Introduction
Mastering basic computer MCQs is essential for students and professionals preparing for competitive exams like SSC, Banking, UPSC, Railway, and other entrance tests. These multiple-choice questions cover fundamental topics such as computer hardware, software, networking, operating systems, and more, making them a valuable resource for enhancing general knowledge (GK) and technical aptitude. This comprehensive collection of 200+ basic computer MCQs with answers and one-liner explanations is designed to help you assess your understanding, identify knowledge gaps, and build a strong foundation in computer basics. Each question is sourced from authentic educational platforms to ensure accuracy and relevance, making this a good guide for exam success.
Basic Computer MCQs with Answers and Explanations (1-100)
- What is the full form of COMPUTER?
a) Common Operating Machine Purposely Used for Technical and Educational Research
b) Common Organized Machine for Processing and Utility Tasks
c) Central Operating Machine for Programming and Utility Research
d) None of the above
Answer: a
Explanation: COMPUTER stands for Common Operating Machine Purposely Used for Technical and Educational Research, reflecting its purpose in technical tasks. - Who is known as the father of computers?
a) Alan Turing
b) Charles Babbage
c) John Atanasoff
d) Bill Gates
Answer: b
Explanation: Charles Babbage designed the Analytical Engine, considered the first programmable computer. - What is the primary function of the CPU?
a) Store data
b) Process data
c) Display output
d) Input data
Answer: b
Explanation: The CPU (Central Processing Unit) processes instructions by performing fetch, decode, and execute operations. - Which of the following is an input device?
a) Monitor
b) Printer
c) Keyboard
d) Speaker
Answer: c
Explanation: A keyboard allows users to input data into a computer system. - What is the main memory of a computer called?
a) ROM
b) RAM
c) Cache
d) Hard Disk
Answer: b
Explanation: RAM (Random Access Memory) is the main memory used for temporary data storage during processing. - Which device is used to connect a computer to the internet?
a) Router
b) CPU
c) Monitor
d) Keyboard
Answer: a
Explanation: A router connects a computer network to the internet by directing data traffic. - What does GUI stand for?
a) General User Interface
b) Graphical User Interface
c) Global User Integration
d) Guided User Interface
Answer: b
Explanation: GUI allows users to interact with computers through graphical elements like icons and windows. - Which of the following is an operating system?
a) Microsoft Word
b) Linux
c) Adobe Photoshop
d) Google Chrome
Answer: b
Explanation: Linux is an operating system that manages hardware and software resources. - What is the full form of HTTP?
a) HyperText Transfer Protocol
b) HighText Transmission Protocol
c) HyperTerminal Transfer Process
d) None of the above
Answer: a
Explanation: HTTP is the protocol used for transferring data over the World Wide Web. - Which is the first electronic computer?
a) ENIAC
b) UNIVAC
c) Colossus
d) ABC
Answer: c
Explanation: Colossus, built during WWII, was the first electronic computer for code-breaking. - What is the function of an operating system?
a) Manage hardware and software resources
b) Create documents
c) Design graphics
d) Browse the internet
Answer: a
Explanation: An operating system coordinates between hardware and software for efficient functioning. - Which of the following is a secondary storage device?
a) RAM
b) Cache
c) Hard Disk
d) Register
Answer: c
Explanation: Hard disks store data permanently, unlike temporary memory like RAM. - What does LAN stand for?
a) Local Area Network
b) Large Area Network
c) Logical Access Network
d) None of the above
Answer: a
Explanation: LAN connects devices within a limited area, like an office or home. - Which language is used for web development?
a) Python
b) HTML
c) C++
d) Java
Answer: b
Explanation: HTML is the standard language for creating web pages. - What is the smallest unit of digital information?
a) Byte
b) Bit
c) Kilobyte
d) Megabyte
Answer: b
Explanation: A bit is the smallest unit, representing a 0 or 1 in digital data. - Which of the following is a volatile memory?
a) ROM
b) Hard Disk
c) RAM
d) Flash Drive
Answer: c
Explanation: RAM loses data when power is turned off, making it volatile. - What does BIOS stand for?
a) Basic Input/Output System
b) Binary Input/Output System
c) Basic Internal Operating System
d) None of the above
Answer: a
Explanation: BIOS initializes hardware during the boot process of a computer. - Which company developed the Windows operating system?
a) Apple
b) Microsoft
c) IBM
d) Google
Answer: b
Explanation: Microsoft developed Windows, a widely used operating system. - What is the purpose of a firewall?
a) Protect against viruses
b) Control network traffic
c) Store data
d) Increase internet speed
Answer: b
Explanation: A firewall monitors and controls incoming and outgoing network traffic for security. - Which of the following is a high-level programming language?
a) Assembly
b) Machine Language
c) Python
d) Binary Code
Answer: c
Explanation: Python is a high-level language, easy for humans to read and write.
- What is the full form of USB?
a) Universal Serial Bus
b) United System Bus
c) Universal Storage Buffer
d) Unified Serial Bus
Answer: a
Explanation: USB is a standard for connecting peripherals to computers. - Which device converts digital signals to analog signals?
a) Router
b) Modem
c) Switch
d) Hub
Answer: b
Explanation: A modem converts digital signals to analog for internet connectivity. - What is the purpose of cache memory?
a) Permanent storage
b) Speed up data access
c) Input data
d) Display output
Answer: b
Explanation: Cache memory stores frequently used data for faster CPU access. - Which of the following is an output device?
a) Scanner
b) Printer
c) Mouse
d) Keyboard
Answer: b
Explanation: A printer produces physical output from digital data. - What does URL stand for?
a) Uniform Resource Locator
b) Universal Reference Link
c) Unified Resource Location
d) None of the above
Answer: a
Explanation: A URL specifies the address of a resource on the internet. - Which generation of computers used vacuum tubes?
a) First
b) Second
c) Third
d) Fourth
Answer: a
Explanation: First-generation computers (1940s-1950s) used vacuum tubes for processing. - What is the full form of ROM?
a) Read-Only Memory
b) Random Output Memory
c) Read-Write Memory
d) None of the above
Answer: a
Explanation: ROM stores data permanently and is non-volatile. - Which protocol is used for email transmission?
a) FTP
b) SMTP
c) HTTP
d) DNS
Answer: b
Explanation: SMTP (Simple Mail Transfer Protocol) is used for sending emails. - What is the function of a compiler?
a) Execute programs
b) Convert high-level code to machine code
c) Debug programs
d) Store data
Answer: b
Explanation: A compiler translates high-level programming code into machine code. - Which of the following is a cloud storage service?
a) Microsoft Excel
b) Google Drive
c) Adobe Photoshop
d) Windows
Answer: b
Explanation: Google Drive provides online storage and file-sharing services.
- What is the purpose of an IP address?
a) Identify a device on a network
b) Store data
c) Run software
d) Display graphics
Answer: a
Explanation: An IP address uniquely identifies a device on a network. - Which of the following is a database management system?
a) Oracle
b) Windows
c) Linux
d) Photoshop
Answer: a
Explanation: Oracle is a popular relational database management system. - What does DNS stand for?
a) Domain Name System
b) Digital Network Service
c) Data Name System
d) None of the above
Answer: a
Explanation: DNS translates domain names to IP addresses for internet access. - Which key is used to refresh a webpage?
a) F1
b) F5
c) F12
d) Ctrl
Answer: b
Explanation: The F5 key reloads a webpage in most browsers. - What is the full form of PDF?
a) Portable Document Format
b) Public Data File
c) Personal Document Format
d) None of the above
Answer: a
Explanation: PDF is a file format for sharing documents across platforms.
Basic Computer MCQs (36-100) with Answers and Explanations
- What is a computer virus?
a) A hardware component
b) A malicious software program
c) A type of operating system
d) A network protocol
Answer: b
Explanation: A computer virus is malicious software that spreads and disrupts system operations. - Which programming language is known for its use in data analysis?
a) HTML
b) Python
c) Assembly
d) SQL
Answer: b
Explanation: Python is widely used for data analysis due to its simplicity and libraries like Pandas. - Which storage device uses flash memory?
a) Floppy Disk
b) Hard Disk Drive
c) USB Flash Drive
d) Magnetic Tape
Answer: c
Explanation: USB flash drives use flash memory for fast, portable data storage. - What is the purpose of a network topology?
a) To manage software updates
b) To define the layout of a network
c) To store data securely
d) To run applications
Answer: b
Explanation: Network topology describes the arrangement of devices in a network. - Which software type manages computer hardware?
a) Application Software
b) Utility Software
c) System Software
d) Development Software
Answer: c
Explanation: System software, like operating systems, manages hardware resources. - What does Trojan Horse refer to in computing?
a) A type of hardware
b) A malicious program disguised as legitimate software
c) A network protocol
d) A programming language
Answer: b
Explanation: A Trojan Horse tricks users into installing malware by appearing harmless. - Which of the following is a low-level programming language?
a) Python
b) Java
c) Assembly
d) C++
Answer: c
Explanation: Assembly language is closer to machine code, making it low-level. - Which storage device has the highest storage capacity?
a) CD-ROM
b) DVD
c) Hard Disk Drive
d) Floppy Disk
Answer: c
Explanation: Hard disk drives typically offer terabytes of storage, far exceeding others. - Which network topology connects all devices in a circular fashion?
a) Bus
b) Ring
c) Star
d) Mesh
Answer: b
Explanation: In a ring topology, each device connects to the next, forming a circle. - What is the role of utility software?
a) Perform specific user tasks
b) Maintain and optimize system performance
c) Develop applications
d) Manage network traffic
Answer: b
Explanation: Utility software helps maintain and optimize computer systems, e.g., antivirus programs. - What is ransomware?
a) A type of hardware failure
b) Malware that encrypts data and demands payment
c) A network configuration tool
d) A programming framework
Answer: b
Explanation: Ransomware locks data and demands a ransom for decryption. - What is a variable in programming?
a) A fixed value
b) A storage location with a name and value
c) A hardware component
d) A network address
Answer: b
Explanation: Variables store data that can change during program execution. - Which of the following is a non-volatile storage device?
a) RAM
b) Cache
c) SSD
d) Register
Answer: c
Explanation: SSDs retain data without power, making them non-volatile. - In which network topology does each device connect to every other device?
a) Star
b) Bus
c) Mesh
d) Ring
Answer: c
Explanation: Mesh topology provides direct connections between all devices. - Which type of software is Microsoft Excel?
a) System Software
b) Application Software
c) Utility Software
d) Firmware
Answer: b
Explanation: Microsoft Excel is application software for spreadsheet tasks. - What is the purpose of a worm in computing?
a) Enhance system performance
b) Replicate and spread across networks
c) Manage database queries
d) Create backups
Answer: b
Explanation: A worm is malware that self-replicates to infect other systems. - Which programming concept refers to reusable code blocks?
a) Loop
b) Function
c) Variable
d) Array
Answer: b
Explanation: Functions are reusable code blocks designed for specific tasks. - Which storage device is typically used for backups?
a) RAM
b) External Hard Drive
c) Cache
d) Register
Answer: b
Explanation: External hard drives are commonly used for data backups. - Which network topology uses a central hub or switch?
a) Ring
b) Bus
c) Star
d) Tree
Answer: c
Explanation: Star topology connects all devices to a central hub or switch. - What is firmware?
a) Software for user applications
b) Permanent software embedded in hardware
c) A type of virus
d) A network protocol
Answer: b
Explanation: Firmware is software embedded in hardware to control its functions. - What is spyware?
a) Software for system optimization
b) Malware that secretly collects user data
c) A type of database
d) A programming tool
Answer: b
Explanation: Spyware covertly monitors and collects user information. - What does the term ‘loop’ refer to in programming?
a) A data storage method
b) A structure for repeating code
c) A network configuration
d) A type of virus
Answer: b
Explanation: Loops repeat a block of code until a condition is met. - Which of the following is an optical storage device?
a) Hard Disk
b) SSD
c) DVD
d) USB Drive
Answer: c
Explanation: DVDs use optical technology to store data via laser reading. - Which topology is most fault-tolerant?
a) Bus
b) Ring
c) Mesh
d) Star
Answer: c
Explanation: Mesh topology’s multiple connections ensure fault tolerance. - What is the purpose of a debugger in programming?
a) Write code
b) Identify and fix errors in code
c) Compile code
d) Store data
Answer: b
Explanation: A debugger helps identify and resolve errors in a program. - What is adware?
a) Software for creating ads
b) Malware that displays unwanted advertisements
c) A type of database software
d) A network protocol
Answer: b
Explanation: Adware displays intrusive ads, often compromising user experience. - Which programming concept stores multiple values in a single structure?
a) Variable
b) Function
c) Array
d) Loop
Answer: c
Explanation: Arrays store multiple values under a single variable name. - Which storage device is slowest in data access?
a) SSD
b) Hard Disk Drive
c) Magnetic Tape
d) RAM
Answer: c
Explanation: Magnetic tape has slower access times, used for archival storage. - Which network topology shares a single communication line?
a) Star
b) Bus
c) Ring
d) Mesh
Answer: b
Explanation: Bus topology uses a single cable for all device communication. - What is open-source software?
a) Software with restricted access
b) Software with freely available source code
c) Paid software
d) Hardware control software
Answer: b
Explanation: Open-source software allows users to view and modify its source code. - What is the purpose of a keylogger?
a) Record keystrokes for malicious purposes
b) Optimize keyboard performance
c) Manage software licenses
d) Create backups
Answer: a
Explanation: Keyloggers secretly record keystrokes to steal sensitive information. - What does OOP stand for in programming?
a) Object-Oriented Programming
b) Operational Output Processing
c) Organized Object Protocol
d) None of the above
Answer: a
Explanation: OOP uses objects to structure code for modularity and reuse. - Which storage device is portable and uses optical technology?
a) USB Flash Drive
b) CD-ROM
c) Hard Disk
d) SSD
Answer: b
Explanation: CD-ROMs are portable optical storage devices. - Which network topology combines multiple topologies?
a) Star
b) Bus
c) Tree
d) Ring
Answer: c
Explanation: Tree topology integrates star and bus topologies hierarchically. - What is proprietary software?
a) Free software with open code
b) Software with restricted licensing
c) Software for hardware control
d) None of the above
Answer: b
Explanation: Proprietary software has restricted access and licensing. - What is phishing in cybersecurity?
a) A hardware attack
b) A social engineering attack to steal data
c) A type of virus
d) A network protocol
Answer: b
Explanation: Phishing tricks users into revealing sensitive information. - What is an algorithm in programming?
a) A hardware component
b) A set of instructions to solve a problem
c) A type of virus
d) A storage device
Answer: b
Explanation: An algorithm is a step-by-step procedure to solve a problem. - Which storage device is used in digital cameras?
a) Floppy Disk
b) SD Card
c) Hard Disk
d) Magnetic Tape
Answer: b
Explanation: SD cards are compact flash storage used in cameras. - Which topology is easiest to install?
a) Mesh
b) Star
c) Ring
d) Bus
Answer: b
Explanation: Star topology is simple to install with a central hub. - What is the role of a spreadsheet software?
a) Manage hardware
b) Organize and analyze data in tables
c) Create websites
d) Secure networks
Answer: b
Explanation: Spreadsheet software like Excel organizes data in tabular form. - What is a rootkit?
a) A type of utility software
b) Malware that hides within the system
c) A programming language
d) A network device
Answer: b
Explanation: Rootkits conceal malicious activities on a system. - What is conditional programming?
a) Code that repeats indefinitely
b) Code that executes based on conditions
c) Code for hardware control
d) Code for data storage
Answer: b
Explanation: Conditional programming uses if-then-else statements for decision-making. - Which storage device is obsolete today?
a) SSD
b) Floppy Disk
c) USB Drive
d) Hard Disk
Answer: b
Explanation: Floppy disks are outdated due to low capacity and slow speed. - Which topology is most cost-effective for small networks?
a) Mesh
b) Star
c) Bus
d) Ring
Answer: c
Explanation: Bus topology is cost-effective due to minimal cabling needs. - What is the purpose of database software?
a) Create graphics
b) Manage and organize data
c) Run operating systems
d) Browse the internet
Answer: b
Explanation: Database software organizes and retrieves data efficiently. - What is a firewall’s primary function?
a) Store data
b) Protect against unauthorized network access
c) Increase processing speed
d) Run applications
Answer: b
Explanation: Firewalls block unauthorized access to protect networks. - What is a data type in programming?
a) A hardware component
b) A classification of data like integer or string
c) A network protocol
d) A storage device
Answer: b
Explanation: Data types define the kind of data a variable can hold. - Which storage device is used for long-term archival?
a) RAM
b) Magnetic Tape
c) Cache
d) SSD
Answer: b
Explanation: Magnetic tape is cost-effective for long-term data archival. - Which topology requires the most cabling?
a) Star
b) Bus
c) Mesh
d) Ring
Answer: c
Explanation: Mesh topology requires extensive cabling for full connectivity. - What is shareware?
a) Free software with no restrictions
b) Software available for trial with payment required for full use
c) Hardware control software
d) A type of virus
Answer: b
Explanation: Shareware offers limited features for free, requiring payment for full access. - What is a DDoS attack?
a) A hardware failure
b) Overloading a server with traffic to disrupt service
c) A programming error
d) A storage issue
Answer: b
Explanation: DDoS (Distributed Denial of Service) attacks flood servers to disrupt access. - What is recursion in programming?
a) A loop that runs indefinitely
b) A function that calls itself
c) A data storage method
d) A network protocol
Answer: b
Explanation: Recursion involves a function calling itself to solve a problem. - Which storage device is fastest?
a) Hard Disk Drive
b) SSD
c) CD-ROM
d) Magnetic Tape
Answer: b
Explanation: SSDs offer faster data access than other storage devices. - Which topology is used in modern LANs?
a) Bus
b) Ring
c) Star
d) Mesh
Answer: c
Explanation: Star topology is widely used in LANs for its simplicity and reliability. - What is a word processor?
a) Software for creating and editing text documents
b) A hardware component
c) A network protocol
d) A type of virus
Answer: a
Explanation: Word processors like Microsoft Word are used for text document tasks. - What is a botnet?
a) A group of infected computers controlled remotely
b) A type of programming language
c) A storage device
d) A network topology
Answer: a
Explanation: Botnets are networks of compromised devices used for malicious activities. - What is a constant in programming?
a) A value that changes during execution
b) A fixed value that cannot change
c) A hardware component
d) A network address
Answer: b
Explanation: Constants hold fixed values throughout a program’s execution. - Which storage device is used in smartphones?
a) Floppy Disk
b) Flash Memory
c) Magnetic Tape
d) Hard Disk
Answer: b
Explanation: Flash memory is compact and used in smartphones for storage. - Which topology is prone to single-point failure?
a) Mesh
b) Star
c) Ring
d) Bus
Answer: b
Explanation: Star topology fails if the central hub malfunctions. - What is a compiler’s output?
a) Source code
b) Machine code
c) Database
d) Network signal
Answer: b
Explanation: A compiler converts source code into machine code for execution. - What is malware short for?
a) Malicious Software
b) Managed Software
c) Modular Software
d) None of the above
Answer: a
Explanation: Malware is software designed to harm or exploit systems. - What is a pointer in programming?
a) A variable that stores a memory address
b) A network device
c) A type of loop
d) A storage device
Answer: a
Explanation: Pointers store memory addresses to reference data. - Which storage device uses spinning platters?
a) SSD
b) Hard Disk Drive
c) USB Flash Drive
d) CD-ROM
Answer: b
Explanation: Hard disk drives use spinning platters for data storage. - Which topology supports easy device addition?
a) Bus
b) Ring
c) Star
d) Mesh
Answer: c
Explanation: Star topology allows easy addition of devices via the central hub. - What is the purpose of presentation software?
a) Manage databases
b) Create visual slideshows
c) Secure networks
d) Run operating systems
Answer: b
Explanation: Presentation software like PowerPoint creates visual slideshows.
- What is the function of an ALU in a CPU?
a) Store data
b) Perform arithmetic and logical operations
c) Manage memory
d) Control input devices
Answer: b
Explanation: The ALU (Arithmetic Logic Unit) handles mathematical and logical computations. - Which of the following is a type of network topology?
a) Star
b) Cloud
c) Server
d) Software
Answer: a
Explanation: Star topology connects all devices to a central hub. - What is the purpose of an antivirus program?
a) Increase internet speed
b) Protect against malware
c) Manage files
d) Create backups
Answer: b
Explanation: Antivirus software detects and removes malicious programs. - Which of the following is an example of application software?
a) Windows
b) Linux
c) Microsoft Word
d) BIOS
Answer: c
Explanation: Microsoft Word is used for specific tasks like document creation. - What does SSD stand for?
a) Solid State Drive
b) Serial Storage Device
c) System Software Disk
d) None of the above
Answer: a
Explanation: SSD is a fast, non-volatile storage device using flash memory.
Basic Computer MCQs (106-200) with Answers and Explanations
- What is a binary system in computing?
a) A system using base-10 numbers
b) A system using only 0s and 1s
c) A system for network protocols
d) A type of storage device
Answer: b
Explanation: The binary system uses 0s and 1s to represent data in computers. - What is the main function of the control unit in a CPU?
a) Perform calculations
b) Store data
c) Direct operations of the processor
d) Display output
Answer: c
Explanation: The control unit directs the CPU’s operations by managing data flow. - Which internet protocol is used for file transfer?
a) HTTP
b) FTP
c) SMTP
d) DNS
Answer: b
Explanation: FTP (File Transfer Protocol) is used for transferring files over a network. - How many bits are in a byte?
a) 4
b) 8
c) 16
d) 32
Answer: b
Explanation: A byte consists of 8 bits, used to represent a single character. - What is the role of registers in computer architecture?
a) Long-term storage
b) High-speed temporary storage
c) Network connectivity
d) Display graphics
Answer: b
Explanation: Registers are small, fast storage locations in the CPU for temporary data. - What does TCP stand for in networking?
a) Transmission Control Protocol
b) Terminal Control Protocol
c) Transfer Communication Protocol
d) None of the above
Answer: a
Explanation: TCP ensures reliable data transmission over networks. - What is ASCII used for in data representation?
a) Representing images
b) Representing text characters
c) Encrypting data
d) Compressing files
Answer: b
Explanation: ASCII assigns numeric values to text characters for computer use. - What is the purpose of a motherboard in computer architecture?
a) Store data permanently
b) Connect all computer components
c) Execute programs
d) Provide internet access
Answer: b
Explanation: The motherboard is the main circuit board connecting all components. - Which protocol resolves domain names to IP addresses?
a) HTTP
b) FTP
c) DNS
d) SMTP
Answer: c
Explanation: DNS (Domain Name System) translates domain names to IP addresses. - What is the decimal equivalent of the binary number 1010?
a) 8
b) 10
c) 12
d) 14
Answer: b
Explanation: Binary 1010 equals 10 in decimal (1×2³ + 0×2² + 1×2¹ + 0×2⁰). - What is a bus in computer architecture?
a) A storage device
b) A communication pathway for data
c) A programming language
d) A type of virus
Answer: b
Explanation: A bus transfers data between computer components. - Which internet protocol is used for secure data transfer?
a) HTTP
b) HTTPS
c) FTP
d) SMTP
Answer: b
Explanation: HTTPS uses encryption for secure data transfer over the web. - What is Unicode in data representation?
a) A compression algorithm
b) A standard for encoding text characters
c) A type of network protocol
d) A programming language
Answer: b
Explanation: Unicode supports a wide range of characters across languages. - What is the function of a GPU in computer architecture?
a) Manage memory
b) Process graphics and visual data
c) Connect to networks
d) Store files
Answer: b
Explanation: The GPU (Graphics Processing Unit) handles rendering of images and videos. - What does IP stand for in networking?
a) Internet Protocol
b) Internal Processor
c) Integrated Program
d) None of the above
Answer: a
Explanation: IP governs the addressing and routing of data packets. - What is the binary equivalent of the decimal number 7?
a) 111
b) 101
c) 110
d) 100
Answer: a
Explanation: Decimal 7 converts to binary 111 (1×2² + 1×2¹ + 1×2⁰). - What is the purpose of a data bus in computer architecture?
a) Transfer data between components
b) Store program instructions
c) Execute programs
d) Display output
Answer: a
Explanation: The data bus carries data between the CPU, memory, and other components. - Which protocol is used for remote access to a computer?
a) FTP
b) SSH
c) HTTP
d) SMTP
Answer: b
Explanation: SSH (Secure Shell) enables secure remote access to systems. - What is a bit in data representation?
a) A single binary digit
b) A group of 8 bytes
c) A network address
d) A programming command
Answer: a
Explanation: A bit is the smallest unit of digital information, either 0 or 1. - What is the role of a clock in computer architecture?
a) Store data
b) Synchronize operations
c) Connect to the internet
d) Display time
Answer: b
Explanation: The clock synchronizes CPU operations with a regular pulse. - What does UDP stand for in networking?
a) User Datagram Protocol
b) Universal Data Protocol
c) Unified Delivery Protocol
d) None of the above
Answer: a
Explanation: UDP is a fast but less reliable protocol for data transmission. - What is the hexadecimal equivalent of the binary number 1111?
a) A
b) B
c) F
d) E
Answer: c
Explanation: Binary 1111 equals 15 in decimal, which is F in hexadecimal. - What is cache memory in computer architecture?
a) Permanent storage
b) High-speed memory near the CPU
c) A network component
d) A type of software
Answer: b
Explanation: Cache memory speeds up data access for the CPU. - Which protocol is used for sending emails?
a) HTTP
b) FTP
c) SMTP
d) DNS
Answer: c
Explanation: SMTP (Simple Mail Transfer Protocol) handles email transmission. - What is a nibble in data representation?
a) 4 bits
b) 8 bits
c) 16 bits
d) 32 bits
Answer: a
Explanation: A nibble is a group of 4 bits, half of a byte. - What is the purpose of a memory controller in computer architecture?
a) Manage data storage and retrieval
b) Execute programs
c) Connect to networks
d) Display graphics
Answer: a
Explanation: The memory controller manages data flow between CPU and memory. - Which protocol is used for real-time communication, like video calls?
a) FTP
b) RTP
c) SMTP
d) HTTP
Answer: b
Explanation: RTP (Real-time Transport Protocol) supports real-time media streaming. - What is the decimal equivalent of the binary number 1100?
a) 10
b) 12
c) 14
d) 16
Answer: b
Explanation: Binary 1100 equals 12 in decimal (1×2³ + 1×2² + 0×2¹ + 0×2⁰). - What is a pipeline in computer architecture?
a) A storage device
b) A method to process multiple instructions simultaneously
c) A network protocol
d) A type of virus
Answer: b
Explanation: Pipelining allows parallel processing of CPU instructions. - What does DHCP stand for in networking?
a) Dynamic Host Configuration Protocol
b) Data Hosting Control Protocol
c) Direct Host Communication Protocol
d) None of the above
Answer: a
Explanation: DHCP assigns IP addresses dynamically to devices on a network. - What is the purpose of data encoding in computers?
a) Compress files
b) Represent data in a specific format
c) Secure networks
d) Run programs
Answer: b
Explanation: Data encoding formats data for storage or transmission. - What is the role of the arithmetic logic unit (ALU)?
a) Store data
b) Perform arithmetic and logical operations
c) Manage memory
d) Connect to the internet
Answer: b
Explanation: The ALU handles mathematical and logical computations in the CPU. - Which protocol is used for web browsing?
a) FTP
b) HTTP
c) SMTP
d) DNS
Answer: b
Explanation: HTTP (HyperText Transfer Protocol) governs web data transfer. - What is the binary equivalent of the decimal number 13?
a) 1101
b) 1011
c) 1110
d) 1001
Answer: a
Explanation: Decimal 13 converts to binary 1101 (1×2³ + 1×2² + 0×2¹ + 1×2⁰). - What is virtual memory in computer architecture?
a) Physical storage on a hard drive
b) A technique using disk space as RAM
c) A type of cache
d) A network protocol
Answer: b
Explanation: Virtual memory uses disk space to extend RAM capacity. - What does ICMP stand for in networking?
a) Internet Control Message Protocol
b) Internal Communication Management Protocol
c) Integrated Control Message Protocol
d) None of the above
Answer: a
Explanation: ICMP is used for diagnostic and error messaging in networks. - What is the hexadecimal equivalent of the decimal number 10?
a) A
b) B
c) C
d) 9
Answer: a
Explanation: Decimal 10 equals A in hexadecimal. - What is the purpose of an instruction set in computer architecture?
a) Store data
b) Define CPU operations
c) Connect to networks
d) Display graphics
Answer: b
Explanation: The instruction set defines operations a CPU can perform. - Which protocol is used for network time synchronization?
a) NTP
b) FTP
c) HTTP
d) SMTP
Answer: a
Explanation: NTP (Network Time Protocol) synchronizes clocks across networks. - What is a kilobyte in data representation?
a) 1000 bytes
b) 1024 bytes
c) 100 bytes
d) 10 bytes
Answer: b
Explanation: A kilobyte is 1024 bytes in computing. - What is a cache hit in computer architecture?
a) Data found in cache memory
b) Data stored on a hard drive
c) A network error
d) A programming error
Answer: a
Explanation: A cache hit occurs when requested data is found in cache. - What does POP3 stand for in networking?
a) Post Office Protocol version 3
b) Public Operation Protocol
c) Packet Order Protocol
d) None of the above
Answer: a
Explanation: POP3 retrieves emails from a server to a client. - What is the binary equivalent of the hexadecimal number A?
a) 1010
b) 1100
c) 1111
d) 1000
Answer: a
Explanation: Hexadecimal A equals 10 in decimal, or 1010 in binary. - What is a RISC architecture?
a) Complex Instruction Set Computing
b) Reduced Instruction Set Computing
c) Random Instruction Set Computing
d) None of the above
Answer: b
Explanation: RISC uses simple instructions for faster processing. - Which protocol is used for email retrieval?
a) IMAP
b) FTP
c) HTTP
d) DNS
Answer: a
Explanation: IMAP (Internet Message Access Protocol) retrieves emails while keeping them on the server. - What is the decimal equivalent of the binary number 10000?
a) 16
b) 12
c) 8
d) 10
Answer: a
Explanation: Binary 10000 equals 16 in decimal (1×2⁴ + 0×2³ + 0×2² + 0×2¹ + 0×2⁰). - What is the purpose of a northbridge in computer architecture?
a) Connect CPU to memory and GPU
b) Manage storage devices
c) Control network traffic
d) Display output
Answer: a
Explanation: The northbridge connects the CPU to high-speed components like memory. - What does SNMP stand for in networking?
a) Simple Network Management Protocol
b) Secure Network Monitoring Protocol
c) System Network Management Protocol
d) None of the above
Answer: a
Explanation: SNMP manages and monitors network devices. - What is a megabyte in data representation?
a) 1024 bytes
b) 1024 kilobytes
c) 1000 bytes
d) 1000 kilobytes
Answer: b
Explanation: A megabyte is 1024 kilobytes in computing. - What is a southbridge in computer architecture?
a) Connects CPU to peripheral devices
b) Manages high-speed memory
c) Executes programs
d) Stores data
Answer: a
Explanation: The southbridge handles communication with slower peripherals. - Which protocol is used for secure file transfer?
a) FTP
b) SFTP
c) HTTP
d) SMTP
Answer: b
Explanation: SFTP (Secure File Transfer Protocol) encrypts file transfers. - What is the hexadecimal equivalent of the binary number 10100?
a) 12
b) 14
c) 16
d) 18
Answer: b
Explanation: Binary 10100 equals 20 in decimal, or 14 in hexadecimal. - What is a fetch-decode-execute cycle in computer architecture?
a) A storage process
b) The CPU’s instruction processing cycle
c) A network protocol
d) A data compression method
Answer: b
Explanation: The cycle describes how the CPU processes instructions. - What does ARP stand for in networking?
a) Address Resolution Protocol
b) Application Request Protocol
c) Access Resolution Protocol
d) None of the above
Answer: a
Explanation: ARP maps IP addresses to MAC addresses. - What is a gigabyte in data representation?
a) 1024 megabytes
b) 1000 megabytes
c) 1024 kilobytes
d) 1000 kilobytes
Answer: a
Explanation: A gigabyte is 1024 megabytes in computing. - What is the purpose of a memory address in computer architecture?
a) Store programs
b) Identify data location in memory
c) Connect to networks
d) Display graphics
Answer: b
Explanation: A memory address specifies where data is stored in memory. - Which protocol is used for VoIP communication?
a) SIP
b) FTP
c) SMTP
d) DNS
Answer: a
Explanation: SIP (Session Initiation Protocol) manages VoIP calls. - What is the binary equivalent of the decimal number 20?
a) 10100
b) 10010
c) 11000
d) 11100
Answer: a
Explanation: Decimal 20 converts to binary 10100 (1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 0×2⁰). - What is a CISC architecture?
a) Complex Instruction Set Computing
b) Compact Instruction Set Computing
c) Centralized Instruction Set Computing
d) None of the above
Answer: a
Explanation: CISC uses complex instructions for versatile processing. - What does TFTP stand for in networking?
a) Trivial File Transfer Protocol
b) Terminal File Transfer Protocol
c) Temporary File Transmission Protocol
d) None of the above
Answer: a
Explanation: TFTP is a simple protocol for file transfers. - What is the decimal equivalent of the hexadecimal number F?
a) 13
b) 14
c) 15
d) 16
Answer: c
Explanation: Hexadecimal F equals 15 in decimal. - What is the purpose of a memory management unit (MMU)?
a) Execute programs
b) Manage virtual memory mappings
c) Connect to networks
d) Display output
Answer: b
Explanation: The MMU maps virtual addresses to physical memory. - Which protocol is used for network management?
a) SNMP
b) FTP
c) HTTP
d) SMTP
Answer: a
Explanation: SNMP (Simple Network Management Protocol) monitors network devices. - What is a terabyte in data representation?
a) 1024 gigabytes
b) 1000 gigabytes
c) 1024 megabytes
d) 1000 megabytes
Answer: a
Explanation: A terabyte is 1024 gigabytes in computing. - What is the role of an I/O controller in computer architecture?
a) Manage input/output operations
b) Execute programs
c) Store data
d) Connect to networks
Answer: a
Explanation: The I/O controller manages communication with peripheral devices. - What does IMAP stand for in networking?
a) Internet Message Access Protocol
b) Internal Message Application Protocol
c) Integrated Mail Access Protocol
d) None of the above
Answer: a
Explanation: IMAP retrieves emails while keeping them on the server. - What is the binary equivalent of the hexadecimal number 1A?
a) 11010
b) 10010
c) 11100
d) 10110
Answer: a
Explanation: Hexadecimal 1A equals 26 in decimal, or 11010 in binary. - What is a memory hierarchy in computer architecture?
a) A network structure
b) A layered organization of memory types
c) A programming concept
d) A type of virus
Answer: b
Explanation: Memory hierarchy organizes memory by speed and size. - Which protocol is used for streaming media?
a) RTP
b) FTP
c) SMTP
d) DNS
Answer: a
Explanation: RTP (Real-time Transport Protocol) supports media streaming. - What is the decimal equivalent of the binary number 11110?
a) 28
b) 30
c) 32
d) 34
Answer: b
Explanation: Binary 11110 equals 30 in decimal (1×2⁴ + 1×2³ + 1×2² + 1×2¹ + 0×2⁰). - What is the purpose of a chipset in computer architecture?
a) Store data
b) Manage communication between components
c) Execute programs
d) Connect to the internet
Answer: b
Explanation: The chipset manages data flow between CPU, memory, and peripherals. - What does NAT stand for in networking?
a) Network Address Translation
b) Network Access Terminal
c) National Address Transmission
d) None of the above
Answer: a
Explanation: NAT translates private IP addresses to public ones. - What is a petabyte in data representation?
a) 1024 terabytes
b) 1000 terabytes
c) 1024 gigabytes
d) 1000 gigabytes
Answer: a
Explanation: A petabyte is 1024 terabytes in computing. - What is the purpose of an interrupt in computer architecture?
a) Store data
b) Signal the CPU to handle an event
c) Connect to networks
d) Display graphics
Answer: b
Explanation: Interrupts alert the CPU to prioritize specific tasks. - Which protocol is used for secure web browsing?
a) HTTP
b) HTTPS
c) FTP
d) SMTP
Answer: b
Explanation: HTTPS encrypts web traffic for secure browsing. - What is the hexadecimal equivalent of the binary number 100000?
a) 20
b) 22
c) 24
d) 26
Answer: a
Explanation: Binary 100000 equals 32 in decimal, or 20 in hexadecimal. - What is a superscalar architecture?
a) Executes multiple instructions simultaneously
b) Stores large amounts of data
c) Manages network traffic
d) Displays graphics
Answer: a
Explanation: Superscalar CPUs execute multiple instructions in parallel. - What does IGMP stand for in networking?
a) Internet Group Management Protocol
b) Internal Gateway Management Protocol
c) Integrated Group Message Protocol
d) None of the above
Answer: a
Explanation: IGMP manages multicast group memberships in networks. - What is the binary equivalent of the decimal number 25?
a) 11001
b) 10101
c) 11101
d) 10001
Answer: a
Explanation: Decimal 25 converts to binary 11001 (1×2⁴ + 1×2³ + 0×2² + 0×2¹ + 1×2⁰). - What is a memory leak in computer architecture?
a) Unauthorized data access
b) Unreleased memory by a program
c) A network failure
d) A hardware malfunction
Answer: b
Explanation: A memory leak occurs when a program fails to release allocated memory. - Which protocol is used for resolving MAC addresses?
a) ARP
b) FTP
c) SMTP
d) DNS
Answer: a
Explanation: ARP (Address Resolution Protocol) resolves IP addresses to MAC addresses. - What is the decimal equivalent of the hexadecimal number 1F?
a) 29
b) 30
c) 31
d) 32
Answer: c
Explanation: Hexadecimal 1F equals 31 in decimal (1×16¹ + 15×16⁰). - What is the purpose of a DMA controller in computer architecture?
a) Execute programs
b) Transfer data without CPU involvement
c) Manage network traffic
d) Store data
Answer: b
Explanation: DMA (Direct Memory Access) allows direct data transfer to memory. - What does PPTP stand for in networking?
a) Point-to-Point Tunneling Protocol
b) Packet Processing Transmission Protocol
c) Public Point Transfer Protocol
d) None of the above
Answer: a
Explanation: PPTP creates secure VPN connections. - What is a zettabyte in data representation?
a) 1024 petabytes
b) 1024 exabytes
c) 1000 petabytes
d) 1000 exabytes
Answer: b
Explanation: A zettabyte is 1024 exabytes in computing. - What is the purpose of a BIOS chip in computer architecture?
a) Store user data
b) Initialize hardware during boot
c) Connect to networks
d) Run applications
Answer: b
Explanation: The BIOS chip initializes hardware during system startup. - Which protocol is used for email sending and receiving?
a) SMTP and IMAP
b) FTP and HTTP
c) DNS and SNMP
d) None of the above
Answer: a
Explanation: SMTP sends emails, while IMAP retrieves them. - What is the binary equivalent of the decimal number 30?
a) 11110
b) 11010
c) 11100
d) 10110
Answer: a
Explanation: Decimal 30 converts to binary 11110 (1×2⁴ + 1×2³ + 1×2² + 1×2¹ + 0×2⁰). - What is a hyperthreading in computer architecture?
a) A storage technique
b) A method to run multiple threads on a single core
c) A network protocol
d) A data compression method
Answer: b
Explanation: Hyperthreading allows a CPU core to handle multiple threads. - What does RIP stand for in networking?
a) Routing Information Protocol
b) Remote Internet Protocol
c) Rapid Information Processing
d) None of the above
Answer: a
Explanation: RIP is a routing protocol for network data paths. - What is the hexadecimal equivalent of the binary number 111000?
a) 38
b) 36
c) 34
d) 32
Answer: b
Explanation: Binary 111000 equals 56 in decimal, or 36 in hexadecimal. - What is a von Neumann architecture?
a) Separate memory for data and instructions
b) Shared memory for data and instructions
c) A network topology
d) A type of virus
Answer: b
Explanation: Von Neumann architecture uses shared memory for data and instructions. - Which protocol is used for secure remote access?
a) FTP
b) SSH
c) HTTP
d) SMTP
Answer: b
Explanation: SSH (Secure Shell) provides secure remote system access. - What is the decimal equivalent of the binary number 101000?
a) 40
b) 42
c) 44
d) 46
Answer: a
Explanation: Binary 101000 equals 40 in decimal (1×2⁵ + 0×2⁴ + 1×2³ + 0×2² + 0×2¹ + 0×2⁰). - What is the purpose of a clock speed in computer architecture?
a) Measure storage capacity
b) Determine CPU processing speed
c) Manage network traffic
d) Store data
Answer: b
Explanation: Clock speed measures how many cycles a CPU can perform per second.
Conclusion
This collection of 200+ basic computer MCQs with answers is a powerful tool for students and exam aspirants aiming to strengthen their general knowledge and excel in competitive exams. Covering essential topics like hardware, software, networking, and programming, these questions provide a comprehensive foundation in computer fundamentals. By practicing these basic computer MCQs, you can enhance your understanding, boost confidence, and prepare effectively for exams like SSC, Banking, UPSC, and more. Keep exploring and practicing to stay ahead in your academic and professional journey!
Disclaimer
The following basic computer MCQs and answers are compiled for educational purposes to aid students and exam aspirants in their preparation. While every effort has been made to ensure accuracy by referencing authentic sources, we recommend cross-verifying answers with trusted resources before using them in high-stakes examinations. The author and publisher are not responsible for any errors or discrepancies that may arise from the use of this content.
Also Read: Computer GK Questions (One-Liners)