Explore topic-wise MCQs in Computer Fundamentals.

This section includes 232 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Fundamentals knowledge and support exam preparation. Choose a topic below to get started.

1.

_________________ are formed by heated elements being placed in contact with special heat sensitive paper forming darkened dots when the elements reach a critical temperature.

A. Numerical
B. Words
C. Characters
D. None of the above
Answer» D. None of the above
2.

_____________ was one of the most widely used systems software for IBM compatiblemicrocomputers.

A. API
B. OS
C. MS DOS
D. None of the above
Answer» D. None of the above
3.

A small set of high-speed registers placed inside a processor and used for storingtemporary data while processing.

A. Internal Processor Memory
B. Secondary Storage Memory
C. Primary Storage Memory
D. None of the above
Answer» B. Secondary Storage Memory
4.

____________________ is a presentation tool that helps create eye-catching andeffective presentations in a matter of minutes.

A. Spreadsheet
B. Word Processing
C. Bits
D. PowerPoint
Answer» E.
5.

________ is a function in router that allows dumping of invalid packet for a specificnetwork instead of forwarding.

A. Forwarding
B. Filtering
C. Selecting
D. None of the above
Answer» C. Selecting
6.

The ______________ devices can scan marks from a computer-readable paper.

A. CRT
B. OMR
C. LCD
D. All of the above’
Answer» C. LCD
7.

If there are 100 tracks on each disk surface, there are ________ cylinders in the diskpack.

A. 99
B. 101
C. 100
D. 1000
Answer» D. 1000
8.

Computers have an _______________ subsystem,

A. Input
B. Output
C. Proper
D. Both (A) and (B)
Answer» E.
9.

Joysticks typically have a button on __________that is used to select the option pointedby the cursor.

A. Bottom
B. Left
C. Right
D. Top
Answer» E.
10.

_________ is a unique number associated with each computer making it uniquelyidentifiable amongst all the computers connected to the Internet.

A. IP address
B. MAC address
C. Inode
D. None of the above
Answer» B. MAC address
11.

Examples of popular Linux distributions are

A. Red Hat
B. Mandrake
C. SCSE
D. All of the above
Answer» E.
12.

The amount of data that can be stored or the number of bytes that can be stored per linerinch of tape is

A. The data recording capacity
B. The data recording storage
C. The data recording density
D. None of the above
Answer» D. None of the above
13.

Source data automation is the _________________ development for data inputtechnologies.

A. Last
B. Second
C. Fifth
D. Recent
Answer» E.
14.

These are the devices used for getting out information from the computer

A. Input
B. Keyboard
C. Output
D. None of the above
Answer» D. None of the above
15.

____________________ was the first high -level language developed by John Backus atIBM in 1956.

A. FORTRAN
B. COBOL
C. BASIC
D. None of the above
Answer» B. COBOL
16.

The primary storage also temporarily stores any intermediate result generated by the___________.

A. The CPU
B. The motherboard
C. The hard disk drive
D. The ALU
Answer» E.
17.

For faster access of data from disk packs ______ are used.

A. Disks
B. Tapes
C. Cartridge
D. Cylinders
Answer» E.
18.

________________ is ideal for a task that needs a number of lists, tables, financialcalculations, analysis and graphs.

A. PowerPoint
B. Word
C. VB
D. Excel
Answer» E.
19.

The ability of the computer to handle several application programs concurrently so thatthe idle time of the processor is reduced is called

A. Multitasking
B. Multiprogramming
C. Batch processing
D. Time sharing
Answer» B. Multiprogramming
20.

Storage and retrieval of instructions and data in a computer system is the responsibility ofthe __________________.

A. Memory
B. Secondary Memory
C. Primary Memory
D. Both (B) and (C)
Answer» E.
21.

Early computers like ENIAC, EDVAC, and UNIVAC I all can be classified as_____________.

A. Third Generation Computers
B. Second Generation Computers
C. First Generation Computers
D. None of the above
Answer» D. None of the above
22.

________________ devices allow input into the computer system by pressing a set ofkeys mounted on a board, connected to the computer system

A. Mouse
B. Keyboard
C. Pen
D. Screen
Answer» C. Pen
23.

_______ is a communication transfer mode in which data is transferred in both directionsto send and transfer the small amount of data.

A. Interrupt mode
B. Isochronous mode
C. Control mode
D. Interrupt mode
Answer» D. Interrupt mode
24.

_________ is software to compress a file.

A. WinZip
B. Xine
C. Miro 5
D. All of the above
Answer» B. Xine
25.

This kind of software is functional in the domain of management and finance

A. Engineering Software
B. Business Software
C. Artificial Intelligence Software
D. None of the above
Answer» C. Artificial Intelligence Software
26.

The socket that supplies the power from the computer system to the computer monitor

A. Monitor Power Socket
B. Main Power Socket
C. PS/2 Mouse Port
D. None of the above
Answer» B. Main Power Socket
27.

A ____________is the main control program for handling all other programs in acomputer.

A. MS DOS
B. API
C. OS
D. DDR4
Answer» D. DDR4
28.

An example of ring topology is

A. ARCnet
B. 10Base-T
C. 100Base-TX
D. IBM token ring
Answer» E.
29.

The printing speed of page printer is very high and the output is __________ at a time.

A. Three
B. Multiple
C. Ten
D. A page
Answer» E.
30.

Software that resides on a single computer and does not interact with any other softwareinstalled in a different computer.

A. Stand- Alone Software
B. Embedded Software
C. Real- Time Software
D. Network Software
Answer» B. Embedded Software
31.

_______ refers to the mode in which memory location can be accessed in any order in thesame amount of time.

A. Sequential access
B. Direct access
C. Random Access Memory (RAM)
D. None of the above
Answer» D. None of the above
32.

If a disk pack consists of 4 plates each having 2655 tracks having 125 sectors per track.Also, each sector can store 512 bytes, then, storage capacity is approximately.

A. 1 MB
B. 1GB
C. 1 X 1010 bytes
D. 10 GB
Answer» C. 1 X 1010 bytes
33.

The page printers are _______________ speed non-impact printers.

A. Slow
B. High
C. Medium
D. Fixed
Answer» C. Medium
34.

Inserting spurious data or information into an organization’s system to disrupt oroverload services is called

A. Interruption
B. Interception
C. Modification
D. Fabrication
Answer» E.
35.

The storage and rapid access to electronic medical records and its instant transmissionover the Internet in large amounts is called ____________________

A. Teleconsulting
B. Accumulator (AC)
C. Instruction Register (IR)
D. Program Counter (PC)
Answer» B. Accumulator (AC)
36.

The function of _______ is to get the computer software operating when the power isturned on.

A. Bootstrap Loader
B. Cache memory
C. RAM
D. ROM
Answer» B. Cache memory
37.

MS-DOS is a ________ operating system offered by Microsoft.

A. Single-user, single tasking
B. Single user, multitasking
C. Multiuser, multitasking
D. Multiuser, single tasking
Answer» B. Single user, multitasking
38.

__________ is a process of executing programs one after the other using a batch fileprogram.

A. Multitasking
B. Multiprogramming
C. Time sharing
D. Batch processing
Answer» E.
39.

_________ stores binary information in the form of electric charges that are applied tocapacitors inside the chip.

A. RAM
B. SRAM
C. DRAM
D. ROM
Answer» D. ROM
40.

The _____________ processes the set of instructions along with any calculations andcomparisons to complete the task.

A. Keyboard
B. Motherboard
C. CPU
D. Either (A) or (C)
Answer» D. Either (A) or (C)
41.

_____________ are used to transfer user data and instructions to the computer

A. Output
B. Processors
C. Input
D. Either (A) or (C)
Answer» D. Either (A) or (C)
42.

In ___________stored information is erased by exposing the chip for a while toultraviolet light.

A. EPROM
B. ROM
C. PROM
D. UVEROM
Answer» E.
43.

Web camera is used for video _____________.

A. Conferencing
B. Security
C. Control Input Device
D. All the above
Answer» E.
44.

_________ is the lower part of TCP/IP whose function is to handle the address part ofeach packet to enable it to be delivered to the right destination.

A. IP
B. TCP
C. FTP
D. Telnet
Answer» B. TCP
45.

The most familiar means of entering information into a computer is through a typewriterlike keyboard that allows a person to enter __________________ information directly.

A. Alphabets
B. Symbols
C. Alphanumeric
D. Numeric
Answer» D. Numeric
46.

Computers have secondary storage devices known as___________

A. ALU
B. Auxiliary storage
C. CPU
D. None of the above
Answer» C. CPU
47.

Inter-track gaps are used to separate the adjacent tracks so that the interference ofmagnetic fields is ________.

A. Minimized
B. Maximized
C. Expanded
D. None of the above
Answer» B. Maximized
48.

These types of computers are primarily involved in data processing and problem solvingfor specific programs.

A. Compact Computers
B. Digital computers
C. Hybrid Computers
D. Analog Computers
Answer» C. Hybrid Computers
49.

A ________ is typically a database containing information about domain names and theircorrespondence IP address.

A. Telnet
B. FTP
C. TCP
D. DNS
Answer» E.
50.

Another popular _______________ arrangement, called Dvorak system, was designedfor easy learning and use.

A. Key
B. Line
C. Group
D. Numeric
Answer» B. Line