If you are looking for Basic Computer Related G.K. Questions and Answer. Please find Below and increase your Computer G.k Knowledge:
S.No. | Question | Answer |
---|---|---|
1. | Who is the father of Computer science? | Charles Babbage |
2. | In a computer, most processing takes place in _______? | CPU |
3. | In which type of computer, data are represented as discrete signals? | Digital Computer |
4. | Scientific Name of Computer? | Sillico sapiens |
5. | What is the name of the display feature that highlights are of the screen which requires operator attention? | Reverse Video |
6. | Computers, combine both measuring and counting, are called _______? | Hybrid Computer |
7. | What is FORTRAN? | Formula Translation |
8. | What translates and executes program at run time line by line? | Interpreter |
9. | What converts an entire program into machine language? | Compiler |
10. | Who is the father of personal computer? | Edward Robert |
11. | EEPROM stands for _______? | Electronic Erasable Programmable Read Only Memory |
12. | Who developed the first electronic computer? | J.V. Atansoff |
13. | Which programming languages are classified as low level languages? | Assembly Language |
14. | The first web browser is _______? | Mosaic |
15. | First page of Website is termed as _______? | Homepage |
16. | IBM stands for _______? | International Business Machines |
17. | Office LANs, which are scattered geographically on large scale, can be connected by the use of corporate _______? | WAN ( wide area network ) |
18. | To move a copy of file from one computer to another over a communication channel is called? | File Transfer |
19. | Large transaction processing systems in automated organisations use _______? | Batch Processing |
20. | MICR stands for _______? | Magnetic Ink Character Recognition |
21. | Name of 1st electronic computer? | ENIAC |
22. | No. of different characters in ASCII coding system? | 1024 |
23. | MSIC stands for _______? | Medium Scale Integrated Circuits |
24. | The scrambling of code is known as _______? | Encryption |
25. | The first computers were programmed using _______? | Machine Language |
26. | A fault in a computer program which prevents it from working correctly is known as _______? | Bug |
27. | Which button makes alphabets/letters in uppercase and lowercase and numbers to symbols? | Shift |
28. | When a computer is switched on, the booting process performs _______? | Power on self test |
29. | What is the software frequently utilized by end users called (like Word, PowerPoint)? | Application Software |
30. | Unit of measurement of the output quality of a printer? | Dot per sq. inch |
31. | Switching device of fifth generation computer is _______? | VLSI |
32. | The unit KIPS is used to measure the speed of _______? | Processor |
33. | DOS stands for _______? | Disk Operating System |
34. | What is a joy stick primarily in computers used for? | Computer Gaming |
35. | In 1999, the Melissa virus was a widely publicized _______? | E-mail virus |
36. | Which of the following commands is given to reboot the computer? | Ctrl+Alt+Del |
37. | What is correcting errors in a program called? | Debugging |
38. | BCD is _______? | Binary Coded Decimal |
39. | What type of virus uses computer hosts to reproduce itself? | Worm |
40. | SMTP, FTP and DNS are applications of the _______ layer? | Application |
41. | Which command is used to select the whole document? | Ctrl+A |
42. | COBOL is an acronym for _______? | Common Business Oriented Language |
43. | The ability of an OS to run more than one application at a time is called? | Multitasking |
44. | What is the functional key to display save-as box? | F12 |
45. | Full form of NOS? | Network Operating system |
46. | Something which has easily understood instructions is said to be _______? | Analog Data |
47. | A modem is connected to a _______? | Telephone Line |
48. | Refresh Rate of monitor is measured in? | Hertz |
49. | What was the chief component of first generation computer? | Vacuum tube & Valves |
50. | Name the Father of Computer Mouse? | Douglas Engelbart |
51. | A program that performs a useful task while simultaneously allowing destructive acts is _______? | Trojan Horse |
52. | The geometric arrangement of devices on the network is called _______? | Topology |
53. | The basic goal of computer process is to convert data into _______? | Information |
54. | Where are the CPU and memory located? | Motherboard |
55. | Who is known as the founder of IBM Company? | Thomas J. Watson |
56. | An image on a computer screen is made up of _______? | Pixels |
57. | Full form of MAN? | Metropolitan Area Network |
58. | Which command in DOS can be used to recover accidentally deleted files? | UNDELETE |
59. | A computer program that converts an entire program into machine language atone time is called _______? | Characters |
60. | In which year, the Microsoft company was founded? | 1975 |
61. | What is the personal computer operating system that organizes and uses a graphic desktop environment? | Windows |
62. | What are Light pen and joystick? | Input Devices |
63. | What is a half byte also called as? | Nibble |
64. | SMPS stands for _______? | Switched mode Power Supply |
65. | What do we use to change the appearance and positioning of text document in MSWord? | Formatting |
66. | A _______ is approximately a million bytes? | Megabyte |
67. | Daisy wheel, Drum, chain etc are the _______? | Printers |
68. | XML stands for _______? | Extensible Markup Language |
69. | What kind of scheme is the HTTP protocol? | Request/Response |
70. | Magnetic disk is an example of _______? | Secondary Memory |
71. | What is the meaning of OSI, in terms of computers ? | Open system Interconnection |
72. | Which type of storage device is a BIOS ? | Primary |
73. | What is the extension type of the excel 2007 files? | .xlsx |
74. | Collecting personal information and effectively posing as another individual is known as the crime of _______? | Identity theft |
75. | The amount of vertical space between lines of text in a document is called _______? | Line Spacing |
76. | A computer cannot ‘boot’ if it does not have the _______? | Operating system |
77. | What is the other name for programmed chip? | LSIC |
78. | A normal CD- ROM usually can store up to _______ data? | 680 MB |
79. | What does DMA stand for? | Direct Memory Access |
80. | Full form of LAN? | Local Area Network |
81. | ASCII stands for _______? | American Standard Code for Information Interchange |
82. | Second Generation computers were developed during _______? | 1956-65 |
83. | When did arch rivals IBM and Apple Computers Inc. decide to join hands? | 1991 |
84. | What kind of memory is both static and non-volatile? | ROM |
85. | An error in software or hardware is called a bug. What is the alternative computer jargon for it? | Glitch |
86. | Unwanted repetitious messages, such as unsolicited bulk e-mail is known as _______? | Spam |
87. | The common name for the crime of stealing passwords is _______? | Spoofing |
88. | BIOS stands for _______? | Basic Input Output System |
89. | Who is regarded as Father of “C” programming language? | Dennis Ritchie |
90. | RAM can be treated as the _______ for the computer’s processor. | Waiting Room |
91. | Computers manipulate data in many ways, and this manipulation is called _______? | Processing |
92. | Joshy, Perfumes are examples of _______? | Viruses |
93. | The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called _______? | Computer Forensics |
94. | Where does most data go first with in a computer memory hierarchy? | RAM |
95. | Help Menu is available at which button? | Start |
96. | Which file contains permanent data and gets updated during the processing of transactions? | Master File |
97. | A DVD is an example of an _______? | Optical Disc |
98. | Which is most common tool used to restrict access to computer system? | Passwords |
99. | The technology that stores only essential instructions on a microprocessor chip and thus enhances its speed is referred as _______? | RISC |
100. | What is the name of an application program that gathers user information and sends it to someone through the Internet? | Spybot |