Computer Objective Questions Practice Set -1

Last updated on August 26, 2021
4 mins read

1. One megabyte equals approximately
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes

Ans- 3

2. Data going into the computer is called?
1) Output
2) Algorithm
3) Input
4) Calculations
5) Flowchart

Ans- 3

3. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU

Ans- 1

4. When you are working on a document on PC, where is the
document temporarily stored?
1) RAM
2) ROM
3) The CPU
4) Flash memory
5) The CD-Rom

Ans- 1

5. Information travels between components on the motherboard
1) Flash memory
2) CMOS
3)Bays
4) Buses
5) Peripherals

Ans- 4

6. How are data organized in a spreadsheet?
1) Lines and spaces
2) Layers and planes
3) Height and width
4) Rows and columns
5) None of these

Ans- 4

7. Which of the following is true?
1) Byte is a single digit in a binary number
2) Bit represents a grouping of digital numbers
3) Eight-digit binary number is called a byte
4) Eight-digit binary number is called a bit
5) None of these

Ans- 3

8. Transformation of input into output is performed by?
1) Peripherals
2) Memory
3) Storage
4) The Input-Output unit
5) The CPU

Ans- 5

9. How many options do a binary choice offer?
1) None
2) One
3) Two
4) It depends on the amount of memory in the computer

Ans- 3

5) It depends on the speed of the computer’s processor
10. …..is a collection of web pages and ……is the very first page that
we see on the opening of a web-site
1) Home-page, Web-page
2) Web-site, Home-page
3) Web-page, Home-page
4) Web-page, Web-site
5) None of these

Ans- 2

11. When the pointer is positioned on a _____ it is shaped like a
hand.
1) Grammar error
2) Hyperlink
3) Screen tip
4) Spelling error
5) Formatting error

Ans- 2

12. The _____ of a system includes the programs or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these

Ans- 4

13. ‘www’ stands for _____
1) World Word Web
2) World Wide Web
3) World White Web
4) World Work Web
5) None of these

Ans- 2

14. What menu is selected to cut, copy, and paste?
1) File
2) Tools
3) Special
4) Edit
5) None

Ans- 4

15. You can use the tab key to
1) move a cursor across the screen
2) Indent a paragraph
3) Move the cursor down the screen
4) Only (1) and (2)
5) None of these

Ans- 2

16. The most important or powerful computer in a typical network is
_____
1) Desktop
2) Network client
3) Network server
4) Network station
5) None of these

Ans- 3

17. Which of the following is an example of connectivity?
1) Internet
2) Floppy disk
3) Power cord
4) Data
5) None of these

Ans- 1

18. The ability to find an individual item in a file immediately _____
is used.
1) File allocation table
2) Directory
3) Sequential access
4) Direct access
5) None of these

Ans- 1

19. The primary purpose of the software is to turn data into _____
1) Websites
2) Information
3) Programs
4) Objects
5) None of these

Ans- 2

20. To what temporary area can you store text and other data, and
later paste them to another location?
1) The clipboard
2) ROM
3) CD-ROM
4) The hard disk
5) None of these

Ans- 1

21. Storage that retains its data after the power is turned off is
referred to as
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these

Ans- 2

22. _____is the science that attempts to produce machines that
display the same type of intelligence that humans do.
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None of these

Ans- 4

23. Changing an existing document is called _____ the document.
1) Creating
2) Editing
3) Modifying
4) Adjusting
5) None of these

Ans- 2

24. Computers use the _____ number system to store data and
perform calculations.
1) Decimal
2) Hexadecimal
3) Octal
4) Binary
5) None of these

Ans- 4

25. Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these

Ans- 4

26. The _____ key will launch the start buttons.
1) Esc
2) Shift
3) Windows
4) Shortcut
5) None of these

Ans- 3

27. _____is the process of finding errors in software code.
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these

Ans- 4

28. To move to the beginning of a line of text, press the _____ key.
1) Home
2) A
3) Page-up
4) Enter
5) None of these

Ans- 1

29. Virtual memory is
1) Memory on the hard disk that the CPU uses as an extended RAM
2) RAM
3) Only necessary if you do not have any RAM in your computer
4) A backup device for floppy disks
5) None of these

Ans- 2

30. A _____ contains specific rules and words that express the
logical steps of an algorithm.
1) Syntax
2) Programming structure
3) Programming language
4) Logic chart
5) None of these

Ans- 3

31. When sending an e-mail, the _____ line describes the contents
of the message.
1) to
2) subject
3) contents
4) CC
5) None of these

Ans- 2

32. The _____ tells the computer how to use its components.
1) Utility
2) Network
3) Operating system
4) Application program
5) None of these

Ans- 3

33. Which grouping do you work with when formatting text in word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections, and paragraphs
4) Indexes, characters and tables
5) None of these

Ans- 1

34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a
different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these

Ans- 2

35. Network components are connected to the same cable in the
_____ topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) Mixed

Ans- 2

36. This component is required to process data into information and
consists of integrated circuits.
1) Hard disk
2) RAM
3) CPU
4) ROM
5) None of these

Ans- 3

37. One advantage of dial-up-internet access is ___
1) It utilizes broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
5) None of these

Ans- 2

38. What is the term for unsolicited e-mail?
1) Newsgroup
2) Use net
3) Backbone
4) Flaming
5) Spam

Ans- 5

39. Two or more computers connected to each other of sharing
information form a _____
1) Network
2) Router
3) Server
4) Tunnel
5) Pipeline

Ans- 1

40. Computers that are portable and convenient for users who travel
are known as _____
1) Supercomputers
2) Laptops
3) Minicomputers
4) File servers
5) None of these

Ans- 2

41. A computer checks the _____ of user names and passwords for
a match before granting access.
1) Website
2) Network
3) Backup file
4) Database
5) None of these

Ans- 4

42. Office LANs that are spread geographically apart on a large
scale can be connected using a corporate _____
1) CAN
2) LAN
3) DAN
4) WAN
5) TAN

Ans- 4

43. The code for a Web page is written using _____
1) A fifth-generation language
2) Win Zip
3) Peripherals
4) Hypertext Markup Language
5) URL

Ans- 4

44. What is the process of copying software programs from
secondary storage media to the hard disk called?
1) Configuration
2) Download
3) Storage
4) Upload
5) Installation

Ans- 5

45. Small application programs that run on a web page and may
ensure a form is completed properly or provide animation are known
as _____
1) Flash
2) Spiders
3) Cookies
4) Applets
5) Sparks

Ans- 4

46. The first computers were programmed using _____
1) Assembly language
2) Machine language
3) Source code
4) Object code
5) Spaghetti code

Ans- 2

47. Which process checks to ensure the components of the
computer and operating are connected properly?
1) Booting
2) Processing
3) Saving
4) Editing
5) None of these

Ans- 1

48. In a relational database, this is a data structure that organizes
the information about a single topic into rows and columns.
1) Block
2) Record
3) Tuple
4) Table
5) Command-line interface

Ans- 4

49. How can the user determine what programs are available on a
computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed programs.
4) Checking the existing files saved on the disk
5) None of these

Ans- 4

50. When we run a program in HTML coding _____ is used as
backend and ____ works as front-end.
1) Notepad – Internet-Explorer
2) Notepad – Msn-messenger
3) MS-Word – Internet Explorer
4) Both (1) and (2)
5) None of these

Ans- 1

Leave a Reply

Latest Posts

Next Story

Computer Short Questions practice set-2

Latest from Blog

Computer Class PDF Download

In this Post we share some Important Questions that Help to your exam The _ may also be called the screen or monitor.(a) scanner(b) printer(c) hard disk(d) software(e) display The primary purpose
computer architecture

computer architecture

Computer architecture refers to the fundamental design and organization of a computer system, including the instruction set architecture (ISA), the memory architecture, and the microarchitecture. It encompasses both the hardware and software
Go toTop