Get Started

Computer Quiz Questions with Answers

Last year 4.2K Views

Computer Quiz Questions with answers is a form of assessment that tests one's knowledge of computers and related technology. It typically consists of a series of questions related to topics such as computer hardware, software, programming, networking, cybersecurity, and internet technologies. Computer Quiz Questions with Answers can be used for educational purposes in schools and universities, or as a fun activity for individuals or groups interested in testing their computer knowledge. They can be administered in person or online, and the difficulty level can vary depending on the target audience.

Computer Quiz

Here, I am sharing Computer Quiz Questions with Answers related to Computer Language, Computer Software and Hardware, Database, Data Communication, Internet, Programming, Introduction to Computers etc topics for those learners who are preparing for upcoming competitive exams like Informatics Assistant Exams of Rajasthan.

Also, Read Latest Current Affairs Questions 2023: Current Affairs Today

Students can quickly get free General Knowledge Mock Test and Current Affairs Mock Test on this platform for online exam practice to obtain good marks in competitive exams.

Computer Quiz Questions with Answers

  Q :  

What is called the syntax analysis part in the machine language transformation of a high-level language?

(A) lexical analysis

(B) semantic analysis

(C) parsing

(D) linking

Correct Answer : C
Explanation :

Parsing, in high-level language transformation, is the analysis of code syntax using formal grammar rules. It checks for errors and creates a parse tree representing the code's structure. This tree guides the generation of machine code or program execution, ensuring correct interpretation and execution of the source code.


Q :  

3 A nibble is equal to bits.

(A) 4

(B) 8

(C) 16

(D) 32

Correct Answer : A
Explanation :
Actually, a nibble consists of 4 bits, not 3. In computing, a nibble is a unit of data that consists of 4 bits, which can represent 16 different values (2^4). Each nibble can be expressed as a single hexadecimal digit (0 to F, where F represents 15 in decimal) and is half of a byte, which consists of 8 bits. So, 4 bits make up one nibble.



Q :  

Which keys are used to switch between programs in windows?

(A) Ctrl+TAB

(B) Alt+TAB

(C) Shift+TAB

(D) Shift+Enter

Correct Answer : B
Explanation :

In Windows, pressing the "Alt" key along with the "Tab" key (Alt+Tab) allows you to switch between open programs or applications. This keyboard shortcut displays a list of open windows, and you can cycle through them by continuing to press the "Tab" key while holding down the "Alt" key, and then release both keys to switch to the selected program.


Q :  

Which computer virus records every movement you make on the computer?

(A) Malware Android

(B) DoS

(C) Key Logger

(D) Trapper

Correct Answer : C
Explanation :

A keylogger (short for keystroke logger) is a type of computer virus or malware that records every keystroke and movement made on a computer's keyboard, including sensitive information such as passwords, credit card numbers, and personal messages. It essentially captures the user's keystrokes without their knowledge and sends this information to the attacker, posing a significant security threat.


Q :  

Which files are used during the operation of DBMS?

(A) Query language and utilities

(B) Data manipulation language and query language

(C) Data dictionary and transaction log

(D) Data dictionary and query language

Correct Answer : C
Explanation :
During DBMS operation, essential files include the data dictionary, containing metadata like table structures, and the transaction log, recording all database transactions. The data dictionary guides the DBMS in understanding database organization, while the transaction log ensures data integrity by recording modifications. Both files are crucial for effective database management, enabling accurate querying, data manipulation, and system recovery in case of failures, ensuring the system's reliability and consistency.



Q :  

Data that is copied from an application is stored in the ...... 

(A) Driver

(B) terminal

(C) prompt

(D) clipboard

Correct Answer : D
Explanation :

Data that is copied from an application is stored in the clipboard. The clipboard is a temporary storage area in a computer's memory that holds the data that has been cut or copied, allowing users to paste the data into another location or application. This functionality is commonly used for tasks such as copying text, images, or files from one place and pasting them into another.


Q :  

which of the following is an example of a volatile memory. 

(A) cd-rom

(B) RAM

(C) Rome

(D) hard disk

Correct Answer : B
Explanation :
RAM (Random Access Memory) is an example of volatile memory. Volatile memory is a type of computer memory that requires power to maintain the stored information. When the computer is powered off or restarted, the data stored in RAM is erased. This is in contrast to non-volatile memory like hard drives or SSDs, where data is retained even when the power is turned off. Volatile memory, such as RAM, provides fast access to data for the computer's processor but does not retain data when the system is powered down.



Q :  

When is the World Computer Literacy Day observed every year? 

(A) 08 September

(B) 11 september

(C) 03 November

(D) 02 December

Correct Answer : D
Explanation :

World Computer Literacy Day is observed on December 2nd every year. It is a global observance aimed at promoting awareness and understanding of computer literacy and digital skills among people, especially those in developing countries, to bridge the digital divide and empower individuals with essential computer knowledge.


Q :  

The CPU, motherboard and RAM are ........ components of a computer hardware system. 

(A) input device

(B) secondary storage device

(C) output device

(D) internal

Correct Answer : D
Explanation :

The CPU (Central Processing Unit), motherboard, and RAM (Random Access Memory) are internal components of a computer hardware system. These components are essential for the computer to function and are located inside the computer's casing.


Q :  

In which printer ribbon is used? 

(A) plotter

(B) laser printer

(C) dot matrix printer

(D) inkjet printer

Correct Answer : C
Explanation :

Dot matrix printers use printer ribbons. A dot matrix printer is a type of impact printer that produces characters and images on paper by striking a series of dots against an ink-soaked ribbon. The ribbon transfers ink onto the paper to create text and graphics. Dot matrix printers were widely used in the past for tasks such as printing invoices, receipts, and multipart forms.


Related categories

Very important related articles. Read now

The Most Comprehensive Exam Preparation Platform

Get the Examsbook Prep App Today