Home »
General Knowledge (GK) MCQs
Computer Science General Knowledge Questions and Answers
By IncludeHelp Last updated : August 13, 2023
Computer Science General Knowledge Questions and Answers: Computer science is all about the study of computers and computational systems. These questions and helpful for learning, practicing, and enhancing your general knowledge of computer science. For the various competition exams and interview purposes you can go through these computer science GK questions.
Here, you will find the top 170+ Computer Science GK Questions. These questions are helpful for students and professionals who are studying in any class having computer science in the syllabus, college sources like BCA, B.Tech, B.E., MCA, other computer science-related courses, and all competitive/government exams like Civil Services Exam, CDS, UPSC, NDA, CAT, CLAT, SSC CGL, NEET, GATE, SBI PO, BITSAT, XAT, IBPS PO, SSC GD Constable Exam, SSC CHSL, SSC Stenographer, IBPS RRB, SSC MTS, IBPS SO, and many more.
List of Computer Science General Knowledge Questions and Answers
Below are a set of more than 170 GK questions on computer science with their answers and explanation.
19. When you purchase a product over a Mobile Phone, the transaction is called?
- E-Commerce
- G-Commerce
- M-Commerce
- F-Commerce
Answer & Explanation Discuss
Answer: C)
M-Commerce
Explanation:
When you purchase a product over a Mobile Phone, the transaction is called M-Commerce. M-commerce, also called "mobile commerce," is the getting and selling of things and services using mobile devices like smartphones and tablets.
21. An address given to a computer connected to a network is called?
- Local address
- Localhost
- Network address
- IP address
Answer & Explanation Discuss
Answer: D)
IP address
Explanation:
An address given to a computer connected to a network is called an IP address. IP stands for "Internet Protocol," which is a set of rules which make sure how data is sent over the internet or a local network.
26. The process to find an error in a software code is called?
- Debugging
- Compiling
- Error
- None of the above
Answer & Explanation Discuss
Answer: A)
Debugging
Explanation:
The process to find errors in a software code is called debugging. The debugging process in software development starts when a developer successfully identifies a coding fault within a computer program and is able to replicate it.
28. Data that is copied from an application is stored in?
- Hard Disk
- Clipboard
- RAM
- CD
Answer & Explanation Discuss
Answer: B)
Clipboard
Explanation:
Data that is copied from an application is stored in Clipboard. It is a place where information from a computer file is stored for a short time until it is added to another file.
31. Servers are computers that provide resources to other computers connected to a ____.
- Network
- Bluetooth
- WiFi
- MAN
Answer & Explanation Discuss
Answer: A)
Network
Explanation:
Servers are computers that provide resources to other computers connected to a network.
34. Data that has been organized or presented in a meaningful way is called?
- Data
- Files
- Information
- Instructions
Answer & Explanation Discuss
Answer: C)
Information
Explanation:
Data that has been organized or presented in a meaningful way is called information. Information is processed data that has meaningful facts or insights.
35. In the binary language each letter of the alphabet, each number, and each special character is made up of a unique combination of?
- 32 bits
- 16 bits
- 8 bits
- 128 buts
Answer & Explanation Discuss
Answer: C)
8 bits
Explanation:
In the binary language each letter of the alphabet, each number, and each special character is made up of a unique combination of 8 bits.
36. Windows operating system 'Windows 8' is the product of which American company?
- Oracle
- Microsoft
- IBM
- Apple
Answer & Explanation Discuss
Answer: B)
Microsoft
Explanation:
Windows operating system 'Windows 8' is the product of Microsoft Corporation.
37. The term 'Pentium' is related to?
- Microprocessor
- CMOS
- Motherboard
- OS
Answer & Explanation Discuss
Answer: A)
Microprocessor
Explanation:
The term 'Pentium' is related to Microprocessor. A microprocessor is a processing device where the data processing logic and control are included on a single integrated circuit (IC), or a small number of ICs.
41. Where does most of the processing in a computer take place?
- CPU
- Memory
- Hard drive
- Motherboard
Answer & Explanation Discuss
Answer: A)
CPU
Explanation:
Central Processing Unit is often referred to as the "brain" of the computer and it is responsible for carrying out the instructions of the computer program within a system.
44. What is the name of the display feature that highlights are of the screen which requires operator attention?
- High contrast
- Reverse video
- Blinking text
- Pop up notification
Answer & Explanation Discuss
Answer: B)
Reverse video
Explanation:
"Reverse Video" is a feature that changes the colors of the highlighted screen area, making it stand out by using contrasting colors. This helps users notice important information or alerts easily.
46. What translates and executes the program at run-time line by line?
- Interpreter
- Compiler
- Assembler
- Executor
Answer & Explanation Discuss
Answer: A)
Interpreter
Explanation:
The interpreter translates and executes a program line by line in real time, converting the source code into machine code and immediately executing each line without creating a separate executable file.
56. How many characters are there in ASCII?
- 1024
- 128
- 256
- 512
Answer & Explanation Discuss
Answer: B)
128
Explanation:
The ASCII (American Standard Code for Information Interchange) coding system employs a 7-bit binary code to represent a wide range of characters. With 7 bits, there are 2^7 (128) possible combinations.
58. What term describes the action of code scrambling?
- Encryption
- Obfuscation
- Segmentation
- Aggregation
Answer & Explanation Discuss
Answer: A)
Encryption
Explanation:
Encryption is similar to scrambling a message into a secret code that only someone with the right key can unscramble. This keeps the information hidden from anyone who doesn't have the key.
60. What term is used to describe a computer program issue that causes it to function improperly?
- Bug
- Error
- Virus
- Glitch
Answer & Explanation Discuss
Answer: A)
Bug
Explanation:
A "bug" is a term commonly used in the realm of software development to denote a flaw or issue within a computer program that leads to its malfunction.
61. Which button makes alphabets/letters in uppercase and lowercase and numbers to symbols?
- Control button
- Caps lock button
- Shift button
- Alt button
Answer & Explanation Discuss
Answer: C)
Shift button
Explanation:
The button that is typically used to switch between uppercase and lowercase letters, as well as numbers to symbols, is the "Shift" key on a keyboard. By holding down the "Shift" key and then pressing a letter key, you can type the uppercase version of that letter.
71. What type of virus uses computer hosts to reproduce itself?
- Spyware
- Adware
- Worn
- Trojan
Answer & Explanation Discuss
Answer: C)
Worn
Explanation:
A worm is a type of virus that uses computer hosts to reproduce itself. It spreads by exploiting vulnerabilities in networks or systems and can replicate without needing to attach to files.
73. Which command is used to select the whole document?
- Shift + A
- Ctrl + A
- Alt + A
- Alt + Shift + A
Answer & Explanation Discuss
Answer: B)
Ctrl + A
Explanation:
The keyboard shortcut "Ctrl + A" is used to select the entire document or text within most applications. "Ctrl" stands for the Control key on the keyboard, and "A" represents "All."
75. The ability of an OS to run more than one application at a time is called?
- Multithreading
- Multi-user
- Multi-Processing
- Multitasking
Answer & Explanation Discuss
Answer: D)
Multitasking
Explanation:
Multitasking is the ability of an operating system to run more than one application simultaneously. It allows users to switch between different programs and tasks without having to close and reopen them.
76. What is the functional key to display the save-as box?
- F1
- F2
- F10
- F12
Answer & Explanation Discuss
Answer: D)
F12
Explanation:
The F12 key is commonly used to display the "Save As" dialog box, allowing you to specify a new filename or location when saving a file.
78. What term is used to describe something that has easily understood instructions?
- Analog Data
- User Friendly
- Clear and concise
- Intuitive
Answer & Explanation Discuss
Answer: A)
Analog Data
Explanation:
Analog data refers to information that is represented in a continuous and variable form. It can take on any value within a certain range. Examples of analog data include temperature readings, sound waves, and voltage levels.
79. A modem is connected to a ____.
- Router
- Computer
- Telephone Line
- Satellite Dish
Answer & Explanation Discuss
Answer: C)
Telephone Line
Explanation:
A modem is a device that connects digital devices, like computers, to communication networks. It's usually connected to a telephone line. It converts digital data from computers into analog signals for transmission over the line.
83. What is a term used to describe a program that performs a useful task while simultaneously allowing destructive acts?
- Trojan Horse
- Worm
- Malware
- Virus
Answer & Explanation Discuss
Answer: A)
Trojan Horse
Explanation:
A Trojan Horse is a type of malicious software that disguises itself as a legitimate program but contains harmful code that can perform destructive actions while appearing to serve a useful purpose.
86. Where are the CPU and memory located?
- Motherboard
- Monitor
- Keyboard
- Printer
Answer & Explanation Discuss
Answer: A)
Motherboard
Explanation:
The motherboard is the central hub that connects the CPU, memory, storage devices, expansion cards, and other essential components, allowing them to work together to perform various tasks and operations.
88. What is an image on a computer screen composed of?
- Bytes
- Pixels
- Lines of Code
- Digital Paint
Answer & Explanation Discuss
Answer: B)
Pixels
Explanation:
An image on a computer screen is made up of pixels, which are tiny dots of color that come together to form the visual representation. These pixels form the images you see on your computer screen, phone, TV, or any other electronic display.
90. Which command in DOS can be used to recover accidentally deleted files?
- RECOVER
- RESTORE
- UNDELETE
- RETRIEVE
Answer & Explanation Discuss
Answer: C)
UNDELETE
Explanation:
The UNDELETE command is a utility used to recover accidentally deleted files from storage media like hard drives, memory cards, or USB drives. It's typically provided by third-party file recovery software.
91. What is the term for a computer program that converts an entire program into machine language all at once?
- Assembler
- Compiler
- Interpreter
- Debugger
Answer & Explanation Discuss
Answer: B)
Compiler
Explanation:
A compiler is a computer program that translates an entire source code written in a high-level programming language into machine code or executable code all at once.
93. What is the personal computer operating system that organizes and uses a graphic desktop environment?
- DOS
- Linux
- Windows
- macOS
Answer & Explanation Discuss
Answer: C)
Windows
Explanation:
The Windows operating system is known for providing a graphic desktop environment, complete with icons, windows, menus, and graphical user interfaces (GUI) that make it user-friendly and visually organized.
94. What are the light pen and joystick?
- Input Device
- Output Device
- Scanner
- Printer
Answer & Explanation Discuss
Answer: A)
Input Device
Explanation:
A light pen is an input device that allows users to interact with a computer screen by pointing at it and a joystick is an input device used for controlling the movement of objects or characters in computer games and simulations.
95. What is a half-byte also called?
- Nibble
- Bit
- Bytelet
- Trit
Answer & Explanation Discuss
Answer: A)
Nibble
Explanation:
A nibble is a unit of digital data that consists of four bits. It is half of a standard byte, which contains eight bits. Nibbles are often used in computing and data processing when dealing with groups of four bits at a time.
97. What do we use to change the appearance and positioning of text documents in MS Word?
- Templates
- Font Styles
- Page Layout
- Formatting Toolbar
Answer & Explanation Discuss
Answer: D)
Formatting Toolbar
Explanation:
In Microsoft Word, the Formatting Toolbar provides options to change the appearance and positioning of text within a document, including font styles, alignment, indentation, and more.
98. What term is used to represent approximately a million bytes?
- Gigabyte
- Megabyte
- Kilobyte
- Terabyte
Answer & Explanation Discuss
Answer: B)
Megabyte
Explanation:
A megabyte (MB) is a unit of digital information storage that represents approximately one million bytes. One megabyte is equivalent to 1,000 kilobytes (KB) or 1,000,000 bytes.
99. What term is used to describe devices like the Daisy wheel, Drum, and Chain?
- Printer
- Scanner
- Keyboard
- Mouse
Answer & Explanation Discuss
Answer: A)
Printer
Explanation:
Daisy wheel, Drum, and Chain - are associated with various types of printers. These devices are components or mechanisms within printers that help generate printed text and images.
104. Which type of storage device is a BIOS?
- Primary
- Secondary
- Tertiary
- Cache
Answer & Explanation Discuss
Answer: A)
Primary
Explanation:
The BIOS (Basic Input/Output System) is stored in a chip on the motherboard and is a type of firmware that provides essential low-level functions for the computer's hardware. It is part of the computer's primary memory.
105. What is the extension type of the Excel 2007 files?
- .xls
- .docx
- .pptx
- .xlsx
Answer & Explanation Discuss
Answer: D)
.xlsx
Explanation:
The ".xlsx" file extension refers to the file format used by Microsoft Excel for spreadsheets created with Excel 2007 and later versions. Files with the ".xlsx" extension contain data organized in rows and columns, formulas, charts, and other features commonly associated with spreadsheet applications.
106. What term is used to describe the act of collecting personal information and effectively posing as another individual?
- Identity Theft
- Cyberbullying
- Digital Fraud
- Data Breach
Answer & Explanation Discuss
Answer: A)
Identity Theft
Explanation:
Identity theft involves the unauthorized collection of personal information with the intention of posing as another individual, often for financial gain or fraudulent activities.
107. What is the term used to describe the amount of vertical space between lines of text in a document?
- Indentation
- Spacing
- Line Spacing
- Alignment
Answer & Explanation Discuss
Answer: C)
Line Spacing
Explanation:
Line spacing refers to the amount of vertical space between lines of text in a document. It affects the readability and overall appearance of the text.
108. What essential component must a computer have to initiate the 'boot' process?
- Keyboard
- Operating System
- Monitor
- Mouse
Answer & Explanation Discuss
Answer: B)
Operating System
Explanation:
A computer cannot initiate the 'boot' process without an operating system, as it is responsible for managing hardware, and software, and initiating the startup sequence.
109. What is the other name for the programmed chip?
- LSIC
- ROM
- RAM
- PROM
Answer & Explanation Discuss
Answer: D)
PROM
Explanation:
PROM Stands for Programmable Read-Only Memory, It refers to a type of memory chip that can be programmed with specific data or instructions during manufacturing but cannot be changed afterward.
114. When did arch-rivals IBM and Apple Computers Inc. decide to join hands?
- 1985
- 1991
- 1995
- 2000
Answer & Explanation Discuss
Answer: B)
1991
Explanation:
In 1990, IBM and Apple Computers Inc. decided to join hands and collaborate on a new project known as "AIM" (Advanced Interactive Microelectronics). This partnership aimed to create a new generation of personal computer technology.
115. What kind of memory is both static and non-volatile?
- Cache Memory
- Virtual Memory
- RAM
- ROM
Answer & Explanation Discuss
Answer: D)
ROM
Explanation:
Read-Only Memory (ROM) is a type of memory that is both static (retains its contents without power) and non-volatile (retains its contents even when power is removed). It contains permanent instructions or data that cannot be modified after manufacturing.
116. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
- Glitch
- Virus
- Worm
- Malware
Answer & Explanation Discuss
Answer: A)
Glitch
Explanation:
In computer jargon, an alternative term for an error in software or hardware is "glitch." It refers to a temporary or minor fault that can cause unexpected behavior or malfunctions in a system.
117. What term is used to describe unwanted repetitious messages, such as unsolicited bulk e-mail?
- Hijacking
- Phishing
- Spam
- Malware
Answer & Explanation Discuss
Answer: C)
Spam
Explanation:
Unwanted repetitious messages, such as unsolicited bulk e-mails, are commonly referred to as spam.
118. What is the common name for the crime of stealing passwords?
- Hacking
- Phishing
- Malware
- Spoofing
Answer & Explanation Discuss
Answer: D)
Spoofing
Explanation:
Spoofing involves impersonating someone or something trusted to trick victims into taking actions that benefit the attacker's objectives.
121. RAM can be treated as the ____ for the computer's processor.
- Brain
- Memory
- Workspace
- Waiting Room
Answer & Explanation Discuss
Answer: D)
Waiting Room
Explanation:
"Waiting Room," fits well with the concept of RAM serving as a temporary storage area for data and instructions that the processor is currently working with.
122. What term is used to describe the various ways in which computers manipulate data?
- Data Processing
- Data Manipulation
- Data Conversion
- Data Rendering
Answer & Explanation Discuss
Answer: A)
Data Processing
Explanation:
Data Processing refers to the manipulation, transformation, and organization of data by a computer or other electronic device. It involves various operations such as calculations, sorting, and converting data from one format to another.
126. In the context of Windows, the 'Help' menu is available at which button?
- F1
- Start
- Ctrl
- Alt
Answer & Explanation Discuss
Answer: B)
Start
Explanation:
The Help Menu in the Windows operating system is often accessed by clicking on the "Start" button and then selecting the "Help" option.
129. Which is the most common tool used to restrict access to computer systems?
- Firewall
- Anti-virus Software
- Encryption
- Password Protection
Answer & Explanation Discuss
Answer: D)
Password Protection
Explanation:
Password protection is the most common tool used to restrict access to a computer system, or specific files. It involves setting up a password that users must provide to gain access, helping to secure sensitive information and prevent unauthorized access.
130. What is the term for the technology that stores only essential instructions on a microprocessor chip, thus enhancing its speed?
- Cache Memory
- RISC
- Overclocking
- Parallel Processing
Answer & Explanation Discuss
Answer: B)
RISC
Explanation:
RISC stands for Reduced Instruction Set Computing. This architecture focuses on using a smaller set of essential and efficient instructions to enhance processor speed and performance.
131. What is the name of an application program that gathers user information and sends it to someone through the Internet?
- Antivirus
- Firewall
- Spybot
- Browser
Answer & Explanation Discuss
Answer: C)
Spybot
Explanation:
Spybot Search & Destroy is an anti-spyware software designed to detect and remove various types of malicious software, including spyware, adware, and other potentially unwanted programs.
132. The basic unit of a worksheet into which you enter data in Excel is called?
- Row
- Cell
- Column
- Table
Answer & Explanation Discuss
Answer: B)
Cell
Explanation:
A cell is an intersection of a row and a column. Each cell has its name like A2 which is also known as cell address.
133. What contains buttons and menus that provide quick access to commonly used commands?
- Toolbar
- Menubar
- Taskbar
- Status bar
Answer & Explanation Discuss
Answer: A)
Toolbar
Explanation:
A toolbar contains buttons and menus that provide quick access to commonly used commands. The toolbar is a visual interface that contains buttons, icons, and other components for displaying and receiving information on a computer screen.
137. The blinking symbol on the computer screen is called the ____.
- Bluetooth
- Battery
- Cursor
- Paste Options
Answer & Explanation Discuss
Answer: C)
Cursor
Explanation:
The blinking symbol on the computer screen is known as the cursor. A cursor looks like a vertical line that indicates the position on a computer’s screen where a user can enter text.
142. Gmail, a web-based email service is the product of which company?
- Google
- Oracle
- Apple
- Yahoo
Answer & Explanation Discuss
Answer: A)
Google
Explanation:
Gmail is a free email service provided by Google. This is one of the most popular emails.
143. A pointer is shaped like a hand when it is positioned over ___.
- URL
- File
- Document
- Hyperlink
Answer & Explanation Discuss
Answer: D)
Hyperlink
Explanation:
A pointer is shaped like a hand when it is positioned over a Hyperlink on the internet or an application.
159. The device used to carry Digital data on Analog lines is called ____.
- Conductor
- Insulator
- Demodulation
- Modulator
Answer & Explanation Discuss
Answer: D)
Modulator
Explanation:
The device used to carry digital data on Analog lines is known as Modulator. A modulator is an electronic circuit that superimposes a low-frequency (information) signal onto a high-frequency (carrier) signal for the purpose of wireless transmission (source).
160. Which are used to identify a user to get the details of accessibility on a website?
- Buses
- Cache
- Cookies
- None of the above mentioned
Answer & Explanation Discuss
Answer: C)
Cookies
Explanation:
Cookies are used to identify a user to get the details of accessibility on a website. Cookies contain text that a site you visit sends to your computer. They help the website remember the things about your visit, which can make it easier for you to go back to the site and make it more useful to you.