Computer MCQ Questions with answers

Here Important Computer MCQ questions are added which are frequently asked in almost all the examinations. You can check the correct answer of any question on clicking the show answer button or on option itself. The Correct answer will be displayed below. You can share any question with your friends on whatsapp by tapping whatsapp button.

Learn Computer mcqs in hindi here.

Learn Computer MCQs [Page 1 ]

M

Mr. Dubey • 100.69K Points
Coach Computer

Q) What is full form of HTML?

  • (A) hypertext markup language
  • (B) hyper tenstion markup language
  • (C) hiphertext mark up language
  • (D) none
Correct Answer - Option (A)

Explanation:

Full form of HTML is Hyper Text Markup Language.
It is used to build websites.

M

Mr. Dubey • 100.69K Points
Coach Computer

Q) What is the full form of CSS?

  • (A) Cross Style Sheet
  • (B) Cascading Style Sheet
  • (C) Cross Super Set
  • (D) None
Correct Answer - Option (B)

Explanation:

CSS stands for Cascading Style Sheet. It is used to design html web pages.
There are three methods to connect css with html.
A) inline css
B) internal css
C) external css.

Example of writing css:
h1{
border:1px solid black;
}

This property will give all h1 a 1 px solid black color.

P

Praveen Singh • 36.81K Points
Coach Computer

Q) What is the full form of HTML?

  • (A) Hyper Text Markup Language
  • (B) Hiper Text Makeup Language
  • (C) Hyper Test Markup Language
  • (D) None
Correct Answer - Option (A)

Explanation:

HTML stands for Hyper Text Markup Language, which is the standard language used to create and design web pages. It structures web content using elements and tags, allowing browsers to interpret and display text, images, links, and other elements on web pages.

Other Options:

(B) Hiper Text Makeup Language → Incorrect spelling of "Hyper" and "Markup."

(C) Hyper Test Markup Language → Incorrect word "Test" instead of "Text."

(D) None → Incorrect, as option (A) is correct.


Thus, the correct answer is (A) Hyper Text Markup Language.

R

Ram Sharma • 193.88K Points
Coach Computer

Q) Ctrl, Shift and Alt are called .......... keys.

  • (A) modifier
  • (B) function
  • (C) alphanumeric
  • (D) adjustment
Correct Answer - Option (A)

Explanation:

Ctrl, Shift, and Alt are known as modifier keys because they do not perform a function on their own but modify the function of other keys when used in combination.

Other Options:

  • (B) Function → Incorrect, as function keys are F1 to F12 on the keyboard.
  • (C) Alphanumeric → Incorrect, as alphanumeric keys include letters (A-Z) and numbers (0-9).
  • (D) Adjustment → Incorrect, as there is no category of "adjustment" keys in computing.

Thus, the correct answer is (A) Modifier.

R

Ram Sharma • 193.88K Points
Coach Computer

Q) MS-Word is an example of _____

  • (A) An operating system
  • (B) A processing device
  • (C) Application software
  • (D) An input device
Correct Answer - Option (C)

Explanation:

Ms word is an application developed by Microsoft Corporation. It is used for office tasks. The file extensions of word document are .doc .docs

R

Ram Sharma • 193.88K Points
Coach Computer

Q) A computer cannot "boot" if it does not have the _____

  • (A) Compiler
  • (B) Loader
  • (C) Operating system
  • (D) Assembler
Correct Answer - Option (C)

Explanation:

A computer cannot boot if it doesn't have operating system.
Operating system is used to switch on the computer and user can work on it.

R

Ram Sharma • 193.88K Points
Coach Computer

Q) ________ is the process of dividing the disk into tracks and sectors.

  • (A) Tracking
  • (B) Formatting
  • (C) Crashing
  • (D) Allotting
Correct Answer - Option (B)

Explanation:

Formatting is the process of dividing the disk into tracks and sectors.

R

Ram Sharma • 193.88K Points
Coach Computer

Q) _____are attempts by individuals to obtain confidential information from you by falsifying their identity.

  • (A) Phishing trips
  • (B) Computer viruses
  • (C) Phishing scams
  • (D) Spyware scams
Correct Answer - Option (C)

Explanation:

Phishing scams are fraudulent attempts to obtain sensitive information (such as usernames, passwords, or credit card details) by pretending to be a trustworthy entity, usually through emails, messages, or fake websites.

How Phishing Works?

1. Attackers send fake emails or messages that look legitimate (e.g., from banks, social media sites, or government agencies).


2. The victim is tricked into clicking a malicious link or providing personal information.


3. The attacker steals the information for fraudulent purposes.



Other Options Explained:

(A) Phishing trips – Not a real term in cybersecurity.

(B) Computer viruses – Malicious programs that replicate and spread but do not necessarily involve identity theft.

(D) Spyware scams – Involves malicious software that spies on a user's activity but is different from phishing.


Thus, Phishing scams (C) is the correct answer.

R

Ram Sharma • 193.88K Points
Coach Computer

Q) Junk e-mail is also called ______.

  • (A) Spam
  • (B) Spoof
  • (C) Sniffer script
  • (D) Spool
Correct Answer - Option (A)

Explanation:

Junk mails are called Spam. These types of mail contains fake, unauthorised content.
Users are kept away from such spam mails by email server security and put in a folder which is called Spam Folder.
You might have seen in your Gmail > Spam Folder.

R

Ram Sharma • 193.88K Points
Coach Computer

Q) Microsoft Office is an example of a

  • (A) Closed source software
  • (B) Open source software
  • (C) Horizontal market software
  • (D) vertical market software
Correct Answer - Option (C)

Explanation:

Horizontal market software refers to software that is designed for a broad range of industries and users rather than being specific to a single industry. Microsoft Office (which includes Word, Excel, PowerPoint, etc.) is used by businesses, students, and individuals across various sectors, making it a horizontal market software.

Other Options Explained:

(A) Closed source software – This is also correct since Microsoft Office is proprietary software, meaning its source code is not publicly available. However, the question focuses on its market type.

(B) Open source software – Incorrect, as Microsoft Office is not open-source.

(D) Vertical market software – Incorrect because vertical market software is designed for a specific industry (e.g., hospital management software).


Thus, (C) Horizontal market software is the best answer.

Jump to

Tags: Computer mcqs, important mcqs of Computer, Computer important Computer mcqs, mcqs on Computer, important mcqs on Computer, mcqs of Computer

Attempt 350+ Quizzes on Computer

Download our easy to use, user friendly Android App from Play Store. And learn MCQs with one click.

Image