Explore topic-wise MCQs in Computer Science.

This section includes 109 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

1.

Which one is the Low Level Language?

A. Assembly
B. Visual Basic
C. Java
D. C++
Answer» B. Visual Basic
2.

Which program can be used for email?

A. Internet Explorer
B. Outlook Express
C. NetMeeting
D. FrontPage
Answer» C. NetMeeting
3.

Which technology is used in a CDROM Drive?

A. Mechanical
B. Electromechanical
C. Optical
D. Fiber Optica
Answer» D. Fiber Optica
4.

Who is known as the father of Computer Science?

A. Charles Babbage
B. Dr. Herman Hollerith
C. Howard Aiken
D. Blaise Pascal
Answer» B. Dr. Herman Hollerith
5.

You use a(n) ______________such as a keyboard or mouse, to input information

A. output device
B. input device
C. storage device
D. processing device
Answer» C. storage device
6.

Which of the following is/are operating systems

A. Windows
B. Unix
C. OS/2
D. All of these
Answer» E.
7.

Which of the following is a network topoloty

A. LAN
B. WAN
C. MAN
D. BUS
Answer» E.
8.

Which of the following contains permanent data and gets updated during the processing of transactions?

A. Operating System File
B. Transaction file
C. Software File
D. Master file
Answer» E.
9.

Which is a volatile memory?

A. ROM
B. BIOS
C. PROM
D. RAM
Answer» E.
10.

Which is a valid program to access the Internet?

A. Access
B. Front Page
C. Windows Explorer
D. Netscape
Answer» E.
11.

Which device is used to process data?

A. CPU
B. RAM
C. DCU
D. VDU
Answer» B. RAM
12.

Which computer peripheral manufacturer quotes “Empowering your PC”?

A. Canon
B. Epson
C. Mercury
D. Samsung
Answer» D. Samsung
13.

When creating a computer program, the designs the structure of the program

A. End user
B. System Analyst
C. Programmer
D. All of the above
Answer» C. Programmer
14.

When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits?

A. ANSI
B. ASCII
C. EBCDIC
D. ISO
Answer» B. ASCII
15.

What type of printers are Dot Matrix Printers?

A. Laser
B. Inkjet
C. Impact
D. Drum
Answer» D. Drum
16.

What is the full form of RAM?

A. Read Access Memory
B. Random Access Memory
C. Rapid access Memory
D. None of these
Answer» C. Rapid access Memory
17.

What is the capacity of a 3.5” Floppy Disk?

A. 360KB
B. 720KB
C. 1.2MB
D. 1.44MB
Answer» E.
18.

What do you call a single point on a computer screen

A. Cell
B. Element
C. Pixel
D. Bit
Answer» D. Bit
19.

VOIP stands for__________________

A. Voice over IP
B. Video over IP
C. Viruses over IP
D. Virtual over IP
Answer» B. Video over IP
20.

UNIVAC is .

A. Universal Automatic Computer
B. Universal Array Computer
C. Unique Automatic Computer
D. Unvalued Automatic Computer
Answer» B. Universal Array Computer
21.

translates and executes program at run time line by line

A. Compiler
B. Interpreter
C. Linker
D. Loader
Answer» C. Linker
22.

______________transforms one interface into another interface

A. Program
B. Software
C. Data
D. None of these
Answer» C. Data
23.

Trackball is a._______________________

A. Input device
B. Output device
C. Programming language
D. Software
Answer» B. Output device
24.

Touch Screen is______________________

A. Input device
B. Output device
C. Both a & b above
D. None of these
Answer» D. None of these
25.

The_______________is the amount of data that a storage device can move from the storage medium to the Computer per second

A. data migration rate
B. data digitizing rate
C. data transfer rate
D. data access rate
Answer» D. data access rate
26.

The typical computer criminal is a

A. a Young hacker
B. Trusted employee with no criminal record
C. Trusted employee with a long, but unknown criminal record.
D. Overseas young cracker.
Answer» C. Trusted employee with a long, but unknown criminal record.
27.

The Third Generation Computer was made with______________.

A. Vacuum Tube
B. Discrete Components
C. IC
D. Bio Chips
Answer» D. Bio Chips
28.

The term designates equipment that might be added to a computer system to enhance its functionality.

A. digital device
B. system add-on
C. disk pack
D. peripheral device
Answer» E.
29.

The term ‘Computer’ is derived from______________

A. Latin
B. German
C. French
D. Arabic
Answer» B. German
30.

The task of performing operations like arithmetic and logical operations is called.________________

A. Processing
B. Storing
C. Editing
D. Sorting
Answer» B. Storing
31.

The Second Generation Computer was based on_____________

A. Vacuum Tube
B. Silicon Chips
C. Transistor
D. Bio Chips
Answer» D. Bio Chips
32.

The processing of an application takes place between a client and a __________processor.

A. Front end
B. Back end
C. Both A and B
D. None of these
Answer» D. None of these
33.

The process of transferring files from a computer on the Internet to your computer is called

A. Downloading
B. uploading
C. FTP
D. JPEG
Answer» B. uploading
34.

The primary function of the ________________is to set up the hardware and load and start an operating system

A. System Programs
B. BIOS
C. CP
D. Memory
Answer» C. CP
35.

The instructions that tell a computer how to carry out the processing tasks are referred to as computer.______________

A. programs
B. processors
C. input devices
D. memory modules
Answer» B. processors
36.

The digital signals can be represented by

A. Binary Codes
B. 0 and 1
C. High and Low
D. all of the above
Answer» E.
37.

The ________________data mining technique derives rules from real-world case examples.

A. Rule discover
B. Signal processing
C. Neural nets
D. Case- based reasoning
Answer» D. Case- based reasoning
38.

The common name for the crime of stealing passwords is;

A. Jacking
B. Identity theft
C. Spoofing
D. Hacking
Answer» D. Hacking
39.

The Analytical Engine developed during First Generation of computers used ________as a memory unit

A. RAM
B. Floppies
C. Cards
D. Counter Wheels
Answer» E.
40.

_______________represents raw facts, where-as. is data made meaningful.

A. Information, reporting
B. Data, information
C. Information, bits
D. Records, bytes
Answer» C. Information, bits
41.

refers to electronic trespassing or criminal hacking.

A. Cracking
B. Jacking
C. Spoofing
D. Smarming
Answer» B. Jacking
42.

RAM can be treated as the _______________ for the computer's processor

A. factory
B. operating room
C. waiting room
D. planning room
Answer» D. planning room
43.

provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously

A. Multitasking
B. Multithreading
C. Multiprocessing
D. Multicomputing
Answer» B. Multithreading
44.

printer is the cheapest in terms of price and operating cost

A. Inkjet
B. Laser
C. Thermal
D. Dot matrix
Answer» E.
45.

printer is a non-impact printer and is quite in working

A. Inkjet
B. Laser
C. Thermal
D. Dot matrix
Answer» B. Laser
46.

On-line real time systems become popular in_____________generation

A. First Generation
B. Second Generation
C. Third Generation
D. Fourth Generation
Answer» D. Fourth Generation
47.

Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate

A. CAN
B. LAN
C. DAN
D. WAN
Answer» E.
48.

Note book, laptop, palm, hand-held computers are coming under the category of.____________________computer

A. Digital computer
B. Mainframe computer
C. Portable computer
D. Digital computer
Answer» D. Digital computer
49.

Nortel is a company which manufactures:

A. Software
B. Processors
C. Cables
D. Network equipment
Answer» E.
50.

MOS stands for __________

A. Metal Oxide Semiconductor
B. Most Often Store
C. Method Organized Stack
D. None of these
Answer» B. Most Often Store