[go: up one dir, main page]

0% found this document useful (0 votes)
30 views19 pages

Basic Computer Lda PDF Notes

The document covers fundamental concepts of computers, including their history, hardware components, software, and operating systems. It includes multiple-choice questions with answers and explanations, addressing topics such as the CPU, memory types, input/output devices, and software functions. Additionally, it touches on Microsoft Office applications like Word, Excel, and PowerPoint, providing shortcuts and file formats.

Uploaded by

ohyuki732
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views19 pages

Basic Computer Lda PDF Notes

The document covers fundamental concepts of computers, including their history, hardware components, software, and operating systems. It includes multiple-choice questions with answers and explanations, addressing topics such as the CPU, memory types, input/output devices, and software functions. Additionally, it touches on Microsoft Office applications like Word, Excel, and PowerPoint, providing shortcuts and file formats.

Uploaded by

ohyuki732
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Basic Computer

Part 1: Computer Fundamentals & History

1. Who is known as the "Father of the Computer"? (A) Blaise Pascal (B) Charles
Babbage (C) Alan Turing (D) Bill Gates Answer: (B) Charles Babbage Explanation:
Charles Babbage is credited with conceiving the first automatic digital computer, the
Analytical Engine, in the 19th century.

2. The first generation of computers used which technology? (A) Transistors (B)
Integrated Circuits (C) Vacuum Tubes (D) Microprocessors Answer: (C) Vacuum
Tubes Explanation: First-generation computers (approx. 1940-1956) were massive,
expensive, and used vacuum tubes for circuitry and magnetic drums for memory.

3. What does 'CPU' stand for? (A) Central Processing Unit (B) Central Programming
Unit (C) Computer Processing Unit (D) Central Performance Unit Answer: (A) Central
Processing Unit Explanation: The CPU is the primary component of a computer that
executes instructions. It's often referred to as the "brain" of the computer.

4. Which of the following is a type of volatile memory? (A) ROM (B) RAM (C) Hard Disk
(D) SSD Answer: (B) RAM Explanation: Volatile memory, like RAM (Random Access
Memory), requires power to maintain the stored information. It loses its data when the
power is turned off.

5. Which of the following is an example of non-volatile memory? (A) RAM (B) Cache
Memory (C) ROM (D) DRAM Answer: (C) ROM Explanation: Non-volatile memory, like
ROM (Read-Only Memory), retains its data even when the power is turned off. It's used
to store firmware or software that is rarely changed.

6. The term 'GIGO' is related to which characteristic of computers? (A) Speed (B)
Accuracy (C) Versatility (D) Diligence Answer: (B) Accuracy Explanation: GIGO stands
for "Garbage In, Garbage Out." It means that the accuracy of a computer's output
depends on the accuracy of the input provided.

7. A collection of 8 bits is called a ________. (A) Nibble (B) Word (C) Byte (D) Kilobyte
Answer: (C) Byte Explanation: A byte, which consists of 8 bits, is the basic unit of
data measurement in computing. A nibble is 4 bits.

8. What does 'ENIAC' stand for? (A) Electronic Numerical Integrator And Computer (B)
Electronic Number Integrator And Calculator (C) Electrical Numerical Integrator And
Computer (D) Electronic Network Interactive Analytic Computer Answer: (A)
Electronic Numerical Integrator And Computer Explanation: ENIAC was the first
general-purpose electronic digital computer, completed in 1945.

9. The process of starting or restarting a computer is called ________. (A) Loading (B)
Starting (C) Booting (D) Initializing Answer: (C) Booting Explanation: Booting is the
process that starts the operating system when the computer is turned on. A "cold
boot" is from a powered-off state, while a "warm boot" is a restart.
10. Which unit of a computer is considered its "brain"? (A) Memory Unit (B) Input Unit
(C) Control Unit (D) Central Processing Unit (CPU) Answer: (D) Central Processing
Unit (CPU) Explanation: The CPU performs most of the processing inside a computer,
carrying out the instructions of a computer program.

11. Which part of the CPU performs arithmetic and logical operations? (A) CU (B) ALU
(C) MU (D) Register Answer: (B) ALU Explanation: The ALU (Arithmetic Logic Unit) is
a digital circuit within the CPU that handles all arithmetic calculations (like addition,
subtraction) and logical operations (like AND, OR, NOT).

12. The speed of a computer's processor is measured in ________. (A) Gigabytes (GB)
(B) Megabits per second (Mbps) (C) Gigahertz (GHz) (D) Dots Per Inch (DPI) Answer:
(C) Gigahertz (GHz) Explanation: Processor speed (clock speed) is measured in
cycles per second. Gigahertz (GHz) means billions of cycles per second, indicating
how fast the CPU can execute instructions.

13. In the context of computing, what is a 'bug'? (A) A virus (B) An error in a program
(C) A hardware malfunction (D) An unwanted pop-up Answer: (B) An error in a
program Explanation: A bug is a flaw, error, or fault in a computer program's design
or code that causes it to produce an incorrect or unexpected result.

14. What does 'GUI' stand for? (A) Graphical User Interaction (B) General User
Interface (C) Graphical User Interface (D) General Utility Interface Answer: (C)
Graphical User Interface Explanation: A GUI allows users to interact with electronic
devices through graphical icons and visual indicators, as opposed to text-based
interfaces.

15. Second generation computers were based on ________. (A) Vacuum Tubes (B)
Transistors (C) Integrated Circuits (D) AI Answer: (B) Transistors Explanation:
Transistors replaced bulky vacuum tubes in the second generation of computers
(approx. 1956-1963), making them smaller, faster, cheaper, and more reliable.

Part 2: Hardware

16. Which of the following is an input device? (A) Monitor (B) Printer (C) Scanner (D)
Speaker Answer: (C) Scanner Explanation: An input device sends data to a computer.
A scanner converts physical documents or images into digital data. Monitors,
printers, and speakers are output devices.

17. Which of the following is an output device? (A) Keyboard (B) Mouse (C) Plotter (D)
Microphone Answer: (C) Plotter Explanation: An output device receives data from a
computer. A plotter is a specialized printer that produces high-quality graphics or
drawings. Keyboards, mice, and microphones are input devices.

18. The resolution of a computer monitor is measured in ________. (A) Dots Per Inch
(DPI) (B) Pixels (C) Gigahertz (GHz) (D) Megabytes (MB) Answer: (B) Pixels
Explanation: Monitor resolution is expressed as the number of horizontal and vertical
pixels (e.g., 1920x1080), which are the tiny dots that make up the display.

19. What does 'USB' stand for? (A) Universal Serial Bus (B) Uniform Service Bus (C)
Universal Sector Buffer (D) United Serial Bus Answer: (A) Universal Serial Bus
Explanation: USB is a standard interface that enables communication between a
computer and peripheral devices like keyboards, mice, printers, and external drives.

20. A device used to connect a computer to the internet over a telephone line is called
a ________. (A) Router (B) Hub (C) Modem (D) Switch Answer: (C) Modem
Explanation: A Modem (Modulator-Demodulator) converts digital signals from a
computer into analog signals for transmission over phone lines and vice versa.

21. What is the main circuit board in a computer called? (A) CPU (B) RAM (C)
Motherboard (D) Hard Drive Answer: (C) Motherboard Explanation: The motherboard
is the main printed circuit board that connects all the essential components of a
computer, such as the CPU, RAM, and storage drives.

22. Which storage device uses flash memory? (A) CD-ROM (B) Hard Disk Drive (HDD)
(C) Solid State Drive (SSD) (D) Blu-ray Disc Answer: (C) Solid State Drive (SSD)
Explanation: SSDs use flash-based memory, which is much faster than the
mechanical, spinning platters used in traditional HDDs.

23. The 'brain' of the computer, which performs most of the calculations, is the
________. (A) RAM (B) Motherboard (C) CPU (D) Power Supply Answer: (C) CPU
Explanation: The Central Processing Unit (CPU) is responsible for executing
instructions and performing calculations, making it the core processing component.

24. The quality of a printer is measured in ________. (A) Pixels per inch (B) Characters
per second (C) Dots Per Inch (DPI) (D) Pages Per Minute (PPM) Answer: (C) Dots Per
Inch (DPI) Explanation: DPI measures the density of ink dots a printer can place within
a square inch. Higher DPI generally means higher quality and sharper images.

25. A standard computer keyboard has which layout? (A) DVORAK (B) AZERTY (C)
QWERTY (D) COLEMAK Answer: (C) QWERTY Explanation: The QWERTY layout,
named for the first six keys on the top-left letter row, is the most common modern
keyboard layout.

26. What does 'VGA' stand for? (A) Video Graphics Array (B) Visual Graphics Adapter
(C) Video Gateway Application (D) Visual Graphics Array Answer: (A) Video Graphics
Array Explanation: VGA is a standard for connecting display devices like monitors. It
refers to the connector, the cable, and the display resolution (640x480).

27. Which device is used to move the cursor on the screen in a graphical user
interface? (A) Keyboard (B) Mouse (C) Joystick (D) Light Pen Answer: (B) Mouse
Explanation: A mouse is a pointing device that detects two-dimensional motion
relative to a surface, which is translated into the motion of a pointer (cursor) on a
display.
28. What is the function of a UPS? (A) To increase the processing speed (B) To
provide backup power (C) To cool down the CPU (D) To connect to the internet
Answer: (B) To provide backup power Explanation: A UPS (Uninterruptible Power
Supply) provides emergency power to a computer from a battery when the main
power source fails, preventing data loss.

29. Which port is commonly used to connect a printer to a computer? (A) VGA Port
(B) Ethernet Port (C) USB Port (D) HDMI Port Answer: (C) USB Port Explanation: While
older printers used parallel ports, modern printers almost universally connect via USB
for its ease of use and speed.

30. Which of these is an optical storage device? (A) Hard Disk (B) SSD (C) Pen Drive
(D) DVD Answer: (D) DVD Explanation: Optical storage devices (like CDs, DVDs,
Blu-ray) read and write data using a laser beam. The others are magnetic (Hard Disk)
or flash-based (SSD, Pen Drive).

Part 3: Software & Operating Systems

31. Which of the following is an example of an Operating System? (A) Microsoft Word
(B) Google Chrome (C) Windows 11 (D) Adobe Photoshop Answer: (C) Windows 11
Explanation: An Operating System (OS) is system software that manages computer
hardware and software resources and provides common services for computer
programs. Windows, macOS, and Linux are examples.

32. The process of finding and fixing errors in software code is called ________. (A)
Compiling (B) Debugging (C) Executing (D) Interpreting Answer: (B) Debugging
Explanation: Debugging is the methodical process of finding and reducing the
number of bugs, or defects, in a computer program or a piece of electronic hardware.

33. What is the full form of 'BIOS'? (A) Basic Input Output System (B) Binary Input
Output Software (C) Basic Integrated Operating System (D) Binary Integrated Open
Source Answer: (A) Basic Input Output System Explanation: BIOS is the firmware
used to perform hardware initialization during the booting process and to provide
runtime services for operating systems and programs.

34. Which of the following is NOT an application software? (A) MS Paint (B) Linux (C)
MS Word (D) VLC Media Player Answer: (B) Linux Explanation: Linux is an operating
system (system software). Application software (like Word or Paint) is designed for
end-users to perform specific tasks.

35. A small piece of software that can fix a bug or add a new feature to an existing
program is called a ________. (A) Version (B) Patch (C) Driver (D) Spooler Answer: (B)
Patch Explanation: A patch is a set of changes to a computer program or its
supporting data designed to update, fix, or improve it.

36. A computer cannot 'boot' if it does not have the ________. (A) Application
Software (B) Operating System (C) Mouse (D) Printer Answer: (B) Operating System
Explanation: The Operating System is essential software that is loaded during the
boot process to manage all other programs and hardware.

37. What is 'Open-Source' software? (A) Software that is free to use (B) Software
whose source code is available for modification (C) Software developed by a
community (D) Software that runs on any operating system Answer: (B) Software
whose source code is available for modification Explanation: Open-source software is
software with source code that anyone can inspect, modify, and enhance. Examples
include Linux and Firefox.

38. The file system used by most modern versions of Windows is ________. (A) FAT32
(B) ext4 (C) HFS+ (D) NTFS Answer: (D) NTFS Explanation: NTFS (New Technology
File System) is the standard file system for Windows NT and its descendants
(Windows 2000, XP, Vista, 7, 8, 10, 11).

39. What is the function of a 'device driver'? (A) To store data for a device (B) To
operate a device (C) To act as a translator between the hardware and the OS (D) To
power a device Answer: (C) To act as a translator between the hardware and the OS
Explanation: A device driver is a specific type of software program that allows the
operating system to communicate with a hardware device (like a printer or a graphics
card).

40. What does 'sleep mode' in a computer do? (A) Shuts down the computer
completely (B) Puts the computer in a low-power state, keeping the current session in
RAM (C) Restarts the operating system (D) Saves the current session to the hard disk
and shuts down Answer: (B) Puts the computer in a low-power state, keeping the
current session in RAM Explanation: Sleep mode saves power by putting your work
and settings in RAM and drawing a small amount of power, allowing you to quickly
resume where you left off.

Part 4: MS Office (Word, Excel, PowerPoint)

41. In MS Word, what is the shortcut key to make text bold? (A) Ctrl + B (B) Ctrl + I (C)
Ctrl + U (D) Ctrl + P Answer: (A) Ctrl + B Explanation: Ctrl + B toggles the bold
formatting for the selected text. Ctrl + I is for italics, and Ctrl + U is for underline.

42. What is the file extension for a Microsoft Word 2007 (and later) document? (A) .doc
(B) .txt (C) .docx (D) .wrd Answer: (C) .docx Explanation: Starting with Office 2007, the
default file format for Word documents became .docx, which is an XML-based format.

43. In MS Excel, a file is called a ________. (A) Document (B) Workbook (C)
Presentation (D) Database Answer: (B) Workbook Explanation: An MS Excel file is
known as a workbook, which contains one or more worksheets (spreadsheets).

44. What character is used to start all formulas in MS Excel? (A) + (Plus sign) (B) *
(Asterisk) (C) = (Equals sign) (D) & (Ampersand) Answer: (C) = (Equals sign)
Explanation: Every formula or function in an Excel cell must begin with an equals sign
(=).

45. Which function in Excel is used to find the total of a range of cells? (A) COUNT()
(B) AVERAGE() (C) MAX() (D) SUM() Answer: (D) SUM() Explanation: The SUM()
function adds all the numbers in a specified range of cells. For example,
=SUM(A1:A10).

46. In MS PowerPoint, what is the keyboard shortcut to start a slide show from the
beginning? (A) F5 (B) F7 (C) Shift + F5 (D) Ctrl + S Answer: (A) F5 Explanation:
Pressing the F5 key starts the presentation from the very first slide. Shift + F5 starts it
from the current slide.

47. The intersection of a row and a column in an MS Excel spreadsheet is called a


________. (A) Box (B) Field (C) Cell (D) Record Answer: (C) Cell Explanation: A cell is
the basic unit of a worksheet where you enter data. Each cell is identified by its cell
address, which is the column letter and row number (e.g., A1, B2).

48. What is the 'Portrait' and 'Landscape' feature in MS Word? (A) Font Style (B) Page
Orientation (C) Page Margin (D) Text Alignment Answer: (B) Page Orientation
Explanation: Page Orientation determines whether the page is displayed and printed
vertically (Portrait) or horizontally (Landscape).

49. What is the shortcut to 'Undo' the last action in MS Office applications? (A) Ctrl + X
(B) Ctrl + C (C) Ctrl + Z (D) Ctrl + Y Answer: (C) Ctrl + Z Explanation: Ctrl + Z is the
universal shortcut for Undo. Ctrl + Y is for Redo (reversing the Undo).

50. In MS Word, the 'Thesaurus' tool is used for what purpose? (A) Spell checking (B)
Grammar options (C) Finding synonyms and antonyms (D) Translating text Answer:
(C) Finding synonyms and antonyms Explanation: The Thesaurus helps improve your
writing by providing a list of alternative words (synonyms) and words with the
opposite meaning (antonyms).

51. Which chart type is best for showing proportions or percentages of a whole in MS
Excel? (A) Bar Chart (B) Line Chart (C) Pie Chart (D) Scatter Plot Answer: (C) Pie Chart
Explanation: A pie chart is a circular graph that is divided into slices to illustrate
numerical proportion.

52. In MS PowerPoint, what is a 'slide transition'? (A) The movement of objects on a


slide (B) The way one slide changes to the next (C) The background design of a slide
(D) The order of the slides Answer: (B) The way one slide changes to the next
Explanation: A slide transition is the visual effect that occurs when you move from
one slide to the next during a presentation.

53. To select an entire document in MS Word, which shortcut is used? (A) Ctrl + S (B)
Ctrl + A (C) Alt + A (D) Shift + A Answer: (B) Ctrl + A Explanation: Ctrl + A is the
shortcut for 'Select All', which highlights all the content in the current document.
54. What is the 'Mail Merge' feature in MS Word used for? (A) To send the same email
to multiple people (B) To create personalized letters and labels for mass mailings (C)
To merge two or more documents into one (D) To check for email addresses in a
document Answer: (B) To create personalized letters and labels for mass mailings
Explanation: Mail Merge allows you to generate multiple documents from a single
template and a data source, inserting personal information like names and addresses
into each copy.

55. What does the COUNTIF function do in MS Excel? (A) Counts the number of cells
in a range (B) Counts the number of cells that meet a single criterion (C) Counts
characters in a cell (D) Counts non-empty cells Answer: (B) Counts the number of
cells that meet a single criterion Explanation: The COUNTIF function is used to count
cells within a range that meet a specific condition you define. For example,
=COUNTIF(B2:B10, ">50").

Part 5: Internet, Networking & Security

56. What does 'WWW' stand for in a web address? (A) World Wide Web (B) World Web
Wide (C) Web World Wide (D) World Wide Warehouse Answer: (A) World Wide Web
Explanation: The World Wide Web, or simply "the web," is a global system of
interlinked hypertext documents accessed via the Internet.

57. What is a 'URL'? (A) A computer programming language (B) The address of a
resource on the internet (C) A type of computer network (D) A software program
Answer: (B) The address of a resource on the internet Explanation: URL (Uniform
Resource Locator) is the address used to locate a specific webpage or file on the
internet (e.g., https://www.google.com).

58. Which of the following is a program designed to harm your computer? (A)
Antivirus (B) Firewall (C) Malware (D) Browser Answer: (C) Malware Explanation:
Malware (Malicious Software) is a general term for any software intentionally designed
to cause damage to a computer, server, client, or computer network.

59. A network that connects computers in a small geographical area, like a single
building or office, is called a ________. (A) WAN (Wide Area Network) (B) MAN
(Metropolitan Area Network) (C) LAN (Local Area Network) (D) PAN (Personal Area
Network) Answer: (C) LAN (Local Area Network) Explanation: A LAN is a computer
network that interconnects computers within a limited area such as a residence,
school, or office building.

60. What does 'HTTP' stand for? (A) HyperText Transfer Protocol (B) HyperText
Transmission Protocol (C) High Text Transfer Protocol (D) HyperText Transfer Page
Answer: (A) HyperText Transfer Protocol Explanation: HTTP is the underlying
protocol used by the World Wide Web for transferring data and defines how messages
are formatted and transmitted.
61. What is an 'IP Address'? (A) A person's physical address (B) The name of a
website (C) A unique numerical label assigned to each device on a network (D) An
email address Answer: (C) A unique numerical label assigned to each device on a
network Explanation: An IP (Internet Protocol) address is a numerical identifier for a
device connected to a network, which allows it to communicate with other devices.

62. A piece of software that protects a network by filtering incoming and outgoing
traffic is called a ________. (A) Virus (B) Firewall (C) Router (D) Cookie Answer: (B)
Firewall Explanation: A firewall acts as a barrier between a trusted network (like your
office LAN) and an untrusted network (like the Internet), controlling access based on
security rules.

63. What is the purpose of an 'ISP'? (A) To manufacture computers (B) To provide
access to the internet (C) To develop web browsers (D) To create antivirus software
Answer: (B) To provide access to the internet Explanation: An ISP (Internet Service
Provider) is a company that provides individuals and organizations access to the
internet and other related services.

64. An unsolicited or unwanted email is called ________. (A) Draft (B) Spam (C) Trash
(D) Virus Answer: (B) Spam Explanation: Spam is the term for junk email, which is
sent in bulk to a list of recipients for commercial or malicious purposes.

65. What does the 'cc' field mean in an email? (A) Confidential Copy (B) Carbon Copy
(C) Creative Commons (D) Copied Content Answer: (B) Carbon Copy Explanation:
Carbon Copy (cc) is used to send a copy of the email to other recipients who are not
the primary recipients. All recipients can see the 'cc' list.

66. What does 'Phishing' refer to? (A) A type of computer virus (B) The act of sending
fraudulent emails to trick people into revealing personal information (C) A method of
cleaning a computer (D) A network connection type Answer: (B) The act of sending
fraudulent emails to trick people into revealing personal information Explanation:
Phishing is a cybercrime where targets are contacted by email, telephone, or text
message by someone posing as a legitimate institution to lure individuals into
providing sensitive data such as passwords and credit card numbers.

67. A small text file that a website stores on your computer to remember your
preferences is called a ________. (A) Cache (B) Spam (C) Cookie (D) Log Answer: (C)
Cookie Explanation: A cookie is a small piece of data sent from a website and stored
on the user's computer by the user's web browser while the user is Browse.

68. Which of the following is a popular web browser? (A) Microsoft Word (B) Adobe
Reader (C) Mozilla Firefox (D) Windows Defender Answer: (C) Mozilla Firefox
Explanation: A web browser is a software application for accessing information on
the World Wide Web. Other examples include Google Chrome, Microsoft Edge, and
Safari.

69. What is 'Cloud Computing'? (A) Storing data on your local hard drive (B) Using a
network of remote servers hosted on the internet to store, manage, and process data
(C) A type of weather forecasting software (D) Connecting computers in a small room
Answer: (B) Using a network of remote servers hosted on the internet to store,
manage, and process data Explanation: Cloud computing means accessing data and
programs over the internet instead of from your computer's hard drive. Services like
Google Drive and iCloud are examples.

70. What does 'DNS' stand for? (A) Data Numbering System (B) Domain Name System
(C) Dynamic Network Service (D) Direct Naming Server Answer: (B) Domain Name
System Explanation: The DNS is the internet's phonebook. It translates
human-readable domain names (like www.google.com) into machine-readable IP
addresses (like 172.217.167.78).

71. What is a 'Trojan Horse' in the context of computer security? (A) A strong
password (B) An antivirus program (C) Malware disguised as legitimate software (D) A
hardware security key Answer: (C) Malware disguised as legitimate software
Explanation: A Trojan Horse is a type of malware that misleads users of its true intent.
It appears to be a normal, harmless file or program but contains hidden malicious
functions.

72. The '.gov' domain extension typically represents what kind of organization? (A)
Commercial business (B) Educational institution (C) Government agency (D)
Non-profit organization Answer: (C) Government agency Explanation: The .gov
top-level domain is reserved for government entities. Similarly, '.edu' is for education,
'.org' for organizations, and '.com' for commercial.

73. What is Wi-Fi? (A) A type of internet cable (B) A technology that allows devices to
connect to a network wirelessly (C) A security protocol (D) A brand of computer
Answer: (B) A technology that allows devices to connect to a network wirelessly
Explanation: Wi-Fi is a wireless networking technology that uses radio waves to
provide high-speed internet and network connections.

74. What is the function of the 'Bcc' field in an email? (A) To send a copy without any
text (B) To send a high-priority message (C) To send a copy to a recipient without
other recipients knowing (D) To attach a big file Answer: (C) To send a copy to a
recipient without other recipients knowing Explanation: Bcc (Blind Carbon Copy)
sends a copy of the email to a recipient whose email address is not visible to the
primary (To) or Cc recipients.

75. A program that searches for and identifies items in a database that correspond to
keywords or characters specified by the user is called a ________. (A) Web Browser
(B) Search Engine (C) Email Client (D) Website Answer: (B) Search Engine
Explanation: A search engine (like Google, Bing, DuckDuckGo) is a software system
designed to carry out web searches, meaning to search the World Wide Web in a
systematic way for particular information.

76. The scrambling of data to make it unreadable to unauthorized users is called


________. (A) Encryption (B) Decryption (C) Authentication (D) Authorization Answer:
(A) Encryption Explanation: Encryption is the process of converting information or
data into a code, especially to prevent unauthorized access. Decryption is the reverse
process.
77. The network protocol that provides a secure, encrypted connection for web traffic
is ________. (A) HTTP (B) FTP (C) SMTP (D) HTTPS Answer: (D) HTTPS Explanation:
HTTPS (HyperText Transfer Protocol Secure) is the secure version of HTTP. The 'S' at
the end signifies that the connection is encrypted, making it safe for transmitting
sensitive data.

78. A collection of interconnected computers and devices is called a ________. (A)


System (B) Network (C) Server (D) Database Answer: (B) Network Explanation: A
computer network is a set of computers sharing resources located on or provided by
network nodes.

79. Which of these is a strong password? (A) 12345678 (B) password (C)
Jk&8@Lp#sW (D) YourName123 Answer: (C) Jk&8@Lp#sW Explanation: A strong
password is long (at least 12 characters) and includes a mix of uppercase letters,
lowercase letters, numbers, and symbols. The other options are easily guessable.

80. What is 'two-factor authentication' (2FA)? (A) Using two different computers (B) A
security process requiring two different methods of identification (C) Using two
different passwords (D) Logging in twice Answer: (B) A security process requiring two
different methods of identification Explanation: 2FA adds a second layer of security to
your online accounts by requiring not just a password and username but also
something that only that user has on them, like a code sent to their phone.

81. What does 'bit' stand for in computer terminology? (A) Binary Information Text (B)
Binary Digit (C) Before Instruction Time (D) Basic Internal Task Answer: (B) Binary
Digit Explanation: A bit is the most basic unit of data in computing. It represents a
logical state with one of two possible values, 0 or 1.

82. Which of the following correctly lists computer memory units from smallest to
largest? (A) Megabyte, Gigabyte, Kilobyte, Terabyte (B) Kilobyte, Megabyte, Gigabyte,
Terabyte (C) Gigabyte, Kilobyte, Terabyte, Megabyte (D) Kilobyte, Gigabyte, Megabyte,
Terabyte Answer: (B) Kilobyte, Megabyte, Gigabyte, Terabyte Explanation: The order
is: Kilobyte (KB) is 1024 Bytes, Megabyte (MB) is 1024 KB, Gigabyte (GB) is 1024 MB,
and Terabyte (TB) is 1024 GB.

83. The process of converting data into a format that a computer can understand is
called ______. (A) Processing (B) Output (C) Input (D) Storage Answer: (C) Input
Explanation: Input is the act of entering data into a computer system for processing,
for instance, by typing on a keyboard or clicking a mouse.

84. The technology used in third-generation computers was ______. (A) Vacuum
Tubes (B) Transistors (C) Integrated Circuits (ICs) (D) Microprocessors Answer: (C)
Integrated Circuits (ICs) Explanation: Third-generation computers (approx. 1964-1971)
used Integrated Circuits, which placed many transistors onto a small silicon chip,
making computers even smaller, faster, and more reliable.
85. The analytical engine, developed by Charles Babbage, used ______ for input. (A)
Keyboard (B) Punch cards (C) Mouse (D) Floppy Disks Answer: (B) Punch cards
Explanation: The Analytical Engine was designed to use punch cards, a form of stiff
paper with holes punched in predefined positions, to input instructions and data.

86. What is the binary equivalent of the decimal number 10? (A) 1010 (B) 1100 (C) 0011
(D) 1001 Answer: (A) 1010 Explanation: In the binary system, 10 is represented as
1⋅8+0⋅4+1⋅2+0⋅1, which is 1010.

87. What does 'POST' stand for in the context of booting a computer? (A) Power-On
Self-Test (B) Post-Operation System Test (C) Program on System Test (D) Power-On
Software Test Answer: (A) Power-On Self-Test Explanation: POST is a diagnostic
testing sequence that a computer's BIOS runs to determine if the hardware (RAM, disk
drives, keyboard, etc.) is working correctly.

88. The main function of the Control Unit (CU) in the CPU is to ______. (A) Perform
calculations (B) Store data (C) Direct and manage the operations of the processor (D)
Display output Answer: (C) Direct and manage the operations of the processor
Explanation: The Control Unit tells the computer's memory, arithmetic logic unit, and
input/output devices how to respond to a program's instructions. It does not perform
calculations itself but directs the ALU to do so.

89. A hybrid computer is one having the combined properties of ______. (A) Super
and microcomputers (B) Mini and microcomputers (C) Analog and digital computers
(D) Mainframe and supercomputers Answer: (C) Analog and digital computers
Explanation: A hybrid computer combines features of both analog computers (which
handle continuous data) and digital computers (which handle discrete data) to solve
complex problems.

90. Who is considered the world's first computer programmer? (A) Charles Babbage
(B) Alan Turing (C) Ada Lovelace (D) Grace Hopper Answer: (C) Ada Lovelace
Explanation: Ada Lovelace, an English mathematician, wrote the first algorithm
intended to be processed by a machine, Charles Babbage's Analytical Engine.

Part 7: Hardware (Continued)

91. Which port provides high-definition video and audio through a single cable? (A)
VGA (B) USB (C) Ethernet (D) HDMI Answer: (D) HDMI Explanation: HDMI
(High-Definition Multimedia Interface) is a modern standard for connecting
high-definition video devices like monitors, projectors, and TVs.

92. A light-sensitive device that reads printed text and graphics and translates the
results into a digital form is a ______. (A) Printer (B) Plotter (C) Scanner (D) OMR
Answer: (C) Scanner Explanation: A scanner is an input device that captures images
from photographic prints, posters, and documents for computer editing and display.
93. Which type of printer works by spraying tiny droplets of ink onto paper? (A) Laser
Printer (B) Inkjet Printer (C) Dot Matrix Printer (D) Thermal Printer Answer: (B) Inkjet
Printer Explanation: An inkjet printer creates a digital image by propelling droplets of
ink onto paper. Laser printers use toner and heat.

94. What is the purpose of cache memory? (A) To store data permanently (B) To act as
a temporary high-speed holding area between the CPU and RAM (C) To store the
operating system (D) To provide backup power Answer: (B) To act as a temporary
high-speed holding area between the CPU and RAM Explanation: Cache memory is a
smaller, faster memory closer to the CPU that stores copies of frequently used data
from the main memory (RAM) to reduce access time.

95. The physical components of a computer system are known as ______. (A)
Software (B) Hardware (C) Firmware (D) Liveware Answer: (B) Hardware Explanation:
Hardware refers to all the tangible, physical parts of a computer, such as the CPU,
monitor, keyboard, and mouse.

96. A joystick is primarily used for ______. (A) Printing text (B) Entering data (C)
Computer gaming (D) Scanning images Answer: (C) Computer gaming Explanation: A
joystick is an input device consisting of a stick that pivots on a base and reports its
angle or direction to the device it is controlling, commonly used for flight simulators
and games.

97. What does 'OMR' stand for? (A) Optical Mark Recognition (B) Original Mark Reader
(C) Optical Media Reader (D) Output Mark Recognition Answer: (A) Optical Mark
Recognition Explanation: OMR is the process of capturing human-marked data from
document forms such as surveys and tests, commonly used for grading
multiple-choice examination answer sheets.

98. What unit powers all the other components inside the computer case? (A) CPU (B)
Motherboard (C) Power Supply Unit (PSU) (D) RAM Answer: (C) Power Supply Unit
(PSU) Explanation: The PSU is responsible for converting the AC power from a wall
outlet into the stable DC power required by the computer's internal components.

99. Which of the following is NOT a form of secondary storage? (A) Hard Disk (B) RAM
(C) SSD (D) CD-ROM Answer: (B) RAM Explanation: RAM (Random Access Memory) is
primary storage, which is volatile and directly accessible by the CPU. Secondary
storage (like hard disks and SSDs) is non-volatile and used for long-term data
storage.

100. The number of function keys on a standard PC keyboard is ______. (A) 10 (B) 12
(C) 14 (D) 16 Answer: (B) 12 Explanation: A standard keyboard has 12 function keys
(F1 to F12) at the top, each with a specific function that can differ depending on the
active program.

Part 8: Software & Operating Systems (Continued)


101. Software that you can use for a trial period before paying for it is called ______.
(A) Freeware (B) Open Source (C) Shareware (D) Firmware Answer: (C) Shareware
Explanation: Shareware is software that is distributed free on a trial basis with the
understanding that the user may need to pay for it later for continued use.

102. What is the process of arranging files in a structured way on a disk called? (A)
Defragmentation (B) Formatting (C) Compression (D) Installation Answer: (B)
Formatting Explanation: Formatting prepares a storage medium, such as a hard disk
drive or USB flash drive, for initial use by setting up an empty file system. It erases all
existing data.

103. Which operating system feature allows you to run multiple programs at the same
time? (A) Multitasking (B) Multithreading (C) Multiprocessing (D) Multi-user Answer:
(A) Multitasking Explanation: Multitasking is the ability of an operating system to
execute more than one program or task simultaneously, sharing the CPU's time
among them.

104. What is the core of an operating system called? (A) Shell (B) Kernel (C) Driver (D)
API Answer: (B) Kernel Explanation: The kernel is the central component of an OS
that manages the system's resources and the communication between hardware and
software.

105. What is the purpose of disk defragmentation? (A) To erase all data from a disk (B)
To compress files to save space (C) To rearrange fragmented data so related pieces
are put back together (D) To scan the disk for viruses Answer: (C) To rearrange
fragmented data so related pieces are put back together Explanation:
Defragmentation reduces file system fragmentation, organizing the contents of the
disk to store the pieces of each file close together and contiguously, which can
improve performance.

106. In Windows, where can you access settings for managing hardware, software,
users, and system settings? (A) My Computer (B) Recycle Bin (C) Taskbar (D) Control
Panel Answer: (D) Control Panel Explanation: The Control Panel (or the 'Settings' app
in modern Windows) is a centralized location for managing and configuring the
computer's operating system.

107. A '.zip' file represents a(n) ______. (A) Executable file (B) System file (C)
Compressed or archived file (D) Image file Answer: (C) Compressed or archived file
Explanation: A ZIP file is an archive file format that supports lossless data
compression. It may contain one or more files or directories that have been
compressed.

108. Which of these is system software? (A) A web browser (B) A word processor (C)
A device driver (D) A photo editor Answer: (C) A device driver Explanation: System
software is designed to operate and control the computer hardware directly. Device
drivers are a key example, enabling communication between the OS and a hardware
device. The others are application software.
109. What is a "path" in a file system? (A) The physical location of the hard drive (B) A
sequence of folders leading to a specific file or folder (C) A shortcut to a file (D) The
file extension Answer: (B) A sequence of folders leading to a specific file or folder
Explanation: A file path, like C:\Users\Documents\report.docx, specifies the
unique location of a file or directory in a file system.

110. 'Android' is an example of a(n) ______. (A) Mobile Operating System (B) Web
Browser (C) Application Software (D) Hardware Component Answer: (A) Mobile
Operating System Explanation: Android is a popular open-source operating system
designed primarily for touchscreen mobile devices such as smartphones and tablets.

Part 9: MS Office (Word, Excel, PowerPoint) (Continued)

111. In MS Word, what does the 'Ruler' help with? (A) Drawing straight lines (B)
Measuring the screen size (C) Setting tabs, indents, and margins (D) Checking
spelling Answer: (C) Setting tabs, indents, and margins Explanation: The Ruler
provides a visual guide for aligning text, graphics, tables, and other elements in a
document.

112. Which view in MS PowerPoint is best for editing and designing individual slides?
(A) Slide Sorter View (B) Normal View (C) Reading View (D) Slide Show View Answer:
(B) Normal View Explanation: Normal View is the main editing view, where you can
write and design your presentations. It typically shows the slide pane, the notes pane,
and the slide thumbnails.

113. In MS Excel, the function VLOOKUP is used to ______. (A) Look up a value
vertically in a column (B) Calculate the variance of a dataset (C) Look up a value
horizontally in a row (D) Validate cell data Answer: (A) Look up a value vertically in a
column Explanation: VLOOKUP (Vertical Lookup) is a powerful function used to find
things in a table or a range by row. HLOOKUP is used for horizontal lookups.

114. What feature in MS Word allows you to create a formatted list of headings and
their page numbers? (A) Index (B) Bibliography (C) Table of Contents (D) Footnote
Answer: (C) Table of Contents Explanation: The Table of Contents feature
automatically generates a list of the headings in your document and the page
numbers they appear on, making navigation easier.

115. To combine two or more cells into a single cell in MS Excel, you use the ______
command. (A) Join Cells (B) Merge & Center (C) Combine Cells (D) Format Painter
Answer: (B) Merge & Center Explanation: The Merge & Center command combines the
selected adjacent cells into one larger cell and centers the contents in the new cell.

116. In MS PowerPoint, what is the 'Slide Master' used for? (A) To be the first slide in
the presentation (B) To apply a consistent design and layout across multiple slides
(C) To create a master copy for backup (D) To run the slide show Answer: (B) To apply
a consistent design and layout across multiple slides Explanation: The Slide Master
controls the overall theme and layout of your presentation. Changes made to the Slide
Master (like fonts, logos, or backgrounds) will affect all slides that use that master.

117. What is the shortcut key to insert a new slide in a PowerPoint presentation? (A)
Ctrl + N (B) Ctrl + S (C) Ctrl + M (D) Ctrl + D Answer: (C) Ctrl + M Explanation: Ctrl + M
inserts a new blank slide after the currently selected slide. Ctrl + N creates a new
presentation file.

118. In MS Word, what is the purpose of a 'Header' and 'Footer'? (A) To add titles to
the document (B) To place information like page numbers or document titles at the
top and bottom of every page (C) To create a cover page (D) To format paragraphs
Answer: (B) To place information like page numbers or document titles at the top and
bottom of every page Explanation: The Header is a section at the top margin of each
page, and the Footer is at the bottom. They are used for repetitive information.

119. In MS Excel, what does the '$' symbol do in a cell address (e.g., $A$1)? (A) It
formats the number as currency (B) It creates an absolute (locked) cell reference (C) It
indicates an error in the formula (D) It makes the text bold Answer: (B) It creates an
absolute (locked) cell reference Explanation: The dollar sign ($) creates an absolute
reference, which means the row and/or column reference will not change when you
copy the formula to another cell.

120. Which feature in MS Word corrects common spelling errors as you type? (A)
Thesaurus (B) Spell Check (C) AutoCorrect (D) Find and Replace Answer: (C)
AutoCorrect Explanation: AutoCorrect automatically fixes common typos (like "teh"
to "the") and capitalization errors without user intervention.

121. The shortcut to 'Print' a document in MS Office is ______. (A) Ctrl + P (B) Ctrl + B
(C) Ctrl + S (D) Ctrl + X Answer: (A) Ctrl + P Explanation: Ctrl + P opens the Print
dialog box, allowing you to select a printer and configure print settings.

122. In MS Excel, which feature allows you to quickly fill a series of data (e.g.,
numbers, days, months)? (A) Data Validation (B) AutoSum (C) Fill Handle (D)
Conditional Formatting Answer: (C) Fill Handle Explanation: The Fill Handle is the
small square in the lower-right corner of a selected cell that you can drag to copy cell
contents or complete a series.

123. The 'Animation' feature in MS PowerPoint applies movement to ______. (A) The
entire slide (B) The transition between slides (C) Text and objects within a slide (D)
The speaker notes Answer: (C) Text and objects within a slide Explanation: Animation
adds visual effects to individual elements like text, images, or shapes on a slide,
whereas 'Transitions' apply to the movement from one slide to the next.

124. What is the shortcut for 'Find and Replace' in MS Word? (A) Ctrl + F (B) Ctrl + H
(C) Ctrl + R (D) Ctrl + G Answer: (B) Ctrl + H Explanation: Ctrl + H opens the 'Find and
Replace' dialog box. Ctrl + F just opens the 'Find' navigation pane.

125. Which function in MS Excel would you use to find the smallest number in a range
of cells? (A) SMALL() (B) MIN() (C) LEAST() (D) LOWER() Answer: (B) MIN()
Explanation: The MIN() function returns the smallest value in a set of values. For
example, =MIN(A1:A10) finds the lowest number in that range.

Part 10: Internet, Networking & Security (Continued)

126. What does 'MAC address' stand for? (A) Media Access Control (B) Master Access
Connection (C) Machine Address Code (D) Memory Access Controller Answer: (A)
Media Access Control Explanation: A MAC address is a unique hardware identifier
assigned to a network interface controller (NIC) for use as a network address in
communications within a network segment.

127. Which network topology requires a central controller or hub? (A) Bus Topology
(B) Ring Topology (C) Star Topology (D) Mesh Topology Answer: (C) Star Topology
Explanation: In a star topology, all devices are connected to a central hub or switch.
All traffic passes through the central device.
Licensed by Google

128. The standard file extension for a web page is ______. (A) .doc (B) .pdf (C) .html or
.htm (D) .exe Answer: (C) .html or .htm Explanation: HTML (HyperText Markup
Language) is the standard markup language for creating web pages, so files have a
.html or .htm extension.

129. A person who gains unauthorized access to a computer system is known as a


______. (A) Programmer (B) User (C) Hacker (D) System Administrator Answer: (C)
Hacker Explanation: A hacker is an individual who uses their computer, networking,
or other skills to overcome a technical problem, but the term is most often used to
describe someone who engages in unauthorized access.

130. What is 'ransomware'? (A) A type of freeware (B) A type of malware that encrypts
a victim's files and demands payment to restore access (C) A security program (D) A
hardware device Answer: (B) A type of malware that encrypts a victim's files and
demands payment to restore access Explanation: Ransomware is a malicious
software that holds a user's data hostage until a ransom is paid, typically in
cryptocurrency.

131. What is the function of a router in a network? (A) To connect multiple devices on
the same local network (B) To connect different networks together and forward
packets between them (C) To convert digital signals to analog (D) To provide wireless
connectivity Answer: (B) To connect different networks together and forward packets
between them Explanation: A router is a networking device that directs data packets
between computer networks. Routers perform the traffic directing functions on the
Internet.

132. The 'S' in HTTPS stands for ______. (A) System (B) Secure (C) Server (D) Service
Answer: (B) Secure Explanation: The 'S' stands for Secure. HTTPS uses an encryption
protocol (SSL/TLS) to encrypt communications, making it secure for transmitting
sensitive information.

133. Which of the following is a physical transmission medium for networks? (A) Wi-Fi
(B) Bluetooth (C) Twisted-pair cable (D) Satellite Answer: (C) Twisted-pair cable
Explanation: Twisted-pair cable (like Ethernet cable) is a physical, wired medium.
Wi-Fi, Bluetooth, and satellite are examples of wireless (unguided) transmission
media.

134. What is a 'digital signature'? (A) A scanned image of a person's signature (B) A
password to access a document (C) A mathematical scheme for verifying the
authenticity of digital messages or documents (D) Your email signature block Answer:
(C) A mathematical scheme for verifying the authenticity of digital messages or
documents Explanation: A digital signature provides a high level of security for online
communication, ensuring that a message was sent by the claimed sender
(authentication) and was not altered in transit (integrity).

135. What does FTP stand for? (A) File Transfer Protocol (B) Fast Transfer Process (C)
File Transmission Protocol (D) Folder Transfer Program Answer: (A) File Transfer
Protocol Explanation: FTP is a standard network protocol used for the transfer of
computer files between a client and server on a computer network.

136. A unique name that identifies a website is its ______. (A) IP Address (B) URL (C)
Domain Name (D) Hyperlink Answer: (C) Domain Name Explanation: A Domain Name
(e.g., google.com) is the human-friendly address for a website. The DNS translates
this name into a machine-readable IP address.

137. Which of these is NOT a good practice for computer security? (A) Using a firewall
(B) Installing antivirus software (C) Using the same password for all accounts (D)
Regularly updating your software Answer: (C) Using the same password for all
accounts Explanation: Using the same password everywhere is very risky. If one
account is compromised, attackers can gain access to all your other accounts that
use the same password.

138. The service that allows you to make voice calls over the internet is called ______.
(A) IPTV (B) VoIP (C) VPN (D) FTP Answer: (B) VoIP Explanation: VoIP (Voice over
Internet Protocol) is a technology that allows you to make voice calls using a
broadband Internet connection instead of a regular phone line.

139. A 'CAPTCHA' is primarily used to ______. (A) Encrypt data (B) Verify that the user
is a human and not a bot (C) Scan for viruses (D) Speed up website loading Answer:
(B) Verify that the user is a human and not a bot Explanation: CAPTCHA (Completely
Automated Public Turing test to tell Computers and Humans Apart) presents
challenges that are easy for humans to solve but difficult for automated programs
(bots).

140. What is a VPN used for? (A) To increase internet speed (B) To create a secure,
encrypted connection over a public network (C) To block advertisements (D) To create
websites Answer: (B) To create a secure, encrypted connection over a public network
Explanation: A VPN (Virtual Private Network) extends a private network across a
public network (like the Internet), enabling users to send and receive data as if their
devices were directly connected to the private network, enhancing security and
privacy.

You might also like