Basics of Computer Science
1. Which of the following is the brain of the computer?
a) RAM
b) CPU
c) Hard Drive
d) GPU
Answer: b) CPU
2. What does RAM stand for?
a) Read Access Memory
b) Random Access Memory
c) Reliable Access Module
d) Random Allocation Module
Answer: b) Random Access Memory
3. Which type of software controls the hardware of a computer?
a) System Software
b) Application Software
c) Malware
d) Firmware
Answer: a) System Software
4. Which of the following is volatile memory?
a) ROM
b) SSD
c) RAM
d) HDD
Answer: c) RAM
5. Binary number system uses which two digits?
a) 0 and 9
b) 1 and 9
c) 0 and 1
d) 1 and 2
Answer: c) 0 and 1
Networking
6. Which protocol is used to browse the web?
a) FTP
b) HTTP
c) SMTP
d) DHCP
Answer: b) HTTP
7. What does IP stand for in networking?
a) Internal Protocol
b) Internet Protocol
c) Integrated Protocol
d) Initial Protocol
Answer: b) Internet Protocol
8. Which device is used to connect multiple computers in a network?
a) Router
b) Switch
c) Modem
d) Printer
Answer: b) Switch
9. What does DNS stand for?
a) Domain Numbering System
b) Direct Network Service
c) Domain Name System
d) Distributed Network System
Answer: c) Domain Name System
10. The OSI model has how many layers?
a) 5
b) 6
c) 7
d) 8
Answer: c) 7
Operating Systems
11. Which of the following is not an operating system?
a) Windows
b) Linux
c) Oracle
d) macOS
Answer: c) Oracle
12. The primary purpose of an operating system is to:
a) Manage software applications
b) Handle user inputs and outputs
c) Manage computer hardware resources
d) All of the above
Answer: d) All of the above
13. What is the full form of GUI?
a) Graphic User Interface
b) Graphical User Integration
c) Graphic Universal Interaction
d) General User Interface
Answer: a) Graphic User Interface
14. Which of the following is a command-line operating system?
a) Windows
b) DOS
c) macOS
d) Android
Answer: b) DOS
15. A collection of programs that control a computer is called:
a) Software
b) Firmware
c) Hardware
d) Peripheral
Answer: a) Software
MS Office
16. Which shortcut key is used to copy text in MS Word?
a) Ctrl + X
b) Ctrl + V
c) Ctrl + C
d) Ctrl + Z
Answer: c) Ctrl + C
17. Which function is used to calculate the sum of a range in MS Excel?
a) =SUM()
b) =ADD()
c) =TOTAL()
d) =COUNT()
Answer: a) =SUM()
18. In PowerPoint, which shortcut is used to start a slideshow?
a) F2
b) F5
c) F7
d) F10
Answer: b) F5
19. What is the extension of an MS Excel file?
a) .docx
b) .pptx
c) .xlsx
d) .pdf
Answer: c) .xlsx
20. Which feature in MS Word is used to align text evenly between margins?
a) Left Align
b) Right Align
c) Center Align
d) Justify
Answer: d) Justify
Programming Basics
21. Which of the following is not a programming language?
a) Python
b) HTML
c) Java
d) C++
Answer: b) HTML
22. What does 'HTML' stand for?
a) HyperText Markup Language
b) HighText Machine Language
c) HyperText Markdown Language
d) HyperTool Markup Language
Answer: a) HyperText Markup Language
23. Which symbol is used to end a statement in C language?
a) .
b) ;
c) :
d) ,
Answer: b) ;
24. What is the full form of IDE in programming?
a) Integrated Development Environment
b) Integrated Design Environment
c) Initial Development Engine
d) Interactive Development Editor
Answer: a) Integrated Development Environment
25. In Python, what data type does the function type(3.14) return?
a) int
b) float
c) str
d) complex
Answer: b) float
Cybersecurity
26. A computer program that replicates itself is called a:
a) Trojan
b) Virus
c) Worm
d) Spyware
Answer: c) Worm
27. What does SSL stand for?
a) Secure Socket Layer
b) Secured System Link
c) System Security Level
d) Secure Server Layer
Answer: a) Secure Socket Layer
28. What is the purpose of a firewall?
a) To enhance hardware performance
b) To block unauthorized access
c) To repair system errors
d) To encrypt data
Answer: b) To block unauthorized access
29. Phishing attacks are targeted towards:
a) Hardware systems
b) Websites
c) Users' personal information
d) Network hardware
Answer: c) Users' personal information
30. Which of the following is NOT a type of malware?
a) Ransomware
b) Spyware
c) Adware
d) Firmware
Answer: d) Firmware
Would you like the next set of 50 questions or explanations for these answers?
4o
You said:
1. Computer Science (50%) Focus on topics that are frequently covered in NTS computer-related
exams: Basics of Computer Science Input/output devices, memory types (RAM, ROM, cache).
Data representation (binary, hexadecimal). Operating Systems Windows basics, Linux basics.
Functions of an operating system (process management, memory management). Networking
Internet basics, IP address, DNS, HTTP/HTTPS. Layers of OSI Model. MS Office Suite
Shortcuts for Word, Excel, and PowerPoint. Formulas in Excel, formatting in Word.
Cybersecurity Password security, phishing, malware, and firewalls. need NTS exam 50 mcqs
ChatGPT said:
ChatGPT
Here are 50 Computer Science MCQs tailored to NTS exams, covering the specified topics.
Basics of Computer Science
1. Which of the following is the brain of the computer?
a) RAM
b) CPU
c) ROM
d) Cache
Answer: b) CPU
2. What does RAM stand for?
a) Random Access Memory
b) Read-Only Memory
c) Random Allocation Memory
d) Read-Always Memory
Answer: a) Random Access Memory
3. Which of the following is an input device?
a) Printer
b) Monitor
c) Keyboard
d) Speaker
Answer: c) Keyboard
4. Which memory type is non-volatile?
a) RAM
b) ROM
c) Cache
d) Register
Answer: b) ROM
5. Binary code consists of:
a) 0s and 2s
b) 1s and 2s
c) 0s and 1s
d) 1s and 9s
Answer: c) 0s and 1s
6. Hexadecimal number system uses how many digits?
a) 8
b) 12
c) 16
d) 32
Answer: c) 16
7. What does the term 'bit' stand for?
a) Binary Term
b) Binary Digit
c) Bitwise Operation
d) Byte Unit
Answer: b) Binary Digit
8. Cache memory is used to:
a) Store frequently used data
b) Enhance ROM performance
c) Replace hard drives
d) Manage system errors
Answer: a) Store frequently used data
9. Which type of memory is used for temporary storage?
a) ROM
b) RAM
c) HDD
d) SSD
Answer: b) RAM
10. Which of the following is not an output device?
a) Printer
b) Monitor
c) Speaker
d) Keyboard
Answer: d) Keyboard
Operating Systems
11. Which operating system is open-source?
a) Windows
b) macOS
c) Linux
d) DOS
Answer: c) Linux
12. Which layer of an operating system interacts directly with hardware?
a) Shell
b) Kernel
c) Application
d) User Interface
Answer: b) Kernel
13. Which is an example of a mobile operating system?
a) Ubuntu
b) Android
c) Windows 10
d) macOS
Answer: b) Android
14. Which Windows feature allows users to manage files and folders?
a) Control Panel
b) Task Manager
c) File Explorer
d) Command Prompt
Answer: c) File Explorer
15. The primary purpose of an operating system is to:
a) Perform calculations
b) Manage hardware and software resources
c) Design software applications
d) Edit videos
Answer: b) Manage hardware and software resources
16. What is the command to list files in Linux?
a) list
b) dir
c) ls
d) show
Answer: c) ls
17. Virtual memory is a feature of:
a) Hardware
b) Operating System
c) Network
d) BIOS
Answer: b) Operating System
18. In Windows, what does Ctrl+Alt+Del do?
a) Shuts down the computer
b) Opens Task Manager
c) Restarts the computer
d) Opens File Explorer
Answer: b) Opens Task Manager
19. Which is a feature of multitasking operating systems?
a) Executes one program at a time
b) Supports multiple users simultaneously
c) Executes multiple programs concurrently
d) Does not require user interaction
Answer: c) Executes multiple programs concurrently
20. Which Linux command is used to display the current directory?
a) pwd
b) cd
c) mkdir
d) locate
Answer: a) pwd
Networking
21. What does DNS stand for?
a) Domain Network System
b) Distributed Name Service
c) Domain Name System
d) Data Network System
Answer: c) Domain Name System
22. What does HTTP stand for?
a) HyperText Transfer Protocol
b) High Text Transfer Protocol
c) HyperTool Text Protocol
d) HyperText Transfer Process
Answer: a) HyperText Transfer Protocol
23. Which layer of the OSI model is responsible for routing?
a) Transport
b) Network
c) Data Link
d) Application
Answer: b) Network
24. What is the IP address range of Class A?
a) 0.0.0.0 to 127.255.255.255
b) 128.0.0.0 to 191.255.255.255
c) 192.0.0.0 to 223.255.255.255
d) 224.0.0.0 to 239.255.255.255
Answer: a) 0.0.0.0 to 127.255.255.255
25. Which device is used to connect multiple networks?
a) Switch
b) Hub
c) Router
d) Repeater
Answer: c) Router
26. Which protocol is used for sending emails?
a) FTP
b) SMTP
c) HTTP
d) IMAP
Answer: b) SMTP
27. Which layer of the OSI model encrypts data?
a) Network
b) Presentation
c) Session
d) Data Link
Answer: b) Presentation
28. Which IP version has an address size of 128 bits?
a) IPv4
b) IPv5
c) IPv6
d) IPv7
Answer: c) IPv6
29. What is the purpose of a subnet mask?
a) To secure a network
b) To define network and host portions of an IP address
c) To assign IP addresses
d) To block unauthorized access
Answer: b) To define network and host portions of an IP address
30. Which of the following is a private IP address?
a) 192.168.1.1
b) 172.16.0.1
c) 10.0.0.1
d) All of the above
Answer: d) All of the above
MS Office Suite
31. Which shortcut is used to save a file in MS Word?
a) Ctrl + S
b) Ctrl + C
c) Ctrl + X
d) Ctrl + Z
Answer: a) Ctrl + S
32. In Excel, what does the formula =SUM(A1:A5) do?
a) Multiplies values in A1 to A5
b) Subtracts values in A1 to A5
c) Adds values in A1 to A5
d) Divides values in A1 to A5
Answer: c) Adds values in A1 to A5
33. Which is the default file extension for MS Word documents?
a) .docx
b) .pdf
c) .xlsx
d) .pptx
Answer: a) .docx
34. Which MS Office application is used to create presentations?
a) MS Word
b) MS Excel
c) MS PowerPoint
d) MS Access
Answer: c) MS PowerPoint
35. Which shortcut is used to undo an action in MS Word?
a) Ctrl + Y
b) Ctrl + Z
c) Ctrl + X
d) Ctrl + V
Answer: b) Ctrl + Z
Cybersecurity
36. Which of the following is an example of malware?
a) Antivirus
b) Firewall
c) Trojan Horse
d) VPN
Answer: c) Trojan Horse
37. What does SSL stand for?
a) Secure Socket Layer
b) Secure Server Link
c) System Secure Layer
d) Socket Security Line
Answer: a) Secure Socket Layer
38. What is the purpose of a firewall?
a) Encrypt data
b) Block unauthorized access
c) Speed up the network
d) Improve hardware performance
Answer: b) Block unauthorized access
39. Which attack tricks users into revealing confidential information?
a) Phishing
b) Malware
c) Ransomware
d) Spoofing
Answer: a) Phishing
40. Strong passwords should include:
a) Only letters
b) Only numbers
c) A combination of letters, numbers, and special characters
d) Only uppercase letters
Answer: c) A combination of letters, numbers, and special characters