π» 100 Computer MCQ Questions and Answers
Quiz With Score
|
Mock Test
|
Computer Awareness MCQs
Set β 1 | Practice Questions for
General Awareness & Competitive Exams
Challenge yourself with
Computer MCQs
and check answers with
detailed explanations
β
Useful for:
SSC, SSC CGL, SSC CHSL, SSC MTS, SSC GD, Banking (IBPS PO/Clerk, SBI PO/Clerk, RBI), Railway (RRB NTPC, Group D, ALP, Technician), UPSC, State PCS, CTET, CUET, NDA, CDS, Police Exams, Delhi Police, CRPF, CISF, BSF, Army, Air Force, Navy, AIIMS, ESIC, NHM, Nursing, CHO, ANM, GNM, B.Sc Nursing, Paramedical, Teaching Exams, Insurance Exams (LIC, NICL, UIIC), and other Competitive Exams.
Question 1: Which of the following is considered the brain of a computer?
A) RAM B) CPU C) Hard Disk D) Motherboard
Question 2: Which protocol is primarily used for secure web browsing?
A) FTP B) HTTPS C) SMTP D) POP3
Question 3: In database management systems, what does SQL stand for?
A) Sequential Query Logic B) System Query Language C) Structured Query Language D) Standard Question Language
Question 4: Which memory is volatile in nature?
A) ROM B) SSD C) RAM D) DVD
Question 5: Which of the following devices converts digital signals into analog signals?
A) Modem B) Scanner C) Plotter D) Switch
Question 6: What is the default file extension of Microsoft Word documents in newer versions?
A) .txt B) .xlsx C) .pptx D) .docx
Question 7: Which topology uses a central connecting device?
A) Bus B) Star C) Ring D) Mesh
Question 8: Which software acts as an interface between user and hardware?
A) Compiler B) Antivirus C) Operating System D) Assembler
Question 9: Which key combination is commonly used to paste copied content in Windows?
A) Ctrl + X B) Ctrl + C C) Ctrl + V D) Ctrl + A
Question 10: Which type of memory permanently stores startup instructions?
A) Cache Memory B) RAM C) ROM D) Virtual Memory
Question 11: Which of the following is an example of an input device?
A) Monitor B) Scanner C) Speaker D) Plotter
Question 12: Which component is responsible for temporary high-speed storage close to the CPU?
A) ROM B) Hard Disk C) Optical Disk D) Cache Memory
Question 13: Which command is used in MS Word to save a document quickly?
A) Ctrl + S B) Ctrl + P C) Ctrl + N D) Ctrl + D
Question 14: What is the full form of URL?
A) Universal Reference Link B) Uniform Retrieval Locator C) Uniform Resource Locator D) Unified Resource Link
Question 15: Which of the following is NOT an operating system?
A) Linux B) Windows C) Oracle D) macOS
Question 16: Which network device forwards data packets between different networks?
A) Hub B) Router C) Repeater D) NIC
Question 17: In MS Access, which object is mainly used to retrieve specific data?
A) Form B) Report C) Query D) Macro
Question 18: Which type of software is designed to damage or disrupt a computer system?
A) Utility Software B) Firmware C) Shareware D) Malware
Question 19: Which memory unit is equal to 1024 bytes?
A) Megabyte B) Kilobyte C) Gigabyte D) Terabyte
Question 20: Which function key is commonly used to refresh a webpage in Windows browsers?
A) F1 B) F2 C) F5 D) F12
Question 21: Which transmission mode allows data to flow in both directions simultaneously?
A) Simplex B) Half Duplex C) Full Duplex D) Analog Duplex
Question 22: Which part of the CPU performs arithmetic and logical operations?
A) Control Unit B) Register C) ALU D) Cache
Question 23: Which of the following file extensions is associated with MS Excel?
A) .pptx B) .docx C) .xlsx D) .accdb
Question 24: Which type of attack attempts to trick users into revealing confidential information?
A) Phishing B) Defragmentation C) Debugging D) Encoding
Question 25: Which bus carries memory addresses from the processor?
A) Control Bus B) Address Bus C) Data Bus D) Expansion Bus
Question 26: Which of the following is an example of open-source operating system?
A) Windows 11 B) MS-DOS C) Linux D) iOS
Question 27: What does GUI stand for in computing?
A) General User Interaction B) Graph Utility Interface C) Global User Integration D) Graphical User Interface
Question 28: Which database key uniquely identifies each record in a table?
A) Foreign Key B) Composite Key C) Primary Key D) Alternate Key
Question 29: Which technology is commonly used for wireless personal area networks?
A) Ethernet B) DSL C) Bluetooth D) Fiber Optics
Question 30: Which scheduling algorithm executes processes based on arrival order?
A) Round Robin B) Shortest Job First C) Priority Scheduling D) First Come First Serve
Question 31: Which normalization form removes transitive dependency in a relational database?
A) First Normal Form B) Boyce-Codd Normal Form C) Third Normal Form D) Second Normal Form
Question 32: Which memory mapping technique allows a process to execute larger programs than physical memory?
A) Cache Mapping B) Virtual Memory C) Buffering D) Spooling
Question 33: In networking, what is the maximum data rate of Gigabit Ethernet?
A) 100 Mbps B) 10 Mbps C) 10 Gbps D) 1 Gbps
Question 34: Which command in Windows is used to check network connectivity between two devices?
A) ping B) copy C) dir D) cls
Question 35: Which RAID level provides striping with parity for fault tolerance?
A) RAID 0 B) RAID 1 C) RAID 5 D) RAID 10
Question 36: Which protocol is responsible for assigning IP addresses automatically?
A) DNS B) FTP C) DHCP D) SNMP
Question 37: Which scheduling algorithm is most suitable for time-sharing operating systems?
A) FCFS B) Round Robin C) Shortest Job First D) Priority Scheduling
Question 38: Which SQL clause is used to filter grouped records?
A) WHERE B) ORDER BY C) HAVING D) DISTINCT
Question 39: Which component interprets and executes program instructions in a computer?
A) Register B) ALU C) Control Unit D) Bus Interface
Question 40: Which network topology provides the highest fault tolerance?
A) Bus B) Ring C) Star D) Mesh
Question 41: In MS Excel, which function counts numerical values in selected cells?
A) COUNTA B) COUNT C) SUM D) AVERAGE
Question 42: Which type of malware secretly records user activities such as keystrokes?
A) Worm B) Trojan C) Spyware D) Compiler
Question 43: Which addressing mode directly specifies the operand value in an instruction?
A) Direct Addressing B) Indirect Addressing C) Immediate Addressing D) Indexed Addressing
Question 44: Which layer of the TCP/IP model is equivalent to the OSI transport layer?
A) Internet Layer B) Application Layer C) Network Access Layer D) Transport Layer
Question 45: Which file system is commonly used by modern Windows operating systems?
A) NTFS B) FAT12 C) ext2 D) HFS+
Question 46: Which SQL operation combines rows from two or more tables based on related columns?
A) UNION B) GROUP BY C) JOIN D) ALTER
Question 47: Which protocol translates domain names into IP addresses?
A) SMTP B) DNS C) ARP D) HTTP
Question 48: What is the primary purpose of an interrupt in computer organization?
A) Increase Storage B) Reduce RAM C) Handle urgent events D) Compress Data
Question 49: Which type of software translates high-level language into machine code line by line?
A) Assembler B) Linker C) Loader D) Interpreter
Question 50: Which protocol is used for sending emails over the internet?
A) POP3 B) IMAP C) SMTP D) SSH
Question 51: Which concept allows multiple users to access a database simultaneously?
A) Redundancy B) Concurrency C) Virtualization D) Compilation
Question 52: Which memory access method is used in RAM?
A) Sequential Access B) Indexed Access C) Random Access D) Serial Access
Question 53: Which Windows utility is used to remove unnecessary files from disk?
A) Device Manager B) Task Scheduler C) Disk Cleanup D) Event Viewer
Question 54: Which data structure follows the Last In First Out principle?
A) Stack B) Queue C) Linked List D) Tree
Question 55: Which protocol provides secure remote login over a network?
A) FTP B) HTTP C) Telnet D) SSH
Question 56: Which database model organizes data into tables consisting of rows and columns?
A) Hierarchical Model B) Network Model C) Relational Model D) Object Model
Question 57: Which technique is used by operating systems to avoid deadlock?
A) Fragmentation B) Spooling C) Deadlock Prevention D) Buffering
Question 58: Which protocol is connection-oriented in the TCP/IP suite?
A) UDP B) TCP C) ICMP D) ARP
Question 59: Which MS Access feature helps maintain relationships between related tables?
A) AutoFilter B) Validation Rule C) Input Mask D) Referential Integrity
Question 60: Which type of cloud service provides virtualized computing resources over the internet?
A) SaaS B) PaaS C) IaaS D) DaaS
Question 61: Which SQL command is used to remove a table structure along with its data?
A) DELETE B) DROP C) TRUNCATE D) REMOVE
Question 62: Which memory management technique divides memory into fixed-size blocks?
A) Segmentation B) Swapping C) Paging D) Spooling
Question 63: Which protocol is commonly used to transfer files over the internet?
A) FTP B) SMTP C) SNMP D) DHCP
Question 64: Which type of software is designed to perform specific user tasks?
A) Firmware B) System Software C) Application Software D) Utility Kernel
Question 65: Which of the following is a non-impact printer?
A) Dot Matrix Printer B) Daisy Wheel Printer C) Laser Printer D) Drum Printer
Question 66: Which database language command is used to retrieve data?
A) INSERT B) UPDATE C) ALTER D) SELECT
Question 67: Which layer of the OSI model ensures reliable data transmission?
A) Physical Layer B) Transport Layer C) Session Layer D) Presentation Layer
Question 68: Which storage medium uses pits and lands to store data?
A) SSD B) RAM C) Optical Disk D) Cache
Question 69: Which keyboard shortcut opens Task Manager directly in Windows?
A) Ctrl + Alt + Tab B) Alt + F4 C) Ctrl + Shift + Esc D) Ctrl + F1
Question 70: Which type of transmission sends data one bit at a time?
A) Parallel Transmission B) Serial Transmission C) Duplex Transmission D) Broadband Transmission
Question 71: Which SQL function returns the highest value in a column?
A) AVG B) COUNT C) MAX D) SUM
Question 72: Which type of cyberattack floods a server with excessive requests?
A) Phishing B) Spoofing C) Sniffing D) DoS Attack
Question 73: Which component stores the BIOS firmware in a computer?
A) RAM B) Cache C) ROM D) Register
Question 74: Which MS Excel feature visually represents data trends using charts?
A) Charts B) Macros C) Pivot Notes D) Mail Merge
Question 75: Which networking device operates mainly at the data link layer?
A) Router B) Switch C) Gateway D) Repeater
Question 76: Which software testing method checks individual program units separately?
A) System Testing B) Acceptance Testing C) Unit Testing D) Regression Testing
Question 77: Which type of network covers a large geographical area?
A) LAN B) PAN C) WAN D) CAN
Question 78: Which operating system feature allows multiple programs to run simultaneously?
A) Paging B) Multitasking C) Spooling D) Formatting
Question 79: Which command is used to permanently remove records from a table based on conditions?
A) DROP B) REMOVE C) DELETE D) MODIFY
Question 80: Which protocol is responsible for error reporting and diagnostics in networks?
A) TCP B) UDP C) HTTP D) ICMP
Question 81: Which memory is integrated directly into the CPU for ultra-fast access?
A) RAM B) ROM C) Registers D) HDD
Question 82: Which type of database relationship allows one record to relate to many records?
A) Many-to-Many B) One-to-One C) One-to-Many D) Circular
Question 83: Which Windows utility displays information about installed hardware devices?
A) Disk Cleanup B) Device Manager C) Registry Editor D) Paint
Question 84: Which topology connects all devices using a single communication cable?
A) Star B) Bus C) Mesh D) Hybrid
Question 85: Which MS Word feature automatically corrects common typing mistakes?
A) Mail Merge B) Track Changes C) WordArt D) AutoCorrect
Question 86: Which programming language is primarily used for webpage styling?
A) CSS B) SQL C) Python D) C++
Question 87: Which backup strategy creates copies only of changed files since the last backup?
A) Full Backup B) Mirror Backup C) Incremental Backup D) Clone Backup
Question 88: Which term refers to unauthorized access to computer systems?
A) Encryption B) Formatting C) Hacking D) Defragmentation
Question 89: Which SQL keyword is used to arrange query results in ascending or descending order?
A) GROUP BY B) ORDER BY C) HAVING D) FILTER
Question 90: Which communication mode allows data transfer in only one direction?
A) Half Duplex B) Full Duplex C) Simplex D) Multiplex
Question 91: Which file extension is commonly associated with compressed files?
A) .exe B) .dll C) .sys D) .zip
Question 92: Which technology enables virtual machines to run on a single physical server?
A) Defragmentation B) Multiprocessing C) Virtualization D) Pagination
Question 93: Which device converts hard copy documents into digital images?
A) Plotter B) Scanner C) Speaker D) Projector
Question 94: Which network security method scrambles data into unreadable form?
A) Compression B) Formatting C) Encryption D) Debugging
Question 95: Which software license allows free use, modification, and distribution of source code?
A) Open Source License B) Proprietary License C) OEM License D) Trial License
Question 96: Which type of address uniquely identifies a device on a local network?
A) IP Address B) URL C) MAC Address D) DNS Address
Question 97: Which Excel feature summarizes large datasets interactively?
A) Mail Merge B) WordArt C) Pivot Table D) Hyperlink
Question 98: Which process checks and fixes file system errors on a disk?
A) Formatting B) Partitioning C) Compression D) Disk Checking
Question 99: Which term refers to the unauthorized duplication of software?
A) Debugging B) Software Piracy C) Encryption D) Authentication
Question 100: Which artificial intelligence technique enables computers to learn from data without explicit programming?
A) Multiprocessing B) Virtual Memory C) Machine Learning D) Defragmentation
𧬠More General Science Questions and Answer
Explore exam-style MCQs for Physics, Chemistry, Enviroment-Ecology and Biology from competitive exams worldwide.
β Frequently Asked Questions (FAQs)
1. What are Computer MCQ questions?
Computer MCQ questions are multiple choice questions related to computer fundamentals, networking, operating systems, MS Office, databases, memory, software, hardware, and internet concepts commonly asked in competitive exams.
2. Which exams include Computer Awareness questions?
Computer Awareness questions are commonly asked in SSC, Banking, Railway, UPSC, State PCS, RRB, IBPS, SBI, RBI, Insurance, Police, Defence, Nursing, AIIMS, ESIC, NHM, CHO, ANM, GNM, B.Sc Nursing, CTET, CUET, and many other competitive exams.
3. Are these 100 Computer MCQs useful for beginners?
Yes, these Computer MCQs are designed for beginners as well as advanced learners. They cover basic to moderate and high-level concepts with detailed explanations for better understanding.
4. What topics are covered in these Computer MCQ questions?
These Computer MCQs cover computer fundamentals, operating systems, networking, database management systems, memory, input and output devices, MS Word, MS Excel, MS Access, cybersecurity, internet protocols, cloud computing, and software concepts.
5. Why are Computer Awareness MCQs important for competitive exams?
Computer Awareness MCQs help candidates improve technical knowledge and score better in competitive exams where computer aptitude and digital literacy are important sections.
6. Do these Computer MCQs include answers and explanations?
Yes, every Computer MCQ includes the correct answer along with a detailed explanation to help students understand the concept clearly.
7. Are these Computer questions helpful for SSC and Banking exams?
Yes, these Computer questions are highly useful for SSC CGL, SSC CHSL, SSC MTS, Banking exams like IBPS, SBI, RBI, and other government job examinations.
8. Can I practice these Computer MCQs as a mock test?
Yes, these Computer MCQs are designed in quiz and mock test format with score-based practice to improve speed, accuracy, and exam performance.