0% found this document useful (0 votes)
51 views39 pages

Data Network Enginer

Questions related to Prescribed Qualification. (100%) Questions Only (for PPSC BS-16 Network System Engineer Preparation) Short Questions

Uploaded by

YOUSAF KULACHI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views39 pages

Data Network Enginer

Questions related to Prescribed Qualification. (100%) Questions Only (for PPSC BS-16 Network System Engineer Preparation) Short Questions

Uploaded by

YOUSAF KULACHI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

Computer Fundamentals & Number Systems

Q1: Which of the following is not a component of the computer system?


A) Operating System
B) CPU
C) RAM
D) Mouse
✅ Answer: A
Explanation: Operating System is software, not a hardware component.

Q2: Binary number system uses:


A) 0–7
B) 0–9
C) 0–1
D) 0–15
✅ Answer: C
Explanation: Binary system uses only two digits: 0 and 1.

Q3: Convert binary 1011 to decimal.


A) 11
B) 13
C) 14
D) 9
✅ Answer: A
Explanation: 1×23+0×22+1×21+1×20=8+0+2+1=111×2^3 + 0×2^2 + 1×2^1 + 1×2^0 =
8+0+2+1 = 111×23+0×22+1×21+1×20=8+0+2+1=11

Q4: Decimal 25 in binary is:


A) 11000
B) 11001
C) 11010
D) 11100
✅ Answer: B
Explanation: 25 = 110011100111001 in binary.

Q5: Which is the smallest unit of data in a computer?


A) Bit
B) Byte
C) Nibble
D) Word
✅ Answer: A
Explanation: A bit (binary digit) is the smallest data unit.

Q6: 1 byte = ? bits


A) 4
B) 8
C) 16
D) 1024
✅ Answer: B
Explanation: 1 Byte = 8 bits.
Q7: Which number system is base-16?
A) Octal
B) Binary
C) Hexadecimal
D) Decimal
✅ Answer: C
Explanation: Hexadecimal uses base-16 (0-9, A-F).

Q8: Which gate produces output 1 only when both inputs are 1?
A) OR
B) AND
C) NOT
D) NAND
✅ Answer: B
Explanation: AND gate gives 1 only when both inputs are 1.

Q9: NOT gate is also known as:


A) Inverter
B) Amplifier
C) Splitter
D) Adder
✅ Answer: A
Explanation: NOT gate inverts the input: 1 → 0, 0 → 1.

Q10: Octal number system uses digits from:


A) 0–9
B) 0–7
C) 1–8
D) 0–15
✅ Answer: B
Explanation: Octal = base-8 → digits from 0 to 7.

Q11: Convert decimal 65 to binary:


A) 1000000
B) 1000001
C) 1000011
D) 1010001
✅ Answer: B
Explanation: 65 = 1000001

Q12: Which of the following is volatile memory?


A) ROM
B) Hard disk
C) RAM
D) SSD
✅ Answer: C
Explanation: RAM loses data when power is off, so it's volatile.

Q13: Which of these is system software?


A) MS Word
B) Chrome
C) Windows OS
D) Photoshop
✅ Answer: C
Explanation: Windows OS is system software; others are applications.

Q14: Which device is used to convert digital signals to analog?


A) Router
B) Modem
C) Switch
D) Hub
✅ Answer: B
Explanation: Modem = Modulator + Demodulator.

Q15: Which of the following is non-volatile?


A) RAM
B) ROM
C) Cache
D) Register
✅ Answer: B
Explanation: ROM retains data even after power is off.

Q16: Convert Hex 2F to decimal.


A) 47
B) 35
C) 39
D) 41
✅ Answer: A
Explanation: 2F = 2×16 + 15 = 32 + 15 = 47

Q17: Which of these is not a programming language?


A) Python
B) C++
C) Java
D) Windows
✅ Answer: D
Explanation: Windows is an OS, not a programming language.

Q18: Which generation of computers used ICs?


A) First
B) Second
C) Third
D) Fourth
✅ Answer: C
Explanation: 3rd generation computers used Integrated Circuits.

Q19: The term “booting” means:


A) Connecting internet
B) Installing software
C) Starting the computer
D) Formatting disk
✅ Answer: C
Explanation: Booting = Starting computer and loading OS.
Q20: Which gate gives output 1 when at least one input is 1?
A) AND
B) OR
C) NOT
D) NAND
✅ Answer: B
Explanation: OR gate gives 1 if any input is 1.

Q21: What is the hexadecimal equivalent of binary 101011?


A) 2B
B) 3F
C) 1C
D) 15
✅ Answer: A
Explanation: 101011 → group as 0010 1011 → 2B in Hex.

Q22: What type of computer is used in hospitals for MRI and CT scans?
A) Supercomputer
B) Mainframe
C) Embedded
D) Personal computer
✅ Answer: A
Explanation: Supercomputers process large-scale scientific data.

Q23: What is the main function of the ALU in a computer?


A) Store data
B) Perform arithmetic and logic operations
C) Display output
D) Manage files
✅ Answer: B
Explanation: ALU = Arithmetic Logic Unit.

Q24: Which of these is used to permanently store data?


A) RAM
B) ROM
C) Cache
D) Registers
✅ Answer: B
Explanation: ROM stores data permanently (Read-Only Memory).

Q25: What base does the decimal number system use?


A) 2
B) 8
C) 10
D) 16
✅ Answer: C
Explanation: Decimal = base-10 system.

Q26: The binary number 1111 is equal to which decimal value?


A) 15
B) 13
C) 12
D) 14
✅ Answer: A
Explanation: 1×23+1×22+1×21+1×20=8+4+2+1=151×2^3 + 1×2^2 + 1×2^1 + 1×2^0 =
8+4+2+1 = 151×23+1×22+1×21+1×20=8+4+2+1=15

Q27: How many bits are there in 2 bytes?


A) 4
B) 8
C) 16
D) 32
✅ Answer: C
Explanation: 1 byte = 8 bits → 2 bytes = 16 bits.

Q28: A kilobyte (KB) equals:


A) 1000 bytes
B) 1024 bytes
C) 100 bytes
D) 512 bytes
✅ Answer: B
Explanation: 1 KB = 1024 bytes in binary systems.

Q29: ASCII stands for:


A) American Standard Code for Information Interchange
B) Advanced System for Communication and Internet Interface
C) Automated Storage and Communication Interface
D) Analog Standard for Character Input Integration
✅ Answer: A
Explanation: ASCII = 7-bit standard encoding text format.

Q30: The primary function of the CPU is:


A) Displaying images
B) Processing instructions
C) Saving files
D) Printing documents
✅ Answer: B
Explanation: CPU = Central Processing Unit = "brain" of computer.

Q31: Which hardware is responsible for image display?


A) RAM
B) Processor
C) GPU
D) Motherboard
✅ Answer: C
Explanation: GPU (Graphics Processing Unit) handles image rendering.

Q32: Which part of the computer performs calculations?


A) RAM
B) ROM
C) ALU
D) Cache
✅ Answer: C
Explanation: ALU (Arithmetic Logic Unit) performs calculations.
Q33: A nibble consists of:
A) 2 bits
B) 4 bits
C) 8 bits
D) 16 bits
✅ Answer: B
Explanation: 1 nibble = 4 bits.

Q34: Which software acts as an intermediary between user and hardware?


A) Application software
B) Web browser
C) Operating system
D) Device driver
✅ Answer: C
Explanation: OS bridges the gap between user and hardware.

Q35: Convert decimal 31 to binary.


A) 11110
B) 11111
C) 11010
D) 10101
✅ Answer: B
Explanation: 31 in binary = 11111.

Q36: Binary equivalent of Hex A is:


A) 1111
B) 1100
C) 1010
D) 1001
✅ Answer: C
Explanation: Hex A = 10 in decimal = 1010 in binary.

Q37: Which number system is commonly used in microprocessors?


A) Decimal
B) Octal
C) Hexadecimal
D) Binary
✅ Answer: D
Explanation: Computers operate in binary.

Q38: What is 1's complement of binary 1001?


A) 1001
B) 0110
C) 1110
D) 1100
✅ Answer: B
Explanation: 1's complement = Flip each bit → 0110.
Q39: Which device is input/output both?
A) Keyboard
B) Monitor
C) Modem
D) Mouse
✅ Answer: C
Explanation: Modem sends and receives data → I/O device.

Q40: What is the binary of decimal 18?


A) 10010
B) 11010
C) 10100
D) 10011
✅ Answer: A
Explanation: 18 = 10010 in binary.

Q41: Convert 110010 binary to decimal.


A) 50
B) 48
C) 49
D) 52
✅ Answer: D
Explanation: 1×25+1×24+0×23+0×22+1×21+0×20=521×2^5 + 1×2^4 + 0×2^3 + 0×2^2
+ 1×2^1 + 0×2^0 = 521×25+1×24+0×23+0×22+1×21+0×20=52

Q42: Which logic gate outputs 0 when both inputs are 1?


A) AND
B) NOR
C) NAND
D) XOR
✅ Answer: C
Explanation: NAND = NOT of AND → 1 AND 1 = 1 → NOT = 0

Q43: Decimal 100 is equal to Hex:


A) 63
B) 64
C) 65
D) 66
✅ Answer: A
Explanation: 100 ÷ 16 = 6 remainder 4 → Hex = 64

Q44: Full form of BIOS is:


A) Basic Input Output System
B) Binary Integrated Operating Setup
C) Bitwise Internal Operating System
D) Base Integrated Operating Standard
✅ Answer: A
Explanation: BIOS = firmware used during computer boot-up.

Q45: Which memory is fastest?


A) RAM
B) ROM
C) Cache
D) Hard disk
✅ Answer: C
Explanation: Cache is fastest (close to CPU).

Q46: Base of octal number system is:


A) 2
B) 8
C) 10
D) 16
✅ Answer: B
Explanation: Octal = base-8.

Q47: What is the 2’s complement of binary 0101?


A) 1010
B) 1101
C) 1011
D) 1111
✅ Answer: C
Explanation: Flip bits → 1010 + 1 = 1011

Q48: Which of the following is system software?


A) MS Excel
B) Windows 10
C) VLC Media Player
D) Photoshop
✅ Answer: B
Explanation: Windows OS is system software.

Q49: Which component holds BIOS?


A) RAM
B) ROM
C) HDD
D) Processor
✅ Answer: B
Explanation: BIOS is stored in ROM.

Q50: Which of these is not a logic gate?


A) AND
B) OR
C) YES
D) NAND
✅ Answer: C
Explanation: "YES" is not a valid gate.

Q1: The brain of the computer is:


A) Monitor
B) Keyboard
C) CPU
D) Mouse
✅ Answer: C
Explanation: The CPU (Central Processing Unit) processes all data and instructions.
Q2: One kilobyte (1 KB) is equal to:
A) 1000 bytes
B) 1024 bytes
C) 512 bytes
D) 256 bytes
✅ Answer: B
Explanation: In binary systems, 1 KB = 1024 bytes.

Q3: Which of the following is an input device?


A) Monitor
B) Printer
C) Keyboard
D) Speaker
✅ Answer: C
Explanation: Keyboard is used to input data into the system.

Q4: Which of these is not a programming language?


A) Python
B) Java
C) Linux
D) C++
✅ Answer: C
Explanation: Linux is an operating system, not a programming language.

Q5: The function of RAM is to:


A) Store data permanently
B) Perform arithmetic operations
C) Store data temporarily
D) Control input devices
✅ Answer: C
Explanation: RAM is volatile memory and stores data temporarily.

Q6: The full form of URL is:


A) Uniform Resource Locator
B) Uniform Retrieval Language
C) Unique Resource Locator
D) Universal Reference Link
✅ Answer: A
Explanation: URL is the web address of a resource on the internet.

Q7: Which shortcut key is used to copy selected text in Windows?


A) Ctrl + X
B) Ctrl + C
C) Ctrl + V
D) Ctrl + Z
✅ Answer: B
Explanation: Ctrl + C = Copy.

Q8: Operating system is:


A) System software
B) Application software
C) Database
D) Compiler
✅ Answer: A
Explanation: OS manages system hardware and software.

Q9: The binary number system is based on:


A) 4
B) 2
C) 10
D) 8
✅ Answer: B
Explanation: Binary uses two digits: 0 and 1.

Q10: Google Chrome is a:


A) Search Engine
B) Browser
C) Antivirus
D) Compiler
✅ Answer: B
Explanation: Chrome is a web browser developed by Google.

Q11: The main page of a website is called:


A) Index
B) Link
C) Homepage
D) URL
✅ Answer: C
Explanation: Homepage is the starting point of a website.

Q12: What is the full form of HTML?


A) HyperText Making Language
B) HighText Machine Language
C) HyperText Markup Language
D) HighText Marking Language
✅ Answer: C
Explanation: HTML is used to design web pages.

Q13: The shortcut key for "Undo" is:


A) Ctrl + U
B) Ctrl + Y
C) Ctrl + Z
D) Ctrl + P
✅ Answer: C
Explanation: Ctrl + Z = Undo.

Q14: Which of these is a high-level programming language?


A) Assembly
B) Machine Code
C) Python
D) Binary
✅ Answer: C
Explanation: Python is a high-level, human-readable language.
Q15: Which company developed the Windows OS?
A) Google
B) Apple
C) Microsoft
D) IBM
✅ Answer: C
Explanation: Microsoft Corporation developed Windows OS.

Q16: Which key is used to refresh a webpage in the browser?


A) F1
B) F3
C) F5
D) F2
✅ Answer: C
Explanation: F5 refreshes a webpage.

Q17: What does IP stand for in networking?


A) Internet Protocol
B) Internal Processing
C) Internet Provider
D) Interconnection Protocol
✅ Answer: A
Explanation: IP = Internet Protocol, used for addressing and routing.

Q18: Which of the following is a non-volatile memory?


A) RAM
B) Cache
C) ROM
D) Register
✅ Answer: C
Explanation: ROM retains data after power is off.

Q19: Which one is a spreadsheet application?


A) MS Word
B) MS Excel
C) MS Access
D) MS Paint
✅ Answer: B
Explanation: MS Excel is used for spreadsheet tasks.

Q20: The internet was originally developed by:


A) NASA
B) IBM
C) DARPA
D) Microsoft
✅ Answer: C
Explanation: DARPA (Defense Advanced Research Projects Agency) started the early form
of internet.
Q21: A computer virus is:
A) Software bug
B) Malicious program
C) Operating system
D) Computer hardware
✅ Answer: B
Explanation: A virus is a type of malicious software.

Q22: Which of these is not an output device?


A) Monitor
B) Printer
C) Speaker
D) Scanner
✅ Answer: D
Explanation: Scanner is an input device.

Q23: What does HTTP stand for?


A) HyperText Transfer Protocol
B) HighText Transfer Protocol
C) HyperText Transmission Protocol
D) High Transfer Text Protocol
✅ Answer: A
Explanation: HTTP is the foundation of data communication on the web.

Q24: Which part of the computer is responsible for calculations and comparisons?
A) CU
B) ALU
C) RAM
D) SSD
✅ Answer: B
Explanation: ALU = Arithmetic Logic Unit.

Q25: Which is the smallest unit of storage?


A) Bit
B) Byte
C) Nibble
D) Kilobyte
✅ Answer: A
Explanation: 1 Bit is the smallest data unit.

Q26: What is the full form of PDF?


A) Portable Document Format
B) Public Document File
C) Printable Data Format
D) Personal Document Format
✅ Answer: A
Explanation: PDF is used for sharing formatted documents.

Q27: Which device connects multiple computers in a LAN?


A) Modem
B) Hub
C) Router
D) Switch
✅ Answer: B
Explanation: A hub is used to connect systems in a local network.

Q28: Linux is an example of:


A) Antivirus
B) Hardware
C) Operating system
D) Application software
✅ Answer: C
Explanation: Linux is a free and open-source OS.

Q29: What is a firewall used for?


A) Boost speed
B) Display graphics
C) Security
D) Formatting
✅ Answer: C
Explanation: Firewalls protect networks from unauthorized access.

Q30: Which of the following is a valid IP address?


A) 192.168.1.1
B) 256.100.100.100
C) 300.200.1.1
D) 192.300.100.100
✅ Answer: A
Explanation: IP addresses use values from 0 to 255 in each octet.

Day 2: Computer Architecture & Digital Logic

Q1: Von Neumann architecture uses which single unit to store instructions and data?
A) Register
B) ROM
C) RAM
D) Cache
✅ Answer: C
Explanation: RAM stores both instructions and data in Von Neumann architecture.

Q2: The ALU and CU are parts of:


A) RAM
B) CPU
C) Hard Disk
D) ROM
✅ Answer: B
Explanation: The Central Processing Unit contains ALU and CU.

Q3: Which component interprets and executes instructions?


A) ALU
B) Register
C) Control Unit
D) Decoder
✅ Answer: C
Explanation: CU directs the operation of the processor.
Q4: A 4-bit register can hold:
A) 4 bytes
B) 2 bits
C) 8 bits
D) 4 bits
✅ Answer: D
Explanation: Bit size = number of bits the register can store.

Q5: Which bus carries data between CPU and memory?


A) Address Bus
B) Data Bus
C) Control Bus
D) I/O Bus
✅ Answer: B
Explanation: Data Bus carries data, Address Bus carries location.

Q6: XOR gate output is 1 when:


A) Both inputs are 1
B) Both inputs are 0
C) Inputs are different
D) Inputs are same
✅ Answer: C
Explanation: XOR = 1 when inputs are different.

Q7: Which gate is known as the "universal gate"?


A) AND
B) OR
C) NAND
D) NOT
✅ Answer: C
Explanation: NAND can be used to construct all other gates.

Q8: The NOT gate is also called:


A) Converter
B) Inverter
C) Repeater
D) Switcher
✅ Answer: B
Explanation: NOT gate inverts the input.

Q9: The main memory is also called:


A) Secondary memory
B) Cache
C) Primary memory
D) ROM
✅ Answer: C
Explanation: Main/Primary memory includes RAM and ROM.

Q10: In digital circuits, flip-flops are used for:


A) Arithmetic operations
B) Data transfer
C) Storing single-bit data
D) Multiplication
✅ Answer: C
Explanation: Flip-flops store 1-bit of data.

Q11: How many output lines does a 3-to-8 decoder have?


A) 3
B) 6
C) 8
D) 12
✅ Answer: C
Explanation: 2^3 = 8 output lines.

Q12: A multiplexer is also known as:


A) Data selector
B) Decoder
C) Demultiplexer
D) Encoder
✅ Answer: A
Explanation: MUX selects one input from many.

Q13: A 1-bit full adder adds:


A) Two bits
B) Three bits
C) Four bits
D) Eight bits
✅ Answer: B
Explanation: Full adder adds A, B, and Carry-in.

Q14: Cache memory is:


A) Slower than RAM
B) Faster than RAM
C) Equal in speed to ROM
D) A secondary memory
✅ Answer: B
Explanation: Cache is closer to CPU → faster access.

Q15: Which type of memory is used to store the BIOS?


A) RAM
B) ROM
C) Cache
D) Hard Disk
✅ Answer: B
Explanation: BIOS is stored in non-volatile ROM.

Q16: What does RISC stand for?


A) Reduced Instruction Set Computer
B) Rapid Integrated System Control
C) Real Instruction Set Code
D) Reduced Input System Control
✅ Answer: A
Explanation: RISC = simpler instructions for faster execution.

Q17: In which architecture are instructions and data stored in the same memory?
A) Harvard
B) Modified Harvard
C) Von Neumann
D) VLIW
✅ Answer: C
Explanation: Von Neumann uses a shared memory for both.

Q18: Which register holds the address of the next instruction?


A) MAR
B) MDR
C) PC
D) IR
✅ Answer: C
Explanation: PC = Program Counter.

Q19: Instruction execution involves:


A) Fetch → Decode → Execute
B) Decode → Fetch → Execute
C) Execute → Decode → Fetch
D) Fetch → Execute → Decode
✅ Answer: A
Explanation: Standard instruction cycle.

Q20: What is the output of a NAND gate when both inputs are 1?
A) 0
B) 1
C) Undefined
D) Depends on condition
✅ Answer: A
Explanation: AND = 1, NAND = NOT 1 = 0

Q21: Which flip-flop is called a “basic flip-flop”?


A) T
B) D
C) SR
D) JK
✅ Answer: C
Explanation: SR is the simplest type of flip-flop.

Q22: Half adder has:


A) 1 input, 1 output
B) 2 inputs, 2 outputs
C) 3 inputs, 1 output
D) 2 inputs, 1 output
✅ Answer: B
Explanation: Half adder has Sum and Carry outputs.
Q23: ALU is connected to:
A) CU
B) RAM
C) Cache
D) ROM
✅ Answer: A
Explanation: CU controls ALU for operations.

Q24: The instruction register (IR) holds:


A) Address of instruction
B) Executed data
C) Current instruction
D) All instructions
✅ Answer: C
Explanation: IR = holds currently executing instruction.

Q25: Harvard architecture has:


A) Shared instruction & data memory
B) Separate instruction & data memory
C) Slow access
D) No cache
✅ Answer: B
Explanation: Unlike Von Neumann, Harvard separates both.

Q26: Main difference between RISC and CISC?


A) CISC = short instructions
B) RISC = many addressing modes
C) CISC = complex instructions
D) RISC = more memory
✅ Answer: C
Explanation: CISC has complex instructions, RISC has simple.

Q27: Which of these is volatile memory?


A) ROM
B) RAM
C) SSD
D) Flash
✅ Answer: B
Explanation: RAM loses data when power is off.

Q28: What is the purpose of MAR?


A) Store data
B) Store address
C) Decode instruction
D) Transfer to ALU
✅ Answer: B
Explanation: MAR = Memory Address Register.

Q29: What does the control bus carry?


A) Addresses
B) Data
C) Timing signals
D) Power
✅ Answer: C
Explanation: Control bus handles control and timing signals.

Q30: An 8-bit microprocessor can process:


A) 8 digits
B) 8-bit data at once
C) 8 characters
D) 8 registers
✅ Answer: B
Explanation: It processes 8-bit chunks of data.

Q31: A flip-flop is made from:


A) Capacitor
B) Register
C) Logic gates
D) Transistor
✅ Answer: C
Explanation: Flip-flops use logic gates.

Q32: Which logic gate outputs 1 only if both inputs are 0?


A) AND
B) OR
C) NOR
D) NAND
✅ Answer: C
Explanation: NOR = NOT (A OR B)

Q33: An adder circuit adds:


A) Multiplications
B) Only negative values
C) Binary numbers
D) ASCII values
✅ Answer: C
Explanation: It adds binary numbers.

Q34: In binary addition, 1 + 1 = ?


A) 10
B) 1
C) 0
D) 11
✅ Answer: A
Explanation: 1 + 1 in binary = 10 (carry 1).

Q35: Which is a sequential circuit?


A) Half Adder
B) Decoder
C) Flip-Flop
D) Multiplexer
✅ Answer: C
Explanation: Sequential circuits have memory (like flip-flops).

Q36: A register temporarily stores:


A) Instructions
B) Output
C) Data
D) Inputs
✅ Answer: C
Explanation: Registers store intermediate data.

Q37: Pipelining improves:


A) Memory
B) Processing speed
C) Output quality
D) Cache size
✅ Answer: B
Explanation: Pipelining increases instruction throughput.

Q38: What is the default value in SR flip-flop when S=0, R=0?


A) 1
B) 0
C) Previous state
D) Invalid
✅ Answer: C
Explanation: No change in state.

Q39: Clock pulse is needed for:


A) Latch
B) Combinational circuit
C) Flip-Flop
D) Decoder
✅ Answer: C
Explanation: Flip-flops are clock-triggered.

Q40: How many states in a 3-bit counter?


A) 8
B) 6
C) 4
D) 16
✅ Answer: A
Explanation: 2^3 = 8 states.

Q41: Instruction pipeline hazards are caused by:


A) Memory overflow
B) Data dependency
C) Low voltage
D) System crash
✅ Answer: B
Explanation: Hazards arise when instructions depend on each other.
Q42: Which is not part of CPU?
A) ALU
B) CU
C) RAM
D) Registers
✅ Answer: C
Explanation: RAM is memory, not part of CPU.

Q43: What stores micro-instructions?


A) ROM
B) RAM
C) Control Memory
D) Registers
✅ Answer: C
Explanation: Control memory holds microinstructions.

Q44: The clock frequency of a processor affects:


A) Input speed
B) Data width
C) Processing speed
D) Power
✅ Answer: C
Explanation: Higher clock = faster execution.

Q45: Purpose of instruction decoder:


A) Multiply numbers
B) Store output
C) Decode opcodes
D) Encrypt data
✅ Answer: C
Explanation: It decodes binary opcodes into control signals.

Q46: Which memory is fastest after registers?


A) RAM
B) ROM
C) Cache
D) Flash
✅ Answer: C
Explanation: Cache is fastest after registers.

Q47: Boolean logic is used in:


A) Word processing
B) Circuit design
C) Networking
D) Antivirus
✅ Answer: B
Explanation: Boolean algebra is the foundation of digital logic.

Q48: Number of gates in full adder:


A) 3
B) 5
C) 9
D) 2
✅ Answer: C
Explanation: Typically, 9 gates are used (2 XOR, 2 AND, 1 OR, etc.)

Q49: Which circuit adds three 1-bit numbers?


A) Half Adder
B) Full Adder
C) Multiplier
D) XOR gate
✅ Answer: B
Explanation: Full Adder = A + B + Carry-in.

Q50: Register used to store data temporarily for ALU operation:


A) MAR
B) MDR
C) Accumulator
D) IR
✅ Answer: C
Explanation: Accumulator is used for arithmetic operations.

Q1. Who is known as the Father of the Computer?


A) Alan Turing B) Charles Babbage C) John von Neumann D) Bill Gates
✔ Answer: B
Explanation: Charles Babbage is considered the "Father of the Computer" due to his design
of the Analytical Engine.

Q2. What does CPU stand for?


A) Central Processing Unit B) Computer Processing Unit C) Central Programming Unit
D) Control Processing Unit
✔ Answer: A
Explanation: CPU is the brain of the computer that processes all instructions.

Q3. Which part of the computer is used to store data permanently?


A) RAM B) ROM C) Hard Disk D) Cache
✔ Answer: C
Explanation: The hard disk is a non-volatile storage device used to store data permanently.

Q4. What does RAM stand for?


A) Read and Modify B) Random Access Memory C) Read Access Memory D) Run Access
Memory
✔ Answer: B
Explanation: RAM temporarily stores data and instructions for quick access.

Q5. What is the shortcut key for 'Copy' in Windows?


A) Ctrl + C B) Ctrl + X C) Ctrl + V D) Ctrl + Z
✔ Answer: A
Explanation: Ctrl + C is the standard shortcut for copying.
Q6. What is the function of an Operating System?
A) Manages hardware B) Manages software C) Provides user interface D) All of the
above
✔ Answer: D
Explanation: The OS is a system software that manages all resources and provides UI.

Q7. Which one is NOT an input device?


A) Mouse B) Keyboard C) Scanner D) Monitor
✔ Answer: D
Explanation: Monitor is an output device.

Q8. What is the full form of URL?


A) Uniform Resource Locator B) Uniform Result Locator C) Unified Resource Locator D)
Universal Resource Link
✔ Answer: A
Explanation: URL is the address of a web page.

Q9. What is the binary number system based on?


A) 10 B) 8 C) 16 D) 2
✔ Answer: D
Explanation: Binary uses only 0 and 1.

Q10. Which device is used to connect computers over a network?


A) Joystick B) Switch C) Scanner D) Printer
✔ Answer: B
Explanation: Switches connect multiple computers in a LAN.

Q11. The first mechanical computer was called?


A) ENIAC B) Pascaline C) Analytical Engine D) UNIVAC
✔ Answer: C
Explanation: The Analytical Engine was designed by Charles Babbage.

Q12. What is phishing?


A) Fishing on websites B) Fraudulent attempt to get personal data C) Virus spreading D)
Network sharing
✔ Answer: B
Explanation: Phishing is a cyberattack to steal sensitive information.

Q13. What is the full form of IP in networking?


A) Internet Protocol B) Internal Program C) Input Port D) Initial Protocol
✔ Answer: A
Explanation: IP is a key protocol in the internet layer.

Q14. HTML is used to?


A) Design web pages B) Operate databases C) Manage files D) Format disks
✔ Answer: A
Explanation: HTML is a markup language for creating web pages.

Q15. What is the function of a firewall?


A) Protect against fire B) Protects network from threats C) Cools the CPU D) Removes
viruses
✔ Answer: B
Explanation: A firewall filters incoming and outgoing network traffic.

Q16. Which one is NOT an operating system?


A) Windows B) Android C) Linux D) Oracle
✔ Answer: D
Explanation: Oracle is a database, not an OS.

Q17. Who founded Microsoft?


A) Steve Jobs B) Larry Page C) Bill Gates D) Mark Zuckerberg
✔ Answer: C
Explanation: Microsoft was co-founded by Bill Gates and Paul Allen.

Q18. One kilobyte (KB) is equal to?


A) 1000 bytes B) 1024 bytes C) 100 bytes D) 512 bytes
✔ Answer: B
Explanation: 1 KB = 1024 bytes (binary system).

Q19. A virus that replicates itself is called?


A) Malware B) Worm C) Trojan D) Spyware
✔ Answer: B
Explanation: Worms are self-replicating viruses.

Q20. What is the full form of PDF?


A) Portable Document Format B) Public Data File C) Print Data File D) Portable Data
File
✔ Answer: A
Explanation: PDF is a universal file format for documents.

Q21. The main page of a website is called?


A) Index B) Homepage C) Landing page D) Cover page
✔ Answer: B
Explanation: Homepage is the main or default page of a site.

Q22. What is the purpose of BIOS in a computer?


A) Internet connection B) Booting C) File Storage D) Printing
✔ Answer: B
Explanation: BIOS starts the computer by loading OS into memory.
Q23. Which key is used to refresh a webpage?
A) F1 B) F5 C) F2 D) F12
✔ Answer: B
Explanation: F5 refreshes the active browser tab or window.

Q24. What is the function of Ctrl + Z?


A) Save B) Paste C) Undo D) Close
✔ Answer: C
Explanation: Ctrl + Z undoes the last action.

Q25. What is an IP address used for?


A) Sending SMS B) Identifying devices on the network C) Making calls D) Running
programs
✔ Answer: B
Explanation: IP uniquely identifies devices in a network.

Q26. Which programming language is used for web development?


A) JavaScript B) COBOL C) FORTRAN D) C++
✔ Answer: A
Explanation: JavaScript is widely used for web interactivity.

Q27. Which of the following is an email service?


A) HTTP B) Google Drive C) Gmail D) FTP
✔ Answer: C
Explanation: Gmail is an email service by Google.

Q28. What is a router?


A) A printing device B) Network forwarding device C) A storage device D) An input
device
✔ Answer: B
Explanation: A router directs data between networks.

Q29. Which of these is used to design presentations?


A) MS Word B) MS Excel C) MS PowerPoint D) MS Outlook
✔ Answer: C
Explanation: PowerPoint is used for slide presentations.

Q30. Which of the following is a search engine?


A) Chrome B) Windows C) Firefox D) Bing
✔ Answer: D
Explanation: Bing is a search engine developed by Microsoft.

Data Communication, Network Security & Computer Viruses

Q1. What is the primary goal of network security?


A) Increase speed
B) Minimize cost
C) Prevent unauthorized access ✅
D) Share files
Explanation: Network security is mainly aimed at preventing unauthorized access,
ensuring confidentiality, integrity, and availability.

Q2. Which protocol is used to securely transfer files over the internet?
A) FTP
B) SFTP ✅
C) SMTP
D) HTTP
Explanation: SFTP (Secure File Transfer Protocol) provides secure file transfer by
encrypting commands and data.

Q3. What is a firewall?


A) Hardware for storage
B) Security software/hardware ✅
C) Virus
D) None
Explanation: A firewall filters incoming and outgoing traffic to block harmful or
unauthorized communication.

Q4. Which of these is a type of malware?


A) Excel
B) Windows
C) Trojan Horse ✅
D) Google
Explanation: A Trojan is a malicious software disguised as legitimate.

Q5. What is phishing?


A) Legitimate email
B) Spam filter
C) Fraud attempt to steal info ✅
D) Email provider
Explanation: Phishing uses fake emails/websites to trick users into giving sensitive data.

Q6. Which of the following is not a security threat?


A) Phishing
B) Malware
C) Firewall ✅
D) Spyware
Explanation: Firewalls are protective systems, not threats.

Q7. Which virus replicates itself to spread to other systems?


A) Trojan
B) Worm ✅
C) Rootkit
D) Spyware
Explanation: Worms are self-replicating programs that spread without user interaction.
Q8. What device is used to prevent unauthorized network access?
A) Firewall ✅
B) Switch
C) Hub
D) Modem
Explanation: Firewalls block unauthorized access to or from private networks.

Q9. What is the most common method for spreading computer viruses?
A) Software updates
B) DNS spoofing
C) Email attachments ✅
D) BIOS
Explanation: Viruses often spread through malicious email attachments.

Q10. Which tool monitors and analyzes network traffic?


A) Firewall
B) Packet Sniffer ✅
C) Router
D) Hub
Explanation: Packet sniffers capture data packets for analysis and network
troubleshooting.

Q11. Which software scans and removes viruses?


A) Paint
B) Antivirus ✅
C) Excel
D) OS
Explanation: Antivirus detects and removes malicious software.

Q12. What is encryption?


A) Data deletion
B) Data hiding
C) Converting data into unreadable form ✅
D) Firewall feature
Explanation: Encryption converts data into a format that only authorized parties can read.

Q13. SSL stands for:


A) Secure Socket Layer ✅
B) Server Security Link
C) Software Security Layer
D) System Secured Line
Explanation: SSL secures communication over networks like HTTPS.

Q14. A DDoS attack is aimed at:


A) Stealing passwords
B) Deleting files
C) Crashing services using traffic ✅
D) Encrypting data
Explanation: Distributed Denial of Service floods a system to make it unavailable.
Q15. A rootkit is used to:
A) Speed up the OS
B) Protect files
C) Gain hidden admin access ✅
D) Format hard drives
Explanation: Rootkits hide their presence and allow privileged access.

Q16. What does a VPN do?


A) Slows internet
B) Encrypts internet traffic ✅
C) Installs drivers
D) Replaces firewall
Explanation: A VPN secures data by creating a private tunnel through the internet.

Q17. Which of the following is not a type of virus?


A) Worm
B) Trojan
C) Ransomware
D) Firewall ✅
Explanation: Firewall is a security measure, not malware.

Q18. What does ransomware do?


A) Deletes OS
B) Encrypts files and demands payment ✅
C) Fixes bugs
D) Scans hardware
Explanation: Ransomware locks data and asks for ransom to unlock it.

Q19. Which of these is a good security practice?


A) Using same password
B) Ignoring software updates
C) Installing patches regularly ✅
D) Turning off firewall
Explanation: Patching removes known vulnerabilities.

Q20. Which of these is a physical security measure?


A) Firewall
B) CCTV ✅
C) Antivirus
D) VPN
Explanation: CCTV helps secure physical areas from intrusion.

Q21. What is a digital signature used for?


A) Authentication ✅
B) Virus detection
C) Hardware maintenance
D) Formatting
Explanation: Digital signatures ensure authenticity and integrity of messages.
Q22. Spyware is designed to:
A) Destroy hardware
B) Collect user info secretly ✅
C) Improve performance
D) Monitor RAM
Explanation: Spyware monitors user actions and reports them secretly.

Q23. A hacker who hacks for ethical purposes is called:


A) Black hat
B) White hat ✅
C) Red hat
D) Blue hat
Explanation: White hat hackers help improve security systems.

Q24. Which virus hides in legitimate software?


A) Trojan ✅
B) Worm
C) Ransomware
D) Rootkit
Explanation: Trojans appear harmless but carry malicious code.

Q25. SQL injection targets:


A) RAM
B) Database queries ✅
C) BIOS
D) Firewalls
Explanation: SQL injection exploits database query weaknesses.

Q26. What is a botnet?


A) Group of computers controlled remotely ✅
B) Security patch
C) Software update
D) Encryption tool
Explanation: Botnets are networks of infected systems controlled by hackers.

Q27. Which is a strong password?


A) 123456
B) abc123
C) Pa$$w0rd!# ✅
D) admin
Explanation: Strong passwords use a mix of characters.

Q28. Two-factor authentication includes:


A) Username only
B) Password and OTP ✅
C) Password twice
D) None
Explanation: 2FA adds a second verification layer (like OTP).
Q29. A network attack that captures login credentials is:
A) Phishing
B) Spoofing
C) Sniffing ✅
D) Routing
Explanation: Sniffing involves intercepting data packets.

Q30. Which is a secure protocol for websites?


A) HTTP
B) FTP
C) HTTPS ✅
D) IPX
Explanation: HTTPS uses SSL/TLS to encrypt web traffic.

Q31. A worm spreads through:


A) USB only
B) Network ✅
C) BIOS
D) Manual commands
Explanation: Worms replicate and spread via network connections.

Q32. Which attack spoofs the identity of a trusted source?


A) Spoofing ✅
B) Sniffing
C) DDoS
D) SQL Injection
Explanation: Spoofing is pretending to be a trusted source.

Q33. MAC filtering is a feature of:


A) Antivirus
B) Firewall
C) Wireless router ✅
D) BIOS
Explanation: MAC filtering controls which devices access a network.

Q34. What is a logic bomb?


A) Timer-based OS update
B) Malware that triggers under specific conditions ✅
C) Computer battery
D) Anti-virus tool
Explanation: Logic bombs activate when specific events occur.

Q35. The term zero-day refers to:


A) Fast virus
B) Old malware
C) New vulnerability with no patch ✅
D) Password cracker
Explanation: Zero-day exploits are unknown to vendors, unpatched.
Q36. Which of the following is NOT malware?
A) Virus
B) Firewall ✅
C) Trojan
D) Worm
Explanation: Firewall protects against malware.

Q37. The best protection against ransomware is:


A) Formatting
B) Antivirus
C) Regular backup ✅
D) Strong password
Explanation: Backups help recover data without paying ransom.

Q38. BIOS viruses infect:


A) Hard drive
B) System files
C) Firmware ✅
D) Network
Explanation: BIOS viruses target firmware, loading before the OS.

Q39. What is port scanning?


A) Opening TCP ports
B) Checking for open network ports ✅
C) Virus spread method
D) Antivirus feature
Explanation: Hackers use port scans to find vulnerable services.

Q40. Which is a type of social engineering attack?


A) IP spoofing
B) Phishing ✅
C) Port scan
D) Botnet
Explanation: Social engineering tricks people into revealing info.

Q41. HTTPS uses which encryption method?


A) SHA-1
B) SSL/TLS ✅
C) AES-32
D) MD5
Explanation: HTTPS uses SSL/TLS for secure communication.

Q42. Digital forensics is used to:


A) Create viruses
B) Detect malware
C) Investigate cybercrime ✅
D) Build firewalls
Explanation: Forensics help track digital evidence after attacks.
Q43. Man-in-the-middle attack:
A) Sends spam
B) Eavesdrops on communication ✅
C) Deletes data
D) Blocks ports
Explanation: MITM intercepts communication between two parties.

Q44. What is a honeypot?


A) Data warehouse
B) Decoy system to trap attackers ✅
C) Antivirus software
D) Router tool
Explanation: Honeypots attract and analyze hacker activity.

Q45. What is the full form of IPsec?


A) Internet Protocol Secure ✅
B) Internal Protection Security
C) Integrated Packet Security
D) Intranet Protocol Setup
Explanation: IPsec secures IP communications with encryption.

Q46. What is brute force attack?


A) Virus spread
B) Trying all passwords until correct ✅
C) DOS attack
D) Malware injection
Explanation: Brute force attacks guess passwords through trial and error.

Q47. Cybersecurity’s CIA triad stands for:


A) Cyber, Internet, Authentication
B) Confidentiality, Integrity, Availability ✅
C) Code, Input, Access
D) Control, Internet, Architecture
Explanation: These are the three core goals of security.

Q48. Which of these is NOT a common password attack?


A) Brute Force
B) Dictionary Attack
C) Rainbow Table
D) Phishing Filter ✅
Explanation: Phishing filter is a security feature.

Q49. Antivirus software needs:


A) Programming
B) Internet
C) Regular updates ✅
D) Firewall
Explanation: Updates help antivirus detect latest threats.
Q50. The strongest Wi-Fi encryption is:
A) WEP
B) WPA
C) WPA2
D) WPA3 ✅
Explanation: WPA3 is the most secure Wi-Fi encryption standard.

Emerging Technologies

Q1: What does AI stand for?

A) Automated Input

B) Artificial Intelligence

C) Advanced Interface

D) Auto Integration

✅ Correct: B

Explanation: AI refers to machines simulating human intelligence.

Q2: Which of the following is a blockchain platform?

A) Ethereum

B) Python

C) Java

D) Linux

✅ Correct: A

Explanation: Ethereum is a decentralized platform for blockchain-based apps.

Q3: What is the full form of IoT?

A) Internet of Telecommunication

B) Interface of Technology

C) Internet of Things

D) Integration of Tools

✅ Correct: C

Explanation: IoT connects everyday objects to the internet to collect and share data.

Q4: Which one is a popular AI chatbot developed by OpenAI?

A) Siri

B) Google Assistant

C) ChatGPT

D) Bixby
✅ Correct: C

Explanation: ChatGPT is a conversational AI developed by OpenAI.

Q5: Which company is most associated with quantum computing research?

A) IBM

B) Dell

C) Intel

D) Apple

✅ Correct: A

Explanation: IBM leads in quantum computing with IBM Quantum Experience.

Q6: What is a key feature of 5G networks?

A) Slower speed

B) High latency

C) High-speed low-latency communication

D) 2G compatibility only

✅ Correct: C

Explanation: 5G offers very high speeds and very low latency.

Q7: Which technology is used in Bitcoin?

A) Firewall

B) Blockchain

C) AI

D) IoT

✅ Correct: B

Explanation: Blockchain ensures decentralized and secure transaction recording.

Q8: What is augmented reality (AR)?

A) A computer virus

B) A 2D image

C) Overlaying virtual objects in the real world

D) Playing online games

✅ Correct: C

Explanation: AR enhances real-world experience with virtual overlays.


Q9: Which language is commonly used for AI development?

A) HTML

B) Python

C) CSS

D) PHP

✅ Correct: B

Explanation: Python is popular for machine learning and AI due to its rich libraries.

Q10: Which of the following is a wearable technology?

A) Smartwatch

B) SSD

C) Pendrive

D) DVD

✅ Correct: A

Explanation: Smartwatches are worn and have computing capabilities.

Q11: What is the role of machine learning in AI?

A) Hardware design

B) Web browsing

C) Training models from data

D) Data deletion

✅ Correct: C

Explanation: ML trains systems to learn from data and improve over time.

Q12: What is a drone technically referred to as?

A) UGV

B) UAV

C) USB

D) UPS

✅ Correct: B

Explanation: UAV = Unmanned Aerial Vehicle (drone).

Q13: Which of the following is an example of virtual reality (VR)?


A) Watching YouTube

B) Oculus Rift

C) Scanning QR code

D) Typing in MS Word

✅ Correct: B

Explanation: Oculus Rift is a VR headset that immerses users in virtual environments.

Q14: What does NLP in AI stand for?

A) Natural Light Processor

B) Native Language Parser

C) Natural Language Processing

D) Network Learning Protocol

✅ Correct: C

Explanation: NLP enables computers to understand human language.

Q15: Which of these is a renewable energy technology?

A) Diesel engine

B) Nuclear fission

C) Solar panel

D) Coal

✅ Correct: C

Explanation: Solar panels convert sunlight into electricity.

Q16: What is cloud computing?

A) Computing in the sky

B) A water vapor network

C) Delivery of computing services over the internet

D) Cooling computer rooms

✅ Correct: C

Explanation: Cloud computing provides data, storage, and computing power over the
internet.

Q17: Which term is associated with data science?

A) Emailing
B) Data mining

C) Typing

D) Blogging

✅ Correct: B

Explanation: Data mining finds patterns in large datasets.

Q18: What is an example of AI in daily use?

A) LED light

B) Google Maps

C) USB drive

D) LAN cable

✅ Correct: B

Explanation: Google Maps uses AI to predict traffic and suggest routes.

Q19: What does CRISPR technology relate to?

A) Internet

B) Space

C) Genetics

D) Social Media

✅ Correct: C

Explanation: CRISPR allows editing genes within organisms.

Q20: Which of these is used for Big Data processing?

A) MySQL

B) Hadoop

C) Paint

D) Excel

✅ Correct: B

Explanation: Hadoop handles vast amounts of structured and unstructured data.

Q21: What is biometrics used for?

A) Audio playback

B) Identity verification

C) Drawing
D) Emailing

✅ Correct: B

Explanation: Biometrics like fingerprints and iris scans authenticate identity.

Q22: Which one is an edge computing benefit?

A) Slow processing

B) More delay

C) Reduced latency

D) Less privacy

✅ Correct: C

Explanation: Edge computing processes data closer to the source, reducing delay.

Q23: What is a common feature of smart homes?

A) Manual switchboard

B) Typewriters

C) IoT devices

D) Landline phones

✅ Correct: C

Explanation: IoT devices like smart bulbs, thermostats, etc., make homes “smart.”

Q24: Metaverse is a combination of:

A) VR + AR + Internet

B) Office + Internet

C) Music + Art

D) Gaming only

✅ Correct: A

Explanation: Metaverse integrates virtual, augmented reality and internet services.

Q25: 3D printing is also called:

A) Additive manufacturing

B) Subtractive modeling

C) Paper printing

D) VR scanning

✅ Correct: A
Explanation: 3D printing builds objects layer by layer – additive manufacturing.

Q26: Which tech is essential for self-driving cars?

A) Cloud storage

B) AI and sensors

C) Bluetooth

D) Antivirus

✅ Correct: B

Explanation: Autonomous cars use AI, LIDAR, cameras, and other sensors.

Q27: What does GPT stand for in ChatGPT?

A) General Purpose Tech

B) Generative Pretrained Transformer

C) Great Processing Tool

D) General Protocol Transfer

✅ Correct: B

Explanation: GPT is a language model based on transformers trained to generate text.

Q28: What is one key use of robotics in industry?

A) Paperwork

B) Decoration

C) Automated manufacturing

D) Software installation

✅ Correct: C

Explanation: Robots perform repetitive, high-precision tasks in factories.

Q29: Which sector benefits most from fintech?

A) Farming

B) Education

C) Financial services

D) Construction

✅ Correct: C

Explanation: Fintech improves banking, loans, mobile payments, and investments.

Q30: Which AI tool is used for image generation?


A) DALL·E

B) Hadoop

C) Excel

D) GitHub

✅ Correct: A

Explanation: DALL·E by OpenAI creates images from text descriptions.

You might also like