Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 9 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. The 2's complement of a binary no. is obtained by adding ..... to its 1's complement.
2. A spreadsheet has some values entered:Cell A1 contains 10, cell A2 contains 14, cell A3 contains 7. You enter in cell A4 the following: "=1+2" . Which value is displayed in A4?
3. Third Generation of Computers has employed ..... technology
4. In paging, the physical memory is broken into fixed size blocks called .....
5. A software program created by Microsoft that uses spreadsheets to organize numbers and data with formulas and functions. Excel analysis is ubiquitous around the world and used by businesses of all sizes to perform financial analysis.
6. Which of the following is NOT one of the components of the CPU?
7. What is the purpose of the Program Counter (PC) register?
8. This is another kind of printer, which is used to print charts, big posters etc.
9. Which of these is an operating system?
10. Any computer that can access the server is called?
11. Identify the problem solving method. Step1:Start Step2:Include standard I/O header files Step3:Read length and breadth from the user
12. Which of these values can be stored as a single bit?
13. RAM is also called as
14. What is the function of a CPU in a computer?
15. What does RAM consists of
16. If a computer bus width is 32 bit, then how much memory it can address
17. All Windows 7 versions now support up to ..... of each type.
18. Hardware and software together forms a
19. A computer case is any external device that provides input and output for the computer.
20. What is a key characteristic of Laptop computers that makes them a modern alternative to desktops?
21. A program or series of programs that controls the operation of a computer and directs the processing of the user's programs.
22. What is the difference between data and information?
23. Why is computer security important?
24. It is also known as the brain of the computer.
25. Choose an Input device
26. What is the purpose of a router in a network?
27. As of year 2020, what is the capacity available in HDD?
28. Which company developed the UNIX operating system?
29. Which process is commonly used by software manufacturers to verify legitimate software installations?
30. Why is it important to keep your operating system updated?
31. This memory is mainly used during the booting process.
32. ..... refers to the number of bits that a microprocessor can manipulate at one time.
33. Which key on the keyboard is used to capitalize letters?
34. How many keys are ther in the keyboard
35. A Personal Computer is generally a .....
36. Which legal protection gives the creator of a work exclusive rights to its use and distribution for a limited time period?
37. Who is considered the father of modern digital computers?
38. Which of the following computer supports thousands of users at the same time?
39. What does the acronym CPU stand for?
40. ..... is used to enter the data into a computer
41. Windows, macOS, and Linux are examples of .....
42. When you save a file, it is permanently saved on the:
43. Can you command a computer to create a real sandwich for you?
44. Heart of the computer
45. Which device allows your computer to talk to other computers over a telephone line as well as access the internet?
46. What act establishes the right of a program owner to make a backup copy of any program?
47. ..... is used almost exclusively by the banking industry for cheque processing.
48. This is a wireless device through which we can see each other on the internet.
49. First mechanical computer
50. It poses a complex threat to both the methods of spreading and their resulting consequences.
51. What is the primary function of a computer as described in the text?
52. What should you do with unused files to maintain computer efficiency?
53. It is used to obtain the print out on the paper.
54. What is a storage pool?
55. ..... are places on the outside of the computer where you plug in hardware.
56. Two classmates must share work quickly without cables between their tablets. Which communication method should they use?
57. Identify the input.
58. What type of malware pretends to be a safe program?
59. Which of the following is not a type of computer code?
60. Give an example of system software.