
Computer General Knowledge
Computer Knowledge MCQs (40 Questions)
1. Fundamentals of Computers
What is the full form of CPU?
a) Central Processing Unit
b) Central Program Unit
c) Computer Processing Unit
d) Computer Program Unit
Answer: a) Central Processing UnitWhich of the following is NOT an input device?
a) Keyboard
b) Mouse
c) Printer
d) Scanner
Answer: c) PrinterWhat is the primary function of RAM?
a) Permanent storage
b) Temporary storage
c) Processing data
d) Displaying output
Answer: b) Temporary storageWhich of the following is a volatile memory?
a) ROM
b) RAM
c) Hard Disk
d) SSD
Answer: b) RAMWhat is the binary equivalent of the decimal number 10?
a) 1010
b) 1001
c) 1100
d) 1111
Answer: a) 1010
2. Operating Systems
Which of the following is an open-source operating system?
a) Windows
b) macOS
c) Linux
d) iOS
Answer: c) LinuxWhat is the main function of an operating system?
a) Manage hardware resources
b) Run applications
c) Provide a user interface
d) All of the above
Answer: d) All of the aboveWhich operating system is developed by Apple?
a) Windows
b) Linux
c) macOS
d) Android
Answer: c) macOSWhat is the extension of a batch file in Windows?
a) .exe
b) .bat
c) .txt
d) .cmd
Answer: b) .batWhich of the following is NOT a mobile operating system?
a) Android
b) iOS
c) Windows Phone
d) Linux Mint
Answer: d) Linux Mint
3. Programming Concepts
What is the output of
print(5 + 3 * 2)
in Python?
a) 16
b) 11
c) 10
d) 13
Answer: b) 11Which language is used for web development?
a) Java
b) HTML
c) C++
d) Python
Answer: b) HTMLWhat is the extension of a Python file?
a) .java
b) .py
c) .cpp
d) .html
Answer: b) .pyWhich of the following is a compiled language?
a) Python
b) Java
c) C++
d) JavaScript
Answer: c) C++What does IDE stand for?
a) Integrated Development Environment
b) Internal Development Environment
c) Integrated Design Environment
d) Internal Design Environment
Answer: a) Integrated Development Environment
4. Networking
What is the full form of LAN?
a) Local Area Network
b) Large Area Network
c) Logical Area Network
d) Linear Area Network
Answer: a) Local Area NetworkWhich device is used to connect multiple computers in a network?
a) Router
b) Switch
c) Modem
d) Hub
Answer: b) SwitchWhat is the default IP address for localhost?
a) 192.168.1.1
b) 127.0.0.1
c) 10.0.0.1
d) 172.16.0.1
Answer: b) 127.0.0.1Which protocol is used for sending emails?
a) HTTP
b) FTP
c) SMTP
d) TCP
Answer: c) SMTPWhat is the full form of DNS?
a) Domain Name System
b) Data Name System
c) Dynamic Name System
d) Domain Network System
Answer: a) Domain Name System
5. Databases
What is the full form of SQL?
a) Structured Query Language
b) Simple Query Language
c) Standard Query Language
d) Sequential Query Language
Answer: a) Structured Query LanguageWhich of the following is NOT a relational database?
a) MySQL
b) Oracle
c) MongoDB
d) PostgreSQL
Answer: c) MongoDBWhat is the primary key in a database?
a) A unique identifier for a record
b) A foreign key
c) A composite key
d) A secondary key
Answer: a) A unique identifier for a recordWhich command is used to delete a table in SQL?
a) DELETE
b) DROP
c) REMOVE
d) ERASE
Answer: b) DROPWhat is the extension of a MySQL database file?
a) .db
b) .sql
c) .mdb
d) .mysql
Answer: b) .sql
6. Web Technologies
What is the full form of HTML?
a) HyperText Markup Language
b) HyperText Machine Language
c) HyperText Markup Link
d) HyperText Machine Link
Answer: a) HyperText Markup LanguageWhich tag is used to create a hyperlink in HTML?
a)<link>
b)<a>
c)<href>
d)<hyperlink>
Answer: b)<a>
What is the full form of CSS?
a) Computer Style Sheets
b) Cascading Style Sheets
c) Creative Style Sheets
d) Colorful Style Sheets
Answer: b) Cascading Style SheetsWhich of the following is a front-end framework?
a) React
b) Node.js
c) Django
d) Flask
Answer: a) ReactWhat is the full form of URL?
a) Uniform Resource Locator
b) Universal Resource Locator
c) Uniform Resource Link
d) Universal Resource Link
Answer: a) Uniform Resource Locator
7. Cybersecurity
What is phishing?
a) A type of malware
b) A type of cyber attack to steal sensitive information
c) A type of hardware failure
d) A type of network protocol
Answer: b) A type of cyber attack to steal sensitive informationWhich of the following is a strong password?
a) 123456
b) Password
c) P@ssw0rd!
d) admin
Answer: c) P@ssw0rd!What is the full form of VPN?
a) Virtual Private Network
b) Virtual Public Network
c) Verified Private Network
d) Verified Public Network
Answer: a) Virtual Private NetworkWhich of the following is NOT a type of malware?
a) Virus
b) Worm
c) Firewall
d) Trojan
Answer: c) FirewallWhat is two-factor authentication?
a) Using two passwords
b) Using a password and a biometric scan
c) Using two different networks
d) Using two firewalls
Answer: b) Using a password and a biometric scan
8. Miscellaneous
What is the full form of PDF?
a) Portable Document Format
b) Printable Document Format
c) Portable Data Format
d) Printable Data Format
Answer: a) Portable Document FormatWhich of the following is a cloud storage service?
a) Google Drive
b) Dropbox
c) OneDrive
d) All of the above
Answer: d) All of the aboveWhat is the full form of USB?
a) Universal Serial Bus
b) Universal System Bus
c) Unique Serial Bus
d) Unique System Bus
Answer: a) Universal Serial BusWhich of the following is a programming language?
a) HTML
b) CSS
c) JavaScript
d) XML
Answer: c) JavaScriptWhat is the full form of AI?
a) Artificial Intelligence
b) Automated Intelligence
c) Advanced Intelligence
d) Applied Intelligence
Answer: a) Artificial Intelligence
9. Programming and AlgorithmsWhat is the time complexity of a linear search algorithm?
a) O(1)
b) O(log n)
c) O(n)
d) O(n^2)
Answer: c) O(n)Which data structure uses the LIFO principle?
a) Queue
b) Stack
c) Linked List
d) Tree
Answer: b) StackWhat is the output of
print(2 ** 3)
in Python?
a) 6
b) 8
c) 9
d) 23
Answer: b) 8Which of the following is NOT a programming paradigm?
a) Object-Oriented Programming
b) Procedural Programming
c) Functional Programming
d) Linear Programming
Answer: d) Linear ProgrammingWhat does the
len()
function do in Python?
a) Returns the length of a string or list
b) Converts a string to lowercase
c) Sorts a list
d) Reverses a string
Answer: a) Returns the length of a string or list
10. Web Development
Which tag is used to create an ordered list in HTML?
a)<ul>
b)<ol>
c)<li>
d)<dl>
Answer: b)<ol>
What is the purpose of the
<div>
tag in HTML?
a) To create a hyperlink
b) To define a section in a document
c) To insert an image
d) To create a table
Answer: b) To define a section in a documentWhich CSS property is used to change the text color?
a)font-color
b)text-color
c)color
d)background-color
Answer: c)color
What is the full form of XML?
a) Extensible Markup Language
b) Extended Machine Language
c) Extensible Machine Language
d) Extended Markup Language
Answer: a) Extensible Markup LanguageWhich of the following is a JavaScript framework?
a) Django
b) Flask
c) Angular
d) Laravel
Answer: c) Angular
11. Networking and Internet
What is the full form of HTTP?
a) HyperText Transfer Protocol
b) HyperText Transmission Protocol
c) HyperText Transfer Process
d) HyperText Transmission Process
Answer: a) HyperText Transfer ProtocolWhich port is used for HTTPS?
a) 80
b) 443
c) 21
d) 25
Answer: b) 443What is the full form of FTP?
a) File Transfer Protocol
b) File Transmission Protocol
c) File Transfer Process
d) File Transmission Process
Answer: a) File Transfer ProtocolWhich device connects two different networks?
a) Switch
b) Hub
c) Router
d) Modem
Answer: c) RouterWhat is the full form of MAC address?
a) Media Access Control
b) Machine Access Control
c) Media Address Control
d) Machine Address Control
Answer: a) Media Access Control
12. Databases
Which SQL command is used to insert data into a table?
a) ADD
b) INSERT
c) UPDATE
d) CREATE
Answer: b) INSERTWhat is the purpose of the
WHERE
clause in SQL?
a) To filter records
b) To sort records
c) To group records
d) To join tables
Answer: a) To filter recordsWhich of the following is a NoSQL database?
a) MySQL
b) PostgreSQL
c) MongoDB
d) Oracle
Answer: c) MongoDBWhat is the full form of DBMS?
a) Database Management System
b) Data Backup Management System
c) Database Manipulation System
d) Data Block Management System
Answer: a) Database Management SystemWhich SQL command is used to delete a database?
a) DELETE
b) DROP
c) REMOVE
d) ERASE
Answer: b) DROP
13. Cybersecurity
What is the purpose of a firewall?
a) To block unauthorized access
b) To speed up internet connectivity
c) To store data
d) To encrypt data
Answer: a) To block unauthorized accessWhich of the following is an example of symmetric encryption?
a) RSA
b) AES
c) SSL
d) TLS
Answer: b) AESWhat is the full form of SSL?
a) Secure Socket Layer
b) Secure System Layer
c) Secure Server Layer
d) Secure Software Layer
Answer: a) Secure Socket LayerWhich of the following is a type of cyber attack?
a) Phishing
b) Spoofing
c) DDoS
d) All of the above
Answer: d) All of the aboveWhat is the purpose of antivirus software?
a) To detect and remove malware
b) To improve internet speed
c) To encrypt data
d) To create backups
Answer: a) To detect and remove malware
14. Emerging Technologies
What is the full form of IoT?
a) Internet of Things
b) Internet of Technology
c) Internet of Tools
d) Internet of Tasks
Answer: a) Internet of ThingsWhich of the following is an example of IoT?
a) Smartwatch
b) Smart TV
c) Smart Refrigerator
d) All of the above
Answer: d) All of the aboveWhat is the full form of AI?
a) Artificial Intelligence
b) Automated Intelligence
c) Advanced Intelligence
d) Applied Intelligence
Answer: a) Artificial IntelligenceWhich of the following is a programming language used in AI?
a) Python
b) Java
c) C++
d) All of the above
Answer: d) All of the aboveWhat is the full form of VR?
a) Virtual Reality
b) Visual Reality
c) Virtual Response
d) Visual Response
Answer: a) Virtual Reality
15. Miscellaneous
What is the full form of BIOS?
a) Basic Input Output System
b) Binary Input Output System
c) Basic Integrated Operating System
d) Binary Integrated Operating System
Answer: a) Basic Input Output SystemWhich of the following is a high-level programming language?
a) Assembly
b) Python
c) Machine Language
d) Binary Code
Answer: b) PythonWhat is the full form of GUI?
a) Graphical User Interface
b) General User Interface
c) Graphical Unified Interface
d) General Unified Interface
Answer: a) Graphical User InterfaceWhich of the following is a version control system?
a) Git
b) SVN
c) Mercurial
d) All of the above
Answer: d) All of the aboveWhat is the full form of API?
a) Application Programming Interface
b) Advanced Programming Interface
c) Application Protocol Interface
d) Advanced Protocol Interface
Answer: a) Application Programming Interface16. Cloud Computing
What is the full form of SaaS?
a) Software as a Service
b) System as a Service
c) Storage as a Service
d) Security as a Service
Answer: a) Software as a ServiceWhich of the following is a cloud service provider?
a) AWS
b) Microsoft Azure
c) Google Cloud
d) All of the above
Answer: d) All of the aboveWhat is the full form of IaaS?
a) Infrastructure as a Service
b) Internet as a Service
c) Integration as a Service
d) Information as a Service
Answer: a) Infrastructure as a ServiceWhich cloud model provides both hardware and software resources?
a) Public Cloud
b) Private Cloud
c) Hybrid Cloud
d) Community Cloud
Answer: c) Hybrid CloudWhat is the full form of PaaS?
a) Platform as a Service
b) Program as a Service
c) Process as a Service
d) Protocol as a Service
Answer: a) Platform as a Service
17. Data Structures
Which data structure uses the FIFO principle?
a) Stack
b) Queue
c) Linked List
d) Tree
Answer: b) QueueWhat is the time complexity of a binary search algorithm?
a) O(1)
b) O(log n)
c) O(n)
d) O(n^2)
Answer: b) O(log n)Which of the following is a linear data structure?
a) Array
b) Tree
c) Graph
d) Heap
Answer: a) ArrayWhat is the maximum number of children a binary tree node can have?
a) 1
b) 2
c) 3
d) 4
Answer: b) 2Which data structure is used for implementing recursion?
a) Queue
b) Stack
c) Linked List
d) Tree
Answer: b) Stack
18. Operating Systems
What is the main purpose of an operating system?
a) To manage hardware resources
b) To provide a user interface
c) To run applications
d) All of the above
Answer: d) All of the aboveWhich scheduling algorithm allocates CPU to the process with the shortest burst time?
a) FCFS
b) SJF
c) Round Robin
d) Priority Scheduling
Answer: b) SJF (Shortest Job First)What is the full form of PCB in operating systems?
a) Process Control Block
b) Program Control Block
c) Process Communication Block
d) Program Communication Block
Answer: a) Process Control BlockWhich of the following is NOT a state in the process lifecycle?
a) Running
b) Waiting
c) Terminated
d) Hibernating
Answer: d) HibernatingWhat is the purpose of virtual memory?
a) To extend RAM using disk space
b) To speed up the CPU
c) To store permanent data
d) To manage input/output operations
Answer: a) To extend RAM using disk space
19. Computer Hardware
Which component is known as the brain of the computer?
a) RAM
b) CPU
c) Hard Disk
d) Motherboard
Answer: b) CPUWhat is the full form of GPU?
a) Graphics Processing Unit
b) General Processing Unit
c) Graphical Performance Unit
d) General Performance Unit
Answer: a) Graphics Processing UnitWhich of the following is a secondary storage device?
a) RAM
b) ROM
c) Hard Disk
d) Cache Memory
Answer: c) Hard DiskWhat is the purpose of a motherboard?
a) To connect all hardware components
b) To store data
c) To process data
d) To display output
Answer: a) To connect all hardware componentsWhich port is used to connect a monitor to a computer?
a) USB
b) HDMI
c) Ethernet
d) VGA
Answer: b) HDMI
20. Software Development Life Cycle (SDLC)
Which phase of SDLC involves gathering requirements?
a) Design
b) Analysis
c) Implementation
d) Testing
Answer: b) AnalysisWhat is the purpose of the testing phase in SDLC?
a) To identify and fix bugs
b) To gather requirements
c) To design the system
d) To deploy the system
Answer: a) To identify and fix bugsWhich SDLC model follows a linear and sequential approach?
a) Agile
b) Waterfall
c) Spiral
d) Iterative
Answer: b) WaterfallWhat is the full form of UML?
a) Unified Modeling Language
b) Universal Modeling Language
c) Unified Machine Language
d) Universal Machine Language
Answer: a) Unified Modeling LanguageWhich of the following is NOT a phase in SDLC?
a) Planning
b) Maintenance
c) Execution
d) Deployment
Answer: c) Execution