Computer Awareness MCQ – Part 06
Computer knowledge is a scoring section in most competitive exams like HPPSC, HP Patwari, State Cooperative Bank, High Court Clerk, IBPS, SSC, Railway, Banking, and other state-level government exams. It tests your understanding of basic computer operations, internet usage, software, hardware, shortcuts, and modern digital concepts.
This post presents the 06 part in our ongoing series of Computer Awareness Multiple Choice Questions (MCQs). These questions are specially curated based on frequently asked topics in previous year papers and cover essential concepts like binary systems, data storage units, operating systems, internet security, and software types. Each MCQ is accompanied by four options and a clickable button to instantly reveal the correct answer.
These practice questions are ideal for aspirants at all levels. Whether you’re starting out or preparing for the final round of exams, regular revision through these MCQs will improve accuracy, build confidence, and enhance speed in the actual test. Keep practicing and check out our other parts in the Computer Awareness series to stay ahead in your preparation. Bookmark this page for future reference and daily practice.
Whether you're a beginner or revising before the exam, this collection of questions will help you build a strong foundation in computer knowledge. Click on the “Show Answer” button after each question to test yourself instantly and identify areas where you need improvement. Stay tuned for more parts in this series and keep practicing regularly to stay ahead in your exam preparation.
If you're serious about cracking HP Govt exams, don’t miss this Computer Awareness MCQ series. Bookmark our blog WWW.HIMEXAM.NET for more such topic-wise practice sets covering General Awareness, Current Affairs, and Subject Knowledge.
Let’s begin your journey towards mastering computer knowledge with these important questions and answers!
Q01. One advantage of dial-up internet access is __________
(A) It utilizes broadband technology
(B) It uses a router for security
(C) It utilizes existing telephone service
(D) Modem speeds are very fast
Q02. When we run a program in HTML coding _____ is used as back end and ____ works as front end
(A) Notepad, Internet Explorer
(B) Notepad, Msn messenger
(C) MS-Word, Internet Explorer
(D) Both (1) and (2)
Q03. Computers process data into information by working exclusively with :
(A) Sound
(B) Electric charge
(C) Numbers
(D) Pictures
Q04. You must install a (n) ......... on a network if you want to share a broadband Internet connection
(A) Modem
(B) Router
(C) Server
(D) Printer
Q05. The purpose of the primary key in a database is to _______
(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations
Q06. The design of the network is called the network
(A) Architecture
(B) Server
(C) Transmission
(D) Type
Q07. The most frequently used instructions of a computer program are likely to be fetched from
(A) RAM
(B) ROM
(C) Hard Disk
(D) Cache Memory
Q08. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear
(B) The CD-ROM stops functioning
(C) The Web browser opens to an unusual home page
(D) Odd messages or images are displayed on the screen
Q09. The errors that can be pointed out by the compiler are
(A) Syntax error
(B) Symantec error
(C) Logical error
(D) Internal error
Q10. By default, your documents print in___________ mode
(A) Landscape
(B) Portrait
(C) Page setup
(D) Print preview
Q11. A Web site's main page is called its:
(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
Q12. The simultaneous processing of two or more programs by multiple processors is:
(A) Multi-programming
(B) Multi-tasking
(C) Time-sharing
(D) Multi-processing
Q13. Codes consisting of lines of varying widths or lengths that are computer readable are known as:
(A) An ASCII code
(B) A magnetic tape
(C) An OCR scanner
(D) A bar code
Q14. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to AutoFit Contents.
(A) Fit to Form
(B) Format
(C) Autosize
(D) AutoFit
Q15. Why is it un-ethical to share copyrighted files with your friends?
(A) It is not un-ethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
Q16. Re-usable optical storage will typically have the acronym:
(A) CD
(B) DVD
(C) ROM
(D) RW
Q17. The most common type of storage devices are:
(A) Persistent
(B) Optical
(C) Magnetic
(D) Flash
Q18. A device that connects to a network without the use of cables is said to be:
(A) Distributed
(B) Wireless
(C) Centralized
(D) Open source
Q19. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a:
(A) Hacker
(B) Analyst
(C) Instant messenger
(D) Programmer
Q20. To access properties of an object, the mouse technique to use is:
(A) Dragging
(B) Dropping
(C) Right clicking
(D) Shift clicking
0 Comments