. It affects the readability and overall appearance of the text.
108. What essential component must a computer have to initiate the 'boot' process?
A. Keyboard
B. Operating System
C. Monitor
D. Mouse
Answer: B) Operating System
Explanation: A computer cannot initiate the 'boot' process without an operating system, as it is
responsible for managing hardware, and software, and initiating the startup sequence.
109. What is the other name for the programmed chip?
A. LSIC
B. ROM
C. RAM
D. PROM
Answer: D) PROM
Explanation: PROM Stands for Programmable Read-Only Memory, It refers to a type of
memory chip that can be programmed with specific data or instructions during manufacturing
but cannot be changed afterward.
110. What is the typical data storage capacity of a normal CD-ROM?
A. 500 MB
B. 1 GB
C. 700 MB
D. 680 MB
Answer: D) 680 MB
Explanation: A typical data storage capacity of a normal CD-ROM is approximately 680
megabytes (MB).
111. In the context of Computer Memory, what does DMA stand for?
A. Data Manipulation Algorithm
B. Direct Memory Access
C. Digital Media Adapter
D. Dynamic Memory Allocation
Answer: B) Direct Memory Access
Explanation: DMA stands for Direct Memory Access, which is a feature that allows hardware
devices to communicate directly with computer memory without involving the central processing
unit (CPU).
112. In the context of Computer Networks, what is the full form of LAN?
A. Local Access Network
B. Long Area Network
C. Local Area Network
D. Limited Access Network
Answer: C) Local Area Network
Explanation: In the context of Computer Network, LAN stands for Local Area Network, which
is a network of interconnected devices within a limited geographic area, such as a home, office,
or campus.
113. During what period were Second Generation computers developed?
A. 1956 - 65
B. 1960 -70
C. 1963 -76
D. 1970 -80
Answer: A) 1956 - 65
Explanation: Second Generation computers were developed during the period of 1956 - 65.
114. When did arch-rivals IBM and Apple Computers Inc. decide to join hands?
A. 1985
B. 1991
C. 1995
D. 2000
Answer: B) 1991
Explanation: In 1990, IBM and Apple Computers Inc. decided to join hands and collaborate on
a new project known as "AIM" (Advanced Interactive Microelectronics). This partnership aimed
to create a new generation of personal computer technology.
115. What kind of memory is both static and non-volatile?
A. Cache Memory
B. Virtual Memory
C. RAM
D. ROM
Answer: D) ROM
Explanation: Read-Only Memory (ROM) is a type of memory that is both static (retains its
contents without power) and non-volatile (retains its contents even when power is removed). It
contains permanent instructions or data that cannot be modified after manufacturing.
116. An error in software or hardware is called a bug. What is the alternative computer
jargon for it?
A. Glitch
B. Virus
C. Worm
D. Malware
Answer: A) Glitch
Explanation: In computer jargon, an alternative term for an error in software or hardware is
"glitch." It refers to a temporary or minor fault that can cause unexpected behavior or
malfunctions in a system.
117. What term is used to describe unwanted repetitious messages, such as unsolicited bulk
e-mail?
A. Hijacking
B. Phishing
C. Spam
D. Malware
Answer: C) Spam
Explanation: Unwanted repetitious messages, such as unsolicited bulk e-mails, are commonly
referred to as spam.
118. What is the common name for the crime of stealing passwords?
A. Hacking
B. Phishing
C. Malware
D. Spoofing
Answer: D) Spoofing
Explanation: Spoofing involves impersonating someone or something trusted to trick victims
into taking actions that benefit the attacker's objectives.
119. BIOS stands for ____.
A. Basic Input Output System
B. Binary Input Output System
C. Base Input Output System
D. Broad Input Output System
Answer: A) Basic Input Output System
Explanation: BIOS stands for Basic Input Output System, which is firmware that provides
essential low-level functions for a computer's hardware, including booting the operating system
and managing hardware components.
120. Who is regarded as the Father of the C programming language?
A. Alan Turing
B. Dennis Ritchie
C. Linus Torvalds
D. Tim Berners-Lee
Answer: B) Dennis Ritchie
Explanation: Dennis Ritchie is widely regarded as the creator and "Father of C Programming
Language". He played a key role in developing the C programming language.
121. RAM can be treated as the ____ for the computer's processor.
A. Brain
B. Memory
C. Workspace
D. Waiting Room
Answer: D) Waiting Room
Explanation: "Waiting Room," fits well with the concept of RAM serving as a temporary
storage area for data and instructions that the processor is currently working with.
122. What term is used to describe the various ways in which computers manipulate data?
A. Data Processing
B. Data Manipulation
C. Data Conversion
D. Data Rendering
Answer: A) Data Processing
Explanation: Data Processing refers to the manipulation, transformation, and organization of
data by a computer or other electronic device. It involves various operations such as calculations,
sorting, and converting data from one format to another.
123. What category do items like Joshy and Perfumes belong to?
A. Worm
B. Ransomware
C. Spyware
D. Virus
Answer: D) Virus
Explanation: Joshy, Perfumes are examples of viruses.
124. What is the term for the law enforcement specialty that involves the ability to recover
and read deleted or damaged files from a criminal's computer?
A. Digital Criminology
B. Cyber Investigation
C. Computer Forensics
D. Cybersecurity Analysis
Answer: C) Computer Forensics
Explanation: Computer forensics is the law enforcement specialty that involves the ability to
recover and analyze digital evidence, including deleted or damaged files, from a criminal's
computer.
125. Where does most data go first within a computer memory hierarchy?
A. Secondary Storage
B. Cache Memory
C. RAM (Main Memory)
D. Hard Disk Drive
Answer: C) RAM (Main Memory)
Explanation: RAM stands for Random Access Memory. It is a type of computer memory that
provides the working space for the computer's operating system, applications, and data.
126. In the context of Windows, the 'Help' menu is available at which button?
A. F1
B. Start
C. Ctrl
D. Alt
Answer: B) Start
Explanation: The Help Menu in the Windows operating system is often accessed by clicking on
the "Start" button and then selecting the "Help" option.
127. Which file contains permanent data and gets updated during the processing of
transactions?
A. Executable File
B. Backup File
C. Temporary File
D. Master File
Answer: D) Master File
Explanation: The master file contains permanent data and gets updated during the processing of
transactions in a computer system, particularly in database management systems.
128. A DVD is an example of an ____.
A. Input Device
B. Output Device
C. Optical Disc
D. Processing Device
Answer: C) Optical Disc
Explanation: An optical disc is a type of storage medium that uses optical technology to store
and retrieve digital data. It consists of a flat, circular disc made of plastic or glass and is coated
with a reflective layer.
129. Which is the most common tool used to restrict access to computer systems?
A. Firewall
B. Anti-virus Software
C. Encryption
D. Password Protection
Answer: D) Password Protection
Explanation: Password protection is the most common tool used to restrict access to a computer
system, or specific files. It involves setting up a password that users must provide to gain access,
helping to secure sensitive information and prevent unauthorized access.
130. What is the term for the technology that stores only essential instructions on a
microprocessor chip, thus enhancing its speed?
A. Cache Memory
B. RISC
C. Overclocking
D. Parallel Processing
Answer: B) RISC
Explanation: RISC stands for Reduced Instruction Set Computing. This architecture focuses on
using a smaller set of essential and efficient instructions to enhance processor speed and
performance.
131. What is the name of an application program that gathers user information and sends
it to someone through the Internet?
A. Antivirus
B. Firewall
C. Spybot
D. Browser
Answer: C) Spybot
Explanation: Spybot Search & Destroy is an anti-spyware software designed to detect and
remove various types of malicious software, including spyware, adware, and other potentially
unwanted programs.
132. The basic unit of a worksheet into which you enter data in Excel is called?
A. Row
B. Cell
C. Column
D. Table
Answer: B) Cell
Explanation: A cell is an intersection of a row and a column. Each cell has its name like A2
which is also known as cell address.
133. What contains buttons and menus that provide quick access to commonly used
commands?
A. Toolbar
B. Menubar
C. Taskbar
D. Status bar
Answer: A) Toolbar
Explanation: A toolbar contains buttons and menus that provide quick access to commonly used
commands. The toolbar is a visual interface that contains buttons, icons, and other components
for displaying and receiving information on a computer screen.
134. .doc, .xls, .ppt, and .html are examples of?
A. Document
B. Extensions
C. Both (A) and (B)
D. None of the above mentioned
Answer: B) Extensions
Explanation: A file extension refers to a sequence of three or four alphabetic characters that is
appended to the end of a file name. and follows a period like .doc, .xlsx, .pptx, .html. These
extensions tell you about the characteristics of a file and its use.
135. Which type of file is created by the Excel program?
A. Document file
B. Data file
C. Portable document format file
D. Workbook file
Answer: D) Workbook file
Explanation: Using Excel, we can create a workbook file. A workbook contains worksheets.
136. What is the full form of ATM?
A. Automatic Teller Machine
B. Authenticated Teller Mechanism
C. Automatic Typing Machine
D. None of the above mentioned
Answer: A) Automatic Teller Machine
Explanation: ATM stands for Automatic Teller Machine.
137. The blinking symbol on the computer screen is called the ____.
A. Bluetooth
B. Battery
C. Cursor
D. Paste Options
Answer: C) Cursor
Explanation: The blinking symbol on the computer screen is known as the cursor. A cursor
looks like a vertical line that indicates the position on a computer’s screen where a user can
enter text.
138. Which function calculates the largest value in a set of numbers in Excel?
A. = UPPER()
B. = LEN()
C. = MAX()
D. = LARGER()
Answer: C) = MAX()
Explanation: The `MAX()` Function finds the largest value amongst inputted numbers in Excel.
139. What is the full form of 'www' on the internet?
A. World Wide Web
B. World Width Web
C. World Wise Web
D. World Wide Websites
Answer: A) World Wide Web
Explanation: 'WWW' stands for World Wide Web. The Internet is an example of WWW.
140. Recently all high-end smartphones are coming equipped with AMOLED screens.
What is its full form?
A. Action Material Organic Light Emitting Diode
B. Active Matrix Original Light Emitting Diode
C. Active Matrix Organic Light Emitting Diode
D. None of the above mentioned
Answer: C) Active Matrix Organic Light Emitting Diode
Explanation: AMOLED stands for Active Matrix Organic Light Emitting Diode.
141. Android mobile operating system is the product of which software giant?
A. Microsoft
B. Google
C. Oracle
D. Apple
Answer: B) Google
Explanation: Android mobile operating system is the product of Google.
142. Gmail, a web-based email service is the product of which company?
A. Google
B. Oracle
C. Apple
D. Yahoo
Answer: A) Google
Explanation: Gmail is a free email service provided by Google. This is one of the most popular
emails.
143. A pointer is shaped like a hand when it is positioned over ___.
A. URL
B. File
C. Document
D. Hyperlink
Answer: D) Hyperlink
Explanation: A pointer is shaped like a hand when it is positioned over a Hyperlink on the
internet or an application.
144. MS Word allows the creation of which type of documents by default?
A. Portable document format (.pdf)
B. Document files (.doc)
C. Text files (.txt)
D. All kind of files
Answer: B) Document files (.doc)
Explanation: MS Word allows us to create document files.
145. MS-Excel allows us to create ____ documents by default.
A. Text files (.txt)
B. Workbook (.xlsx)
C. Portable document format (.pdf)
D. None of the above mentioned
Answer: B) Workbook (.xlsx)
Explanation: MS Excel allows us to create workbooks (.xlsx) documents by default.
146. MS-PowerPoint allows us to create ____ documents by default.
A. Presentation files (.pptx)
B. Text files (.txt)
C. Both (A) and (B)
D. None of the above mentioned
Answer: A) Presentation files (.pptx)
Explanation: MS-PowerPoint allows us to create Presentation file (.pptx) documents by default.
147. While working on a computer; data are temporarily stored in ____ memory.
A. ROM (Read Only Memory)
B. Cache
C. RAM (Random Access Memory)
D. None of the above mentioned
Answer: C) RAM (Random Access Memory)
Explanation: While working on a computer; data are temporarily stored in the Random Access
Memory.
148. Information travels between components on the Mother Board through ____.
A. Buses
B. Packets
C. Peer-to-Peer (P2P)
D. Both (A) and (C)
Answer: A) Buses
Explanation: Using Buses, the information travels between different components on the Mother
Board.
149. The most frequently used instructions of a computer program are likely to be fetched
from which type of memory?
A. Read Only Memory
B. Random Access Memory
C. Cache memory
D. None of the above mentioned
Answer: C) Cache memory
Explanation: Cache memory is a small-sized type of volatile memory that accesses the data with
high speed for a processor to execute. The most frequently used instructions of a computer
program are likely to be fetched from Cache memory.
150. A website on which an individual or group of users record opinions, information, etc.
on a regular basis is called a?
A. Portfolio website
B. Blog
C. Non-profit website
D. Business website
Answer: B) Blog
Explanation: A blog is a website where someone writes regularly about things that interest
them, generally with photos and links to other websites they find interesting.
151. Which type of Operating system is Linux?
A. Free BSD
B. Closed Source Operating System
C. Open Source Operating System
D. None of the above mentioned
Answer: C) Open Source Operating System
Explanation: Linux is an Open Source Operating System. An operating system is system
software that directly controls hardware and other resources attached to the computer system.
152. Text or Graphics while copying is temporarily stored in?
A. Clipboards
B. Cache
C. RAM
D. ROM
Answer: A) Clipboards
Explanation: Text or Graphics while copying is temporarily stored in Clipboards.
153. Horizontal orientation of a page is referred to as ____in Page Setup.
A. Landscape
B. Portrait
C. Print Layout
D. Web View Layout
Answer: A) Landscape
Explanation: Horizontal orientation of a page is referred to as Landscape in Page Setup.
154. Defragmentation of the Hard drive is done for?
A. To recycle it
B. To destroy it
C. Creating more free spaces
D. To install OS
Answer: C) Creating more free spaces
Explanation: Defragmentation also known as defragging or defrag of Hard drive is done to
create more free spaces. It is a process of rearranging the data on a storage medium.
155. The purpose of the primary key in a database is to?
A. Uniquely identify a record
B. Uniquely delete a record
C. Uniquely save a record
D. None of the above mentioned
Answer: A) Uniquely identify a record
Explanation: The purpose of the primary key in a database is to uniquely identify a record from
database tables.
156. Which command is used to copy a text or file?
A. Ctrl + C
B. Shift + C
C. Alt + C
D. Ctrl + Shift+ C
Answer: A) Ctrl + C
Explanation: Ctrl + C command is used to copy a text or file at a particular location.
157. Which command is used to paste a text or file?
A. Ctrl + P
B. Ctrl + V
C. Shift + P
D. Alt + P
Answer: B) Ctrl + V
Explanation: Ctrl + V is used to paste a text or file at a particular location.
158. Printed copy of a document is often called?
A. Hard Copy
B. Soft Copy
C. Virtual Copy
D. None of the above mentioned
Answer: A) Hard Copy
Explanation: Printed copy of a document is often called a Hard Copy.
159. The device used to carry Digital data on Analog lines is called ____.
A. Conductor
B. Insulator
C. Demodulation
D. Modulator
Answer: D) Modulator
Explanation: The device used to carry digital data on Analog lines is known as Modulator. A
modulator is an electronic circuit that superimposes a low-frequency (information) signal onto a
high-frequency (carrier) signal for the purpose of wireless transmission (source).
160. Which are used to identify a user to get the details of accessibility on a website?
A. Buses
B. Cache
C. Cookies
D. None of the above mentioned
Answer: C) Cookies
Explanation: Cookies are used to identify a user to get the details of accessibility on a website.
Cookies contain text that a site you visit sends to your computer. They help the website
remember the things about your visit, which can make it easier for you to go back to the site and
make it more useful to you.
161. The program which translates and executes the program at run-time line by line is
called as?
A. Interpreter
B. Compiler
C. Assembler
D. Inter-Assembler
Answer: A) Interpreter
Explanation: The program which translates and executes the program at run-time line by line is
known as Interpreter.
162. FTP stands for?
A. File Translator Protocol
B. File Translator Process
C. File Transfer Process
D. File Transfer Protocol
Answer: D) File Transfer Protocol
Explanation: FTP stands for File Transfer Protocol. FTP (File Transfer Protocol) is a standard
network protocol used for the transfer of files from one host to another over a TCP-based
network, such as the Internet (source).
163. Computers use the ___ Number System to store data and perform calculations.
A. Binary
B. Hexadecimal
C. Octal
D. Roman
Answer: A) Binary
Explanation: Computers use the Binary Number System to store data and perform calculations.
164. What does the DOS stand for?
A. Data Operating System
B. Disk Operating Service
C. Disk Output System
D. Disk Operating System
Answer: D) Disk Operating System
Explanation: DOS stands for Disk Operating System. DOS runs from a disk drive.
165. Hardware that converts your computer's digital signal to an analog signal that can
travel over telephone lines is called?
A. Modem
B. Router
C. Wi-Fi
D. None of the above mentioned
Answer: A) Modem
Explanation: A modem is a device that converts a digital signal to an analog signal that can
travel over telephone lines.
166. What allow wireless mobile devices to access the Internet and its services?
A. WAP (Wireless Application Protocol)
B. WAP (Wired Application Protocol)
C. WAP (Wireless Automated Process)
D. None of the above mentioned
Answer: A) WAP (Wireless Application Protocol)
Explanation: Wireless Application Protocol allows wireless mobile devices to access the
Internet and its services. It is a standard for accessing information over a mobile wireless
network.
167. Group of instructions that directs a computer is called?
A. Firmware
B. Package
C. Application
D. Program
Answer: D) Program
Explanation: A group of instructions that directs a computer is called a program.
168. A computer-controlled device for training exercises that duplicates the work
environment is called a?
A. Accumulator
B. Simulator
C. Network
D. Pre-Accumulator
Answer: B) Simulator
Explanation: A computer-controlled device for training exercises that duplicates the work
environment is called Simulator.
169. Perforated paper used as input or output media is known as?
A. Buses
B. Magnetic tape
C. Paper tape
D. None of the above mentioned
Answer: C) Paper tape
Explanation: Perforated paper used as input or output media is known as paper tape. The paper
tape consisted of a lengthy strand of paper punched with holes to hold data. Typically, paper tape
measured 0.1 mm.
170. Which network topology Ethernet uses?
A. Ring topology
B. Star topology
C. Bus topology
D. None of the above mentioned
Answer: C) Bus topology
Explanation: Ethernet uses Bus topology. It is a specific type of network topology in which
different devices in the network are connected to a single cable.
171. IBM 1401 is a?
A. First-Generation Computer
B. Second-Generation Computer
C. Third-Generation Computer
D. None of the above mentioned
Answer: B) Second-Generation Computer
Explanation: IBM 1401 is a Second Generation Computer. IBM announced the IBM 1401, a
variable-word length decimal computer, on October 5, 1959.
172. The personal computer industry was started by which company?
A. Infosys
B. IBM (International Business Machine)
C. Tata Consultancy Services (TCS)
D. Microsoft
Answer: B) IBM (International Business Machine)
Explanation: The personal computer industry was started by IBM (International Business
Machine).
173. Which was the most popular first-generation computer
A. IBM 950
B. IBM 750
C. IBM 650
D. None of the above mentioned
Answer: C) IBM 650
Explanation: IBM 1650 was the most popular first-generation computer. The IBM 650
Magnetic Drum Data-Processing Machine was the world's first mass-produced computer and one
of IBM's earliest computers.
174. Responsibility of the logical unit in the CPU of a computer is?
A. To compare numbers
B. To compare text
C. To compare symbols
D. None of the above mentioned
Answer: A) To compare numbers
Explanation: The responsibility of the logical unit in the CPU of a computer is to compare
numbers.