0% found this document useful (0 votes)
34 views

Computer Fundamental MCQ

The document contains a collection of 1000 multiple choice questions (MCQs) on Computer Fundamentals, covering various topics such as the definition of computers, components like CPU, input/output units, and types of computers. Each question is followed by options and the correct answer with explanations. It serves as a study guide for individuals looking to enhance their knowledge in computer fundamentals.

Uploaded by

l.n.sharma666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Computer Fundamental MCQ

The document contains a collection of 1000 multiple choice questions (MCQs) on Computer Fundamentals, covering various topics such as the definition of computers, components like CPU, input/output units, and types of computers. Each question is followed by options and the correct answer with explanations. It serves as a study guide for individuals looking to enhance their knowledge in computer fundamentals.

Uploaded by

l.n.sharma666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 86

Computer Fundamental MCQ (Multiple Choice

Questions)
Here are 1000 MCQs on Computer Fundamental (Chapterwise).
1. Who is the father of Computers?
a) James Gosling
b) Charles Babbage
c) Dennis Ritchie
d) Bjarne Stroustrup
View Answer
Answer: b
Explanation: Charles Babbage is known as the father of computers. Charles Babbage
designed and built the first mechanical computer and Difference Engine.

2. Which of the following is the correct abbreviation of COMPUTER?


a) Commonly Occupied Machines Used in Technical and Educational Research
b) Commonly Operated Machines Used in Technical and Environmental Research
c) Commonly Oriented Machines Used in Technical and Educational Research
d) Commonly Operated Machines Used in Technical and Educational Research
View Answer
Answer: d
Explanation: The word COMPUTER is an abbreviation for the terms “Commonly Operated
Machines Used in Technical and Educational Research”. The word COMPUTER also
relates to the word COMPUTE which means to calculate. So initially, it was thought that a
computer is a device that is used to perform calculations.

3. Which of the following is the correct definition of Computer?


a) Computer is a machine or device that can be programmed to perform arithmetical or logic
operation sequences automatically
b) Computer understands only binary language which is written in the form of 0s & 1s
c) Computer is a programmable electronic device that stores, retrieves, and processes the
data
d) All of the mentioned
View Answer
Answer: d
Explanation: A computer is a machine or device that can be programmed to perform
arithmetical or logic operation sequences automatically. The computer understands only
binary codes (0s & 1s).

4. What is the full form of CPU?


a) Computer Processing Unit
b) Computer Principle Unit
c) Central Processing Unit
d) Control Processing Unit
View Answer
Answer: c
Explanation: CPU stands for Central Processing Unit. CPU is the part of a computer system
that is mainly referred as the brain of the computer.
5. Which of the following language does the computer understand?
a) Computer understands only C Language
b) Computer understands only Assembly Language
c) Computer understands only Binary Language
d) Computer understands only BASIC
View Answer
Answer: c
Explanation: The Computer understands only binary language which is written in the form of
0s & 1s. A computer can understand assembly language but an assembler is required
which convert the assembly language to binary language. Similarly, for understanding high
level languages, compilers/interpreters are required.
advertisement
6. Which of the following computer language is written in binary codes only?
a) pascal
b) machine language
c) C
d) C#
View Answer
Answer: b
Explanation: Machine Language is written in binary codes only. It can be easily understood
by the computer and is very difficult for us to understand. A machine language, unlike other
languages, requires no translators or interpreters.

7. Which of the following is the brain of the computer?


a) Central Processing Unit
b) Memory
c) Arithmetic and Logic unit
d) Control unit
View Answer
Answer: a
Explanation: The CPU is referred to as the brain of a computer.
It consists of a control unit and an arithmetic and logic unit. It is responsible for performing
all the processes and operations.

8. Which of the following is not a characteristic of a computer?


a) Versatility
b) Accuracy
c) Diligence
d) I.Q.
View Answer
Answer: d
Explanation: The Computer system has no I.Q. of its own. It does only what it is
programmed to do. It cannot take decisions of its own.
A computer is diligent because it can work continuously for hours without getting any errors
or without getting grumbled.
The accuracy of a computer is consistently high and its level of accuracy depends on its
design. A computer can perform any task if, it can be broken down into a series of logical
steps. Therefore, a computer is versatile.
9. Which of the following is the smallest unit of data in a computer?
a) Bit
b) KB
c) Nibble
d) Byte
View Answer
Answer: a
Explanation: A bit is defined as the smallest unit of data in a computer system. It is used as
a short form of Binary Digit. A bit can have only two values 0 or 1. A nibble comprises 4 bits,
a byte is a collection of 8 bits whereas KB (Kilobyte) is equal to 1024 bytes.

10. Which of the following unit is responsible for converting the data received from the user
into a computer understandable format?
a) Output Unit
b) Input Unit
c) Memory Unit
d) Arithmetic & Logic Unit
View Answer
Answer: b
Explanation: The Input Unit converts the data, which the user enters into a language that
the computer understands, i.e. it converts the data into binary format. The Output Unit is
responsible for giving the results in a user-understandable format. The Storage Unit is
responsible for storing the data after immediate results of processing whereas; the ALU is
responsible for various arithmetic and bitwise operations.

11. Which of the following monitor looks like a television and are normally used with non-
portable computer systems?
a) LED
b) LCD
c) CRT
d) Flat Panel Monitors
View Answer
Answer: c
Explanation: A CRT (or the Cathode Ray Tube) Monitor looks like a television ideally. The
flat-panel monitors are thinner and lighter in comparison.

12. Which of the following is not a type of computer code?


a) EDIC
b) ASCII
c) BCD
d) EBCDIC
View Answer
Answer: a
Explanation: There is no coding scheme like EDIC. EBCDIC stands for Extended Binary
Coded Decimal Interchange Code. BCD stands for Binary Coded Decimal. ASCII stands for
American Standard Code for information interchange.

13. Which of the following part of a processor contains the hardware necessary to perform
all the operations required by a computer?
a) Controller
b) Registers
c) Cache
d) Data path
View Answer
Answer: d
Explanation: A processor is a part of the computer which does all the data manipulation and
decision making. A processor comprises of:
A data path that contains the hardware necessary to perform all the operations. A controller
tells the data path what needs to be done.
The registers act as intermediate storage for the data.

14. Which of the following is designed to control the operations of a computer?


a) User
b) Application Software
c) System Software
d) Utility Software
View Answer
Answer: c
Explanation: Software is basically classified into two: System and application. System
Software is designed to control the operations and extend the processing capability of a
computer system.

15. Which of the following device use positional notation to represent a decimal number?
a) Pascaline
b) Abacus
c) Computer
d) Calculator
View Answer
Answer: b
Explanation: Abacus was used to do arithmetic calculations around 2500 years ago.
Pascaline was the pascal’s calculator by Blaise Pascal invented for doing laborious
calculations.

16. Which of the following is used in EBCDIC?


a) Super Computers
b) Mainframes
c) Machine Codes
d) Programming
View Answer
Answer: b
Explanation: This concept of EBCDIC was invented by IBM. It is mainly used in the IBM
mainframe environment. So basically, mainframes use EBCDIC codes.

17. Which of the following are physical devices of a computer?


a) Hardware
b) Software
c) System Software
d) Package
View Answer
Answer: a
Explanation: Hardware refers to the physical devices of a computer system. Software refers
to a collection of programs. A program is a sequence of instructions.

18. Which of the following defines the assigned ordering among the characters used by the
computer?
a) Accumulation
b) Sorting
c) Collating Sequence
d) Unicode
View Answer
Answer: c
Explanation: Collating sequence is the term used for ordering among characters. It may
vary depending upon the type of code used by a computer.

19. Which of the following storage is a system where a robotic arm will connect or
disconnect off-line mass storage media according to the computer operating system
demands?
a) Magnetic
b) Secondary
c) Virtual
d) Tertiary
View Answer
Answer: d
Explanation: Tertiary storage is the correct option. It is used in the realms of enterprise
storage and scientific computing on large computer systems and business computer
networks and is something a typical personal computer never sees firsthand.

20. Which of the following is known as the interval between the instant a computer makes a
request for the transfer of data from a disk system to the primary storage and the instance
the operation is completed?
a) Disk utilization time
b) Drive utilization time
c) Disk access time
d) Disk arrival time
View Answer
Answer: c
Explanation: The interval is referred to as the disk arrival time. It depends on several
parameters. Generally, a computer makes a request and the operation is served.

21. Which of the following devices provides the communication between a computer and
the outer world?
a) Compact
b) I/O
c) Drivers
d) Storage
View Answer
Answer: b
Explanation: The I/O i.e. the input/output devices provide a means of communication
between the computer and the outer world. They are often referred to as peripheral devices
sometimes.

22. Which of the following are the input devices that enable direct data entry into a
computer system from source documents?
a) System Access devices
b) Data acquiring devices
c) Data retrieving devices
d) Data Scanning devices
View Answer
Answer: d
Explanation: They are referred to as data scanning devices. They eliminate the need to key
in text data into the computer. It demands the high quality of input documents.

23. Which of the following is the device used for converting maps, pictures, and drawings
into digital form for storage in computers?
a) Image Scanner
b) Digitizer
c) MICR
d) Scanner
View Answer
Answer: b
Explanation: A digitizer serves the purpose given in the question. Digitizers are generally
used in the area of Computer-Aided Design by architects and engineers to design cars,
buildings, etc.

24. Which of the following can access the server?


a) Web Client
b) User
c) Web Browser
d) Web Server
View Answer
Answer: a
Explanation: Any computer that has access to the webserver is called the web client. A web
server is any computer that uses the HTTP protocol.

25. Which of the following is known as the language made up of binary-coded instructions?
a) High level
b) BASIC
c) C
d) Machine
View Answer
Answer: d
Explanation: The language made up of binary-coded instructions built into the hardware of a
particular computer and used directly by the computer is machine language.

26. Which of the following package allows individuals to use personal computers for storing
and retrieving their personal information?
a) Personal assistance package
b) Graphics package
c) Spreadsheet package
d) Animation package
View Answer
Answer: a
Explanation: It is a personal assistance package that allows for the same. It helps in
planning and managing their schedules, contacts, finances, and inventory of important
terms.

27. Which of the following is created when a user opens an account in the computer
system?
a) SFD
b) MFD
c) Subdirectory
d) RFD
View Answer
Answer: c
Explanation: A subdirectory is created when a user opens an account in the computer
system. It is treated as a file, though flagged in MFD as a subdirectory.

28. Which of the following is a technique that marked the beginning of computer
communications?
a) User Environment
b) Batch Environment
c) Time Sharing
d) Message passing
View Answer
Answer: c
Explanation: The answer is time-sharing. In time-sharing, Users were able to interact with
the computer and could share its information processing resources.

29. Which of the following is a type of technique in which dumb terminals are connected to a
central computer system?
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment
View Answer
Answer: a
Explanation: This happens in time-sharing. In this, users were able to interact with the
computer and could share its information processing resources.

30. Which of the following service allows a user to log in to another computer somewhere
on the Internet?
a) e-mail
b) UseNet
c) Telnet
d) FTP
View Answer
Answer: c
Explanation: Telnet is the answer. It is a service that enables the user to log into another
computer somewhere on the Internet.

31. Which of the following is not a type of computer on the basis of operation?
a) Digital
b) Analog
c) Hybrid
d) Remote
View Answer
Answer: d
Explanation: There are three types of computers basically on the basis of operation:
Analog, Digital, and Hybrid.

32. Which of the following type of computer is mostly used for automatic operations?
a) analog
b) digital
c) hybrid
d) remote
View Answer
Answer: c
Explanation: Hybrid computer is mostly used with automatic operations of complicated
physical processes and machines.

33. Which of the following invention gave birth to the much cheaper microcomputers?
a) PDAs
b) Microprocessors
c) Microcomputers
d) Mainframes
View Answer
Answer: b
Explanation: The invention of the microprocessor (also called a single-chip CPU) gave birth
to much cheaper microcomputers.

34. Which of the following computers are lower than mainframe computers in terms of
speed and storage capacity?
a) Mainframes
b) Hybrid
c) Mini
d) Super
View Answer
Answer: c
Explanation: The answer is a. Mini computers are compared to mainframe computers in
terms of:
1. speed and, 2. storage capacity.

35. Which of the following is the first neural network computer?


a) AN
b) AM
c) RFD
d) SNARC
View Answer
Answer: d
Explanation: SNARC was the first neural network computer. it was built by Minsky and
Edmonds in 1956.

Computer Fundamentals Questions and


Answers – The Input Unit
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “The Input Unit”.

1. Which unit is responsible for converting the data received from the user into a computer
understandable format?
a) Memory Unit
b) Arithmetic & Logic Unit
c) Input Unit
d) Output Unit
View Answer
Answer: c
Explanation: The Input Unit converts the data, which the user enters into a language which
the computer understands, i.e. it converts the data into binary format. The Output Unit is
responsible for giving the results in user-understandable format. The Storage Unit is
responsible for storing the data after immediate results of processing whereas; the ALU is
responsible for various arithmetic and bitwise operations.

2. The only language which the computer understands is ______________


a) Assembly Language
b) Binary Language
c) BASIC
d) C Language
View Answer
Answer: b
Explanation: The Computer understands only binary language which is written in the form of
0s & 1s. A computer can understand assembly language but an assembler is required
which converts the assembly language to binary language. Similarly, for understanding high
level languages, compilers/interpreters are required.

3. The smallest unit of data in computer is ________________


a) Byte
b) Nibble
c) Bit
d) KB
View Answer
Answer: c
Explanation: A bit is defined as the smallest unit of data in a computer system. It is used as
a short form of Binary Digit. A bit can have only two values 0 or 1. A nibble comprises of 4
bits, a byte is a collection of 8 bits whereas KB (Kilobyte) is equal to 1024 bytes.
advertisement
4. One nibble is equivalent to how many bits?
a) 2
b) 4
c) 8
d) 1
View Answer
Answer: b
Explanation: A nibble is defined as a unit of data which comprises of 4 binary digits or half
of 8-bit byte. Therefore, 1 nibble = 4 bits. A bit is the smallest unit of data in a computer
system. A byte = 8 bits, therefore, half of a byte=4 bits=a nibble.

5. Which of the following describes the correct format of an input instruction?


a) IN 82
b) INPUT 82
c) INP 82
d) 82 INP
View Answer
Answer: a
Explanation: The input/output instructions are used to transfer information between external
peripherals and the CPU. The correct format of an input instruction is: IN 8-bit port address.
Here, IN 82 is the correct option, where 82 is the designated port address. All the other
options are invalid.

Note: Join free Sanfoundry classes at Telegram or Youtube

6. The input machine which originated in the United States around 1880s is a ___________
a) Mouse
b) Joystick
c) Keyboard
d) Bar Code Reader
View Answer
Answer: c
Explanation: A keyboard is an input device which originated in the 1880s and is used to give
instructions to the computer in the form of letters and numbers. Mouse is used for the
selection of various objects on the screen, joystick is mainly used for gaming purpose and
bar code readers are used for reading the bar-codes.

7. What does the COMPUTER stand for?


a) Commonly Operated Machines Used in Technical and Educational Research
b) Commonly Occupied Machines Used in Technical and Educational Research
c) Commonly Operated Machines Used in Technical and Environmental Research
d) Commonly Oriented Machines Used in Technical and Educational Research
View Answer
Answer: a
Explanation: The word COMPUTER is an abbreviation for the terms “Commonly Operated
Machines Used in Technical and Educational Research”. The word COMPUTER also
relates to the word COMPUTE which means to calculate. So, initially it was thought that a
computer is a device which is used to perform calculations.

8. 1 yottabyte = ______________
a) 1024 TB
b) 1024 EB
c) 1024 ZB
d) 1024 PB
View Answer
Answer: c
Explanation: 1 yottabyte is equal to 1024 ZB, which stands for zettabyte. Further, 1
ZB=1024 EB (exabyte) and and 1 EB=1024PB (petabyte).

9. Which of the following is not a function of the Input Unit?


a) It reads instructions and data from the outside world
b) It converts the data into computer acceptable format
c) It makes the data into user understandable format
d) It supplies the data and instructions to the computer for further processing
View Answer
Answer: c
Explanation: The input unit converts the data into computer understandable format i.e.
binary format and not the user understandable format. It is the duty of the output unit to
make the data into user understandable format.

10. Label the parts 1 and 2:

a) 1.ALU 2. MU
b) 1.Output unit 2.Input Unit
c) 1.MU 2. ALU
d) 1.Input Unit 2.Output Unit
View Answer
Answer: d
Explanation: The above diagram is a simple explanation which describes how the
instruction is given to the CPU, how it is processed, and then how the result is obtained.
So here, the input unit is used to give instructions to the central processing unit and the
output unit is responsible for giving the result to the user.
Computer Fundamentals Questions and
Answers – The Output Unit
This set of Computer Fundamentals Interview Questions and Answers focuses on “The
Output Unit”.

1. The process of producing useful information for the user is called ___________
a) Controlling
b) Outputting
c) Inputting
d) Processing
View Answer
Answer: b
Explanation: The Output Unit is responsible for giving the results to the user in the form of a
printed report or visual display. The process is referred to as outputting. Controlling is
nothing but the manner and sequence in which the instructions are being operated.
Inputting means giving instructions to the system whereas, processing means performing
certain operations and calculations.

2. The output unit converts the data entered by the user into computer understandable form.
a) True
b) False
View Answer
Answer: b
Explanation: The Output unit is responsible for converting the computer obtained data into
user understandable format. The Input Unit is responsible for converting the data in
computer understandable format.

3. VDU stands for __________


a) Virtual Display Unit
b) Visual Display Unit
c) Virtual Detection Unit
d) Visual Detection Unit
View Answer
Answer: b
Explanation: A Visual Display unit is also referred to as the monitor who basically is used to
give the results or outputs to the user. It comprises of a cathode ray tube internally.
advertisement
4. What does SVGA stand for?
a) Standard Visual Graphics Array
b) Super Visual Graphics Array
c) Standard Video Graphics Array
d) Super Video Graphics Array
View Answer
Answer: d
Explanation: Super Video Graphics Array is a type of Visual Display Unit.It supports 1024
by 768 pixels with 16 million different operations.
5. The devices that used to give single or multiple colored images and drawings are
____________
a) Monitors
b) Printers
c) Plotters
d) VDUs
View Answer
Answer: c
Explanation: Plotters are the devices which are used to give colored images. They use ink
pens or ink jets for drawing. Pens of different colors and shades are used for shading and
styling.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. A special request originated from some device to the CPU to acquire some of its time is
called ___________
a) Disturbance
b) Attenuation
c) Interrupt
d) Noise
View Answer
Answer: c
Explanation: An interrupt is a kind of request which takes control of the system bus for some
time, then performs all the operations and gives back control to the CPU. It is usually
identified by some number and is handled by the interrupt controller.

7. Line Printers that print one line at a time are _________


a) Laser Printers
b) Inkjet Printers
c) Drum Printers
d) Chain Printers
View Answer
Answer: c
Explanation: The drum printers have a solid cylindrical drum with characters embossed on
its surface in the form of circular bands. It can only print a predefined set of characters.

8. A ___________________ monitor looks like a television and are normally used with non-
portable computer systems.
a) CRT
b) LCD
c) LED
d) Flat Panel Monitors
View Answer
Answer: a
Explanation: A CRT (or the Cathode Ray Tube) Monitor looks like a television ideally. The
flat panel monitors are thinner and lighter in comparison.

9. Which of the following is not a function of the Output Unit?


a) It produces results that can be easily understood by the user
b) It accepts the results produced by the computer
c) It supplies the data and instructions to the outside world
d) It supplies the data and instructions to the computer for further processing
View Answer
Answer: d
Explanation: The output unit is responsible for giving the results to the user in the form of a
printed report or visual display. It is not responsible for giving the instructions back to the
CPU for processing.

10. PCI stands for _________


a) Peripheral Component Interconnect
b) Partial Component Interconnect
c) Peripheral Component Interaction
d) Partial Component Interaction
View Answer
Answer: a
Explanation: PCI is a high-bandwidth bus that can function as a peripheral bus. Compared
with others, it delivers better system performance.

Computer Fundamentals Questions and


Answers – The Storage Unit
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “The Storage Unit”.

1. Components that provide internal storage to the CPU are ______


a) Registers
b) Program Counters
c) Controllers
d) Internal chips
View Answer
Answer: a
Explanation: The Registers are the fast storage units. They are responsible for storing
intermediate computational results in the CPU. The registers can be user accessible or
inaccessible.

2. Saving data and instructions to make them readily available is the job of __________
a) Storage Unit
b) Cache Unit
c) Input Unit
d) Output Unit
View Answer
Answer: a
Explanation: The storage unit is responsible for storing the data. It makes the instructions
readily available for additional or initial processing whenever required. The cache is a
software component that stores data to serve the data requests in future. It can contain the
result of some earlier computations.
3. The two basic types of memory in a computer are ________

a) Primary and major


b) Primary and Secondary
c) Minor and Major
d) Main and virtual
View Answer
Answer: b
Explanation: There are two types of memories in a computer system: The Primary Memory
and the Secondary Memory.
The primary memory can be directly accessed by the CPU whereas the secondary memory
cannot be directly accessed.
advertisement
4. Which of the following is used to hold running program instructions?
a) Primary Storage
b) Virtual Storage
c) Internal Storage
d) Minor Devices
View Answer
Answer: a
Explanation: The primary storage is responsible for holding the data, intermediate results
and the results of ongoing processes or jobs. Virtual storage is the main memory storage
required for saving a large amount of data for future reference. The other options are
invalid.

5. Which of the following is non-volatile storage?


a) Backup
b) Secondary
c) Primary
d) Cache
View Answer
Answer: b
Explanation: The secondary storage is the non-volatile storage unit because the data is not
lost when the power supply is dissipated. Primary memory is the volatile memory.

Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate


Now!

6. Which of the following is used in main memory?


a) SRAM
b) DRAM
c) PRAM
d) DDR
View Answer
Answer: b
Explanation: DRAM stands for dynamic random access memory. It is denser than SDRAM
(Static) and therefore it is used in the main memory. They are in the form of semiconductor
RAMs.

7. Which of the following are types of ROMs?


a) SROM & DROM
b) PROM & EPROM
c) Only one type there is no further classification
d) PROM & EROM
View Answer
Answer: b
Explanation: There are four types of Read Only Memories: MROM, PROM, EPROM, and
EEPROM.
 MROM stands for Mask ROM
 PROM stands for Programmable ROM
 EPROM stands for Erasable Programmable ROM
 EEPROM stands for Electrically Erasable Programmable ROM
When only a small number of ROMs with a particular memory content is needed, PROM is
used and in case of EPROM, all the contents of the storage cells must be erased before the
write operation.

8. RAID stands for __________


a) Redundant array of independent disks
b) Redundant array of individual disks
c) Reusable Array of independent disks
d) Reusable array of individual disks
View Answer
Answer: a
Explanation: RAID is a multiple-disk database design which is viewed as a single logical
disk by the operating system. Data are distributed across the physical drives of the array. It
guarantees the recovery of data in case of data failure.

9. A non-erasable disk that stores digitized audio information is _____


a) CD
b) CD-ROM
c) DVD-R
d) DVD-RW
View Answer
Answer: a
Explanation: A compact disk stores digitized audio information. The standard system uses
12 cm disks and can record more than 60 minutes of uninterrupted playing game.

10. The first practical form of Random Access Memory was the __________
a) SSEM
b) Cathode Ray Tube
c) William’s Tube
d) Thomas’s Tube
View Answer
Answer: c
Explanation: The first practical form of RAM was William’s Tube made in 1947. It stored
data as electrically charged spots on the face of a Cathode Ray Tube

Computer Fundamentals Questions and


Answers – The Arithmetic & Logic Unit
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “The Arithmetic & Logic Unit”.

1. The ‘heart’ of the processor which performs many different operations _____________
a) Arithmetic and logic unit
b) Motherboard
c) Control Unit
d) Memory
View Answer
Answer: a
Explanation: The Arithmetic and logic unit performs all the basic operations of the computer
system. It performs all the arithmetic(+,-,*,/,etc) as well as the logical operations( AND, OR,
NOT, etc.).

2. ALU is the place where the actual executions of instructions take place during the
processing operation.
a) True
b) False
View Answer
Answer: a
Explanation: ALU is a combinational electronic circuit which basically performs all the logical
or the bitwise operations and the arithmetic operations. Therefore, it is the place where the
actual executions of instructions take place.

3. Which of the following is not a bitwise operator?


a) |
b) ^
c) .
d) <<
View Answer
Answer: c
Explanation: All except the dot(.) operator are bitwise operators.
| : Bitwise OR
^ : Bitwise XOR
<< : Shift Left
advertisement
4. The sign magnitude representation of -1 is __________
a) 0001
b) 1110
c) 1000
d) 1001
View Answer
Answer: d
Explanation: The first leftmost bit i.e. the most significant bit in the sign magnitude
represents if the number is positive or negative. If the MSB is 1, the number is negative else
if it is 0, the number is positive. Here, +1=0001 and for -1=1001.

5. IEEE stands for ___________


a) Instantaneous Electrical Engineering
b) Institute of Emerging Electrical Engineers
c) Institute of Emerging Electronic Engineers
d) Institute of Electrical and electronics engineers
View Answer
Answer: d
Explanation: The IEEE is an organization of professionals in the field of electronics and
electrical engineering. IEEE has given certain standards of its own which are followed in the
field of computer science and electrical engineering.

Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate


Now!

6. The ALU gives the output of the operations and the output is stored in the ________
a) Memory Devices
b) Registers
c) Flags
d) Output Unit
View Answer
Answer: b
Explanation: Any output generated by the ALU gets stored in the registers. The registers
are the temporary memory locations within the processor that are connected by signal paths
to the CPU.

7. The process of division on memory spaces is called ______________


a) Paging
b) Segmentation
c) Bifurcation
d) Dynamic Division
View Answer
Answer: b
Explanation: The memory space is divided into segments of dynamic size. The programmer
is aware of the segmentation and can reallocate the segments accordingly.

8. Number of bits in ALU is _________


a) 4
b) 8
c) 16
d) 2
View Answer
Answer: c
Explanation: Arithmetic and Logic Unit consists of 16bits. They perform certain Arithmetic
and bitwise operations (add, subtract, AND, OR, XOR, Increment, decrement, shift).

9. Which flag indicates the number of 1 bit that results from an operation?
a) Zero
b) Parity
c) Auxiliary
d) Carry
View Answer
Answer: b
Explanation: The parity flag indicates the number of 1 bit in any operation. The resultant bit
is called the parity bit. The main aim of the parity bit is to check for errors.

10. The bitwise complement of 0 is ___________


a) 00000001
b) 10000000
c) 11111111
d) 11111110
View Answer
Answer: c
Explanation: Bitwise complement is basically used to convert all the 0 digits to 1 and the 1s
to 0s.
So, for 0 = 00000000(in 8-bits) ::: 11111111(1s complement). The bitwise complement is
often referred to as the 1s complement.

Computer Fundamentals Questions and


Answers – The Control Unit
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “The Control Unit”.

1. ____________ is the raw material used as input and __________ is the processed data
obtained as output of data processing.
a) Data, Instructions
b) Instructions, Program
c) Data, Program
d) Program, Code
View Answer
Answer: a
Explanation: Data can be assumed as a raw material which, in turns after processing gives
the desired output in the form of instructions. Further, a set of ordered and meaningful
instructions is known as a program.

2. Which of the following is not a characteristic of a computer?


a) Diligence
b) I.Q.
c) Accuracy
d) Versatility
View Answer
Answer: b
Explanation: The Computer system has no I.Q. of its own. It does only what it is
programmed to do. It cannot take decisions of its own.
A computer is diligent because it can work continuously for hours without getting any errors
or without getting grumbled.
The accuracy of a computer is consistently high and its level of accuracy depends on its
design. A computer can perform any task if, it can be broken down into a series of logical
steps. Therefore, a computer is versatile.

3. Fill in the blank in the diagram.

a) Input Unit
b) Memory Unit
c) Control Unit
d) I/O Unit
View Answer
Answer: c
Explanation: The control unit manages and coordinates the operations of a computer
system. The ALU is responsible for performing all the arithmetic and bitwise operations .
Therefore, both these units combine to form the brain of the computer ,which is the central
processing unit.
advertisement
4. The part of a processor which contains hardware necessary to perform all the operations
required by a computer:
a) Data path
b) Controller
c) Registers
d) Cache
View Answer
Answer: a
Explanation: A processor is a part of the computer which does all the data manipulation and
decision making. A processor comprises of:
A data path which contains the hardware necessary to perform all the operations. A
controller tells the data path what needs to be done.
The registers act as intermediate storage for the data.
5. What does MAR stand for?
a) Main Address Register
b) Memory Access Register
c) Main Accessible Register
d) Memory Address Register
View Answer
Answer: d
Explanation: MAR is a type of register which is responsible for the fetch operation. MAR is
connected to the address bus and it specifies the address for the read and write operations.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. If the control signals are generated by combinational logic, then they are generated by a
type of _______________ controlled unit.
a) Micro programmed
b) Software
c) Logic
d) Hardwired
View Answer
Answer: d
Explanation: The main task of a control unit is to generate control signals. There are two
main types of control units:
A hardwired control unit generates control signals by using combinational logic circuits and
the Micro programmed control unit generates control signals by using some softwares.

7. Which is the simplest method of implementing hardwired control unit?


a) State Table Method
b) Delay Element Method
c) Sequence Counter Method
d) Using Circuits
View Answer
Answer: a
Explanation: There are 3 ways of implementing hardwired control unit:
A state table is the simplest method in which a number of circuits are designed based on
the cells in the table.
A delay element method consists of a flowchart drawn for the circuit. A D-flip flop is used as
a delay element.
A sequence counter method used k-modulo counter as a replacement for k delay elements.

8. A set of microinstructions for a single machine instruction is called ___________


a) Program
b) Command
c) Micro program
d) Micro command
View Answer
Answer: c
Explanation: For every micro-operation, a set of microinstructions are written which indicate
the control signals to be activated. A set of microinstructions is a micro program. The
address of the next microinstruction is given by a Micro-program counter.
9. Micro-program consists of a set of microinstructions which are strings of 0s and 1s.
a) True
b) False
View Answer
Answer: a
Explanation: The computer understands only binary language. So, the micro-program
should have instructions which are in the form of 0s and 1s. Each output line of the micro-
program corresponds to one control signal.

10. A decoder is required in case of a ______________


a) Vertical Microinstruction
b) Horizontal Microinstruction
c) Multilevel Microinstruction
d) All types of microinstructions
View Answer
Answer: a
Explanation: There are two types of microinstructions: Horizontal and Vertical.
In a horizontal microinstruction, each bit represents a signal to be activated whereas, in
case of vertical microinstruction bits are decoded and, the decoder then produces signals.

Computer Fundamentals Questions and


Answers – Transmission Modes
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Transmission Modes”.

1. A term that defines the direction of flow of information between devices.


a) interconnectivity
b) intra connectivity
c) transmission mode
d) transmission
View Answer
Answer: c
Explanation: The term transmission mode defines the direction of flow of information
between two communication devices. It tells the direction of signal flow.

2. Transmission mode controls the direction of signal flow.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. The term transmission mode defines the direction of
flow of information between two communication devices. It tells the direction of signal flow
between two devices.

3. Which of the following isn’t a type of transmission mode?


a) physical
b) simplex
c) full duplex
d) half duplex
View Answer
Answer: a
Explanation: There are three modes of transmission: simplex, half duplex and full duplex.
Transmission modes tell the direction of signal flow between two devices.
advertisement
4. A transmission that generally involves dedicated circuits.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: a
Explanation: The answer is simplex. Simplex generally involves dedicated circuits. TV
broadcasting is an example.

5. A transmission mode that can transmit data in both the directions but transmits in only
one direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: b
Explanation: The half duplex mode supports two way traffic but only in one direction at a
time. The interactive transmission of data within a time sharing system may be best suited
to half-duplex lines.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. A communication between a computer and a keyboard involves ____________ duplex


transmission.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: a
Explanation: It involves simplex duplex transmission. Another example of a simplex duplex
transmission is loudspeaker system.

7. Telephone networks operate in this mode.


a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: c
Explanation: Telephone networks operate in full duplex mode. It can transmit data in both
the directions.

8. Fire alarms are based on this type of transmission:


a) direct
b) network
c) analog
d) multiple
View Answer
Answer: c
Explanation: Analog transmission is a technique of transmitting voice, data, image, signal or
video information. Fire alarm systems work in the same way.

9. A technique of transmitting data or images or videos (information) using a continuous


signal.
a) direct
b) network
c) analog
d) multiple
View Answer
Answer: c
Explanation: Analog is a technique of transmitting data or images or videos (information)
using a continuous signal, which varies in amplitude, phase or some other property.

10. A walkie-talkie operates in ____________


a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: b
Explanation: A walkie-talkie operates in half duplex mode. It can only send or receive a
transmission at any given time.

Computer Fundamentals Questions and


Answers – Modulation Techniques
This set of Computer Fundamentals Questions and Answers for Aptitude test focuses on
“Modulation Techniques”.

1. A coaxial cable has a bandwidth of _________ of megahertz.


a) 100
b) 150
c) 1000
d) 10000
View Answer
Answer: a
Explanation: A coaxial cable has a bandwidth of 100’s of Mhz. Baseband speed is in a few
KHz. Multiplexing improves channel bandwidth utilization.

2. In TDM, the samples occupy adjacent time slots.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. The TDM technique is based on sampling and they
occupy adjacent slots and are transmitted in a sequence.

3. The carrier wave is a _________


a) tan wave
b) cosec wave
c) sine wave
d) cot wave
View Answer
Answer: c
Explanation: The carrier wave is generally a sine wave. Carrier wave is used to transfer the
signal from source to destination.
advertisement
4. Controlling the phase is referred as __________
a) modulation
b) half modulation
c) amplitude modulation
d) phase modulation
View Answer
Answer: d
Explanation: It is referred to as phase modulation. When there is a change in amplitude, it is
referred to as amplitude modulation.

5. A transmission mode that can transmit data in both the directions but transmits in only
one direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: b
Explanation: The half duplex mode supports two way traffic but only in one direction at a
time.

Note: Join free Sanfoundry classes at Telegram or Youtube

6. A multiplexing technique based on sampling.


a) FDM
b) TDM
c) SDM
d) FM
View Answer
7. An example of FDM:
a) broadcast radio
b) telephone
c) machines
d) semi-duplex
View Answer
8. FDM stands for?
a) Frequency Division Multiplexing
b) Frequency Dependent Multiplexing
c) Frequency Diverged Multiplexing
d) Frequency Derived Multiplexing
View Answer
Answer: a
Explanation: FDM stands for Frequency Division Multiplexing. This allows several
messages to be translated from baseband, where they are all in the same frequency.

9. A modulation technique that improves channel bandwidth utilization.


a) direct
b) modulation
c) demodulation
d) multiplexing
View Answer
Answer: d
Explanation: Multiplexing is a modulation technique that improves channel bandwidth
utilization.

10. The purpose of communication system is to transfer information from _______ to the
destination.
a) user
b) source
c) system
d) station
View Answer
Answer: b
Explanation: The answer is source. A communication system transfers information from
source to the destination

Computer Fundamentals Questions and


Answers – Multiplexing
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Multiplexing”.

1. WDM stands for?


a) Wave division multiplexing
b) Wavelength division multiplexing
c) Wavelength dependent multiplexing
d) Wave dependent multiplexing
View Answer
Answer: b
Explanation: It stands for Wavelength division multiplexing. It has same general architecture
as FDM. FDM is frequency division multiplexing.

2. In TDM, the samples occupy adjacent time slots.


a) True
b) False
View Answer
3. In this type of multiplexing time slots are preassigned to sources and fixed.
a) TDM
b) Synchronous TDM
c) Asynchronous TDM
d) FDM
View Answer
Answer: b
Explanation: TDM is time division multiplexing. Data rate of medium exceeds data rate of
digital signal to be transmitted.
advertisement
4. Controlling the frequency is referred as _________
a) frequency modulation
b) hertz modulation
c) amplitude modulation
d) phase modulation
View Answer
Answer: a
Explanation: It is referred to as frequency modulation. When there is a change in frequency,
it is referred to as frequency modulation.

5. A technique that can be a solution to the problem of synchronizing data sources.


a) framing
b) data link control
c) full link control
d) pulse stuffing
View Answer
Answer: d
Explanation: Pulse stuffing is a technique that can be a solution to the problem of
synchronizing data sources. In pulse stuffing, the outgoing data rate is higher than sum of
incoming rates.

Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate


Now!

6. For voice, each channel contains a ___ word of digitized data.


a) 2
b) 1
c) 0
d) 4
View Answer
Answer: b
Explanation: In digital carrier systems, for voice each channel contains one word of digitized
data. The data rate is 1.544 Mbps. Five out of six frames have 8 bit PCM samples.

7. Many time slots are wasted in __________


a) TDM
b) Synchronous TDM
c) Asynchronous TDM
d) FDM
View Answer
Answer: b
Explanation: In Synchronous TDM, many time slots are wasted. Other techniques can help
overcome this problem.

8. A technique that allocates time slots dynamically.


a) TDM
b) WDM
c) Dynamic TDM
d) Statistical TDM
View Answer
Answer: d
Explanation: Statistical TDM assigns time slots dynamically. They are allocated based on
demand. Multiplexer scans input lines and collects data until the frame is full.

9. A system in which two channels are dedicated to transfer data.


a) TV
b) Cable
c) Modem
d) Cable modem
View Answer
Answer: d
Explanation: A cable modem has two dedicated channels from cable TV provider dedicated
to data transfer. One in each direction.

10. In this technique, there is a link between subscriber and network and a local loop.
a) SSDL
b) DSDL
c) ASDL
d) TSDL
View Answer
Answer: c
Explanation: In ASDL, there is a link between the subscriber and the network. It uses
currently installed twisted pair cable.

Computer Fundamentals Questions and


Answers – Network Topologies
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Network Topologies”.

1. A topology that is responsible for describing the geometric arrangement of components


that make up the LAN.
a) Complex
b) Physical
c) Logical
d) Incremental
View Answer
Answer: b
Explanation: It is referred to as a physical LAN topology. LAN stands for Local Area
Network.

2. Bus is a type of topology.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Bus topology is an arrangement where all nodes are
interconnected using a single-cable.

3. _____ LAN topology describes the possible connections between pairs of networked
end-points that can communicate.
a) Complex
b) Physical
c) Logical
d) Incremental
View Answer
Answer: c
Explanation: A logical LAN topology describes the possible connections. LAN stands for
Local Area Network.
advertisement
4. A term that refers to the way in which the nodes of a network are linked together.
a) network
b) topology
c) connection
d) interconnectivity
View Answer
Answer: b
Explanation: Topology is a term that refers to the way in which the nodes are connected.
There are 4 major topology networks.

5. A network comprising o multiple topologies.


a) Complex
b) Hybrid
c) Bus
d) Star
View Answer
Answer: b
Explanation: A hybrid network consists of multiple topologies. It can comprise a ring, a star
and other topologies. We call this arrangement as a hybrid network.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. The participating computers in a network are referred to as:


a) Clients
b) Servers
c) Nodes
d) CPUs
View Answer
Answer: c
Explanation: They are referred to as the nodes. There are several topologies designed for
arrangements of these nodes like bus, star, etc.

7. A topology that involves Tokens.


a) Star
b) Ring
c) Bus
d) Daisy Chaining
View Answer
Answer: b
Explanation: Ring topology involves sending and receiving of data with the help of tokens.
Ring started out as a simple peer-to-peer LAN topology.

8. A ____________WAN can be developed using leased private lines or any other


transmission facility
a) Hybrids
b) peer-to-peer
c) Two-tiered
d) Three-tiered
View Answer
Answer: b
Explanation: A peer-to-peer WAN topology is a relatively simple way of interconnecting a
small number of sites. It has the least-cost solution for WANs that contain a small number of
internetworked locations.

9. A serially connected system of all the hubs of networks.


a) Bus
b) Ring
c) Daisy chains
d) Star
View Answer
Answer: c
Explanation: The correct option is Daisy chain. This simple approach uses ports on existing
hubs for interconnecting the hubs.
10. A piece of information which is sent along with the data to the source computer.
a) data
b) module
c) token
d) element
View Answer
Answer: c
Explanation: Token is the information that is sent to the source computer along with the
data. This token is then passed to the next node.

Computer Fundamentals Questions and


Answers – Internetworking
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Internetworking”.

1. Configuration where many independent computer systems are connected.


a) Complex
b) Distributed
c) Cloud
d) Incremental
View Answer
Answer: b
Explanation: Distributed configuration has many systems connected, and messages,
programs, etc are transmitted between cooperating computer systems.

2. Partial mesh is a highly flexible topology that can take a variety of very different
configurations.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Partial mesh is a highly flexible topology that can take a
variety of very different configurations. The routers are tightly coupled than the basic
topologies. But they are not fully interconnected, as would be the case in a fully meshed
network.

3. Components used for interconnecting dissimilar networks that use different


communication protocols.
a) Switches
b) Gateways
c) Routers
d) Bridges
View Answer
Answer: b
Explanation: Gateways are used for this purpose. Gateways interconnect dissimilar
networks, protocol conversion is performed by them.
advertisement
4. A topology is a modified version of the basic star topology.
a) network
b) two-tiered
c) bus
d) ring
View Answer
Answer: b
Explanation: A two-tiered topology is a modified version of the basic star topology. Rather
than single concentrator routers, two or more routers are used.

5. WANs that need to interconnect a very large number of sites.


a) bus
b) two-tiered
c) three-tiered
d) ring
View Answer
Answer: c
Explanation: Wide Area Networks that need to interconnect a very large number of sites, or
are built using smaller routers that can support only a few serial connections, may find the
two-tiered architecture insufficiently scalable.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. Components that operate at the network layer of the OSI model.


a) Switches
b) Servers
c) Routers
d) Gateways
View Answer
Answer: c
Explanation: They are referred to as the routers. They are used for interconnecting those
networks that use the same high-level protocols above network layer.

7. A topology that involves Tokens.


a) Star
b) Ring
c) Bus
d) Daisy Chaining
View Answer
Answer: b
Explanation: Ring topology involves sending and receiving of data with the help of tokens.
Ring started out as a simple peer-to-peer LAN topology.

8. ____________ operate at bottom two layers of the OSI model.


a) Bridges
b) Switches
c) Models
d) Modules
View Answer
Answer: a
Explanation: Bridges operate at the bottom two layers of the OSI model. It connects
networks that use the same communication protocols above data-link layer.

9. Connecting two or more networks to form a single network is called :


a) Internetworking
b) Intranetworking
c) Interconnecting
d) Intraconnectivity
View Answer
Answer: a
Explanation: Connecting two or more networks to form a single network is called
internetworking and the resultant network is called internetwork.

10. OSI stands for?


a) Open Site Interconnection
b) Open System Interdependence
c) Open System Interconnection
d) Open Site Interdependence
View Answer
Answer: c
Explanation: OSI is open system interconnection. It is a framework for defining standards
for linking heterogeneous computers in a packet switched network.

Computer Fundamentals Questions and


Answers – The History of Internet
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “The History of Internet”.

1. ARPANET stands for?


a) Advanced Research Project Agency Network
b) Advanced Research Programmed Auto Network
c) Advanced Research Project Automatic Network
d) Advanced Research Project Authorized Network
View Answer
Answer: a
Explanation: ARPANET stands for Advanced Research Project Agency Network. It was
developed in late 1960s under ARPA (Advanced Research Projects Agency).

2. Internet can help you find the shortest route.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Obviously, Internet is so widespread; it can help us in all
the possible ways. It can predict the weather, play music, etc.
3. In this technique, there is no direct contact between users and their programs during
execution.
a) Time Sharing
b) Batch Processing
c) System Processing
d) Message Passing
View Answer
Answer: b
Explanation: In the Batch Environment, there is no direct interaction between users and
their programs during execution.
advertisement
4. A technique that marked the beginning of computer communications.
a) Batch Environment
b) Message passing
c) User Environment
d) Time Sharing
View Answer
Answer: d
Explanation: The answer is time sharing. In time sharing, Users were able to interact with
the computer and could share its information processing resources.

5. A type of technique in which dumb terminals are connected to a central computer system.
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment
View Answer
Answer: a
Explanation: This happens in time sharing. In this, users were able to interact with the
computer and could share its information processing resources.

Note: Join free Sanfoundry classes at Telegram or Youtube

6. TCP stands for?


a) Transmission control program
b) Transmission control protocol
c) Transfer control program
d) Transfer control protocol
View Answer
Answer: b
Explanation: TCP stands for transmission control protocol. It basically allows different
networks to interconnect.

7. The “Victorian internet” is actually?


a) Telegraph
b) Batch Environment
c) Unit Environment
d) System Environment
View Answer
Answer: a
Explanation: It was a telegraph. Invented in the 1840s. Used extensively by the U.S.
Government.

8. Packet switching was invented in?


a) 1960s
b) 1980s
c) 2000s
d) 1990s
View Answer
Answer: a
Explanation: Packet switching was developed in 1964. In packet switching, the message is
broken into parts and then sent over independently.

9. The probability of failure-free operation of a software application in a specified


environment for a specified time.
a) Software Reliability
b) Software Quality
c) Software availability
d) Software Safety
View Answer
Answer: a
Explanation: The answer is software reliability. It is estimated using historical and
development data.

10. DARPA stands for?


a) Data Advanced Research Projects Agency
b) Defense Advanced Research Product Agency
c) Data based Advanced Research Product Agency
d) Defense Advanced Research Projects Agency
View Answer
Answer: d
Explanation: DARPA (Defense Advanced Research Projects Agency) contracted with BBN
(Bolt, Beranek & Newman) to create ARPAnet.

Computer Fundamentals Questions and


Answers – The Internet and its Services
This set of Advanced Computer Fundamentals Questions and Answers focuses on “The
Internet and its Services”.

1. A network that links many different types of computers all over the world.
a) Intranet
b) Internet
c) Arpanet
d) LAN
View Answer
Answer: b
Explanation: Internet is a network of computers that links many different types of computers.
It is a network of network sharing a common mechanism for addressing computers.

2. Internet was evolved from the basic ideas of ARPANET.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. ARPANET is the first WAN i.e., Wide Area network that
had only four sites in 1969 for interconnecting computers.

3. A service that allows a user to log in into another computer somewhere on the Internet.
a) Telnet
b) FTP
c) e-mail
d) UseNet
View Answer
Answer: a
Explanation: Telnet is the answer. It is a service that enables the user to log into another
computer somewhere on the Internet.
advertisement
4. An internet service that allows the user to move a file.
a) FTP
b) Telnet
c) UseNet
d) Time Sharing
View Answer
Answer: a
Explanation: The answer is FTP. FTP stands for File Transfer Protocol. It allows the user to
move a file from one computer to another on the internet.

5. Anonymous FTP files are called ___________ accessible files.


a) Privately
b) Publicly
c) Batch
d) User
View Answer
Answer: b
Explanation: Anonymous FTP files are called publicly accessible files because they can be
accessed by any user on the Internet.

Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate


Now!

6. TCP stands for?


a) Transmission control program
b) Transmission control protocol
c) Transfer control program
d) Transfer control protocol
View Answer
Answer: b
Explanation: TCP stands for transmission control protocol. It basically allows different
networks to interconnect.

7. Any system that uses the HTTP protocol is called _________


a) Web Browser
b) Web Server
c) WWW
d) TCP/IP
View Answer
Answer: b
Explanation: The system is the web server. HTTP stands for Hypertext transmission
protocol.

8. Any computer that can access the server is called?


a) Web Server
b) Web Browser
c) User
d) Web Client
View Answer
Answer: d
Explanation: Any computer that has access to the web server is called the web client. Web
server is any computer that uses the HTTP protocol.

9. Allows the user to create and maintain a personal list of favorite URL addresses.
a) Software
b) Web Servers
c) Web Browsers
d) WWW
View Answer
Answer: c
Explanation: Web Browsers help the user to maintain a personal favorite list of URLs. Also,
allows the user to download information on various formats.

10. URL stands for?


a) Uniform Resource Locator
b) Uniform Research Locator
c) Uniform Resource Link
d) Uniform Research Link
View Answer
Answer: a
Explanation: WWW specifies the URL of a website and allows the user to access
information. URL stands for Uniform Resource Locator.

Computer Fundamentals Questions and


Answers – WWW
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “WWW”.

1. The web works on this model.


a) Intranet
b) Internet
c) Client-Server
d) Server
View Answer
Answer: c
Explanation: Web works on the client server model. Client and server operate on machines
which are able to communicate through a network.

2. In the Client-server model, the client receives a request from the server.
a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. The server receives a request from the client. It then
performs the requested work.

3. Which of the following is not a type of server?


a) File
b) Web
c) Name
d) Browsers
View Answer
Answer: d
Explanation: Browser is the answer. Browser is a type of client and it is not a server. File,
web and name are the types of servers.
advertisement
4. This determines the type of protocol to be used.
a) <scheme>
b) <pathname>
c) <server name>
d) <server domain name>
View Answer
Answer: a
Explanation: The answer is <scheme>. In general, http is used. Others like file and ftp can
also be used.

5. The location of file is determined by ________


a) <scheme>
b) <pathname>
c) <server name>
d) <server domain name>
View Answer
Answer: b
Explanation: <pathname> tells the server where to find the file name. It is an important part
of the URL format.

Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate


Now!

6. Apache is a type of ________


a) Transmission control program
b) Web Server
c) Web Browser
d) DBMS
View Answer
Answer: b
Explanation: Apache is a type of web server. It is an application which waits for client
requests, fetches requested documents from disk and transmits them to the client.

7. A small data file in the browser.


a) Cookie
b) Web Server
c) FTP
d) Database
View Answer
Answer: a
Explanation: Cookie is a small data file in the browser. Most browsers nowadays allow the
user to decide if they want the cookies or not.

8. Any computer that can access the server is called?


a) Web Server
b) Web Browser
c) User
d) Web Client
View Answer
Answer: d
Explanation: Any computer that has access to the web server is called the web client. Web
server is any computer that uses the HTTP protocol.

9. Allows the user to create and maintain a personal list of favorite URL addresses.
a) Software
b) Web Servers
c) Web Browsers
d) WWW
View Answer
Answer: c
Explanation: Web Browsers help the user to maintain a personal favorite list of URLs. Also,
allows the user to download information on various formats.

10. SGML stands for?


a) Standard Granted Markup Language
b) System Generalized Markup Language
c) Standard Generalized Markup Language
d) System Granted Markup Language
View Answer
Answer: c
Explanation: HTML(Hypertext Markup language) is based on SGML. SGML stands for
Standard Generalized Markup Language.

Computer Fundamentals Questions and


Answers – FTP & HTTP
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “FTP & HTTP”.

1. A program that can retrieve files from the world wide web and render text, images or
sounds encoded in the files.
a) Browser
b) Internet
c) Server
d) Web Server
View Answer
Answer: a
Explanation: A browser or a web browser is a program that can retrieve files from the world
wide web. Certain examples are IE, Mozilla, etc.

2. An HTML file is a text file containing small markup tags.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. HTML stands for Hyper Text Markup Language. It is a
text file containing small markup tags.

3. Which of the following is not a type of browser?


a) Netscape
b) Web
c) IE
d) Mozilla
View Answer
Answer: b
Explanation: Others except web are web browsers. Web is a type of server. Application that
works on client requests.
advertisement
4. Both client and server release _________ connection after a page has been transferred.
a) IP
b) TCP
c) Hyperlink
d) Network
View Answer
Answer: b
Explanation: The answer is TCP. TCP stands for Transmission Control Protocol. Servers
receive requests from clients.

5. In HTML, the tags that tell the browser how to display the page.
a) markup
b) style
c) body
d) head
View Answer
Answer: a
Explanation: Markup is a general term used to refer the types of tags in HTML. The markup
tags tell the browser how to display the page.

Note: Join free Sanfoundry classes at Telegram or Youtube

6. FTP stands for?


a) File Text Protocol
b) File Transfer Protocol
c) Firm Transfer Protocol
d) File Transplant Protocol
View Answer
Answer: b
Explanation: FTP stands for File Transfer Protocol. It is a type of internet service use for the
transmission of files.

7. A section in HTML that contains generic information about the document.


a) body
b) title
c) head
d) style
View Answer
Answer: c
Explanation: The head segment contains a generic info about the document. The head
section must come before the body section in an HTML document.

8. A tag similar to that of the italic tag.


a) <strong>
b) <cite>
c) <code>
d) <i>
View Answer
Answer: b
Explanation: <cite> is a container tag in html that is citation generally in italics. Other tags
like <em>or emphasize is also used for this purpose.

9. A _________ partitions a web browser window so that multiple web documents can be
displayed simultaneously.
a) Frame
b) set
c) Frameset
d) div
View Answer
Answer: c
Explanation: A frameset partitions a web browser window so that multiple web documents
can be displayed simultaneously. Frameset can have attributes like cols.

10. The _________ attribute specifies the web page to be placed in the frame initially.
a) name
b) src
c) cols
d) rows
View Answer
Answer: b
Explanation: The src attribute or the source specifies the web page to be placed in the
frame initially. It may be subsequently overwritten.

Computer Fundamentals Questions and


Answers – Text Media
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Text Media”.

1. ______________the ability to access, analyzes, evaluate and produce media.


a) Literacy
b) Internet
c) Media
d) Media Literacy
View Answer
Answer: d
Explanation: It is media literacy. It is the ability to access, analyze, evaluate and produce
media. It is the process of becoming active, rather than passive, consumers of media.

2. Media literacy can help youth and adults understand how media shapes our culture.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Media literacy also develops our critical thinking. It also
helps in the better understanding of how media shapes our culture.

3. The analysis of _________ is a process of deconstruction that investigates the


operations of texts, their constructions, the ways they produce meanings, what those
meanings may be.
a) Media
b) Web
c) IE
d) Text
View Answer
Answer: d
Explanation: The analysis of texts is a process of deconstruction that investigates the
operations of texts, their constructions, the ways they produce meanings, what those
meanings may be. However, they also warn of the dangers of making assumptions about
the validity of any one analytic method.
advertisement
4. A type of analysis that attends to the repetition and frequency of features, their
proportions within the text, and consequent assumptions about significance.
a) Media
b) Content
c) Linguistic
d) Network
View Answer
Answer: b
Explanation: The answer is Content. Linguistic analysis might concentrate on the potential
effects of style of address. Content analysis attends to the repetition and frequency of
features, their proportions within the text, and consequent assumptions about significance.

5. __________ analysis regards texts as collections of signs or paradigms and possible


meanings, operating within the bounds of various codes.
a) Semiotic
b) Style
c) Linguistic
d) Text
View Answer
Answer: a
Explanation: Semiotic analysis regards texts as collections of signs or paradigms and
possible meanings, operating within the bounds of various codes.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. This part of image analysis refers to those primary signs, often part of the technique of
photography, which are about how the image is made.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: a
Explanation: Treatment in image analysis refers to those primary signs, often part of the
technique of photography, which is about how the image is made.

7. In image analysis, this part refers to objects represented within the image, which may
signify to us because of, for example, their symbolic power or because of their composition
in relation to each other.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: c
Explanation: Content refers to objects represented within the image. Treatment in image
analysis refers to those primary signs, often part of the technique of photography, which are
about how the image is made.

8. _________ are about storytelling and story meaning.


a) narratives
b) plot
c) content
d) storyline
View Answer
Answer: a
Explanation: Narratives are about storytelling and story meaning. Media texts tell stories;
they have a narrative.

9. __________ describes the effect of involving the reader with the story, of constructing it
as truth.
a) Narration
b) Identification
c) Plot
d) Characters
View Answer
Answer: b
Explanation: Identification describes the effect of involving the reader with the story, of
constructing it as truth. It produces a meaning of truth, a belief in the validity of the text and
of all the other meanings that we make from it.

10. The notion of norms also links to the idea that representations are given force through a
process of:
a) naturalization
b) identification
c) media
d) casting
View Answer
Answer: a
Explanation: The notion of norms also links to the idea that representations are given force
through a process of naturalization.

Computer Fundamentals Questions and


Answers – Graphics Media
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Graphics Media”.

1. The media texts may throw up discourses and are called ____________
a) Binary oppositions
b) Violations
c) Oppositions
d) Media Illiteracy
View Answer
Answer: a
Explanation: Some texts may also throw up discourses and their meanings if you attend to
what are called binary oppositions. The discourse is also marked by what it is not, by what it
is opposed to.

2. In terms of image analysis, it is important to attend to primary level signs in visual codes,
most obviously for examples of still photography.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. This approach categorizes the image analysis into
three: position, treatment and content.

3. The notion of __________ is one which is especially associated with semiotics and with
genres.
a) Media
b) Web
c) codes
d) Text
View Answer
Answer: c
Explanation: The notion of codes is one which is especially associated with semiotics and
with genres. The textual codes may be summarized into: written, spoken, non-verbal and
visual.
advertisement
4. The idea of _________is central to understanding the production of meaning through
texts.
a) Identity
b) Content
c) Represntation
d) Network
View Answer
Answer: c
Explanation: The idea of representation is central to understanding the production of
meaning through texts. Texts are nothing but representations in both a material and an
ideological sense.

5. ICT stands for?


a) Interaction, Communication and Technology
b) Information, Communication and Technology
c) Interaction, Communication and Text
d) Information, Communication and Text
View Answer
Answer: b
Explanation: ICT stands for Information, Communication and Technology. ICT is
responsible for providing access to information.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. A system of interlinked documents, websites, portals etc. accessed through the Internet.
a) WWW
b) Internet
c) Web
d) Media
View Answer
Answer: a
Explanation: World Wide Web a system of interlinked documents, websites, portals etc.
accessed through the Internet. Since these links are not physical or mechanical, they are
called `virtual’ links or `hyperlinks’.

7. In image analysis, this part refers to objects represented within the image, which may
signify to us because of, for example, their symbolic power or because of their composition
in relation to each other.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: c
Explanation: Content refers to objects represented within the image. Treatment in image
analysis refers to those primary signs, often part of the technique of photography, which are
about how the image is made.

8. A dedicated website for providing specialized information in a particular field.


a) Website
b) Blog
c) Web directories
d) Corporate Websites
View Answer
Answer: c
Explanation: Web directory is a dedicated website for providing specialized information in a
particular field. Such directories are useful for educational purpose.

9. _________ are the web-based interactive applications to express and share your ideas
and thoughts with interested people.
a) Website
b) Blog
c) Web directories
d) Corporate Websites
View Answer
Answer: b
Explanation: Blogs are the web-based interactive applications to express and share your
ideas and thoughts with interested people. It is an open platform that can be used as on-line
diaries, a journal, or editorial.

10. A term used in the context of web design to suggest the path that user takes while
browsing a website.
a) navigation
b) identification
c) graphics media
d) casting
View Answer
Answer: a
Explanation: Navigation is a term used in the context of web design to suggest the path that
user takes while browsing a website

Computer Fundamentals Questions and


Answers – Virtual Reality
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Virtual Reality”.

1. HMD stands for?


a) Head Mounted Display
b) Head Masked Display
c) Head Made Display
d) Head Mounted Detection
View Answer
Answer: a
Explanation: It stands for Head Mounted Display. A kind of stereo display with two miniature
screens and depth perception.

2. In terms of image analysis, it is important to attend to primary level signs in visual codes,
most obviously for examples of still photography.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. This approach categorizes the image analysis into
three: position, treatment and content.

3. ______________ keep track of position.


a) Motion analyzers
b) Motion Trackers
c) HMD
d) SMD
View Answer
Answer: b
Explanation: Motion trackers keep track of position. Other devices are like head trackers
and body trackers.
advertisement
4. BOOM stands for?
a) Binocular Omni-Orientation Manager
b) Binary Omni-Orientation Manager
c) Binocular Omni-Orientation Monitor
d) Binary Omni-Orientation Monitor
View Answer
Answer: c
Explanation: BOOM stands for Binocular Omni-Orientation Monitor. It is a type of
Stereoscopic display. Guidance of the box by the users.

5. A term for Illusion of immersion by projecting stereo images on the walls and floor of a
room.
a) CAVE
b) BOOM
c) GUI
d) HMD
View Answer
Answer: a
Explanation: CAVE is the term. CAVE stands for Cave Automatic Virtual Environment.

Note: Join free Sanfoundry classes at Telegram or Youtube

6. It is a mediated environment which creates the sensation in a user of being present in a


(physical) surrounding.
a) WWW
b) VR
c) HMD
d) GUI
View Answer
Answer: b
Explanation: VR or virtual reality is a mediated environment which creates the sensation in
a user of being present in a (physical) surrounding.

7. A term to describe the extent to which a user can modify form and content of a mediated
environment.
a) Vividness
b) Richness
c) Interactivity
d) Mapping
View Answer
Answer: c
Explanation: Interactivity is the extent to which a user can modify form and content of a
mediated environment. It comprises speed and mapping.

8. A type of VR environment in which subjects are visually isolated from the real
environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer
Answer: a
Explanation: In immersive VR, subjects are visually isolated from the real environment. A
virtual scene is responding to the subjects actions.

9. In this type of VR environment, the three-dimensional scene is considered as a part of


the physical environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer
Answer: c
Explanation: This happens in non-immersive Virtual environment. Also, the subjects do fully
respond in the real environment.

10. In this type of VR environment, the subjects can perform both in the real and virtual
environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer
Answer: b
Explanation: The Semi-Immersive Virtual Reality provides an experience partially based in a
virtual environment.

Computer Fundamentals Questions and


Answers – Animations
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Animations”.

1. ____________ is basically a form of pictorial presentation.


a) Photography
b) Animations
c) Drawing
d) Creativity
View Answer
Answer: b
Explanation: Animation is basically a form of pictorial presentation. It has become the most
prominent feature of technology-based learning environments.

2. Multiplane camera was introduced by Walt Disney.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Walt Disney along with his colleagues had a problem
with creating realistic animation and how to conserve time while creating it. Therefore, they
came up with a great solution which can be considered another innovation in the field of
animation called the multiplane camera.

3. It refers to simulated motion pictures showing movement of drawn objects.


a) Motion
b) Animation
c) VR
d) SMD
View Answer
Answer: b
Explanation: It refers to simulated motion pictures showing movement of drawn objects.
Animation is a form of pictorial presentation.
advertisement
4. A ____________(invented by Paul Roget in 1828) is a simple mechanical toy which
creates the illusion of movement.
a) Binocular
b) Zoetrope
c) Thaumatrope
d) BOOM
View Answer
Answer: c
Explanation: A thaumatrope (invented by Paul Roget in 1828) is a simple mechanical toy. It
creates the illusion of movement. Thaumatrope means “wonder turner”.

5. A device produces an illusion of movement from a rapid succession of static pictures.


a) Zoetrope
b) Thaumatrope
c) Phenakistoscope
d) HMD
View Answer
Answer: a
Explanation: In 1843, William Horner, a British mathematician invented the zoetrope. A
zoetrope produces an illusion of movement from a rapid succession of static pictures.

Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate


Now!

6. The ____________ is a piece of equipment designed to make cartoons more realistic


and enjoyable. It uses stacked panes of glass each with different elements of the animation.
a) Multiplane camera
b) VR
c) Thaumatrope
d) Phenakistoscope
View Answer
Answer: a
Explanation: The multiplane camera is a motion-picture camera that was used in the
traditional animation process that moves a number of pieces of artwork past the camera at
various speeds and at various distances from one another.

7. He made the first animated film in 1906.


a) Walt Disney
b) J. Stuart Blackton
c) William Horner
d) J.A. Ferdinand Plateau
View Answer
Answer: b
Explanation: J. Stuart Blackton made the first animated film in 1906. Humorous Phases of
Funny Faces was the first animation film.

8. Name of the first animation film.


a) Humorous Phases of Funny Faces
b) Tom and Jerry
c) Mickey Mouse
d) How i learnt animations
View Answer
Answer: a
Explanation: Humorous Phases of Funny Faces was the first animation film made by J.
Stuart Blackton. He was using a blackboard as his workplace together with chalk and an
eraser as his main tools.

9. ___________ animation is used to animate things that are smaller than life size.
a) Immersive
b) Claymotion
c) Stop motion
d) Augmented
View Answer
Answer: c
Explanation: Stop motion animation is used to animate things that are smaller than life size.
Willis Harold O’Brian pioneered motion picture special effects, which were perfected in stop
motion.

10. The father of animation?


a) Walt Disney
b) J. Stuart Blackton
c) William Horner
d) J.A. Ferdinand Plateau
View Answer
Answer: b
Explanation: J. Stuart Blackton made the first animated film in 1906. The film was entitled
Humorous Phases of Funny Faces, and with this, he became known as the father of
animation.

Computer Fundamentals Questions and


Answers – Generations of Computers
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Generations of Computers”.

1. A term in computer terminology is a change in technology a computer is/was being used.


a) development
b) generation
c) advancement
d) growth
View Answer
Answer: b
Explanation: Generation in computer terminology is a change in technology a computer
is/was being used. The term is used to distinguish between various hardware technologies.

2. The fourth generation was based on integrated circuits.


a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. The third generation was based on integrated circuits.

3. The generation based on VLSI microprocessor.


a) 1st
b) 2nd
c) 3rd
d) 4th
View Answer
Answer: d
Explanation: The 4th gen was VLSI microprocessor based. The period of fourth generation:
1972-1990.
advertisement
4. ______ generation of computer started with using vacuum tubes as the basic
components.
a) 1st
b) 2nd
c) 3rd
d) 4th
View Answer
Answer: a
Explanation: First generation of computer started with using vacuum tubes as the basic
components for memory and circuitry for CPU(Central Processing Unit).

5. Batch processing was mainly used in this generation.


a) 1st
b) 2nd
c) 3rd
d) 4th
View Answer
Answer: a
Explanation: Batch processing was mainly used in the 1st generation. In this generation
Punched cards, Paper tape, Magnetic tape Input & Output device were used.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. ___________ is an emerging branch in computer science, which interprets means and


method of making computers think like human beings.
a) Block chain
b) VR
c) AI
d) Cloud computing
View Answer
Answer: c
Explanation: AI is an emerging branch in computer science, which interprets means and
method of making computers think like human beings.

7. ULSI stands for?


a) Ultra Large Scale Integration
b) Under Lower Scale Integration
c) Ultra Lower Scale Integration
d) Under Large Scale Integration
View Answer
Answer: a
Explanation: It stands for Ultra Large Scale Integration. It is a part of the fifth generation
computers.

8. In this generation Time sharing, Real time, Networks, Distributed Operating System was
used.
a) 1st
b) 2nd
c) 5th
d) 4th
View Answer
Answer: d
Explanation: The fourth generation of computers is marked by the use of Very Large Scale
Integrated (VLSI) circuits. In this generation Time sharing, Real time, Networks, Distributed
Operating System was used.

9. HLL stands for?


a) High Level Language
b) High Layman’s Language
c) High Level Lesson
d) High Layman’s Lesson
View Answer
Answer: a
Explanation: High Level Language(HLL) has languages like FORTRAN, COBOL. HLL isn’t
in machine language. It is converted to machine language for further processing.
10. The period of ________ generation was 1952-1964.
a) 1st
b) 2nd
c) 5th
d) 4th
View Answer
Answer: b
Explanation: The period of the 2nd generation is 1952-1964. The period of the first
generation was 1942-1954.

Computer Fundamentals Questions and


Answers – Parallel Processing Systems
This set of Computer Fundamentals Problems focuses on “Parallel Processing Systems”.

1. Execution of several activities at the same time.


a) processing
b) parallel processing
c) serial processing
d) multitasking
View Answer
Answer: b
Explanation: Execution of several activities at the same time is referred to as parallel
processing. Like, Two multiplications at the same time on 2 different processes.

2. Parallel processing has single execution flow.


a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. Sequential programming specifically has single
execution flow.

3. A term for simultaneous access to a resource, physical or logical.


a) Multiprogramming
b) Multitasking
c) Threads
d) Concurrency
View Answer
Answer: d
Explanation: Concurrency is the term used for the same. When several things are accessed
simultaneously, the job is said to be concurrent.
advertisement
4. ______________ leads to concurrency.
a) Serialization
b) Parallelism
c) Serial processing
d) Distribution
View Answer
Answer: b
Explanation: Parallelism leads naturally to Concurrency. For example, Several processes
trying to print a file on a single printer.

Computer Fundamentals Questions and


Answers – Client-Server Computing
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Client-Server Computing”.

1. RMI stands for?


a) Remote Mail Invocation
b) Remote Message Invocation
c) Remaining Method Invocation
d) Remote Method Invocation
View Answer
Answer: d
Explanation: The RMI (Remote Method Invocation) is an API that provides a mechanism to
create distributed applications.

2. A remote object is an object whose method can be invoked from another virtual
environment.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. JVM is java virtual environment. RMI uses stub and
skeleton object for communication with the remote object. A remote object is an object
whose method can be invoked from another virtual environment.

3. A typical _________ program creates some remote objects, makes references to these
objects accessible, and waits for clients to invoke methods on these objects.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer
Answer: a
Explanation: A server program creates remote objects. It gives reference to these objects
and then waits for clients to invoke methods on these objects.
advertisement
4. A typical __________ program obtains a remote reference to one or more remote objects
on a server and then invokes methods on them.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer
Answer: b
Explanation: A client program obtains a remote reference to one or more remote objects on
a server. It then invokes methods on them.

5. The ___________ layer, which provides the interface that client and server application
objects use to interact with each other.
a) Increasing
b) Count
c) Bit
d) Stub/skeleton
View Answer
Answer: d
Explanation: The stub or skeleton layer provides the interface that client and server
application objects use for interaction with each other.

Note: Join free Sanfoundry classes at Telegram or Youtube

6. A layer which is the binary data protocol layer.


a) stub layer
b) skeleton layer
c) remote layer
d) transport protocol
View Answer
Answer: d
Explanation: The transport protocol layer is the binary data protocol that sends remote
object requests over the wire. A client is any remote application that communicates with
these server objects.

7. A middleware layer between the stub skeleton and transport.


a) remote layer
b) instruction layer
c) reference layer
d) remote reference layer
View Answer
Answer: d
Explanation: The remote reference layer is the middleware between the stub/skeleton layer
and underlying transport protocol.

8. An object acting as a gateway for the client side.


a) skeleton
b) stub
c) remote
d) server
View Answer
Answer: b
Explanation: The stub is an object that acts as a gateway for the client side. The outgoing
requests are passed through the stub.
9. A gateway for the server side object.
a) skeleton
b) stub
c) remote
d) server
View Answer
Answer: a
Explanation: The skeleton is an object, acts as a gateway for the server side object. All the
incoming requests are routed through it.

10. RMI uses stub and skeleton for communication with the ________ object.
a) client
b) remote
c) server
d) any
View Answer
Answer: b
Explanation: RMI uses stub and skeleton object for communication with the remote object.
A remote object is an object whose method can be invoked from another JVM.

5. A parallelism based on increasing processor word size.


a) Increasing
b) Count based
c) Bit based
d) Bit level
View Answer
Answer: d
Explanation: Bit level parallelism is based on increasing processor word size. It focuses on
hardware capabilities for structuring.

Note: Join free Sanfoundry classes at Telegram or Youtube

6. A type of parallelism that uses micro architectural techniques.


a) instructional
b) bit level
c) bit based
d) increasing
View Answer
Answer: a
Explanation: Instructional level uses micro architectural techniques. It focuses on program
instructions for structuring.

7. MIPS stands for?


a) Mandatory Instructions/sec
b) Millions of Instructions/sec
c) Most of Instructions/sec
d) Many Instructions / sec
View Answer
Answer: b
Explanation: MIPS stands for Millions of Instructions/sec. MIPS is a way to measure the
cost of computing.

8. The measure of the “effort” needed to maintain efficiency while adding processors.
a) Maintainablity
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer
Answer: c
Explanation: The measure of the “effort” needed to maintain efficiency while adding
processors is called as scalabilty.

9. The rate at which the problem size need to be increased to maintain efficiency.
a) Isoeffciency
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer
Answer: a

Explanation: Isoefficiency is the rate at which the problem size need to be increased to
maintain efficiency.

10. Several instructions execution simultaneously in ________________


a) processing
b) parallel processing
c) serial processing
d) multitasking
View Answer
Answer: b
Explanation: In parallel processing, the several instructions are executed simultaneously.

Computer Fundamentals Questions and


Answers – Cloud Computing
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Cloud Computing”.

1. ________________ is a paradigm of distributed computing to provide the customers on-


demand, utility based computing service.
a) Remote Sensing
b) Remote Invocation
c) Cloud Computing
d) Private Computing
View Answer
Answer: c
Explanation: Cloud computing is a paradigm of distributed computing to provide the
customers with on-demand, utility based computing services. Cloud users can provide more
reliable, available and updated services to their clients in turn.

2. Cloud providers provide cloud services to the cloud users.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. There are three types of users often called as cloud
stakeholders.

3. Which of the following is not a cloud stakeholder?


a) Cloud providers
b) Clients
c) End users
d) Cloud users
View Answer
Answer: b
Explanation: There are three types of stakeholders cloud providers, cloud users and the end
users.
advertisement
4. These cloud services are of the form of utility computing i.e. the _________ uses these
services pay-as-you-go model.
a) Cloud providers
b) Clients
c) End users
d) Cloud users
View Answer
Answer: d
Explanation: The cloud users use these services pay-as-you-go model. The cloud users
develop their product using these services and deliver the product to the end users.

5. Which of the following is not a type of cloud?


a) Private
b) Public
c) Protected
d) Hybrid
View Answer
Answer: c
Explanation: There is no protected cloud. There are three types of cloud-private, public and
hybrid.

Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate


Now!

6. In this type of cloud, an organization rents cloud services from cloud providers on-
demand basis.
a) Private
b) Public
c) Protected
d) Hybrid
View Answer
Answer: b
Explanation: This happens in public cloud. Services are provided to the users using utility
computing model.

7. In this type of cloud, the cloud is composed of multiple internal or external cloud.
a) Private
b) Public
c) Protected
d) Hybrid
View Answer
Answer: d
Explanation: The hybrid cloud is composed of multiple internal or external clouds. This is
the scenario when an organization moves to public cloud computing domain from its internal
private cloud.

8. _____________ enables the migration of the virtual image from one physical machine to
another.
a) visualization
b) virtualization
c) migration
d) virtual transfer
View Answer
Answer: b
Explanation: Virtualization enables the migration of the virtual image from one physical
machine to another. This feature is useful for cloud as by data locality lots of optimization is
possible.

9. Most of the cloud architectures are built on this type of architecture.


a) skeleton
b) grid
c) linear
d) template
View Answer
Answer: b
Explanation: Most of the cloud architectures are built on Grid architecture. Grid is a type of
distributed computing architecture where organizations owning data centers collaborate with
each other to have common benefits.

10. Saas stands for?


a) Software as a service
b) System Software and services
c) Software as a system
d) System as a service
View Answer
Answer: a
Explanation: SAAS is Software as a service. It delivers a single application through the web
browser to thousands of customers using a multitenant architecture

Computer Fundamentals Questions and


Answers – Types of Computers
This set of Basic Computer Fundamentals Questions and Answers focuses on “Types of
Computers”.

1. Which of the following is not a type of computer on the basis of operation?


a) Remote
b) Hybrid
c) Analog
d) Digital
View Answer
Answer: a
Explanation: There are three types of computers basically on the basis of operation:
Analog, Digital and Hybrid.

2. Remote computers work on continuous range of values.


a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. Analog Computer is a computing device that works on
continuous range of values. The results that are given by the analog computers will mostly
be approximate since they deal with quantities that keep on varying.
3. A computer that operates on digital data.
a) remote
b) hybrid
c) analog
d) digital
View Answer
Answer: d
Explanation: The digital computer uses binary number system in which there are only two
digits 0 and 1. Each one is called a bit.
advertisement
4. This type of computer is mostly used for automatic operations.
a) remote
b) hybrid
c) analog
d) digital
View Answer
Answer: b
Explanation: Hybrid computer is mostly used with automatic operations of complicated
physical processes and the machines.

5. ______________ are used for solving complex application such as Global Weather
Forecasting.
a) Super Computers
b) Public computers
c) Mobile computers
d) Hybrid computers
View Answer
Answer: a
Explanation: Super computers are used with complex applications like Global Weather
Forecasting, Creating graphic images, engineering design and testing, space exploration,
etc.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. The invention of _______________ gave birth to the much cheaper micro computers.
a) Mainframes
b) Microcomputers
c) Microprocessors
d) PDAs
View Answer
Answer: c
Explanation: The invention of microprocessor (also called as single chip CPU) gave birth to
the much cheaper microcomputers.

7. They can operate on batteries and hence are very popular with travelers.
a) Mainframes
b) Laptops
c) Microprocessors
d) Hybrid
View Answer
Answer: b
Explanation: Laptops can operate on batteries and hence are very popular with travelers.
The screen folds down onto the keyboard when not in use.

8. PDA stands for?


a) personal digital applications
b) private digital applications
c) personal digital assistants
d) private digital assistants
View Answer
Answer: c
Explanation: PDAs are also called as Handheld. They are small and can be carried
anywhere.

9. PDAs are also called?


a) PCs
b) Laptops
c) Tablets
d) Handheld
View Answer
Answer: d
Explanation: PDAs are also called as Personal Digital Assistants. They are small and can
be carried anywhere.

10. ______computers are lower to mainframe computers in terms of speed and storage
capacity.
a) Mini
b) Super
c) Mainframes
d) Hybrid
View Answer
Answer: a
Explanation: The answer is a. Mini computers are compared to mainframe computers in
terms of:
1. speed and, 2. storage capacity.

Computer Fundamentals Questions and


Answers – Internet of Things
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Internet of Things”.

1. A network of physical objects or things embedded with electronics or softwares.


a) AI
b) ML
c) IOT
d) Internet
View Answer
Answer: c
Explanation: IoT is a network of physical objects or things embedded with electronics or
softwares. Iot allows objects to be controlled remotely across existing network.

2. RFID is a part of IoT.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. RFID is Radio frequency identification. Radio frequency
identification is a part of IoT.

3. RFID stands for?


a) Random frequency identification
b) Radio frequency identification
c) Random frequency information
d) Radio frequency information
View Answer
Answer: b
Explanation: Earlier, RFID or Radio frequency identification was a prerequisite for Internet
of Things.
advertisement
4. Which of the following is not involved in working of IoT?
a) RFID
b) Sensor
c) Nano tech
d) Server
View Answer
Answer: d
Explanation: IoT works from RFID to Sensor, to Smart tech and then to Nano tech.

5. Making the smaller and smaller things have the ability to connect and interact.
a) Micro Tech
b) Smart tech
c) Nano tech
d) RFID
View Answer
Answer: c
Explanation: Nano Tech is the term used when smaller things are made to interact and
communicate. It is involved in the working of Iot also.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. Wi-Fi stands for?


a) Wireless fidelity
b) Wireless Flexibility
c) Wide Fidelity
d) WAN Flexibility
View Answer
Answer: a
Explanation: Wi-Fi stands for Wireless Fidelity. It is widely used in both outdoor and indoor
environments.

7. Diagnostics service for Cars.


a) MIPS
b) AutoBot
c) IoT Assistant
d) IoT
View Answer
Answer: b
Explanation: Autobot is a diagnostics service for cars. This service is integrated with several
web services.

8. The father of ioT.


a) Kevin Atrun
b) Kevin Atrhur
c) Kevin Ashton
d) Kevin Thomas
View Answer
Answer: c
Explanation: Kevin Ashton is the father of IoT. He believed IoT could turn the world into
data.

9. Collect->Communicate->__________->Act
a) Acknowledge
b) Analyze
c) Examine
d) Rectify
View Answer
Answer: b
Explanation: The correct option is analyze. This shows the lifecycle of IoT.
Collect->Communicate->Analyze->Act.

10. Several instructions execution simultaneously in?


a) processing
b) parallel processing
c) serial processing
d) multitasking
View Answer
Answer: b
Explanation: In parallel processing, the several instructions are executed simultaneously.
Parallel processing system provides the concurrent data processing to increase the
execution time.
Computer Fundamentals Questions and
Answers – Artificial Intelligence
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Artificial Intelligence”.

1. The technology that has the ability to interact with the world.
a) AI
b) ML
c) IOT
d) IT
View Answer
Answer: a
Explanation: AI which is artificial intelligence is the ability to interact with the world. It is the
ability to model the world and to learn and adapt.

2. The goal of AI is to build systems that exhibit intelligent behavior.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. There are 2 main goals in AI: to exhibit intelligent
behavior and understand intelligence in order to model it.

3. The first neural network computer.


a) RFD
b) SNARC
c) AM
d) AN
View Answer
Answer: b
Explanation: SNARC was the first neural network computer. it was built by Minsky and
Edmonds in 1956.
advertisement
4. A hardware based system that has autonomy, social ability and reactivity.
a) AI
b) Autonomous Agent
c) Agency
d) Behavior Engineering
View Answer
Answer: b
Explanation: The answer is Autonomous Agent. Autonomous agent has autonomy i.e.
ability to operate without the direct intervention of humans or others.

5. A particular system that contains intelligent agents.


a) AI systems
b) Agency
c) Autonomous systems
d) Company
View Answer
Answer: b
Explanation: It is called an agency. A particular system consisting of intelligent agents like
computers or robots that cooperate to find the solution to a problem.

Note: Join free Sanfoundry classes at Telegram or Youtube

6. A methodology used to develop behavior-based autonomous agents.


a) Descriptors
b) Behavior engineering
c) Behavior modeling
d) Auto engineering
View Answer
Answer: b
Explanation: The answer is behavior engineering. Autonomous agent implements
autonomy, social ability and reactivity.

7. An international research effort to promote autonomous robots.


a) Fresh Kitty
b) RoboCup
c) AICup
d) SPOT
View Answer
Answer: b
Explanation: RoboCup is designed to promote autonomous robots. It is based on multi
agent collaboration.

8. A type of non-monotonic reasoning.


a) Ordinary
b) Special
c) Duplicate
d) Default
View Answer
Answer: d
Explanation: Default reasoning is a type of non-monotonic reasoning. Default logic is a non-
monotonic logic proposed by Raymond Reiter to formalize reasoning with default
assumptions.

9. The performance of an agent can be improved based on this.


a) Observe
b) Learn
c) Improvise
d) Implement
View Answer
Answer: b
Explanation: An AI system is designed to learn and improve. The same is implemented on
its agents.
10. Face recognition system is based on _____________
a) applied AI
b) parallel AI
c) serial AI
d) strong AI
View Answer
Answer: a
Explanation: The answer is applied AI. It is based on applied artificial intelligence. It is an
approach to develop commercially smart systems.

Computer Fundamentals Questions and


Answers – Network Security
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Network Security”.

1. The field that covers a variety of computer networks, both public and private, that are
used in everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT
View Answer
Answer: c
Explanation: Network security covers a variety of computer networks, both private and
public. Everyday jobs like conducting transactions and communications among business
and government agencies etc.

2. Network Security provides authentication and access control for resources.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. AFS is an example. It helps us protect vital information.

3. Which is not an objective of network security?


a) Identification
b) Authentication
c) Access control
d) Lock
View Answer
Answer: d
Explanation: The Identification, Authentication and Access control are the objectives of
network security. There is no such thing called lock.
advertisement
4. Which of these is a part of network identification?
a) UserID
b) Password
c) OTP
d) fingerprint
View Answer
Answer: a
Explanation: The answer is UserID. UserID is a part of identification. UserID can be a
combination of username, user student number etc.

5. The process of verifying the identity of a user.


a) Authentication
b) Identification
c) Validation
d) Verification
View Answer
Answer: a
Explanation: It is called an authentication. It is typically based on passwords, smart card,
fingerprint, etc.

Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate


Now!

6. A concern of authentication that deals with user rights.


a) General access
b) Functional authentication
c) Functional authorization
d) Auto verification
View Answer
Answer: c
Explanation: Functional authorization is concerned with individual user rights. Authorization
is the function of specifying access rights to resources related to information security.

7. CHAP stands for?


a) Challenge Handshake authentication protocol
b) Challenge Hardware authentication protocol
c) Circuit Hardware authentication protocol
d) Circuit Handshake authentication protocol
View Answer
Answer: a
Explanation: CHAP stands for Challenge Handshake authentication protocol. Features of
CHAP: plaintext, memorized token. Protocol uses Telnet, HTTP.

8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control
View Answer
Answer: d
Explanation: Access control refers to the security features. Applications call access control
to provide resources.
9. An algorithm in encryption is called _____________
a) Algorithm
b) Procedure
c) Cipher
d) Module
View Answer
Answer: c
Explanation: An algorithm used in encryption is referred to as a cipher. cipher is an
algorithm for performing encryption or decryption

10. The information that gets transformed in encryption is ____________


a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
View Answer
Answer: a
Explanation: The text that gets transformed is called plain text. The algorithm used is called
cipher.

Computer Fundamentals Questions and


Answers – Network Security and Encryption
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Network Security and Encryption”.

1. WTLS stands for?


a) Wireless Transport Security Layer
b) Wireless Transfer System Layer
c) Wireless Transfer Security Layer
d) Wireless Transport System Layer
View Answer
Answer: a
Explanation: WTLS is Wireless Transport Security Layer. It provides security between the
mobile device and the WAP gateway to internet.

2. The protocol designed to make the security of wireless LAN as good as that of wired
LAN.
a) WTLS
b) WEP
c) RSN
d) WP
View Answer
Answer: b
Explanation: WEP stands for Wired Equivalent Privacy. WEP has been broken already in
2001. WEP protocol designed to make the security of wireless LAN as good as that of wired
LAN.
3. A person who enjoys learning details about computers and how to enhance their
capabilities.
a) Cracker
b) Hacker
c) App controller
d) Site controller
View Answer
Answer: b
Explanation: The person is called hacker. A person who enjoys learning the details of
computer systems and how to stretch their capabilities is called hacker.
advertisement
4. A program created by Farmer and Venema for auditing capability.
a) SAAS
b) SATAN
c) SAN
d) SAT
View Answer
Answer: b
Explanation: SATAN is the Security analysis tool for auditing networks. It is created by
farmer and venema.

5. A small program that changes the way a computer operates.


a) Worm
b) Trojan
c) Bomb
d) Virus
View Answer
Answer: d
Explanation: The program is called virus. It alters the way that the computer operates. It
often does damages like deleting and corrupting files and data.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. A program that copies itself.


a) Worm
b) Virus
c) Trojan
d) Bomb
View Answer
Answer: a
Explanation: A worm copies itself from one system to another over a network without the
assistance of human.

7. An attack in which the site is not capable of answering valid request.


a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer
Answer: b
Explanation: The answer is Denial of service. In case of denial of service attacks, a
computer site is bombarded with a lot of messages.

8. Creating a computer or paper audit that can help detect wrong doings.
a) Auditing
b) Validation
c) RSN
d) Verification
View Answer
Answer: a
Explanation: The answer is auditing. It is done to keep an eye on wrong doings. Auditing
can be used as a deterrent.

9. An indirect form of surveillance.


a) Honey pot
b) Logical
c) Security
d) Intrusion
View Answer
Answer: a
Explanation: Honey pot is an indirect form of surveillance. Network personnel create a trap,
watching for unscrupulous acts.

10. A malicious code hidden inside a seemingly harmless piece of code.


a) Worm
b) Bomb
c) Trojan Horse
d) Virus
View Answer
Answer: c
Explanation: The answer is Trojan horse. Trojan horse is a code that is present in a
program that appears harmless.

11. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing
View Answer
Answer: d
Explanation: The attack is a spoofing attack. It is when a user creates a packet that appears
to be something else or from someone else.

13. A technique in which a program attacks a network by exploiting IP broadcast addressing


operations.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer
Answer: a
Explanation: Smurfing is a technique in which a program attacks a network by exploiting IP
broadcast addressing operations.

14. An attack in which the user receives unwanted amount of e-mails.


a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer
Answer: c
Explanation: In the case of denial of e-mail bombing, a user sends an excessive
Computer
amount of unwanted e-mail to someone.
Fundamentals Questions and Answers –
Encryption and Viruses
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Encryption and Viruses”.

1. A cipher in which the order is not preserved.


a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Public key based
View Answer
Answer: b
Explanation: In transposition-based cipher, the order of the plain text is not preserved. They
can be very simple to identify.

2. Plain text is the data after encryption is performed.


a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. Cipher is the algorithm used in encryption. Ciphertext is
the data after encryption is performed.

3. A unique piece of information that is used in encryption.


a) Cipher
b) Plain Text
c) Key
d) Cipher
View Answer
Answer: c
Explanation: The key is the unique piece of information. It is used to create the cipher text
and decrypt it back.
advertisement
4. Study of creating a d using encryption and decryption techniques.
a) Cipher
b) Cryptography
c) Encryption
d) Decryption
View Answer
Answer: b
Explanation: It is called as cryptography. It is the study of creating and using the encryption
techniques.

5. The process of transforming plain text into unreadable text.


a) Decryption
b) Encryption
c) Network Security
d) Information Hiding
View Answer
Answer: b
Explanation: Encryption is the process of transforming readable text i.e. plain text to make it
unreadable to anyone except those possessing special knowledge, usually referred to as a
key.

Note: Join free Sanfoundry classes at Telegram or Youtube

6. An algorithm used in encryption is referred to as cipher.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Cipher is the algorithm used in encryption. Encryption is
making readable text as unreadable to keep it secured.

7. A process of making the encrypted text readable again.


a) Decryption
b) Encryption
c) Network Security
d) Information Hiding
View Answer
Answer: a
Explanation: The reverse process is called decryption. It is the process of making the
information readable again.

Computer Fundamentals Questions and


Answers – Cryptography
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Cryptography”.
1. These ciphers replace a character or characters with a different character or characters,
based on some key.
a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Mono alphabetic substitution based
View Answer
Answer: d
Explanation: In mono alphabetic substitution-based cipher, a character is replaced with
some other character or multiple characters, based on some key.

2. Encryption is the study of creating and using decryption techniques.


a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. Cryptography is the study of creating and using
encryption and decryption techniques.

3. A type of cipher that uses multiple alphabetic strings.


a) Substitution based
b) Transposition-based
c) Polyalphabetic substitution based
d) Mono alphabetic substitution based
View Answer
Answer: c
Explanation: These ciphers are similar to that of mono alphabetic ciphers. Multiple strings
are used to encode the plain text.
advertisement
4. An encryption technique with 2 keys is ______________
a) Monoalphabetic Cipher
b) Cryptography
c) Private key cryptography
d) Public key cryptography
View Answer
Answer: d
Explanation: It is called as public key cryptography. It has 2 keys: a private key and a public
key.

5. In public key cryptography, a key that decrypts the message.


a) public key
b) unique key
c) private key
d) security key
View Answer
Answer: c
Explanation: Public key cryptography has 2 keys. They are private key and a public key.
The public key encrypts the message. The private key decrypts the message.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. DES stands for?


a) Data Encryption Standard
b) Data Encryption Statistics
c) Data Encryption System
d) Data Encryption Sequence
View Answer
Answer: a
Explanation: DES stands for Data Encryption Standard. It was created in 1977 and went
into operation from 1990s.

7. Under DES, the data encryption standard took a 64-bit block of data and subjected it to
______ levels of encryption.
a) 64
b) 8
c) 16
d) 4
View Answer
Answer: c
Explanation: The answer is 16. It was subjected to 16 levels of encryption. DES is the data
encryption standard.

8. Triple-DES has ______ keys.


a) 1
b) 2
c) 5
d) 4
View Answer
Answer: b
Explanation: There are 2 keys in triple DES as well. The private and the public key. It can
also have 3 unique keys.

9. Encryption standard that is selected by the US government to replace DES.


a) AES
b) BES
c) CES
d) DES
View Answer
Answer: a
Explanation: AES is Advanced Encryption Standard. It was selected by the US government.
It is used to replace DES.

10. An electronic document that establishes your credentials when you are performing
transactions.
a) Digital code
b) OTP
c) E-mail
d) Digital certificate
View Answer
Answer: d
Explanation: Digital certificate is an electronic document that is responsible for secure
internet transactions.

Computer Fundamentals Questions and


Answers – Augmented Reality
This set of Computer Fundamentals MCQs focuses on “Augmented Reality”.

1. A field of technology that deals with a combination of real world and the data generated
from computer.
a) ML
b) AI
c) AR
d) IoT
View Answer
Answer: c
Explanation: AR that is Augmented Reality is a field of technology that deals with a
combination of real world and the data generated from computer.

2. AR is interactive in real-time.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Augmented Reality is the field of computer research that
deals with the combination of real-world and computer generated data.

3. Technologies that completely involve a user inside a synthetic environment.


a) AR
b) VR
c) AI
d) ML
View Answer
Answer: b
Explanation: The answer is VR or Virtual Reality. VR technologies are known for immersing
a user inside a synthetic environment. While immersed, the user cannot see the real world
around him.
advertisement
4. Technologies that allow the user to see the real world, with virtual objects composited in
the real world.
a) AR
b) VR
c) AI
d) SR
View Answer
Answer: a
Explanation: Augmented Reality (AR) allows a user to see real world, with virtual objects
superimposed or composited with the real world.

5. A ______________________ is a display device, worn on head as a part of helmet that


has a small display optic.
a) HD
b) MD
c) HMD
d) ARD
View Answer
Answer: c
Explanation: HMD is the head-mounted display, worn on head as a part of helmet that has a
small display optic. HTC Vive, Samsung GearVR are examples of HMDs available today.

Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate


Now!

6. Wearable computing device in the form of computerized eyeglasses.


a) HMD
b) Helmets
c) Smart Glasses
d) VR Glasses
View Answer
Answer: c
Explanation: Smart glasses are also called as optical head mounted displays. (OHMD), it
has the capability of reflecting projected images as well as allowing users to see through it.

7. A tracking based on geo-location information.


a) Location based
b) Markerless
c) Marker based
d) GPS
View Answer
Answer: a
Explanation: Location based tracking is based on geo-location information obtained from
device’s location sensors. (Longitude, latitude, altitude etc).

8. SLAM stands for?


a) Simultaneous localization and mapping
b) System localization and mapping
c) Simultaneous localization and maintenance
d) System localization and maintenance
View Answer
Answer: a
Explanation: SLAM is abbreviated for Simultaneous localization and mapping. It is a
technique used by robots and autonomous vehicles to build a map within the unknown
environment.
9. A technique that enables light field which is generally the product of a light source
scattered off objects.
a) AES
b) Holography
c) Cryptography
d) Gyrography
View Answer
Answer: b
Explanation: Holography enables a light field. It is to be recorded and later reconstructed
when the original light field is no longer present.

10. A _______ can be recorded using a normal light source.


a) Holograph
b) Photography
c) Holography
d) Photograph
View Answer
Answer: d
Explanation: A photograph can be captured using a normal light source. A laser is required
to record a hologram.

Computer Fundamentals Questions and


Answers – Waterfall Model
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Waterfall Model”.

1. A model that is the demo implementation of the system.


a) waterfall
b) prototype
c) incremental
d) agile
View Answer
Answer: b
Explanation: Prototype is the demo implementation so that the customer gets a brief idea of
his product. It is generally used when the customer requirements are not clear.

2. Maintenance is the final phase in waterfall model.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. This is the phase in which the completed software
product is handed over to the client.

3. A stage in which individual components are integrated and ensured that they are error-
free to meet customer requirements.
a) Coding
b) Testing
c) Design
d) Implementation
View Answer
Answer: b
Explanation: Hardware and software components are tested individually. Testing stage in
which individual components are integrated and ensured that they are error-free to meet
customer requirements.
advertisement
4. ___________ is a step in which design is translated into machine-readable form.
a) Design
b) Conversion
c) Debugging
d) Coding
View Answer
Answer: d
Explanation: Coding is the step in which design in translated into machine-readable form. If
design is efficient, coding can be done effectively.

5. The customer requirements are broken down into logical modules for ease of
_______________
a) inheritance
b) design
c) editing
d) implementation
View Answer
Answer: d
Explanation: The requirements are broken down for ease of implementation. Hardware and
software requirements are identified and designed accordingly.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. What do you call a technical person who is capable of understanding the basic
requirements?
a) team leader
b) analyst
c) engineer
d) stakeholder
View Answer
Answer: b
Explanation: The person is called an analyst. An analyst is a software engineering who is
responsible for requirements gathering.

7. A step in waterfall model that involves a meeting with the customer to understand the
requirements.
a) Requirement Gathering
b) SRS
c) Implementation
d) Customer review
View Answer
Answer: a
Explanation: A waterfall model involves requirement gathering as its first step. This is the
most important phase. It is important to understand the customer requirements.

8. Methodology in which project management processes were step-by step.


a) Incremental
b) Waterfall
c) Spiral
d) Prototyping
View Answer
Answer: b
Explanation: Waterfall model is based on step-by step completion of the project. Every step
is done individually.

9. An individual who plans and directs the work.


a) Stakeholder
b) Project manager
c) Team leader
d) Programmer
View Answer
Answer: b
Explanation: Project Manager is the one who plans and designs the project. Team leader is
the one who provides guidance, instruction, direction and leadership to a group of
individuals.

10. A planned program if work that requires a definitive amount of time, effort and planning
to complete.
a) Problem
b) Project
c) Process
d) Program
View Answer
Answer: b
Explanation: The answer is Project. A project is a program which is something which is
planned and needs effort and time to complete.

Computer Fundamentals Questions and


Answers – Software Testing
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Software Testing”.

1. A set of activities that ensure that software correctly implements a specific function.
a) verification
b) testing
c) implementation
d) validation
View Answer
Answer: a
Explanation: Verification ensures that software correctly implements a specific function. It is
a static practice of verifying documents.

2. Validation is computer based.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Validation is a computer based process. It uses
methods like black box testing, gray box testing, etc.

3. ___________ is done in the development phase by the debuggers.


a) Coding
b) Testing
c) Debugging
d) Implementation
View Answer
Answer: c
Explanation: Coding is done by the developers. In debugging, the developer fixes the bug in
the development phase. Testing is conducted by the testers.
advertisement
4. Locating or identifying the bugs is known as ___________
a) Design
b) Testing
c) Debugging
d) Coding
View Answer
Answer: b
Explanation: Testing is conducted by the testers. They locate or identify the bugs. In
debugging developer fixes the bug. Coding is done by the developers.

5. Which defines the role of software?


a) System design
b) Design
c) System engineering
d) Implementation
View Answer
Answer: c
Explanation: The answer is system engineering. System engineering defines the role of
software.

Subscribe Now: Computer Fundamental Newsletter | Important Subjects Newsletters

6. What do you call testing individual components?


a) system testing
b) unit testing
c) validation testing
d) black box testing
View Answer
Answer: b
Explanation: The testing strategy is called unit testing. It ensures a function properly works
as a unit.

7. A testing strategy that test the application as a whole.


a) Requirement Gathering
b) Verification testing
c) Validation testing
d) System testing
View Answer
Answer: d
Explanation: Validation testing tests the application as a whole against the user
requirements. In system testing, it tests the application in the context of an entire system.

8. A testing strategy that tests the application in the context of an entire system.
a) System
b) Validation
c) Unit
d) Gray box
View Answer
Answer: a
Explanation: In system testing, it tests the application in the context of an entire system. The
software and other system elements are tested as a whole.

9. A ________ is tested to ensure that information properly flows into and out of the system.
a) module interface
b) local data structure
c) boundary conditions
d) paths
View Answer
Answer: a
Explanation: A module interface is tested to ensure that information properly flows into and
out of the system.

10. A testing conducted at the developer’s site under validation testing.


a) alpha
b) gamma
c) lambda
d) unit
View Answer
Answer: a
Explanation: Alpha testing is conducted at developer’s site. It is conducted by customer in
developer’s presence before software delivery.

Computer Fundamentals Questions and


Answers – Concepts of OOP
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses
on “Concepts of OOP”.

1. A ______________ represents the need of information in the program without the


presenting the details.
a) abstraction
b) polymorphism
c) implementation
d) class
View Answer
Answer: a
Explanation: Abstraction is a concept that involves hiding the details and giving only the
necessary information to the user. It increases the power of a programming language.

2. Abstraction combines the data and functions into a single unit called a class.
a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. Data abstraction involves hiding the details and giving
only the necessary information to the user.

3. The process of forming a new class from an existing class.


a) Abstraction
b) Polymorphism
c) Inheritance
d) Implementation
View Answer
Answer: c
Explanation: The answer is inheritance. The base class is the parent class and the new
class is called the child class.
advertisement
4. This concept allows routines to use data again at different times.
a) Abstraction
b) Polymorphism
c) Inheritance
d) Implementation
View Answer
Answer: b
Explanation: Polymorphism is a concept in OOP wherein different functions can be used
again at different times.

5. The ability for programmers to use the same written and debugged existing class.
a) Reusability
b) Design
c) Debugging
d) Implementation
View Answer
Answer: a
Explanation: The programmer can add features to the existing class. The programmer on
further developing the application, and allowing users to achieve increased performance.

Note: Join free Sanfoundry classes at Telegram or Youtube

6. A concept that combines data and functions into a single unit called class.
a) inheritance
b) encapsulation
c) polymorphism
d) abstraction
View Answer
Answer: b
Explanation: Encapsulation enables the important concept of data hiding possible. It
combines data and functions into a single unit.

7. __________ represents a particular instance of a class.


a) module
b) block
c) object
d) token
View Answer
Answer: c
Explanation: An object is an instance of the class. The data members are accessed with the
help of objects.

8. A basic unit of object-oriented programming.


a) module
b) block
c) object
d) token
View Answer
Answer: c
Explanation: In OOP, the basic unit is an object. Objects are identified by its unique name.

9. A procedural programming follows ___________ approach.


a) top-down
b) bottom-up
c) left-right
d) right-left
View Answer
Answer: a
Explanation: A procedural programming follows top-down approach. The main focus is on
the functions. It has a lot of global variable.

10. A programming technique in which the focus is on doing things.


a) object oriented
b) procedural
c) logical
d) structural
View Answer
Answer: b
Explanation: In procedural programming, the focus is on doing things(functions). It follows
top-down approach.

You might also like