πŸ“Š Computer
Q. What is full form of HTML?
  • (A) hypertext markup language
  • (B) hyper tenstion markup language
  • (C) hiphertext mark up language
  • (D) none
πŸ’¬ Discuss
βœ… Correct Answer: (A) hypertext markup language

Explanation: Full form of HTML is Hyper Text Markup Language.
It is used to build websites.

πŸ“Š Computer
Q. What is the full form of CSS?
  • (A) Cross Style Sheet
  • (B) Cascading Style Sheet
  • (C) Cross Super Set
  • (D) None
πŸ’¬ Discuss
βœ… Correct Answer: (B) Cascading Style Sheet

Explanation: CSS stands for Cascading Style Sheet. It is used to design html web pages.
There are three methods to connect css with html.
A) inline css
B) internal css
C) external css.

Example of writing css:
h1{
border:1px solid black;
}

This property will give all h1 a 1 px solid black color.

πŸ“Š Computer
Q. What is the full form of HTML?
  • (A) Hyper Text Markup Language
  • (B) Hiper Text Makeup Language
  • (C) Hyper Test Markup Language
  • (D) None
πŸ’¬ Discuss
βœ… Correct Answer: (A) Hyper Text Markup Language

Explanation:

HTML stands for Hyper Text Markup Language, which is the standard language used to create and design web pages. It structures web content using elements and tags, allowing browsers to interpret and display text, images, links, and other elements on web pages.

Other Options:

(B) Hiper Text Makeup Language β†’ Incorrect spelling of "Hyper" and "Markup."

(C) Hyper Test Markup Language β†’ Incorrect word "Test" instead of "Text."

(D) None β†’ Incorrect, as option (A) is correct.


Thus, the correct answer is (A) Hyper Text Markup Language.

πŸ“Š Computer
Q. Ctrl, Shift and Alt are called .......... keys.
  • (A) modifier
  • (B) function
  • (C) alphanumeric
  • (D) adjustment
πŸ’¬ Discuss
βœ… Correct Answer: (A) modifier

Explanation:

Ctrl, Shift, and Alt are known as modifier keys because they do not perform a function on their own but modify the function of other keys when used in combination.

Other Options:

  • (B) Function β†’ Incorrect, as function keys are F1 to F12 on the keyboard.
  • (C) Alphanumeric β†’ Incorrect, as alphanumeric keys include letters (A-Z) and numbers (0-9).
  • (D) Adjustment β†’ Incorrect, as there is no category of "adjustment" keys in computing.

Thus, the correct answer is (A) Modifier.

πŸ“Š Computer
Q. MS-Word is an example of _____
  • (A) An operating system
  • (B) A processing device
  • (C) Application software
  • (D) An input device
πŸ’¬ Discuss
βœ… Correct Answer: (C) Application software

Explanation: Ms word is an application developed by Microsoft Corporation. It is used for office tasks. The file extensions of word document are .doc .docs

πŸ“Š Computer
Q. A computer cannot "boot" if it does not have the _____
  • (A) Compiler
  • (B) Loader
  • (C) Operating system
  • (D) Assembler
πŸ’¬ Discuss
βœ… Correct Answer: (C) Operating system

Explanation: A computer cannot boot if it doesn't have operating system.
Operating system is used to switch on the computer and user can work on it.

πŸ“Š Computer
Q. ________ is the process of dividing the disk into tracks and sectors.
  • (A) Tracking
  • (B) Formatting
  • (C) Crashing
  • (D) Allotting
πŸ’¬ Discuss
βœ… Correct Answer: (B) Formatting

Explanation: Formatting is the process of dividing the disk into tracks and sectors.

πŸ“Š Computer
Q. _____are attempts by individuals to obtain confidential information from you by falsifying their identity.
  • (A) Phishing trips
  • (B) Computer viruses
  • (C) Phishing scams
  • (D) Spyware scams
πŸ’¬ Discuss
βœ… Correct Answer: (C) Phishing scams

Explanation: Phishing scams are fraudulent attempts to obtain sensitive information (such as usernames, passwords, or credit card details) by pretending to be a trustworthy entity, usually through emails, messages, or fake websites.

How Phishing Works?

1. Attackers send fake emails or messages that look legitimate (e.g., from banks, social media sites, or government agencies).


2. The victim is tricked into clicking a malicious link or providing personal information.


3. The attacker steals the information for fraudulent purposes.



Other Options Explained:

(A) Phishing trips – Not a real term in cybersecurity.

(B) Computer viruses – Malicious programs that replicate and spread but do not necessarily involve identity theft.

(D) Spyware scams – Involves malicious software that spies on a user's activity but is different from phishing.


Thus, Phishing scams (C) is the correct answer.

πŸ“Š Computer
Q. Junk e-mail is also called ______.
  • (A) Spam
  • (B) Spoof
  • (C) Sniffer script
  • (D) Spool
πŸ’¬ Discuss
βœ… Correct Answer: (A) Spam

Explanation: Junk mails are called Spam. These types of mail contains fake, unauthorised content.
Users are kept away from such spam mails by email server security and put in a folder which is called Spam Folder.
You might have seen in your Gmail > Spam Folder.

πŸ“Š Computer
Q. Microsoft Office is an example of a
  • (A) Closed source software
  • (B) Open source software
  • (C) Horizontal market software
  • (D) vertical market software
πŸ’¬ Discuss
βœ… Correct Answer: (C) Horizontal market software

Explanation: Horizontal market software refers to software that is designed for a broad range of industries and users rather than being specific to a single industry. Microsoft Office (which includes Word, Excel, PowerPoint, etc.) is used by businesses, students, and individuals across various sectors, making it a horizontal market software.

Other Options Explained:

(A) Closed source software – This is also correct since Microsoft Office is proprietary software, meaning its source code is not publicly available. However, the question focuses on its market type.

(B) Open source software – Incorrect, as Microsoft Office is not open-source.

(D) Vertical market software – Incorrect because vertical market software is designed for a specific industry (e.g., hospital management software).


Thus, (C) Horizontal market software is the best answer.

Tags: Computer mcqs, important mcqs of Computer, Computer important Computer mcqs, mcqs on Computer, important mcqs on Computer, mcqs of Computer