Computer Questions and Answers


Computer » Internet

What holds true for  “Internet”?

A

It is interconnection of few computers.

B

It is confined to a space.

C

It is called network of networks

D

It is centralized network.

Solution

It is called as network of networks. A general network connecting several million of computers. It enables the exchange of data and information.Internet is decentralized.

Computer » Basic Computer fundamentals

Smallest unit of an image is ____.

A

bit

B

nibble

C

pixel

D

bytes

Solution

Pixel is the smallest unit that compose an image. Pixels are the small dots. 

Computer » Programming Languages

Which of the following enables an object , variable or a method in OOPs to take multiple forms?

A

Inheritance

B

Polymorphism

C

Encapsulation

D

Abstraction

Solution

Polymorphism : It is a OOPs concept that is refers the ability of an object/variable/method  to take multiple forms.

Example: "Animal" class has different sub-classes like horse, fish, tiger etc. "Animal" class has one method called "Move" which will be defined in different ways in subclasses.

Like when for "horse" class it will be as "trotting" while for "Fish" class it will be "Swimming".

Inheritance : It refers to the ability of subclass to inherit features of the parent class. It leads to helps re-usability of code.

Encapsulation : It refers to binding of methods/variables/objects of one class together.

Abstraction : It refers to the hiding of the data.

Generalization : It refers to grouping of subclasses into one class. Like Permanent faculty and Guest

Computer » Full forms

Full Form of VIRUS?

A

Vital Information Resources Under Seize

B

Virtual infected resource under size

C

Very infected resource under size

D

Virtual information resource under structure

Solution

VIRUS- Full form of VIRUS is Vital Information Resource under Sieze. Virus is generally a malicious software program in computer.

Computer » Programming Languages

What is the base of Octal system of coding?

A

5

B

8

C

10

D

16

Solution

In Octal coding system a value is represented by 3 bits which in general represents the decimal value from 0 to 7 with each digit having a weight or value of just 8 starting from the least significant bit (LSB).It has hence base of 8.

Computer » Hardware

CPU is composed of which of the following?

A

ALU

B

CU

C

Registers

D

All of above

Solution

CPU is composed of all three stated above as CU is control unit controlling the devices , ALU is arithmetic logical unit that is for arithmetic and logical operations and registers are the fastest memory used for storage.

Computer » Software

Find the odd one out.

A

Virus

B

Trojan horse

C

Spyware

D

Antivirus

Solution

All other are malware and antivirus is used to prevent the system from virus attacks.

Computer » Software

Verification based on login id and password is called as?

A

Logging in

B

Configuration

C

Authentication

D

Confidentiality

Solution

Authentication is  a process by which credential of a user account are verified.

Computer » Hardware

Which among the following is a volatile memory?

A

RAM

B

ROM

C

PROM

D

EEPROM

Solution

RAM is random access memory that loose data when the power supply if OFF. This is called volatile memory. All other retain  the data that is stored hence non-volatile.

Computer » Basic Computer fundamentals

Which is called brain of computer?

A

CPU

B

Motherboard

C

Memory

D

RAM

Solution

CPU is called brain of the computer as it involves all the functioning and controlling of computer

Computer » Shortcut keys

Which keyboard key is used to check spelling mistakes in a written document?

A

F7

B

Shift+F7

C

F11

D

F2

Solution

F7 key is used for spell check in the written document to avoid spelling mistakes.

F11 key is used to enter in full-screen mode and F2 key is used to rename the file or folder.


  • F7 कुंजी का प्रयोग एक लिखित डॉक्‍यूमेंट में स्‍पेलिंग चेक करने के लिए करते हैं।
  • जब कि F11 कुंजी का प्रयोग फुल स्‍क्रीन मोड में प्रवेश करने के लिए करते हैं और F2 कुंजी का प्रयोग फाइल अथवा फोल्‍डर को रीनेम करने हेतु करते हैं।

Computer » Shortcut keys

There are how many function keys present on a keyboard?

A

12

B

11

C

10

D

15

Solution
  • The function keys or f keys are lined along the top of the keyboard and labelled F1 through F12.
  • These keys act as shortcuts, performing certain functions, like saving files or printing data.
  • For example, the F1 key is often used as the default help key in many programs

  • फंक्शन कुंजी अथवा F की कीबोर्ड के ऊपरी भाग में F1 से F12 तक क्रमशः लगी होती हैं।
  • ये कुंजियां विशेष कार्य जैसे फाइल सेव अथवा प्रिंट आदि करने के लिए शॉर्टकट का काम करती हैं।
  • कई प्रोग्राम में F1 की डिफॉल्ट Help Key होती है।

Computer » Computer Networking

What is the name of the network topology in which there are bi-directional links between each possible node?

A

Ring

B

Star

C

Tree

D

Mesh

Solution

The network topology that supports bi-directional links between each possible node is called Mesh.

Computer » Software

Which mechanism is used by the computer virus 'worm' to duplicate itself?

A

Swap

B

Increment

C

Spawn

D

Swarm

Solution
  • A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works.

  • The virus requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator.

  • Spawn is used by the computer virus 'worm' to duplicate itself.

    * कंप्यूटर वायरस एक द्वेषपूर्ण कोड है जो किसी अन्य प्रोग्राम, कंप्यूटर बूट सेक्टर या दस्तावेज़ में खुद को कॉपी करता है और कंप्यूटर के काम में बदलाव लाता है।

    * वायरस को किसी व्यक्ति या उपयोगकर्ता या सिस्टम व्यवस्थापक की सूचना या अनुमति के बिना जानबूझकर या अनजाने में संक्रमण फैलाने की आवश्यकता होती है।

    * स्पॉन का इस्तेमाल कंप्यूटर वायरस 'वर्म' द्वारा खुद की नक़ल करने के लिए किया जाता है।

Computer » Shortcut keys

Which among the following is a ‘Modifier key’?

A

Control

B

Shift

C

Alt

D

All options are correct

Solution

Modifier key means those keys which temporarily changes the function of another key when pressed together. And all the three-Control, Shift and Alt acts as Modifier keys.


मॉडीफायर की का अर्थ है वे की (कुंजी) जो किसी अन्य कुंजी के साथ दबाए जाने पर अस्थाई रूप से कुंजी (की) के फ़ंक्शन को बदल देती हैं। और Control, Shift और Alt तीनों मॉडीफायर की (कुंजी) के रूप में कार्य करती हैं।

Computer » Email

Who is known as the ‘Father of Email’?

A

Larry Page

B

Alan Turing

C

Raymond Tomlinson

D

Elon Musk

Solution
  • Raymond Tomlinson is considered as the ‘Father of Email’.

  • He was a pioneering American computer programmer who implemented the first email program on the ARPANET system, the precursor to the Internet, in 1971.

  • He is internationally known and credited as the inventor of email.

    रेमंड टॉमलिंसन को 'ईमेल का जनक' माना जाता है।

    * वह एक अग्रणी अमेरिकी कंप्यूटर प्रोग्रामर थे जिन्होंने 1971 में इंटरनेट के प्रणेता ARPANET सिस्टम पर पहला ईमेल प्रोग्राम किया था।

    * उन्हें अंतरराष्ट्रीय स्तर पर जाना जाता है और उन्हें ईमेल के आविष्कारक के रूप में जाना जाता है।

Computer » Operating Systems

Teach Text' is a text editor in which of the following operating systems?

A

Windows

B

Google Chrome

C

Mozilla Firefox

D

Macintosh

Solution
  • The TeachText application is a simple text editor made by Apple Computer and included with Macintosh System 7.1 and earlier.
  • It was created by Apple programmer Bryan Stearns with later versions created by Stearns and Francis Stanbach.
  • TeachText was one of the only applications included with System 7, leading to its frequent role as the application to open "ReadMe" files.
  • It was named "TeachText" as a nod to this role in tutorials and other introductory materials.

  • ‘टीच टेक्‍स्‍ट’ एप्‍लीकेशन ऐप्‍पल कंप्‍यूटर द्वारा बनाया गया एक साधारण टेक्‍स्‍ट एडिटर है और इसमें मैकिंटोश सिस्‍टम 7.1 और इससे पहले के वर्जन का प्रयोग किया गया है।
  • यह ऐप्‍पल प्रोग्रामर ब्रायन स्‍टेयर्न्‍स द्वारा बनाया गया है जिसमें से बाद के वर्जन स्‍टेयर्न्‍स और फ्रांसिस स्‍टैनबैक द्वारा बनाए गए थे।
  • टीच टेक्‍स्‍ट ‘रीडमी’ फाइलों को खोलने में एप्‍लीकेशन की भूमिका निभाने वाला सिस्‍टम 7 युक्‍त एकमात्र एप्‍लीकेशन था।
  • इसे ट्यूटोरियल और अन्‍य परिचयात्‍मक सामग्रियों में इसकी भूमिका के लिए ‘टीच टेक्‍स्‍ट’ नाम दिया गया था।

Computer » Computer Networking

Which of the following is an application protocol?

A

HTTP

B

TCP

C

IP

D

UDP

Solution
  • Hypertext transfer protocol is an application protocol for distributed, collaborative, and hypermedia information systems.

  • HTTP is the foundation of data communication for the World Wide Web.

     हाइपरटेक्स्ट ट्रांसफर प्रोटोकॉल वितरित, सहयोगी और हाइपरमीडिया सूचना प्रणाली के लिए एक एप्लिकेशन प्रोटोकॉल है।

    * HTTP वर्ल्ड वाइड वेब के लिए डेटा संचार की नींव है।

Computer » Programming Languages

Which of the following is considered as first high level programming language?

A

FORTRAN

B

PROLOG

C

BASIC

D

LOGO

Solution
  • FORTRAN is a short form of ‘Formula Translation’.

  • It is considered to be the first high level language, which is used by scientists and engineers to easily solve mathematical formulas and to do complex scientific calculations.

  • FORTRANwas developed by John Backus (IBM) in 1957.

    FORTRAN 'फॉर्मूला ट्रांसलेशन का संक्षिप्त रूप है।

    यह पहली उच्च स्तरीय भाषा के रूप में जानी जाती है, जिसका उपयोग वैज्ञानिकों और इंजीनियरों द्वारा गणितीय सूत्रों को आसानी से हल करने और जटिल वैज्ञानिक गणना करने के लिए किया जाता है।

    FORTRAN को 1957 में जॉन बैकस (IBM) द्वारा विकसित किया गया था।

Computer » Operating Systems

WINDOWS-98 is basically

A

a high level language

B

an operating system

C

an input device

D

a machine language

Solution
  • WINDOWS-98 is basically an operating system.
  • It was developed by Microsoft.
  • WINDOWS-98 is basically an operating system.
  • It was developed by Microsoft.