Explore topic-wise MCQs in GK.

This section includes 260 Mcqs, each offering curated multiple-choice questions to sharpen your GK knowledge and support exam preparation. Choose a topic below to get started.

1.

A single chip processor is also called ____.

A. Microprocessor
B. Macroprocessor
C. valves
D. Transistor
E. None of these
Answer» B. Macroprocessor
2.

Which was the first micro processor ?

A. Intel 4004
B. Intel 4005
C. Intel 100
D. Intel 200
E. None of these
Answer» B. Intel 4005
3.

The 8080 micorprocessor was___bit.

A. 16 bit
B. 32 bit
C. 8 bit
D. 4 bit
E. None of these
Answer» D. 4 bit
4.

ALU and CU are the part of whose?

A. Central Pump unit
B. Central Processing Unit
C. Central People Unit
D. None of these
Answer» C. Central People Unit
5.

Trend Micro is a______.

A. Anti-Virus
B. Firewall
C. Spyware Application
D. Spamming
E. None of the Above
Answer» B. Firewall
6.

.HTM is used as a file extension for_____________.

A. Audio Interchange File Format
B. Adobe Photoshop
C. PC Application
D. Data Interchange format
E. Web page source text
Answer» F.
7.

A compiler means

A. A person who compiles source program
B. The same thing as a programmer
C. The same thing as a programmer Keypunch operator
D. A program which translates source program into object program
E. None of the above
Answer» E. None of the above
8.

The term 'B' in COBOL, language used for record keeping and data management stands for _______ .

A. Basic
B. Business
C. Binary
D. Beginner
E. Bootable
Answer» C. Binary
9.

WORM stands for?

A. Write Once Read Memory
B. Wanted Once Read Memory
C. Wanted Original Read Memory
D. Write Original Read Memory
E. None of these
Answer» B. Wanted Once Read Memory
10.

A person who used his or her expertise to gain access to other people s computers to get information illegally or do damage is a

A. hacker
B. analyst
C. instant messenger
D. programmer
E. spammer
Answer» B. analyst
11.

What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?

A. Cracker
B. Worm
C. Trojan horses
D. Keylogger
E. Honeypot
Answer» D. Keylogger
12.

Which of the following is NOT a source of viruses?

A. Pendrives
B. Internet
C. E-mail messages
D. Computer networks
E. All of the Above
Answer» E. All of the Above
13.

What is a bug in computer terminology?

A. A virus
B. A program
C. An error in program
D. None of these
Answer» D. None of these
14.

One nibble is equivalent to how many bits?

A. 2
B. 4
C. 8
D. 1
Answer» C. 8
15.

Which of the following is correct?
I. GUI-Graphical User Interface
II. VDU-Visual Display Unit
III. ALU-All Logical Unit

A. I and II
B. I and III
C. Only III
D. Only II
Answer» B. I and III
16.

Which of the following pair is Incorrect?

A. 10 MB-1024 KB
B. 1 GB-10240 MB
C. 1 TB-1024 GB
D. 1KB-1024 Bytes
Answer» C. 1 TB-1024 GB
17.

The resolution of a computer monitor is measured by____.

A. Number of pixels
B. Number of dots per inch
C. Glow
D. PPM
Answer» B. Number of dots per inch
18.

Which of the following is a desktop operating system?

A. Mac OS
B. MS Office
C. DBMS
D. Oracle
Answer» B. MS Office
19.

Which of these features is related to the mouse of the computer?

A. Printing device
B. Memory device
C. Output device
D. Pointing device
Answer» E.
20.

What is an assistive technology or service in buying and selling a product on the Internet?

A. Point of sale
B. e-banking
C. e-commerce
D. Cloud service
Answer» D. Cloud service
21.

Find the odd one in the following options.

A. Firmware
B. ROM
C. Hard disk
D. Main memory
Answer» B. ROM
22.

A computer image is displayed on a white wall. Which output device is being used for this?

A. L.C.D
B. Monitor
C. Data projector
D. Flat panel
Answer» D. Flat panel
23.

What is the full form of PROM?

A. Programmable read-only memory
B. Program read-output memory
C. Program read-only memory
D. Primary read-only memory
Answer» B. Program read-output memory
24.

In the context of computing, a byte is equal to bits.

A. 4
B. 24
C. 8
D. 16
Answer» D. 16
25.

The goal of normalization is to _______.

A. Minimize the number of relationships
B. Minimum number of entities
C. Minimize the number of tables
D. Minimizing data redundancy
E. None of these
Answer» E. None of these
26.

If you want to share broadband internet connection, you have to install _________ on the network.

A. Router
B. Modem
C. Node
D. Cable
E. None of these
Answer» C. Node
27.

______ denotes what is in the data base fields?

A. Structures
B. Field markers
C. Field definitions
D. Field name
E. None of these
Answer» C. Field definitions
28.

What is the primary difference between virus and worm?

A. A worm has the ability to self-propagate from the infected computer of the user to other computers.
B. The worm is usually written by a cracker - script bunnies do not have the skill of worm program development
C. Viruses are very harmful for the computers it infects; Worm is not such a serious problem.
D. Antivirus is effective for fighting software, not for fighting worms
E. None of the above
Answer» C. Viruses are very harmful for the computers it infects; Worm is not such a serious problem.
29.

___________ are the words which the programming language has introduced in its

A. Control Bus
B. Reserved Bus
C. Control Structures
D. Rigid Keys
E. None of these
Answer» C. Control Structures
30.

What happens when the data is changed in multiple lists and all the lists are not updated?

A. Data redundancy
B. Information overload
C. Duplicate data
D. Data inconsistency
E. None of these
Answer» E. None of these
31.

Proxy server is used for which of the following?

A. To provide protection against unauthorized users.
B. Processing client requests for web pages.
C. Processing client requests for database access.
D. Providing TCP / IP.
E. None of the above
Answer» E. None of the above
32.

Virus usually comes from the floppy disk left in the floppy disk drive.

A. Trojan Horse
B. Boot Sectors
C. Script
D. Logic Bomb
E. None of these
Answer» C. Script
33.

This part of the operating system restricts essential peripherals such as the keyboard, screen, disk, and parallel and serial ports

A. Basic Input / Output System
B. Secondary Input / Output System
C. Peripheral Input / Output System
D. Marginal Input / Output System
E. None of these
Answer» B. Secondary Input / Output System
34.

Computer can transmit data in the position of _____ in ring topology.

A. Packet
B. Data
C. Access Method
D. Token
E. None of these
Answer» E. None of these
35.

All of the following are mobile computing devices except

A. Notebook Computer
B. Cellular Phone
C. Digital Scanner
D. Personal Digital Assistant
E. None of these
Answer» D. Personal Digital Assistant
36.

_______ are specially designed computer chips that reside within other designs, such as your car or electronic thermostat.

A. Server
B. Embedded Computers
C. Robotic Computers
D. Mainframe
E. None of these
Answer» C. Robotic Computers
37.

System software is a set of programs that enable computer hardware devices and software to work together.

A. Management
B. Processing
C. Utility
D. Applications
E. None of these
Answer» E. None of these
38.

What is called the OSI model layer is divided into ____________ processes.

A. Five
B. Six
C. Seven
D. Eight
E. None of these
Answer» D. Eight
39.

______ terminals (earlier called cash registers) are often associated with complex inventory and sales computer systems.

A. Data
B. Sales
C. Query
D. Point of Sales
E. None of these
Answer» B. Sales
40.

All of the following are examples of real security and privacy risk except _____.

A. Hackers
B. Spam
C. Virus
D. Identity Theft
E. None of these
Answer» F.
41.

________ servers store and manage files for network users.

A. Authentication
B. Main
C. web
D. File
E. None of these
Answer» E. None of these
42.

Which of the following is a data warehouse?

A. It can be updated by the end user.
B. There are many naming conventions and formats in it.
C. Organize around important subject areas.
D. They contain only current data.
E. None of these
Answer» D. They contain only current data.
43.

What is a program called that has only one developer, is sold bundled together and has better intent and features, toolbars and menus in common?

A. Software Suite
B. Integrated software package
C. Software Processing Package
D. Personal Information Manager
E. None of these
Answer» C. Software Processing Package
44.

In .. usually by email asking users to click on a link and enter their personal data.

A. DOS attack
B. Phishing Attack
C. Firewall
D. SSL
Answer» C. Firewall
45.

Which software controls the hardware of the computer?

A. Application
B. Program
C. System
D. Memory
Answer» D. Memory
46.

Which of the following are valid minimum and maximum zoom sizes in MS-office?

A. 10, 100
B. 10, 1000
C. 20, 250
D. 10, 500
E. None of these
Answer» E. None of these
47.

What program is used in MS - Word to check the spellings?

A. Spell pro
B. Spell check
C. Outlook express
D. All of the above
E. None of these
Answer» C. Outlook express
48.

In which of the following areas, a spreadsheet software is more useful?

A. Psychology
B. Publishing
C. Statistics
D. Message sending
Answer» E.
49.

When a group of computers is connected together in a small area without the help of telephone lines, it is called

A. Remote Communication Network ( RCN )
B. Local Area Network ( LAN )
C. Wide Area Network ( WAN )
D. Value Added Network ( VAN )
Answer» C. Wide Area Network ( WAN )
50.

A translator for the assembly language to machine language is

A. Assembler
B. Compiler
C. Linker
D. Interpreter
Answer» D. Interpreter