Home

Computer Quiz Questions

Computer Quiz Questions
1. COBOL is widely used in …………………..applications.
(A) Commercial (B) Scientific
(C) Splice (D) Mathematical

2. 1 Byte = ?
(A) 8 bits (B) 4 bits
(C) 2 bits (D) 9 bits

3. Which of the following is NOT one of the four major data processing functions of a computer?
(A) gathering data (B) processing data into information
(C) analyzing the data or information (D) storing the data or information

4. …………………..is data that has been organized or presented in a meaningful fashion.
(A) A process (B) Software
(C) Storage (D) Information

5. Computers gather data, which means that they allow users to …………………..data.
(A) present (B) input
(C) output (D) store

6. Worm was made up–
(A) one program (B) two programs
(C) three program (D) all of the above

7. Trap door–
(A) could be included in a compiler (B) pose a difficult problem because, detect them 
(C) both ‘A’ and ‘B’ (D) none of these 

8. Which is NOT a good Web security strategy?
(A) Restrict access to the Web server keep a minimum number of ports open
(B) Limit the users who can load software, edit or add files.
(C) Add demo programs, so users can test system without accessing production data.
(D) Remove unnecessary compilers and interpreters. 

9. The altering of data so that it is not usable unless the changes are undone is–
(A) Biometrics (B) Compression 
(C) Encryption (D) Ergonomics

10. The word FIP stands for–
(A) File Translate Protocol (B) File Transit Protocol
(C) File Typing Protocol (D) File-Transfer Protocol 

11. This first step in the transaction processing cycle captures business data through various modes such as optical scanning or at an electronic commerce website–
(A) Document and report generation (B) Database maintenance
(C) Transaction processing startup (D) Data Entry

12. A(n) ………………….. is a special visual and audio effect applied in Power-point to text or content.
(A) animation (B) flash
(C) wipe (D) dissolve

13. When the pointer is positioned on a………………….. it is shaped like a hand.
(A) grammar error (B) Formatting error
(C) Screen Tip (D) hyperlink

14. Personal computers can be connected together to form a–
(A) server (B) supercomputer
(C) network (D) enterprise

15. A ………………….. is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog (B) hit 
(C) link (D) success

16. A ………………….. contains specific rules and words that express the logical steps of an algorithm.
(A) syntax (B) programming structure
(C) programming language (D) logic chart

17. Changing an existing document is called ………………….. the document.
(A) creating (B) editing
(C) modifying (D) adjusting

18. Virtual memory is–
(A) memory on the hard disk that the CPU uses an extended RAM (B) in RAM
(C) only necessary if you do not have any RAM in your computer (D) aback up device for floppy disks

19. Computers use the ………………….. number system to store data and perform calculations.
(A) decimal (B) hexadecimal
(C) octal (D) binary

20. The ………………….. key will launch the start buttons.
(A) esc (B) shift
(C) windows (D) shortcut


Online General Computer Quiz
1. Blinking symbol on the computer screen is called–
(A) mouse (B) logo
(C) cursor (D) hand

2. Examples of output device– 
(A) screen (B) printer
(C) speaker (D) all of these

3. IBM stands for–
(A) Internal Business Management (B) International Business Management
(C) International Business Machine (D) Internal Business Machine

4. BIOS stands for–
(A) basic input output system (B) binary input output system
(C) basic input off system (D) all the above

5. DOS stands for–
(A) Disk Operating System (B) Disk operating session
(C) Digital Operating System (D) Digital Open system

6. ‘DOS’ floppy disk does not have–
(A) A Boot Record (B) A File Allocation Table
(C) A Root Directory (D) Virtual Memory



7. ‘MICR’ technology used for clearance of cheques by banks refers to–
(A) Magnetic Ink Character Recognition
(B) Magnetic Intelligence Character Recognition
(C) Magnetic Information Cable Recognition
(D) Magnetic Insurance Cases Recognition

8. All the information collected during database development is stored in a–
(A) repository (B) data warehouse
(C) RAD (D) CASE

9. The …………………..Component is used by the data analyst to create the queries that access the database.
(A) data extraction (B) end-user query tool
(C) end-.user presentation tool (D) data store

10. A(n) …………………..allows network users to share a single copy of software, which resides on the network server.
(A) single-user license agreement (B) network site license
(C) end-user license agreement (D) business software license

11. What displays the contents of the active cell in Excel ?
(A) Name box (B) Row Headings
(C) Formula bar (D) Task pane

12. The piece of hardware that converts your computer’s digital signal to an analog signal that can travel over telephone lines is called a–
(A) red wire (B) blue cord
(C) tower (D) modem

13. Video processors consist of …………………..and …………………..which store and process images.
(A) CPU and VGA (B) CPU and memory
(C) VGA and memory (D) VGI and DVI 

14. If you want to connect to your own computer through the Internet from another location, you can use–
(A) e-mail (B) FTP
(C) instant message (D) Telnet 

15. To reload a Web page, press the ………………….. button.
(A) Redo (B) Reload
(C) Restore (D) Refresh

16. You can use the tab key to–
(A) move cursor across the screen (B) indent a paragraph
(C) move the cursor down the screen (D) Only (A) and (B)

17. A collection of related files is called a–
(A) character (B) field 
(C) database (D) adjusting 

18. Storage that retains its data after the power is turned off is referred to as–
(A) volatile storage (B) non-volatile storage
(C) sequential storage (D) direct storage

19. Which of the following is an example of connectivity?
(A) Internet (B) floppy disk 
(C) power card (D) data 

20. ………………….. is the process of finding errors in software code.
(A) Compiling (B) Testing
(C) Running (D) Debugging


General Computer Quiz with Answers
1. Which of the following is a part of CPU–
(A) ALU (B) keyboard
(C) mouse (D) printer

2. FTP stands for–
(A) file transfer protocol (B) file translate protocol
(C) file typing protocol (D) file transit protocol

3. Data going into the computer called–
(A) output (B) algorithm
(C) input (D) calculation

4. Microsoft is a–
(A) shareware (B) an application suit
(C) public domain software (D) market application

5. Information travels between components on the mother board through–
(A) flash memory (B) CMOS
(C) cables (D) buses 

6. This is a standard way for a Web server to pass a Web user’s request to an application program and to receive data back to forward to the user–
(A) Interrupt request (B) Forward DNS lookup
(C) Data-Link layer (D) Common gateway interface

7. Three SQL, DDL, CREATE commands are–
(A) Schema, Base and Table (B) Base, Table and Schema
(C) Key, Base and Table (D) Schema, Table and View

8. A passive threat to computer security is–
(A) Malicious Intent (B) Sabotage
(C) Accident Errors (D) Espionage Agents

9. Two program of worm are–
(A) grappling hook program (B) main program
(C) both ‘A’ and ‘B’ (D) external memory

10. …………………..allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
(A) TCP/IP (B) Ethernet
(C) WAP (D) Token ring

11. Grouping and processing all of a firm’s transactions at one time is called–
(A) a database management system (B) batch processing
(C) a real-time system (D) an on-line system 

12. The …………………..enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box (B) pop-up helper
(C) tab row (D) address bar

13. Which ports connect special types of music instruments to sound cards ?
(A) BUS (B) CPU
(C) USB (D) MIDI

14. You can …………………..a search by providing more information the search engine can use to select a smaller, more useful set of results.
(A) refine (B) expand
(C) load (D) query

15. What is the permanent memory built into your computer called ?
(A) RAM (B) Floppy
(C) CPU (D) ROM

16. What menu is selected to cut, copy and paste?
(A) File (B) Tools
(C) Special (D) Edit

17. The most important or powerful computer in a typical network is–
(A) desktop (B) network client
(C) network server (D) network station

18. The primary purpose of software is to turn data into–
(A) Web sites (B) information
(C) programs (D) objects

19. The ability to find an individual item in a file immediately ………………….. is used.
(A) file allocation table (B) directory
(C) sequential access (D) direct access 

20. To make a notebook act as a desktop model, the notebook can be connected to a ………………….. which is connected to a monitor-and other devices.
(A) bay (B) docking station
(C) port (D) network


GK Objective General Knowledge Quiz Questions Answers
1. What digit are representatives of all binary numbers–
(A) 0 (B) 1
(C) Both A and B (D) 3

2. Who is the father of computer?
(A) Douglas (B) Abacus
(C) Charles Babbage (D) John

3. The function of the key F5 in window is–
(A) to repeat the last action (B) open font box,
(C) refresh window (D) minimize window

4. Shortcut key to print document is–
(A) Ctrl+F2 (B) Ctrl+E
(C) Ctrl + P (D) Ctrl+ Z

5. CD-ROM stands for–
(A) compact disk read only memory (B) compactable disk read only memory
(C) compactable read only memory (D) compact ‘data read only memory

6. The …………………..converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(A) Modem (B) Router
(C) Gateway (D) Bridge

7. Before a package can be used in a java program it must be–
(A) executed (B) referenced
(C) imported (D) declared

8. Boot strap or vector is called–
(A) grappling hook program (B) main program
(C) secondary program (D) primary storage

9. Programming language built into user programs such as Word and Excel are known as–
(A) 4GLs (B) macro languages
(C) object-oriented languages (D) visual programming languages

10. Firewalls are used to protect against–
(A) Unauthorized Attacks (B) Virus Attacks
(C) Data Driven Attacks (D) Fire Attacks 

11. Help Menu is available at which button ?
(A) End (B) Start
(C) Turnoff (D) Restart

12. The contents of …………………..are lost when the computer turns off.
(A) storage (B) input
(C) output (D) memory

13. When you save to this, your data will remain intact even when the computer is turned off–
(A) RAM (B) Motherboard
(C) Secondary storage device (D) Primary storage device

14. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n)–
(A) super computer (B) minicomputer 
(C) laptop (D) server

15. The …………………..folder retains copies of messages that you have started but are not yet ready to send.
(A) Drafts (B) Outbox
(C) Address Book (D) Sent Items

16. Granting an outside organization access to internet web pages is often implemented using a(n)–
(A) extranet (B) intranet
(C) internet (D) hacker

17. Which term identifies a specific computer on the web and the main page of the entire site? 
(A) URL (B) Web site address
(C) Hyperlink (D) Domain name

18. The code that relational database management systems use to perform their database task is referred to as–
(A) QBE (B) SQL
(C) OLAP (D) Sequel Server
19. Chip is a common nickname for a(n)–
(A) transistor (B) resistor
(C) integrated circuit (D) semiconductor 

20. Programs such as Internet Explorer that serve as navigable windows into the Web are called–
(A) Hypertext (B) Networks
(C) Internet (D) Web browsers


Internet Quiz Questions
1. The language that the computer can understand and execute is called–
(A) machine language (B) application software
(C) system program (D) none of these

2. Which of the following is not hardware–
(A) magnetic tape (B) printer
(C) VDU terminal (D) assembler

3. Pick out the wrong definition–
(A) COBOL – a language used for business data processing
(B) CPU – is the brain of computer
(C) LAN – is used in local areas
(D) FORTRAN – is used for logical processing

4. Which of the following is not as language for computer programming–
(A) Windows (B) PASCAL
(C) BASIC (D) COBOL

5. What are the basic types of memory that your computer uses–
(A) RAM (B) RW/RAM
(C) ROM (D) both A and C

6. The total set of interlinked hypertext documents worldwide is–
(A) HTTP (B) Browser
(C) WWW (D) B2B

7. With the object-oriented (OO) approach, an object encapsulates, or…………………..a programmer.
(A) carries out, the details of an object for
(B) hides, the details of an object from
(C) reveals, the details of an object to
(D) extends, the details of an object beyond 

8. Every computer connected to an intranet or extranet must have a distinct–
(A) firewall (B) proxy server
(C) IP address (D) domain name

9. A table of bits in which each row represents the distinct values of a key?
(A) Join index (B) Bitmap index
(C) B + Tree (D) Hierarchical index 

10. The degree of detail that should be incorporated into a database depends on what?
(A) Data integrity (B) The type of database
(C) The user’s perspective (D) The business practices and Policies 

11. Lowest level of security system is–
(A) A (B) B
(C) C (D) D

12. A DVD is an example of a(n)–
(A) hard disk (B) optical disc
(C) output device (D) solid-state storage device

13. The default view in Excel is …………………..view.
(A) Work (B) Auto
(C) Normal (D) Roman 

14. The process of transferring files from a computer on the Internet to your computer is called– 
(A) downloading (B) uploading
(C) FTP (D) JPEC

15. …………………..is the process of dividing the disk into tracks and sectors.
(A) Tracking (B) Formatting
(C) Crashing (D) Allotting

16. ………………….. are words that a programming language has set aside for its own use–
(A) Control words (B) Reserved words
(C) Control structures (D) Reserved keys

17. The most frequently used instructions of a computer program are likely to be fetched from–
(A) the hard disk (B) cache memory
(C) RAM (D) registers

18. What is the shortcut key to “Undo” the last action in a document?
(A) Ctrl + X (B) Ctrl + y
(C) Ctrl + Z (D) Ctrl + U

19. You must install a(n) ………………….. on a network if you want to share a broadband Internet connection.
(A) router (B) modem
(C) node (D) cable

20. The errors that can be pointed out by the compiler are–
(A) Syntax errors (B) Semantic errors
(C) Logic errors (D) System errors


Computer Quiz for Bank, Railway and Other Competitive Exams
1. Modem stands for–
(A) type of secondary memory (B) modulator demodulator
(C) mainframe operating device memory (D) none of these

2. Operating system is–
(A) a collection of hardware components (B) a collection of input-output devices 
(C) a collection of software routines (D) none of the above

3. Execution of two or more programs by a single CPU is know as–
(A) multiprocessing (B) time sharing
(C) multiprogramming (D) none of these

4. Which of the following dose not represent on I/O device?
(A) speaker with beep (B) joystick 
(C) ALU (D) scanner

5. Memories which can be read only are called …………………..memories.
(A) RAM (B) ROM
(C) PROM (D) EPROM

6. A result of a computer virus can NOT lead to–
(A) Disk Crash (B) Mother Board Crash
(C) Corruption of program (D) Deletion of files

7. The network interface card of LAN is related to following layer of OSI Model–
(A) Transport (B) Network
(C) Data Link (D) All of these

8. Which of the following does NOT describe a data warehouse?
(A) Subject-oriented (B) Integrated
(C) Time-variant (D) Updateable

9. Which of the following is TRUE ?
(A) Logical design is software-dependent
(B) In a distributed database, database is stored in one physical location
(C) Conceptual design translates the logical design into internal model
(D) Logical design is software independent

10. A range check–
(A) ensures that only the correct data type is entered into a field
(B) verifies that all required data is present
(C) determines whether a number is within a specified limit
(D) tests if the data in two or more associated fields is logical

11. A person who used his or her expertise to gain access to other people’s’ computers to get information illegally or do damage is a–
(A) hacker (B) analyst
(C) instant messenger (D) programmer

12. To access properties, of an object, the mouse technique to use is–
(A) dragging (B) dropping
(C) right-clicking (D) shift-clicking

13. To change selected text to all capital letters, click the change case button, then click–
(A) UPPERCASE (B) UPPER ALL
(C) CAPS LOCK (D) Lock Upper

14. The basic unit of a worksheet into which you enter data in Excel is called a–
(A) tab (B) cell
(C) box (D) range

15. You can keep your personal files / folders in–
(A) My folder (B) My Documents
(C) My Files (D) My Text

16. URL stands for–
(A) Universal Research List (B) Universal Resource List
(C) Uniform Resource Locator (D) Uniform Research Locator
17. NT classifies–
(A) container objects (B) non container objects
(C) both ‘A’ and ‘B’ (D) display objects

18. The design of the network is called the network–
(A) architecture (B) server
(C) transmission (D) type
19. A Proxy server is used for which of the following–
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To provide TCP/IP
(D) To process client requests for database access

20. When data changes in multiple lists and all lists are not updated, this causes–
(A) data redundancy (B) information overload
(C) duplicate data (D) data inconsistency


Computer Quiz for Bank PO
1. The operating system is the most common type of …………………..software.
(A) communication (B) application 
(C) system (D) word-processing software

2. …………………..are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
(A) Servers (B) Embedded computers
(C) Robotic computers (D) Mainframes

3. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called–
(A) instructions (B) the operating system
(C) application software (D) the system unit

4. The two broad categories of software are–
(A) word processing and spreadsheet (B) transaction and application
(C) Windows and Mac OS (D) system and application

5. The metal or plastic case that: holds all the physical parts of the computer is the–
(A) system unit (B) CPU
(C) mainframe (D) platform 

6. Alignment buttons are available on which toolbar–
(A) status (B) standard
(C) formatting (D) customize

7. The …………………..states that a foreign key must either match a primary key value in another relation or it must be null.
(A) entity integrity rule (B) referential integrity constraint
(C) action assertion (D) composite attribute

8. An applet–
(A) is an interpreted program that runs on the client
(B) tracks the number of visitors to a Website 
(C) is a compiled program that usually runs on .the client
(D) collects data from visitors to a Website

9. A …………………..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk. 
(A) system virus (B) Trojan horse virus
(C) file virus (D) macro virus

10. Which error detection method uses one’s complement arithmetic?
(A) Simply parity check (B) Checksum
(C) Two-dimensional parity check (D) CRC




11. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to Auto Fit Contents– 
(A) Fit to Form (B) Format
(C) AutoFit (D) Contents

12. Pascal is a–
(A) Natural language (B) machine language
(C) assembly language (D) high level language 

13. Reusable optical storage will typically have the acronym– 
(A) CO (B) DVD
(C) ROM (D) RW

14. The most common type of storage devices are–
(A) persistent (B) optical
(C) magnetic (D) flash 

15. A device that connects to a network with-out the use of cables is said to be–
(A) distributed (B) free
(C) centralized (D) open source 

16. This part of operating system manages the essential peripherals, such as the key board, screen, disk drives and parallel and serial ports–
(A) basic input/output (B) secondary system 
(C) peripheral system (D) marginal system

17. The bar at the top of a window that beats the name of the window is known as–
(A) control panel (B) task bar
(C) menu bar (D) title bar

18. ………………….. controls the way in which the computer system functions and provides a means by which users can interact with the computer.
(A) The platform (B) Application software 
(C) Operating system (D) The motherboard

19. Servers are computers that provide resources to other computers connected to a–
(A) mainframe (B) network
(C) super computer (D) client

20. A device that operates under the control of another device is called–
(A) Stem (B) Slave
(C) Simulator (D) Emulator


Computer Quiz for Bank Clerk
1. Which of the following is the correct order of the four major functions of a computer?
(A) Process A Output A Input A Storage
(B) Input A Output A Process A Storage
(C) Process A Storage A Input A Output 
(D) Input A Process A Output A Storage

2. …………………..bits equal one byte.
(A) Eight (B) Two
(C) One thousand (D) One million



3. The binary language consists of …………………..digit(s).
(A) 8 (B)2
(C) 1,000 (D) 1

4. A byte can hold one …………………..of data.
(A) bit (B) binary digit
(C) character (D) kilobyte

5. …………………..controls the way in which the computer system functions and provides a means by which users can interact with the computer.
(A) The platform (B) The operating system
(C) Application software (D) The motherboard

6. ‘Replace’ option is available in–
(A) edit menu (B) file menu
(C) tools menu (D) insert menu

7. The field names are enclosed within–
(A) << >> (B) >> <<
(C) >> >> (D) << <<

8. After selecting the ‘Replace’ option from the edit menu, the following dialog box appears–
(A) replace (B) find 
(C) find and replace (D) edit

9. In word processing, you manipulate–
(A) number (B) text
(C) symbol (D) character

10. You can set left, right and …………………..alignment in word processing. 
(A) centre (B) justify 
(C) both ‘a' and ‘b’ (D) left

11. …………………..are attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing (B) Computer viruses
(C) Spyware scams (D) Viruses

12. Part number, part description, and number of parts ordered are examples of–
(A) control (B) output
(C) processing (D) input

13. A Web site’s main page is called its– 
(A) Home Page (B) Browser Page
(C) Search Page (D) Bookmark 

14. The simultaneous processing of two or more programs by multiple processors is–
(A) multiprogramming (B) multitasking
(C) time sharing (D) multiprocessing

15. Codes consisting of lines of varying widths or lengths that are computer-readable are known as–
(A) an ASCII code (B) a magnetic tape
(C) an OCR scanner (D) a bar code 



16. In MICR, C stands for–
(A) Code (B) Colour
(C) Computer (D) Character

17. System software is the set of programs that enables your computer’s hardware devices and ………………….. software to work together.
(A) management (B) processing
(C) utility (D) application 

18. ………………….. are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(A) Servers (B) Embedded computers
(C) Robotic computers (D) Mainframes

19. The following are all computing devices, except–
(A) notebook computers (B) cellular telephones
(C) digital scanners (D) personal digital assistants

20. In a ring topology, the computer in possession of the ………………….. can transmit data.
(A) packet (B) data
(C) access method (D) token


Computer Quiz for Bank Exams
1. Smaller and less expensive PC-based servers are replacing…………………..in many businesses.
(A) supercomputer (B) clients
(C) laptops (D) mainframes

2. …………………..are specially designed computers that perform complex calculations extremely rapidly.
(A) Servers (B) Supercomputers
(C) Laptops (D) Mainframes

3. DSL is an example of a(n) …………………..connection.
(A) network (B) wireless
(C) slow (D) broadband

4. The difference between people with access to computers and the Internet and those without this access is known as the–
(A) digital divide (B) Internet divide
(C) Web divide (D) broadband divide

5. …………………..is the science revolving around the use of nanostructures to build devices on an extremely small scale–
(A) Nanotechnology (B) Micro-technology 
(C) Computer forensics (D) Artificial intelligence

6. By default the top margin in the document is– 
(A) 1 inch (B) 2 inch 
(C) 3 inch (D) l ½ 

7. A file name cannot contain in MS–ward database file–
(A) a letter (B) number
(C) underscore (D) space

8. There may be a maximum of how many character m a data file– 
(A) 20 (B) 30
(C) 40 (D) 50

9. When you start MS-word, the opening document has the name as–
(A) DOC 1 (B) document 1
(C) document (D) document 2

10. The following is the shortcut key for spelling check–
(A) Fl (B) F3
(C) F5 (D) F7

11. How can the user determine what programs are available on a computer?
(A) Checking the hard disk properties
(B) Viewing the installed programs during the booting process
(C) Checking the operating system for a list of installed programs,
(D) Checking the existing files saved on the disk

12. When we run a program in HTML coding …………………..is used as backend and ………………….. works as front-end,
(A) Notepad – Internet-Explorer (B) Notepad – Msn-messenger
(C) MS-Word – Internet Explorer (D) Both (A) and (C)

13. Computer uses the ………………….. number system to store data and perform calculations.
(A) binary (B) octal
(C) decimal (D) hexadecimal

14. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is–
(A) Memory-only (B) Write-only
(C) Once-only (D) Read-only

15. Which of the following can be used to se1ect the entire document ?
(A) Ctrl + A (B) Alt + F5
(C) Shift + A (D) Ctrl + K

16. Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as–
(A) software suites (B) integrated software
(C) software processing (D) personal il1formation

17. A data warehouse is which of the following?
(A) Can be updated by the users (B) Contains numerous conventions and formats
(C) Organized around subject areas (D) Contains only current data

18. ………………….. servers store and manages files for network users.
(A) Authentication (B) Main
(C) Web (D) File

19. All of the following are examples of real security and privacy risks except–
(A) hackers (B) spam
(C) viruses (D) identify theft

20. Loading Operating System onto RAM is called–
(A) Printing (B) Saving
(C) Booting (D) Staring

omputer Test for Bank Clerk
1. …………………..is a set of computer programs used on a computer to help perform tasks.
(A) An instruction (B) Software
(C) Memory (D) A processor

2. System software is; the set of programs that enables your computer hardware devices …………………..and software to work together.
(A) management (B) processing
(C) utility (D) application

3. The PC (personal computer) and the Apple Macintosh are examples of two different– 
(A) platforms (B) applications
(C) programs (D) Storage devices

4. Apple Macintoshes (Macs) and PCs use different …………………..to process data and different operating systems.
(A) languages (B) methods
(C) CPUs (D) storage devices 

5. Servers are computers that provide resources to other computers connected to a–
(A) network (B) mainframe
(C) supercomputer (D) client

6. Which of the following is most oriented to scientific programming?
(A) FORTRAN (B) COBOL
(C) BASIC (D) PL/1

7. In BASIC, description comments are put in the source program with the–
(A) PRINT statement (B) REMARK statement
(C) INPUT statement (D) DATA statement

8. The shortcut key used for copying selected text into clipboard is– 
(A) Ctrl + X (B) Ctrl + V
(C) Ctrl + C (D) Ctrl + D

9. To open a new file in MS-word, the shortcut key is–
(A) Ctrl + X (B) Ctrl + N
(C) Ctrl + y (D) Ctrl + V

10. Which of the following is not an option edit menu? 
(A) cut (B) copy 
(C) paste (D) page setup 

11. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) Configuration (B) Download
(C) Storage (D) Installation

12. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as–
(A) Flash (B) Spiders
(C) Cookies (D) Applets

13. The first computers were programmed using–
(A) Assembly language (B) Machine language
(C) Source code (D) Object code

14. Which process checks to ensure the components of the computer and operating are connected properly?
(A) Booting (B) Processing
(C) Saving (D) Editing



15. In a relational database, this is a data structure that organizes the information about a single topic into rows and columns–
(A) Block (B) Record
(C) Tuple (D) Table

16. Device drivers are–
(A) time power cords for external storage devices
(B) experts who know to maximise the performance of device
(C) small, special purpose programs
(D) the innermost part of the operating system

17. Array is–
(A) linear data structure (B) non-linear data structure
(C) complex data structure (D) simple data– structure 

18. A stored link to a webpage, in order to have a quick and easy access to it later, it called–
(A) Bookmark (B) WP-link
(C) Favourite (D) Both ‘a’ and ‘c’

19. Which input device cannot be used to work in MS Office ? 
(A) Scanner (B) Mouse
(C) Keyboard (D) Joy stick

20. ………………….. is an animated character that gives help in MS Office ? 
(A) Office worker (B) Comic assistant
(C) Office assistant (D) An of the above


Computer Quiz for LIC AAO
1. Which of the following is an example of an input device?
(A) scanner (B) speaker
(C) CD (D) printer

2. All of the following are examples of storage devices EXCEPT–
(A) hard disk drives (B) printers
(C) floppy disk drives (D) QD-drives

3. The………………….., also called the brain of the computer, is responsible for processing data.
(A) motherboard (B) memory
(C) RAM (D) central processing unit (CPU)

4. The CPU and memory are located on the–
(A) expansion board (B) motherboard
(C) storage device (D) output device

5. Word processing, spreadsheet, and photo editing are examples of–
(A) application software (B) system software
(C) operating system software (D) platform software 

6. All of the following are divisions of the COBOL program except–
(A) input-output (B) identification
(C) procedure (D) data

7. Which of the following is an example of problem oriented language?
(A) Basic (B) PL/1
(C) FORTARN (D) All of these

8. A factor in the selection of a source language is–
(A) programmer skill (B) language availability
(C) program compatibility with other software (D) all of these

9. The two basic types of record access methods are–
(A) sequential and random (B) direct and immediate
(C) sequential and indexed (D) on-line and real-time

10. All computers execute–
(A) BASIC program (B) COBOL program
(C) machine language program (D) FORTRAN program

11. Two or more computers connected to each other of sharing information form a–
(A) Network (B) Router
(C) Server (D) Tunnel 

12. Computers that are portable and convenient for users who travel are known as–
(A) Super computers (B) Lap tops
(C) Mini computers (D) File servers

13. A computer checks the ………………….. of user names and passwords for a match before granting access. 
(A) Website (B) Network
(C) Backup file (D) Data base

14. Office LANs that are spread geographically apart on a large scale can be connected using a corporate–
(A) CAN (B) LAN
(C) DAN (D) WAN

15. The code for a Web page is using–
(A) A fifth generation language (B) Win Zip
(C) Peripherals (D) Hypertext Markup Language

16. The server on the internet is also known as–
(A) Repeater (B) Host
(C) Gateway (D) AND Gate

17. Website is a collection of–
(A) HTML documents (B) Graphic files 
(C) Audio and Video files (D) All of the above

18. ………………….. is a method in which multiple communication devices are connected to one another efficiently.
(A) Switching (B) Redundancy
(C) Capacity (D) Detecting

19. One computer that is into considered a portable computer is–
(A) Mini computer (B) A Laptop 
(C) Micro computer (D) All of the above

20. The sharing of a medium and its path by 2 or more devices is called–
(A) Modulation (B) Encoding
(C) Line discipline (D) Multiplexing




Computer Quiz for Beginners
1. A…………………..is approximately one billion bytes.
(A) kilobyte (B) bit
(C) gigabyte (D) megabyte

2. A …………………..is approximately a million bytes.
(A) gigabyte (B) kilobyte
(C) megabyte (D) terabyte

3. …………………..is any part of the computer .that you can physically touch.
(A) Hardware (B) A device
(C) A peripheral (D) An application

4. The components that process data are located in the–
(A) input devices (B) output devices
(C) system unit (D) storage component .

5. All of the following are examples of input devices EXCEPT a–
(A) scanner (B) mouse
(C) keyboard (D) printer

6. A computer language which is used for drawing picture on the screen is–
(A) LOGO (B) COBOL
(C) BASIC (D) ALGOL

7. Computer language used on internet is–
(A) PASCAL (B) JAVA
(C) BASIC (D) LOGO

8. Computer language used for business application is–
(A) LOGO (B) FORTRAN
(C) BASIC (D) none of these

9. The language used for development of various games is–
(A) C (B) C++
(C) JAVA (D) SQL

10. Visual basic is a development tool–
(A) yes (B) no
(C) confirmed (D) not confirmed

11. What is backup?
(A) Adding more components to your network
(B) Protecting data by copying it from the original source to a different destination
(C) Filtering old data from the new data
(D) Accessing data on tape 

12. Network components are connected’ to the same ‘Cable in the ………………….. topology.
(A) Star (B) Ring
(C) Bus (D) Mesh

13. This component is required to process data into information and consists of integrated circuits–
(A) Hard disk (B) RAM
(C) CPU (D) ROM

14. One advantage of dial-up-internet access is– 
(A) It utilises broadband technology (B) It utilizes existing telephone service
(C) It uses a router for security (D) Modem speeds are very fast

15. What is the term for unsolicited e-mail?
(A) News group (B) Use net
(C) Backbone (D) Spam

16. Which of the following is Not a characteristic of E-mail ?
(A) Low cost (B) Record maintenance in database
(C) High speed (D) Waste reduction

17. ………………….. is the science that attempts to produce machines that display the same type of intelligence that humans do.
(A) nanoscience (B) Nanotechnology 
(C) Simulation (D) Artificial intelligence

18. Who designed the first electronic computer–ENIAO ?
(A) Van Neuman (B) Joseph M. Jacquard
(C) J. Presper Eckert and John W. Mauchly (D) Both ‘A’ and ‘B’

19. ………………….. is a collection of web -pages and ………………….. is the very first page that we–Check on opening of a website.
(A) Home page, Web page (B) Website, Home page
(C) Web page, Home page (D) Web page, Website

20. When we run program in HTML coding, ………………….. is used as back-end and ………………….. works as front-end.
(A) Notepad, Internet Explorer (B) Notepad, MSN messenger
(C) MS Word, Internet Explorer (D) Both ‘A’ and ‘C’


Computer Quiz for Competitive Exams
1. Computers use the …………………..language to process data.
(A) processing (B) kilobyte
(C) binary (D) representational

2. Computers process data into information by working exclusively with–
(A) multimedia (B) words
(C) characters (D) numbers

3. In the binary language each letter of the alphabet, each number and each special character is made lip of a unique combination of–
(A) eight bytes (B) eight kilobytes
(C) eight characters (D) eight bits
4. The term bit is short for–
(A) megabyte (B) binary language
(C) binary digit (D) binary number

5. A string of eight Os and 1s is called a–
(A) megabyte (B)byte
(C) kilobyte (D) gigabyte
6. CAD stands for– 
(A) Computer aided design (B) Computer algorithm for design
(C) Computer application in design (D) All of the above

7. Which of the following printer cannot print graphics?
(A) Ink-jet (B) Daisy Wheel
(C) Laser (D) Dot-matrix

8. CPU can directly understand this language–
(A) C (B) C++
(C) Assembly (D) Java

9. Which language is CPU dependent–
(A) C (B) assembly
(C) Java (D) all except java

10. How many bits are there is ASCII codes?
(A) 8 (B) 10
(C) 12 (D) 16

11. Virtual memory is–
(A) Memory on the, hard disk that the CPU uses as an extended RAM 
(B) RAM 
(C) Only necessary if you do not have any RAM in your computer
(D) A back up device for floppy disks

12. A ………………….. contains specific rules and words that express the logical steps of an algorithm.
(A) Syntax (B) Programming structure
(C) Programming language (D) Logic chart

13. When sending an e-mail, the ………………….. line describes the contents of the message.
(A) to (B) subject
(C) contents (D) CC

14. The ………………….. tells the computer how to use its components.
(A) Utility (B) Network
(C) Operating system (D) Application program

15. Which grouping do you work with when formatting text in word?
(A) Tables, paragraphs and indexes
(B) Paragraphs, indexes and sections
(C) Characters, sections and paragraphs
(D) Indexes, characters and tables

16. Small application programs that run on a Web page and may ensure a form is
completed properly or provide animation are known as–
(A) flash (B) spiders
(C) cookies (D) applets

17. Which of the following is Not a characteristic of a computer ?
(A) Intelligence (B) Speed
(C) Versatility (D) Automation
18. The WWW standard allows programs on many different ‘computer platforms to show the information on a server. Such programs are called–
(A) ISP (B) Web Browsers
(C) Web Servers (D) Web Modular 
19. Outlook Express is a–
(A) E-mail client (B) Scheduler
(C) Address book (D) All of the above
20. Which of the following is not a network?
(A) Local Area Network (B) Wide Area Network
(C) Optical Fibre (D) All are networks 

Computer Quiz Questions For IBPS Exam
1. …………………..is the science that attempts to produce machines that display the same type of intelligence that humans do.
(A) Nanoscience (B) Nanotechnology
(C) Simulation (D) Artificial intelligence (AI)

2. …………………..is data that has been organized or presented in a meaningful fashion.
(A) A process (B) Software
(C) Storage (D) Information

3. The name for the way that computers manipulate data into information is called–
(A) programming (B) processing
(C) storing (D) organizing
4. Computers gather data, which means, that they allow users to …………………..data.
(A) present (B) input
(C) output (D) store

5. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered–
(A) data (B) output.
(C) input (D) the process

6. Which of the following language is usually implemented with an interpreter–
(A) Assembly (B) PASCAL
(C) COBOL (D) BASIC
7. In MS-Excel 2010, the default workbook sheet contain maximum–
(A) 65535 Rows (B) 65536 Rows 
(C) 1048576 Rows (D) 65537 Rows

8. In MS-Word, a menu item in dim color (gray) indicate that the menu is–
(A) Toggle Menu (B) Unavailable for current context
(C) Not much required menu (D) Over Used Menu
9. Hot-Key is a–
(A) Fire Wire port (B) Alternate Key
(C) Keyboard Shortcut (D) Primary Key

10. Which of the following is a part of the Central Processing Unit?
(A) Printer (B) Key board
(C) Mouse (D) Arithmetic & Logic unit

11. Computers use the…………………..number system to store data and perform calculations.
(A) Decimal (B) Hexadecimal
(C) Octal (D) Binary

12. Which of the following is the largest unit of storage?
(A) GB (B) KB
(C) MB (D) TB

13. The…………………..key will launch the start buttons.
(A) Esc (B) Shift
(C) Windows (D) Shortcut

14. ………………….. is the process of finding errors in software code.
(A) Compiling (B) Testing
(C) Running (D) Debugging

15. To move to the beginning of a line of text, press the ………………….. key.
(A) Home (B) A
(C) Page-up (D) Enter

16. We access the World Wide Web using–
(A) Browsers (B) Instant messaging applications
(C) High bandwidth (D) Search engine 

17. The Internet began with the development of–
(A) USENET (B) ARPANET
(C) Ethernet (D) Intranet

18. A wireless network uses ………………….. waves to transmit signals.
(A) mechanical (B) radio
(C) sound (D) magnetic

19. What device includes an adapter that de-codes data sent in radio signals ?
(A) modem (B) digital translator
(C) router (D) switch

20. Network components are connected to the same cable in the ………………….. topology.
(A) star (B) ring
(C) bus (D) mesh 

Free Online Computer Quiz
1. Which of the following is NOT one of the four major data processing functions of a computer?
(A) gathering data (B) processing data into information
(C) analyzing the data or information (D) storing the data or information

2. …………………..tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
(A) POS (B) RFID
(C) PPS (D) GPS

3. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as–
(A) robotics (B) computer forensics 
(C) simulation (D) forecasting .
4. Technology no longer protected by copyright, available to everyone, is considered to be– 
(A) proprietary (B) open
(C) experimental (D) in the public domain
5. …………………..is the study of molecules and structures whose size ranges from to 100 nanometers.
(A) Nanoscience (B) Microelectrodes
(C) Computer forensics (D) Artificial intelligence
6. Which protocol is used by operating system to generate error message like– ‘Host unreachable’ over a TCP/IP network?
(A) HTTP/l.1 (B) ICMP
(C) PPP (D) ICGM
7. What does SNMP stands for?
(A) Simple Network Mail Protocol (B) Single Network Mail Protocol
(C) Single Network Message Protocol (D) Simple Network Management Protocol
8. On a school computer, Tina learned how to copy programs. A classmate asked her to copy a program for his home use. Her most ethical response would be which of the following?
(A) I’ll copy it, but you have to promise not to tell anyone.
(B) I don’t know how to copy disks.
(C) I can’t copy it because it will break copyright laws.
(D) I’ll copy it for you, but you can’t copy it for anyone else;

9. Which of the following is not true?
(A) LOGO stands for Live On Google’s Orkut
(B) BIOS is a system software
(C) GRUB is a Linux bootloader
(D) Ruby is a web scripting language

10. What is the function of Drop Cap?
(A) It does not allow capital letters to be used in the documents.
(B) It makes first letter of each word capital letter in the documents
(C) It lets you begirt a paragraph with a large dropped initial capital letter .
(D) It automatically starts all paragraphs and sentences with capital letters.

11. The primary purpose of software is to turn data into–
(A) Web sites (B) Information
(C) Programs (D) Objects

12. To what temporary area can you store text and other data, and later paste them
to another location?
(A) The clipboard (B) ROM
(C) CD-ROM (D) The hard disk

13. Storage that retains its data after the power is tuned off is referred to as–
(A) volatile storage (B) non-volatile storage
(C) sequential storage (D) direct storage

14. …………………..is the science that attempts to produce machines that display the same type of intelligence that humans do.
(A) Nano science (B) Nanotechnology
(C) Simulation (D) Artificial intelligence (AI)

15. Changing an existing document is called…………………..the document.
(A) Creating (B) Editing
(C) Modifying (D) Adjusting

16. Select the odd one out–
(A) Interpreter (B) Operating system
(C) Compiler (D) Assembler

17. For viewing video CDs, you would use–
(A) CD Player (B) Windows Media Player
(C) Windows Video Player (D) Windows Movie Player
18. What’s the name for the program or service that lets you view e-mail messages ?
(A) Web browser (B) E-mail clients
(C) E-mail ID (D) Internet
19. What does the SMTP in, an SMTP server stand for ?
(A) Simple Mail Transfer Protocol
(B) Serve Message Text Process
(C) Short Messaging Text Process
(D) Short Messaging Transfer Protocol

20. What’s considered the ‘backbone’ of the World Wide Web ?
(A) Uniform resource locator (URL)
(B) Hypertext mark-up language (HTML)
(C) Hypertext transfer protocol (HTTP)
(D) File transfer protocol (FTP)


Computer Quiz Online Test
1. All of the following are examples of real security and privacy risks EXCEPT–
(A) hackers (B) spam
(C) viruses (D) identity theft

2. A process known as…………………..is used by large retailers to study trends.
(A) data mining (B) data selection
(C) POS (D) data conversion

3. …………………..terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
(A) Data (B) Point-Of-sale (POS)
(C) Sales (D) Query

4. A(n) …………………..system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
(A) PSS (B) POS 
(C) inventory (D) data mining 

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called–
(A) robotics (B) simulation
(C) computer forensics (D) animation

6. Which of the following is not a unit of measurement in computer systems?
(A) DPI (B) PPI
(C) API (D) Bd

7. In Windows XP, which shortcut is used to cycle through opened items in taskbar?
(A) Ctrl + Tab (B) Alt + Tab
(C) Ctrl + Esc (D) Alt + Esc

8. A digital computer compute the value of expressioi12 * 5 -2 > 2 inside–
(A) RAM (B) CPU Chip
(C) Hard Disk (D) Floppy Disk

9. To produce a high-quality graphic (hardcopy) in ‘color, you would want to use a–
(A) Virtual Printer (B) Laser Printer
(C) Ink-jet Printer (D) Plotter

10. Which of the following is fastest memory?
(A) DDR RAM (B) DDR2 RAM
(C) DDR3 RAM (D) Swap Memory

11. What menu is selected to cut, copy and paste?
(A) File (B) Tools
(C) Special (D) Edit

12. You can use the tab key to–
(A) Move a cursor across the screen (B) Indent a paragraph 
(C) Move the cursor down the screen (D) Only (A) and (C)

13. The most important or powerful computer in a typical network is–
(A) Desktop (B) Network client
(C) Network server (D) Network station 

14. Which of the following is an example of connectivity?
(A) Internet (B) Floppy disk
(C) Power cord (D) Data

15. The ability to find an individual item in a file immediately…………………..is used.
(A) File allocation table (B) Directory
(C) Sequential access (D) Direct access 

16. What is the correct association between a hardware component and a computer function?
(A) Monitor > input (B) Mouse > input
(C) CPU > storage (D) Hard disk > processing

17. What is the function of Drop Cap ?
(A) It does not allow capital letters to be used in the documents
(B) It makes first letter of each word capital letter in the documents
(C) It let you begin a paragraph with a large dropped initial capital letter
(D) In automatically starts all paragraphs and sentences with capital letters 

18. The errors that can be pointed out by the compiler are–
(A) Syntax error (B) Symantic error
(C) Logical error (D) Internal error

19. The move to the bottom of a document, press–
(A) Auto summarize (B) Home key
(C) Ctrl + End key (D) End key

20. By default, your documents print in …………………..mode. 
(A) Landscape (B) Portrait
(C) Page setup (D) Print preview



No comments:

Post a Comment