
Laxmidhar Sir
May 30, 2025 at 09:28 AM
1. What is the primary function of a motherboard?
A) Execute programs
B) Connect all hardware components
C) Store permanent data
D) Display output
Answer: B) Connect all hardware components
Explanation: The motherboard serves as the main circuit board, connecting the CPU, memory, storage, and other peripherals.
2. Which of the following is a type of system software?
A) Microsoft Excel
B) Windows 10
C) Adobe Illustrator
D) Google Docs
Answer: B) Windows 10
Explanation: Windows 10 is an operating system (system software), managing hardware and software resources.
3. What does SSD stand for in the context of storage devices?
A) Solid State Drive
B) System Storage Device
C) Static Storage Disk
D) Sequential System Drive
Answer: A) Solid State Drive
Explanation: SSDs use flash memory for faster data access compared to traditional hard disk drives (HDDs).
4. Which protocol is used for secure file transfer over a network?
A) HTTP
B) FTP
C) SFTP
D) SMTP
Answer: C) SFTP
Explanation: Secure File Transfer Protocol (SFTP) encrypts data during file transfers, ensuring security.
5. What is the full form of CPU?
A) Central Processing Unit
B) Computer Processing Unit
C) Core Program Utility
D) Central Program Unit
Answer: A) Central Processing Unit
Explanation: The CPU processes instructions by performing fetch, decode, and execute operations.
6. Which of the following is an example of a high-level programming language?
A) Assembly Language
B) C++
C) Machine Language
D) Binary Code
Answer: B) C++
Explanation: C++ is a high-level language with user-friendly syntax, unlike low-level assembly or machine language.
7. What is the purpose of a network switch?
A) Connects devices within a single network
B) Converts analog signals to digital
C) Stores network data
D) Executes network programs
Answer: A) Connects devices within a single network
Explanation: A switch connects devices in a LAN, directing data packets to their intended destinations.
8. Which type of memory is used to store the BIOS?
A) RAM
B) ROM
C) Cache Memory
D) Virtual Memory
Answer: B) ROM
Explanation: The BIOS is stored in Read-Only Memory (ROM), which retains data even when powered off.
9. What does URL stand for?
A) Universal Resource Locator
B) Uniform Resource Locator
C) Unique Reference Link
D) Universal Reference Language
Answer: B) Uniform Resource Locator
Explanation: A URL specifies the address of a resource on the internet, like a webpage.
10. Which of the following is a type of malware?
A) Firewall
B) Ransomware
C) Operating System
D) Browser
Answer: B) Ransomware
Explanation: Ransomware is malware that encrypts data and demands payment for access.
11. What is the function of the control unit in a CPU?
A) Performs arithmetic operations
B) Directs the operation of the processor
C) Stores temporary data
D) Manages network connections
Answer: B) Directs the operation of the processor
Explanation: The control unit coordinates the CPU’s activities, directing data flow and instruction execution.
12. Which of the following is an example of a secondary storage device?
A) RAM
B) USB Flash Drive
C) Cache Memory
D) Registers
Answer: B) USB Flash Drive
Explanation: USB flash drives are secondary storage devices, retaining data without power, unlike RAM.
13. What is the full form of DBMS?
A) Database Management System
B) Data Backup Management Software
C) Digital Base Management System
D) Distributed Binary Management System
Answer: A) Database Management System
Explanation: A DBMS manages databases, enabling data storage, retrieval, and manipulation.
14. Which port is used for HTTPS?
A) 80
B) 21
C) 443
D) 25
Answer: C) 443
Explanation: HTTPS uses port 443 for secure web communication with SSL/TLS encryption.
15. What is the purpose of a compiler?
A) Executes code line by line
B) Converts high-level code to machine code
C) Manages hardware resources
D) Connects to the internet
Answer: B) Converts high-level code to machine code
Explanation: A compiler translates entire high-level programs into machine code for execution.
16. Which of the following is a cloud computing service model?
A) HTML
B) SaaS
C) SQL
D) FTP
Answer: B) SaaS
Explanation: Software as a Service (SaaS) delivers software over the internet, like Google Workspace.
17. What is the term for a network of infected computers controlled remotely?
A) Botnet
B) Firewall
C) Router
D) Server
Answer: A) Botnet
Explanation: A botnet is a group of compromised devices controlled by a hacker for malicious purposes.
18. Which key is used to refresh a webpage?
A) F1
B) F5
C) F10
D) Ctrl
Answer: B) F5
Explanation: The F5 key refreshes a webpage, reloading its content from the server.
19. What does GUI stand for?
A) General Utility Interface
B) Graphical User Interface
C) Global User Integration
D) Guided Utility Interface
Answer: B) Graphical User Interface
Explanation: GUI enables interaction through visual elements like windows, icons, and menus.
20. Which of the following is a first-generation computer characteristic?
A) Use of microprocessors
B) Use of vacuum tubes
C) Use of integrated circuits
D) Use of transistors
Answer: B) Use of vacuum tubes
Explanation: First-generation computers (1940s–1950s) used vacuum tubes, making them large and slow.
21. What is the purpose of an IP address?
A) Identifies a device on a network
B) Stores user files
C) Executes programs
D) Displays graphics
Answer: A) Identifies a device on a network
Explanation: An IP address uniquely identifies a device on a network for communication.
22. Which language is used for styling web pages?
A) HTML
B) CSS
C) JavaScript
D) Python
Answer: B) CSS
Explanation: Cascading Style Sheets (CSS) is used to style and format web page content.
23. What is the full form of LAN?
A) Local Area Network
B) Logical Access Node
C) Linear Area Network
D) Local Access Node
Answer: A) Local Area Network
Explanation: LAN connects devices within a limited area, like an office or home.
24. Which device is used to amplify network signals?
A) Router
B) Switch
C) Repeater
D) Modem
Answer: C) Repeater
Explanation: A repeater boosts network signals to extend their range.
25. What is the term for a small program that performs a specific task?
A) Application
B) Script
C) Operating System
D) Database
Answer: B) Script
Explanation: A script is a small program written to automate tasks or perform specific functions.
26. Which of the following is a volatile memory?
A) Hard Disk
B) ROM
C) RAM
D) Flash Memory
Answer: C) RAM
Explanation: RAM is volatile, losing data when power is off, unlike non-volatile ROM or hard disks.
27. What does HTTP stand for?
A) HyperText Transfer Protocol
B) High Text Transmission Protocol
C) Hyper Terminal Transfer Protocol
D) Hybrid Text Protocol
Answer: A) HyperText Transfer Protocol
Explanation: HTTP is used for transferring web pages and resources over the internet.
28. Which of the following is an example of a NoSQL database?
A) MySQL
B) Oracle
C) MongoDB
D) PostgreSQL
Answer: C) MongoDB
Explanation: MongoDB is a NoSQL database, handling unstructured data, unlike relational databases like MySQL.
29. What is the purpose of a backup?
A) Increase processing speed
B) Protect data from loss
C) Enhance graphics
D) Connect networks
Answer: B) Protect data from loss
Explanation: Backups create copies of data to restore it in case of loss or corruption.
30. Which generation of computers introduced microprocessors?
A) Second Generation
B) Third Generation
C) Fourth Generation
D) Fifth Generation
Answer: C) Fourth Generation
Explanation: Fourth-generation computers (1971–present) introduced microprocessors, enabling compact systems.
31. What is the full form of API?
A) Application Programming Interface
B) Advanced Processing Interface
C) Automated Program Integration
D) Application Process Identifier
Answer: A) Application Programming Interface
Explanation: An API allows different software applications to communicate with each other.
32. Which of the following is an input device?
A) Printer
B) Monitor
C) Mouse
D) Speaker
Answer: C) Mouse
Explanation: A mouse allows users to input data by interacting with the GUI, unlike output devices like monitors.
33. What is the term for a program that secretly monitors user activity?
A) Virus
B) Spyware
C) Trojan
D) Worm
Answer: B) Spyware
Explanation: Spyware covertly collects user information, such as browsing habits, without consent.
34. Which protocol is used for resolving domain names to IP addresses?
A) FTP
B) DNS
C) SMTP
D) HTTP
Answer: B) DNS
Explanation: Domain Name System (DNS) translates domain names into IP addresses for network communication.
35. What is the function of a cache memory?
A) Permanent storage
B) Speed up data access
C) Run applications
D) Connect networks
Answer: B) Speed up data access
Explanation: Cache memory stores frequently accessed data to reduce CPU access time.
36. Which of the following is a type of optical media?
A) Hard Disk
B) DVD
C) SSD
D) USB Drive
Answer: B) DVD
Explanation: DVDs use optical technology to store data, read by lasers.
37. What does OOP stand for in programming?
A) Object-Oriented Programming
B) Operational Output Processing
C) Organized Object Protocol
D) Optimal Operating Program
Answer: A) Object-Oriented Programming
Explanation: OOP uses objects and classes for modular and reusable code.
38. Which key combination is used to undo an action?
A) Ctrl + C
B) Ctrl + V
C) Ctrl + Z
D) Ctrl + X
Answer: C) Ctrl + Z
Explanation: Ctrl + Z reverses the last action in most applications.
39. What is the term for a network that spans a large geographical area?
A) LAN
B) WAN
C) MAN
D) PAN
Answer: B) WAN
Explanation: Wide Area Network (WAN) connects devices over large areas, like the internet.
40. Which of the following is a type of computer architecture?
A) HTML
B) Von Neumann
C) SQL
D) CSS
Answer: B) Von Neumann
Explanation: Von Neumann architecture defines how computers process and store data using a single memory.
41. What is the purpose of a proxy server?
A) Executes programs
B) Acts as an intermediary between client and server
C) Stores databases
D) Manages hardware
Answer: B) Acts as an intermediary between client and server
Explanation: A proxy server handles requests between clients and servers, enhancing security and privacy.
42. Which of the following is a type of software license?
A) HTML
B) Open Source
C) RAM
D) CPU
Answer: B) Open Source
Explanation: Open-source licenses allow free use, modification, and distribution of software.
43. What is the full form of BIOS?
A) Basic Input/Output System
B) Binary Instruction Operating System
C) Built-In Output System
D) Basic Integrated Operating System
Answer: A) Basic Input/Output System
Explanation: BIOS initializes hardware during the boot process and provides runtime services.
44. Which device connects multiple networks together?
A) Router
B) Switch
C) Hub
D) Repeater
Answer: A) Router
Explanation: A router connects different networks, directing data packets between them.
45. What is the term for a program that spreads without attaching to other programs?
A) Virus
B) Worm
C) Trojan
D) Spyware
Answer: B) Worm
Explanation: A worm replicates itself across networks without needing a host program.
46. Which of the following is a markup language?
A) Python
B) HTML
C) C++
D) Java
Answer: B) HTML
Explanation: HTML (HyperText Markup Language) structures content on the web.
47. What is the purpose of a driver in a computer system?
A) Executes applications
B) Enables communication between hardware and software
C) Stores data
D) Manages networks
Answer: B) Enables communication between hardware and software
Explanation: Drivers allow the operating system to interact with hardware devices.
48. Which of the following is a type of computer port?
A) CPU
B) HDMI
C) RAM
D) SSD
Answer: B) HDMI
Explanation: HDMI (High-Definition Multimedia Interface) is a port for transmitting audio and video.
49. What does XML stand for?
A) eXtra Markup Language
B) eXtensible Markup Language
C) eXecutable Machine Language
D) eXternal Memory Language
Answer: B) eXtensible Markup Language
Explanation: XML is used for storing and transporting structured data.
50. Which technology is associated with fifth-generation computers?
A) Vacuum Tubes
B) Transistors
C) Artificial Intelligence
D) Integrated Circuits
Answer: C) Artificial Intelligence
Explanation: Fifth-generation computers focus on AI and advanced processing technologies.
🙏
👍
❤️
😂
😢
😮
32