400+ Computer Fundamentals Questions And Answers

Basic Computer Fundamentals Questions and Answers- Are you looking for computer fundamentals MCQ for competitive examination? Are you searching for computer fundamentals questions and answers pdf? then you are in the perfect place. Here I will give you a list of questions and answers related to computer fundamentals. 

It is quite necessary to know something about computers. Because it is one of the basic aspects of any competitive examination. Competitive examination like Civil Service, Railways, Banking, Teaching Examination must have at least 10 questions in their paper.

Here you will get computer fundamentals notes pdf and we have also a great collection of important full form lists for computers.

400+ Computer Fundamentals Questions And Answers

Computer Fundamentals Questions and Answer PDF

Computer fundamentals have always been an important aspect of any teaching examination like KVS, NVS, DSSSB, State TETs, etc. 

Here you will get computer fundamentals questions to answer pdf in English and Hindi. 

Computer Fundamentals Questions and Answers


1.        The most important part of an information system is:

A.       People
B.       Hardware
C.        Software
D.       Data

2.        Which of The following are microcomputers?

A.       Notebook, Handheld devices, IBM AS 400
B.       PDA, Laptops, Desktop PC
C.        Desktop PC, PDA, Packard Bell PB 250
D.       Notebook, Packard Bell 250

3.        Which type of computer is Cray T90?

A.       Minicomputer
B.       Microcomputer
C.        Supercomputer
D.       Mainframe

4.        An example of an Optical Storage device is:

A.       Magnetic Tapes
B.       USB Disk
C.        Floppy Disk
D.       DVD

5.        Which of the following is an example of an Operating System?
A.       MS-DOS
B.       MS Access
C.        Spreadsheets
D.       Photoshop

6.        Which of the following is part of the system unit?

A.       Monitor
B.       Motherboard
C.        Keyboard
D.       None of the above

7.        The four common types of files are documents files, presentation files, worksheet files and:
A.       Program files

B.       Database files
C.        System files
D.       Digital files

8.        What unit of storage is used to represent 109 bytes?
A.       Kilobyte
B.       Terabyte
C.        Megabyte
D.       Gigabyte

9.        Mail Merge is used to:

A.       Merge two files together to create one
B.       Generate several copies of a document with varying fields
C.        All of the above
D.       None of the above
a.        Fourth Generation

Computer Fundamentals Notes PDF

A.       the operating system
B.       application programs
C.        the data being processed by the application programs
D.       all of the above

11.     The processor’s ______________ controls the timing of all the computer operations.

A.       system clock

B.       register
C.        machine cycle
D.       arithmetic logic unit (ALU)

12.     The number of bits the processor can transmit at a given time is called:
A.       Bus width
B.       Word size
C.        Access time
D.       Channel speed

13.     A _____________ is a blank ROM that can be programmed once only.
A.       EPROM

B.       EEPROM
C.        Flash ROM
D.       PROM

14.     A ______________ port connects a device to the system unit by transferring data 1 bit at a time

A.       Parallel

B.       Serial
C.        USB
D.       FireWire

15.     The bit is short for:

A.       Binary system

B.       Digital byte
C.        binary unit
D.       binary digit

16.     The ______________ interprets each instruction issued by a program and then initiates the appropriate action to carry out the instruction.

A.       arithmetic logic unit (ALU)

B.       control unit
C.        system unit
D.       memory

17.     Computer processor chips are sometimes referred to as:

A.       sockets

B.       heat sinks
C.        bits
D.       microprocessor

Computer Fundamentals MCQ PDF

18.     To be able to open several applications or to allow large programs to run in a system with limited memory, ________________ is used.
A.       Cache memory

B.       Virtual memory
C.        Flash memory
D.       All of the above

19.     The number of bits that can be processed at one time is a:
A.       byte

B.       cycle
C.        register
D.       word

20.     The most widely used local bus is:

A.       PCI

B.       ISA
C.        MCA
D.       PCMCIA

21.     The type of bus that consists of a group of 16 lines and it is bidirectional is:
A.       Address bus

B.       Control bus
C.        Message bus
D.       Data bus

22.     During I-time, the ALU:

A.       Examines instructions

B.       Executes instructions
C.        Wait for instructions
D.       Sends output

23.     The program counter:

A.       holds the current instruction to be executed

B.       holds the address of the current data
C.        holds data waiting to be processed, and results of processing
D.       holds the location in memory of the next instruction/data

24.     The indentations on CDs and DVDs are called:

A.       lands

B.       pits
C.        clusters
D.       tracks

25.     Which of the following statements is true?

A.       The digitizing tablet is an input device

B.       The light pen is not an input device
C.        The mouse is an output device
D.       The monitor is not an output device.

26.     Which printer prints by spraying ink at the paper?

A.       Laser printer

B.       Dot-matrix printer
C.        Ink-Jet printer
D.       Line printer

27.     The screen size of a CRT is measured.

A.       Vertically

B.       Horizontally
C.        Vertically and Horizontally
D.       Diagonally

28.     Voice recognition is also called:

A.       Optical character recognition

B.       Speech recognition
C.        Sound recognition
D.       Continuous speech

29.     Using a (n) ___________________ reduces the risk of wrist and hand injuries.

A.       Ergonomic keyboard

B.       Cordless keyboard
C.        QWERTY keyboard
D.       Portable keyboard

30.     Blind users can work with _____________ instead of using a monitor?

A.       Text output

B.       Graphics output
C.        Video output
D.       Audio output

31.     The light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process is called a(n):

A.       Optical reader
B.       Bar code scanner
C.        Optical scanner
D.       Data collection device

32.     Mobile computers have _______________ displays.

A.       CRT

B.       Gas plasma
C.        HDTV
D.       LCD

33.     The input may be in the following forms:

A.       OCR, MICR, and CPU

B.       OMR, VGA, and OCR
C.        OCR, MICR and OMR
D.       VGA, SVGA, and XVGA

34.     Which of the following printer prints one character at a time?

A.       Line printer

B.       Inkjet printer
C.        Alphabetic printer
D.       Dot-matrix printer

35.     Mass produced, copyrighted software that meets the needs of a variety of users is called:

A.       Custom software

B.       Ready-made software
C.        Freeware
D.       Shareware

36.     The columns in a database are called:

A.       cells

B.       fields
C.        records
D.       queries

Computer Fundamentals MCQ PDF Download

37.     The type of education in which students learn by using and completing exercises with instructional software is called:

A.       Computer-based training (CBT)

B.       Distance learning
C.        Web-based training (WBT)
D.       Computer-aided graphics

38.     You must instruct the ____________________ to start the application software.
A.       utility program

B.       memory
C.        operating system
D.       processor

39.     Symbian OS is an example of an operating system that is used in:
A.       Mainframes

B.       Supercomputers
C.        Handheld computers
D.       Desktop computers

40.     A ________________ is part of a program in execution.

A.       process

B.       data
C.        source code
D.       utility

41.     A graphical user interface (GUI):

A.       is character-based and does not use any graphics.
B.       gives the ability to create other software.
C.        allows users to interact with the computer using graphic images.
D.       all of the above

42.     MS Word 2002 can be considered as:

A.       An operating system

B.       A web-based software
C.        An education software
D.       A productivity software

43.     Which of the following is true?

A.       The bootstrap loader resides in the RAM

B.       The bootstrap loader locate and execute the kernel
C.        The bootstrap is executed when the system is shut down
D.       The bootstrap is a virus that attacks the operating system

44.     Transmission of data can be:

A.       Analogue

B.       Digital
C.        Synchronous
D.       All of the above

45.     A modem does the following:

A.       Convert digital data to analog before sending data
B.       Convert digital data to analog when receiving data
C.        Convert analog data to digital before sending data
D.       All of the above

Computer Questions and Answers For Competitive Exams

46.     Which media makes use of light for data transmission?

A.       Twisted Pair

B.       Coaxial
C.        Fiber optics
D.       All of the above

47.     Data travel in only one direction through the nodes in a:

A.       Ring network

B.       Star network
C.        Bus network
D.       None of the above

48.     A node can be:

A.       a server

B.       a workstation
C.        a printer
D.       all of the above

49.     Which of the following is true?

A.       Fiber optics is less reliable than twisted pair cable
B.       Fiber optics has less reliable than coaxial cable

C.        Fiber optics is immune to electrical noise
D.       All of the above

50.     Which of the following lists the different type of networks in ascending geographical area?

A.       LAN, WAN, MAN

B.       WAN, LAN, MAN
C.        MAN, LAN, WAN
D.       LAN, MAN, WAN

51.     Protocols:

A.       define techniques for encoding and decoding data
B.       can define a mechanism for detecting and recovering from transmission errors
C.        are set of rules defining the format of data for communication
D.       All of the above

52.     The Internet uses the following protocol:

A.       TCP/IP

B.       IPX/SPX
C.        UDP/IP
D.       TCP/UDP

53.     Internet users connect to the _____________ of the desired ISP.
A.       hard disk

B.       gateway
C.        RAM
D.       ROM

54.     With _____________, standard telephone line is used to connect to the Internet.

A.       VDSL

B.       Dial-up access
C.        ISDN
D.       Cable television Internet services

55.     The jargon for navigating on the Internet is called:

A.       clicking

B.       selecting
C.        surfing
D. analyzing

56.     Electrical interferences that can distort data during transmission are called:
A.       virus

B.       trojan
C.        noise
D.       modulation

57.     The process of a computer receiving information from a server on the Internet is known as:

A.       downloading

B.       pulling
C.        transferring
D.       uploading

58.     In order to view pages on a web site, the user needs to enter the site address called:

A.       Uniform resource locator

B.       Email address
C.        Postal address
D.       MAC address

Computer Fundamental Questions For Banking PDF

59.     The most popular Web browsers for personal computers are Microsoft Internet Explorer, Netscape, and _____________.

A.       Opera

B.       Dreamweaver
C.        QuickTime player
D.       Real Player

60.     Circuit switching:

A.       creates a direct physical circuit between 2 switches
B.       creates a direct physical connection between 2 devices
C.        creates a direct physical switch between 2 circuits
D.       creates a direct physical connection between a circuit and a switch

61.     In a packet-switched network, the data units are called:

A.       block

B.       bit
C.        packets
D.       switches

62.     In a peer to peer network:

A.       all computers have different services

B.       all computers have equal rights
C.        computers have different operating systems
D.       user authentication is done remotely

63.     A client-server architecture can be:

A. centralized

B. decentralized
C.        distributed
D.       all of the above

64.     Banking a system with a single server is an example of:

A.       centralized network

B.       decentralized network
C.        distributed network
D.       peer to peer network

65.     A server program:

A.       should run all the time

B.       should run only when needed
C.        both A and B above
D.       none of the above

66.     A ____________________ is a mechanism which will look for information on different web sites and databases distributed all over the Internet.

A.       web server

B.       browser
C.        trojan
D.       search engine

67.     A browser:

A.       software to browse a source code

B.       antivirus software
C.        software that enables internet users to view web pages
D.       security software

68.     The most common graphics formats on the Web are GIF and _____________.

A.       BMP

B.       JPEG
C.        TIFF
D.       PNG

69.     HTML stands for:

A.       HyperText Make up Language

B.       Hyper Terminal Mark up Language
C.        HyperText Mark up Language
D.       Higher Text Mark up Language

70.     An HTML file has which type of extension?

A.       XML

B.       HTML
C.        txt
D.       hl

71.     Which of the following is not true about an HTML file?
A.       It can be written in a text editor

B.       It is supported by Internet Explorer
C.        It is supported by Netscape Navigator
D.       The tags are case sensitive

Computer Fundamentals Book PDF

72.     Which of the following is not a valid HTML tag?

A.       <P>

B.       </H1>
C.        <Z>
D.       </A>

73.     What character entity code needs to be used in the HTML source to display a less than (<) sign on the browser?

A.       &gt;

B.       &less;
C.        &lt;
D.       &amp;

74.     What tag is needed to create a link in HTML?

A.       Anchor tag

B.       Navigation tag
C.        Linkage tag
D.       Move tag

75.     Which of the following is true?

A.       Frames are independent of each other

B.       Frames depend heavily on each other
C.        Frames are used to convert web pages to
D.       Frames cannot contain HTML documents

76.     What is the correct HTML for inserting an image?

A.       <img href=”image.png”>

B.       <img load=”image.png”>
C.        <img src=“image.png”>
D.       <img content=”image.png”/>

77.     What is the HTML tag for listing items in a list?

A.       <OL></OL>

B.       <UL></UL>
C.        <LIST></LIST>
D.       <LI>

78.     Which statement is false about the benefits of EDI trading?
A.       It provides faster trading cycle

B.       It reduces security and accuracy
C.        It reduces delivery times for overseas trade
D.       It reduces the cost of paper, postage, and manpower.

79.     A knowledge-based system that simulates human reasoning is known as:

A.       computer system

B.       database system
C.        expert system
D.       Intelsat system

80.     A 4GL is a tool used to:

A.       build a software application

B.       repair computer failures
C.        learn software programs
D.       retrieve back loss data

81.     PC packages can be dynamically linked by what is called:

A.       OCR

B.       ODE
C.        OLE
D.       OMR

82.     A textual image is converted into editable text using an:
A.       OCR

B.       ODE
C.        OLE
D.       OMR

83.     An application of voice and vision technology is in:

A.       Database system

B.       Photoshop
C.        Video conferencing
D.       none of the above

Computer Fundamentals MCQ for Competitive Exams

84.     Which of the following refers to the transmission and receipt of regular documentation such as invoices, purchase orders and credit?
A.       CBT

B.       EDI
C.        ICT
D.       ACCPAC

85.     In order to protect computer systems from viruses we use _______________ software.

A.       antivirus

B.       antiworm
C.        application
D.       firewall

86.     A _____________ is a type of virus that neither replicates nor copies itself to anything.

A.       Shell

B.       Trojan
C.        Worm
D.       None of the above

87.     ________________ methods are also used to protect data and password privacy.

A.       Encryption

B.       Firewall
C.        NAT
D.       DMZ

88.     Which of the following is not a choice on the content advisor’s list of configurable options?

A.       Language

B.       Brutality
C.        Nudity
D.       Violence

89.     Which of the following represents a category of viruses?

A.       File Infectors

B.       Boot record infectors
C.        Macro viruses
D.       All of the above

90.     PGP stands for:

A.       Private Good Privacy

B.       Public Gone Private
C.        Pretty Good Privacy
D.       Process Gone Private

91.     Which of the following is a malicious threat?

A.       Hackers trying to flood a mail server with emails to freeze the service
B.       Injection of queries in the login text box to retrieve user password
C.        Cracking of database passwords
D.       All of the above

92.     Which of the following is not true about a firewall?

A.       A firewall can be both hardware and software
B.       A firewall protects only against external threats
C.        An antivirus the software can be part of a firewall
D.       A firewall protects only against internal threats

93.     ____________________ is an encryption algorithm that encrypts and decrypts e-mail and files over the Internet.

A.       PGP

B.       NAT
C.        DMZ
D.       SET

94.     Mc   Afee   is   an   example   of   common

___________________ software.

A.       coffee

B.       firewall
C.        antivirus
D.       none of the above

95.     A feasibility study is conducted to

A.       check the viability of the project

B.       identify the user’s requirements
C.        support computerization of the project
D.       respond to user queries

96.     The following is NOT a stage of the SDLC

A.       system testing

B.       feasibility study
C.        sustaining study
D.       system design

97.     System testing is usually done

A.       during design

B.       during analysis
C.        during coding
D.       after coding

98.     The FS report refers to

A.       financial support

B.       feasibility specification
C.        functional specification
D.       none of the above

99.     Monitoring the use of hardware, software and personnel resources in the IS dept is known as
A.       operating system

B.       operation management
C.        management information system
D.       all of the above

100.  Software development life cycle is

A.       the life-time of a software

B.       stages of software development
C.        when a software is removed
D.       none of the above


1.        A _________________ is a set of electronic instructions that tells the computer how to perform certain tasks.

2.        One way to speed up a computer is to increase the amount of _____________.

3.        When you turn your computer on, it first loads the

_______________ program.

4.       The memory installed between the CPU and RAM to improve performance is called the ______________

5.        The two types of microprocessor design are

_________________ and _______________.

6.        ___________________ contains instructions for booting up the computer and it is non-volatile.

7.        ___________________ produces excellent graphics and good quality output but is slower than laser printer.

8.        The rate at which a CRT refresh is known as the

___________________ rate.

9.        The ___________________ is an input device that can be used to read characters made of magnetic particles.

10.     MS DOS is a ___________________ operating system, since it cannot execute several jobs simultaneously.

11.     The act of taking control of the operating system from one task and giving it to another task is called


12.     ___________________ is the range of frequencies that a communication media can carry.

13.     A ___________________ depicts the physical layouts of a network.

14.     ___________________ converts web pages into a format for mobile services.

15.     In packet switched network, packets contain data, a header, control information, source and


16.     The ___________________ tag creates breaks within the structure of the text.

17.     The web the page which is first displayed when a user is connected to a website is the


18.     ___________________ refers to packages for advanced text manipulation.

19.     ________________ can be used to diagnose people.

20.     Telephone, equipped with cameras, enables images to be transmitted thereby enabling

21.     ___________________ is a device that translates IP addresses used within one network into different IP addresses are known to another network.

22.     ___________________ resides in the memory of the systems that they infect and repeatedly replicate themselves.

23.     ___________________ refers to additional computer system infrastructure provided in a different location for resuming business activities in case of natural catastrophe.

24.     Implementation/coding and ___________________

normally go in parallel.

 400+ Computer Fundamentals Questions And Answers

400+ Computer Fundamentals Questions And Answers

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “The Input Unit”.

1.   Which unit is responsible for converting the data received from the user into computer understandable format?

a) Memory Unit

b) Arithmetic & Logic Unit c) Input Unit

d) Output Unit


Answer: c

Explanation: The Input Unit converts the data, which the user enters into a language that the computer understands, i.e. it converts the data into binary format. The Output Unit is responsible for giving the results in a user-understandable format. The Storage Unit is responsible for storing the data after immediate results of processing whereas; the ALU is responsible for various arithmetic and bitwise operations.

2.    The only language which the computer understands is ______________

a) Assembly Language b) Binary Language c) BASIC

d) C Language


Answer: b

Explanation: The Computer understands only binary language which is written in the form of 0s & 1s. A computer can understand assembly language but an assembler is required which converts the assembly language to binary language. Similarly, for understanding high-level languages, compilers/interpreters are required.

1.      The term ‘Computer’ is derived from..........

b.  German
c. French
d. Arabic
Who is the inventor of the “Difference Engine”?

Allen Turing
b.  Charles Babbage
c.  Simur Cray
d. Augusta Adaming
Who is the father of the Computer?

Allen Turing
b.  Charles Babbage
c.  Simur Cray
d.  Augusta Adaming
Who is the father of Computer science?

Allen Turing
b. Charles Babbage
c.  Simur Cray
d.  Augusta Adaming
Who is the father of a personal computer?

Edward Robert
b.  Allen Turing
c.  Charles Babbage d.  None of these
A CPU contains

a.  a card reader and a printing device
b. an analytical engine and a control unit

a control unit and an arithmetic logic unit
d. an arithmetic logic unit and a card reader

7.      Which of the following controls the process of interaction between the user and the operating system?

User interface
b. Language translator

d. Screen saver

8.  The first computers were programmed using

assembly language
b. machine language

source coded
.  object code

..........is a combination of hardware and software that facilitates the sharing of information

between computing devices.

b. peripheral
c. expansion board
d. digital device
Coded entries which are used to gain access to a computer system are called

Entry codes
b. Passwords
c. Security commands
d. Code words

11.  Which of the following statements are true?

a.      Minicomputer works faster than Microcomputer

b.      Microcomputer works faster than Minicomputer

c.      Speed of both computers is the same

d.     The speeds of both these computers cannot be compared with the speed of advanced

12.  You organize files by storing them in

b. folders
c.  indexes
d. lists
What type of resource is most likely to be a shared common resource in a computer


b. Speakers
c. Floppy disk drives
d.  Keyboards
Which device is required for the Internet connection?

b.  Modem
c.  CD Drive
d.  NIC Card
What is a light pen?

a. A Mechanical Input device
b.  Optical input device

c.  Electronic input device
d.  Optical output device
16. UNIVAC is

a. Universal Automatic Computer
b. Universal Array Computer

c. Unique Automatic Computer
d. Unvalued Automatic Computer
CD-ROM stands for

a. Compactable Read Only Memory
b. Compact Data Read Only Memory

c. Compactable Disk Read Only Memory
d. Compact Disk Read Only Memory
ALU is

a. Arithmetic Logic Unit
b.  Array Logic Unit

c. Application Logic Unit
d.  None of above

VGA is

a. Video Graphics Array
b. Visual Graphics Array

c. Volatile Graphics Array
d.  Video Graphics Adapter
IBM 1401 is

a. First Generation Computer
b. Second Generation Computer

c. Third Generation Computer
d . Fourth Generation Computer

21.    MSI stands for

a. Medium Scale Integrated Circuits c. Medium Scale Intelligent Circuit

22.  The capacity of 3.5 inch floppy disk is

a. 1.40 MB                        b. 1.44 GB

23.  WAN stands for

a.  Wap Area Network

c.  Wide Array Net

24.    MICR stands for

a.  Magnetic Ink Character Reader

c.  Magnetic Ink Cases Reader

25.  EBCDIC stands for

b. Medium System Integrated Circuits d. Medium System Intelligent Circuit

c. 1.40 GB                        d. 1.44 MB

b.  Wide Area Network

d.  Wireless Area Network

b.    Magnetic Ink Code Reader d. None

a. Extended Binary Coded Decimal Interchange Code

b. Extended Bit Code Decimal Interchange Code

c. Extended Bit Case Decimal Interchange Code

d. Extended Binary Case Decimal Interchange Code
Which of the following is a part of the Central Processing Unit?

b.  Key board

d. Arithmetic & Logic unit
CAD stands for

Computer aided design
b.  Computer algorithm for design

c.  Computer application in design
d.  Computer analogue design
Junk e-mail is also called

b.  spoof

sniffer script
d.  spool

29.  Hackers

a.       all have the same motive

b.        break into other people's computers

c.         may legally break into computers as long as they do not do any damage

d.        are people who are allergic to computers

30.    What type of computers are client computers (most of the time) in a client-server system?

b.  Mini-computer

d.  PDA

31. A computer cannot 'boot' if it does not have the

b.  Loader

Operating System
d.  Assembler
Page 3

The amount of vertical space between lines of text in a document is called

b. line spacing
c. single space
d. vertical spacing
Example of non-numeric data is

Employee address
b. Examination score
c.  Bank balance
d.  All of these

34.  What is embedded system?

a.       The programme which arrives by being wrapped in box.

b.        The programme which is the permanent part of the computer

c.       The computer which is the part of a big computer

d.      The computer and software system that control the machine

35.  First page of Website is termed as-

a.   Homepage                                  b. Index                             c.   JAVA script             d.  Bookmark

36. . ..................... Is the appearance of typed characters?

a.   Size                                                b. Format                          c.  Point                              d.  Colour

37.  When a file is saved for the first time

a.      a copy is automatically printed

b.      it must be given a name to identify it

c.      it does not need a name

d.     it only needs a name if it is not going to be printed

38.  Office LANS, which are scattered geographically on large scale, can be connected by the use

of corporate

a.  CAN
b.  LAN

c.  DAN
d.  WAN
39. Where are data and programme stored when the processor uses them?

Main memory

b.  Secondary memory

c.  Disk memory

d.  Programme memory

40. . ...............
represents raw facts, where-as.................
is data made meaningful.
Information, reporting
b.  Data, information

Information, bits

d.  Records, bytes

41.  What characteristic of read-only memory (ROM) makes it useful?

a.      ROM information can be easily updated.

b.      Data in ROM is non-volatile, that is, it remains there even without electrical power.

c.      ROM provides very large amounts of inexpensive data storage.

d.     ROM chips are easily swapped between different brands of computers.

42.  What do you call the programs that are used to find out possible faults and their causes?

a.   operating system extensions                             b.  cookies

c.    diagnostic software                                             d.  boot diskettes

Which programming languages are classified as low level languages?


C, C++
Assembly languages
Which of the following is not anti- viruses’ software?

b.  F-Prot

c.  Oracle
d.  McAfee
Which device is required for the Internet connection?


CD Drive
d.  NIC Card
What does DMA stand for?

a.  A. Distinct Memory Access
b.  Direct Memory Access

Direct Module Access
d.  Direct Memory Allocation
Which of the following is a storage device?

b.  Hard Disk

Floppy Disk
d.  All of the above
When did John Napier develop logarithm?


A normal CD- ROM usually can store up to _________ _data?

680 KB
b. 680 Bytes

680 MB
d. 680 GB
MIS is designed to provide information needed for effective decision making by?

b. Workers

d.  Managers
What is a light pen?

Mechanical Input device
b.  Optical input device

Electronic input device
d.  Optical output device
BCD is

Binary Coded Decimal
b.  Bit Coded Decimal

Binary Coded Digit
d.  Bit Coded Digit

53.  ASCII stands for

a.       American Stable Code for International Interchange

b.      American Standard Case for Institutional Interchange

c.       American Standard Code for Information Interchange

d.      American Standard Code for Interchange Information

Which of the following is first generation of computer?

b.  IBM-1401
c.  CDC-1604
d. ICL-2900
Chief component of first generation computer was


b.  Vacuum Tubes and Valves

Integrated Circuits

d.  None of above

56. FORTRAN is

File Translation

b.  Format Translation

Formula Translation
d.  Floppy Translation

57.  EEPROM stands for

a.       Electrically Erasable Programmable Read Only Memory

b.      Easily Erasable Programmable Read Only Memory

c.       Electronic Erasable Programmable Read Only Memory

d.      None of the above

58.  Second Generation computers were developed during

1949 to 1955
b.  1956 to 1965

1965 to 1970
d. 1970 to 1990

The computer size was very large in

First Generation
b. Second Generation

Third Generation
d. Fourth Generation

Microprocessors as switching devices are for which generation computers

First Generation
b. Second Generation

Third Generation
d. Fourth Generation

Which of the following devices can be sued to directly image printed text?

a.  OCR
b.  OMR

d.  All of above

The output quality of a printer is measured by

Dot per inch
b.  Dot per sq. inch

c.   Dots printed per unit time
d.  All of above

In analogue computer

a.  Input is first converted to digital form
b.  Input is never converted to digital form

c.  Output is displayed in digital form
d.  All of above

In latest generation computers, the instructions are executed

Parallel only
b. Sequentially only

c.   Both sequentially and parallel
d. All of above

Who designed the first electronics computer – ENIAC?

b. Joseph M. Jacquard
Page 6

66.  Who invented the high level language “C”?

Dennis M. Ritchie
b.  Niklaus Writh

Seymour Papert
d.  Donald Kunth
Personnel who design, program, operate and maintain computer equipment refers to

b. Programmer

d. System Analyst
When did arch rivals IBM and Apple Computers Inc. decide to join hands?

b. 1984

d.  1991
Human beings are referred to as Homosapinens, which device is called Sillico Sapiens?

b.  Hardware

d. Computer
An error in software or hardware is called a bug. What is the alternative computer jargon for it?

b. Squid

d. Glitch
Modern Computer are very reliable but they are not

b. Powerful

d. Cheap

72.  What is the name of the display feature that highlights are of the the screen which requires operator attention?

a.   Pixel b.  Reverse video

c.   Touch screen d.  Cursor

73.  Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?

a.   Daughter board b. Motherboard

c.    Father board d.Breadboard

74.  In most IBM PCs, the CPU, the device drives, memory expansion slots and active components are mounted on a single board. What is the name of this board?

b. Breadboard
Daughter board
d. Grandmother board
75. What is meant by a dedicated computer?

Which is used by one person only
b.  Which is assigned one and only one task
Which uses one kind of software

d.  Which is meant for application software

The system unit of a personal computer typically contains all of the following except:
b. Disk controller
Serial interfaced
.  Modem
A a computer program that converts an entire program into machine language is called a/an
b. Simulator
d. Commander
A computer program that translates one program instructions at a time into machine language

is called a/an

b. CPU
d. Simulator
A small or intelligent device is so-called because it contains within it a

b. Microcomputer
d.  Sensor
A fault in a computer program which prevents it from working correctly is known as
b. Bug
d. Strap

81.  A self-replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is

a. Bug
b. Vice
c. Lice
d. Worm
A state. is a bi-stable electronic circuit that has

a. Multivibrator
b. Flip-flop
c. Logic gates
d. laten
Unwanted repetitious messages, such as unsolicited bulk e-mail is known as

a. Spam
b. Trash
c. Calibri
d. Courier
DOS stands for

a. Disk Operating System
b. Disk operating session

c. Digital Operating System
d. Digital Open system
Who is the chief of Microsoft

a. Babbage
b. Bill Gates
c. Bill Clinton
d. none of these
Which of the following are input devices?

a. Keyboard
b. Mouse
c. Card reader
d. Any of these
Examples of output devices are

a. Screen
b. Printer
c. Speaker
d. All of these
Which of the following is also known as the brain of the computer

a. Control unit

b. Central Processing unit

c. Arithmetic and language unit
d. Monitor

IBM stands for

a. Internal Business Management
b. International Business Management

c. International Business Machines
d. Internal Business Machines
90. ............ translates and executes a program at run timeline by line

a. Compiler

b. Interpreter

c. Linker

d. Loader
Page 8

91. is an OOP principle

a. Structured programming
b. Procedural programming

c. Inheritance

d. Linking

COBOL is widely used in application s

a. Commercial
b. Scientific
c. Space
d. Mathematical
RAM stands for

a. Random origin money
b. Random only memory

c. Read only memory

d. Random-access memory
1 Byte =?

a. 8 bits
b. 4 bits
c. 2 bits
d. 9 bits
SMPS stands for

a. Switched-mode Power Supply
b. Start mode power supply

c. Store mode power supply
d. Single-mode power supply
The a device used to carry digital data on analog lines is called as

a. Modem

b. Multiplexer

c. Modulator

d. Demodulator

VDU is also called

a. Screen
b. Monitor
c. Both 1 & 2
d. printer
BIOS stands for

a. Basic Input Output system
b. Binary Input output system

c. Basic Input Off system
d. all the above

99.    Father of “C‘ programming language

a. Dennis Ritchie b. Prof John Keenly c. Thomas Kurtz d. Bill Gates

100.                      The instructions that tell a computer how to carry out the processing tasks are referred to as computer.........

a.   programs b. processors c. input devices d. memory modules

100.                      The instructions that tell a computer how to carry out the processing tasks are referred to as computer.........

a.   programs b. processors c. input devices d. memory modules

101.                      An area of a computer that temporarily holds data waiting to be processed is..........

b. Memory
c.  Storage
d. File

........... is the key to close a selected drop-down list; cancel a command and close a
dialog box.

a.  TAB
c.  ESC
d. F10

.......... is the key we use to run the selected command.

b. TAB

............. Is the functional key to display the save-as box.

b.  F6
c.  F9
d.  F12
Page 9

Searches related to computer fundamentals questions


Post a Comment
Previous Post Next Post