0% found this document useful (0 votes)
15 views

IT Work Sheet

The document contains a series of quiz questions and answers related to information technology, covering topics such as computer hardware, software, programming languages, and internet protocols. Key concepts include the first search engine, the number of bits in an IPv6 address, and the definition of RAM. The document serves as a resource for testing knowledge in various IT-related areas.

Uploaded by

alemua471
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

IT Work Sheet

The document contains a series of quiz questions and answers related to information technology, covering topics such as computer hardware, software, programming languages, and internet protocols. Key concepts include the first search engine, the number of bits in an IPv6 address, and the definition of RAM. The document serves as a resource for testing knowledge in various IT-related areas.

Uploaded by

alemua471
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 121

Which one is the first search engine in internet

(a) Google
(b) Archie
(c) Altavista
(d) WAIS
Answer: (b) Archie
Number of bit used by the IPv6 address
(a) 32 bit
(b) 64 bit
(c) 128 bit
(d) 256 bit
Answer: (c) 128 bit
Which one is the first web browser invented in 1990
(a) Internet Explorer
(b) Mosaic
(c) Mozilla
(d) Nexus
Answer: (d) Nexus
Which of the following programming language is used to create programs like applets?
(a) COBOL
(b) C Language
(c) Java
(d) BASIC
Answer: (c) Java
First computer virus is known as
(a) Rabbit
(b) Creeper Virus
(c) Elk Cloner
(d) SCA Virus
Answer: (b) Creeper Virus
Which one programming language is exclusively used for artificial intelligence
(a) C
(b) Java
(c) J2EE
(d) Prolog
Answer: (d) Prolog
Firewall in computer is used for
(a) Security
(b) Data Transmission
(c) Authentication
(d) Monitoring
Answer: (a) Security
A dual layer Blue-ray Disc can store data upto
(a) 20GB
(b) 35 GB
(c) 12 GB
(d) 50 GB
Answer: (d) 50 GB
Which of the following is not an operating system
(a) DOS
(b) Mac
(c) C
(d) Linux
Answer: (c) C
Which of the following is not a database management software
(a) MySQL
(b) Oracle
(c) Sybase
(d) COBOL
Answer: (d) COBOL
Number of layers in the OSI (Open Systems Interconnection) Model
(a) 9
(b) 3
(c) 7
(d) 11
Answer: (c) 7
1024 bit is equal to how many byte
(a) 1 Byte
(b) 128 Byte
(c) 32 Byte
(d) 64 Byte
Answer: (b) 128 Byte
Mac Operating System is developed by which company
(a) IBM
(b) Apple
(c) Microsoft
(d) Samsung
Answer: (b) Apple
Where is the headquter of Microsoft office located
(a) Texas
(b) NewYork
(c) California
(d) Washington
Answer: (d) Washington
.gif is an extension of
(a) Image file
(b) Video file
(c) Audio file
(d) Word file
Answer: (a) Image file

Information technology Quiz


Which one is the first fully supported 64-bit operating system
(a) Windows Vista
(b) Mac
(c) Linux
(d) Windows XP
Answer: (c) Linux
Computer Hard Disk was first introduced in 1956 by
(a) Dell
(b) Apple
(c) Microsoft
(d) IBM
Answer: (d) IBM
Which of the following is not a web browser
(a) MOSAIC
(b) WWW
(c) Facebook
(d) Netscape navigator
Answer: (c) Facebook
In computer world, Trojan refer to
(a) Virus
(b) Malware
(c) Worm
(d) Spyware
Answer: (b) Malware
Which one of the followings is a programming language
(a) HTTP
(b) HTML
(c) HPML
(d) FTP
Answer: (b) HTML
Which protocol is used to received e-mail
(a) SMTP
(b) POP3
(c) HTTP
(d) FTP
Answer: (b) POP3
Which protocol is used to send e-mail
(a) HTTP
(b) POP3
(c) SMTP
(d) SSH
Answer: (c) SMTP
Which computer program converts assembly language to machine language
(a) Interpreter
(b) Compiler
(c) Assembler
(d) Comparator
Answer: (c) Assembler
In which year ‘@’ sign was first chosen for its use in e-mail address
(a) 1976
(b) 1980
(c) 1977
(d) 1972
Answer: (d) 1972
Which one is the latest one from PARAM SuperSries computers
(a) PARAM Yuva II
(b) PARAM 10000
(c) PARAM Padma
(d) PARAMnet
Answer: (a) PARAM Yuva II
Who is also know as the father of Indian Supercomputing
(a) Ragunath Mashelkar
(b) Vijay Bhatkar
(c) Jayant Narlikar
(d) Nandan Nilekani
Answer: (b) Vijay Bhatkar
A folder in windows computer can’t be made with the name
(a) can
(b) con
(c) mak
(d) make
Answer: (b) con
A computer use which type of number system to calculate and to store data
(a) decimal
(b) octal
(c) binary
(d) hexadecimal
Answer: (c) binary
What is the extension type of the excel 2007 files
(a) .xls
(b) .xlsx
(c) .xsl
(d) None of the above
Answer: (b) .xlsx
The basic units of a excel spreedsheet where we enter data is called
(a) Tab
(b) Box
(c) Cell
(d) None of the above
Answer: (c) Cell
The maximum number of rows supported by Excel 2003 spreadsheet is
(a) 10,000
(b) 35,356
(c) 55,782
(d) 65,536
Answer: (d) 65,536
The maximum number of rows supported by Excel 2007 spreadsheet is
(a) 9,68,576
(b) 12,15,857
(c) 13,42,554
(d) 10,48,576
Answer: (d) 10,48,576
Which one is a ‘text editor’ for Microsoft Windows
(a) MS Word
(b) Ms Excel
(c) WordPad
(d) Notepad
Answer: (d) Notepad
Which one is the default ‘Word Processor’ for Microsoft Windows
(a) MS Word
(b) Ms Paint
(c) WordPad
(d) Notepad
Answer: (c) WordPad
What is the maximum size of a word document created
(a) 1 MB
(b) 32 MB
(c) 16MB
(d) 999KB
Answer: (b) 32 MB
What is the maximum number of Primary Partitions that can be created on a Hard-disk
(a) 2
(b) 3
(c) 4
(d) 1
Answer: (c) 4
How many layers in the TCP/IP protocol layers
(a) 7
(b) 5
(c) 4
(d) 11
Answer: (c) 4
What is the binary value of ‘A’
(a) 01000100
(b) 11000001
(c) 01100001
(d) 01000001
Answer: (d) 01000001
Which key combination is used to minimize all open windows and displays in the screen
(a) Alt+M
(b) Shift+M
(c) Windows Key+D
(d) CTRL+D
Answer: (c) Windows Key+D

Technology Quiz Questions and Answers


Which function key needs to be press during reboot to enter in Safe Mode of a Windows
machine
(a) F8
(b) F2
(c) F1
(d) F9
Answer: (a) F8
‘Linux’ is an example of
(a) Software
(b) Application
(c) Operating System
(d) Browser
Answer: (c) Operating System
Which key combination is used to permantly delete a file or folder
(a) Shift+delete
(b) Alt+delete
(c) CTRL+delete
(d) Delete
Answer: (a) Shift+delete
Which is an Input device
(a) Monitor
(b) Printer
(c) Mouse
(d) None of the above
Answer: (c) Mouse
Which one is an example of connectionless protocols
(a) TCP
(b) IPX/SPX
(c) Frame Relay
(d) UDP
Answer: (d) UDP
A common boundary between two computer systems is known as
(a) Intradiction
(b) Surface
(c) Interface
(d) None of the above
Answer: (c) Interface
Which one of the following is not a computer language
(a) BASIC
(b) LOTUS
(c) C++
(d) JAVA
Answer: (b) LOTUS
Which one is used for making presentation file from Microsoft Office package
(a) MS Outlook
(b) MS Excel
(c) MS Word
(d) MS Powerpoint
Answer: (d) MS PowerPoint
Network Interface Card (NIC) is generally used for
(a) Connectivity
(b) Programming
(c) Printing
(d) None of the above
Answer: (a) Connectivity
Total number of pins in a traditional parallel port is
(a) 5
(b) 14
(c) 25
(d) 27
Answer: (c) 25
Which web browser is developed by the Google
(a) IE
(b) FireFox
(c) Safri
(d) Chrome
Answer: (d) Chrome
Which web browser is provided default with a Windows machine
(a) Opera
(b) IE
(c) Chrome
(d) Mosaic
Answer: (b) IE
Which company first developed the Java programming language
(a) Microsoft
(b) Google
(c) Sun Microsystems
(d) IBM
Answer: (c) Sun Microsystems
Mark Zuckerberg is the owner of
(a) Facebook
(b) Google
(c) Linux
(d) Linkedln
Answer: (a) Facebook

 1.
Which cable is used to connect a hard drive to a
motherboard?

A.

A SATA Cable

B.

An IDE Cable
o

C.

A USB Cable

D.

A PS2 Cable

Correct Answer
A. A SATA Cable

Explanation
SATA (Serial ATA) cables are commonly used to connect hard drives,
SSDs, and optical drives to the motherboard. They have largely
replaced the older IDE (Integrated Drive Electronics) cables, which were
bulkier and slower. USB cables are used for external devices, and PS2
cables are used for older keyboard and mouse connections.
Rate this question:
162

 2.
What type of device is a keyboard?

A.

Input

o
B.

Output

C.

Both

D.

None of the above

Correct Answer
A. Input

Explanation
A keyboard is an input device. It is used to enter data and commands
into a computer or other electronic devices. By pressing the keys on a
keyboard, users can input text, numbers, and various commands, which
the computer then processes. The keyboard translates these keystrokes
into signals that the computer's processor can understand. This
functionality makes the keyboard an essential tool for interacting with a
computer, allowing users to perform a wide range of tasks, from typing
documents to executing complex commands. Understanding the role of
input devices like keyboards is fundamental to using and operating
computers effectively.
Rate this question:
78

 3.
What is the full form of 'URL'?

A.

Universal Remote Long

B.

Uniform Resource Locator

C.

Universal Resource Locator

D.

None of the above

Correct Answer
B. Uniform Resource Locator

Explanation
A URL stands for Uniform Resource Locator. It is a string of characters
that is used to address and locate resources on the internet. It provides
a way to identify and access specific web pages, documents, images, or
any other type of file. The URL consists of different components such as
the protocol (http, https, ftp), the domain name (www.example.com),
and the specific path or location of the resource. The correct answer is
"Uniform Resource Locator" because it accurately defines what a URL
is.
Rate this question:
69

 4.
Which of these is a free operating system?

A.

Ubuntu

B.

Windows 7

C.

Windows Xp

D.

Mac OSX
Correct Answer
A. Ubuntu

Explanation
Ubuntu is a free operating system because it is an open source
software, meaning that its source code is freely available for anyone to
view, modify, and distribute. This allows users to use Ubuntu without
any cost and also gives them the freedom to customize and adapt the
operating system to their needs. Unlike Windows 7, Windows XP, and
Mac OSX, which are proprietary operating systems, Ubuntu is free to
use and promotes the principles of open-source software.
Rate this question:
58

 5.
What is RAM?

A.

Random Access Memory

B.

Random Memory

C.

Run Memory
o

D.

Read Access Memory

Correct Answer
A. Random Access Memory

Explanation
RAM, also known as Random Access Memory, is a type of computer
memory that allows data to be read from and written to in any order,
regardless of the physical location of the data. It is a volatile memory,
meaning that its contents are lost when the power is turned off. RAM is
an essential component of a computer system as it provides temporary
storage for data and instructions that are actively being used by the
CPU. It allows for fast access to data, enabling efficient multitasking and
overall system performance.
Rate this question:
41

 6.
Which of these is a type of RAM/DRAM?

A.

DDR3

B.

DDR79-9-8
o

C.

DRR3-PC2700

D.

All of the above

Correct Answer
A. DDR3

Explanation
DDR3 (Double Data Rate 3) is a type of RAM (Random Access
Memory) or DRAM (Dynamic Random Access Memory). It is a common
type of memory used in computers and other electronic devices. The
other options, "DDR79-9-8" and "DRR3-PC2700," do not represent valid
types of RAM. DDR3 is known for its faster data transfer rates
compared to its predecessors, DDR2 and DDR. It is often used in older
computers and laptops due to its affordability and compatibility with
older hardware.
Rate this question:
47

 7.
What is a Universal Serial Bus?

A.

A connection interface for computers and devices


o

B.

SATA Port

C.

HDMI Port

D.

All of the above

Correct Answer
A. A connection interface for computers and devices

Explanation
A Universal Serial Bus (USB) is a standardized technology for
connecting various devices to a computer. It defines the cables,
connectors, and communication protocols used to transfer data and
provide power. USB has become the most common method for
connecting peripherals like keyboards, mice, printers, and external
drives.
Rate this question:
44

 8.
What would you use this cable for?

A.

Connecting a computer to a monitor

B.

Connecting to the internet

C.

Connecting a USB flash drive to a computer

D.

All of the above

Correct Answer
A. Connecting a computer to a monitor

Explanation
A VGA (Video Graphics Array) cable is specifically designed to transmit
analog video signals. It's that cable with the 15-pin connector, often
blue, that you used to see connecting computers to monitors. While
newer digital interfaces like HDMI and DisplayPort are more common
now, VGA was the standard for many years. It's important to note that
VGA only carries video signals, not audio or data. So, it can't be used
for internet connections, which require Ethernet cables, or for
connecting USB flash drives, which have their own dedicated ports.
Rate this question:
38

 9.
Examples of peripheral devices are

A.

Monitor

B.

Keyboard

C.

Mouse

D.

All of the above


Correct Answer
D. All of the above

Explanation
The correct answer is "All of the above" because all the mentioned
options, including the monitor, keyboard, and mouse, are examples of
peripheral devices. Peripheral devices are external hardware
components that connect to a computer and provide input/output
capabilities, enhancing the functionality of the computer system. These
devices are not essential for the basic operation of the computer but are
used to perform specific tasks and interact with the user.
Rate this question:
40

 10.
What would you use a USB Flash Drive for?

A.

Saving Files

B.

Creating Music

C.

Format system
o

D.

Listening music

Correct Answer
A. Saving Files

Explanation
A USB flash drive is a portable storage device that can be used to save
files. It allows users to transfer and store data, such as documents,
photos, videos, and more. Unlike traditional storage options, like hard
drives or CDs, a USB flash drive is small, lightweight, and easy to carry
around. It provides a convenient way to backup important files, transfer
data between devices, and access files on the go. Therefore, using a
USB flash drive for saving files is a practical and common application.
Rate this question:
36

 11.
What part of the computer system can one physically
touch?

A.

Software

B.
Hardware

C.

OS

D.

Programs

Correct Answer
B. Hardware

Explanation
Hardware refers to the physical components of a computer system that
can be touched, such as the monitor, keyboard, mouse, and CPU.
Software, on the other hand, refers to the programs and applications
that run on the hardware. The OS (Operating System) is a type of
software that manages the computer's hardware and software
resources. While programs are also a type of software that perform
specific tasks. Therefore, out of the given options, only hardware can be
physically touched.
Rate this question:
27

 12.
What are IC chips most commonly made of?

o
A.

Silicon

B.

Chromium

C.

Lead

D.

Gold

Correct Answer
A. Silicon

Explanation
IC chips, also known as integrated circuits, are made of silicon. Silicon
is a semiconductor material that is widely used in the electronics
industry due to its ability to conduct electricity under certain conditions.
It is a crucial component in the manufacturing of IC chips as it allows for
the miniaturization and integration of various electronic components
onto a single chip. Silicon's properties, such as its high melting point,
low electrical resistance, and ability to handle high temperatures, make
it an ideal material for IC chip production.
Rate this question:
24

 13.
Which is not an Operating System?

A.

Microsoft Office XP

B.

Red Hat Linux

C.

BSD Unix

D.

Windows 98

Correct Answer
A. Microsoft Office XP

Explanation
Microsoft Office XP is not an operating system. It is a suite of
productivity applications developed by Microsoft. Operating systems, on
the other hand, are software that manage computer hardware and
software resources and provide services for computer programs.
Examples of operating systems include Red Hat Linux, BSD Unix, and
Windows 98.
Rate this question:
23

 14.
1 GB is equal to how many MB?

A.

1024 MB

B.

1028 MB

C.

256 MB

D.
1012 MB

Correct Answer
A. 1024 MB

Explanation
1 GB (gigabyte) is equal to 1024 MB (megabytes). In computing, data
storage is commonly measured in binary units, where each unit is a
power of 2. A gigabyte is defined as 210 megabytes, which equals 1024
megabytes. This binary measurement system is based on the binary
numeral system used by computers, where each increase in unit size
represents an exponential increase in the amount of data storage.
Understanding these conversions is essential for managing and
understanding data storage capacities in computers and other digital
devices.
Rate this question:
32

 15.
What is an example of non-volatile memory?

A.

ROM

B.

RAM

o
C.

Cache Memory

D.

All of the above

Correct Answer
A. ROM

Explanation
ROM (Read-Only Memory) is an example of non-volatile memory. Non-
volatile memory retains its data even when the power is turned off,
making it ideal for storing firmware and important system instructions
that must persist across reboots. RAM (Random Access Memory) and
Cache Memory, on the other hand, are volatile types of memory, which
means they lose their data when the power is turned off. ROM is used in
various applications within a computer, such as storing the BIOS, which
is essential for booting up the system and performing initial hardware
checks and configurations. Understanding the difference between
volatile and non-volatile memory is crucial for comprehending how
computer systems manage and retain data.

35 IT Quiz Questions And Answers: Tech


Revolution
We Love Quizzes March 27, 2021

It is almost impossible to imagine a world without


computers. Just in a few decades, codes and software
have created sweeping changes and revolutions. While
they provide an essential role in our daily lives, how
much do you know about chips, programming
languages, the Internet, and things alike? Take these IT
quiz questions and answers to see whether you are an
expert.

IT Quiz Questions and Answers


1. How many kilobytes are there in 1 megabyte?
A. 1000

B. 1024

B. 1048

2. Amazon is one of the biggest tech companies in the


world. Which product did it originally sell online?
A. Clothes

B. Drinks

C. Books
Click to see the correct answer

3. What does IT stand for?


A. International Technology

B. Information Technology

C. Internet Technology
Click to see the correct answer
4. Which of the following is the first high level
programming language created in the 1950s?
A. FORTRAN

B. C++

C. COBOL
Click to see the correct answer

5. Which of the following is not an operating system?


A. macOS Catalina

B. Microsoft Office XP

C. Windows Vista
Click to see the correct answer

6. “.mp4” extension typically refers to which type of


computer file?
A. An image file

B. An audio file
C. A movie file
Click to see the correct answer

7. Which was the first internet search engine in the


world?
A. Google

B. Bing

C. Archie
Click to see the correct answer

8. Which component is known as the heart of a


computer?
A. RAM

B. CPU

C. Chip
Click to see the correct answer
9. Opera and Safari are types of what?
A. Web browser

B. Anti-virus software

C. Operating system
Click to see the correct answer

10. What is the name of the area in California where


many of the world’s largest tech companies are
headquartered?
A. Hi-Tech Valley

B. Silicon Valley

C. Disruptive Valley
Click to see the correct answer

11. Who is the father of the first modern computer?


A. Vint Cerf

B. Alan Turing

C. Charles Babbage
Click to see the correct answer

12. What do we call a network security system, which


can help prevent unauthorised access from or to a
private network?
A. A firewall

B. A waterwall

C. A metalwall
Click to see the correct answer

13. Which of the following is not the name of a


cryptocurrency?
A. Ethereum

B. Bytecoin

C. Ripple
Click to see the correct answer
14. Which animal is the official mascot of the Linux
operating system?
A. Rabbit

B. Dog

C. Penguin
Click to see the correct answer

15. Where did the name for the QWERTY keyboard


come from?
A. The name of the creator

B. The order of the keys on the keyboard

C. The city where the creator was born


Click to see the correct answer

16. Which is the first mobile firm to introduce Emoji on


their mobile devices?
A. Blackberry

B. Nokia

C. Apple
Click to see the correct answer

17. Every computer on the Internet can be uniquely


identified by which of the following?
A. IP address

B. Virtual address

C. Online address
Click to see the correct answer

18. RAM is able to perform which of the following


operations?
A. Read only

B. Write only

C. Both write and read


Click to see the correct answer
19. When Twitter was first introduced in 2006, how
many characters were originally allowed in each
“Tweet”?
A. 40

B. 140

C. 400
Click to see the correct answer

20. Which kind of network allows people in an


organisation or company to communicate with each
other?
A. Intranet

B. Extranet

C. Internet
Click to see the correct answer

21. If a URL ends with .de, you may expect it is based in


which country?
A. Denmark
B. Dominican Republic

C. Germany
Click to see the correct answer

22. You can press the “Ctrl” key plus which alphabet
letter for the “Paste” command on the computer?
A. P

B. V

C. C
Click to see the correct answer

23. Which of the following technologies was named


after Harald Blatonn, a Danish-Norwegian king?
A. Wi-Fi

B. Bluetooth

C. 3G
Click to see the correct answer
24. Which technical term is often used for data centres
available over the Internet to many users?
A. Sun computing

B. Sky computing

C. Cloud computing
Click to see the correct answer

25. The term “robot” originally means forced work or


labour in which language?
A. Hungarian

B. Czech

C. Polish
Click to see the correct answer

26. As of 2020, which was the leading semiconductor


companies by sales revenue in the world?
A. Intel (US)

B. TSMC (Taiwan)
C. Samsung (South Korea)
Click to see the correct answer

27. Which of the following virtual assistants was first


introduced?
A. Alexa by Amazon

B. Siri by Apple

C. Google Assistant by Google


Click to see the correct answer

28. Which organisation owns the Global Positioning


System or GPS?
A. The United Nations

B. Google

C. The United States government


Click to see the correct answer
29. What is actually the gender of the Android mascot
robot?
A. Female

B. Male

C. Unisex
Click to see the correct answer

30. What was the first commercial text message in the


world sent in 1992?
A. Merry Christmas

B. Happy Birthday

C. Happy New Year


Click to see the correct answer

31. What was the first recognizable social media


platform in the world?
A. Facebook

B. MySpace
C. Six Degrees
Click to see the correct answer

32. Which term is used for those people over 50 years


old who uses the internet often?
A. Silver surfers

B. Senior surfers

C. White surfers
Click to see the correct answer

33. What is the main benefit of using CAPTCHA?


A. To improve the speed of the website

B. To block bots and unauthorised users

C. To record flowing data

34. What is the name of the first computer virus


developed in 1971?
A. Harmless

B. Viral

C. Creeper
Click to see the correct answer

35. What does the letter B in “USB” stand for?


A. Basis

B. Bus

C. Break

Click to see the correct answer

These trivia IT quiz questions and answers are not simple. We hope you can learn a few
interesting facts and useful knowledge. For more challenges, check out the following data
mining quiz.

Questions and Answers

 1.
What does BIOS stand for?

A.

Board Integrated Output System

B.
Basic Input Output System

C.

Board Intrusion Offense System

D.

Nothing BIOS is not an acronym

Correct Answer
B. Basic Input Output System

Explanation
BIOS stands for Basic Input Output System. It is a firmware that
is embedded on a computer's motherboard. BIOS provides the
necessary instructions for the computer to start up and
initialize the hardware components. It also performs various
tasks such as controlling the boot process, managing system
configuration settings, and providing a platform for the
operating system to communicate with the hardware.
Rate this question:
4

 2.
What is the protocol used for the majority of
network/internet traffic?

o
A.

TCP/IP

B.

IPX/SPX

C.

OSX

D.

64-Bit

Correct Answer
A. TCP/IP

 Explanation
TCP/IP is the correct answer because it is the most widely used
protocol for network and internet traffic. TCP/IP stands for
Transmission Control Protocol/Internet Protocol and it is a suite
of protocols that allows for reliable and secure communication
between devices on a network. It provides the rules and
procedures for breaking data into packets, addressing, routing,
and reassembling at the destination. TCP/IP is used by the
majority of devices and applications on the internet, making it
the standard protocol for network communication.
Rate this question:
5

 3.
What is the most popular wired network topology?

A.

Bus

B.

Star

C.

Mesh

D.

Ring

Correct Answer
B. Star
Explanation
The most popular wired network topology is the star topology.
In a star topology, all devices are connected to a central hub or
switch, forming a star-like structure. This topology offers
several advantages such as easy troubleshooting, scalability,
and high reliability. Each device has its own dedicated
connection to the central hub, which allows for independent
communication and reduces the chances of network failure.
Additionally, the star topology allows for easy addition or
removal of devices without disrupting the entire network.
Rate this question:
6

 4.
What registered jack is used to terminate the standard
network patch cable?

A.

RJ-99

B.

RJ-2

C.

RJ-11
o

D.

RJ-45

Correct Answer
D. RJ-45

Explanation
The correct answer is RJ-45. RJ-45 is the registered jack that is
commonly used to terminate the standard network patch
cable. It has 8 pins and is widely used for Ethernet
connections. RJ-99 and RJ-2 are not commonly used registered
jacks, while RJ-11 is used for telephone connections.
Rate this question:
5

 5.
In a simple home wired network what device would
you use to provide more
unmanaged/routed Ethernet ports?

A.

Switch

B.

Hub
o

C.

Router

D.

KVM

Correct Answer
A. Switch

Explanation
A switch is the correct answer because it is a device used to
connect multiple devices in a network, allowing them to
communicate with each other. It provides more Ethernet ports,
which can be used to connect additional devices to the
network. Unlike a hub, a switch can intelligently direct network
traffic to the appropriate device, improving efficiency and
performance. A router, on the other hand, is used to connect
multiple networks together and manage the flow of data
between them. A KVM (Keyboard, Video, Mouse) is a device
used to control multiple computers using a single set of
peripherals.
Rate this question:
7

 6.
Which file extension is an image file?

o
A.

MPG

B.

JPG

C.

MA4

D.

MOV

Correct Answer
B. JPG

Explanation
JPG is the correct answer because it is a commonly used file
extension for image files. JPG stands for Joint Photographic
Experts Group, which is the organization that developed the
file format. JPG files use a lossy compression method to reduce
file size while maintaining a good level of image quality. They
are widely supported by various devices and software
applications, making them a popular choice for storing and
sharing digital images.
Rate this question:
7

 7.
What is a Codec most commonly used for?

A.

Decoding Passwords

B.

Decoding Audio/Video Stream

C.

Encrypting Data

D.

Saving Contact Information

Correct Answer
B. Decoding Audio/Video Stream

Explanation
A codec is a technology used to compress and decompress
audio and video data. It is commonly used for decoding
audio/video streams. Codecs enable efficient transmission and
storage of multimedia content by reducing the file size without
significantly compromising the quality. By decoding the
compressed data, codecs allow the audio and video content to
be played or viewed on various devices and platforms.
Rate this question:
8

 8.
Can 32-bit programs run on a 64-bit version of
Windows 7?

A.

Yes

B.

No

Correct Answer
A. Yes

Explanation
32-bit programs can run on a 64-bit version of Windows 7
because Windows 7 64-bit includes a compatibility layer called
Windows on Windows 64 (WoW64) that allows 32-bit programs
to run seamlessly. This compatibility layer enables the
operating system to run 32-bit applications by redirecting the
necessary system files and resources. Therefore, users can run
their existing 32-bit programs on a 64-bit version of Windows 7
without any issues.
Rate this question:
5

 9.
RDP stands for?

A.

Removable Disk Placement

B.

Remote Desktop Protocol

C.

Right Desktop Placeholder

D.

Nothing RDP is not an acronym


Correct Answer
B. Remote Desktop Protocol

Explanation
RDP stands for Remote Desktop Protocol. This is a network
protocol that allows users to remotely access and control a
computer or virtual machine over a network connection. It
enables users to connect to a remote computer and use its
resources as if they were sitting in front of it. RDP is commonly
used for remote administration, technical support, and
accessing files and applications on remote computers.
Rate this question:
8

 10.
Is a BSOD a hardware or software problem?

A.

Hardware

B.

Software

C.

Mostly Hardware
o

D.

Mostly Software

E.

Either Is Equally Possible

Correct Answer
E. Either Is Equally Possible

Explanation
The answer "Either Is Equally Possible" is correct because a
BSOD (Blue Screen of Death) can be caused by both hardware
and software issues. Hardware problems such as faulty RAM,
overheating, or incompatible hardware drivers can trigger a
BSOD. Similarly, software issues like incompatible or corrupted
software, driver conflicts, or malware can also lead to a BSOD.
Therefore, it is not possible to determine whether a BSOD is
solely a hardware or software problem without further
investigation.
Rate this question:
3

 11.
What tool do you use to analyze BSOD crashes?

A.
None Reinstall Windows

B.

Windbg

C.

Windows Error Reporting

D.

Norton

Correct Answer
B. Windbg

Explanation
Windbg is the correct answer because it is a powerful
debugging tool provided by Microsoft that is specifically
designed for analyzing Blue Screen of Death (BSOD) crashes. It
allows users to examine crash dump files and provides detailed
information about the cause of the crash, including the stack
trace, memory contents, and register values. Windbg is widely
used by developers and system administrators to troubleshoot
and diagnose BSOD errors.
Rate this question:
7
 12.
In the field of cybersecurity, what does the term
"phishing" specifically refer to?

A.

The practice of sending emails that appear to be from


reputable sources with the goal of gaining personal
information.

B.

Creating a duplicate of an existing web page to trick


users into submitting personal or financial information.

Correct Answer
A. The practice of sending emails that appear to be from
reputable sources with the goal of gaining personal
information.

Explanation
Phishing is a type of social engineering attack often used to
steal user data, including login credentials and credit card
numbers. It occurs when an attacker, masquerading as a
trusted entity, dupes a victim into opening an email, instant
message, or text message. The recipient is then tricked into
clicking a malicious link, which can lead to the installation of
malware, the freezing of the system as part of a ransomware
attack, or the revealing of sensitive information. This method is
distinct from other attacks like denial-of-service attacks or
vulnerability scanning, making it a unique and common threat
in the field of cybersecurity.
Rate this question:
20

 13.
What file is a Word 2007 or newer document?

A.

.xls

B.

.doc

C.

.rtf

D.

.dox

o
E.

.docx

Correct Answer
E. .docx

Explanation
A Word 2007 or newer document is typically saved with
the .docx file extension. This file format was introduced in
Word 2007 and is used to store documents created in newer
versions of Microsoft Word. The .docx format allows for more
advanced features and improved compatibility with other
software applications. Therefore, the correct answer is .docx.
Rate this question:
9

 14.
If you wanted to add a user to a Domain where would
you add them?

A.

Domain List

B.

Registry

o
C.

Active Directory

D.

Directory

Correct Answer
C. Active Directory

Explanation
The correct answer is Active Directory because Active
Directory is a centralized database that stores and manages
information about network resources, including user accounts.
It provides a way to organize and manage users, computers,
and other network objects within a domain. By adding a user to
the Active Directory, they will be granted access to the
resources and services available within the domain.
Rate this question:
2

 15.
If you can get to a website via direct IP but are unable
to via web url what is most likely the problem?

A.

Website is down
o

B.

Computer network card is bad

C.

DNS problem

D.

Router has burnt out

Correct Answer
C. DNS problem

Explanation
If you are able to access a website using its direct IP address
but not through its web URL, the most likely problem is a DNS
(Domain Name System) issue. DNS is responsible for
translating human-readable domain names into IP addresses
that computers can understand. If the DNS is not functioning
properly, it may not be able to resolve the web URL to the
correct IP address, resulting in the inability to access the
website through the URL.
Rate this question:
3

 16.
What would you use to connect 2 sites to each other
so they can access files/printers as if they were in the
local building/location?

A.

VPN

B.

Tracert

C.

Ping

D.

CMD

Correct Answer
A. VPN

Explanation
A VPN, or Virtual Private Network, is used to securely connect
two sites together over the internet. It creates a private
network connection between the two sites, allowing them to
access files and printers as if they were in the same local
building or location. This is done by encrypting the data that is
transmitted between the two sites, ensuring that it remains
secure and private. VPNs are commonly used by businesses to
connect remote offices or enable remote workers to access
resources on the company's network.
Rate this question:
7

 17.
What is SMART?

A.

Winning Jeopardy

B.

A hard drive diagnosis built into the drive

C.

A network routing technology

o
D.

Nothing

Correct Answer
B. A hard drive diagnosis built into the drive

Explanation
The correct answer is "A hard drive diagnosis built into the
drive." SMART stands for Self-Monitoring, Analysis, and
Reporting Technology. It is a system built into hard drives that
monitors various attributes of the drive's performance and
health. It can detect potential issues or failures before they
occur, allowing users to take preventative measures such as
backing up data or replacing the drive.
Rate this question:
5

 18.
What Does RAID Stand for?

A.

Random Access Inside Disks

B.

Redundant Array of Inexpensive Disks

o
C.

Reload Advanced Intel Device

D.

Relocate Array Inside Drive

Correct Answer
B. Redundant Array of Inexpensive Disks

Explanation
RAID stands for Redundant Array of Inexpensive Disks. This
technology combines multiple physical disk drives into a single
logical unit to improve performance, reliability, and capacity.
By using redundancy, RAID allows for data to be stored across
multiple disks, providing fault tolerance in case of a disk
failure. The term "inexpensive" refers to the fact that RAID can
be implemented using relatively low-cost disk drives, making it
a cost-effective solution for data storage.
Rate this question:
9

 19.
Is Windows 7 A whole new OS?

A.

Yes
o

B.

No

Correct Answer
B. No

Explanation
No, Windows 7 is not considered a "whole new OS" in the sense
that it was a completely unique invention separate from all
previous operating systems. It was an evolution of its
predecessor, Windows Vista, introducing improvements in
performance, user interface, and security. However, it brought
significant enhancements that made it stand out and be well-
received compared to Vista.
Rate this question:
4

 20.
4u is an indication of how _________________

A.

Tall a server is in a rack

B.

How many systems are in a rack


o

C.

How many CPUs are in a system

D.

Nothing

Correct Answer
A. Tall a server is in a rack

Explanation
The term "4u" is an indication of how tall a server is in a rack.
The "u" stands for "unit" and is a standard measurement used
to determine the height of rack-mounted equipment. In this
case, "4u" indicates that the server takes up four units of
space in the rack.
Rate this question:
7

 21.
SAS stands for

A.

Special Array Storage


o

B.

Secret Area Storage

C.

Serial Attached Storage

D.

Super Access Speeds

Correct Answer
C. Serial Attached Storage

Explanation
SAS stands for Serial Attached Storage. This term refers to a
computer bus technology that is used to transfer data between
computer systems and storage devices, such as hard drives or
solid-state drives. It provides a high-speed, point-to-point
connection that allows for fast data transfer rates and
increased reliability. The other options, Special Array Storage,
Secret Area Storage, and Super Access Speeds, do not
accurately represent the acronym SAS in the context of
computer storage technology.
Rate this question:
2
 22.
SAS Drives are usually found in what type of systems?

A.

Desktops

B.

Notebooks

C.

Netbooks

D.

Servers

E.

Gaming systems
Correct Answer
D. Servers

Explanation
SAS drives are usually found in servers because they are
designed to handle heavy workloads and provide high
performance and reliability. Servers require fast and efficient
storage systems to handle large amounts of data and support
multiple users simultaneously. SAS drives offer faster data
transfer rates, higher capacities, and better error correction
capabilities compared to other types of drives. Therefore, they
are the preferred choice for server environments where data
accessibility and reliability are crucial.
Rate this question:
5

 23.
What technology is primarily used to create
decentralized applications that run on a blockchain?

A.

Artificial Intelligence

B.

Virtual Reality

o
C.

Smart Contracts

D.

Quantum Computing

Correct Answer
C. Smart Contracts

Explanation
Smart contracts are self-executing contracts with the terms of
the agreement directly written into lines of code. They are a
fundamental technology used in the development of
decentralized applications (dApps) on blockchain platforms like
Ethereum. Smart contracts automatically execute, control, or
document legally relevant events and actions according to the
terms of a contract or an agreement. This technology enables
decentralized apps to run precisely as programmed without
any downtime, fraud, or interference from third parties, which
is why it is pivotal in the blockchain ecosystem.
Rate this question:
4

 24.
Which of the following is NOT a core component of a
typical IT infrastructure?

A.
Hardware

B.

Software

C.

Data

D.

Marketing

Correct Answer
D. Marketing

Explanation
While marketing is essential for many organizations, it's not
considered a core component of the IT infrastructure itself. IT
infrastructure primarily focuses on the technological foundation
that supports an organization's operations. This includes the
hardware (physical components like servers and computers),
software (applications and operating systems), and data
(information stored and processed).
Ques. Which of the following is not a programming language?

a) Python
b) Java

c) HTML

d) SQL

Answer: c) HTML

Explanation: HTML (Hypertext Markup Language) is a markup language


used for creating web pages, not a programming language.

Ques. What does CPU stand for?

a) Central Processing Unit

b) Central Program Unit

c) Central Processor Unit

d) Central Processing Utility

Answer: a) Central Processing Unit

Explanation: The CPU is the primary component of a computer that


performs most of the processing inside a computer.

Ques. Which of the following is an example of an operating system?

a) Microsoft Word

b) Linux

c) Google Chrome

d) Adobe Photoshop

Answer: b) Linux

Explanation: Linux is an operating system, while the other options are


application software.

Ques: What is the function of RAM in a computer?

a) To store data permanently

b) To store data temporarily


c) To process data

d) To manage input and output operations

Answer: b) To store data temporarily

Explanation: RAM (Random Access Memory) temporarily stores data that is


actively being used or processed by the CPU.

Ques: Which of the following is a web browser?

a) Google

b) Bing

c) Firefox

d) Yahoo

Answer: c) Firefox

Explanation: Firefox is a web browser, while Google, Bing, and Yahoo are
search engines.

Ques: Which company developed the Windows operating system?

a) Apple

b) Microsoft

c) IBM

d) Google

Answer: b) Microsoft

Explanation: Microsoft developed the Windows operating system, which is


one of the most widely used operating systems globally.

Ques: What does URL stand for?

a) Uniform Resource Locator

b) Universal Resource Locator

c) Uniform Resource Link


d) Universal Resource Link

Answer: a) Uniform Resource Locator

Explanation: A URL is the address of a web page on the internet.

Ques: Which of the following is a storage device?

a) Monitor

b) Keyboard

c) Hard Drive

d) Mouse

Answer: c) Hard Drive

Explanation: A hard drive is a storage device used to store data


permanently.

Ques: Which of the following is an example of cloud storage?

a) Dropbox

b) SSD

c) USB Flash Drive

d) External Hard Drive

Answer: a) Dropbox

Explanation: Dropbox is a cloud storage service that allows users to store


and access files online.

Ques: What is the full form of LAN?

a) Local Area Network

b) Large Area Network

c) Long Area Network

d) Light Area Network


Answer: a) Local Area Network

Explanation: LAN is a network that connects computers within a limited


area, such as a building.

Ques: What does HTTP stand for?

a) Hypertext Transfer Protocol

b) Hypertext Transmission Protocol

c) Hypertext Transfer Process

d) Hypertext Transmission Process

Answer: a) Hypertext Transfer Protocol

Explanation: HTTP is the protocol used for transmitting web pages over the
internet.

Ques: Which of the following is an example of an input device?

a) Printer

b) Monitor

c) Keyboard

d) Speaker

Answer: c) Keyboard

Explanation: A keyboard is an input device used to enter data into a


computer.

Ques: Which of the following is a popular programming language for


web development?

a) Python

b) JavaScript

c) C++

d) Assembly
Answer: b) JavaScript

Explanation: JavaScript is widely used for web development to create


interactive web pages.

Ques: Which company is known for the Android operating system?

a) Apple

b) Microsoft

c) Google

d) IBM

Answer: c) Google

Explanation: Google developed the Android operating system, which is


commonly used in smartphones and tablets.

Ques: What is phishing?

a) A way to hack passwords

b) A technique to steal personal information by pretending to be a


trustworthy entity

c) A type of malware

d) A network protocol

Answer: b) A technique to steal personal information by pretending to be a


trustworthy entity

Explanation: Phishing is a type of social engineering attack where attackers


try to obtain sensitive information by disguising themselves as legitimate
entities.

Ques: What does GUI stand for?

a) General User Interface

b) Graphical User Interface

c) Global User Interface


d) General Usage Interface

Answer: b) Graphical User Interface

Explanation: A GUI allows users to interact with a computer using graphical


elements like windows, icons, and buttons.

Ques: Which of the following is not an example of an operating


system?

a) Windows

b) macOS

c) Linux

d) Oracle

Answer: d) Oracle

Explanation: Oracle is a database management system, not an operating


system.

Ques: Which language is primarily used for Android app


development?

a) Python

b) Swift

c) Java

d) C#

Answer: c) Java

Explanation: Java is the primary programming language used for


developing Android apps.

Ques: What is the primary function of a router?

a) To store data

b) To process data

c) To connect multiple networks and route data between them


d) To display data

Answer: c) To connect multiple networks and route data between them

Explanation: A router is a networking device that forwards data packets


between computer networks.

Ques: Which of the following is a type of malware?

a) Virus

b) Excel

c) Firefox

d) Android

Answer: a) Virus

Explanation: A virus is a type of malware that can replicate itself and


spread to other computers.

Ques: What is the main purpose of a firewall?

a) To block spam emails

b) To monitor and control incoming and outgoing network traffic

c) To manage user passwords

d) To store data securely

Answer: b) To monitor and control incoming and outgoing network traffic

Explanation: A firewall is a network security device that monitors and filters


network traffic based on security rules.

Ques: Which of the following is an example of a database


management system?

a) Microsoft Excel

b) Microsoft Access

c) Adobe Photoshop
d) Mozilla Firefox

Answer: b) Microsoft Access

Explanation: Microsoft Access is a database management system used to


store and manage data.

Ques: What is the primary purpose of DNS?

a) To translate domain names into IP addresses

b) To store email messages

c) To transfer files over the internet

d) To connect devices in a local network

Answer: a) To translate domain names into IP addresses

Explanation: DNS (Domain Name System) translates human-readable


domain names into IP addresses that computers use to identify each other
on the network.

Ques: What does SSL stand for?

a) Secure Socket Layer

b) Security Socket Layer

c) Secure Session Layer

d) Security Session Layer

Answer: a) Secure Socket Layer

Explanation: SSL is a standard security technology for establishing an


encrypted link between a server and a client.

Ques: Which of the following is a NoSQL database?

a) MySQL

b) PostgreSQL

c) MongoDB
d) Oracle

Answer: c) MongoDB

Explanation: MongoDB is a NoSQL database that stores data in flexible,


JSON-like documents.

Ques: Which programming language is known as the “mother of all


languages”?

a) C

b) Python

c) Java

d) COBOL

Answer: a) C

Explanation: The C programming language is often referred to as the


“mother of all languages” because many modern programming languages
are based on or influenced by it.

Ques: Which of the following is not a type of network topology?

a) Star

b) Bus

c) Ring

d) Node

Answer: d) Node

Explanation: A node is a device connected to a network, while star, bus,


and ring are types of network topologies.

Ques: What does IP stand for in IP address?

a) Internet Protocol

b) Internet Process

c) Internet Program
d) Internet Port

Answer: a) Internet Protocol

Explanation: An IP address is a unique identifier assigned to devices on a


network, and it stands for Internet Protocol.

Ques: Which of the following is an example of open-source


software?

a) Microsoft Office

b) Adobe Photoshop

c) Linux

d) iOS

Answer: c) Linux

Explanation: Linux is an open-source operating system, meaning its source


code is freely available for modification and distribution.

Ques: What is the main purpose of an operating system?

a) To run application software

b) To manage hardware resources and provide a platform for applications

c) To design websites

d) To create databases

Answer: b) To manage hardware resources and provide a platform for


applications

Explanation: The operating system is responsible for managing computer


hardware and software resources and providing services for application
programs.

Ques: Which of the following is a characteristic of object-oriented


programming?

a) Functions

b) Classes and Objects


c) Loops

d) Conditions

Answer: b) Classes and Objects

Explanation: Object-oriented programming is based on the concept of


classes and objects, which represent real-world entities.

Ques: What does SQL stand for?

a) Standard Query Language

b) Structured Query Language

c) Simple Query Language

d) System Query Language

Answer: b) Structured Query Language

Explanation: SQL is a language used for managing and manipulating


relational databases.

Ques: Which of the following is a popular version control system?

a) Git

b) HTML

c) Java

d) CSS

Answer: a) Git

Explanation: Git is a widely used version control system for tracking


changes in source code during software development.

Ques: Which of the following is an example of an interpreted


language?

a) C++

b) Java
c) Python

d) Assembly

Answer: c) Python

Explanation: Python is an interpreted language, meaning its code is


executed line by line at runtime rather than being compiled into machine
code.

Ques: What is the main purpose of an API (Application Programming


Interface)?

a) To store data in a database

b) To allow communication between different software applications

c) To design user interfaces

d) To manage network traffic

Answer: b) To allow communication between different software applications

Explanation: An API defines the methods and data structures that


applications can use to communicate with each other.

Ques: Which of the following is a file compression format?

a) .docx

b) .zip

c) .exe

d) .html

Answer: b) .zip

Explanation: The .zip format is used for compressing files, reducing their
size for storage or transmission.

Ques: Which of the following is a cybersecurity practice?

a) Using strong passwords

b) Creating databases
c) Writing HTML code

d) Installing software

Answer: a) Using strong passwords

Explanation: Using strong passwords is a basic cybersecurity practice to


protect personal and organizational data from unauthorized access.

Ques: Which protocol is used to send email?

a) FTP

b) HTTP

c) SMTP

d) SNMP

Answer: c) SMTP

Explanation: SMTP (Simple Mail Transfer Protocol) is the protocol used to


send emails between servers.

Ques: Which of the following is an example of a high-level


programming language?

a) Assembly

b) Python

c) Machine Language

d) Binary

Answer: b) Python

Explanation: Python is a high-level programming language, meaning it is


closer to human languages and further from machine code.

Ques: What is the purpose of a database index?

a) To store data permanently

b) To speed up the retrieval of data


c) To back up data

d) To organize files

Answer: b) To speed up the retrieval of data

Explanation: A database index improves the speed of data retrieval


operations on a database table.

Ques: Which of the following is an example of a relational database


management system (RDBMS)?

a) MongoDB

b) Cassandra

c) MySQL

d) Hadoop

Answer: c) MySQL

Explanation: MySQL is a relational database management system, which


organizes data into tables that can be linked based on data relationships.

Ques: Which of the following is a common file system used by


Windows?

a) NTFS

b) EXT4

c) FAT32

d) HFS+

Answer: a) NTFS

Explanation: NTFS (New Technology File System) is the standard file


system used by Windows operating systems.

Ques: Which of the following is not an internet protocol?

a) TCP

b) IP
c) FTP

d) HTTP

Answer: c) FTP

Explanation: FTP (File Transfer Protocol) is used for transferring files, while
TCP, IP, and HTTP are protocols that govern how data is transmitted over the
internet.

Ques: What is the purpose of HTML in web development?

a) To style web pages

b) To define the structure and content of web pages

c) To create interactive web pages

d) To store data on a server

Answer: b) To define the structure and content of web pages

Explanation: HTML (Hypertext Markup Language) is used to create the


structure and content of web pages.

Ques: Which of the following is a method of securing a wireless


network?

a) Using WEP or WPA encryption

b) Disabling the firewall

c) Enabling guest access

d) Using an open network

Answer: a) Using WEP or WPA encryption

Explanation: WEP and WPA are encryption protocols used to secure


wireless networks by encrypting data transmitted over the network.

Ques: What is the main function of a proxy server?

a) To speed up web browsing by caching web pages

b) To manage files on a server


c) To store user passwords

d) To monitor network traffic

Answer: a) To speed up web browsing by caching web pages

Explanation: A proxy server acts as an intermediary between a client and a


server, caching web pages to speed up browsing and providing additional
security.

Ques: Which of the following is an example of a scripting language?

a) C++

b) JavaScript

c) Java

d) SQL

Answer: b) JavaScript

Explanation: JavaScript is a scripting language used to create dynamic


content on web pages.

Ques: Which of the following is used to uniquely identify a network


device?

a) IP address

b) Domain name

c) URL

d) Email address

Answer: a) IP address

Explanation: An IP address uniquely identifies a device on a network.

Ques: What does IoT stand for?

a) Internet of Things

b) Internet of Technology
c) Interconnected Objects Technology

d) Internet of Tomorrow

Answer: a) Internet of Things

Explanation: IoT refers to the network of physical devices connected to the


internet, enabling them to communicate and exchange data.

Ques: Which of the following is a data structure that follows the


LIFO (Last In, First Out) principle?

a) Queue

b) Stack

c) Array

d) Linked List

Answer: b) Stack

Explanation: A stack is a data structure that follows the LIFO principle,


meaning the last element added is the first one to be removed.

1. What is the meaning of the word computer?


Answer: Calculating machine or device.

2. What is the full form of COMPUTER?


Answer: Commonly Operating Machine Purposely Used for Technical and
Educational Research.

3. Who is the father of the modern computer?


Answer: Charles Babbage.

4. How many types of computer memory?


Answer: Computer memory is mainly of two types: primary and secondary.

5. The brain of any computer system is ___?


Answer: CPU.

6. Which company made the first hard disk?


Answer: IBM.

7. 1 KB =?
Answer: 1024 Byte.
8. 1 GB = how many MB?
Answer: 1024 MB.

9. The smallest unit of data in a computer is ___.


Answer: bit.

10. In the computer system, 1 Nibble equal to ____?


Answer: 4 bits.

11. One byte equal to ___?


Answer: 8 bits.

12. WWW stands for?


Answer: World Wide Web.

13. URL stands for?


Answer: Uniform Resource Locator.

14. CPU stands for?


Answer: Central Processing Unit.

15. GUI stands for?


Answer: Graphical User Interface.

16. ALU stands for?


Answer: Arithmetic Logic Unit.

17. OMR stands for?


Answer: Optical Mark Reader.

18. USB stands for?


Answer: Universal Serial Bus.

19. ENIAC stands for?


Answer: Electrical Numerical Integrator and Calculator.

20. BIOS stands for?


Answer: Basic Input Output System.

21. OLE stands for?


Answer: Object Linking and Embedding.

22. SQL stands for?


Answer: Structured Query Language.
23. HTTP stands for?
Answer: Hyper Text Transfer Protocol.

24. NASA stands for?


Answer: National Aeronautics and Space Administration.

25. ICT stands for?


Answer: Information & Communication Technology.

26. LAN stands for?


Answer: Local Area Network.

27. WAN stands for?


Answer: Wide Area Network.

28. NIC stands for?


Answer: Network Interface Card.

29. FTP stands for?


Answer: File Transfer Protocol.

30. E-mail stands for?


Answer: Electronic Mail.

Basic Computer questions and answers (31-60)

31. VIRUS stands for?


Answer: Vital Information Resources Under Seize.

32. VOIP stands for?


Answer: Voice Over Internet Protocol.

33. IC stands for?


Answer: Integrated Circuit.

34. ALU stands for?


Answer: Arithmetic Logic Unit.

35. kb stands for?


Answer: Kilobyte.

36. How many computer generations are there?


Answer: 5.
37. In the first generation of computers, which technology was
used?
Answer: Vacuum Tube.

38. In the second generation of computers, which technology was


used?
Answer: Transistors.

39. In the third generation of computers, which technology was


used?
Answer: Integrated circuits (ICs).

40. In the fourth generation of computers, which technology was


used?
Answer: Very Large Scale Integrated (VLSI) circuits.

50. In the fifth generation of computers, which technology was


used?
Answer: ULSI (Ultra Large Scale Integration)

51. Where is RAM located?


Answer: Mother Board.

52. What is LINUX?


Answer: Operating System.

53. Which is the most common language used in web designing?


Answer: HTML.

54. which is the volatile memory of a computer?


Answer: RAM (random access memory)

55. What are some examples of input devices for computers?


Answer: Mouse, Keyboards, Scanners, Joysticks, Cameras, and Microphones.

56. What are some examples of output devices for computers?


Answer: Speaker, Monitor, Printer, Projector, headphones, etc.

57. How many arrow keys are on the keyboard?


Answer: 4.

58. In MS Word, arrow keys can be used to _____.


Answer: Move the cursor into the text that has already been entered.

59. How many keys are on the keyboard?


Answer: 104.
60. The list of coded instructions in the computer is called ___.
Answer: computer program.

Basic Computer questions and answers (61 -100)

61. Who invented C++?


Answer: Bjarne Stroustrup.

62. Who invented the keyboard?


Answer: Christopher Latham Sholes.

63. The part of the CPU, Which performs all mathematical


operations?
Answer: Arithmetic logic unit(ALU).

64. A computer virus is ____?


Answer: A computer virus is a program that spreads itself and destroys other
programs.

65. Example of hardware?


Answer: Mouse, Printer, Keyboard, Monitor, Graphics Card, Speaker, etc.

66. Which protocol is used for browsing data?


Answer: Hypertext Transfer Protocol (HTTP)

67. Which function key is used to check spellings?


Answer: F7.

68. Computer refresh shortcut key?


Answer: F5.

69. What is the use of Ctrl+Z?


Answer: For undo.

70. Which are the main parts of the central processing unit?
Answer: Control unit (CU) and Arithmetic logic unit (ALU).

71. What is the use of shift+Delete?


Answer: For permanent delete.

72. Windows, Unix, and Dos are examples of____?


Answer: Operating System.

73. The first computer network is?


Answer: ARPANET.
74. ARPANET stands for?
Answer: Advanced Research Projects Agency Network.

75. Who developed the concept of email?


Answer: Ray Tomlinson.

76. The length of the IP address is?


Answer: 32 bits.

77. The length of the MAC address is?


Answer: 48 bits.

78. SIM stands for?


Answer: Subscriber Identity Module.

79. Examples of browsers?


Answer: Google Chrome, Microsoft Edge, Internet Explorer, Apple Safari,
Mozilla Firefox, and Opera.

80. FORTRAN is called?


Answer: Formula Translator.

81. How many function keys are on the keyboard?


Answer: 12 function keys.

82. Which language was used as first generation language?


Answer: Machine Language.

83. RAM and ROM are examples of?


Answer: Storage device.

84. Which operating system is developed by Apple?


Answer: Mac OS.

85. What is an example of a full-duplex network?


Answer: Telephone.

86. What is an example of a half-duplex network?


Answer: Walkie-talkie.

87. What are examples of simplex networks?


Answer: Television broadcasting, radio broadcasting.

88. What is a modem?


Answer: A modem is a device that converts digital signals to analog signals.
89. Who invented Java?
Answer: James Gosling.

90. What is a website’s main page called?


Answer: Homepage.

91. Shortcut key for folder creation?


Answer: Ctrl+Shift+N

92. Who is the developer of Mouse?


Answer: Douglas Engelbart.

93. What’s the use of a computer mouse?


Answer: Computer mouse used for drawing, creating lines, and selecting
options.

94. The brain of the computer system is?


Answer: CPU.

95. Which memory is known as volatile memory?


Answer: RAM.

96. From where we can change the name of a user account?


Answer: Control Panel.

97. What are the two main memories of a computer?


Answer: RAM and ROM.

98. Cache memory acts between?


Answer: CPU & RAM.

99. When is computer literacy day celebrated?


Answer: December 2.

100. Process data is called?


Answer: Information.

Here are 50 common MS Word shortcut keys that can help improve your
productivity while using the software:

1. Ctrl + A: Select all


2. Ctrl + B: Bold text
3. Ctrl + C: Copy selected text or object
4. Ctrl + D: Open the Font dialog box
5. Ctrl + E: Center text
6. Ctrl + F: Open the Find and Replace dialog box
7. Ctrl + G: Open the Go To dialog box
8. Ctrl + H: Open the Find and Replace dialog box (Replace tab)
9. Ctrl + I: Italicize text
10. Ctrl + J: Justify text
11. Ctrl + K: Insert hyperlink
12. Ctrl + L: Left-align text
13. Ctrl + M: Indent a paragraph from the left
14. Ctrl + N: Create a new document
15. Ctrl + O: Open a document
16. Ctrl + P: Print a document
17. Ctrl + Q: Remove paragraph formatting
18. Ctrl + R: Right-align text
19. Ctrl + S: Save a document
20. Ctrl + T: Create a hanging indent
21. Ctrl + U: Underline text
22. Ctrl + V: Paste copied text or object
23. Ctrl + W: Close a document
24. Ctrl + X: Cut selected text or object
25. Ctrl + Y: Redo an action
26. Ctrl + Z: Undo an action
27. Ctrl + ]: Increase font size
28. Ctrl + [: Decrease font size
29. Ctrl + Shift + D: Double underline text
30. Ctrl + Shift + F: Change font
31. Ctrl + Shift + G: Open the Word Count dialog box
32. Ctrl + Shift + H: Apply hidden text formatting
33. Ctrl + Shift + K: Apply the Format as Small Caps
34. Ctrl + Shift + L: Apply the List style
35. Ctrl + Shift + M: Remove a paragraph indent from the left
36. Ctrl + Shift + N: Apply the Normal style
37. Ctrl + Shift + P: Change the font size
38. Ctrl + Shift + Q: Apply the Quote style
39. Ctrl + Shift + S: Apply the Styles task pane
40. Ctrl + Shift + T: Decrease a hanging indent
41. Ctrl + Shift + W: Underline words but not spaces
42. Ctrl + Shift + X: Change the case of selected text
43. Alt + Ctrl + 1: Apply Heading 1 style
44. Alt + Ctrl + 2: Apply Heading 2 style
45. Alt + Ctrl + 3: Apply Heading 3 style
46. Alt + Ctrl + C: Copy formatting
47. Alt + Ctrl + R: Copy the format of selected text
48. Alt + Ctrl + T: Insert a current date and time
49. Alt + Shift + D: Insert a current date
50. Alt + Shift + T: Insert a current time
51. What is the full form of ISDN?
52. (A) Input Service Digital Network
53. (B) Integrated Services Digital Network
54. (C) Integrated Switch Digital Network
55. (D) Input Switch Digital Network
56. Hide Answer
57.
Correct Answer : B

58. Q :
59. Highest capacity of the storage are -
60. (A) Terabyte
61. (B) Yottabyte
62. (C) Zettabyte
63. (D) Exabyte
64. Hide Answer
65.
Correct Answer : B

66. Q :
67. 1 Kilobyte is equal to -
68. (A) 8000 Bits
69. (B) 1024 Bits
70. (C) 512 Bits
71. (D) None of the above
72. Hide Answer
73.
Correct Answer : A

74. Q :
75. Multimedia contains?
76. (A) Audio
77. (B) Video
78. (C) Both 1 and 2
79. (D) none of the above
80. Hide Answer
81.
Correct Answer : C
82. Q :
83. Which key of the keyboard is mainly used to cancel the
program?
84. (A) Del Key
85. (B) Enter Key
86. (C) Ins Key
87. (D) Esc Key
88. Hide Answer
89.
Correct Answer : D

90. Q :
91. A translator for the assembly language to machine language is
92. (A) Assembler
93. (B) Compiler
94. (C) Linker
95. (D) Interpreter
96. Hide Answer
97.
Correct Answer : A

98. Q :
99. Computer language FORTRAN is useful in which field?
100. (A) business
101. (B) Drawing
102. (C) Science
103. (D) Commerce
104. Hide Answer
105.
Correct Answer : C
Explanation :

106. FORTRAN (short for "Formula Translation") is a high-level


programming language that is particularly well-suited for scientific and
engineering applications. It was developed for numeric and scientific
computing and is widely used in fields such as physics, engineering,
mathematics, and other scientific disciplines. FORTRAN allows for
efficient processing of mathematical and scientific computations,
making it a popular choice for complex scientific simulations,
mathematical modeling, and computational research.
107.
108. Q:
109. Which key on a windows keyboard sets to full-screen
mode in most browsers?
110. (A) F11
111. (B) F12
112. (C) F1
113. (D) F10
114. Hide Answer
115.
Correct Answer : A

116. Q:
117. The performance of a hard drive or other storage devices,
meaning how long it takes to locate a file is called?
118. (A) Access Time
119. (B) Quick Time
120. (C) Response Time
121. (D) None of these
122. Hide Answer
123.
Correct Answer : A

124. Q:
125. Which of the following is not a type OS bus?
126. (A) Control bus
127. (B) Software bus
128. (C) Data bus
129. (D) Address bus
130. Hide Answer

Correct Answer : B

Q:
What is the function of a MODEM?

(A) Converts analog signals to digital and vice - versa

(B) Serves as a hardware anti - virus

(C) Encryption & Decryption

(D) Converts data to voice and vice - versa


Hide Answer

Correct Answer : A

Q:
What is the full form of OMR?

(A) On Money Reader

(B) Optical Mark Reader

(C) On Mark Reader

(D) None of these

Hide Answer

Correct Answer : B

Q:
Which of the following is 3rd layer of OSI Model?

(A) Network layer

(B) Session layer

(C) Physical layer

(D) Application layer

Hide Answer

Correct Answer : A

Q:
Which command allows you to reduce fragments of file and optimize
the performance of disk?

(A) Chkdsk

(B) Diskcomp
(C) Scandisk

(D) Defrag

Hide Answer

Correct Answer : D

Q:
In which of these memory access schemes, separate Read / Write
heads are required?

(A) Sequential Access

(B) Direct Access

(C) Random Access

(D) None of these

Hide Answer

Correct Answer : D

Q:
_____are the fastest and the most expensive computers.

(A) Super computers

(B) Laptop

(C) Micro computers

(D) Mini computers

Hide Answer

Correct Answer : A

Q:
CDMA stands for _____________.

(A) Central Development Mobile Association

(B) Code Division Mobile Access

(C) Code Division Multiple Access

(D) Centre of Development Multiple Access

Hide Answer

Correct Answer : C

Q:
In which is the clock speed of the computer calculated?

(A) Bit

(B) Megabyte

(C) Gigabyte

(D) None of these

Hide Answer

Correct Answer : A

Q:
Using what were the first computers programmed?

(A) Machine language

(B) Source card

(C) Object card

(D) Assemble language

Hide Answer
Correct Answer : A

Q:
When was the development of BASIC computer language?

(A) 1955

(B) 1968

(C) 1964

(D) 1975

Hide Answer

Correct Answer : C

Q:
Which method is used to connect a remote computer?

(A) Device

(B) Dialup

(C) Diagnostic

(D) Logic circuit

(E) None of these

Hide Answer

Correct Answer : B

Q:
ROM is an example of which of the following?

(A) volatile memory

(B) cache memory


(C) nonvolatile memory

(D) virtual memory

(E) None of these

Hide Answer

Correct Answer : C

Q:
To correct error in a program:

(A) Debugging

(B) Error moving

(C) bugging

(D) Delete

(E) Coding

Hide Answer

Correct Answer : A

Q:
Writing set of instruction to run a software

(A) Coding

(B) Buffering

(C) Decoding

(D) Amplifying

(E) Debugging

Hide Answer
Correct Answer : A

Q:
Bridge works in _________ of the OSI model.

(A) Transport layer

(B) Network layer

(C) Application layer

(D) Data link layer

(E) Work layer

Hide Answer

Correct Answer : D

Q:
‘SIM’ stands for _________ .

(A) Subscriber Identity Module

(B) Station Interactive Module

(C) Super Interactive Module

(D) Super Identity Module

(E) System Identity Module

Hide Answer

Correct Answer : A

Q:
Which of the following is an examples of Word processing
spreadsheet and photo-editing?
(A) System software

(B) System hardware

(C) application software

(D) platform software

(E) None of these

Hide Answer

Correct Answer : C

Q:
Red triangle at the top right corner of a cell indicates that _________ .

(A) There is an error in the cell

(B) The cell can't accept formula

(C) The cell color is blue

(D) There is an error in the text

(E) There is a comment associated with the cell

Hide Answer

Correct Answer : E

Q:
_________ is a popular DOS based package.

(A) Power Point

(B) Lotus 1-2-3

(C) Smart Cell

(D) Paint
(E) None of these

Hide Answer

Correct Answer : B

Q:
C Programming language was developed by ___________.

(A) Charles Babbage

(B) Larry Wall

(C) James Gosling

(D) Dennis Ritchie

Hide Answer

Correct Answer : D

Q:
Which of the following is a scientific computing language?

(A) COBOL

(B) Basic

(C) Pascal

(D) FORTRAN

Hide Answer

Correct Answer : D

Q:
What is the high-level computer language similar to the English
language?

(A) C++
(B) COBOL

(C) Pascal

(D) FORTRAN

Hide Answer

Correct Answer : B

Q:
Which language is applicable to all computers?

(A) COBOL language

(B) Fortran language

(C) Machine language

(D) Basic language

Hide Answer

Correct Answer : C

Q:
What is the operating system called Unix specially used for?

(A) Laptop computer

(B) Desktop computer

(C) Super computer

(D) Web servers

Hide Answer

Correct Answer : D

Q:
Which of the following is a machine-independent program?

(A) Low level language

(B) High level language

(C) Assemble language

(D) Machine language

Hide Answer

Correct Answer : B

Q:
What does machine language use?

(A) English language code

(B) Numeric code

(C) Java language

(D) All of these

Hide Answer

Correct Answer : B

Q:
Which of the following is the largest unit of storage?

(A) KB

(B) TB

(C) MB

(D) GB

Hide Answer
Correct Answer : B

Q:
How many options are there in one byte?

(A) 64

(B) 16

(C) 8

(D) 512

Hide Answer

Correct Answer : C

Q:
How many bytes makeup one kilobyte?

(A) 4096

(B) 1024

(C) 612

(D) None of these

Hide Answer

Correct Answer : B

Q:
What is the method of storing letters and symbols in bytes called?

(A) Alpha System

(B) Number System

(C) Byte System


(D) Coding system

Hide Answer

Correct Answer : D

Q:
Which of the following is a scientific computing language?

(A) COBOL

(B) Basic

(C) Pascal

(D) FORTRAN

Hide Answer

Correct Answer : D

Q:
What is the high-level computer language similar to the English
language?

(A) C++

(B) COBOL

(C) Pascal

(D) FORTRAN

Hide Answer

Correct Answer : B

Q:
Which language is applicable to all computers?

(A) COBOL language


(B) Fortran language

(C) Machine language

(D) Basic language

Hide Answer

Correct Answer : C

Q:
What is the operating system called Unix specially used for?

(A) Laptop computer

(B) Desktop computer

(C) Super computer

(D) Web servers

Hide Answer

Correct Answer : D

Q:
Which of the following is a machine-independent program?

(A) Low level language

(B) High level language

(C) Assemble language

(D) Machine language

Hide Answer

Correct Answer : B

Q:
What does machine language use?

(A) English language code

(B) Numeric code

(C) Java language

(D) All of these

Hide Answer

Correct Answer : B

Q:
Which of the following is the largest unit of storage?

(A) KB

(B) TB

(C) MB

(D) GB

Hide Answer

Correct Answer : B

Q:
How many options are there in one byte?

(A) 64

(B) 16

(C) 8

(D) 512

Hide Answer
Correct Answer : C

Q:
How many bytes makeup one kilobyte?

(A) 4096

(B) 1024

(C) 612

(D) None of these

Hide Answer

Correct Answer : B

Q:
What is the method of storing letters and symbols in bytes called?

(A) Alpha System

(B) Number System

(C) Byte System

(D) Coding system

Hide Answer

Correct Answer : D

Q:
What is Logic Gate?
(A) Special CD

(B) Software

(C) A type circuit

(D) Computer Game

Hide Answer

Correct Answer : C

Q:
Which one is the program which makes the computer easy to use?

(A) Application

(B) Operating System

(C) Network

(D) Utility

Hide Answer

Correct Answer : D

Q:
Who is the exponent of software technology?

(A) A. A. lumsden

(B) B. F. skinner

(C) Brunner

(D) Ausubel

Hide Answer
Correct Answer : B

Q:
Which of the following is the full form of MOOC?

(A) Modern Open Online Courses

(B) Massive Open Online Courses

(C) Massive Online Open Courses

(D) Mechanical Online Courses

Hide Answer

Correct Answer : B
Explanation :

1. Massive Open Online Courses (MOOC) are changing the world of education
by providing free online courses.

2. MOOC is a web-based free distance learning program that ensures the


participation of students from geographically remote areas in the field of
education.

3. It offers free online courses for higher education, executive education and
employee development.

Q:
The Indian medium for 'Massive Open Online Courses' is-

(A) self

(B) blackboard

(C) Moodle

(D) Edex
Hide Answer

Correct Answer : A

Q:
The father of soft approach to educational technology was-

(A) Lumsden

(B) Morrison

(C) Bloom

(D) B.F. skinner

Hide Answer

Correct Answer : D

Q:
Mainly educational computer is used for -

(A) For research equipment

(B) For teacher learning

(C) For management tools

(D) All of the above

Hide Answer

Correct Answer : D

Q:
ICT means -

(A) International communication technology

(B) Indian Technical Commission


(C) Information and communication technology

(D) Exchange of communication technology

Hide Answer

Correct Answer : C

Q:
Whose invention was the beginning of the information technology
era?

(A) Telephone

(B) Television

(C) Computer

(D) Watch

Hide Answer

Correct Answer : C

Q:
With respect to the basic PC keyboard, the ‘Break’ key is shared
with the ........ key.

(A) insert

(B) pause

(C) home

(D) end

Hide Answer

Correct Answer : B
1. What is a commonly used word processing software?
a) Microsoft Word
b) Adobe Photoshop
c) Google Chrome
d) Microsoft Excel
Answer: a) Microsoft Word

2. Which software is used for creating and managing


spreadsheets?
a) Microsoft Excel
b) Microsoft PowerPoint
c) Adobe Illustrator
d) Google Drive
Answer: a) Microsoft Excel

3. What is the function of presentation software?


a) Creating and editing images
b) Designing websites
c) Creating visually engaging presentations
d) Writing computer programs
Answer: c) Creating visually engaging presentations

4. What is the main purpose of internet browsing?


a) Playing video games
b) Watching movies
c) Researching information
d) Sending text messages
Answer: c) Researching information

5. Which of the following is an email client?


a) Microsoft Outlook
b) Adobe Photoshop
c) Facebook Messenger
d) Netflix
Answer: a) Microsoft Outlook

6. What is file management?


a) Organizing and managing files and folders on a computer
b) Designing computer hardware
c) Developing mobile applications
d) Creating computer networks
Answer: a) Organizing and managing files and folders on a
computer

7. What are the basic principles of data security and privacy?


a) Creating strong passwords and using antivirus software
b) Sharing personal information online
c) Clicking on suspicious email attachments
d) Ignoring software updates
Answer: a) Creating strong passwords and using antivirus
software

8. What is a collaboration tool?


a) Microsoft Word
b) Google Drive
c) Adobe Illustrator
d) Microsoft Excel
Answer: b) Google Drive

9. What is basic troubleshooting?


a) Identifying and resolving common computer issues
b) Developing computer software
c) Designing computer networks
d) Repairing computer hardware
Answer: a) Identifying and resolving common computer issues

10. Which of the following is a social media platform?


a) Microsoft Word
b) Adobe Photoshop
c) Facebook
d) Microsoft Excel
Answer: c) Facebook
11. What is digital literacy?
a) Understanding and using digital technologies effectively
b) Writing computer code
c) Designing websites
d) Creating digital art
Answer: a) Understanding and using digital technologies
effectively

12. What is programming?


a) Writing instructions for a computer to execute
b) Using social media platforms
c) Playing video games
d) Watching movies online
Answer: a) Writing instructions for a computer to execute

13. Which software is commonly used for data analysis?


a) Microsoft Word
b) Microsoft Excel
c) Adobe Illustrator
d) Google Chrome
Answer: b) Microsoft Excel

14. What is the purpose of data visualization software?


a) Creating and editing images
b) Designing websites
c) Presenting data in a visual format
d) Writing computer programs
Answer: c) Presenting data in a visual format

15. What is the primary function of a web browser?


a) Creating documents
b) Managing files and folders
c) Navigating the internet
d) Analyzing data
Answer: c) Navigating the internet

You might also like