SlideShare a Scribd company logo
MCQ
:
Computer
Fundamentals
BHARAT BHUSHAN @ B. K. NAL
Assistant Professor (Computer Science)
Director, BSTI, Kokar
Buddha Science & Technical Institute
www.bharatsir.com
SUPRIYA BHARATI
Assistant Professor (Computer Science)
Asst. Director, BSTI, Kokar
By
&
Computer
Fundamentals
Kokar, Ranchi-834001, Jharkhand, India
MCQ SET-28
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
1. IBM 1401 is the first computer to enter in Nepal. It
belonged to
A. First Generation
B. Second Generation
C. Third Generation
D. Froth Generation
2. Programs are executed on the basis of a priority
number in a
A. Batch processing system
B. Multiprogramming
C. Time sharing
D. None of these
3. Which of the following is input device?
A. scanner
B. speaker
C. monitor
D. projector
4. Which of the following is correct acronym of VGA?
A. Video Graphics Array
B. Visual Graphics Array
C. Volatile Graphics Array
D. Video Graphics Adapter
5. Apple company used chips from ______ for its
computers.
A. Intel
B. Motorola
C. Both of above
D. None of above
6. Which of the following will happen when data is
entered into a memory location?
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
A. It will add to the content of the location
B. It will change the address of the memory
location
C. It will erase the previous content
D. It will not be fruitful if there is already some
data at the location
7. Which of the following is true?
A. Mark I was 8 feet long
B. Mark I was 2 feet long
C. Mark I was 40 feet long
D. None of above
8. Basic is _______language.
A. a procedural
B. an object oriented
C. both A and B
D. none of the above
9. What was the name of the first commercially
available microprocessor chip?
A. Intel 308
B. Intel 33
C. Intel 4004
D. Motorola 639
10. Which computers used operating systems by
Microsoft?
A. IBM PCs
B. Apple/Macintosh PCs
C. IBM Compatibles
D. Both A & C
11. Which of the following is a way to access
secondary memory?
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
A. Random access memory
B. Action method
C. Transfer method
D. Density method
12. A number system that has eight different symbols
to represent any quantity is known as
A. Binary
B. Octal
C. Decimal
D. Hexadecimal
13. Floppy disks are available in
A. Single side single density
B. Single side double density
C. Both of above
D. None of above
14. As compared to the secondary memory, the
primary memory of a computer is
A. Large
B. Cheap
C. Fast
D. Slow
15. Which of the following memories has the shortest
access times?
A. Cache memory
B. Magnetic bubble memory
C. Magnetic core memory
D. RAM
16. Circular division of disks to store and retrieve data
are known as
A. tracks
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
B. sectors
C. cycles
D. rings
17. A term used to describe interconnected computer
configuration is
A. Multiprogramming
B. Modulation
C. Multiprocessing
D. Micro program sequence
18. Which of the following is considered first
computer in the world?
A. Z3
B. ABC
C. Mark I
D. None of above
19. Which of the following is called low level
languages?
A. Machine language
B. Assembly language
C. Both of the above
D. None of above
20. In a punched card system, data is processed by a
A. Keypunch machine, sorter and posting
machine
B. Accounting machine, posting machine, and
billing machine
C. Sorter, posting machine, and billing machine
D. Accounting machine, keypunch machine and
sorter
21. Punched cards were first introduced by
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
A. Powers
B. Pascal
C. Jacquard
D. Herman Hollerith
22. Any method for controlling access to or use of
memory is known
A. Memory map
B. Memory protection
C. Memory management
D. Memory instruction
23. The process of starting a or restarting a computer
system by loading instructions from a secondary
storage device into the computer memory is called
A. Duping
B. Booting
C. Padding
D. CPS
24. Which is the type of memory for information that
does not change on your computer?
A. RAM
B. B. ROM
C. C. ERAM
D. D. RW / RAM
25. Which of the following registers is used to keep
track of address of the memory location where
the next instruction is located?
A. Memory address register
B. Memory data register
C. Instruction register
D. Program counter
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
ANSWER
1. B 11. A 21. D
2. B 12. B 22. B
3. A 13. C 23. B
4. A 14. C 24. B
5. B 15. A 25. D
6. D 16. A
7. A 17. A
8. C 18. C
9. D 19. C
10. A 20. D

More Related Content

PPTX
BSTI-BharatSir : Computer Fundamentals Set-12
PPTX
BSTI-BharatSir : Computer Fundamentals Set-29
PPTX
BSTI-BharatSir : Computer Fundamentals Set-27
PPTX
BSTI-BharatSir : Computer Fundamentals Set-1
PPTX
BSTI-BharatSir : Computer Fundamentals Set-16
PPTX
BSTI-BharatSir : Computer Fundamentals Set-13
PPTX
BSTI-BharatSir : Computer Fundamentals Set-26
PPTX
BSTI-BharatSir : Computer Fundamentals Set-30
BSTI-BharatSir : Computer Fundamentals Set-12
BSTI-BharatSir : Computer Fundamentals Set-29
BSTI-BharatSir : Computer Fundamentals Set-27
BSTI-BharatSir : Computer Fundamentals Set-1
BSTI-BharatSir : Computer Fundamentals Set-16
BSTI-BharatSir : Computer Fundamentals Set-13
BSTI-BharatSir : Computer Fundamentals Set-26
BSTI-BharatSir : Computer Fundamentals Set-30

Similar to BSTI-BharatSir : Computer Fundamentals Set-28 (20)

PPTX
BSTI-BharatSir : Computer Fundamentals Set-25
PPTX
BSTI-BharatSir : Computer Fundamentals Set-20
PPTX
BSTI-BharatSir : Computer Fundamentals Set-7
PPTX
BSTI-BharatSir : Computer Fundamentals Set-22
PPTX
BSTI-BharatSir : Computer Fundamentals Set-3
PPTX
BSTI-BharatSir : Computer Fundamentals Set-24
PPTX
BSTI-BharatSir : Computer Fundamentals Set-21
PPTX
BSTI-BharatSir : Computer Fundamentals Set-14
PPTX
BSTI-BharatSir : Computer Fundamentals Set-17
PPTX
BSTI-BharatSir : Computer Fundamentals Set-11
PPTX
BSTI-BharatSir : Computer Fundamentals Set-15
PPTX
BSTI-BharatSir : Computer Fundamentals Set-8
PPTX
BSTI-BharatSir : Computer Fundamentals Set-17
PPTX
BSTI-BharatSir : Computer Fundamentals Set-4
PPTX
BSTI-BharatSir : Computer Fundamentals Set-5
PPTX
BSTI-BharatSir : Computer Fundamentals Set-9
PPTX
BSTI-BharatSir : Computer Fundamentals Set-10
PPTX
BSTI-BharatSir : Computer Fundamentals Set-6
PPTX
BSTI-BharatSir : Computer Fundamentals Set-23
PPTX
BSTI-BharatSir : Computer Fundamentals Set-2
BSTI-BharatSir : Computer Fundamentals Set-25
BSTI-BharatSir : Computer Fundamentals Set-20
BSTI-BharatSir : Computer Fundamentals Set-7
BSTI-BharatSir : Computer Fundamentals Set-22
BSTI-BharatSir : Computer Fundamentals Set-3
BSTI-BharatSir : Computer Fundamentals Set-24
BSTI-BharatSir : Computer Fundamentals Set-21
BSTI-BharatSir : Computer Fundamentals Set-14
BSTI-BharatSir : Computer Fundamentals Set-17
BSTI-BharatSir : Computer Fundamentals Set-11
BSTI-BharatSir : Computer Fundamentals Set-15
BSTI-BharatSir : Computer Fundamentals Set-8
BSTI-BharatSir : Computer Fundamentals Set-17
BSTI-BharatSir : Computer Fundamentals Set-4
BSTI-BharatSir : Computer Fundamentals Set-5
BSTI-BharatSir : Computer Fundamentals Set-9
BSTI-BharatSir : Computer Fundamentals Set-10
BSTI-BharatSir : Computer Fundamentals Set-6
BSTI-BharatSir : Computer Fundamentals Set-23
BSTI-BharatSir : Computer Fundamentals Set-2
Ad

More from Bharat Bhushan (20)

PDF
NIMCET 2023 : Questions
PPTX
Heuristics Search Techniques in AI
PDF
Heuristics Search Techniques
PPTX
Hill Climbing Algorithm in Artificial Intelligence
PDF
Hill Climbing Algorithm in Artificial Intelligence
PPTX
Control Strategies in AI
PDF
Control Strategies in AI
PDF
Dynamic Programming
PPTX
Algorithm Design Technique
PDF
Production System in AI
PPTX
Production System in AI
PPTX
Problem Characteristics in Artificial Intelligence
PDF
Problem Characteristics in Artificial Intelligence
PDF
Introduction to Artificial Intteligence
PPTX
Introduction to Artificial Intteligence
PDF
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
PPTX
DESIGN AND ANALYSIS OF ALGORITHMS
PPTX
ARTIFICIAL INTELLIGENCE
PDF
ARTIFICIAL INTELLIGENCE SYLLABUS
PPTX
Cyber Security
NIMCET 2023 : Questions
Heuristics Search Techniques in AI
Heuristics Search Techniques
Hill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial Intelligence
Control Strategies in AI
Control Strategies in AI
Dynamic Programming
Algorithm Design Technique
Production System in AI
Production System in AI
Problem Characteristics in Artificial Intelligence
Problem Characteristics in Artificial Intelligence
Introduction to Artificial Intteligence
Introduction to Artificial Intteligence
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
DESIGN AND ANALYSIS OF ALGORITHMS
ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE SYLLABUS
Cyber Security
Ad

Recently uploaded (20)

PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Complications of Minimal Access-Surgery.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Share_Module_2_Power_conflict_and_negotiation.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Complications of Minimal Access-Surgery.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
Environmental Education MCQ BD2EE - Share Source.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
TNA_Presentation-1-Final(SAVE)) (1).pptx
Introduction to pro and eukaryotes and differences.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Unit 4 Computer Architecture Multicore Processor.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Cambridge-Practice-Tests-for-IELTS-12.docx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

BSTI-BharatSir : Computer Fundamentals Set-28

  • 1. MCQ : Computer Fundamentals BHARAT BHUSHAN @ B. K. NAL Assistant Professor (Computer Science) Director, BSTI, Kokar Buddha Science & Technical Institute www.bharatsir.com SUPRIYA BHARATI Assistant Professor (Computer Science) Asst. Director, BSTI, Kokar By & Computer Fundamentals Kokar, Ranchi-834001, Jharkhand, India MCQ SET-28
  • 2. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) 1. IBM 1401 is the first computer to enter in Nepal. It belonged to A. First Generation B. Second Generation C. Third Generation D. Froth Generation 2. Programs are executed on the basis of a priority number in a A. Batch processing system B. Multiprogramming C. Time sharing D. None of these 3. Which of the following is input device? A. scanner B. speaker C. monitor D. projector 4. Which of the following is correct acronym of VGA? A. Video Graphics Array B. Visual Graphics Array C. Volatile Graphics Array D. Video Graphics Adapter 5. Apple company used chips from ______ for its computers. A. Intel B. Motorola C. Both of above D. None of above 6. Which of the following will happen when data is entered into a memory location?
  • 3. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) A. It will add to the content of the location B. It will change the address of the memory location C. It will erase the previous content D. It will not be fruitful if there is already some data at the location 7. Which of the following is true? A. Mark I was 8 feet long B. Mark I was 2 feet long C. Mark I was 40 feet long D. None of above 8. Basic is _______language. A. a procedural B. an object oriented C. both A and B D. none of the above 9. What was the name of the first commercially available microprocessor chip? A. Intel 308 B. Intel 33 C. Intel 4004 D. Motorola 639 10. Which computers used operating systems by Microsoft? A. IBM PCs B. Apple/Macintosh PCs C. IBM Compatibles D. Both A & C 11. Which of the following is a way to access secondary memory?
  • 4. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) A. Random access memory B. Action method C. Transfer method D. Density method 12. A number system that has eight different symbols to represent any quantity is known as A. Binary B. Octal C. Decimal D. Hexadecimal 13. Floppy disks are available in A. Single side single density B. Single side double density C. Both of above D. None of above 14. As compared to the secondary memory, the primary memory of a computer is A. Large B. Cheap C. Fast D. Slow 15. Which of the following memories has the shortest access times? A. Cache memory B. Magnetic bubble memory C. Magnetic core memory D. RAM 16. Circular division of disks to store and retrieve data are known as A. tracks
  • 5. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) B. sectors C. cycles D. rings 17. A term used to describe interconnected computer configuration is A. Multiprogramming B. Modulation C. Multiprocessing D. Micro program sequence 18. Which of the following is considered first computer in the world? A. Z3 B. ABC C. Mark I D. None of above 19. Which of the following is called low level languages? A. Machine language B. Assembly language C. Both of the above D. None of above 20. In a punched card system, data is processed by a A. Keypunch machine, sorter and posting machine B. Accounting machine, posting machine, and billing machine C. Sorter, posting machine, and billing machine D. Accounting machine, keypunch machine and sorter 21. Punched cards were first introduced by
  • 6. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) A. Powers B. Pascal C. Jacquard D. Herman Hollerith 22. Any method for controlling access to or use of memory is known A. Memory map B. Memory protection C. Memory management D. Memory instruction 23. The process of starting a or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called A. Duping B. Booting C. Padding D. CPS 24. Which is the type of memory for information that does not change on your computer? A. RAM B. B. ROM C. C. ERAM D. D. RW / RAM 25. Which of the following registers is used to keep track of address of the memory location where the next instruction is located? A. Memory address register B. Memory data register C. Instruction register D. Program counter
  • 7. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) ANSWER 1. B 11. A 21. D 2. B 12. B 22. B 3. A 13. C 23. B 4. A 14. C 24. B 5. B 15. A 25. D 6. D 16. A 7. A 17. A 8. C 18. C 9. D 19. C 10. A 20. D