๐Ÿ“Œ IMPORTANT
Loading announcements...

Sunday, February 1, 2026

Advanced Computer MCQs (51–100)

 

Advanced Computer MCQs (51–100)

51. Which generation of computers used vacuum tubes?

a) First
b) Second
c) Third
d) Fourth
✔ Answer: a) First


52. Which memory is located closest to the CPU?

a) RAM
b) ROM
c) Cache
d) Hard Disk
✔ Answer: c) Cache


53. Which language is called a low-level language?

a) Java
b) Python
c) Assembly
d) BASIC
✔ Answer: c) Assembly


54. Which number system is used internally by computers?

a) Decimal
b) Octal
c) Hexadecimal
d) Binary
✔ Answer: d) Binary


55. Which operating system is open-source?

a) Windows
b) macOS
c) Linux
d) MS-DOS
✔ Answer: c) Linux


56. Which device is used to connect multiple computers in a network?

a) Modem
b) Switch
c) Printer
d) Scanner
✔ Answer: b) Switch


57. Which of the following is NOT a database software?

a) Oracle
b) MySQL
c) MS Access
d) MS Word
✔ Answer: d) MS Word


58. Which protocol is used for sending emails?

a) FTP
b) HTTP
c) SMTP
d) POP
✔ Answer: c) SMTP


59. What does IP stand for?

a) Internet Program
b) Internal Protocol
c) Internet Protocol
d) Interconnected Path
✔ Answer: c) Internet Protocol


60. Which device is used to convert digital signals into analog signals?

a) Router
b) Switch
c) Modem
d) Hub
✔ Answer: c) Modem


61. Which of the following is an example of firmware?

a) Windows
b) BIOS
c) MS Word
d) Linux
✔ Answer: b) BIOS


62. Which memory is non-volatile?

a) RAM
b) Cache
c) Register
d) ROM
✔ Answer: d) ROM


63. Which key combination is used to open Task Manager?

a) Ctrl + Alt + Del
b) Ctrl + Shift + Esc
c) Alt + F4
d) Ctrl + Esc
✔ Answer: b) Ctrl + Shift + Esc


64. Which port number is used by HTTP?

a) 21
b) 25
c) 80
d) 110
✔ Answer: c) 80


65. Which of the following is a search engine?

a) Chrome
b) Firefox
c) Google
d) Windows
✔ Answer: c) Google


66. Which file system is used by Windows?

a) FAT32
b) NTFS
c) EXT4
d) HFS
✔ Answer: b) NTFS


67. Which topology has a central node?

a) Bus
b) Ring
c) Star
d) Mesh
✔ Answer: c) Star


68. Which of the following is an example of cloud storage?

a) RAM
b) Hard Disk
c) Google Drive
d) Pen Drive
✔ Answer: c) Google Drive


69. Which device is used to forward data packets between networks?

a) Hub
b) Switch
c) Router
d) Bridge
✔ Answer: c) Router


70. Which of the following is NOT an internet browser?

a) Chrome
b) Firefox
c) Opera
d) Android
✔ Answer: d) Android


71. What does GUI stand for?

a) General User Interface
b) Graphical User Interface
c) Global User Interaction
d) Graphical Utility Interface
✔ Answer: b) Graphical User Interface


72. Which software converts high-level language to machine language?

a) Compiler
b) Editor
c) Loader
d) Debugger
✔ Answer: a) Compiler


73. Which command is used to copy files in DOS?

a) move
b) copy
c) paste
d) transfer
✔ Answer: b) copy


74. Which memory stores frequently used instructions?

a) Hard Disk
b) ROM
c) Cache
d) Pen Drive
✔ Answer: c) Cache


75. Which of the following is a cybercrime?

a) Hacking
b) Phishing
c) Identity theft
d) All of the above
✔ Answer: d) All of the above


76. Which of the following is an example of e-commerce?

a) Gmail
b) Amazon
c) Google Maps
d) Wikipedia
✔ Answer: b) Amazon


77. Which key closes an active window?

a) Ctrl + W
b) Alt + F4
c) Ctrl + Alt
d) Shift + Esc
✔ Answer: b) Alt + F4


78. Which unit measures data transfer speed?

a) Byte
b) Hertz
c) bps
d) Pixel
✔ Answer: c) bps


79. Which of the following is NOT a network topology?

a) Star
b) Ring
c) Bus
d) Grid
✔ Answer: d) Grid


80. Which memory is used to store the operating system?

a) Cache
b) RAM
c) Hard Disk
d) Register
✔ Answer: c) Hard Disk


81. Which of the following is an example of malware?

a) Firewall
b) Antivirus
c) Virus
d) Browser
✔ Answer: c) Virus


82. Which protocol is used for file transfer?

a) HTTP
b) SMTP
c) FTP
d) POP
✔ Answer: c) FTP


83. Which key is used to rename a file in Windows?

a) F1
b) F2
c) F5
d) F12
✔ Answer: b) F2


84. Which software is used for spreadsheet calculations?

a) MS Word
b) MS Excel
c) MS Paint
d) Notepad
✔ Answer: b) MS Excel


85. Which of the following is an example of artificial intelligence?

a) Calculator
b) Chatbot
c) Printer
d) Scanner
✔ Answer: b) Chatbot


86. Which unit executes program instructions?

a) ALU
b) CU
c) CPU
d) Register
✔ Answer: c) CPU


87. Which generation of computers used ICs?

a) First
b) Second
c) Third
d) Fourth
✔ Answer: c) Third


88. Which storage device has the largest capacity?

a) CD
b) DVD
c) Hard Disk
d) Floppy Disk
✔ Answer: c) Hard Disk


89. Which shortcut opens Run dialog box?

a) Ctrl + R
b) Alt + R
c) Windows + R
d) Shift + R
✔ Answer: c) Windows + R


90. Which of the following is NOT system software?

a) Windows
b) Linux
c) MS Word
d) DOS
✔ Answer: c) MS Word


91. What is the full form of ISP?

a) Internet Service Provider
b) Internal Service Program
c) Internet System Protocol
d) Integrated Service Provider
✔ Answer: a) Internet Service Provider


92. Which device is used for network security?

a) Hub
b) Switch
c) Firewall
d) Repeater
✔ Answer: c) Firewall


93. Which type of software helps in virus protection?

a) Utility software
b) System software
c) Application software
d) Programming software
✔ Answer: a) Utility software


94. Which extension is used for PowerPoint files?

a) .doc
b) .xls
c) .ppt
d) .pdf
✔ Answer: c) .ppt


95. Which technology is used in Bluetooth?

a) Infrared
b) Radio waves
c) Microwaves
d) Satellite
✔ Answer: b) Radio waves


96. Which memory temporarily stores data being processed?

a) ROM
b) Hard Disk
c) RAM
d) CD
✔ Answer: c) RAM


97. Which type of computer is used for weather forecasting?

a) Microcomputer
b) Minicomputer
c) Mainframe
d) Supercomputer
✔ Answer: d) Supercomputer


98. Which command is used to delete a file in DOS?

a) remove
b) erase
c) delete
d) del
✔ Answer: d) del


99. Which of the following is an example of social networking site?

a) Google
b) Facebook
c) Yahoo
d) Bing
✔ Answer: b) Facebook


100. Which type of attack tricks users into revealing personal information?

a) Virus
b) Worm
c) Phishing
d) Trojan
✔ Answer: c) Phishing

No comments:

Post a Comment