60 Objective Questions in Computer Science
History & Basics
1. Who is regarded as the father of computers?
A. Charles Babbage
B. Alan Turing
C. John von Neumann
D. Bill Gates
2. The first generation of computers used:
A. Transistors
B. Vacuum tubes
C. Microprocessors
D. Integrated circuits
3. Which of the following is not an input device?
A. Keyboard
B. Monitor
C. Mouse
D. Scanner
4. The brain of the computer is the:
A. RAM
B. CPU
C. Hard disk
D. Monitor
5. Which number system do computers use?
A. Decimal
B. Binary
C. Octal
D. Hexadecimal
Hardware
6. The main memory of a computer is called:
A. Hard disk
B. RAM
C. ROM
D. Cache
7. The storage that retains data after power is switched off is:
A. RAM
B. Cache
C. ROM
D. Registers
8. The permanent instructions stored in a computer are called:
A. RAM
B. ROM
C. BIOS
D. Cache
9. An example of secondary storage is:
A. RAM
B. Cache
C. Hard disk
D. Registers
10. The unit that controls all computer operations is:
A. Memory Unit
B. Control Unit
C. ALU
D. I/O Unit
Software
11. Software that manages computer hardware is:
A. Application software
B. System software
C. Utility software
D. Package software
12. MS Word is an example of:
A. Operating system
B. Application software
C. Utility software
D. System software
13. The operating system is responsible for:
A. File management
B. Memory management
C. Process management
D. All of the above
14. Which of the following is an open-source OS?
A. Windows
B. macOS
C. Linux
D. MS-DOS
15. Which software translates high-level language into machine language?
A. Compiler
B. Assembler
C. Interpreter
D. All of the above
Programming
16. The first high-level programming language was:
A. C
B. COBOL
C. FORTRAN
D. BASIC
17. In C, the symbol “//” is used for:
A. Division
B. Comment
C. Multiplication
D. Loop
18. A variable in programming is:
A. A fixed value
B. A location in memory that stores data
C. A type of operator
D. A programming error
19. Which of the following is a low-level language?
A. Assembly language
B. Python
C. Java
D. C++
20. The error that occurs when rules of programming language are violated is:
A. Syntax error
B. Runtime error
C. Logical error
D. System error
Data & Databases
21. DBMS stands for:
A. Data Basic Management System
B. Database Management System
C. Digital Base Main System
D. Database Mainframe System
22. SQL is used for:
A. Web design
B. Database management
C. Networking
D. Operating systems
23. The rows in a database table are called:
A. Fields
B. Records
C. Attributes
D. Columns
24. A primary key in a database is:
A. A duplicate value
B. A unique identifier
C. A foreign key
D. A null value
25. Which of the following is a DBMS software?
A. Oracle
B. Excel
C. Word
D. PowerPoint
Internet & Networking
26. The full meaning of URL is:
A. Uniform Resource Locator
B. Universal Resource Link
C. Unique Record Locator
D. Unified Resource Link
27. The network that connects computers within a building is:
A. WAN
B. MAN
C. LAN
D. VPN
28. The device that connects different networks together is:
A. Switch
B. Hub
C. Router
D. Repeater
29. The Internet was first developed by:
A. Microsoft
B. DARPA (US Defense)
C. IBM
D. Apple
30. The “http” in a web address stands for:
A. Hyper Transfer Text Protocol
B. Hyper Text Transfer Protocol
C. High Transfer Text Protocol
D. Hyper Text Transport Protocol
Cybersecurity
31. Unauthorized access to computer systems is called:
A. Debugging
B. Hacking
C. Coding
D. Networking
32. A program that replicates itself and damages files is:
A. Virus
B. Worm
C. Trojan horse
D. Malware
33. A firewall is used to:
A. Prevent computer viruses
B. Block unauthorized access
C. Speed up internet
D. Encrypt data
34. Phishing is:
A. Sending fake emails to steal information
B. Making backup copies
C. Software debugging
D. Encrypting files
35. Which of the following is an example of biometric security?
A. Password
B. PIN
C. Fingerprint
D. Captcha
Data Representation
36. 1 byte =
A. 2 bits
B. 4 bits
C. 8 bits
D. 16 bits
37. The binary equivalent of decimal 5 is:
A. 100
B. 101
C. 110
D. 111
38. The smallest unit of data in a computer is:
A. Bit
B. Byte
C. Word
D. Nibble
39. ASCII is used for:
A. Image compression
B. Character representation
C. Video coding
D. Sound recording
40. The hexadecimal system is based on:
A. 2
B. 8
C. 10
D. 16
Algorithms & Logic
41. An algorithm is:
A. A step-by-step procedure for solving a problem
B. A programming language
C. A software tool
D. A type of error
42. A flowchart uses:
A. Symbols to represent steps
B. Code to solve problems
C. Database tables
D. Network diagrams
43. The loop that executes at least once is:
A. For loop
B. While loop
C. Do-while loop
D. Infinite loop
44. A decision symbol in a flowchart is represented by:
A. Rectangle
B. Diamond
C. Circle
D. Triangle
45. The logical operator AND gives output “true” only when:
A. Both inputs are false
B. Both inputs are true
C. One input is true
D. One input is false
Emerging Technologies
46. AI stands for:
A. Automated Internet
B. Artificial Intelligence
C. Automatic Input
D. Advanced Information
47. Cloud computing provides:
A. Hardware only
B. Software only
C. On-demand computing resources
D. Local storage
48. IoT stands for:
A. Internet of Technology
B. Interconnection of Things
C. Internet of Things
D. Input-output Technology
49. A blockchain is primarily used in:
A. Online games
B. Cryptocurrencies
C. Cloud storage
D. Web browsing
50. Virtual reality uses:
A. 3D environments
B. Text-only interfaces
C. Binary codes
D. Cloud servers
Miscellaneous
51. The shortcut Ctrl + C is used for:
A. Paste
B. Copy
C. Cut
D. Close
52. Which of these is not an operating system?
A. Android
B. Windows
C. Photoshop
D. Linux
53. Spreadsheet software is mainly used for:
A. Document writing
B. Image editing
C. Calculations
D. Database queries
54. The expansion of ICT is:
A. Information and Computer Technology
B. Information and Communication Technology
C. International Computer Technology
D. Integrated Communication Technology
55. The device used to project computer output on a large screen is:
A. Printer
B. Projector
C. Scanner
D. Monitor
56. HTML is used for:
A. Web designing
B. Database management
C. Operating systems
D. Programming robots
57. The first web browser was:
A. Internet Explorer
B. Mosaic
C. Chrome
D. Safari
58. The shortcut Ctrl + Z is used for:
A. Undo
B. Redo
C. Save
D. Delete
59. A collection of interconnected computers globally is called:
A. Intranet
B. LAN
C. Internet
D. Extranet
60. The future computer technology based on quantum mechanics is called:
A. AI
B. Quantum computing
C. Nanotechnology
D. Cloud computing