Basics of Computer Science
1. Which of the following is the brain of the computer?
a) RAM
b) CPU
c) Hard Drive
d) GPU
Answer: b) CPU
2. What does RAM stand for?
a) Read Access Memory
b) Random Access Memory
c) Reliable Access Module
d) Random Allocation Module
Answer: b) Random Access Memory
3. Which type of software controls the hardware of a computer?
a) System Software
b) Application Software
c) Malware
d) Firmware
Answer: a) System Software
4. Which of the following is volatile memory?
a) ROM
b) SSD
c) RAM
d) HDD
Answer: c) RAM
5. Binary number system uses which two digits?
a) 0 and 9
b) 1 and 9
c) 0 and 1
d) 1 and 2
Answer: c) 0 and 1
Networking
6. Which protocol is used to browse the web?
a) FTP
b) HTTP
c) SMTP
d) DHCP
Answer: b) HTTP
7. What does IP stand for in networking?
a) Internal Protocol
b) Internet Protocol
c) Integrated Protocol
d) Initial Protocol
Answer: b) Internet Protocol
8. Which device is used to connect multiple computers in a network?
a) Router
b) Switch
c) Modem
d) Printer
Answer: b) Switch
9. What does DNS stand for?
a) Domain Numbering System
b) Direct Network Service
c) Domain Name System
d) Distributed Network System
Answer: c) Domain Name System
10. The OSI model has how many layers?
a) 5
b) 6
c) 7
d) 8
Answer: c) 7
Operating Systems
11. Which of the following is not an operating system?
a) Windows
b) Linux
c) Oracle
d) macOS
Answer: c) Oracle
12. The primary purpose of an operating system is to:
a) Manage software applications
b) Handle user inputs and outputs
c) Manage computer hardware resources
d) All of the above
Answer: d) All of the above
13. What is the full form of GUI?
a) Graphic User Interface
b) Graphical User Integration
c) Graphic Universal Interaction
d) General User Interface
Answer: a) Graphic User Interface
14. Which of the following is a command-line operating system?
a) Windows
b) DOS
c) macOS
d) Android
Answer: b) DOS
15. A collection of programs that control a computer is called:
a) Software
b) Firmware
c) Hardware
d) Peripheral
Answer: a) Software
MS Office
16. Which shortcut key is used to copy text in MS Word?
a) Ctrl + X
b) Ctrl + V
c) Ctrl + C
d) Ctrl + Z
Answer: c) Ctrl + C
17. Which function is used to calculate the sum of a range in MS Excel?
a) =SUM()
b) =ADD()
c) =TOTAL()
d) =COUNT()
Answer: a) =SUM()
18. In PowerPoint, which shortcut is used to start a slideshow?
a) F2
b) F5
c) F7
d) F10
Answer: b) F5
19. What is the extension of an MS Excel file?
a) .docx
b) .pptx
c) .xlsx
d) .pdf
Answer: c) .xlsx
20. Which feature in MS Word is used to align text evenly between margins?
a) Left Align
b) Right Align
c) Center Align
d) Justify
Answer: d) Justify
Programming Basics
21. Which of the following is not a programming language?
a) Python
b) HTML
c) Java
d) C++
Answer: b) HTML
22. What does 'HTML' stand for?
a) HyperText Markup Language
b) HighText Machine Language
c) HyperText Markdown Language
d) HyperTool Markup Language
Answer: a) HyperText Markup Language
23. Which symbol is used to end a statement in C language?
a) .
b) ;
c) :
d) ,
Answer: b) ;
24. What is the full form of IDE in programming?
a) Integrated Development Environment
b) Integrated Design Environment
c) Initial Development Engine
d) Interactive Development Editor
Answer: a) Integrated Development Environment
25. In Python, what data type does the function type(3.14) return?
a) int
b) float
c) str
d) complex
Answer: b) float
Cybersecurity
26. A computer program that replicates itself is called a:
a) Trojan
b) Virus
c) Worm
d) Spyware
Answer: c) Worm
27. What does SSL stand for?
a) Secure Socket Layer
b) Secured System Link
c) System Security Level
d) Secure Server Layer
Answer: a) Secure Socket Layer
28. What is the purpose of a firewall?
a) To enhance hardware performance
b) To block unauthorized access
c) To repair system errors
d) To encrypt data
Answer: b) To block unauthorized access
29. Phishing attacks are targeted towards:
a) Hardware systems
b) Websites
c) Users' personal information
d) Network hardware
Answer: c) Users' personal information
30. Which of the following is NOT a type of malware?
a) Ransomware
b) Spyware
c) Adware
d) Firmware
Answer: d) Firmware