What does CPU stand for? a) Computer Processing Unit b) Central Processing Unit c) Control Processing Unit d) Core Processing Unit Answer: b) Central Processing Unit
Which of the following is a programming language? a) HTML b) JPEG c) MP3 d) Python Answer: d) Python
What is the full form of URL? a) Universal Resource Locator b) Uniform Resource Locator c) Unified Resource Locator d) Unique Resource Locator Answer: b) Uniform Resource Locator
Which component of a computer stores data temporarily for quick access by the CPU? a) RAM b) ROM c) HDD d) CPU Cache Answer: a) RAM
What does HTML stand for? a) Hyperlink Text Markup Language b) Hyper Text Markup Language c) Hyper Transfer Markup Language d) High-Level Text Markup Language Answer: b) Hyper Text Markup Language
Which of the following is NOT a type of computer network? a) LAN b) WAN c) MAN d) PAN Answer: d) PAN (Personal Area Network)
What is the function of an operating system? a) Manage hardware resources b) Perform calculations c) Play multimedia files d) Design web pages Answer: a) Manage hardware resources
Which of the following is a type of malware? a) Firewall b) Antivirus c) Trojan d) Encryption Answer: c) Trojan
What does USB stand for? a) Universal Serial Bus b) Unified Serial Bus c) Ultra Serial Bus d) United Serial Bus Answer: a) Universal Serial Bus
What is the primary function of a router in a computer network? a) Connects multiple computers within a local area network (LAN) b) Filters and forwards data packets between computer networks c) Stores data permanently for future retrieval d) Converts digital signals into analog signals for transmission Answer: b) Filters and forwards data packets between computer networks
Which programming language is known for its use in developing mobile applications for Android devices? a) Swift b) Java c) C# d) Objective-C Answer: b) Java
What is the term used to describe the process of converting source code into machine code? a) Compilation b) Interpretation c) Execution d) Debugging Answer: a) Compilation
What does ISP stand for? a) Internet Service Provider b) Internet Security Protocol c) Internet Server Protocol d) Internet Speed Processor Answer: a) Internet Service Provider
Which of the following is NOT a type of computer memory? a) RAM b) ROM c) CPU d) Cache Answer: c) CPU
What is the protocol used for sending and receiving email over the Internet? a) HTTP b) SMTP c) FTP d) DHCP Answer: b) SMTP (Simple Mail Transfer Protocol)
What is the maximum number of IP addresses that IPv4 supports? a) 32 b) 64 c) 128 d) 256 Answer: a) 32
Which of the following is a type of computer virus that spreads by attaching itself to executable files? a) Worm b) Trojan c) Spyware d) Logic Bomb Answer: b) Trojan
What does PDF stand for? a) Personal Document Format b) Portable Document Format c) Printable Document File d) Program Data File Answer: b) Portable Document Format
Which of the following is NOT a type of computer monitor? a) CRT b) LCD c) LED d) CPU Answer: d) CPU
Which programming language is commonly used for web development and is often combined with HTML and CSS? a) Python b) Java c) JavaScript d) C++ Answer: c) JavaScript
What does the acronym “LAN” stand for in the context of computer networks? a) Local Access Network b) Longitudinal Area Network c) Local Area Network d) Logical Area Network Answer: c) Local Area Network
Which of the following is a widely used relational database management system (RDBMS)? a) MongoDB b) PostgreSQL c) Redis d) Cassandra Answer: b) PostgreSQL
What does the term “URL” refer to in web browsing? a) Universal Record Locator b) Uniform Resource Locator c) Universal Resource Library d) Unified Record Locator Answer: b) Uniform Resource Locator
Which of the following file extensions typically represents an executable file in Windows? a) .exe b) .docx c) .pdf d) .zip Answer: a) .exe
What is the primary function of a firewall in computer security? a) Prevent unauthorized access to or from a private network b) Encrypt data transmissions c) Scan for viruses and malware d) Manage user access permissions Answer: a) Prevent unauthorized access to or from a private network
Which programming language is commonly used for statistical computing and data analysis? a) R b) Ruby c) Swift d) Perl Answer: a) R
What is the name of the markup language used for structuring and presenting content on the World Wide Web? a) XML b) CSS c) HTML d) JSON Answer: c) HTML
Which of the following is NOT a type of computer virus? a) Worm b) Trojan c) Spyware d) Browser Answer: d) Browser
In computer networking, what does the abbreviation “VPN” stand for? a) Virtual Private Network b) Virtual Personal Network c) Visible Personal Network d) Visible Private Network Answer: a) Virtual Private Network
What is the name of the programming language commonly used for developing iOS and macOS applications? a) Swift b) Objective-C c) Java d) C# Answer: a) Swift
Which of the following is NOT a type of computer port? a) USB b) HDMI c) Ethernet d) JavaScript Answer: d) JavaScript
What is the purpose of a DNS server in computer networking? a) To convert domain names to IP addresses b) To encrypt data transmissions c) To store website content d) To manage user authentication Answer: a) To convert domain names to IP addresses
Which programming language is commonly used for developing mobile applications for iOS devices? a) Java b) Swift c) C# d) Kotlin Answer: b) Swift
What does the acronym “HTML” stand for? a) Hyper Text Markup Language b) Hyperlink Text Markup Language c) High-Level Text Markup Language d) Home Tool Markup Language Answer: a) Hyper Text Markup Language
Which of the following is a type of computer memory that retains its contents even when the power is turned off? a) RAM b) ROM c) Cache d) HDD Answer: b) ROM
What is the function of a GPU in a computer system? a) To perform arithmetic and logical operations b) To store data temporarily for quick access by the CPU c) To process and render graphics d) To manage network connections Answer: c) To process and render graphics
What does the term “HTTP” stand for in the context of web browsing? a) Hypertext Transfer Protocol b) Hypertext Transmission Protocol c) Hyperlink Text Protocol d) Hypertext Terminal Protocol Answer: a) Hypertext Transfer Protocol
Which of the following is a type of software that enables users to interact with a computer system? a) Hardware b) Firmware c) Operating System d) Application Software Answer: d) Application Software
What is the primary function of an antivirus program? a) To prevent unauthorized access to a computer system b) To optimize system performance c) To detect and remove malware d) To manage network connections Answer: c) To detect and remove malware
What is the name of the system that assigns a unique address to each device connected to the Internet? a) IP address b) MAC address c) DNS d) DHCP Answer: a) IP address
Which of the following is NOT a type of computer network topology? a) Star b) Ring c) Mesh d) Binary Answer: d) Binary
What is the purpose of a modem in computer networking? a) To connect multiple computers within a local area network (LAN) b) To convert digital signals into analog signals for transmission over telephone lines c) To store data permanently for future retrieval d) To manage user authentication Answer: b) To convert digital signals into analog signals for transmission over telephone lines
Which of the following programming languages is primarily used for game development? a) Java b) C# c) Python d) HTML Answer: b) C#
What is the primary function of a spreadsheet software? a) To create and edit text documents b) To store and manage data in tabular format c) To create and edit images d) To design and publish websites Answer: b) To store and manage data in tabular format
Which of the following is an example of a cloud computing service model? a) SaaS (Software as a Service) b) HDD (Hardware Device Deployment) c) UPS (Universal Processing Service) d) LAN (Local Area Network) Answer: a) SaaS (Software as a Service)
What does the acronym “VPN” stand for in the context of computer networking? a) Virtual Personal Network b) Visible Private Network c) Virtual Private Network d) Virtual Public Network Answer: c) Virtual Private Network
Which of the following is a widely used version control system for managing software development projects? a) Git b) Apache c) Docker d) Kubernetes Answer: a) Git
What is the primary function of an email client software? a) To create and edit text documents b) To browse the World Wide Web c) To send, receive, and manage email messages d) To manage user authentication Answer: c) To send, receive, and manage email messages
Which of the following is NOT a type of computer port? a) HDMI b) USB c) TCP d) Ethernet Answer: c) TCP
What is the purpose of a compiler in programming? a) To convert source code into machine code b) To interpret and execute source code directly c) To optimize system performance d) To manage user authentication Answer: a) To convert source code into machine code
Which of the following is NOT a commonly used programming paradigm? a) Object-Oriented Programming (OOP) b) Procedural Programming c) Functional Programming d) Linear Programming Answer: d) Linear Programming
What is the purpose of a router in computer networking? a) To convert digital signals into analog signals for transmission b) To connect multiple computers within a local area network (LAN) c) To filter and forward data packets between computer networks d) To manage user authentication Answer: c) To filter and forward data packets between computer networks
Which of the following is NOT a type of computer storage device? a) SSD (Solid State Drive) b) HDD (Hard Disk Drive) c) CPU (Central Processing Unit) d) USB Flash Drive Answer: c) CPU (Central Processing Unit)
What is the purpose of a compiler in programming? a) To convert source code into machine code b) To interpret and execute source code directly c) To optimize system performance d) To manage user authentication Answer: a) To convert source code into machine code
Which of the following is a widely used relational database management system (RDBMS)? a) MongoDB b) MySQL c) Redis d) Cassandra Answer: b) MySQL
What is the function of a DNS server in computer networking? a) To convert domain names to IP addresses b) To encrypt data transmissions c) To store website content d) To manage user authentication Answer: a) To convert domain names to IP addresses
Which of the following is NOT a type of computer virus? a) Trojan b) Worm c) Spyware d) Firewall Answer: d) Firewall
What is the primary function of an operating system? a) To manage hardware resources b) To create and edit text documents c) To optimize system performance d) To manage user authentication Answer: a) To manage hardware resources
Which of the following is NOT a commonly used web browser? a) Chrome b) Firefox c) Safari d) Photoshop Answer: d) Photoshop
What is the purpose of encryption in computer security? a) To prevent unauthorized access to a computer system b) To optimize system performance c) To convert digital signals into analog signals for transmission d) To protect data from unauthorized access or interception Answer: d) To protect data from unauthorized access or interception