Explore topic-wise MCQs in General Knowledge.

This section includes 621 Mcqs, each offering curated multiple-choice questions to sharpen your General Knowledge knowledge and support exam preparation. Choose a topic below to get started.

101.

How many layers are there in the OSI networking model?

A. 13
B. 11
C. 9
D. 7
Answer» E.
102.

HTML in computer science stands for?

A. HyperText Markup Language
B. HyperText Main Language
C. HyperText Memory Language
D. HyperText Mandatory Language
Answer» B. HyperText Main Language
103.

HTML is a subset of_x005F_x000D_

A. SGMH
B. SGMD
C. SGML
D. None of the above
Answer» D. None of the above
104.

HTTP in computer science stands for?

A. HyperText Transmission Protocol
B. HyperText Transfer Protocol
C. HyperText Technology Protocol
D. HyperText Total Protocol
Answer» C. HyperText Technology Protocol
105.

Hub works on which layer?

A. Network layer
B. Physical layer
C. Data link layer
D. All of the above
Answer» C. Data link layer
106.

How many KB is equal to 1 GB?

A. 1024
B. 256 x 1024
C. 1024 x 1024
D. 1024 x 1024 x 128
Answer» D. 1024 x 1024 x 128
107.

Hard Drive capacity is measured in

A. Newton
B. GB
C. THz
D. Gwallior
Answer» C. THz
108.

Hardware devices that are not part of the main computer system and are often added later to the system are ________

A. clip art
B. highlight
C. execute
D. peripherals
Answer» E.
109.

How many bits does an IP address contain?

A. 64 bits
B. 32 Bits
C. 128 Bits
D. 256 Bits
Answer» C. 128 Bits
110.

How do you display current date and time in MS Excel ?

A. Time ()
B. Now ()
C. Date ()
D. Today ()
Answer» C. Date ()
111.

Hard copy of a document is

A. Printed on printer
B. Stored in floppy
C. Store in CD
D. Store in hard disk
Answer» B. Stored in floppy
112.

Hard disk is coated in both side with

A. Carbon layer
B. Magnetic metallic oxide
C. Optical metallic oxide
D. All of the above
Answer» C. Optical metallic oxide
113.

Google Docs is a type of cloud computing.

A. 1
B.
C.
D.
Answer» B.
114.

Function key ___ in a Windows keyboard can perform several functions, and does not have an assigned Windows default._x005F_x000D_

A. F1
B. F6
C. F8
D. F9
Answer» D. F9
115.

Full form of BIOS is

A. Binary Interchange Operation System
B. Basic Input Output System
C. Beginner's Input Operation Symbol
D. Basic Interface Oriented Service
Answer» C. Beginner's Input Operation Symbol
116.

Font size is measured in

A. pixels
B. points
C. didos
D. percents
Answer» C. didos
117.

FORTRAN is not used for _____._x005F_x000D_ (I) Drawing pictures(II) Carrying out mathematics computations

A. Only (I)
B. Only (II)
C. Both (I) and (II)
D. Neither (I) nor (II)
Answer» D. Neither (I) nor (II)
118.

Formatting a cell in currency you can specify

A. Percentage symbol
B. Currency symbol
C. Decimal places
D. Both B & C
Answer» C. Decimal places
119.

First page of website is termed as

A. Index
B. Home page
C. JAVA Script
D. Bookmark page
Answer» C. JAVA Script
120.

Find the odd statement out in relation to firewall.

A. Firewall can be a software
B. Firewall can be a hardware
C. Firewall can be a combination of software & hardware
D. Firewall protects computer from fire
Answer» D. Firewall protects computer from fire
121.

Fifth generation computer is also known as

A. Very Large Scale Integration (VLSI)
B. Knowledge information processing system
C. Both A & B
D. None of the above
Answer» C. Both A & B
122.

F12 key is known as

A. Company Configuration
B. Accounting Features
C. Company Features
D. All of the above
Answer» B. Accounting Features
123.

Find the "odd one out".

A. Linux
B. Windows 98
C. C++
D. Windows 7
Answer» D. Windows 7
124.

Firewalls are used to protect against

A. Virus Attacks
B. Unauthorized Access
C. Data Driven Attacks
D. Fire Attacks
Answer» C. Data Driven Attacks
125.

Expansion cards are inserted into

A. Peripheral Devices
B. Pegs
C. Slots
D. The back of the computer
Answer» D. The back of the computer
126.

Excel displays the current cell address in the

A. Title Bar
B. Name Box
C. Status Bar
D. Formula bar
Answer» C. Status Bar
127.

Every HTML file is a ___________ file._x005F_x000D_

A. Text
B. Audio
C. Video
D. Image
Answer» B. Audio
128.

Every set in the dotted decimal format of IP address is called

A. Subnet
B. Octet
C. Subset
D. IP set
Answer» C. Subset
129.

Every computer on the internet is known as

A. Client
B. Modem
C. Server
D. Host
Answer» E.
130.

Enumerators are stored by the compiler in

A. integer
B. string
C. float
D. any of above
Answer» B. string
131.

Every component of your computer is either

A. Hardware or CPU
B. RAM/CPU or Hardware
C. Hardware or Software
D. System or Application software
Answer» D. System or Application software
132.

Esc key in a windows keyboard is not used to_x005F_x000D_

A. Close a dialog-box
B. Run a selected command
C. Cancel a command
D. Close a selected drop down list
Answer» C. Cancel a command
133.

EPROM can be used for

A. Erasing and reconstructing the contents of ROM
B. Duplicating ROM
C. Reconstructing the contents of ROM
D. Erasing the contents of ROM
Answer» B. Duplicating ROM
134.

Ethernet system uses which of the following technology?

A. Ring
B. Bus
C. Star
D. Tree
Answer» C. Star
135.

During Processing data, programs, and processed information are held temporarily in _________

A. Secodary stoage
B. ROM
C. RAM
D. None of these
Answer» D. None of these
136.

DSL is an example of what type of internet access?

A. Wireless
B. Network
C. Broadband
D. Slow
Answer» D. Slow
137.

Digital computers use a ......... system to encode date and programs.

A. semiconductor
B. decimal
C. binary
D. RAM
Answer» D. RAM
138.

Documentation of computer programs is impograms is important so that ________

A. users can learn how to use the program
B. other programmers can know how to maintain the program
C. the programer can see why the code is written that way while hunting for sources of error
D. all of above
Answer» E.
139.

Debugging is the process of

A. Rolling out a software program
B. Modifying a software program
C. Checking errors in a software program
D. Changing the design structure of a program
Answer» D. Changing the design structure of a program
140.

Digitized information can be used by computers.

A. 1
B.
C.
D.
Answer» B.
141.

Delayed payload of some viruses is also called as _____

A. Bomb
B. Late - Virus
C. Time
D. Anti-virus
Answer» B. Late - Virus
142.

Data stored in computer in which form?

A. numbers
B. text
C. audio
D. images
Answer» B. text
143.

Data in database at a particular point of time is called as?

A. Intension
B. Extension
C. Back up
D. Application
Answer» C. Back up
144.

Cybercards are most useful for

A. writing to-do lists
B. creating new inventions
C. keeping a personal diary
D. tracking Internet-based research
Answer» E.
145.

Ctrl+F in MS Word for

A. Re do
B. to find the word
C. Select all
D. Center text
Answer» C. Select all
146.

Current search engines function by recognizing keywords.

A. 1
B.
C.
D.
Answer» B.
147.

CTRL + ] is used for

A. Re-do
B. Right align text
C. Increase in font size
D. Expand or collapse the ribbon
Answer» D. Expand or collapse the ribbon
148.

CPU speed of a personal computer is

A. 1 MIPS
B. 100 KIPS
C. 32 KIPS
D. 32 MIPS
Answer» D. 32 MIPS
149.

CPU Scheduler is also known as _____ .

A. Job Scheduler
B. Resource Scheduler
C. Short-­term Scheduler
D. Process Scheduler
Answer» D. Process Scheduler
150.

CPU performance is measured through ________.

A. MHz
B. Throughput
C. Flaps
D. None of the above
Answer» C. Flaps