Which file format is used to store high-quality images?
(A) .txt
(B) .bmp
(C) .exe
(D) .docx
Answer: (B)
Which of the following is NOT a type of malware?
(A) Worm
(B) Virus
(C) Firewall
(D) Trojan
Answer: (C)
What does ‘booting’ a computer mean?
(A) Shutting it down
(B) Restarting it
(C) Turning it on and loading the OS
(D) Installing software
Answer: (C)
Which of the following is used to identify a device on the Internet?
(A) IP address
(B) MAC address
(C) Domain name
(D) Subnet
Answer: (A)
Which of the following is a text-based web browser?
(A) Chrome
(B) Lynx
(C) Firefox
(D) Safari
Answer: (B)
Which shortcut key is used to open the ‘Find and Replace’ dialog box in MS Word?
(A) Ctrl + R
(B) Ctrl + F
(C) Ctrl + H
(D) Ctrl + D
Answer: (C)
What is the smallest unit of a digital image?
(A) Dot
(B) Pixel
(C) Byte
(D) Bit
Answer: (B)
Which command is used to clear the screen in CMD?
(A) clear
(B) cls
(C) del
(D) erase
Answer: (B)
Which memory is used to store frequently accessed data temporarily?
(A) ROM
(B) RAM
(C) Cache
(D) HDD
Answer: (C)
Which of the following software is used to create animations?
(A) Flash
(B) Excel
(C) Word
(D) Access
Answer: (A)
What is the full form of GUI?
(A) Graphical User Interface
(B) General User Interface
(C) Global Uniform Interface
(D) General Utility Internet
Answer: (A)
Which protocol is used for secure email transfer?
(A) SMTP
(B) POP3
(C) IMAP
(D) SMTPS
Answer: (D)
Which company developed the macOS?
(A) Google
(B) Microsoft
(C) Apple
(D) IBM
Answer: (C)
Which shortcut key is used to open a new incognito window in Chrome?
(A) Ctrl + N
(B) Ctrl + Shift + N
(C) Ctrl + T
(D) Alt + N
Answer: (B)
Which one of these is not a mobile browser?
(A) UC Browser
(B) Opera Mini
(C) Edge
(D) PowerPoint
Answer: (D)
Which port is used by FTP?
(A) 21
(B) 80
(C) 110
(D) 25
Answer: (A)
What is phishing?
(A) Hacking files
(B) A method to copy disks
(C) Fraudulent email to steal sensitive data
(D) Internet surfing technique
Answer: (C)
Which of these is not used for cyber security?
(A) Antivirus
(B) Firewall
(C) Rootkit
(D) Encryption
Answer: (C)
Which of these is a domain extension for educational institutions?
(A) .gov
(B) .edu
(C) .com
(D) .org
Answer: (B)
Which of the following allows remote desktop access?
(A) TeamViewer
(B) WordPad
(C) Excel
(D) WinRAR
Answer: (A)
Which key is used to open Developer Tools in browsers?
(A) F11
(B) F12
(C) Ctrl + D
(D) Ctrl + Shift + P
Answer: (B)
Which one is a default file extension of MS PowerPoint?
(A) .ppt
(B) .pptx
(C) .pdf
(D) .pot
Answer: (B)
Which protocol is used to send emails?
(A) SMTP
(B) POP3
(C) IMAP
(D) HTTP
Answer: (A)
Which type of memory can be electronically erased and reprogrammed?
(A) ROM
(B) RAM
(C) EEPROM
(D) Cache
Answer: (C)
Which term refers to unauthorized access to or control over a computer system?
(A) Spoofing
(B) Phishing
(C) Hacking
(D) Cracking
Answer: (C)
Which of the following is used to store large amounts of data offline?
(A) HDD
(B) RAM
(C) CPU
(D) BIOS
Answer: (A)
Which part of the computer is responsible for arithmetic and logic operations?
(A) CU
(B) ALU
(C) RAM
(D) ROM
Answer: (B)
Which of these is used to scan for viruses?
(A) Firewall
(B) Task Manager
(C) Antivirus
(D) Disk Cleanup
Answer: (C)
Which type of software is Linux?
(A) Application software
(B) Utility software
(C) Operating system
(D) Compiler
Answer: (C)
Which of these is not a Linux distribution?
(A) Ubuntu
(B) Red Hat
(C) Fedora
(D) Windows
Answer: (D)
What is the use of a plotter?
(A) Playing music
(B) High-quality graphics printing
(C) Scanning documents
(D) Making presentations
Answer: (B)
Which type of system allows multiple users at the same time?
(A) Real-time
(B) Embedded
(C) Multi-user
(D) Single-user
Answer: (C)
Which shortcut key is used to create a new folder in Windows?
(A) Ctrl + N
(B) Ctrl + Shift + N
(C) Ctrl + F
(D) Shift + N
Answer: (B)
What is encryption used for?
(A) Data compression
(B) Data security
(C) Data duplication
(D) Data backup
Answer: (B)
Which of these is a disk formatting utility in Windows?
(A) Diskpart
(B) CHKDSK
(C) Format
(D) All of the above
Answer: (D)
Which of the following is a popular spreadsheet tool?
(A) MS Word
(B) MS Excel
(C) MS Access
(D) OneNote
Answer: (B)
Which of the following uses biometric identification?
(A) Password
(B) PIN
(C) OTP
(D) Fingerprint
Answer: (D)
Which of these is not a programming language?
(A) Python
(B) Java
(C) Oracle
(D) Ruby
Answer: (C)
Which key combination is used to take a screenshot in Windows 10?
(A) Ctrl + PrtSc
(B) Windows + PrtSc
(C) Shift + PrtSc
(D) Alt + F4
Answer: (B)
Which of the following handles all hardware and software interactions?
(A) Application
(B) Operating System
(C) Browser
(D) Compiler
Answer: (B)
What is the maximum length of a filename in Windows?
(A) 128 characters
(B) 255 characters
(C) 512 characters
(D) 64 characters
Answer: (B)
Which of these ports is used for POP3?
(A) 110
(B) 25
(C) 80
(D) 443
Answer: (A)
Which of these is a function of a firewall?
(A) Scan documents
(B) Block unauthorized access
(C) Encrypt email
(D) Clean temporary files
Answer: (B)
Which device is used to make hard copies of documents?
(A) Monitor
(B) Projector
(C) Printer
(D) Scanner
Answer: (C)
Which programming language is considered best for AI and ML?
(A) C
(B) Java
(C) Python
(D) HTML
Answer: (C)
Which of the following is not a feature of the Control Panel?
(A) Display settings
(B) Device management
(C) System performance
(D) Typing speed test
Answer: (D)
Which of the following is used to protect a network from cyber threats?
(A) Modem
(B) Hub
(C) Firewall
(D) Keyboard
Answer: (C)
Which language is used to structure web documents?
(A) JavaScript
(B) CSS
(C) HTML
(D) PHP
Answer: (C)
Which shortcut key is used to refresh the desktop?
(A) F5
(B) F1
(C) Ctrl + F
(D) Shift + R
Answer: (A)
What is the primary use of the Windows Control Panel?
(A) Open files
(B) Configure system settings
(C) Browse internet
(D) Code software
Answer: (B)