Hello Friends,this section is specifically dedicated to those users who wants to clear the fundamental of computer science. Here we have included Computer Basic Knowledge MCQs multiple choice questions with answers(MCQs). Students can expect some questions from this section for sure in the respective university exams,competitive exams and interviews.So practice it well and enjoy with good score you expect.
1. MSI stands for
- Medium Scale Integrated Circuits
- Medium System Integrated Circuits
- Medium Scale Intelligent Circuit
- Medium System Intelligent Circuit
MSI stands for Medium Scale Integrated Circuits. It refers to the level of integration or density of electronic circuits on a chip, where a chip contains between 30 and 300 electronic gates or circuits.
MSI components are commonly used in electronic devices and systems, such as computers, telecommunications equipment, and industrial control systems. Examples of MSI components include multiplexers, demultiplexers, counters, and decoders.
2. The capacity of 3.5 inch floppy disk is
- 1.40 MB
- 1.44 GB
- 1.40 GB
- 1.44 MB
The capacity of a standard 3.5-inch floppy disk is 1.44 megabytes (MB). These floppy disks were widely used in the 1990s and early 2000s to store and transfer data between computers. However, they have largely been replaced by more advanced and higher-capacity storage technologies such as USB flash drives, external hard drives, and cloud storage.
3. WAN stands for
- Wap Area Network
- Wide Area Network
- Wide Array Net
- Wireless Area Network
WAN stands for Wide Area Network. It is a type of computer network that covers a large geographic area, such as a city, country, or even multiple countries. WANs are used to connect smaller local area networks (LANs) and other networks together, enabling communication and data exchange between devices and users over long distances.
WANs are typically designed and operated by telecommunications companies or Internet Service Providers (ISPs). They use a variety of technologies, including fiber-optic cables, satellite links, and microwave transmissions, to connect devices and networks over long distances. The Internet itself can be considered a type of WAN, as it connects millions of devices and networks across the world.
4. MICR stands for
- Magnetic Ink Character Reader
- Magnetic Ink Code Reader
- Magnetic Ink Cases Reader
- Magnetic Ink Character Recognition
MICR stands for Magnetic Ink Character Recognition. It is a technology used in the banking industry to process and verify checks. MICR technology uses magnetic ink to print characters on the bottom of checks, including the account number, routing number, and check number.
When a check is deposited, it is scanned by a machine that uses MICR technology to read the magnetic characters and extract the necessary information. This information is then used to process the check, verify the account information, and transfer funds between accounts. MICR technology has improved the speed and accuracy of check processing, making it a critical component of modern banking operations.
5. EBCDIC stands for
- Extended Binary Coded Decimal Interchange Code
- Extended Bit Code Decimal Interchange Code
- Extended Bit Case Decimal Interchange Code
- Extended Binary Case Decimal Interchange Code
EBCDIC stands for Extended Binary Coded Decimal Interchange Code. It is a character encoding system that was developed by IBM in the 1960s and was widely used in mainframe computer systems.
EBCDIC uses 8 bits to represent each character, allowing for a total of 256 different characters. It includes a range of alphabetic, numeric, and special characters, and also includes support for various international and non-English languages.
While EBCDIC was once a commonly used encoding system, it has largely been replaced by more modern systems such as ASCII and Unicode. However, it is still used in some legacy systems and in certain industries, such as banking and finance.
6. Which of the following is a part of the Central Processing Unit?
- Printer
- Key board
- Mouse
- Arithmetic & Logic unit
The Central Processing Unit (CPU) is the primary component of a computer that performs most of the processing and calculations. It consists of three main parts:
- Control Unit (CU): This part of the CPU is responsible for managing the flow of data and instructions within the CPU and between the CPU and other parts of the computer.
- Arithmetic Logic Unit (ALU): The ALU performs arithmetic and logic operations, such as addition, subtraction, multiplication, and comparison.
- Registers: Registers are small, high-speed memory locations within the CPU that hold data and instructions during processing.
Therefore, the correct answer to your question is that all of the given options (Control Unit, Arithmetic Logic Unit, and Registers) are part of the Central Processing Unit.
7. CAD stands for
- Computer aided design
- Computer algorithm for design
- Computer application in design
- Computer analogue design
CAD stands for Computer-Aided Design. It is a technology that uses computer software to assist in the creation, modification, analysis, and optimization of designs and technical drawings. CAD software is commonly used in various industries, such as architecture, engineering, manufacturing, and construction, to design and develop products, buildings, and infrastructure.
With CAD software, designers and engineers can create accurate and detailed 2D and 3D models, simulate real-world conditions and test design performance, and make modifications and revisions easily and quickly. CAD technology has revolutionized the design and manufacturing process, making it more efficient, precise, and cost-effective.
8. Junk e-mail is also called
- spam
- spoof
- sniffer script
- spool
Junk e-mail is also called spam. Spam refers to unsolicited or unwanted messages, typically sent in bulk to a large number of recipients. These messages are often commercial in nature, promoting products or services, but can also include scams, phishing attempts, or other types of malicious content.
Spam is a common problem in email and other online communication channels, and can be a nuisance and a security risk for users. To combat spam, many email providers and internet service providers use filters and other technologies to block or identify spam messages and protect users' inboxes.
9. Hackers
- all have the same motive
- break into other people’s computers
- may legally break into computers as long as they do not do any damage
- are people who are allergic to computers
Hackers are individuals or groups of people who use their computer skills to gain unauthorized access to computer systems, networks, and data. Some hackers use their skills for malicious purposes, such as stealing sensitive information, causing damage to computer systems, or disrupting critical services. Other hackers use their skills for ethical or beneficial purposes, such as identifying vulnerabilities in computer systems and networks and helping organizations to improve their security.
There are different types of hackers, including:
- Black Hat Hackers: These hackers use their skills for malicious purposes, such as stealing data, causing damage, or committing fraud.
- White Hat Hackers: Also known as ethical hackers, these hackers use their skills for beneficial purposes, such as identifying vulnerabilities and improving security.
- Gray Hat Hackers: These hackers are somewhere in between black hat and white hat hackers. They may use their skills to identify vulnerabilities, but they may also exploit them for personal gain.
- Script Kiddies: These are novice hackers who use pre-written scripts and tools to launch attacks without really understanding how they work.
It's important to note that hacking without permission is illegal and can result in serious consequences, including fines and imprisonment.
10. What type of computers are client computers (most of the time) in a client-server system?
- Mainframe
- Mini-computer
- Microcomputer(PCs)
- PDA
Client computers in a client-server system are typically personal computers (PCs) or workstations. These computers are designed for individual use and are connected to a network to access resources and services provided by a server.
Client computers in a client-server system rely on the server to provide access to shared resources and services, such as files, databases, printers, and applications. The server handles requests from client computers and provides responses and resources as needed.
Client computers are usually equipped with software, such as web browsers, email clients, or custom applications, that allows users to access and interact with the resources and services provided by the server. They may also have additional software and hardware, such as security tools, peripherals, and specialized devices, depending on their intended use and the requirements of the system.