C# banner

Computer Fundamentals Multiple Choice Questions (MCQs) and Answers

Master Computer Fundamentals with Practice MCQs. Explore our curated collection of Multiple Choice Questions. Ideal for placement and interview preparation, our questions range from basic to advanced, ensuring comprehensive coverage of Computer Fundamentals. Begin your placement preparation journey now!

Q61

Q61 What is the binary equivalent of the IP address 192.168.0.1?

A

11000000.10101000.00000000.00000001

B

11111111.11111111.11111111.11111111

C

10101010.01010101.10101010.01010101

D

00000000.00000000.00000000.00000000

Q62

Q62 Convert the binary MAC address 11001100:10101010:11110000:11001100:10101010:11110000 to its hexadecimal equivalent.

A

192.168.0.1

B

192.168.1.1

C

255.255.255.0

D

10.0.0.1

Q63

Q63 A user is unable to connect to the internet.
Which of the following is the first step in troubleshooting the issue?

A

Check the network cables

B

Replace the computer

C

Uninstall the operating system

D

Format the hard drive

Q64

Q64 A network administrator notices that the network is experiencing high latency.
What could be a possible cause?

A

Heavy network traffic

B

Incorrect IP configuration

C

Hardware failure

D

Malware infection

Q65

Q65 A company's internal network is experiencing frequent security breaches.
Which of the following measures is most effective in securing the network?

A

Install antivirus software

B

Use strong firewalls and encryption

C

Limit employee internet usage

D

Disable all network access

Q66

Q66 What is the primary purpose of a Database Management System (DBMS)?

A

To create graphics

B

To manage data in a structured way

C

To connect to the internet

D

To perform calculations

Q67

Q67 Which of the following is a characteristic of a relational database?

A

Data is stored in files

B

Data is stored in tables with rows and columns

C

Data is stored in a hierarchy

D

Data is stored in a flat format

Q68

Q68 What does SQL stand for?

A

Structured Query Language

B

Sequential Query Language

C

Structured Quality Language

D

Standard Query Language

Q69

Q69 What is the purpose of the primary key in a database table?

A

To perform calculations

B

To uniquely identify each record in the table

C

To store large amounts of data

D

To manage user access

Q70

Q70 Which of the following is used to retrieve data from a database?

A

UPDATE

B

SELECT

C

INSERT

D

DELETE

Q71

Q71 What is the difference between a primary key and a foreign key?

A

A primary key can contain duplicates, while a foreign key cannot

B

A foreign key uniquely identifies records, while a primary key does not

C

A primary key uniquely identifies records in its own table, while a foreign key refers to the primary key in another table

D

There is no difference

Q72

Q72 Which SQL statement is used to insert a new record into a table?

A

INSERT INTO

B

ADD RECORD

C

INSERT NEW

D

ADD ROW

Q73

Q73 What will be the result of the following SQL query?
SELECT * FROM Customers WHERE Country = 'Germany';

A

It will delete records from the Customers table

B

It will update records in the Customers table

C

It will retrieve all records from the Customers table where the Country is 'Germany'

D

It will retrieve all records from the Customers table

Q74

Q74 Consider the SQL query: SELECT name, COUNT() FROM Employees GROUP BY name HAVING COUNT() > 1;
What does this query do?

A

It retrieves names of employees and the number of times each appears, filtering only those names that appear more than once

B

It deletes duplicate names from the Employees table

C

It updates the count of employee names in the Employees table

D

It retrieves all records from the Employees table

Q75

Q75 A user reports that they are unable to retrieve specific data from a database.
What could be the issue?

A

The SQL query might be incorrectly written

B

The database is full

C

The server is turned off

D

The application is outdated

Q76

Q76 A database query is taking too long to execute.
Which of the following could be a reason for this?

A

The database has too many indexes

B

The query is poorly optimized

C

The server has too much RAM

D

The network is too fast

Q77

Q77 A database admin notices frequent deadlocks occurring in a transaction-heavy database.
What could be the cause?

A

Improper indexing

B

Concurrent transactions trying to access the same resources

C

Too many indexes

D

Insufficient user permissions

Q78

Q78 What is the primary purpose of a firewall in a computer network?

A

To store data

B

To block unauthorized access

C

To increase processing speed

D

To display graphics

Q79

Q79 Which of the following is considered a strong password?

A

password123

B

JohnDoe

C

ABCDEF

D

5f^#2kG!vD

Q80

Q80 What is the purpose of encryption in computer security?

A

To delete files

B

To hide the user interface

C

To protect data by converting it into a code

D

To increase the size of files

Q81

Q81 What does the term "phishing" refer to in the context of cybersecurity?

A

A type of malware

B

A hacking technique involving fake websites or emails

C

A method of protecting data

D

A tool for software development

Q82

Q82 Which of the following is a characteristic of ransomware?

A

It protects your data

B

It encrypts your data and demands payment for decryption

C

It speeds up your computer

D

It is used to create backups

Q83

Q83 Which of the following commands can be used in Linux to change the permissions of a file?

A

chmod

B

ps

C

grep

D

ls

Q84

Q84 Which SQL command can be used to prevent SQL injection attacks?

A

SELECT *

B

INSERT INTO

C

DROP TABLE

D

Prepared Statements

Q85

Q85 A user reports that their antivirus software has detected a virus, but it cannot remove it.
What should they do next?

A

Ignore the warning

B

Turn off the antivirus

C

Update the antivirus software and run a full scan

D

Delete all files

Q86

Q86 An employee receives an email asking for their login credentials.
What should they do?

A

Reply with the information

B

Click the link provided

C

Forward the email to IT support

D

Delete the email immediately

Q87

Q87 A company's database has been encrypted by ransomware.
What is the best course of action?

A

Pay the ransom

B

Disconnect the infected systems from the network

C

Ignore the attack

D

Continue using the database

Q88

Q88 What does the acronym URL stand for?

A

Uniform Resource Locator

B

Universal Resource Locator

C

Uniform Routing Locator

D

Universal Routing Locator

Q89

Q89 Which of the following is a common use of HTML?

A

To create websites

B

To manage databases

C

To program operating systems

D

To design graphics

Q90

Q90 What is the primary purpose of CSS in web development?

A

To define the structure of a web page

B

To manage database connections

C

To style and layout web pages

D

To perform calculations

ad verticalad vertical
ad