Quiz on Computers G.K.

Multiple Choice Questions - Information Technology Related Questions

1. A computer virus normally attaches itself to another computer programme known as a

  1. Backdoor programme
  2. Target programme
  3. Trojan horse
  4. Host programme

2. One byte consists of

  1. four bits
  2. one bit
  3. ten bit
  4. eight bits

3. The amount of time required by a storage device to retrieve data and programmes is its

  1. Retrieval speed
  2. Capacity
  3. Memory
  4. Access speed

4. ENIAC was

  1. an electronic computer
  2. an engine
  3. a memory device
  4. an electronic calculator

5. Which of these describes attempts by individuals to obtain confidential information from a computer user by falsifying their identity?

  1. Fishing
  2. Computer viruses
  3. Spyware
  4. Phishing

6. The first computer made available for commercial use was

  1. MANIAC
  2. ENIAC
  3. UNIVAC
  4. EDSAC

7. A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage can be called a

  1. Hacker
  2. Spammer
  3. Analyst
  4. Programmer

8. A 32-bit word computer can access _____ bytes at a time.

  1. 4
  2. 8
  3. 16
  4. 32

9. The process of transferring files from the Internet to your computer is called

  1. Downloading
  2. Uploading
  3. File Transfer Protocol
  4. Hypertext Transfer Protocol

10. The ____ shows all the web sites any pages that you have visited one a period of time.

  1. Status bar
  2. Task bar
  3. History list
  4. Tool bar

11. The language which provides basic building blocks for web pages is known as

  1. HTML
  2. C language
  3. Java
  4. Javascript

12. In the URL, http//:www.leadthecompetition.in, the portion labelled http is the ____

  1. Host
  2. Domain name
  3. Protocol
  4. Top-level domain

13. Which of the following is a read only memory storage device?

  1. Floppy Disk
  2. Hard Disk
  3. CDROM
  4. Flash Drive

14. A repair for a known software bug usually available at no charge on the internet is called a

  1. Patch
  2. Version
  3. Tutorial
  4. FAQ

15. Which of the following connects the computer to a telephone line?

  1. Processor
  2. Modem
  3. USB Drive
  4. Multiplexer

16. What is an e-mail attachment?

  1. A receipt sent by the recipient
  2. A separate document from another programme sent along with an e-mail message
  3. A malicious parasite that feeds off of your message and destroys the contents
  4. A list of GC, or BCC, recipients

17. If a file has a '.bak' extension it refers usually to -

  1. Backup file
  2. Audio file
  3. Temporary file
  4. Deleted file

18. The window which shows icons for things like the mouse, sound, and display is called

  1. My Computer
  2. Explorer
  3. Control Panel
  4. Taskbar

19. What kind of file has an extension '.mpg'?

  1. Word Document file
  2. Spreadsheet document
  3. Movie file
  4. Image file

20. Which of the following is not real security and privacy risks?

  1. Hackers
  2. Spam
  3. Viruses
  4. Identity theft

21. Which of the following defines the ability to recover and read deleted or damaged files from a criminal’s computer?

  1. Robotics
  2. Simulation
  3. Computer forensics
  4. Animation

22. The difference between people with internet access and those without it is known as the

  1. Digital divide
  2. Internet divide
  3. Web divide
  4. Broadband divide

23. The smallest unit in a digital system is a

  1. byte
  2. bit
  3. word
  4. character

24. Which of the following is a web browser?

  1. Macromedia Flash
  2. Microsoft Powerpoint
  3. Netscape Navigator
  4. Adobe Dreamweaver

25. Junk e-mail is also called ____

  1. Spam
  2. Spoof
  3. Sniffer script
  4. Spool


26. Who of the following is the founder of Facebook?

  1. Tim Berners Lee
  2. Jimmy Wales
  3. Julian Assange
  4. Mark Zuckerburg

27. In which of the following areas, spreadsheet software is more useful?

  1. Psychology
  2. Publishing
  3. Statistics
  4. Message sending

28. What is windows explorer?

  1. A drive
  2. APC
  3. A web browser
  4. A file manager

29. Which of the following terms refers to unwanted and unsolicited e-mails received by us?

  1. spam
  2. subscriptions
  3. rubbish
  4. trash

30. A Groupware is a

  1. Hardware
  2. Software
  3. Network
  4. Firmware

31. A DVD is An example of a/an

  1. Hard disk
  2. Optical disk
  3. Output device
  4. Solid state storage device

32. A word in a web page that, when clicked opens another document is called

  1. Anchor
  2. Hyperlink
  3. Preference
  4. URL

33. Which of the following is the most commonly used operating system?

  1. Windows
  2. UNIX
  3. Mac OS
  4. Linux

34. Windows 7, the operating system from Microsoft Corporation has ________ Indian languages fonts.

  1. 14
  2. 26
  3. 37
  4. 49

35. A megabyte is actually equal to ______ kilobytes

  1. 100
  2. 1000
  3. 1024
  4. 1028

36. Which of the following is an Indian social networking site launched by Patna-based brothers Nilay and Ankur Singh?

  1. Indiabook
  2. Jumpbook
  3. Kitabi Chehra
  4. Desibook

37. Which of the following was referred to as a 'three-finger salute' by Microsoft founder Mr. Bill Gates?

  1. control - alt - delete buttons
  2. stand-by - turn-off - start options
  3. scroll-lock - num lock and print screen buttons
  4. control - shift - alt buttons

38. What is the full form of GUI?

  1. Graphics User Instruction
  2. Graphical User Interface
  3. General User Intruction
  4. General User Interaction

39. Which command allows you to reduce fragments of file and optimize the performance of disk?

  1. Scandisk
  2. Diskcomp
  3. Chkdsk
  4. Defrag

40. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is

  1. Bridge
  2. Gateway
  3. Router
  4. Modem

41. What is a fraudulent practice of extracting details of someone's bank card or account illegally via phone known as?

  1. phising
  2. spamming
  3. vishing
  4. bombing

42. In a Database Management System (DBMS), the content and the location of the data is defined by the -

  1. metadata
  2. subdata
  3. sequence data
  4. multi dimensional data

43. Which of the following is the ascending order of data hierarchy?

  1. Bit - Byte - Record - Field - Database - File
  2. Byte - Bit - File - Record - Database - Field
  3. Bit - Byte - Field - Record - File - Database
  4. Field - Byte - Bit - Record - File - Database

44. A Computer executes Programs in the sequence of:

  1. Decode, Fetch, Execute
  2. Execute, Fetch, Decode
  3. Fetch, Decode, Execute
  4. Store, Fetch, Execute

45. The part of a computer system containing the circuitry that does the adding, subtracting, multiplying, dividing and comparing is called as

  1. Arithmetic-logic unit
  2. Control
  3. Memory
  4. CPU