Computer Literacy MCQ Quiz - Objective Question with Answer for Computer Literacy - Download Free PDF
Last updated on Jun 23, 2025
Latest Computer Literacy MCQ Objective Questions
Computer Literacy Question 1:
Which of the following hardware components will lose data when the power to a computer is switched off?
A. Processor Registers
B. Cache Memory
C. SSD
D. RAM
E. ROM
Choose the correct answer from the options given below:
Answer (Detailed Solution Below)
Computer Literacy Question 1 Detailed Solution
The correct answer is option 4) A, B, and D only.
Important Points
Primary storage:
- Primary storage is the volatile storing mechanism of a computer system.
- It can refer to random access memory (RAM), and processor. cache memory, or data buses, but it is most often connected with RAM.
- Primary storage is Fast and expensive as compared to secondary storage.
- The primary memory (hard drive, RAM) is where the operating system is stored.
Processor Registers:
- Processor registers are small, high-speed memory locations within the processor that hold data for quick access.
- They are used by the processor to store data that is frequently accessed, such as the current instruction being executed or the results of calculations.
- Registers are volatile, meaning they require power to retain their data.
- When power is lost, the data held in the registers is lost as well.
- Registers are an essential part of the processor, and the number performance of the processor and the size of the registers can impact the processor.
Cache Memory:
- Cache memory is a small amount of high-speed memory that is used to temporarily store frequently accessed data.
- The purpose of cache memory is to speed up data access and reduce the number of times data needs to be retrieved from slower memory such as RAM or storage devices.
- Like processor registers, cache memory is volatile and requires power to retain its data. When power is lost, the data held in the cache memory is lost as well.
- There are different levels of cache memory, with each level providing a larger but slower cache that is accessed if the smaller, faster cache does not have the requested data.
RAM:
- RAM stands for Random Access Memory, which is the main memory of a computer.
- RAM is volatile, meaning it requires power to retain its data. When power is lost, the data held in RAM is lost as well.
- RAM is used by the processor to store data that is currently being used by the computer, such as applications and open files.
- The amount of RAM in a computer can impact its performance, as more RAM allows the computer to handle more data at once
Therefore, the correct answer is option 4) A, B, and D only, as these are the hardware components that will lose data when the power to a computer is switched off.
Additional Information
Secondary storage:
- Secondary storage is non-volatile, permanent memory that is not immediately accessible by a computer or processor.
- It enables users to store data and information that can be quickly and conveniently retrieved, communicated, and used by apps and services.
- Secondary memory can be external devices such as CDs, floppy magnetic discs, and so on.
- Secondary storage is also known as external memory storage since it cannot be accessed directly by the CPU.
SSD:
- SSD stands for Solid State Drive, which is a type of non-volatile storage device that uses flash memory to store data.
- Unlike traditional hard disk drives (HDDs), SSDs do not have any moving parts, which makes them faster and more reliable.
- SSDs are non-volatile, meaning they do not require power to retain their data. When power is lost, the data stored on an SSD will not be lost.
- SSDs are commonly used in laptops and desktops as well as other electronic devices such as cameras and smartphones
ROM:
- ROM stands for Read-Only Memory, which is a type of non-volatile memory used to store firmware and other essential system software.
- Unlike RAM, ROM is not typically used for storing data that changes frequently.
- ROM does not require power to retain its data, so the data stored on it will not be lost when the power is switched off.
- ROM is used to store the BIOS (Basic Input/Output System) firmware, which is essential to boot the computer and start up the operating system.
Computer Literacy Question 2:
Which one of the following is a type of malware embedded in a program on a computer that will set off a malicious function when certain conditions are met?
Answer (Detailed Solution Below)
Computer Literacy Question 2 Detailed Solution
Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.
Key Points
- A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
- Software that is inherently malicious, such as viruses and worms, often contains logic bombs that execute a certain payload at a pre-defined time or when some other condition is met.
- To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software.
Additional Information
- Worm- A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
- Trojan- A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
- Spyware- Spyware is a type of malware that collects personal information and gathers data about a person without consent. Viruses are a type of malicious software designed to spread from one device to another devices.
Hence, a Logic Bomb is the type of malware embedded in a program on a computer that will set off a malicious function when certain conditions are met.
Computer Literacy Question 3:
The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed as:
Answer (Detailed Solution Below)
Computer Literacy Question 3 Detailed Solution
The correct answer is Spoofing.
Key PointsSpoofing:
- The practice of forging a return address on an email to deceive the recipient into revealing private information is commonly known as "email spoofing."
- In email spoofing, the sender alters the email header information, including the "From" field, to make it appear as if the email is originating from a different source than the actual sender.
- This technique is often used in phishing attacks, where the attacker aims to trick recipients into disclosing sensitive information such as passwords, financial details, or personal information by posing as a trustworthy entity.
- It is important to be cautious and verify the authenticity of emails, especially when they request sensitive information or seem suspicious in nature.
Additional InformationHacking: Hacking refers to the act of gaining unauthorized access to computer systems, networks, or digital devices. Hackers, also known as ethical hackers or malicious hackers (depending on their intentions), use their technical knowledge and skills to exploit vulnerabilities in computer systems for various purposes. Hacking can involve activities such as circumventing security measures, stealing data, modifying or damaging systems or gaining control over a network or device.
Cracking: Cracking is a term often used interchangeably with hacking, but it specifically refers to breaking the security mechanisms of software, primarily for illegal purposes. Cracking involves removing or bypassing copy protection or licensing restrictions on software, allowing it to be used without proper authorization or payment. It is commonly associated with software piracy and copyright infringement.
Dumpster Diving: Dumpster diving involves searching through trash or discarded materials to extract valuable information. In the context of information security, dumpster diving specifically refers to individuals or attackers going through dumpsters or trash bins to find discarded documents, files, or electronic devices that may contain sensitive or confidential information. This information can be used for identity theft, fraud, or other malicious purposes.
Computer Literacy Question 4:
Pihu is regularly connecting her mobile phone and her computer for taking backup. Which of the following types of networks do you thinks she is using for the same?
Answer (Detailed Solution Below)
Computer Literacy Question 4 Detailed Solution
A computer network is a collection of two or more networked computers.
Key Points
- A computer network connection can be created using either cable or wireless media used for sharing files and resources.
- There are various types of networks: Personal Area Network (PAN), Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN).
- A Personal Area Network is built around one individual.
- It includes a computer, a phone, or a personal digital assistant.
- PAN can be used to connect these personal gadgets to a digital network and the internet by establishing communication between them.
Thus, PAN types of networks she is using for taking backups.Additional Information
- WAN is a computer network that is spread over a big geographic area.
- MAN is a computer network spanning an entire city, a college campus, or a small area.
- LAN is a group of computers and related peripherals that are interconnected in a constrained space.
Computer Literacy Question 5:
Given below are two statements :
Statement I: “Disk defragmentation’ makes files that are contiguous in a disk as fragmented.
Statement Il: A device controller that controls a device will deal with the operating system through device driver.
In the light of the above statements, choose the most appropriate answer from the options given below :
Answer (Detailed Solution Below)
Computer Literacy Question 5 Detailed Solution
The correct answer is - Statement I is false but Statement Il is true.
Key PointsStatement I: Disk defragmentation makes files that are contiguous in a disk as fragmented.
- Disk defragmentation is a process that reduces the amount of fragmentation in file systems.
- It physically organizes the contents of the disk to store the pieces of each file close together and contiguously.
- It aims to create larger regions of free space using compaction, to impede the return of fragmentation.
- So, rather than making files fragmented, disk defragmentation does the opposite by making files more contiguous.
- Hence, Statement I is incorrect.
Statement II: A device controller that controls a device will deal with the operating system through a device driver.
- In computer systems, a device controller is a hardware component that interfaces with a peripheral device.
- However, for the operating system to communicate with the device controller (and therefore the device), it uses a piece of software called a device driver.
- The device driver provides a standardized interface through which the operating system can issue commands to the device, abstracting away the hardware-specific details.
- Hence, Statement II is correct.
Top Computer Literacy MCQ Objective Questions
The speed of processor of a computer is measured in ____.
Answer (Detailed Solution Below)
Computer Literacy Question 6 Detailed Solution
Download Solution PDFthe correct answer is GigaHertz.
Key Points
- Clock speed:
- Clock speed is the significant way to measure the performance of Processor.
- CPU processes many instructions (low-level calculations like arithmetic) from different programs every second. The clock speed measures the number of cycles your CPU executes per second, measured in GHz (gigahertz).
- A “cycle” is technically a pulse synchronized by an internal oscillator, but for our purposes, they’re a basic unit that helps understand a CPU’s speed.
- During each cycle, billions of transistors within the processor open and close.
- A CPU with a clock speed of 3.2 GHz executes 3.2 billion cycles per second.
The main two components of CPU are ____________.
Answer (Detailed Solution Below)
Computer Literacy Question 7 Detailed Solution
Download Solution PDFThe correct answer is Control Unit and ALU.
- Computers have become pervasive in every walk of life.
- It has changed the way we work, play, communicate and learn.
- A computer essentially comprises of a set of hardware and software.
Key Points
The Central Processing Unit (CPU):
- The CPU is the brain of the computer.
- Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.
- The CPU executes the programs and controls the operation of all the hardware.
- The three main components of the CPU are:
The Control Unit (CU):
- It is one of the most important parts of the microprocessor as it is in charge of the entire process.
- The control unit extracts instructions from memory and decodes them.
- Based on these instructions, it creates control signals that tell the Arithmetic Logic Unit (ALU) and the Registers how to operate, what to operate on and what to do with the result.
- The role of the control unit in the CPU is that of a “manager”.
- In other words, it controls and coordinates all hardware operations.
The Arithmetic and Logic Unit (ALU):
- It is the section where the actual data processing takes place.
- All calculations and comparisons take place in this section.
- In addition to arithmetic functions, the ALU also handles logic operations.
- All mathematical operations are performed in binary numbers and all logic operations are performed using binary operations.
The Primary Memory (Main memory):
- This unit stores programs during their execution, stores data that are being used by the current program and stores the operating system which controls the operation of the computer system.
- It consists of Random Access Memory (RAM) where the user's programs and data must be stored in order to be run and Read-Only Memory (ROM) where permanent programs and data are built-in by the manufacturer.
Hence, it is clear that the Control Unit and ALU are the two main components of the CPU.
- BUS: It is a Data Communication System in a computer network. The ALU and CU that are linked internally and externally by busses which carry binary signals between.
- Register: They can be thought of as the CPU’s tiny scratchpad, temporarily storing instructions or data.
The ability to read and write each piece of information in a storage device in approximately the same length of time of its location is _____.
Answer (Detailed Solution Below)
Computer Literacy Question 8 Detailed Solution
Download Solution PDFThe correct answer is Random Access.
Key Points
- Random Access:
- In computer science, random access is the capability to have access to any item from a given population of elements at random.
- Random access is the opposite of sequential access, as sequential access locates elements by beginning at a particular predefined location and then traversing through all of the information in order to find the given item.
- Random access has gained interest due to the fact that one can retrieve a record irrespective of the position in which it is located.
- Random access is also known as direct access.
Given below are two statements
Statement I: Compilers are software
Statement II: Touch screen monitors are input/output devices
In light of the above statements, choose the most appropriate answer from the options given below
Answer (Detailed Solution Below)
Computer Literacy Question 9 Detailed Solution
Download Solution PDFCompilers:
- A compiler is a program that translates a source program written in some high-level programming language into machine code for some computer architecture.
- The generated machine code can be later executed many times against different data each time.
- It writes the text into a format that the CPU can understand
- This is a kind of system software
Touch screen monitors:
- This is a device that helps the user to interact with the computer using their finger
- It is an alternative to mouse and keyboard for navigating a Graphical User Interface (GUI)
- It allows tough sensitive inputs as well as outputs.
Therefore it is clear that Compilers are software and Touch screen monitors are input/output devices. So both the statements are true.
Which Operating System is used by the Apple computer systems (an American technology company)?
Answer (Detailed Solution Below)
Computer Literacy Question 10 Detailed Solution
Download Solution PDFAn operating system is a software program that manages and operates computing devices.
Key Points
- Mac OS is a powerful operating system that offers similar features and services to Windows and Linux.
- The Macintosh Operating System (Mac OS) is an operating system developed by Apple Inc.
- It is a graphical user interface-based operating system that was first published in 1984.
- Apple is an American-based company located in California.
- Mac OS is meant to run on Apple computers and does not support the x86 architecture by default.
- Mac OS has multiple versions available such as Macintosh 128k, Mac OS 7, Mac OS X, and Mac Mountain Lion.
Therefore, Mac is used by the Apple computer systems (an American technology company).
Additional Information
- Microsoft Windows, usually known as Windows or Windows OS, is a personal computer operating system developed by Microsoft Corporation.
- Linux is a collection of open-source Unix-like operating systems based on Linus Torvalds' Linux kernel which was launched on September 17, 1991.
- Oracle Solaris is also an operating system.
Identify the incorrect pair from the following:
Answer (Detailed Solution Below)
Computer Literacy Question 11 Detailed Solution
Download Solution PDFFile Format | File Extension |
Word Text Document File | .txt |
Microsoft Word document (the original official) | .doc |
The Portable Document Format | |
Microsoft Word document (the newer version of DOC) | .docx |
PNG (Portable Network Graphics) Format | .png |
PowerPoint Picture Presentation | .pptx |
Microsoft Excel Spreadsheets | .xls |
PowerPoint 97-2003 Presentation | .ppt |
The third audio format of the MPEG-1 standard | .mp3 |
JPEG (Joint Photographic Experts Group) FileFormat | .jpg |
Waveform Audio File Format | .wav |
Executable file | .exe |
MPEG-4 Video | .mp4 |
GIF (Graphics Interchange Format) | .gif |
Tagged Image File Format | .tiff |
Hence, the incorrect pair is .ttf - word text file.
Which of the following hardware holds together the various important components of a computer such as the CPU, memory, and input/output devices?
Answer (Detailed Solution Below)
Computer Literacy Question 12 Detailed Solution
Download Solution PDFMotherboard:
- The Motherboard is the main circuit board for the computer, containing both soldered, nonremovable components along with sockets or slots for components that can be removed.
- The motherboard holds the CPU, RAM and ROM chips, etc.
Additional Information
- The Arithmetic Logic Unit (ALU) performs arithmetic operations (such as addition and subtraction) and logical operations (such as comparing two values).
- The Control Unit deciphers and carries out instructions.
- A hard disk is similar to a floppy disk but uses metal platters to store information. Hard disks are not only much faster than floppy disks but can hold huge amounts of data (hundreds of gigabytes).
Hence, only motherboard holds together the various important components of a computer such as the CPU, memory, and input/output devices
Which one of the following electronic technologies is the key technology for making the first generation computers?
Answer (Detailed Solution Below)
Computer Literacy Question 13 Detailed Solution
Download Solution PDFThe vacuum tube is the key technology for making first-generation computers.
Key PointsVaccumTube:
- The first generation computers used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms.
- Lee De Forest developed the vacuum tube.
- A vacuum tube is a device generally used to amplify a signal by controlling the movement of electrons in an evacuated space.
Additional InformationTransistor- It is an electronic component that can be used as an amplifier or as a switch. It is used to control the flow of electricity in radios, televisions, computers, and others.
Integrated Circuit- A small electronic circuit printed on a chip (usually made of silicon) contains many of its own circuits element.
Dual-Core CPU- Dual-core is a CPU that has two distinct processors that work simultaneously in the same integrated circuit. This type of processor can function as efficiently as a single processor but can perform operations up to twice as quickly. Because each core has its own cache, the operating system is able to handle most tasks in parallel.
Hence, the Vacuum Tube is the key technology for making first-generation computers.
A type of memory that holds the computer startup routine is
Answer (Detailed Solution Below)
Computer Literacy Question 14 Detailed Solution
Download Solution PDFThe correct answer is Read-Only Memory (ROM)
Key Points
- ROM stands for Read-Only Memory.
- ROM is a storage device that is used with computers and other electronic devices.
- Data stored in ROM may only be read.
- ROM is used for firmware updates, which means It contains the basic instructions for what needs to happen when a computer is powered on.
- Firmware is also known as BIOS, or basic input/output system.
- ROM is non-volatile storage, which means the information is maintained even if the component loses power.
- ROM is located on a BIOS chip which is plugged into the motherboard.
- ROM plays a critical part in booting up or starting up, your computer.
Important Points
Terminologies | Characteristics |
Random Access Memory (RAM) |
|
Dynamic random access memory (DRAM) |
|
Cache |
|
Which of the following is an example of system software?
Answer (Detailed Solution Below)
Computer Literacy Question 15 Detailed Solution
Download Solution PDFThe correct answer is Compiler.
Key Points
- System software is generally prepared by computer manufacturers.
- These software products comprise programs written in low-level languages, which interact with the hardware at a very basic level.
- System software serves as the interface between the hardware and the end-users.
- Compilers translate coded programs written in high-level languages into machine instructions that can be understood by processors.
- System software, such as operating systems, hypervisors, and distributed protocols, are also essential components of modern computing systems.
Hence, the correct answer is Compiler.