Introduction to Computers MCQ Quiz - Objective Question with Answer for Introduction to Computers - Download Free PDF

Last updated on May 13, 2025

The computer, as we can see it today, is a result of a lot of research and development through the decades. A computer is a device that is used for working with information. The information can be words, pictures, numbers, etc. It consists of hardware and software. It works in its programming language only. In today’s scenario, it plays a vital role in the digital industry. Everyone is addicted to computers. Introduction to computers includes the basic information of computers that everybody should know in today’s time. That’s why it is being asked in all the competitive examinations. In basics, It includes what is a computer, how it works, cursor or pointer, word processor, software, hardware, Internet, Email, Spreadsheet, Multimedia, etc. Thus, you should have a basic knowledge of computers so that you can attempt the questions on this topic wisely.

Latest Introduction to Computers MCQ Objective Questions

Introduction to Computers Question 1:

Which of the following is the first screen to appear on the monitor after Windows 10 is loaded?

  1. File Folder
  2. Desktop
  3. Recycling Bin
  4. Recently Added Screen
  5. None of the above

Answer (Detailed Solution Below)

Option 2 : Desktop

Introduction to Computers Question 1 Detailed Solution

The correct answer is Desktop.

  • The first screen which appears when windows are loaded is called Desktop.

Key Points 

  • Desktop
    • The first screen which appears when windows are loaded is called Desktop.
    • As soon as we open the computer we come across the Windows welcome screen which displays many small pictures on the screen of the monitor.
      • This screen is known as the desktop.
    • The small pictures on the screen are known as icons.

 

Additional Information

  • File Folder
    • ​A file is the common storage unit in a computer, and all programs and data are "written" into a file and "read" from a file.
    • A folder holds one or more files, and a folder can be empty until it is filled. 
  • Recycling Bin
    • ​A recycling bin (or recycle bin) is a container used to hold recyclables before they are taken to recycling centers. 
    • Recycling bins exist in various sizes for use inside and outside homes, offices, and large public facilities.
  • Recently Added Screen
    • ​A typical “Recently Added” section looks like at the top of the Start menu app list.
    • It's a small area that shows the names and icons of recently installed apps.

Introduction to Computers Question 2:

Which of the following options is equal to 256 nibbles?

  1. 128 bytes
  2. 4 kilobytes
  3. 512 bits
  4. 8 kilobyte
  5. None of the above

Answer (Detailed Solution Below)

Option 1 : 128 bytes

Introduction to Computers Question 2 Detailed Solution

The correct answer is 128 bytes.

Key Points

  • The data is measured in the computer system in bits. It is the smallest unit to measure the data.
  • When the 4 bits of the memory unit are called together as a nibble.
  • When the 8 bits of the memory unit are called together as a byte.
  • So, it can state that 2 nibbles =1 byte.
    Therefore 256 nibbles = (256/2) bytes =128 bytes.

Thus the correct answer is 128 bytes.

Additional Information

  • The other storage units used in the computer system are KiloBytes(KB), MegaBytes (MB), GigaBytes(GB), and TeraByte(TB). 
  • 1 KB= 1024 bytes; 1MB= 1024 KB;  1GB= 1024 MB;   1TB= 1024 GB.
  • Above terabytes, there are some more storage units. These are petabytes (PB), exabytes (EB), zettabytes (ZB), and yottabytes (YB).

 

Introduction to Computers Question 3:

When an attacker forces a computer reset/reboot and then steals any data left over in the RAM is known as ______ attack.

  1. Soft boot
  2. Live Boot
  3. Warm boot
  4. Cold boot
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : Cold boot

Introduction to Computers Question 3 Detailed Solution

The correct answer is Cold boot.

Key Points

  • Cold boot attacks are when an attacker forces a computer reset/reboot and then steals any data left over in the RAM.
  • All cold boot attacks require physical access and special hardware tooling to perform.
  • These are generally not considered a threat vector for normal users, but only for computers storing highly-sensitive information.
  • In order to disable this function and enable booting from an external device (USB stick), security researchers Olle Segerdahl and Pasi Saarinen of F-Secure discovered a way to reprogram the non-volatile part of the memory chip that stores the overwrite instruction.
  • As a result, they were able to extract and analyze the data present in RAM.
  • The attack falls under the cold-boot classification.
  • It exploits a weakness in how the computers protect the low-level software responsible for interacting with the RAM.

Additional Information

  • Cold boot:
    • It is also known as hard boot, cold start or dead start.
    • It describes the basic process of turning on a computer's, a laptop's, or a server's hardware up until the point at which the operating system and all startup programs and services are launched.
    • The power button on a computer must typically be pressed to initiate a cold boot.
    • The memory is entirely erased and the components and power source are reset during a cold boot.
    • In addition to flushing the RAM, a cold boot also clears the caches.
  •  Warm Boot:
    • A warm boot is a term that  used to describe restarting a computer using a menu item or keystroke combination.
    • The system reboots faster and the components don't reset entirely with a warm boot.
    • When switched on, a warm boot does not turn off or erase data.

Introduction to Computers Question 4:

The __________ service enables users to log into remote computers over the Internet using their local computers.

  1. Telnet
  2. File transfer
  3. World Wide Web
  4. Usenet
  5. None of the above

Answer (Detailed Solution Below)

Option 1 : Telnet

Introduction to Computers Question 4 Detailed Solution

Solution-

  • Telnet is a network communication protocol that is used to communicate with and manage various devices on a network such as servers, computers, routers, switches, firewalls, etc.
  • In this, Command Line Interface (CLI) is used to communicate with and manage the device, that is, it is completely command-based communication.
  • Telnet works similarly to the Remote Desktop feature available on your PC, in that you (GUI) graphically take a remote of a PC or server connected to the network, and do your work.
  • Whereas this client-server connection is established by the command in Telnet, where the remote-controlled device acts as a server, and it waits for the command received from the controller i.e. the client so that it can show the result accordingly or able to work
  • Along with this, Telnet is also used to check the connectivity of network hardware, log in to them, and execute various commands.

Introduction to Computers Question 5:

________ consists of lines of varying widths or lengths and are computer-readable.

  1. A bar code
  2. A Magnetic tape
  3. An ASCII code
  4. An OCR code
  5. None of the above

Answer (Detailed Solution Below)

Option 1 : A bar code

Introduction to Computers Question 5 Detailed Solution

Barcode contain data which is represented visually and in a way that is machine-readable.

Key Points

  • These barcodes can be read by specialised optical scanners known as barcode readers. 
  • It contains parallel lines of varying lengths, spacings, and diameters that were used to represent data in barcodes. 
  • There are barcodes referred to as one-dimensional and two-dimensional. 
  • It can be scanned by using specialised application software, or a mobile device with an integrated camera, such as a smartphone. 

Therefore, A bar code consists of lines of varying widths or lengths and is computer-readable.

Additional Information

  • Magnetic tape is a long, narrow strip of plastic film covered in a thin, magnetizable coating medium for magnetic storage. 
  • American System Code for Information Interchange (ASCII) is a character encoding standard for electronic communication.
  • OCR's fundamental procedure entails reading a document's text and converting the characters into a code that may be used for data processing. 

Top Introduction to Computers MCQ Objective Questions

Which of the following belongs to the category of fourth generation languages?

  1. Machine language
  2. High-level language
  3. Assembly language
  4. Query language

Answer (Detailed Solution Below)

Option 4 : Query language

Introduction to Computers Question 6 Detailed Solution

Download Solution PDF

The correct answer is Query language.

Key Points

The various generations of computers are listed below:

Generation Hardware Language
1st Vacuum Tube Machine Language
2nd Transistor Assembly Language
3rd Integrated Chips High-Level Language e.g - FORTRAN, ALGOL, COBOL, C++, C
4th Very Large Scale Integrated Circuit Very High-Level Languages (Query Language) e.g - SQL, Unix Shell, Oracle etc.
5th  Ultra Large Scale Integration technology Artificial Intelligence Language e.g - OPS5, Mercury etc.

Third generation computers used _______________.

  1. VLSI technique
  2. Transistors
  3. Vacuum tubes
  4. Integrated circuits
  5. none of the above

Answer (Detailed Solution Below)

Option 4 : Integrated circuits

Introduction to Computers Question 7 Detailed Solution

Download Solution PDF

The correct answer is Integrated circuits.

Key Points

Third Generation (1964-1977):

  • This generation was introduced by the development of a small chip consisting of the capacity of the 300 transistors
  • These Integrated Circuits (IC)s are popularly known as Chips.
  • So it is quite obvious that the size of the computer got further reduced
  • Some of the computers developed during this period were IBM-360, ICL-1900, IBM-370, and VAX-750
  • Higher-level language such as BASIC (Beginners All-purpose Symbolic Instruction Code) was developed during this period​

Additional Information

Generation Duration Electronic Component Used
First Generation Computers 1946 - 1954 Vacuum Tubes
Second Generation Computer 1955 - 1964 Transistors
Third Generation Computer 1964 - 1977 Integrated Circuits
Fourth Generation Computer 1978 - Present VLSI or Microprocessors
Fifth Generation Computer Present and Future ULSI or Bio-Chips

Which of the following is considered to be the first supercomputer developed in India?

  1. SAHASRA T
  2. SAGA 220
  3. PARAM YUVA II
  4. PARAM 8000

Answer (Detailed Solution Below)

Option 4 : PARAM 8000

Introduction to Computers Question 8 Detailed Solution

Download Solution PDF

The correct answer is PARAM 8000.

Key Points

  • PARAM 8000 is considered to be the first supercomputer developed in India.
  • PARAM is a series of supercomputers developed by C-DAC in Pune.
  • PARAM supercomputers developed under the leadership of Vijay P Bhatkar.
  • Supercomputers developed by India are EKA, PARAM, Kabru, Blue Gene.
  • Pratyush is India's fastest supercomputer.

Additional Information

  • SAGA 220 is the supercomputer developed by ISRO in 2011.
  • PARAM Yuva II is the fastest in the prestigious PARAM series of Supercomputers built in India.
  • SAHASRA T provides service in the fields of aerospace engineering, meteorology predictions, and astrological simulation.
  • Seymour Cray is considered the father of the supercomputer.
  • CDC 6600 is the world's first supercomputer.

 Important Points

  • As of June 2023, the AIRAWAT supercomputer is the fastest supercomputer in India, having been ranked 75th fastest in the world in the TOP500 supercomputer list.

Speed of processor chip is measured in ______.

  1. Mbps
  2. MHz
  3. Bits per second
  4. Bytes per second

Answer (Detailed Solution Below)

Option 2 : MHz

Introduction to Computers Question 9 Detailed Solution

Download Solution PDF

The correct answer is MHz.

Key Points

  • Speed of Processor
    • Processor speed is relative to the clock speed which is measured in units of cycles per second.
    • CPUs run at rates of millions and billions of Hertz, megahertz(MHz) and gigahertz(GHz).
    • A clock speed of 3.5 GHz to 4.0GHz is generally considered a good processor speed.

Additional Information

  • Processor(CPU)
    • A CPU is also called a central processor, main processor, or just processor, is the electronic circuitry that executing instructions comprising a computer program.
    • The CPU performs basic arithmetic, logic, controlling, and input/output operations specified by the instructions in the program.
    • The fundamental operation of most CPU's regardless of the physical form they take is to execute a sequence of stored instructions called a program. 
  • Instructions cycle in Processor(CPU)
    • All CPU's follows the following steps in order to complete their operations:
      1. Fetch: The first step, involves retrieving instructions from the program memory.
      2. Decode: The instruction that the CPU fetches from the memory determines what the CPU will do, which is decoded by the instructor decoder.
      3. Execute: In this step, all the desired functions are performed as per the instructions decoded.

Python is a _______.

  1. low level language
  2. high level language
  3. machine language
  4. assembly language

Answer (Detailed Solution Below)

Option 2 : high level language

Introduction to Computers Question 10 Detailed Solution

Download Solution PDF

The correct answer is high-level language.

  • Python is a high-level language.

Key Points

  • Python
    • It is a high-level language.
    • It allows programming in Object-Oriented and Procedural paradigms
    • The language was created by Guido van Rossum.
    • It was first released in 1991.
    • It is used for web development (server-side), software development, mathematic, and system scripting.
    • It can work on platforms like Windows, Mac, Linux, Raspberry Pi, etc

Additional Information

  • Machine language and Assembly language are an example of a low-level language.
    • Machine language is a low-level language that is comprised of binary digits i.e. ones and zeros. 
    • An assembly language is a language designed for a specific type of processor.

ENIAC was the first electronic general-purpose computer. What does 'N' stand for in ENIAC?

  1. New 
  2. Number
  3. Next
  4. Numerical 

Answer (Detailed Solution Below)

Option 4 : Numerical 

Introduction to Computers Question 11 Detailed Solution

Download Solution PDF

The correct answer is Numerical. 
"Electronic Numerical Integrator and Computer".

Key Points 

  • In the year 1945, the first electronic general-purpose and digital computer, ENIAC was introduced.
  • The full form of the ENIAC is Electronic Numerical Integrator and Computer.
  • ENIAC was first used by the US Army's Ballistic research.

Thus the correct answer is Electronic Numerical Integrator and Computer.

Additional Information 

  • First-generation computer: In the first-generation computer, the technology used is a vacuum tube. It is made of glass and was very much fragile. 
  • Second-generation computer: In the second-generation computer, the technology used is a transistor. The material used behind the transistor is made of a semiconductor.
  • Third-generation computer: In the third-generation computer, the technology used is an IC or Integrated Circuit. In this generation, high-level language is used.
  • Fourth-generation computer: In the fourth-generation computer, the technology used is VLSI and microprocessor.
  • Fifth-generation computer: In the fifth-generation computer, the technology used is ULSI technology.

'Integrated Circuits' belonged to which of the following generation of Computers?

  1. Third Generation
  2. Fifth Generation
  3. Fourth Generation
  4. Second Generation

Answer (Detailed Solution Below)

Option 1 : Third Generation

Introduction to Computers Question 12 Detailed Solution

Download Solution PDF

The correct answer is Third Generation.

  • Generation in computer terminology is a change in technology a computer is/was being used.
  • Initially, the generation term was used to distinguish between varying hardware technologies.
  • Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Important Points

  • There are five computer generations known to date:
    GENERATION DESCRIPTION
    1st (1946-1959) Vacuum tube-based.
    2nd (1959-1965) Transistor-based.
    3rd (1965-1971) Integrated Circuit based.
    4th (1971-1980) VLSI microprocessor-based.
    5th (1980-onwards) ULSI microprocessor-based.

1 Petabyte (PB) = 1024 ______.

  1. Zettabytes (ZB)
  2. Exabytes (EB)
  3. Terabytes (TB)
  4. Gigabytes (GB)

Answer (Detailed Solution Below)

Option 3 : Terabytes (TB)

Introduction to Computers Question 13 Detailed Solution

Download Solution PDF

The correct answer is Terabytes (TB).

  • 1 Petabyte = 1024 Terabytes.
  • The units of Computer Memory Measurements are: ​
    •  1 Bit = Binary Digit.
    •  8 Bits = 1 Byte
    • 1024 Bytes = 1 KB (Kilo Byte)
    • 1024 KB = 1 MB (Mega Byte)
    • 1024 MB = 1 GB (Giga Byte)
    • 1024 GB = 1 TB (Terra Byte)
    • 1024 TB = 1 PB (Petabyte)
    • 1024 PB = 1  EB (Exa Byte)
  • Geop byte is the highest memory measurement unit.

A piece of programming code inserted into another program to cause damage is called:

  1. Virus
  2. Malware
  3. Spam
  4. Viral

Answer (Detailed Solution Below)

Option 1 : Virus

Introduction to Computers Question 14 Detailed Solution

Download Solution PDF

The correct answer is: Option 1) Virus

Key Points

  • Virus is a piece of programming code that inserts itself into another program or file to spread and cause damage (e.g., corrupting data, stealing information, or disrupting system operations).

  • Malware (Option 2) is a broader term that includes viruses, worms, ransomware, etc., but the question specifies a "piece of code inserted into another program," which matches a virus more precisely.

  • Spam (Option 3) refers to unwanted emails/messages, not malicious code.

  • Viral (Option 4) describes content spreading rapidly online, not a harmful program.

  • virus requires a host program to attach itself to, while other malware (like worms) can operate independently.

Final Answer:
✅ Option 1) Virus

Who has developed the Automatically Programmable Tool (APT)?

  1. Gary Kildall
  2. Jonathan Fletcher
  3. Ralph H Baer
  4. Douglas T Ross

Answer (Detailed Solution Below)

Option 4 : Douglas T Ross

Introduction to Computers Question 15 Detailed Solution

Download Solution PDF

The correct answer is Douglas T Ross.

Key Points

  • APT stands for Automatically Programmed Tool.
    • It was developed by Douglas T Ross.
    • It is a language that defines the tool path with respect to the part geometry and often forms the basis for post-processor generated NC files.

Additional Information

  • The APT programming language is a language for defining tool paths on CNC machines.
  • The APT language consists of four types of statements:
    • ​Geometry statements will be used to specify the elemental features defining the part shape
    • Motion statements are used to specify the path taken by the tool
    • Post-processor statements control the machinery, controlling coolants as well as the feeds and speeds.
    • Auxiliary statements complete the picture, specifying the part, required tools, etc. 
Get Free Access Now
Hot Links: teen patti all teen patti cash game teen patti win teen patti gold online teen patti gold download