Q.1 Which of the following is a programming language primarily used for web development?
Python
HTML
C++
Java
Explanation - HTML (HyperText Markup Language) is used to create the structure of web pages. While Python, C++, and Java are general-purpose programming languages, HTML is specifically for web content.
Correct answer is: HTML
Q.2 What does CPU stand for in computer terminology?
Central Processing Unit
Computer Personal Unit
Central Program Unit
Control Processing Unit
Explanation - CPU is the brain of the computer that performs instructions defined by software.
Correct answer is: Central Processing Unit
Q.3 Which type of memory is volatile and loses its data when power is turned off?
ROM
RAM
Hard Disk
Flash Memory
Explanation - RAM (Random Access Memory) is volatile memory used to store data temporarily while the computer is running.
Correct answer is: RAM
Q.4 Which of the following is an example of an operating system?
Oracle
Windows 10
Python
MySQL
Explanation - Windows 10 is an operating system that manages computer hardware and software resources.
Correct answer is: Windows 10
Q.5 In networking, what does IP stand for?
Internet Protocol
Internal Program
Information Process
Interface Point
Explanation - IP (Internet Protocol) is used to identify devices on a network using an addressing system.
Correct answer is: Internet Protocol
Q.6 Which of the following is a database management system?
MySQL
HTML
C#
Linux
Explanation - MySQL is a relational database management system (RDBMS) used for storing and managing data.
Correct answer is: MySQL
Q.7 Which of the following protocols is used to send emails?
FTP
SMTP
HTTP
DNS
Explanation - SMTP (Simple Mail Transfer Protocol) is the standard protocol for sending emails across the Internet.
Correct answer is: SMTP
Q.8 What is the full form of DNS in computer networks?
Domain Name System
Digital Network Service
Dynamic Name Server
Data Node System
Explanation - DNS translates domain names into IP addresses so browsers can load Internet resources.
Correct answer is: Domain Name System
Q.9 Which of the following is used for version control in software development?
Git
Python
HTML
Windows
Explanation - Git is a distributed version control system used to track changes in source code during software development.
Correct answer is: Git
Q.10 Which device is used to connect a computer to a network?
Router
Monitor
Printer
Keyboard
Explanation - A router connects multiple networks together and directs network traffic between them.
Correct answer is: Router
Q.11 Which of the following is a markup language?
HTML
Python
Java
C++
Explanation - HTML is used to define the structure and layout of a web page, making it a markup language.
Correct answer is: HTML
Q.12 Which of the following is a type of cyber attack where attackers trick users into revealing personal information?
Phishing
DDoS
Spoofing
Brute Force
Explanation - Phishing attacks deceive users into providing sensitive information like passwords and credit card details.
Correct answer is: Phishing
Q.13 Which of the following storage devices uses NAND-based memory?
HDD
SSD
CD-ROM
Magnetic Tape
Explanation - SSDs (Solid State Drives) use NAND flash memory to store data, providing faster read/write speeds than HDDs.
Correct answer is: SSD
Q.14 What does HTTP stand for?
HyperText Transfer Protocol
High Transfer Text Protocol
Hyper Transfer Text Program
HighText Transmission Process
Explanation - HTTP is the foundation of data communication for the World Wide Web.
Correct answer is: HyperText Transfer Protocol
Q.15 Which of the following is an example of cloud computing?
Google Drive
MS Word
Notepad
Excel
Explanation - Google Drive stores data on remote servers accessed via the Internet, which is a cloud computing service.
Correct answer is: Google Drive
Q.16 Which of the following is used to prevent unauthorized access to a network?
Firewall
Router
Switch
Modem
Explanation - A firewall monitors and controls incoming and outgoing network traffic based on security rules.
Correct answer is: Firewall
Q.17 Which of the following is an open-source operating system?
Windows
macOS
Linux
iOS
Explanation - Linux is an open-source operating system, meaning its source code is freely available for modification.
Correct answer is: Linux
Q.18 Which of the following is a NoSQL database?
MongoDB
MySQL
Oracle
PostgreSQL
Explanation - MongoDB is a NoSQL database that stores data in JSON-like documents instead of tables.
Correct answer is: MongoDB
Q.19 Which of the following languages is used for statistical computing and graphics?
R
Java
Python
C++
Explanation - R is a programming language widely used for statistical analysis, data visualization, and data science.
Correct answer is: R
Q.20 Which of the following is a common method of securing data during transmission?
Encryption
Compiling
Defragmentation
Debugging
Explanation - Encryption converts data into a coded form to prevent unauthorized access during transmission.
Correct answer is: Encryption
Q.21 Which of the following is a lightweight markup language often used for documentation?
Markdown
HTML
Python
XML
Explanation - Markdown is a lightweight markup language used to format text in a simple, readable way.
Correct answer is: Markdown
Q.22 Which of the following is a popular web server software?
Apache
Oracle
MongoDB
Python
Explanation - Apache HTTP Server is a widely used open-source web server software that delivers web content to clients.
Correct answer is: Apache
Q.23 Which of the following is used to identify a website uniquely on the Internet?
IP Address
MAC Address
Subnet Mask
Port Number
Explanation - An IP address uniquely identifies a device or website on a network.
Correct answer is: IP Address
Q.24 Which of the following is a popular frontend framework for web development?
React
Node.js
Django
Flask
Explanation - React is a JavaScript library used for building user interfaces, primarily for single-page applications.
Correct answer is: React
Q.25 Which type of software is designed to harm a computer system?
Malware
Utility Software
Antivirus
Driver
Explanation - Malware is malicious software intended to damage, disrupt, or gain unauthorized access to computer systems.
Correct answer is: Malware
