This quiz works best with JavaScript enabled. Home > Cbse > Class 11 > Science > Computer Science > Class 11 Computer Science Chapter 1 Computer Fundamentals – Quiz 31 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 31 (37 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What is a star network topology? A) A star network topology is a type of network where each device is connected in a linear chain. B) A star network topology is a type of network where each device is connected in a circular manner. C) A star network topology is a type of network where each device is connected directly to a central hub. D) A star network topology is a type of network where each device is connected in a mesh-like structure. Show Answer Correct Answer: C) A star network topology is a type of network where each device is connected directly to a central hub. 2. What is a process in the context of operating systems? A) A process is a user interface element. B) A process is a type of hardware component. C) A process is an instance of a program in execution. D) A process is a static file stored on disk. Show Answer Correct Answer: C) A process is an instance of a program in execution. 3. Which of these should you NOT do when you have a computer problem? A) Turn it off and turn it back on. B) Close the tab and reopen it. C) Refresh or reload the tab. D) Bang on the keyboard. Show Answer Correct Answer: D) Bang on the keyboard. 4. What does D in the D-flip flop stand for? A) Direct. B) Digital. C) Durable. D) Delay. Show Answer Correct Answer: D) Delay. 5. Who worked at Bell Laboratories on the development of C language? A) Dennis Ritchie. B) Bill Gates. C) Mark Zuckerberg. D) Steve Jobs. Show Answer Correct Answer: A) Dennis Ritchie. 6. Which of the following is the largest? A) Byte. B) Bit. C) Kilobyte. D) Megabyte. Show Answer Correct Answer: D) Megabyte. 7. Which keys on the keyboard will move you around a document or web page? A) Function keys. B) Shift keys. C) Arrow keys. D) None of the above. Show Answer Correct Answer: C) Arrow keys. 8. It is an improved Pascaline machine developed by Gottfried Wilhelm Leibniz in 1671. A) Abacus. B) Napier's bones. C) Pascaline. D) Step Reckoner. Show Answer Correct Answer: D) Step Reckoner. 9. Which of the following is not an example of a hardware device. A) Word. B) Keyboard. C) Mouse. D) Monitor. Show Answer Correct Answer: A) Word. 10. A general purpose single-user microcomputer designed to be operated by one person at a time is A) Special-purpose computer. B) KIPS. C) M. D) M. E) None of the above. Show Answer Correct Answer: C) M. 11. Three different types of computer: A) Analog, digital and hybrid. B) Super, mini and micro. C) Desktop, laptop and tablet. D) Notebook, tablet and hand-held. Show Answer Correct Answer: A) Analog, digital and hybrid. 12. List some limitations of computers. A) Computers can self-program without human input. B) Computers possess advanced emotional intelligence. C) Computers can operate without electricity. D) Some limitations of computers include dependency on electricity, lack of emotional intelligence, inability to perform tasks without programming, and susceptibility to viruses and malware. Show Answer Correct Answer: D) Some limitations of computers include dependency on electricity, lack of emotional intelligence, inability to perform tasks without programming, and susceptibility to viruses and malware. 13. Micro Computers are also called: A) Hand Held Computers. B) Micro Controllers. C) Personal Computers. D) Enterprise Servers. Show Answer Correct Answer: C) Personal Computers. 14. What is the function of MS PowerPoint? A) Edit photos. B) Play music. C) Manage spreadsheets. D) Create presentations. Show Answer Correct Answer: D) Create presentations. 15. A teacher saves students' essays to a USB flash drive so files remain after power off. Which storage type is this? A) BIOS chip. B) Secondary permanent storage (removable). C) Primary volatile memory. D) CPU cache. Show Answer Correct Answer: B) Secondary permanent storage (removable). 16. Which term describes the fraudulent technique used by hackers to retrieve information from users using fake websites? A) Cybernetic Mimicry. B) Data Harvesting. C) Phishing. D) Spoofing. Show Answer Correct Answer: C) Phishing. 17. A computer processes the data and produces ..... A) Output. B) Input. C) Memory. D) Data. Show Answer Correct Answer: A) Output. 18. Which one of the following parts is called the brain of the computer? A) Monitor. B) ALU. C) UPS. D) CPU. Show Answer Correct Answer: D) CPU. 19. ..... can manage text flow inside a cell. A) Wrap Text. B) Merge Cell. C) Patterns. D) None. Show Answer Correct Answer: A) Wrap Text. 20. In a programming context, what does the term 'loop' refer to? A) A way to store data in a variable. B) A function that ends a program. C) A command to print output to the screen. D) A method to repeat a set of instructions. Show Answer Correct Answer: D) A method to repeat a set of instructions. 21. Aanya is setting up a computer network for her new office. She wants to ensure that only authorized personnel can access the network. What is the main function of a firewall in her computer network? A) To prevent unauthorized access. B) To store data securely. C) To enhance processing speed. D) To manage software applications. Show Answer Correct Answer: A) To prevent unauthorized access. 22. A ..... works by digitizing an image. A) Camera. B) Scanner. C) Punched Card. D) Track Ball. Show Answer Correct Answer: B) Scanner. 23. What is the job of the control unit? A) It carries out calculations. B) It stores information. C) It does nothing. D) It controls the input and output of data to make sure that it gets to the right place. Show Answer Correct Answer: D) It controls the input and output of data to make sure that it gets to the right place. 24. What does the term 'URL' stand for? A) Universal Resource Link. B) Uniform Resource Locator. C) Uniform Resource Language. D) Universal Resource Locator. Show Answer Correct Answer: B) Uniform Resource Locator. 25. What is malware and how can it affect your computer? A) Malware is a security feature that protects your computer from viruses. B) Malware is malicious software that can damage or disrupt your computer's operation. C) Malware is a software that only affects mobile devices. D) Malware is a type of hardware that improves computer performance. Show Answer Correct Answer: B) Malware is malicious software that can damage or disrupt your computer's operation. 26. A DVD Reader reads ..... A) Hard disk. B) DVD ROM. C) Flash memory. D) All of the above. Show Answer Correct Answer: B) DVD ROM. 27. Which of the following best defines a computer? A) A machine that can only store data. B) A mechanical device for creating documents. C) An electronic device that accepts, processes, and stores data under a set of instructions. D) A device solely for gaming purposes. Show Answer Correct Answer: C) An electronic device that accepts, processes, and stores data under a set of instructions. 28. True or False:Cleaning your computer regularly does not help you keep it working properly and avoid expensive repairs. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 29. It is the capability of the computer to perform the same operations tirelessly and repeatedly. A) Repetitiveness. B) Logical Operations. C) Accuracy. D) Speed. Show Answer Correct Answer: A) Repetitiveness. 30. True or FalseYou cannot see date and time on taskbar. A) False. B) True. C) All the above. D) None of the above. Show Answer Correct Answer: A) False. 31. Which unit is responsible for converting the data received from the user into computer understandable format? A) Output unit. B) MU. C) Input unit. D) ALU. Show Answer Correct Answer: C) Input unit. 32. What is malware? A) Malware is a security protocol for protecting data. B) Malware is software that enhances system performance. C) Malware is malicious software intended to damage or disrupt systems. D) Malware is a type of hardware used for computing. Show Answer Correct Answer: C) Malware is malicious software intended to damage or disrupt systems. 33. Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. What could be the issue causing the problem? A) The video cable has become disconnected. B) The monitor power cable is unplugged. C) The video driver is not installed. D) The operating system has encountered a stop error. E) The screen saver has activated. Show Answer Correct Answer: A) The video cable has become disconnected. 34. Which of the following is NOT a classification of computers? A) Micro Computer. B) Mini Computer. C) Desktop Computer. D) Super Computer. Show Answer Correct Answer: C) Desktop Computer. 35. Which of the following is not a good way to protect your computer? A) Install antivirus software. B) Back up important files. C) Skip operating system updates. D) Plug it into a surge protector. Show Answer Correct Answer: C) Skip operating system updates. 36. ..... is used when we want more refined shapes. A) Curve. B) Scribble. C) Freeform. D) Pen. Show Answer Correct Answer: C) Freeform. 37. One of the main features of this generation of computers is the use of VLSI technology. A) Third Generation. B) Fourth Generation. C) Second Generation. D) Fifth Generation. Show Answer Correct Answer: B) Fourth Generation. ← PreviousRelated QuizzesScience QuizzesClass 11 QuizzesClass 11 Computer Science Chapter 1 Computer Fundamentals Quiz 1Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 2Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 3Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 4Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 5Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 6Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 7Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books