This quiz works best with JavaScript enabled. Home > Cbse > Class 11 > Science > Computer Science > Class 11 Computer Science Chapter 1 Computer Fundamentals – Quiz 9 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 9 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. The 2's complement of a binary no. is obtained by adding ..... to its 1's complement. A) 0. B) 1. C) 10. D) 12. E) None of the above. Show Answer Correct Answer: B) 1. 2. A spreadsheet has some values entered:Cell A1 contains 10, cell A2 contains 14, cell A3 contains 7. You enter in cell A4 the following: "=1+2" . Which value is displayed in A4? A) 10. B) 3. C) 24. D) 14. Show Answer Correct Answer: B) 3. 3. Third Generation of Computers has employed ..... technology A) Integrated Circuits. B) Vacuum tubes. C) Transistors. D) Very Large Integrated Circuits. Show Answer Correct Answer: A) Integrated Circuits. 4. In paging, the physical memory is broken into fixed size blocks called ..... A) A. file. B) B. frame. C) C. hole. D) None of the above. Show Answer Correct Answer: B) B. frame. 5. A software program created by Microsoft that uses spreadsheets to organize numbers and data with formulas and functions. Excel analysis is ubiquitous around the world and used by businesses of all sizes to perform financial analysis. A) MS Excel. B) MS PowerPoint. C) MS Office. D) MS Word. Show Answer Correct Answer: A) MS Excel. 6. Which of the following is NOT one of the components of the CPU? A) Control Unit. B) Advanced Resource Monitor (ARM). C) Memory. D) Arithmetic Logic Unit (ALU). Show Answer Correct Answer: B) Advanced Resource Monitor (ARM). 7. What is the purpose of the Program Counter (PC) register? A) This is used to hold the instruction that needs to be carried out. B) This is used to save information. C) This is used to store the memory address of the next instruction. D) This is used to hold the location of the data. Show Answer Correct Answer: C) This is used to store the memory address of the next instruction. 8. This is another kind of printer, which is used to print charts, big posters etc. A) Plotter. B) Printer. C) VDU. D) None of these. Show Answer Correct Answer: A) Plotter. 9. Which of these is an operating system? A) Excel. B) MS Word. C) Oracle. D) Windows. Show Answer Correct Answer: D) Windows. 10. Any computer that can access the server is called? A) Web Browser. B) Web Server. C) Web Client. D) User. Show Answer Correct Answer: C) Web Client. 11. Identify the problem solving method. Step1:Start Step2:Include standard I/O header files Step3:Read length and breadth from the user A) Algorithm. B) Flowchart. C) Pseudocode. D) All options. Show Answer Correct Answer: A) Algorithm. 12. Which of these values can be stored as a single bit? A) 11. B) 4. C) 0. D) 0, 1, 0, 0. Show Answer Correct Answer: C) 0. 13. RAM is also called as A) Volatile memory. B) Virtual memory. C) Cache memory. D) Non volatile memory. Show Answer Correct Answer: A) Volatile memory. 14. What is the function of a CPU in a computer? A) The function of a CPU in a computer is to execute instructions and perform calculations. B) The function of a CPU in a computer is to play music. C) The function of a CPU in a computer is to drive a car. D) The function of a CPU in a computer is to brew coffee. Show Answer Correct Answer: A) The function of a CPU in a computer is to execute instructions and perform calculations. 15. What does RAM consists of A) Impact printers. B) Memory. C) Plotter. D) Memory chips. Show Answer Correct Answer: D) Memory chips. 16. If a computer bus width is 32 bit, then how much memory it can address A) 16GB. B) 32GB. C) 4GB. D) 8GB. Show Answer Correct Answer: C) 4GB. 17. All Windows 7 versions now support up to ..... of each type. A) Four tuners. B) Five tuners. C) Six tuners. D) None. Show Answer Correct Answer: A) Four tuners. 18. Hardware and software together forms a A) Information. B) Computer system. C) Program. D) Machine. Show Answer Correct Answer: B) Computer system. 19. A computer case is any external device that provides input and output for the computer. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 20. What is a key characteristic of Laptop computers that makes them a modern alternative to desktops? A) They are generally larger in size. B) They cannot be used for word processing. C) They can work while traveling and even without any power connection. D) They typically have less memory than a Microcomputer. Show Answer Correct Answer: C) They can work while traveling and even without any power connection. 21. A program or series of programs that controls the operation of a computer and directs the processing of the user's programs. A) Software. B) Graphical User Interface. C) Operating System. D) Hardware. Show Answer Correct Answer: C) Operating System. 22. What is the difference between data and information? A) Data is processed information; information is unprocessed data. B) Data and information are the same thing with different names. C) Data is raw facts; information is processed data with meaning. D) Data is always numerical; information is always textual. Show Answer Correct Answer: C) Data is raw facts; information is processed data with meaning. 23. Why is computer security important? A) Computer security is unnecessary as technology is foolproof. B) Computer security is a waste of resources. C) Computer security is only important for large organizations. D) Computer security is important for protecting sensitive data, preventing unauthorized access, maintaining privacy, ensuring business continuity, and safeguarding against cyber threats. Show Answer Correct Answer: D) Computer security is important for protecting sensitive data, preventing unauthorized access, maintaining privacy, ensuring business continuity, and safeguarding against cyber threats. 24. It is also known as the brain of the computer. A) CPU. B) MU. C) ALU. D) CU. Show Answer Correct Answer: A) CPU. 25. Choose an Input device A) Projector. B) Printer. C) Plotter. D) Scanner. Show Answer Correct Answer: D) Scanner. 26. What is the purpose of a router in a network? A) To store data for backup purposes. B) The purpose of a router in a network is to connect multiple networks and route data between them. C) To amplify the signal strength in a network. D) To provide power to network devices. Show Answer Correct Answer: B) The purpose of a router in a network is to connect multiple networks and route data between them. 27. As of year 2020, what is the capacity available in HDD? A) 16 TB. B) 16 MB. C) 16 bytes. D) 16 GB. Show Answer Correct Answer: A) 16 TB. 28. Which company developed the UNIX operating system? A) AT&T. B) IBM. C) Apple. D) Microsoft. Show Answer Correct Answer: A) AT&T. 29. Which process is commonly used by software manufacturers to verify legitimate software installations? A) Granting unlimited access to software updates. B) Requiring users to provide their personal information. C) Implementing product activation procedures. D) Understanding the need for copyright protection. Show Answer Correct Answer: C) Implementing product activation procedures. 30. Why is it important to keep your operating system updated? A) To ensure security, fix bugs, improve performance, and add new features. B) To decrease system performance. C) To slow down the system. D) To make the system more vulnerable to attacks. Show Answer Correct Answer: A) To ensure security, fix bugs, improve performance, and add new features. 31. This memory is mainly used during the booting process. A) RAM. B) CPU. C) MU. D) ROM. Show Answer Correct Answer: D) ROM. 32. ..... refers to the number of bits that a microprocessor can manipulate at one time. A) Rom size. B) Word Size. C) Cache size. D) Instruction size. Show Answer Correct Answer: B) Word Size. 33. Which key on the keyboard is used to capitalize letters? A) Ctrl. B) Tab. C) Shift. D) Windows. Show Answer Correct Answer: C) Shift. 34. How many keys are ther in the keyboard A) 103. B) 109. C) 104. D) None of the above. Show Answer Correct Answer: C) 104. 35. A Personal Computer is generally a ..... A) Minicomputers. B) Supercomputers. C) Microcomputers. D) Mainframe computers. Show Answer Correct Answer: C) Microcomputers. 36. Which legal protection gives the creator of a work exclusive rights to its use and distribution for a limited time period? A) Copyright Laws. B) Digital Rights Management (DRM). C) Digital Millennium Copyright Act. D) Intellectual Property (IP). Show Answer Correct Answer: A) Copyright Laws. 37. Who is considered the father of modern digital computers? A) Charles Babbage. B) Alan Turing. C) All the above. D) None of the above. Show Answer Correct Answer: A) Charles Babbage. 38. Which of the following computer supports thousands of users at the same time? A) Minicomputer. B) Mainframe computer. C) Laptop computer. D) Microcomputer. Show Answer Correct Answer: B) Mainframe computer. 39. What does the acronym CPU stand for? A) Computer Processing Unit. B) Control Processing Unit. C) Central Processing Unit. D) Central Power Unit. Show Answer Correct Answer: C) Central Processing Unit. 40. ..... is used to enter the data into a computer A) Go device. B) Output device. C) Memory device. D) Input device. Show Answer Correct Answer: D) Input device. 41. Windows, macOS, and Linux are examples of ..... A) Internet service. B) Web browser. C) Operating systems. D) None of the above. Show Answer Correct Answer: C) Operating systems. 42. When you save a file, it is permanently saved on the: A) Keyboard. B) RAM. C) CPU. D) Hard drive. E) Monitor. Show Answer Correct Answer: D) Hard drive. 43. Can you command a computer to create a real sandwich for you? A) TRUE. B) FALSE. C) All the above. D) None of the above. Show Answer Correct Answer: B) FALSE. 44. Heart of the computer A) Control Unit. B) ALU. C) Memory Unit. D) CPU. Show Answer Correct Answer: D) CPU. 45. Which device allows your computer to talk to other computers over a telephone line as well as access the internet? A) Modem. B) RAM. C) Hard Drive. D) CD-ROM drive. Show Answer Correct Answer: A) Modem. 46. What act establishes the right of a program owner to make a backup copy of any program? A) Digital Rights Management. B) Digital Millennium Copyright Act. C) Software Licensing. D) Open-source Software. Show Answer Correct Answer: B) Digital Millennium Copyright Act. 47. ..... is used almost exclusively by the banking industry for cheque processing. A) POS. B) OCR. C) MICR. D) OMR. Show Answer Correct Answer: C) MICR. 48. This is a wireless device through which we can see each other on the internet. A) Web Camera. B) Internet. C) Net. D) Monitor. Show Answer Correct Answer: A) Web Camera. 49. First mechanical computer A) Pascaline. B) Analytical engine. C) Mark I. D) None. Show Answer Correct Answer: D) None. 50. It poses a complex threat to both the methods of spreading and their resulting consequences. A) Blended threats. B) Denial-of-service attack (DOS Attack). C) Trojan horse. D) Phishing. Show Answer Correct Answer: A) Blended threats. 51. What is the primary function of a computer as described in the text? A) To connect to the internet. B) To perform arithmetic operations. C) To create graphics. D) To play games. Show Answer Correct Answer: B) To perform arithmetic operations. 52. What should you do with unused files to maintain computer efficiency? A) Keep them on the desktop. B) Rename them regularly. C) Delete or archive them. D) Share them online. Show Answer Correct Answer: C) Delete or archive them. 53. It is used to obtain the print out on the paper. A) Plotter. B) Printer. C) VDU. D) None of these. Show Answer Correct Answer: B) Printer. 54. What is a storage pool? A) A hidden volume. B) An unused large volume. C) A single disk used to store data. D) Many disks combined to create one storage space. Show Answer Correct Answer: D) Many disks combined to create one storage space. 55. ..... are places on the outside of the computer where you plug in hardware. A) Parks. B) Spots. C) Ports. D) Connections. Show Answer Correct Answer: C) Ports. 56. Two classmates must share work quickly without cables between their tablets. Which communication method should they use? A) Long copper wired links. B) Radio waves via wireless. C) Fiber cables with plugs. D) Screens with QR flashing. Show Answer Correct Answer: B) Radio waves via wireless. 57. Identify the input. A) Recording. B) Record your voice using microphone. C) Hearing audio with the help of speakers / headphone. D) None of the above. Show Answer Correct Answer: B) Record your voice using microphone. 58. What type of malware pretends to be a safe program? A) Virus. B) Trojan. C) Spyware. D) Worm. Show Answer Correct Answer: B) Trojan. 59. Which of the following is not a type of computer code? A) ASCII. B) EBCDIC. C) EDIC. D) BCD. Show Answer Correct Answer: C) EDIC. 60. Give an example of system software. A) Google Chrome browser. B) Adobe Photoshop. C) Microsoft Office Suite. D) Operating systems like Windows, macOS, and Linux. Show Answer Correct Answer: D) Operating systems like Windows, macOS, and Linux. ← PreviousNext →Related QuizzesScience QuizzesClass 11 QuizzesClass 11 Computer Science Chapter 1 Computer Fundamentals Quiz 1Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 2Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 3Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 4Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 5Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 6Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 7Class 11 Computer Science Chapter 1 Computer Fundamentals Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books