Practice Fundamental concepts - computer mcq Online Quiz (set-1) For All Competitive Exams

Q-1)   Personal computer is

(a)

(b)

(c)

(d)

(e)

Explanation:

A personal computer is a general-purpose, cost-effective computer that is designed to be used by a single end-user. Every PC is dependent on microprocessor technology, which allows PC makers to set the entire central processing unit (CPU) on a single chip.

Businesses make use of PCs to perform tasks like accounting, desktop publishing and word processing as well as to run databases and spreadsheets. At home, PCs are mainly used for multimedia entertainment, playing PC games, accessing the Internet, etc. Even though PCs are intended to use as single-user systems, it is normal to connect them together to create a network, such as a local area network (LAN).


Q-2)   Which of the following is NOT associated with Computers?

(a)

(b)

(c)

(d)

(e)

Explanation:


Q-3)   Which is a volatile memory :

(a)

(b)

(c)

(d)

(e)

Explanation:

Volatile memory is a type of storage whose contents are erased when the system's power is turned off or interrupted. An example of volatile memory is RAM (Random Access Memory).

When you are working on a document, it is kept in RAM. If the computer you're using is disconnected from power, your work is lost because it was not stored in permanent (non-volatile) memory. For this reason, we recommend saving your documents or other data to a non-volatile storage medium, such as a hard drive, SSD, or USB stick.

Volatile memory is a type of storage whose contents are erased when the system's power is turned off or interrupted. An example of volatile memory is RAM (Random Access Memory).

When you are working on a document, it is kept in RAM. If the computer you're using is disconnected from power, your work is lost because it was not stored in permanent (non-volatile) memory. For this reason, we recommend saving your documents or other data to a non-volatile storage medium, such as a hard drive, SSD, or USB stick.


Q-4)   A key that turns a function on or off is called a ______key:

(a)

(b)

(c)

(d)


Q-5)   When did John Napier develop logarithm :

(a)

(b)

(c)

(d)

Explanation:

The Scottish mathematician John Napier published his discovery of logarithms in 1614. His purpose was to assist in the multiplication of quantities that were then called sines.


Q-6)   A computer system

(a)

(b)

(c)

(d)

(e)


Q-7)   Which is a valid program to access the internet:

(a)

(b)

(c)

(d)

Explanation:

An Internet browser was first introduced as Mosaic Netscape 0.9 on October 13, 1994, Netscape was popular during the early 1990s and in a browser war with Microsoft Internet Explorer. The use of Netscape declined in the late 1990s, which led to the open source Mozilla project and Netscape's acquisition on November 24, 1998, by AOL for $4.2 billion.


Q-8)   Word Length of a Personal Computer is ______:

(a)

(b)

(c)

(d)

Explanation:

The Word length of a Personal Computer is 8 bits.

The most common processors are/were 8-bit, 16-bit, 32-bit or 64-bit. These are the WORD lengths of the processor. Actually, half of a WORD is a BYTE, whatever the numerical length is. Ready for this, half of a BYTE is a NIBBLE. A byte may have more than or fewer than 8 bits. The term 'word' is used to describe the number of bits processed at a time by a program or operating system. So, in a 16-bit CPU, the word length is 16 bits. In a 32-bit CPU, the word length is 32 bits.

The hardware registers in a computer machine are word-sized. ... In this context, a word is a unit that a machine uses when working with memory. For example, on a 32-bit machine, the word is 32 bits long and on a 64 bit is 64 bits long. The word size determines the address space.

The Word length of a Personal Computer is 8 bits.

The most common processors are/were 8-bit, 16-bit, 32-bit or 64-bit. These are the WORD lengths of the processor. Actually, half of a WORD is a BYTE, whatever the numerical length is. Ready for this, half of a BYTE is a NIBBLE. A byte may have more than or fewer than 8 bits. The term 'word' is used to describe the number of bits processed at a time by a program or operating system. So, in a 16-bit CPU, the word length is 16 bits. In a 32-bit CPU, the word length is 32 bits.

The hardware registers in a computer machine are word-sized. ... In this context, a word is a unit that a machine uses when working with memory. For example, on a 32-bit machine, the word is 32 bits long and on a 64 bit is 64 bits long. The word size determines the address space.


Q-9)   ______is used for scanning the pictures and putting them in digitized form in the computer:

(a)

(b)

(c)

(d)

Explanation:

A scanner, image scanner, or optical scanner is a hardware input device that optically "reads" an image and converts it to a digital signal. For example, a scanner may be used to convert a printed picture, drawing, or document (hard copy) to a digital file that can be edited on a computer


Q-10)   The basic goal of a computer process is to convert data into

(a)

(b)

(c)

(d)

(e)

Explanation:

As a result, data processing refers to the act of converting raw data into usable information.

The data we enter is unprocessed, and the computer transforms it into valuable data.

Data manipulation by a computer is called data processing. It entails the translation of raw data into a machine-readable format, data flow via the CPU and memory to output devices, and output formatting or modification.

As a result, data processing refers to the act of converting raw data into usable information.

The data we enter is unprocessed, and the computer transforms it into valuable data.

Data manipulation by a computer is called data processing. It entails the translation of raw data into a machine-readable format, data flow via the CPU and memory to output devices, and output formatting or modification.


Q-11)   The computer’s capability of distinguishing spoken words is called

(a)

(b)

(c)

(d)

(e)


Q-12)   Which among the following is correct:

(a)

(b)

(c)

(d)


Q-13)   Computers that are portable and convenient for users who travel are known as

(a)

(b)

(c)

(d)

(e)


Q-14)   The Second Generation computer was based on:

(a)

(b)

(c)

(d)

(e)

Explanation:

Transistors replaced vacuum tubes and ushered in the second generation of computers. The transistor was invented in 1947 but did not see widespread use in computers until the late 1950s. The transistor was far superior to the vacuum tube, allowing computers to become smaller, faster, cheaper, more energy-efficient and more reliable than their first-generation predecessors.

Though the transistor still generated a great deal of heat that subjected the computer to damage, it was a vast improvement over the vacuum tube. Second-generation computers still relied on punched cards for input and printouts for output.

Second-generation computers moved from cryptic binary machine language to symbolic, or assembly, languages, which allowed programmers to specify instructions in words. High-level programming languages were also being developed at this time, such as early versions of COBOL and FORTRAN.


Q-15)   Which of the following are computers that can be carried around easily ?

(a)

(b)

(c)

(d)

(e)

Explanation:

laptop palmtops and smartphones are the following computers that can be carried around easily anywhere in the world


Q-16)   Which of the following refers to the fastest, biggest and most expensive computers ?

(a)

(b)

(c)

(d)

(e)

Explanation:

A supercomputer is a computer that performs at a high level than a general-purpose computer.

Instead of million instructions per second, the performance of a supercomputer is often measured in floating-point operations per second (FLOPS) (MIPS).

All the world's fastest 500 supercomputers have been running Linux-based operating systems since November 2017.

In the United States, the European Union, Taiwan, Japan, and China, more research is being done to develop faster, more powerful, and technologically better exascale supercomputers.

Quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modelling (computing the structures and properties of chemical compounds, biological macromolecules, polymers, and crystals), and physics are just a few of the computationally intensive tasks that supercomputers are used for (such as simulations of the early moments of the universe, aeroplane and spacecraft aerodynamics, the detonation of nuclear weapons, and nuclear fusion).


Q-17)   Full Form of RAM:

(a)

(b)

(c)

(d)


Q-18)   DMA stands for :

(a)

(b)

(c)

(d)

Explanation:

Direct memory access (DMA) is a method that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations.


Q-19)   PCB stands for:

(a)

(b)

(c)

(d)

Explanation:

A printed circuit board, or PC board, or PCB, is a non-conductive material with conductive lines printed or etched. Electronic components are mounted on the board and the traces connect the components together to form a working circuit or assembly.

Process Control Block is a data structure that contains information about the process related to it. The process control block is also known as a task control block, entry of the process table, etc.

It is very important for process management as the data structuring for processes is done in terms of the PCB. It also defines the current state of the operating system.


Q-20)   FIFO scheduling is:

(a)

(b)

(c)

(d)

Explanation:

The simplest scheduling algorithm is first in, first out (FIFO), also known as first come, first served (FCFS). A FIFO queue is simply a queue that is waiting for the incoming items. In a lack of prioritization, every process will eventually be completed