0% found this document useful (0 votes)
6 views27 pages

Puter Basic

The document contains a series of multiple-choice questions (MCQs) related to computer basics, covering topics such as input devices, programming languages, operating systems, and networking concepts. Each question is followed by the correct answer, providing a comprehensive overview of fundamental computer knowledge. It serves as a study guide for individuals seeking to enhance their understanding of computer science principles.

Uploaded by

Rishit Prithiani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views27 pages

Puter Basic

The document contains a series of multiple-choice questions (MCQs) related to computer basics, covering topics such as input devices, programming languages, operating systems, and networking concepts. Each question is followed by the correct answer, providing a comprehensive overview of fundamental computer knowledge. It serves as a study guide for individuals seeking to enhance their understanding of computer science principles.

Uploaded by

Rishit Prithiani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Ashoka Center For Business and Computer Studies ,Nashik

COMPUTER BASICS MCQ


1. Which of the following is NOT an input device?
a) Keyboard
b) Mouse
c) Printer
d) Scanner
Answer: c) Printer
2. Which programming language is used for creating websites and web applications?
a) Java
b) Python
c) HTML
d) C++
Answer: c) HTML
3. What is the primary function of the CPU (Central Processing Unit)?
a) Storing data
b) Displaying graphics
c) Processing data
d) Sending data over the internet
Answer: c) Processing data
4. Which function key is used for opening help ?
a) F2
b) F3
c) F1
d) F4
Answer: c) F1
5. What does GUI stand for in the context of computers?
a) General User Interface
b) Graphical User Interface
c) General Use Interface
d) Graphics Unit Interface
Answer: b) Graphical User Interface

1
Ashoka Center For Business and Computer Studies ,Nashik

6. Which of the following is a type of volatile memory?


a) ROM (Read-Only Memory)
b) RAM (Random-Access Memory)
c) Hard Disk Drive (HDD)
d) Solid State Drive (SSD)
Answer: b) RAM (Random-Access Memory)
7. What does ISP stand for in the context of internet connectivity?
a) Internet Service Provider
b) Internet Service Protocol
c) Internet System Provider
d) Internet Signal Processor
Answer: a) Internet Service Provider
8. Which of the following file extensions is associated with a Word document?
a) .pdf
b) .doc
c) .txt
d) .exe
Answer: b) .doc
9. Which of the following programming languages is known for its simplicity and readability?
a) C++
b) Java
c) Python
d) Ruby
Answer: c) Python
10. What does HTTP stand for in the context of web browsing?
a) HyperText Transfer Protocol
b) High Transfer Text Protocol
c) Hyper Transfer Text Protocol
d) HyperText Transport Protocol
Answer: a) HyperText Transfer Protocol

2
Ashoka Center For Business and Computer Studies ,Nashik

11. Which of the following is NOT an example of an operating system?


a) Windows
b) macOS
c) Linux
d) Microsoft Office
Answer: d) Microsoft Office
12. What does the abbreviation “URL” stand for?
a) Universal Resource Locator
b) Uniform Resource Locator
c) Universal Resolution Link
d) Unified Resource Locator
Answer: b) Uniform Resource Locator
13. Which of the following is the shortcut key to open a ‘New Blank’ document in MS-Word?
a) CTRL + D
b) CTRL + M
c) CTRL + B
d) CTRL + N
Answer: d) CTRL + N
14. What is the full form of “PDF” in the context of document formats?
a) Portable Document Format
b) Pretty Document Format
c) Public Data Format
d) Printable Document Format
Answer: a) Portable Document Format
15. What is the full form of COBOL?
a) Common Business Oriented Language
b) Computer Based Operating Language
c) Computer Basic Oriented Language
d) Common Basic Operating Language
Answer: a) Common Business Oriented Language

3
Ashoka Center For Business and Computer Studies ,Nashik

16. What is the purpose of an Ethernet cable in a network?


a) To connect the printer to the computer
b) To provide power to network devices
c) To connect computers in a LAN
d) To connect the monitor to the CPU
Answer: c) To connect computers in a LAN
17. Which of the following is NOT a web browser?
a) Google Chrome
b) Mozilla Firefox
c) Microsoft Word
d) Safari
Answer: c) Microsoft Word
18. Which component of the computer is responsible for processing graphics and visuals?
a) CPU
b) GPU
c) RAM
d) HDD
Answer: b) GPU
19. What does SSL stand for in the context of internet security?
a) Secure Socket Layer
b) Secure System Link
c) System Security Layer
d) Safe Socket Link
Answer: a) Secure Socket Layer
20. Which of the following is the correct full form of JPEG?
a) Joint Pixel Experts Group
b) Joint Photography Exports Group
c) Joint Photographic Experts Group
d) Joint Pixel Exports Group
Answer: c) Joint Photographic Experts Group

4
Ashoka Center For Business and Computer Studies ,Nashik

21. Which of the following is a programming language commonly used for creating mobile
apps?
a) C++
b) Java
c) HTML
d) PHP
Answer: b) Java
22. What is the function of an antivirus software?
a) To create backups of files
b) To optimize computer performance
c) To protect against malware and viruses
d) To clean temporary internet files
Answer: c) To protect against malware and viruses
23. Which of the following is NOT a type of computer memory?
a) RAM
b) ROM
c) HDD
d) CPU
Answer: d) CPU
24. Convert the hexadecimal number C6 to binary number.
a) 11000110
b) 10100110
c) 10110111
d) 10010110
Answer: a) 11000110
25. What does the abbreviation “LAN” stand for in the context of networking?
a) Local Area Network
b) Large Area Network
c) Longitudinal Access Network
d) Low-latency Area Network
Answer: a) Local Area Network

5
Ashoka Center For Business and Computer Studies ,Nashik

26. What is the purpose of a router in a home network?


a) To store and manage files
b) To connect multiple computers together
c) To connect the home network to the internet
d) To scan documents and photos
Answer: c) To connect the home network to the internet
27. Which of the following is an example of a spreadsheet software?
a) Microsoft Excel
b) Adobe Photoshop
c) Microsoft Word
d) Microsoft PowerPoint
Answer: a) Microsoft Excel
28. Which programming language is primarily used for front-end web development?
a) Java
b) Python
c) JavaScript
d) Ruby
Answer: c) JavaScript
29. Third generation computers used _______________
a) Integrated circuits
b) Vacuum tubes
c) VLSI technique
d) Transistors
Answer: a) Integrated circuits
30. What is the purpose of a firewall in computer security?
a) To protect against physical theft of the computer
b) To prevent overheating of the CPU
c) To filter and block unauthorized network traffic
d) To secure data on the hard drive
Answer: c) To filter and block unauthorized network traffic
31. What does the abbreviation “CPU” stand for in the context of computers?

6
Ashoka Center For Business and Computer Studies ,Nashik

a) Central Processing Unit


b) Computer Processing Unit
c) Control Processing Unit
d) Core Processing Unit
Answer: a) Central Processing Unit
32. What is the purpose of a modem in computer networking?
a) To connect multiple computers in a network
b) To convert digital signals to analog signals for transmission over telephone lines
c) To provide power to network devices
d) To manage network traffic
Answer: b) To convert digital signals to analog signals for transmission over telephone lines
33. Which programming language is often used for game development?
a) Java
b) C++
c) Python
d) Ruby
Answer: b) C++
34. What does HTML stand for in the context of web development?
a) Hyper Text Markup Language
b) High Text Markup Language
c) Hyperlinks and Text Markup Language
d) Home Tool Markup Language
Answer: a) Hyper Text Markup Language
35. Which of the following is NOT a type of computer memory?
a) RAM
b) ROM
c) GPU
d) Cache
Answer: c) GPU
36. Which of the following belongs to the category of fourth generation languages?
a) High-level language

7
Ashoka Center For Business and Computer Studies ,Nashik

b) Machine language
c) Query language
d) Assembly language
Answer: c) Query language
37. What does DNS stand for in the context of the internet?
a) Dynamic Network System
b) Domain Name Service
c) Digital Name Server
d) Data Network System
Answer: b) Domain Name Service
38. Which of the following is a programming language used for building Android apps?
a) Swift
b) C#
c) Java
d) PHP
Answer: c) Java
39. Which of the following is an antivirus?
a) Norton
b) Worms
c) Trojan Horse
d) Macro Virus
Answer: a) Norton
40. What is the purpose of an SSD (Solid State Drive) in a computer?
a) To provide temporary storage for data
b) To store the operating system and software applications
c) To connect peripheral devices to the computer
d) To connect the computer to the internet
Answer: b) To store the operating system and software applications
41. Which of the following is a type of cloud computing service that provides virtualized
computing resources over the internet?
a) Software as a Service (SaaS)

8
Ashoka Center For Business and Computer Studies ,Nashik

b) Platform as a Service (PaaS)


c) Infrastructure as a Service (IaaS)
d) Network as a Service (NaaS)
Answer: c) Infrastructure as a Service (IaaS)
42. What does VPN stand for in the context of computer networking?
a) Virtual Personal Network
b) Virtual Private Network
c) Virtual Public Network
d) Virtual Protocol Network
Answer: b) Virtual Private Network
43. Which of the following is a high-level programming language commonly used for scientific
computing, data analysis, and machine learning?
a) JavaScript
b) Python
c) C++
d) PHP
Answer: b) Python
44. What is the full form of PNG in the computer image format?
a) Printable New Graphical
b) Portable Network Graphics
c) Port Natural Graphics
d) Portable Network Graphics
Answer: b) Portable Network Graphics
45. What is the purpose of a compiler in programming?
a) To convert high-level code to machine code
b) To optimize the performance of a computer
c) To create user interfaces
d) To connect multiple computers in a network
Answer: a) To convert high-level code to machine code
46. Which component of a computer is responsible for displaying visual output on the screen?
a) RAM

9
Ashoka Center For Business and Computer Studies ,Nashik

b) GPU
c) CPU
d) HDD
Answer: b) GPU
47. What does SQL stand for in the context of databases?
a) Structured Query Language
b) Standard Query Language
c) Sequential Query Language
d) System Query Language
Answer: a) Structured Query Language
48. Which of the following is NOT a search engine?
a) Safari
b) Yahoo
c) Ask
d) Bing
Answer: a) Safari
49. Which of the following is a cloud-based document collaboration and storage service
provided by Google?
a) OneDrive
b) iCloud
c) Dropbox
d) Google Drive
Answer: d) Google Drive
50. Which of the following requires a device driver?
a) Register
b) Disk
c) Cache
d) Main memory
Answer: b) Disk
51. What does the abbreviation “BIOS” stand for in the context of computers?
a) Basic Input/Output System

10
Ashoka Center For Business and Computer Studies ,Nashik

b) Basic Integrated Operating System


c) Binary Input/Output Software
d) Base Internal Operating System
Answer: a) Basic Input/Output System
52. Which of the following is an example of an email client software?
a) Microsoft Word
b) Mozilla Thunderbird
c) Google Chrome
d) Adobe Photoshop
Answer: b) Mozilla Thunderbird
53. In MS Excel worksheet, you can select ______
a) Rows
b) Columns
c) The entire worksheet
d) all of the above
Answer: d) all of the above
54. Which programming language is known for its use in web development for creating
dynamic web pages?
a) C++
b) Ruby
c) JavaScript
d) Java
Answer: c) JavaScript
55. Which one of the following is computer high-level programming language?
a) BASIC
b) PASCAL
c) COBOL
d) all of the above
Answer: d) all of the above
56. What is the function of an operating system?
a) To protect the computer from viruses

11
Ashoka Center For Business and Computer Studies ,Nashik

b) To provide a user interface for the user


c) To manage hardware and software resources
d) To perform mathematical calculations
Answer: c) To manage hardware and software resources
57. What is the purpose of a UPS (Uninterruptible Power Supply) in a computer system?
a) To provide temporary storage for data
b) To connect the computer to the internet
c) To protect the computer from power fluctuations and outages
d) To manage network traffic
Answer: c) To protect the computer from power fluctuations and outages
58. Which of the following is a markup language used for structuring content on the web?
a) CSS
b) XML
c) JSON
d) HTML
Answer: d) HTML
59. What does LAN Card (NIC) stand for in computer networking?
a) Local Area Network Card
b) Local Access Network Card
c) Large Area Network Card
d) Localized Area Network Card
Answer: a) Local Area Network Card
60. The process of transferring files from Internet to user Computer is called:
a) Uploading
b) JPEG
c) Downloading
d) FTP
Answer: c) Downloading
61. Which of the following is an example of system software?
a) Microsoft Word
b) Google Chrome

12
Ashoka Center For Business and Computer Studies ,Nashik

c) Windows 10
d) Adobe Photoshop
Answer: c) Windows 10
62. What is the purpose of an antivirus software?
a) To create backups of files
b) To optimize computer performance
c) To protect against malware and viruses
d) To clean temporary internet files
Answer: c) To protect against malware and viruses
63. Which is the shortcut key to find and replace action in MS-Word?
a) Ctrl + A
b) Ctrl + H
c) Ctrl + D
d) Ctrl + R
Answer: b) Ctrl + H
64. Which of the following is a programming paradigm that emphasizes the use of objects and
classes?
a) Functional Programming
b) Object-Oriented Programming
c) Procedural Programming
d) Event-Driven Programming
Answer: b) Object-Oriented Programming
65. What does SSL/TLS stand for in the context of internet security?
a) Secure System Layer / Transport Layer Security
b) Secure Socket Layer / Transport Layer Security
c) Secure Socket Link / Trusted Link Security
d) Secure System Link / Trusted Link Security
Answer: b) Secure Socket Layer / Transport Layer Security
66. What is the purpose of an “operating system” in a computer?
[A] To browse the internet
[B] To create documents

13
Ashoka Center For Business and Computer Studies ,Nashik

[C] To manage hardware and software resources


[D] To design graphics
Correct Answer: C [To manage hardware and software resources]
Explanation: An operating system (OS) is responsible for managing hardware and software
resources, providing a user interface, and controlling system operations.computer mcq for mp
patwari in English

67. Which of the following is NOT a commonly used web development technology for creating
web pages?
[A] HTML
[B] CSS
[C] JavaScript
[D] Java
Correct Answer: D [Java]
Explanation: While Java can be used for web development, it is not as commonly used for
creating web pages as HTML, CSS, and JavaScript.
68. What does CPU stand for in the context of computers?
[A] Central Processing Unit
[B] Computer Power Unit
[C] Central Program Unit
[D] Common Processing Unit
Correct Answer: A [Central Processing Unit]
Explanation: CPU stands for Central Processing Unit. It is often referred to as the “brain” of
the computer and is responsible for executing instructions and performing calculations.
69. Which of the following file extensions typically represents an executable program in
Windows?
[A] .txt
[B] .docx
[C] .exe
[D] .jpg
Correct Answer: C [.exe]
Explanation: In Windows, executable programs are typically represented by files with the .exe
(executable) file extension. These files can be run to launch applications or perform specific
tasks.

14
Ashoka Center For Business and Computer Studies ,Nashik

70. What does “ISP” stand for in the context of internet services?
[A] Internet Search Provider
[B] Internet Service Provider
[C] Internet Security Protocol
[D] Internet Source Provider
Correct Answer: B [Internet Service Provider]
Explanation: ISP stands for Internet Service Provider, which is a company that provides
internet access to customers.
71. Which of the following is a commonly used web browser developed by Microsoft?
[A] Firefox
[B] Chrome
[C] Edge
[D] Safari
Correct Answer: C [Edge]
Explanation: Microsoft Edge is a commonly used web browser developed by Microsoft.
Feel free to ask for more questions or explanations if needed!
72. Which of the following programming languages is primarily used for web development
and design?
[A] Python
[B] Java
[C] JavaScript
[D] C++
Correct Answer: C [JavaScript]
Explanation: JavaScript is a programming language primarily used for web development. It
enables the creation of interactive and dynamic web content.
73. What does the acronym URL stand for in the context of web addresses?
[A] Uniform Resource Locator
[B] Universal Record Locator
[C] Unified Resource Listing
[D] Uniform Retrieval Link
Correct Answer: A [Uniform Resource Locator]

15
Ashoka Center For Business and Computer Studies ,Nashik

Explanation: URL stands for Uniform Resource Locator. It is a standardized address used to
locate and access resources on the internet, such as web pages, files, and documents.
74. Which of the following is an example of a cloud storage service?
[A] Microsoft Word
[B] Google Drive
[C] Adobe Photoshop
[D] Windows Media Player
Correct Answer: B [Google Drive]
Explanation: Google Drive is a cloud storage service that allows users to store, synchronize,
and share files and documents online. It is a popular platform for cloud-based file storage and
collaboration.
75. What is the purpose of a firewall in network security?
[A] Printing documents
[B] Blocking unauthorized access
[C] Sending emails
[D] Playing games
Correct Answer: B [Blocking unauthorized access]
Explanation: A firewall is a network security device or software that is designed to block
unauthorized access to a network or computer system. It acts as a barrier between a trusted
internal network and untrusted external networks, helping to protect against malicious activities
and cyberattacks.
76. What is the primary function of an operating system?
[A] Running applications
[B] Managing hardware resources
[C] Playing games
[D] Printing documents
Correct Answer: B [Managing hardware resources]
Explanation: An operating system serves as the intermediary between computer hardware and
software applications. Its primary role is to manage and allocate hardware resources such as
CPU, memory, storage, and peripherals to ensure smooth and efficient execution of software
applications.
77. Which of the following is a volatile memory type in a computer?
[A] Hard Disk Drive (HDD)
[B] Random Access Memory (RAM)

16
Ashoka Center For Business and Computer Studies ,Nashik

[C] Central Processing Unit (CPU)


[D] Solid State Drive (SSD)
Correct Answer: B [Random Access Memory (RAM)]
Explanation: RAM (Random Access Memory) is a volatile memory type in a computer. It
temporarily stores data that is actively being used by running applications but loses its content
when the computer is powered off.
78. What does CPU stand for in the context of computers?
[A] Central Processing Unit
[B] Computer Power Unit
[C] Central Program Unit
[D] Common Processing Unit
Correct Answer: A [Central Processing Unit]
Explanation: CPU stands for Central Processing Unit. It is often referred to as the “brain” of
the computer and is responsible for executing instructions and performing calculations.
79. Which of the following file extensions typically represents an executable program in
Windows?
[A] .txt
[B] .docx
[C] .exe
[D] .jpg
Correct Answer: C [.exe]
Explanation: In Windows, executable programs are typically represented by files with the .exe
(executable) file extension. These files can be run to launch applications or perform specific
tasks.
80. What is the primary function of an internet browser?
[A] Playing music
[B] Sending emails
[C] Navigating websites
[D] Editing documents
Correct Answer: C [Navigating websites]
Explanation: An internet browser’s primary function is to navigate and display websites. It
allows users to access web pages, view content, and interact with online resources.
81. What is the full form of HTML, a standard language for creating web pages?

17
Ashoka Center For Business and Computer Studies ,Nashik

[A] Hyper Transfer Markup Language


[B] High-Level Text Markup Language
[C] Hyperlink and Text Markup Language
[D] Hypertext Markup Language
Correct Answer: D [Hypertext Markup Language]
Explanation: HTML stands for Hypertext Markup Language. It is the standard markup
language used to create web pages and define their structure and content.
82. Which of the following programming languages is primarily used for web development
and design?
[A] Python
[B] Java
[C] JavaScript
[D] C++
Correct Answer: C [JavaScript]
Explanation: JavaScript is a programming language primarily used for web development. It
enables the creation of interactive and dynamic web content.
83. What does the acronym URL stand for in the context of web addresses?
[A] Uniform Resource Locator
[B] Universal Record Locator
[C] Unified Resource Listing
[D] Uniform Retrieval Link
Correct Answer: A [Uniform Resource Locator]
Explanation: URL stands for Uniform Resource Locator. It is a standardized address used to
locate and access resources on the internet, such as web pages, files, and documents.
84. Which of the following is an example of a cloud storage service?
[A] Microsoft Word
[B] Google Drive
[C] Adobe Photoshop
[D] Windows Media Player
Correct Answer: B [Google Drive]
Explanation: Google Drive is a cloud storage service that allows users to store, synchronize,
and share files and documents online. It is a popular platform for cloud-based file storage and
collaboration.

18
Ashoka Center For Business and Computer Studies ,Nashik

85. What is the purpose of a firewall in network security?


[A] Printing documents
[B] Blocking unauthorized access
[C] Sending emails
[D] Playing games
Correct Answer: B [Blocking unauthorized access]
Explanation: A firewall is a network security device or software that is designed to block
unauthorized access to a network or computer system. It acts as a barrier between a trusted
internal network and untrusted external networks, helping to protect against malicious activities
and cyberattacks.
86. What is the purpose of an internet protocol (IP) address?
[A] To identify a website’s owner
[B] To uniquely identify a computer or device on a network
[C] To encrypt internet traffic
[D] To block spam emails
Correct Answer: B [To uniquely identify a computer or device on a network]
Explanation: An IP address is used to uniquely identify a computer or device on a network. It
allows data packets to be routed to the correct destination across the internet.
87. Which of the following file formats is commonly used for documents, such as research
papers and reports?
[A] .txt
[B] .pdf
[C] .mp3
[D] .jpg
Correct Answer: B [.pdf]
Explanation: The .pdf (Portable Document Format) file format is commonly used for
documents, especially for sharing research papers, reports, and other text-heavy content.
88. What does the term “URL” stand for in the context of web addresses?
[A] Universal Resource Locator
[B] Uniform Retrieval Link
[C] Unified Resource Listing
[D] Unique Resource Link
Correct Answer: A [Universal Resource Locator]

19
Ashoka Center For Business and Computer Studies ,Nashik

Explanation: URL stands for Universal Resource Locator. It is a standardized address used to
locate and access resources on the internet.
89. Which programming language is often used for developing mobile applications for
Android devices?
[A] Swift
[B] C++
[C] Java
[D] Ruby
Correct Answer: C [Java]
Explanation: Java is commonly used for developing mobile applications for Android devices.
Android app development often relies on Java programming.
90. What is the purpose of a “cookie” in web browsing?
[A] To store passwords securely
[B] To improve website performance
[C] To track user activity and preferences
[D] To block pop-up ads
Correct Answer: C [To track user activity and preferences]
Explanation: Cookies are used to track user activity and preferences on websites. They can
store information such as login status and user preferences.
91. Which computer component is responsible for temporarily storing data that the CPU is
currently working on?
[A] Hard Disk Drive (HDD)
[B] Central Processing Unit (CPU)
[C] Random Access Memory (RAM)
[D] Graphics Processing Unit (GPU)
Correct Answer: C [Random Access Memory (RAM)]
92. What is the primary function of an antivirus software program?
[A] Playing games
[B] Sending emails
[C] Blocking websites
[D] Detecting and removing malware
Correct Answer: D [Detecting and removing malware]

20
Ashoka Center For Business and Computer Studies ,Nashik

Explanation: Antivirus software is designed to detect and remove malware (malicious


software) from a computer. It helps protect the system from viruses, spyware, and other threats.
93. Which of the following is an example of an input device?
[A] Monitor
[B] Printer
[C] Keyboard
[D] Speaker
Correct Answer: C [Keyboard]
Explanation: A keyboard is an example of an input device. It allows users to input data and
commands into a computer.
94. Which programming language is often used for data analysis and scientific computing?
[A] PHP
[B] Python
[C] Ruby
[D] JavaScript
Correct Answer: B [Python]
Explanation: Python is often used for data analysis and scientific computing due to its
extensive libraries and ease of use in handling data.
95. What is the purpose of a “web server” in the context of hosting websites?
[A] To browse the internet
[B] To display website content to users
[C] To send emails
[D] To create graphics for websites
Correct Answer: B [To display website content to users]
Explanation: A web server’s primary function is to host and serve website content to users
when they access a website. It handles incoming requests and sends the appropriate web pages
to the users’ browsers.
96. Which of the following is a common programming language used for web development
on both the client and server sides?
[A] Java
[B] Python
[C] JavaScript
[D] C#

21
Ashoka Center For Business and Computer Studies ,Nashik

Correct Answer: C [JavaScript]


Explanation: JavaScript is a versatile programming language commonly used for web
development. It can be used on both the client side (in web browsers) and the server side (using
technologies like Node.js).
97. What does “HTTP” stand for in the context of web communication?
[A] HyperText Transmission Protocol
[B] HyperTransfer Text Protocol
[C] HyperText Transfer Protocol
[D] HyperTransfer Transmission Protocol
Correct Answer: C [HyperText Transfer Protocol]
Explanation: HTTP stands for HyperText Transfer Protocol. It is the foundation of data
communication on the World Wide Web, allowing web browsers to retrieve and display web
content.
98. Which of the following is NOT a type of computer virus?
[A] Trojan Horse
[B] Worm
[C] Firewall
[D] Ransomware
Correct Answer: C [Firewall]
Explanation: A firewall is a network security device, not a type of computer virus. Trojan
Horse, Worm, and Ransomware are examples of computer viruses and malware.
99. What is the purpose of a “CAPTCHA” in web forms?
[A] To enhance website design
[B] To block access to a website
[C] To test whether the user is a human or a bot
[D] To display advertisements
Correct Answer: C [To test whether the user is a human or a bot]
Explanation: CAPTCHA (Completely Automated Public Turing test to tell Computers and
Humans Apart) is used to verify that the user filling out a web form is a human and not an
automated bot.

Explanation: RAM (Random Access Memory) is responsible for temporarily storing data that
the CPU is currently working on. It provides fast access to data that is actively being used.
100. What does “URL” stand for in the context of web addresses?

22
Ashoka Center For Business and Computer Studies ,Nashik

[A] Universal Resource Locator


[B] Unified Resource Link
[C] Universal Retrieval Link
[D] Unified Retrieval Locator
Correct Answer: A [Universal Resource Locator]
Explanation: URL stands for Universal Resource Locator. It is a standardized address used to
locate and access resources on the internet.
101. Which of the following is an example of an open-source operating system?
[A] Windows
[B] macOS
[C] Linux
[D] iOS
Correct Answer: C [Linux]
Explanation: Linux is an example of an open-source operating system. It is freely available and
can be modified and distributed by anyone.
102. What is the primary purpose of a search engine like Google?
[A] Sending emails
[B] Playing online games
[C] Providing weather updates
[D] Retrieving and ranking web search results
Correct Answer: D [Retrieving and ranking web search results]
Explanation: The primary purpose of a search engine like Google is to retrieve and rank web
search results based on user queries.
103. Which of the following storage devices is non-volatile, meaning it retains data even
when the power is turned off?
[A] Hard Disk Drive (HDD)
[B] Solid State Drive (SSD)
[C] USB Flash Drive
[D] CD-ROM
Correct Answer: B [Solid State Drive (SSD)]
Explanation: Solid State Drives (SSDs) are non-volatile storage devices, meaning they retain
data even when the power is turned off. They do not have moving parts like HDDs.
104. Which of the following is NOT a commonly used web browser?

23
Ashoka Center For Business and Computer Studies ,Nashik

[A] Google Chrome


[B] Microsoft Word
[C] Mozilla Firefox
[D] Apple Safari
Correct Answer: B [Microsoft Word]
Explanation: Microsoft Word is not a web browser; it is a word processing software
application. The others listed are web browsers.
105. What does “URL” stand for in the context of web development?
[A] Universal Resource Link
[B] Uniform Resource Locator
[C] Unified Retrieval Link
[D] Unique Resource Locator
Correct Answer: B [Uniform Resource Locator]
Explanation: URL stands for Uniform Resource Locator in the context of web development. It
is a standardized address used to locate and access resources on the internet.
106. What does “HTML” stand for in web development?
[A] Hyperlink Text Markup Language
[B] Hyper Transfer Markup Language
[C] Hyperlink and Text Markup Language
[D] Hypertext Markup Language
Correct Answer: D [Hypertext Markup Language]
Explanation: HTML stands for Hypertext Markup Language, which is used to create web pages
and structure their content.
107. Which of the following programming languages is known for its use in web
development for creating dynamic and interactive web applications?
[A] Java
[B] C#
[C] PHP
[D] COBOL
Correct Answer: C [PHP]
Explanation: PHP is a popular programming language for web development, especially for
creating dynamic and interactive web applications.
108. What is the purpose of a “firewall” in network security?

24
Ashoka Center For Business and Computer Studies ,Nashik

[A] To protect against physical damage to hardware


[B] To prevent unauthorized access to a network
[C] To increase internet speed
[D] To organize network cables
Correct Answer: B [To prevent unauthorized access to a network]
Explanation: A firewall is a network security device or software that is used to prevent
unauthorized access to or from a private network. It acts as a barrier between a trusted network
and untrusted networks, such as the internet.
109. Which type of software is designed to harm or exploit computer systems and data?
[A] Antivirus software
[B] Firewall software
[C] Malware
[D] Spreadsheet software
Correct Answer: C [Malware]
Explanation: Malware is a type of software that is designed to harm or exploit computer
systems and data. It includes viruses, worms, Trojans, and other malicious programs.
110. Which of the following is an example of an open-source operating system?
[A] Windows
[B] macOS
[C] Linux
[D] Android
Correct Answer: C [Linux]
Explanation: Linux is an example of an open-source operating system. It is freely available and
can be modified and distributed by anyone.
111. What does “LAN” stand for in the context of networking?
[A] Local Access Network
[B] Large Area Network
[C] Long Access Network
[D] Local Area Network
Correct Answer: D [Local Area Network]
Explanation: LAN stands for Local Area Network, which is a network of interconnected
devices within a limited geographical area.

25
Ashoka Center For Business and Computer Studies ,Nashik

112. Which of the following is an example of cloud computing service that provides on-
demand storage for files and data?
[A] Google Maps
[B] Dropbox
[C] Facebook
[D] Microsoft Word
Correct Answer: B [Dropbox]
Explanation: Dropbox is an example of a cloud computing service that provides on-demand
storage for files and data, allowing users to access and sync their files across devices.
113. What is the primary function of a “router” in a computer network?
[A] To display web pages
[B] To store data
[C] To connect devices within a network and route data between them
[D] To create animations
Correct Answer: C [To connect devices within a network and route data between them]
Explanation: A router’s primary function in a computer network is to connect devices within
the network and route data between them, allowing devices to communicate with each other
and with external networks.
114. Which of the following is NOT a commonly used web browser?
[A] Google Chrome
[B] Mozilla Firefox
[C] Microsoft Excel
[D] Apple Safari
Correct Answer: C [Microsoft Excel]
Explanation: Microsoft Excel is not a web browser; it is a spreadsheet software application.
The others listed are web browsers.
115. What does “CPU” stand for in the context of computer hardware?
[A] Central Processing Unit
[B] Central Power Unit
[C] Computer Peripheral Unit
[D] Control Processing Unit
Correct Answer: A [Central Processing Unit]

26
Ashoka Center For Business and Computer Studies ,Nashik

Explanation: CPU stands for Central Processing Unit, which is the primary component
responsible for executing instructions and performing calculations in a computer.
116. Which of the following is the correct full form of JPEG?
a) Joint Pixel Experts Group
b) Joint Photography Exports Group
c) Joint Photographic Experts Group
d) Joint Pixel Exports Group
Answer: c) Joint Photographic Experts Group

27

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy