Explore topic-wise MCQs in Computer Science.

This section includes 192 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

1.

What kind of memory is both static and non -volatile?

A. ram
B. rom
C. bios
D. cache
Answer» C. bios
2.

RAM can be treated as the ......... for the computer's processor

A. factory
B. operating room
C. waiting room
D. planning room
Answer» D. planning room
3.

…………….are used to identify a user who returns to a Website

A. cookies
B. plug-ins
C. scripts
D. asps
Answer» B. plug-ins
4.

---------- computer is small general purpose micro computer, but larger than portablecomputer

A. hybrid
B. digital
C. desktop
D. laptop
Answer» D. laptop
5.

.......... is the key we use to run the selected command.

A. shift
B. tab
C. enter
D. ctrl
Answer» D. ctrl
6.

............. computer is a medium sized computer

A. micro
B. mainframe
C. super
D. mini
Answer» E.
7.

The term ‘Computer’ is derived from..........

A. latin
B. german
C. french
D. arabic
Answer» B. german
8.

The computer abbreviation KB usually means

A. key block
B. kernel boot
C. kilo byte
D. kit bit
Answer» D. kit bit
9.

is an OOP principle

A. structured programming
B. procedural programming
C. inheritance
D. linking
Answer» D. linking
10.

Office LANS, which are scattered geographically on large scale, can be connected by the useof corporate

A. can
B. lan
C. dan
D. wan
Answer» E.
11.

The instructions that tell a computer how to carry out the processing tasks are referredto as computer.........

A. programs
B. processors
C. input devices
D. memory modules
Answer» B. processors
12.

LAN stands for...............

A. limited area network
B. logical area network
C. local area network
D. large area network
Answer» D. large area network
13.

.......... are high-end printers

A. inkjet
B. laser
C. thermal
D. dot matrix
Answer» C. thermal
14.

---------- computers operates essentially by counting

A. portable computer
B. hybrid computer
C. analog computer
D. digital computer
Answer» E.
15.

A person who used his or her expertise to gain access to other people's computers to getinformation illegally or do damage is a-

A. hacker
B. spammer
C. instant messenger
D. programmer
Answer» B. spammer
16.

..........is a combination of hardware and software that facilitates the sharing of informationbetween computing devices.

A. network
B. peripheral
C. expansion board
D. digital device
Answer» B. peripheral
17.

Which of the following is/ are operating systems

A. windows
B. unix
C. os/2
D. all of these
Answer» E.
18.

------ refers to electronic trespassing or criminal hacking.

A. cracking
B. jacking
C. spoofing
D. smarming
Answer» B. jacking
19.

Light pen and joystick are............

A. algorithm
B. input devices
C. output devices
D. portals
Answer» C. output devices
20.

The first computers were programmed using

A. assembly language
B. machine language
C. source code
D. object code
Answer» C. source code
21.

. The process of transferring files from a computer on the Internet to your computer iscalled

A. downloading
B. uploading
C. ftp
D. jpeg
Answer» B. uploading
22.

RAM is also called as

A. read / write memory
B. long memory
C. permanent memory
D. primary memory
Answer» B. long memory
23.

Which of the following is not anti- viruses’ software?

A. nav
B. f-prot
C. oracle
D. mcafee
Answer» D. mcafee
24.

To access properties of an object, the mouse technique to use is-

A. dragging
B. dropping
C. right-clicking
D. shift-clicking
Answer» D. shift-clicking
25.

The technology that stores only the essential instructions on a microprocessor chip andthus enhances its speed is referred to as

A. cisc
B. risc
C. cd-rom
D. wi-fi
Answer» C. cd-rom
26.

. ..................... Is the appearance of typed characters?

A. size
B. format
C. point
D. colour
Answer» C. point
27.

. ............... represents raw facts, where-as................. is data made meaningful.

A. information, reporting
B. data, information
C. information, bits
D. records, bytes
Answer» C. information, bits
28.

Snowbol is an/a---------

A. operating system
B. hll
C. software
D. search engine
Answer» C. software
29.

Trackball is a...........

A. input device
B. output device
C. programming language
D. software
Answer» B. output device
30.

On-line real time systems become popular in ........... generation

A. first generation
B. second generation
C. third generation
D. fourth generation
Answer» D. fourth generation
31.

To move a copy of file from one computer to another over a communication channel iscalled?

A. file transfer
B. file encryption
C. file modification
D. file copying
Answer» B. file encryption
32.

Personal computers use a number of chips mounted on a main circuit board. What is thecommon name for such boards?

A. daughter board
B. motherboard
C. father board
D. breadboard
Answer» C. father board
33.

You use a(n) ....., such as a keyboard or mouse, to input information

A. output device
B. input device
C. storage device
D. processing device
Answer» C. storage device
34.

......... are used for plotting graphs and design on papers

A. trackball
B. joystick
C. light pen
D. plotters
Answer» E.
35.

Which of the following does not store data permanently?

A. rom
B. ram
C. floppy disk
D. hard disk
Answer» C. floppy disk
36.

------Is defined as any crime completed through the use of computer technology.

A. computer forensics
B. computer crime
C. hacking
D. cracking
Answer» C. hacking
37.

.......... printer is a non-impact printer and is quite in working

A. inkjet
B. laser
C. thermal
D. dot matrix
Answer» B. laser
38.

. .......... is the process of dividing the disk into tracks and sectors.

A. tracking
B. formatting
C. crashing
D. allotting
Answer» C. crashing
39.

A ............ is an additional set of commands that the computer displays after you make aselection from the main menu

A. dialog box
B. submenu
C. menu selection
D. all of the above
Answer» B. submenu
40.

A DVD is an example of a (n)-

A. hard disk
B. optical disc
C. output device
D. solid-state storage device
Answer» C. output device
41.

A computer program that converts an entire program into machine language at one timeis called a/ an

A. interpreter
B. simulator
C. characters
D. compiler
Answer» D. compiler
42.

COBOL is an acronym for.............

A. common business oriented language
B. computer business oriented language
C. common business operated language
D. common business organized language
Answer» B. computer business oriented language
43.

Daisy wheel, Drum, chain etc are the .............

A. flow chart
B. mouse
C. key board
D. printers
Answer» E.
44.

Junk e-mail is also called

A. spam
B. spoof
C. sniffer script
D. spool
Answer» B. spoof
45.

The first electronic computer was developed by

A. j.v. attansoff
B. bill gates
C. simur cray
D. winton serf
Answer» B. bill gates
46.

The ability to recover and read deleted or damaged files from a criminal's computer isan example of a law enforcement speciality called:

A. robotics
B. simulation
C. computer forensics
D. animation
Answer» D. animation
47.

Who is the chief of Microsoft

A. babbage
B. bill gates
C. bill clinton
D. none of these
Answer» C. bill clinton
48.

What is embedded system?

A. the programme which arrives by being wrapped in box.
B. the programme which is the permanent part of the computer
C. the computer which is the part of a big computer
D. the computer and software system that control the machine
Answer» E.
49.

Which of the following is the smallest storage?

A. megabyte
B. gigabyte
C. terabyte
D. none of these
Answer» E.
50.

Which part of the computer is directly involved in executing the instructions of thecomputer program?

A. the scanner
B. the main storage
C. the secondary storage
D. the processor
Answer» E.