- Basics of Computer Science - Home
- Fundamental Concept
- Role of Computer in Today’s World
- Computer System
- Programming Languages
- Hardware and Software
- Analog and Digital
- Operating System
- Internet
- Types of Computer
- Computer Networking Terminology
- Computer Applications
- Generations of Computer
- Data Processing
- Computer Networking
- Computer Related Jobs
- Electronic Commerce
- Software Programming
- Algorithm Flowchart
- Extranet
- Mobile Computer
- Windows Desktop Elements
- Computer Multimedia
- Computer Security
- Computer Threat
- Computer Virus
- Computer Science: Abbreviations
- Computer Science: Development
- Computer Science: Innovators
- Short-cut Keys
Basics of Computer Science Online Quiz
Following quiz provides Multiple Choice Questions (MCQs) related to Basics of Computer Science. You will have to read all the given answers and click over the correct answer. If you are not sure about the answer then you can check the answer using Show Answer button. You can use Next Quiz button to check new set of questions in the quiz.
Q 1 - Consider the following statements:
1. The DNS system used by Internet permits computer to identify other computers.
2. In order to connect to the internet, each computer requires a unique numerical code, which is known as IP address.
Choose the correct answer from the codes given below:
Answer : C
Explanation
DNS stands for Domain Name System and IP address is Internet Protocol address.
Q 2 - Consider the following statements:
1. Firewall is a computer program that protects computer from certain types of malware threats.
2. A patch is a sort of software designed to update and secure the computer program and also to fix and improve the computer program.
Choose the correct answer from the codes given below:
Answer : C
Explanation
N/A
Q 3 - In reference to data encryption, consider the following statements:
1. Keys of encryption are characteristically stored in the computer files itself and they are also encrypted.
2. Keys can be assessed only with a passphrase.
Choose the correct answer from the codes given below:
Answer : C
Explanation
Keys are similar to passwords, but they are much longer.
Q 4 - Consider the following statements:
1. Point to Point Protocol is a dial account, which puts personal computer directly on the internet.
2. WWW is explained as Wide Area Hypermedia Information initiative that provides universal access.
Choose the correct answer from the codes given below:
Answer : C
Explanation
N/A
Q 5 - Consider the following statements:
1. WAIS maintains separate index for the contents of some designated documents.
2. By putting the name, WAIS entails a list of documents available in that index with similar keywords.
Choose the correct answer from the codes given below:
Answer : C
Explanation
WAIS stands for Wide Area Information Server.
Q 6 - Which among the following period is known as the era of second generation computer?
Answer : D
Explanation
N/A
Q 7 - If you need to copy the contents of MS Word, which command will you give?
Answer : B
Explanation
N/A
Q 8 - A person who uses his expertise to gain access of others computer illegally is known as
Answer : B
Explanation
N/A
Q 9 - Which among the following is the shortcut key to save word file in your computer system?
Answer : B
Explanation
F12 has some other functions as well.
Q 10 - Who among the following had invented the computer microprocessor?
Answer : A
Explanation
Marcian Hoff or Ted Hoff also gave the idea of using a "universal processor.
Q 11 - Which among the following is the correct sequence of information processing in a computer
A - Data, input, output, storage
B - Input, process, output, storage
Answer : B
Explanation
N/A
Q 12 - Consider the following statements:
1. PARAM was the first supercomputer of India.
2. PARAM was developed by C-DAC in 1991.
Choose the correct answer from the codes given below:
Answer : C
Explanation
PARAM was able to create animation, weather forecasting, encryption cracking and designing, nuclear energy research, etc.
Q 13 - The storage device, which retains data even after power cut, is known as
Answer : D
Explanation
N/A
Q 14 - Which one of the following command language is used by UNIX operating system?
Answer : B
Explanation
UNIX is typically used for web servers.
Q 15 - Which among the following correctly defines the term Virtual Memory?
Answer : D
Explanation
The secondary storage memory i.e. hard disk is used by CPU as an extended memory.
Q 16 - If all the hardware fixed properly even then it cannot reboot if
Answer : B
Explanation
N/A
Q 17 - Which among the following is also known as Information Highway?
Answer : A
Explanation
N/A
Q 18 - In which of the following States, the first hi-speed rural broadband network has been commissioned?
Answer : C
Explanation
The first hi-speed rural broadband network was set up in Idukki, district of Kerala.
Q 19 - Which among the following was the first computer virus?
Answer : D
Explanation
Elk Corner was seen in 1981 and considered as the first virus that affected personal computer, but in 1986 Farooq Alvi Brothers, reportedly to deter unauthorized copying of the software, had created Brain virus.
Q 20 - Which among the following correctly defines two parts of an email address?
Answer : C
Explanation
For example if someones user name is sam86 and he creates his email account on gmail.com, then his email id will be sam86@gmail.com; gmail.com is a domain name.