Explore topic-wise MCQs in Computer.

This section includes 116 Mcqs, each offering curated multiple-choice questions to sharpen your Computer knowledge and support exam preparation. Choose a topic below to get started.

1.

Network components are connected to the same cable in the ....... topology

A. ring
B. bus
C. mesh
D. mixed
E. star
Answer» C. mesh
2.

You can use the .......... bar to type URL and display a Web page or type a keyword to display a list of related web pages

A. Menu
B. Title
C. Search
D. Web
E. Address
Answer» D. Web
3.

.......... are attempts by individuals to obtain confidential information from you by falsifying their identity.

A. Phishing trips
B. Computer viruses
C. Spyware scams
D. Viruses
E. Phising scams
Answer» D. Viruses
4.

The............folder retains copies of messages that you have started but are not yet ready to send.

A. Inbox
B. Outbox
C. Drafts
D. Sent Items
E. Address Book
Answer» D. Sent Items
5.

A popular way to learn about computers without ever going to a classroom is called ..........

A. i-learning
B. isolated learning
C. e-learning
D. close learning
E. distance learning
Answer» D. close learning
6.

What is the most common way to get a virus in your computers hard disk ?

A. By installing games from CD ROMs
B. By opening e-mails
C. By uploading pictures from mobile to the computers
D. By sending e-mails
E. None of the above
Answer» C. By uploading pictures from mobile to the computers
7.

Unsolicited e-mail is called a..........

A. Newsgroup
B. Usenet
C. Backbane
D. Spam
E. None of these
Answer» E. None of these
8.

Most websites have a main page, the ......... which acts as a doorway to the rest of the website pages.

A. Search engine
B. Home page
C. Browser
D. URL
E. None of these
Answer» C. Browser
9.

Which of the following is an example of continuity ?

A. Internet
B. Floppy Disk
C. Power cord
D. Data
E. None of these
Answer» B. Floppy Disk
10.

When sending an e-mail, the ........ line describes at setting the contents of the message

A. Subject
B. To
C. Contents
D. CC
E. None of these
Answer» B. To
11.

Inventor of WWW is ..............

A. Bill Gates
B. Lee N. Feyong
C. N. Resscl
D. TIm Berners Lee
E. None of these
Answer» E. None of these
12.

Passwords enables users to ..........

A. Get into the system quickly
B. Make efficient use of time
C. Retain confidentiality of files
D. Simplify file structure
E. None of the above
Answer» D. Simplify file structure
13.

The internet allows you to

A. Send e-mail
B. View web pages
C. Connect to servers all around the world
D. All of these
E. None of these
Answer» E. None of these
14.

Encrystion and decryption are functions of

A. Transport layer
B. Presentation layer
C. Session layer
D. Transitional layer
E. None of these
Answer» D. Transitional layer
15.

A program designed to destroy data on your computer which can travel to infect other computers is called a

A. Disease
B. Tarpedo
C. Hurricave
D. Virus
E. None of these
Answer» E. None of these
16.

Which of the following is not a term of information technology ?

A. Cyber space
B. Upload
C. Light storage
D. Modem
E. None of these
Answer» D. Modem
17.

Spam is related to ...........

A. Computer
B. Art
C. Music
D. Game
E. None of these
Answer» B. Art
18.

What does a Browser do ?

A. Looks through magazines and books in the library
B. Reads material really fast
C. It wastes your time
D. It provides help menus
E. It is software used to view web pages
Answer» D. It provides help menus
19.

XML stands for ..............

A. Extra Markup Language
B. Excellent Markup Links
C. Extended Markup Language
D. Extended Marking Links
E. None of these
Answer» D. Extended Marking Links
20.

The acronym HTML stands for ............

A. High Transfer Machine Language
B. High Transmission Markup Language
C. Hypertext Markup Language
D. Hypermedia Markup Language
E. None of the above
Answer» D. Hypermedia Markup Language
21.

What is an e-mail ?

A. An internet standard, which allows users to upload and download files
B. An online area on which a user can converse in written form about any special subject
C. Transmission of files and messages through computer network
D. A real time typed conversation
E. None of the above
Answer» D. A real time typed conversation
22.

An email account includes a storage area, often called a (n) ..........

A. attachment
B. hyperlink
C. mailbox
D. IP address
E. non of these
Answer» D. IP address
23.

Marketing of internet banking means

A. Meeting of banks on the net
B. Net Practice
C. Marketing the usage of banking transactions through internet
D. Transactions with forcing countries
E. None of the above
Answer» D. Transactions with forcing countries
24.

............. is a device which uses for data transmission through telecommunication line

A. Drives
B. Modem
C. Platform
D. All of these
E. None of these
Answer» C. Platform
25.

The software that allows users to surf the internet is called a / an ..........

A. Search engine
B. Internet Service Provider (ISP)
C. Multimedia application
D. Browser
E. None of the above
Answer» E. None of the above
26.

An E-mail address typically consists of a user ID followed by the ....... sign and the domain name that manages the user's electronic post office box.

A. #
B.
C. @&
D. $
E. *
Answer» C. @&
27.

The ............ also called the web, contains billions of documents.

A. World Wide Web
B. HTTP
C. Web portal
D. Domain
E. None of these
Answer» B. HTTP
28.

Conference (Netscape), Netmeeting (Internet Explorer) enables (choose the option that best describes)

A. sharing voice one the net
B. Live textual conferencing
C. Live audio conferencing
D. Live real time conferencing
E. None of the above
Answer» E. None of the above
29.

A programme, either talk numeric that is made available in digital format for automatic download over the Internet is called ......

A. vodcast
B. blog
C. podcast
D. wiki
E. broadcast
Answer» D. wiki
30.

A browser is a

A. tool for creating a database
B. software program to view Web pages on the Internet
C. printing device
D. software program to delete a folder
E. None of the above
Answer» C. printing device
31.

E-commerce uses the following key standards technologies

A. Electronic Data Interchange (EDI)
B. Technical Data Interchange (TDI)
C. Standard for Exchange of Products model data (STEP)
D. Extensible Markup Language
E. All of the above
Answer» B. Technical Data Interchange (TDI)
32.

A stored link to a Web page, in order to have a quick an easy access to is later, is called

A. WP-Link
B. Bookmark
C. Field
D. Length
E. None of these
Answer» C. Field
33.

Which protocol provides E-mail facility among different hosts ?

A. SMTP
B. FTP
C. TELNET
D. SNMP
E. None of these
Answer» B. FTP
34.

Which of the following terms is associated with Internet E-mail ?

A. Plotter
B. Slide presentation
C. Bookmark
D. Pie chart
E. Microsoft Excel
Answer» D. Pie chart
35.

The .......... which contains billions of documents called Web pages, is one of the more popular services on the Internet.

A. Web server
B. telnet
C. Web
D. collection
E. newsnet
Answer» B. telnet
36.

What is Website ?

A. A place form where we can get information in documents and files.
B. A site that is owned by any particular company
C. A location on the world wide web
D. A place from where we can access Internet
E. None of the above
Answer» D. A place from where we can access Internet
37.

A hot on the Internet finds another host by its

A. postal address
B. electronic address
C. IP address
D. name
E. None of these
Answer» D. name
38.

A (n) ...... appearing on a Web page opens another document when clicked.

A. anchor
B. URL
C. hyperlink
D. reference
E. heading
Answer» D. reference
39.

Who is the founder of 'facebook' which is currently the NO.1 social networking Website in India ?

A. Orkut Buycukkokten
B. Mark Zuckerberg
C. Bill Gates
D. Martin Cooper
Answer» C. Bill Gates
40.

A Website is collection of

A. graphics
B. programs
C. algorithms
D. Web pages
E. charts
Answer» E. charts
41.

Telnet is a .... based computer protocol.

A. sound
B. text
C. image
D. animation
E. digits
Answer» C. image
42.

Through ......... an administrator or another user can access someone else's computer remotely.

A. administrator
B. web server
C. web application
D. http
E. telnet
Answer» F.
43.

An http request contains ...... parts.

A. 1
B. 5
C. 3
D. 4
E. 2
Answer» D. 4
44.

A (n) ......... allows you to access your E-mail from anywhere.

A. forum
B. webmail interface
C. message board
D. weblog
E. None of these
Answer» C. message board
45.

Which of these is not a means of personal communication on the Internet ?

A. Chat
B. Instant messaging
C. Instanotes
D. Electronic-mail
E. None of these
Answer» D. Electronic-mail
46.

Which of the following will be used if a sender of E-mail wants to bold, italics, etc the text message ?

A. Reach signature
B. Rich text
C. Reach format
D. Plain format
E. Plain text
Answer» C. Reach format
47.

HTML is used for designing Web pages. Here. HTML stands for

A. High Transfer Machine Language
B. High Transmission Markup Language
C. Hyper Text Markup Language
D. Hyper Transfer Markup language
E. Hypermedia Transmission Machine Language
Answer» D. Hyper Transfer Markup language
48.

A ...... is the term used when a search engine returns a Web page that matches the search criteria.

A. blog
B. hit
C. link
D. view
E. success
Answer» C. link
49.

Which of the following must be contained in a URL ?

A. A protocol identifier
B. The letters, WWW.
C. The unique registered domain name
D. WWW and the unique registered domain name
E. A protocol identifier, WWW and the unique registered domain name
Answer» F.
50.

What is included in in an E-mail address?

A. Domain name followed by user's name
B. User's name followed by domain name
C. User's name followed by postal address
D. User's name followed by street address
E. None of the above
Answer» C. User's name followed by postal address