Computer Literacy MCQ Quiz - Objective Question with Answer for Computer Literacy - Download Free PDF

Last updated on Jun 23, 2025

Latest Computer Literacy MCQ Objective Questions

Computer Literacy Question 1:

Which of the following hardware components will lose data when the power to a computer is switched off?

A. Processor Registers

B. Cache Memory

C. SSD

D. RAM

E. ROM

Choose the correct answer from the options given below: 

  1. B and D only  
  2. A, C and D only  
  3. A, B and C only
  4. A, B and D only
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : A, B and D only

Computer Literacy Question 1 Detailed Solution

The correct answer is option 4) A, B, and D only. 

Important Points

Primary storage:

  • Primary storage is the volatile storing mechanism of a computer system.
  • It can refer to random access memory (RAM), and processor. cache memory, or data buses, but it is most often connected with RAM.
  • Primary storage is Fast and expensive as compared to secondary storage.
  • The primary memory (hard drive, RAM) is where the operating system is stored.

 Processor Registers:

  • Processor registers are small, high-speed memory locations within the processor that hold data for quick access.
  • They are used by the processor to store data that is frequently accessed, such as the current instruction being executed or the results of calculations.
  • Registers are volatile, meaning they require power to retain their data.
  • When power is lost, the data held in the registers is lost as well.
  • Registers are an essential part of the processor, and the number performance of the processor and the size of the registers can impact the processor.

Cache Memory:

  • Cache memory is a small amount of high-speed memory that is used to temporarily store frequently accessed data.
  • The purpose of cache memory is to speed up data access and reduce the number of times data needs to be retrieved from slower memory such as RAM or storage devices.
  • Like processor registers, cache memory is volatile and requires power to retain its data. When power is lost, the data held in the cache memory is lost as well.
  • There are different levels of cache memory, with each level providing a larger but slower cache that is accessed if the smaller, faster cache does not have the requested data.

RAM:

  • RAM stands for Random Access Memory, which is the main memory of a computer.
  • RAM is volatile, meaning it requires power to retain its data. When power is lost, the data held in RAM is lost as well.
  • RAM is used by the processor to store data that is currently being used by the computer, such as applications and open files.
  • The amount of RAM in a computer can impact its performance, as more RAM allows the computer to handle more data at once

Therefore, the correct answer is option 4) A, B, and D only, as these are the hardware components that will lose data when the power to a computer is switched off.

Additional Information

Secondary storage:

  • Secondary storage is non-volatile, permanent memory that is not immediately accessible by a computer or processor.
  • It enables users to store data and information that can be quickly and conveniently retrieved, communicated, and used by apps and services. 
  • Secondary memory can be external devices such as CDs, floppy magnetic discs, and so on.
  • Secondary storage is also known as external memory storage since it cannot be accessed directly by the CPU.

SSD:

  • SSD stands for Solid State Drive, which is a type of non-volatile storage device that uses flash memory to store data.
  • Unlike traditional hard disk drives (HDDs), SSDs do not have any moving parts, which makes them faster and more reliable.
  • SSDs are non-volatile, meaning they do not require power to retain their data. When power is lost, the data stored on an SSD will not be lost.
  • SSDs are commonly used in laptops and desktops as well as other electronic devices such as cameras and smartphones

ROM:

  • ROM stands for Read-Only Memory, which is a type of non-volatile memory used to store firmware and other essential system software.
  • Unlike RAM, ROM is not typically used for storing data that changes frequently.
  • ROM does not require power to retain its data, so the data stored on it will not be lost when the power is switched off.
  • ROM is used to store the BIOS (Basic Input/Output System) firmware, which is essential to boot the computer and start up the operating system.

Computer Literacy Question 2:

Which one of the following is a type of malware embedded in a program on a computer that will set off a malicious function when certain conditions are met?

  1. Worm
  2. Trojan
  3. Spyware
  4. Logic Bomb
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : Logic Bomb

Computer Literacy Question 2 Detailed Solution

Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.

 Key Points

  • A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
  • Software that is inherently malicious, such as viruses and worms, often contains logic bombs that execute a certain payload at a pre-defined time or when some other condition is met.
  • To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software.

 Additional Information

  • Worm- A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
  • Trojan- A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
  • Spyware- Spyware is a type of malware that collects personal information and gathers data about a person without consent. Viruses are a type of malicious software designed to spread from one device to another devices.

Hence, a Logic Bomb is the type of malware embedded in a program on a computer that will set off a malicious function when certain conditions are met.

Computer Literacy Question 3:

The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed as:

  1. Hacking
  2. Cracking
  3. Dumpster diving
  4. Spoofing
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : Spoofing

Computer Literacy Question 3 Detailed Solution

The correct answer is Spoofing.

Key PointsSpoofing: 

  • The practice of forging a return address on an email to deceive the recipient into revealing private information is commonly known as "email spoofing."
  • In email spoofing, the sender alters the email header information, including the "From" field, to make it appear as if the email is originating from a different source than the actual sender.
  • This technique is often used in phishing attacks, where the attacker aims to trick recipients into disclosing sensitive information such as passwords, financial details, or personal information by posing as a trustworthy entity.
  • It is important to be cautious and verify the authenticity of emails, especially when they request sensitive information or seem suspicious in nature.

Additional InformationHacking: Hacking refers to the act of gaining unauthorized access to computer systems, networks, or digital devices. Hackers, also known as ethical hackers or malicious hackers (depending on their intentions), use their technical knowledge and skills to exploit vulnerabilities in computer systems for various purposes. Hacking can involve activities such as circumventing security measures, stealing data, modifying or damaging systems or gaining control over a network or device.

Cracking: Cracking is a term often used interchangeably with hacking, but it specifically refers to breaking the security mechanisms of software, primarily for illegal purposes. Cracking involves removing or bypassing copy protection or licensing restrictions on software, allowing it to be used without proper authorization or payment. It is commonly associated with software piracy and copyright infringement.

Dumpster Diving: Dumpster diving involves searching through trash or discarded materials to extract valuable information. In the context of information security, dumpster diving specifically refers to individuals or attackers going through dumpsters or trash bins to find discarded documents, files, or electronic devices that may contain sensitive or confidential information. This information can be used for identity theft, fraud, or other malicious purposes.

Computer Literacy Question 4:

Pihu is regularly connecting her mobile phone and her computer for taking backup. Which of the following types of networks do you thinks she is using for the same? 

  1. LAN
  2. PAN
  3. MAN
  4. WAN
  5. None of the above

Answer (Detailed Solution Below)

Option 2 : PAN

Computer Literacy Question 4 Detailed Solution

​A computer network is a collection of two or more networked computers. 

Key Points

  • A computer network connection can be created using either cable or wireless media used for sharing files and resources. 
  • There are various types of networks: Personal Area Network (PAN), Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN). 
  • A Personal Area Network is built around one individual.
  • It includes a computer, a phone, or a personal digital assistant.
  • PAN can be used to connect these personal gadgets to a digital network and the internet by establishing communication between them.

Thus, PAN types of networks she is using for taking backups.Additional Information

  •  WAN is a computer network that is spread over a big geographic area. 
  • MAN is a computer network spanning an entire city, a college campus, or a small area. 
  • LAN is a group of computers and related peripherals that are interconnected in a constrained space. 

Computer Literacy Question 5:

Given below are two statements :

Statement I: “Disk defragmentation’ makes files that are contiguous in a disk as fragmented.

Statement Il: A device controller that controls a device will deal with the operating system through device driver.

In the light of the above statements, choose the most appropriate answer from the options given below :  

  1. Both Statement I and Statement II are true 
  2. Both Statement I and Statement II are false 
  3. Statement I is true but Statement II is false  
  4. Statement I is false but Statement Il is true 
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : Statement I is false but Statement Il is true 

Computer Literacy Question 5 Detailed Solution

The correct answer is - Statement I is false but Statement Il is true.

Key PointsStatement I: Disk defragmentation makes files that are contiguous in a disk as fragmented.

  • Disk defragmentation is a process that reduces the amount of fragmentation in file systems.
  • It physically organizes the contents of the disk to store the pieces of each file close together and contiguously.
  • It aims to create larger regions of free space using compaction, to impede the return of fragmentation.
  • So, rather than making files fragmented, disk defragmentation does the opposite by making files more contiguous.
  • Hence, Statement I is incorrect.

Statement II: A device controller that controls a device will deal with the operating system through a device driver.

  • In computer systems, a device controller is a hardware component that interfaces with a peripheral device.
  • However, for the operating system to communicate with the device controller (and therefore the device), it uses a piece of software called a device driver.
  • The device driver provides a standardized interface through which the operating system can issue commands to the device, abstracting away the hardware-specific details.
  • Hence, Statement II is correct.

Top Computer Literacy MCQ Objective Questions

The speed of processor of a computer is measured in ____.

  1. Gigahertz 
  2. Baud
  3. BPS
  4. MIPS

Answer (Detailed Solution Below)

Option 1 : Gigahertz 

Computer Literacy Question 6 Detailed Solution

Download Solution PDF

the correct answer is ​GigaHertz.

Key Points

  • Clock speed:
    • Clock speed is the significant way to measure the performance of Processor.
    • CPU processes many instructions (low-level calculations like arithmetic) from different programs every second. The clock speed measures the number of cycles your CPU executes per second, measured in GHz (gigahertz).
    • A “cycle” is technically a pulse synchronized by an internal oscillator, but for our purposes, they’re a basic unit that helps understand a CPU’s speed.
    • During each cycle, billions of transistors within the processor open and close.
    • A CPU with a clock speed of 3.2 GHz executes 3.2 billion cycles per second.

The main two components of CPU are ____________.

  1. control unit and ALU
  2. ALU and BUS
  3. Control unit and register
  4. Registers and main memory

Answer (Detailed Solution Below)

Option 1 : control unit and ALU

Computer Literacy Question 7 Detailed Solution

Download Solution PDF

The correct answer is Control Unit and ALU.

  • Computers have become pervasive in every walk of life.
  • It has changed the way we work, play, communicate and learn.
  • A computer essentially comprises of a set of hardware and software.

Key Points

The Central Processing Unit (CPU):

  • The CPU is the brain of the computer.
  • Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.
  • The CPU executes the programs and controls the operation of all the hardware.
  • The three main components of the CPU are:

The Control Unit (CU):

  • It is one of the most important parts of the microprocessor as it is in charge of the entire process.
  • The control unit extracts instructions from memory and decodes them.
  • Based on these instructions, it creates control signals that tell the Arithmetic Logic Unit (ALU) and the Registers how to operate, what to operate on and what to do with the result.
  • The role of the control unit in the CPU is that of a “manager”.
  • In other words, it controls and coordinates all hardware operations.

The Arithmetic and Logic Unit (ALU):

  • It is the section where the actual data processing takes place.
  • All calculations and comparisons take place in this section.
  • In addition to arithmetic functions, the ALU also handles logic operations.
  • All mathematical operations are performed in binary numbers and all logic operations are performed using binary operations.

The Primary Memory (Main memory):

  • This unit stores programs during their execution, stores data that are being used by the current program and stores the operating system which controls the operation of the computer system.
  • It consists of Random Access Memory (RAM) where the user's programs and data must be stored in order to be run and Read-Only Memory (ROM) where permanent programs and data are built-in by the manufacturer.

Hence, it is clear that the Control Unit and ALU are the two main components of the CPU.

quesImage185

  • BUS: It is a Data Communication System in a computer network. The ALU and CU that are linked internally and externally by busses which carry binary signals between.
  • Register: They can be thought of as the CPU’s tiny scratchpad, temporarily storing instructions or data.

The ability to read and write each piece of information in a storage device in approximately the same length of time of its location is _____.

  1. Sequential Access
  2. Raster scan
  3. Search
  4. Random Access

Answer (Detailed Solution Below)

Option 4 : Random Access

Computer Literacy Question 8 Detailed Solution

Download Solution PDF

The correct answer is Random Access.

Key Points

  • Random Access:
    • In computer science, random access is the capability to have access to any item from a given population of elements at random.
    • Random access is the opposite of sequential access, as sequential access locates elements by beginning at a particular predefined location and then traversing through all of the information in order to find the given item.
    • Random access has gained interest due to the fact that one can retrieve a record irrespective of the position in which it is located.
    • Random access is also known as direct access.

Given below are two statements

Statement I: Compilers are software

Statement II: Touch screen monitors are input/output devices

In light of the above statements, choose the most appropriate answer from the options given below

  1. Both Statement I and Statement II are true
  2. Both Statement I and Statement II are false
  3. Statement I i true but Statement II is false
  4. Statement I is false but Statement II is true

Answer (Detailed Solution Below)

Option 1 : Both Statement I and Statement II are true

Computer Literacy Question 9 Detailed Solution

Download Solution PDF

Compilers:

  • A compiler is a program that translates a source program written in some high-level programming language into machine code for some computer architecture.
  • The generated machine code can be later executed many times against different data each time.
  • It writes the text into a format that the CPU can understand
  • This is a kind of system software

F1 Shraddha Pratiksha 21.01.2021 D2

Touch screen monitors:

  • This is a device that helps the user to interact with the computer using their finger
  • It is an alternative to mouse and keyboard for navigating a Graphical User Interface (GUI)
  • It allows tough sensitive inputs as well as outputs.

Therefore it is clear that Compilers are software and Touch screen monitors are input/output devices. So both the statements are true.

Which Operating System is used by the Apple computer systems (an American technology company)? 

  1. Linux
  2. Windows
  3. Solaris
  4. Mac

Answer (Detailed Solution Below)

Option 4 : Mac

Computer Literacy Question 10 Detailed Solution

Download Solution PDF

An operating system is a software program that manages and operates computing devices.

Key Points

  •  Mac OS is a powerful operating system that offers similar features and services to Windows and Linux. 
  • The Macintosh Operating System (Mac OS) is an operating system developed by Apple Inc.
  • It is a graphical user interface-based operating system that was first published in 1984.
  • Apple is an American-based company located in California. 
  • Mac OS is meant to run on Apple computers and does not support the x86 architecture by default.
  • Mac OS has multiple versions available such as Macintosh 128k, Mac OS 7, Mac OS X, and Mac Mountain Lion.

Therefore, Mac is used by the Apple computer systems (an American technology company).

Additional Information

  • Microsoft Windows, usually known as Windows or Windows OS, is a personal computer operating system developed by Microsoft Corporation.
  • Linux is a collection of open-source Unix-like operating systems based on Linus Torvalds' Linux kernel which was launched on September 17, 1991.
  • Oracle Solaris is also an operating system. 

Identify the incorrect pair from the following:

  1. .jpg - graphic file
  2. .ttf - word text file
  3. .wav - audio file
  4. .exe - executable file 

Answer (Detailed Solution Below)

Option 2 : .ttf - word text file

Computer Literacy Question 11 Detailed Solution

Download Solution PDF
File Format File Extension
Word Text Document File .txt
Microsoft Word document (the original official) .doc
The Portable Document Format  .pdf
Microsoft Word document (the newer version of DOC) .docx
PNG (Portable Network Graphics) Format .png
PowerPoint Picture Presentation .pptx
Microsoft Excel Spreadsheets .xls
PowerPoint 97-2003 Presentation .ppt
The third audio format of the MPEG-1 standard .mp3
JPEG (Joint Photographic Experts Group) FileFormat .jpg
Waveform Audio File Format  .wav
Executable file .exe
MPEG-4 Video .mp4
GIF (Graphics Interchange Format) .gif
Tagged Image File Format .tiff

Hence,  the incorrect pair is .ttf - word text file.

Which of the following hardware holds together the various important components of a computer such as the CPU, memory, and input/output devices?

  1. Hard Disk Drive
  2. Motherboard
  3. Control Unit
  4. ALU

Answer (Detailed Solution Below)

Option 2 : Motherboard

Computer Literacy Question 12 Detailed Solution

Download Solution PDF
Key Points

Motherboard:

  • The Motherboard is the main circuit board for the computer, containing both soldered, nonremovable components along with sockets or slots for components that can be removed.
  • The motherboard holds the CPU, RAM and ROM chips, etc.

Additional Information

  • The Arithmetic Logic Unit (ALU) performs arithmetic operations (such as addition and subtraction) and logical operations (such as comparing two values).
  • The Control Unit deciphers and carries out instructions.
  • A hard disk is similar to a floppy disk but uses metal platters to store information. Hard disks are not only much faster than floppy disks but can hold huge amounts of data (hundreds of gigabytes).

Hence, only motherboard holds together the various important components of a computer such as the CPU, memory, and input/output devices

Which one of the following electronic technologies is the key technology for making the first generation computers?

  1. Transistor 
  2. Integrated circuit 
  3. Vacuum Tube 
  4. Dual-Core CPU 

Answer (Detailed Solution Below)

Option 3 : Vacuum Tube 

Computer Literacy Question 13 Detailed Solution

Download Solution PDF

The vacuum tube is the key technology for making first-generation computers.

Key PointsVaccumTube:

  • The first generation computers used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms.
  • Lee De Forest developed the vacuum tube.
  • A vacuum tube is a device generally used to amplify a signal by controlling the movement of electrons in an evacuated space.​

Additional InformationTransistor-  It is an electronic component that can be used as an amplifier or as a switch. It is used to control the flow of electricity in radios, televisions, computers, and others.

Integrated Circuit- A small electronic circuit printed on a chip (usually made of silicon) contains many of its own circuits element.

Dual-Core CPU- Dual-core is a CPU that has two distinct processors that work simultaneously in the same integrated circuit. This type of processor can function as efficiently as a single processor but can perform operations up to twice as quickly. Because each core has its own cache, the operating system is able to handle most tasks in parallel.

Hence, the Vacuum Tube is the key technology for making first-generation computers.

A type of memory that holds the computer startup routine is

  1. cache
  2. RAM
  3. DRAM
  4. ROM

Answer (Detailed Solution Below)

Option 4 : ROM

Computer Literacy Question 14 Detailed Solution

Download Solution PDF

The correct answer is Read-Only Memory (ROM)

 

Key Points

  • ROM stands for Read-Only Memory.
  • ROM is a storage device that is used with computers and other electronic devices.
  • Data stored in ROM may only be read.
  • ROM is used for firmware updates, which means It contains the basic instructions for what needs to happen when a computer is powered on.
  • Firmware is also known as BIOS, or basic input/output system. 
  • ROM is non-volatile storage, which means the information is maintained even if the component loses power.
  • ROM is located on a BIOS chip which is plugged into the motherboard.
  • ROM plays a critical part in booting up or starting up, your computer.

Important Points

Terminologies Characteristics

Random Access Memory (RAM)

 
  • This memory allows writing as well as reading of data, unlike ROM which does not allow writing of data on to it.
  • It is volatile storage because the contents of RAM are lost when the power (computer) is turned off.
  • If you want to store the data for later use, you have to transfer all the contents to a secondary storage device.
Dynamic random access memory (DRAM)
  • It is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  •  DRAM is a common type of random access memory (RAM) that is used in personal computers (PCs), workstations and servers.
Cache
  • Cache primarily refers to a thing that is hidden or stored somewhere, or to the place where it is hidden.
  • It has recently taken on another common meaning, “short-term computer memory where information is stored for easy retrieval.”

Which of the following is an example of system software?

  1. Word processor
  2. Spredsheet
  3. Compiler
  4. Database-Management System (DBMS)

Answer (Detailed Solution Below)

Option 3 : Compiler

Computer Literacy Question 15 Detailed Solution

Download Solution PDF

The correct answer is Compiler.

Key Points

  • System software is generally prepared by computer manufacturers.
  • These software products comprise programs written in low-level languages, which interact with the hardware at a very basic level.
  • System software serves as the interface between the hardware and the end-users.
  • Compilers translate coded programs written in high-level languages into machine instructions that can be understood by processors.
  • System software, such as operating systems, hypervisors, and distributed protocols, are also essential components of modern computing systems.

Hence, the correct answer is Compiler.

Get Free Access Now
Hot Links: teen patti 100 bonus teen patti real cash game teen patti glory teen patti online game