Explore topic-wise MCQs in 10th.

This section includes 50 Mcqs, each offering curated multiple-choice questions to sharpen your 10th knowledge and support exam preparation. Choose a topic below to get started.

1.

A ____ typically connects personal computers within a very limited geographical area, usually within a single building.

A. LAN
B. WAN
C. MAN
D. TAN
E. ing
Answer» C. MAN
2.

Press ___ to start presentation from the beginning.

A. F5
B. F6
C. F7
D. F8
E. ing
Answer» B. F6
3.

What is the file extension of PowerPoint Application?

A. .docx
B. .ppt
C. .xls
D. .jpeg
E. ing
Answer» C. .xls
4.

In _____________ topology, computers are and other devices are connected to each other in a circular way.

A. Bus
B. Star
C. Tree
D. Ring
E. ing
Answer» D. Ring
5.

What type of chart is useful for comparing values over categories?

A. Pie Chart
B. Column Chart
C. Line Chart
D. Dot Graph
E. ing
Answer» C. Line Chart
6.

How many Layers are there in OSI model?

A. 8
B. 6
C. 9
D. 7
E. ing
Answer» C. 9
7.

Which file are contents readymade styles that can be used for a presentation document?

A. Presentation
B. Templates
C. Letters
D. Magic wands
E. ing
Answer» C. Letters
8.

What is a benefit of networking?

A. Increase in the computer's speed
B. Sharing of cables to cut down on expenses and clutter
C. Sharing of resources to cut down on the amount of equipment needed
D. Increase in the speed of the network
E. ing
Answer» D. Increase in the speed of the network
9.

Which is a grid of columns and rows that is used to organize data.

A. Row
B. Table
C. Column
D. None of the above
E. ing
Answer» C. Column
10.

We write programs in?

A. Low-Level Language
B. Middle-Level Language
C. High-Level Language
D. D. Decimal-Format
E. ing
Answer» D. D. Decimal-Format
11.

A popular way to learn about computers without ever going to a classroom is called

A. E-learning
B. Star network
C. I-learning
D. Close learning
E. ing
Answer» C. I-learning
12.

Officer LANs that are spread geographically apart on a large scale can be connectedusing a corporate

A. LAN
B. WAN
C. MAN
D. CAN
E. ing
Answer» B. WAN
13.

____ are special visual and sound effects contained in presentation graphics file.

A. Animations
B. Attractions
C. Simulations
D. Graphics
E. ing
Answer» B. Attractions
14.

Does compiler read the whole source code at once?

A. Yes
B. No
C. Depends on compiler
D. Don't know
E. ing
Answer» B. No
15.

Computer cannot boot if it does not have:

A. Compiler
B. Linker
C. Interpreter
D. Operating System
E. ing
Answer» E. ing
16.

Computers connected to a LAN (local area network) can

A. Run faster
B. Go on line
C. E–mail
D. Share information and/or share peripheral equipment
E. ing
Answer» D. Share information and/or share peripheral equipment
17.

A computer translator is best described as:

A. Application Software
B. System Software
C. Hardware
D. Window
E. ing
Answer» C. Hardware
18.

WWW means ____________.

A. World Wide Web
B. Wide World Web
C. Web Wide World
D. World Web Wide
E. ing
Answer» D. World Web Wide
19.

In graphical user interface of operating system, to point a file, a user uses:

A. pointer
B. common line interface
C. file-based interface
D. voice based interface
E. ing
Answer» B. common line interface
20.

A ____ is a set of rules.

A. Resource locator
B. Protocol
C. Domain
D. URL
E. ing
Answer» D. URL
21.

If an error occurs, what compiler do?

A. terminate program
B. stops execution
C. reads the whole program even if it encounters errors
D. give warning
E. ing
Answer» D. give warning
22.

Full form of URL _____________________________.

A. Uniform Routing Location
B. United Route License
C. Unix Routing Locator
D. Uniform Resource Locator
E. ing
Answer» B. United Route License
23.

If an error occurs, what does an interpreter do?

A. terminate program
B. stops execution
C. reads the whole program even if it encounters errors
D. give warning
E. ing
Answer» C. reads the whole program even if it encounters errors
24.

Which is not a topology?

A. Ring
B. Branch
C. Bus
D. Tree
E. ing
Answer» B. Branch
25.

Which term is related with increasing or decreasing the space between characters?

A. Page number
B. Spacing
C. Header
D. Footer
E. ing
Answer» C. Header
26.

Intranet and Extranet differs at ___________________________.

A. Intranet: Private, Extranet: Public
B. Intranet: Public, Extranet: Public
C. Intranet: Private, Extranet: Private and also allowed authorized partners
D. Intranet: Public, Extranet: Private
E. ing
Answer» C. Intranet: Private, Extranet: Private and also allowed authorized partners
27.

A feature that displays only the data in column (s) according to specified criteria

A. Formula
B. Sorting
C. Filtering
D. Pivot
E. ing
Answer» D. Pivot
28.

Types of Computer Language Translators are:

A. Compilers
B. Interpreters
C. Assembler
D. All of the above
E. ing
Answer» E. ing
29.

__________ converts the programs written in assembly language into machine instructions.

A. Machine compiler
B. Interpreter
C. Assembler
D. Converter
E. ing
Answer» D. Converter
30.

Which of the following file format can be added to a PowerPoint show?

A. .jpg
B. .gif
C. .wav
D. All of these
E. ing
Answer» E. ing
31.

PowerPoint presentation(s) is/are widely used as

A. Project presentations by students
B. Communication of planning
C. Note outlines for teachers
D. All of the above
E. ing
Answer» E. ing
32.

Which function in Excel tells how many numeric entries are there?

A. NUM
B. COUNT
C. SUM
D. CHKNUM
E. ing
Answer» C. SUM
33.

Error detection at data link level is achieved by the following

A. Equalization
B. Bit stuffing
C. Hamming code
D. Cyclic redundancy codes
Answer» E.
34.

Viruses

A. Another form of computer attack is virus
B. Viruses are designed to spread into other programs and can wreak havoc in a system
C. Causing system crashes and program malfunctioning
D. all of these
Answer» E.
35.

The operation which is commutative but not associative is

A. AND
B. OR
C. EX-OR
D. NAND
Answer» E.
36.

The following is the unstable sorting method?

A. Insertion sort
B. Bubble sort
C. Merge sort
D. Heap sort
Answer» E.
37.

A web page is

A. Made up of text and HTML tags
B. Marked by an opening HTML tag <HTML>
C. Marked by a closing HTML tag </HTML>
D. All of these
Answer» E.
38.

Following is the Special software to create a job queue:

A. Interpreter
B. Linkage editor
C. Spooler
D. Drive
Answer» D. Drive
39.

The output of a lexical analyzer is:

A. A parse tree
B. Intermediate code
C. Machine code
D. A stream of tokens
Answer» E.
40.

The following are the standard synchronous communication protocol except?

A. SLIP
B. SDLC
C. PAS
D. SMTP
Answer» D. SMTP
41.

The following topology has highest reliability:

A. Ring
B. Mesh
C. Bus
D. Star
Answer» C. Bus
42.

Standard for MODEM is drawn up by the following organisation:

A. Hayes
B. AT and T
C. BELL
D. CCITT
Answer» E.
43.

The last DML statement processed during a commit transaction is?

A. INSERT
B. INSERT
C. DELETE
D. POST
Answer» B. INSERT
44.

High-resolution, bit-mapped displays are useful for displaying:

A. more characters
B. clearer characters
C. graphics
D. all of the above
Answer» B. clearer characters
45.

To transfer electronic mail from one machine to another, the following TCP/IP protocol is used

A. RPC
B. FTP
C. SNMP
D. SMTP
Answer» E.
46.

A hardware device that is capable of executing a sequence of instruction is called

A. CU
B. Processor
C. CPU
D. ALU
Answer» C. CPU
47.

The following has highest Access time:

A. Magnetic disk
B. Swapping devices
C. Floppy disk
D. Cache
Answer» B. Swapping devices
48.

The lowest level of input output control consist of

A. Device drivers
B. Interrupt handler
C. both (a) and (b)
D. None of these
Answer» D. None of these
49.

The garbage collector

A. is critical for efficient virtual memory system
B. Prevents fragmentation from occurring
C. Is mostly used with fixed partition
D. Collects fragmented areas of memory
Answer» E.
50.

Dirty bit is used to show the

A. Page with corrupted data
B. The wrong page in the memory
C. Page that is modified after being loaded into cache memory
D. Page that is less frequently accessed.
Answer» D. Page that is less frequently accessed.