Skip to main content

15 Computer Knowledge MCQs with Answers for Competitive Exams (Set-8)

✨ Click the Best Option ✨
🖥️ Q.1) Which of the following is an output device?
A) Keyboard
B) Monitor
C) Mouse
D) Scanner
💻 Q.2) Which number system do computers use to process data?
A) Binary
B) Decimal
C) Octal
D) Hexadecimal
⌨️ Q.3) What does the 'Ctrl + V' shortcut key do?
A) Cut
B) Paste
C) Copy
D) Undo
💾 Q.4) Which storage device has no moving parts?
A) SSD
B) HDD
C) Floppy Disk
D) CD-ROM
🌐 Q.5) Which protocol is used for sending emails?
A) HTTP
B) SMTP
C) FTP
D) SNMP
🖥️ Q.6) The 'brain' of the computer is:
A) CPU
B) RAM
C) Hard Disk
D) GPU
🔒 Q.7) Which of the following is an example of antivirus software?
A) Windows
B) McAfee
C) Android
D) Linux
📂 Q.8) In computing, what does 'GUI' stand for?
A) General User Input
B) Graphical User Interface
C) Global User Interaction
D) Graphical Utility Integration
💻 Q.9) Which company developed the programming language 'Java'?
A) Sun Microsystems
B) Microsoft
C) IBM
D) Oracle
🖥️ Q.10) Which type of software controls the hardware of a computer?
A) Application Software
B) Utility Software
C) Operating System
D) Firmware
💾 Q.11) What does 'PDF' stand for?
A) Programmed Data File
B) Portable Document Format
C) Printed Document File
D) Personal Data Folder
🌐 Q.12) Which of these is a cloud storage service?
A) Google Drive
B) MS Word
C) Photoshop
D) PowerPoint
💻 Q.13) The 'Ctrl + Z' shortcut is used to:
A) Redo the last action
B) Save the file
C) Close the file
D) Undo the last action
🖥️ Q.14) Which part of the computer is responsible for long-term storage?
A) RAM
B) Hard Disk
C) Cache
D) Registers
🔒 Q.15) What is 'phishing' in computer security?
A) Fraudulent attempt to obtain sensitive information
B) Unauthorized access to hardware
C) Encrypting user files
D) Installing firewall
0 / 3 🎯