100+ Basic Computer Knowledge Questions Answers 2023 (PDF) For All Exams Download

A computer can be programmed to carry out sequences of arithmetic or logical operations automatically. computers can perform operations known as programs. nowadays computers are becoming more necessary for the general life of humans. those are very essential for modern life to communicate and personally and professionally. having a basic knowledge of computers are must in this modern scenario. For growing in life in professional life one should have a minimum knowledge of computers. to get a good score in the competitive world students and aspirants should have prior knowledge of computers and computing. so to help the candidates in their computing battle we have provided some basic information about computer knowledge in this article. let’s get into the topic…

Sl.No. Questions Answers
1 Who is the father of Computer science? Charles Babbage
2 A fault in a computer program that prevents it from working correctly is known as. a? Bug
3 Which button makes alphabets/letters in uppercase and lowercase and numbers to symbols? Shift
4 When a computer is switched on, the booting process performs .? Power on self-test
5 What is the software frequently utilized by end users called (like Word, or PowerPoint)? Application Software
6 Unit of measurement of the output quality of a printer? Dot per sq. inch
7 Switching device of fifth generation computer is .? VLSI
8 The unit KIPS is used to measure the speed of .? Processor
9 What does DOS stand for .? Disk Operating System
10 What is a joy stick primarily in computers used for? Computer Gaming
11 Which type of storage device is a BIOS ? Primary
12 What is the extension type of the excel 2007 files? .xlsx
13 Collecting personal information and effectively posing as another individual is known as the crime of .? Identity theft
14 What does IBM stand for .? International Business Machines
15 Office LANs, which are scattered geographically on large scale, can be connected by the use of corporate .? WAN ( wide area network )
16 To move a copy of file from one computer to another over a communication channel is called? File Transfer
17 Large transaction processing systems in automated organizations use .? Batch Processing
18 What does MICR stand for .? Magnetic Ink Character Recognition
19 Name of 1st electronic computer? ENIAC
20 No. of different characters in ASCII coding system? 1024
21 What does MSIC stand for .? Medium Scale Integrated Circuits
22 The scrambling of code is known as .? Encryption
23 The first computers were programmed using .? Machine Language
24 Something which has easily understood instructions is said to be .? Analog Data
25 A modem is connected to a .? Telephone Line
26 Refresh Rate of monitor is measured in? Hertz
27 What was the chief component of first generation computer? Vacuum tube & Valves
28 Name the Father of Computer Mouse? Douglas Engelbart
29 A program that performs a useful task while simultaneously allowing destructive acts is .? Trojan Horse
30 The geometric arrangement of devices on the network is called .? Topology
31 In 1999, the Melissa virus was widely publicized .? E-mail virus
32 Which of the following commands is given to reboot the computer? Ctrl+Alt+Del
33 What is correcting errors in a program called? Debugging
34 BCD is .? Binary Coded Decimal
35 What type of virus uses computer hosts to reproduce itself? Worm
36 SMTP, FTP and DNS are applications of the …….layer? Application
37 Which command is used to select the whole document? Ctrl+A
38 COBOL is an acronym for .? Common Business Oriented Language
39 The ability of an OS to run more than one application at a time is called? Multitasking
40 What is the functional key to display save-as box? F12
41 Full form of NOS? Network Operating system
42 Where are the CPU and memory located? Motherboard
43 Who is known as the founder of IBM Company? Thomas J. Watson
44 An image on a computer screen is made up of .? Pixels
45 Full form of MAN? Metropolitan Area Network
46 Which command in DOS can be used to recover accidentally deleted files? UNDELETE
47 A computer program that converts an entire program into machine language atone time is called. a? Characters
48 The basic goal of computer process is to convert data into .? Information
49 In which year, the Microsoft company was founded? 1975
50 What is the personal computer operating system that organizes and uses a graphic desktop environment? Windows

Download 50 Basic Computer Knowledge Questions Answers

Sl.No. Questions Answers
1 What are a Light pen and joystick? Input Devices
2 What is a half-byte also called? Nibble
3 What does SMPS stand for .? Switched mode Power Supply
4 What do we use to change the appearance and positioning of text documents in MS Word? Formatting
5 In a computer, most processing takes place in .? CPU
6 In which type of computer, data are represented as discrete signals? Digital Computer
7 Scientific Name of Computer? Sillico sapiens
8 A is approximately a million bytes. Megabyte
9 Daisy wheel, Drum, chain, etc are the .? Printers
10 What does XML stand for .? Extensible Markup Language
11 What kind of scheme is the HTTP protocol? Request/Response
12 Magnetic disk is an example of .? Secondary Memory
13 The amount of vertical space between lines of text in a document is called .? Line Spacing
14 A computer cannot ‘boot’ if it does not have the .? Operating system
15 What is the other name for the programmed chip? LSIC
16 A normal CD- ROM usually can store up to date. 680 MB
17 What does DMA stand for? Direct Memory Access
18 Full form of LAN? Local Area Network
19 What does ASCII stand for .? American Standard Code for Information Interchange
20 Second Generation computers were developed during .? 1956-65
21 When did arch-rivals IBM and Apple Computers Inc. decide to join hands? 1991
22 What kind of memory is both static and non-volatile? ROM
23 An error in software or hardware is called a bug. What is the alternative computer jargon for it? Glitch
24 Unwanted repetitious messages, such as unsolicited bulk e-mail is known as .? Spam
25 The common name for the crime of stealing passwords is .? Spoofing
26 What does BIOS stand for .? Basic Input Output System
27 Who is regarded as the Father of the “C” programming language? Dennis Ritchie
28 RAM can be treated as the _______ for the computer’s processor. Waiting Room
29 Computers manipulate data in many ways, and this manipulation is called .? Processing
30 Joshy, Perfumes are examples of .? Viruses
31 The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called .? Computer Forensics
32 Where do most data go first within a computer memory hierarchy? RAM
33 Help Menu is available at which button? Start
34 Which file contains permanent data and gets updated during the processing of transactions? Master File
35 A DVD is an example of an .? Optical Disc
36 Which is the most common tool used to restrict access to a computer system? Passwords
37 The technology that stores only essential instructions on a microprocessor chip and thus enhances its speed is referred to as .? RISC
38 What is the name of an application program that gathers user information and sends it to someone through the Internet? Spybot
39 What is the name of the display feature that highlights are off the screen which requires operator attention? Reverse Video
40 Computers, combining both measuring and counting, are called .? Hybrid Computer
41 What is FORTRAN? Formula Translation
42 What translates and executes the program at the run-time line by line? Interpreter
43 What converts an entire program into machine language? Compiler
44 Who is the father of personal computers? Edward Robert
45 What does EEPROM stand for .? Electronic Erasable Programmable Read Only Memory
46 Who developed the first electronic computer? J.V. Atansoff
47 Which programming languages are classified as low-level languages? Assembly Language
48 The first web browser is .? Mosaic
49 The first page of the Website is termed.? Homepage
50 Collecting personal information and effectively posing as another individual is known as the crime of .? Identity theft