This quiz works best with JavaScript enabled. Home > Cbse > Class 11 > Science > Computer Science > Class 11 Computer Science Chapter 1 Computer Fundamentals – Quiz 28 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 28 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. The two kinds of main memory are: A) Primary and secondary. B) Random and sequential. C) ROM and RAM. D) All of above. Show Answer Correct Answer: C) ROM and RAM. 2. What is the basic function of a router in a network? A) To forward data packets between computer networks. B) To play music in the network. C) To water plants in the network. D) To cook food in the network. Show Answer Correct Answer: A) To forward data packets between computer networks. 3. Which of the following would be considered computer "hardware" ? A) Spotify. B) Microsoft Word. C) Computer Case. D) Internet. Show Answer Correct Answer: C) Computer Case. 4. B= how many mega bytes A) 1024. B) 256. C) 1536. D) 512. Show Answer Correct Answer: C) 1536. 5. Advait is working on his computer and needs to quickly access some files while running multiple applications. What is the function of the Random Access Memory (RAM) in his computer? A) To permanently store data. B) To temporarily store data for quick access. C) To process data. D) To manage input and output operations. Show Answer Correct Answer: B) To temporarily store data for quick access. 6. An airline check-in desk requires fast reading of passports and printing of boarding passes. Which devices should be chosen? A) Fingerprint scanner and Braille printer. B) Barcode scanner only (no printer). C) Gamepad and projector. D) Passport Machine Readable Zone (MRZ) scanner / OCR reader as input and thermal boarding-pass printer as output. Show Answer Correct Answer: D) Passport Machine Readable Zone (MRZ) scanner / OCR reader as input and thermal boarding-pass printer as output. 7. Magnetic Ink Character Recognition (MICR) is used to: A) Display graphics. B) Mark multiple answer sheets. C) Make architectural drawings. D) Process cheques at the bank. Show Answer Correct Answer: D) Process cheques at the bank. 8. Microprocessors as switching devices are for which generation computers? A) First Generation. B) Second Generation. C) Third Generation. D) Fourth Generation. Show Answer Correct Answer: D) Fourth Generation. 9. Screen Saver is which type of Software. A) Application Software. B) System Software. C) Package. D) Utility Software. Show Answer Correct Answer: D) Utility Software. 10. ..... type of memory that retains its contents until it is exposed to ultraviolet light. A) EPROM. B) PROM. C) EEPROM. D) Flash Memory. Show Answer Correct Answer: A) EPROM. 11. What is the term for a collection of connected computers? A) Storage. B) Multimedia. C) Output. D) Network. Show Answer Correct Answer: D) Network. 12. What is smallest unit of the information? A) A nibble. B) A bit. C) A byte. D) A block. Show Answer Correct Answer: B) A bit. 13. Which of the following is a common type of malware? A) Trojan. B) Spyware. C) Adware. D) Virus. Show Answer Correct Answer: D) Virus. 14. ..... is conducted at customers' site. A) Beta Testing. B) Alpha Testing. C) Unit testing. D) System testing. Show Answer Correct Answer: A) Beta Testing. 15. How can one protect against cyber threats? A) Disable antivirus programs. B) Ignore software updates. C) Implement strong passwords, use two-factor authentication, keep software updated, install antivirus programs, and educate users. D) Use the same password for all accounts. Show Answer Correct Answer: C) Implement strong passwords, use two-factor authentication, keep software updated, install antivirus programs, and educate users. 16. What is an example of an open source operating system? A) Windows OS. B) MacOS. C) Linux. D) IOS. Show Answer Correct Answer: C) Linux. 17. 2nd Generation Intel Processors A) Ivy Bridge. B) Nehalem. C) Sandy Bridge. D) Haswell. Show Answer Correct Answer: C) Sandy Bridge. 18. Aarav is working on a project that requires him to run simulations for climate modeling. What is a supercomputer primarily used for? A) Personal tasks. B) Complex calculations and data processing. C) Gaming. D) Basic word processing. Show Answer Correct Answer: B) Complex calculations and data processing. 19. What are some common types of cyber attacks? A) Phishing, malware, ransomware, denial-of-service (DoS), man-in-the-middle attacks. B) Data breach. C) SQL injection. D) Social engineering. Show Answer Correct Answer: A) Phishing, malware, ransomware, denial-of-service (DoS), man-in-the-middle attacks. 20. ..... is a program that guides the hardware components how to do a particular task. A) Software. B) Processor. C) CPU. D) None of the above. Show Answer Correct Answer: A) Software. 21. What does HTML stand for in the context of web development? A) Hybrid Terminal Management Language. B) Human-Technology Machine Language. C) High-Performance Media Library. D) HyperText Markup Language. Show Answer Correct Answer: D) HyperText Markup Language. 22. In a spreadsheet, what does the IF function do? A) Combines text from multiple cells. B) Sorts data in ascending order. C) Checks a condition and returns one value for TRUE and another for FALSE. D) Performs a calculation on a range. Show Answer Correct Answer: C) Checks a condition and returns one value for TRUE and another for FALSE. 23. How can you identify a compressed folder? A) It has a "zipper" icon on it. B) It is larger in size. C) It is colored red. D) It has a lock icon. Show Answer Correct Answer: A) It has a "zipper" icon on it. 24. Are often tasked to be servers, providing storage, processing, and other resources out to network clients, or users in others words. A) Supercomputer. B) Mainframe. C) Minicomputer. D) Workstation. Show Answer Correct Answer: C) Minicomputer. 25. List two types of output devices. A) Speakers. B) Printers, Monitors. C) Microphones. D) Headphones. Show Answer Correct Answer: B) Printers, Monitors. 26. Second Generation computers were developed during ..... A) 1970 to 1990. B) 1949 to 1955. C) 1956 to 1965. D) 1965 to 1970. Show Answer Correct Answer: C) 1956 to 1965. 27. How is data stored in the computer's memory? A) In binary form. B) In hexadecimal form. C) In octal form. D) In decimal form. Show Answer Correct Answer: A) In binary form. 28. Processing takes place in parallel is called ..... A) A. Parallel processing. B) B. Distributed processing. C) C. Multi Processing. D) None of the above. Show Answer Correct Answer: A) A. Parallel processing. 29. Identify the processing. A) Oranges in a juicer. B) Orange Juice. C) Oranges. D) None of the above. Show Answer Correct Answer: A) Oranges in a juicer. 30. To make something happen automatically? A) Automate. B) Computer Science. C) Enviroment. D) Data. Show Answer Correct Answer: A) Automate. 31. A drone's onboard computer that controls its flight is an example of a/an: A) Minicomputer. B) Embedded system. C) Microcomputer. D) Mainframe. Show Answer Correct Answer: B) Embedded system. 32. What is a computer primarily used for? A) To play games. B) To watch movies. C) To listen to music. D) To process data. Show Answer Correct Answer: D) To process data. 33. A system wherein items are added from one and removed from the other end. A) Queue. B) Array. C) Linked List. D) Stack. Show Answer Correct Answer: A) Queue. 34. Raw facts and figures are called? A) Numbers. B) Data. C) Information. D) System. Show Answer Correct Answer: B) Data. 35. Which security measure helps prevent unauthorized access to a computer and controls data flow? A) Encryption. B) Antivirus. C) Firewall. D) Virtual Private Network. Show Answer Correct Answer: C) Firewall. 36. ..... marks are commonly used for scoring in tests. A) OCR. B) OMR. C) MICR. D) None. Show Answer Correct Answer: B) OMR. 37. Explain the concept of cyber threats. A) Cyber threats are malicious activities targeting computer systems and networks to compromise data integrity, confidentiality, or availability. B) Cyber threats are exclusively related to social media platforms. C) Cyber threats are only physical attacks on hardware. D) Cyber threats are limited to software bugs and errors. Show Answer Correct Answer: A) Cyber threats are malicious activities targeting computer systems and networks to compromise data integrity, confidentiality, or availability. 38. What is the main function of a data processor? A) To process and retrieve data. B) To create software. C) To connect to the internet. D) To store data. Show Answer Correct Answer: A) To process and retrieve data. 39. A type of memory which stores data by magnetically encoding it unto a metallic circular disk. A) USB Drives. B) Hard Disk Drives. C) Compact Disc. D) Floppy Diskette. Show Answer Correct Answer: B) Hard Disk Drives. 40. I am finished and ready to print. I can use ..... to get to the print screen. A) Ctrl + O. B) Ctrl + W. C) Ctrl + D. D) Ctrl + P. Show Answer Correct Answer: D) Ctrl + P. 41. The brains of the computer where most calculations take place. A) Hardware. B) Program. C) Algorithm. D) CPU. Show Answer Correct Answer: D) CPU. 42. You and your brother are sharing a printer. You install the driver software onto your computer and install the printer. Then, you disconnect the printer and lend it to your brother. When you reconnect the printer later on, what is most likely to happen? A) The printer is ready to work. B) You must reinstall the printer driver. C) You must update the printer driver. D) The printer is no longer compatible with your computer. Show Answer Correct Answer: A) The printer is ready to work. 43. What does the word 'computer' derive from? A) To calculate. B) To store. C) To process. D) To retrieve. Show Answer Correct Answer: A) To calculate. 44. Which of the following would NOT be plugged into a USB port? A) Printer. B) Keyboard. C) Monitor. D) Mouse. Show Answer Correct Answer: C) Monitor. 45. It is a collection of computers that are connected for the purpose of sharing information, resources and devices. A) Computer Networks. B) Wi-Fi. C) Internet. D) World Wide Web. Show Answer Correct Answer: A) Computer Networks. 46. Explain different types of ports. A) Serial Ports, Parallel Port, USB Port, Analog Port. B) Input Port, Output Port, Processing Port, Storage Port. C) Serial Ports, Parallel Port, USB Port, InfraRed Port. D) Analog Port, Digital Port, Hybrid Port, Mainframe Port. Show Answer Correct Answer: C) Serial Ports, Parallel Port, USB Port, InfraRed Port. 47. What is the purpose of a firewall in cybersecurity? A) The purpose of a firewall in cybersecurity is to monitor and control network traffic to protect against unauthorized access and threats. B) To serve as a backup for data storage. C) To encrypt all network traffic automatically. D) To increase internet speed by caching data. Show Answer Correct Answer: A) The purpose of a firewall in cybersecurity is to monitor and control network traffic to protect against unauthorized access and threats. 48. What is the decimal representation of the binary number 1011? A) 12. B) 11. C) 9. D) 10. Show Answer Correct Answer: B) 11. 49. Name a programming language that is commonly used for web development. A) Ruby. B) C++. C) JavaScript. D) Python. Show Answer Correct Answer: C) JavaScript. 50. Today's computer is used for ..... A) Data storage. B) Computing. C) Playing games. D) All of the above. Show Answer Correct Answer: D) All of the above. 51. Which type of printer is known for high-quality color printing? A) Inkjet printer. B) Dot matrix printer. C) Laser printer. D) 3D printer. Show Answer Correct Answer: A) Inkjet printer. 52. What software do we need to edit a document? A) Viber. B) FineReader. C) Microsoft Office. D) Nero. Show Answer Correct Answer: C) Microsoft Office. 53. What type of internet devices are changing a user's lifestyle and how they interact with their home? A) Printers. B) HDD. C) CPU. D) IoT. Show Answer Correct Answer: D) IoT. 54. How does Digital Rights Management (DRM) prevent widely sharing already downloaded files? A) By requiring access verification to protected material. B) By allowing unlimited downloads of protected material. C) By allowing unlimited downloads of protected material. D) By imposing restrictions on burning files to physical media. Show Answer Correct Answer: A) By requiring access verification to protected material. 55. A courtroom requires secure printing of legal documents that must be tracked (who printed what and when). Which output device and feature is best? A) Any inkjet with no logging. B) Networked laser printer with secure print release and job auditing. C) Home thermal receipt printer. D) Plotter only. Show Answer Correct Answer: B) Networked laser printer with secure print release and job auditing. 56. The physical parts or components of a computer. A) Software. B) Graphical User Interface. C) Hardware. D) Operating System. Show Answer Correct Answer: C) Hardware. 57. A universal serial bus that supports data transfer to and from other devices is called the ..... A) Portable Storage. B) USB Cable. C) Printer. D) USB Port. Show Answer Correct Answer: D) USB Port. 58. Which generation of computers used vacuum tubes? A) Second Generation. B) Fourth Generation. C) First Generation. D) Third Generation. Show Answer Correct Answer: C) First Generation. 59. What is the name of Apple's web browser that comes pre-installed on macOS? A) Edge. B) Safari. C) Chrome. D) Firefox. Show Answer Correct Answer: B) Safari. 60. Define the term 'peripheral device'. A) Storage device. B) Peripheral device. C) Input device. D) Output device. Show Answer Correct Answer: B) Peripheral device. ← PreviousNext →Related QuizzesScience QuizzesClass 11 QuizzesClass 11 Computer Science Chapter 1 Computer Fundamentals Quiz 1Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 2Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 3Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 4Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 5Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 6Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 7Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books