Computer Science – 100 MCQs
1. Which memory is volatile?
- RAM
- ROM
- SSD
- HDD
2. What does ROM stand for?
- Random Operation Memory
- Read-Only Memory
- Rapid Output Module
- Read-On Memory
3. The brain of the computer is the:
- GPU
- CPU
- RAM
- Motherboard
4. Which screen type uses liquid crystals to display images?
- CRT
- LCD
- OLED
- Plasma
5. Which processor component performs arithmetic/logical operations?
- Cache
- ALU
- Control Unit
- Registers
6. Which OS is open-source?
- Windows
- Linux
- macOS
- iOS
7. Full form of GUI in OS:
- Graphical User Interface
- General Utility Interface
- Global User Integration
- Graphics Unified Input
8. Standard HD resolution is:
- 720×480
- 1280×720
- 1920×1080
- 3840×2160
9. Which OS uses the NT kernel?
- macOS
- Windows
- Android
- Ubuntu
10. Which is NOT an OS task?
- Memory Management
- Designing Websites
- Process Scheduling
- File Management
11. Microsoft Word is a:
- Word Processor
- Spreadsheet Tool
- Database Software
- Presentation Tool
12. Google’s parent company is:
- Alphabet
- Meta
- Microsoft
- Amazon
13. YouTube was founded in:
- 2003
- 2005
- 2010
- 1999
14. LinkedIn is primarily for:
- Professional Networking
- Video Streaming
- Gaming
- Cloud Storage
15. HTML stands for:
- HyperText Markup Language
- High-Level Machine Language
- Hyperlink Text Manager
- Home Tool Management Language
16. CSS is used for:
- Styling web pages
- Database queries
- Server-side scripting
- Hardware control
17. Python is a:
- High-level language
- Low-level language
- Assembly language
- Machine language
18. JavaScript is mainly used for:
- Client-side scripting
- Database management
- OS development
- Graphic design
19. OTP stands for:
- One-Time Password
- Online Transaction Protocol
- Official Transfer Process
- Open Text Permission
20. Phishing attacks target:
- Personal data
- Computer hardware
- Internet speed
- Screen resolution
21. A strong password should include:
- Letters, numbers, symbols
- Only letters
- Your birthdate
- Common words
22. Two-factor authentication (2FA) uses:
- Password + OTP
- Two passwords
- Biometrics only
- No verification
23. Malware that encrypts files is called:
- Ransomware
- Spyware
- Adware
- Worm
24. ChatGPT is developed by:
- OpenAI
- Microsoft
- IBM
25. AI used in self-driving cars is:
- Machine Learning
- Blockchain
- Quantum Computing
- Virtual Reality
26. SEO stands for:
- Search Engine Optimization
- Secure Email Operation
- System Error Override
- Software Engineering Object
27. Upwork is a platform for:
- Freelancers
- Social Networking
- Cloud Storage
- Gaming
28. Fiverr’s minimum service price was originally:
- $5
- $10
- $1
- $20
29. WordPress is a:
- CMS (Content Management System)
- Programming Language
- Cybersecurity Tool
- Hardware Device
30. E-commerce example:
- Amazon
- GitHub
- ChatGPT
- Linux
31. Gmail’s storage is tied to:
- Google Drive
- Dropbox
- OneDrive
- iCloud
32. Adobe Photoshop is used for:
- Graphic Design
- Coding
- Database Management
- Email Services
33. Data Science primarily uses:
- Python/R
- HTML/CSS
- SQL only
- Assembly
34. 4K resolution is approximately:
- 3840×2160
- 1920×1080
- 1280×720
- 2560×1440
35. CRT screens are outdated due to:
- High power consumption
- Low resolution
- Small size
- Fast refresh rates
36. The clock speed of a CPU is measured in:
- Bytes
- Hertz (Hz)
- Volts
- Watts
37. Which processor architecture dominates modern laptops?
- x86-64
- ARM32
- RISC-V
- MIPS
38. OLED screens offer better:
- Contrast ratios
- Refresh rates
- Power efficiency
- Durability
39. Real-time OS is used in:
- Medical devices
- Gaming PCs
- Word processors
- Web browsers
40. System calls interface between:
- Apps and OS
- CPU and GPU
- RAM and SSD
- Keyboard and mouse
41. Which file system is native to Windows?
- NTFS
- ext4
- APFS
- FAT16
42. Google Drive is an example of:
- Cloud storage
- Antivirus
- Video editor
- Programming language
43. Microsoft Excel is used for:
- Spreadsheets
- Photo editing
- Coding
- Presentations
44. YouTube’s algorithm prioritizes:
- Watch time
- Like-to-dislike ratio
- Video length
- Creator subscribers
45. LinkedIn’s “Endorsements” feature highlights:
- Skills
- Education
- Hobbies
- Family connections
46. Python’s “Pandas” library is for:
- Data analysis
- Game development
- Cybersecurity
- Hardware control
47. CSS “Flexbox” is used for:
- Layout design
- Database queries
- User authentication
- Data analysis
48. API endpoints return data in:
- JSON/XML
- Binary
- Python code
- SQL tables
49. GitHub is primarily for:
- Code collaboration
- Social networking
- Cloud hosting
- Graphic design
50. “SaaS” examples include:
- Google Workspace
- NVIDIA GPUs
- DDR5 RAM
- PCIe SSDs
51. Fiverr’s “Gig Extras” allow:
- Upselling services
- Free downloads
- Hardware upgrades
- OS installation
52. WordPress plugins add:
- Functionality
- CPU cores
- RAM slots
- GPU memory
53. Shopify is a(n):
- E-commerce platform
- Programming language
- Cybersecurity tool
- Data structure
54. OTP timeouts enhance:
- Security
- Screen brightness
- Data storage
- CPU overclocking
55. “Canva” is a:
- Graphic design tool
- Programming IDE
- Database
- OS
56. “404” is a(n):
- HTTP error
- CPU model
- Python library
- Encryption standard
57. Which memory type loses data when power is off?
- RAM
- ROM
- SSD
- HDD
58. BIOS firmware is stored in:
- ROM
- RAM
- GPU
- HDD
59. CPU cache memory is faster than RAM because it’s:
- Closer to the CPU
- Larger in size
- Non-volatile
- Used for long-term storage
60. Which screen type has the best color accuracy?
- OLED
- LCD
- CRT
- LED
61. The ALU in a CPU performs:
- Arithmetic/Logical operations
- Data storage
- Internet connectivity
- Graphics rendering
62. Which OS uses the Linux kernel?
- Ubuntu
- Windows
- macOS
- iOS
63. The “Blue Screen of Death” occurs in:
- Windows
- Linux
- macOS
- Android
64. Android OS is based on:
- Linux
- Windows NT
- Unix
- macOS
65. Microsoft Excel files use the extension:
- .xlsx
- .docx
- .pptx
- .accdb
66. Google’s search algorithm prioritizes:
- Relevance & Authority
- Payment from websites
- Alphabetical order
- Flashy animations
67. YouTube’s “Monetization” requires:
- 1,000 subscribers
- 100 subscribers
- 10,000 views
- No requirements
68. WordPress is written in:
- PHP
- Python
- Java
- C++
69. Two-factor authentication (2FA) combines:
- Password + OTP
- Two passwords
- Username + Email
- CPU + GPU
70. A “DDoS” attack floods a server with:
- Fake traffic
- Viruses
- Spam emails
- Hardware damage
71. “Phishing” scams often use:
- Fake emails
- Slow internet
- Outdated software
- High-resolution images
72. VPNs encrypt:
- Internet traffic
- Hard drive data
- CPU operations
- Screen output
73. “Zero-Day Exploit” targets:
- Unknown vulnerabilities
- Old software
- Hardware defects
- User passwords
74. ChatGPT is a type of:
- LLM (Large Language Model)
- Database
- Operating system
- Graphics card
75. Which memory is volatile?
- Human brain neurons
- Quantum physics
- Blockchain
- Cloud storage
76. Fiverr’s gigs start at:
- $5
- $10
- $1
- Free
77. Upwork connects:
- Freelancers & clients
- Social media influencers
- Cloud providers
- Gamers
78. “CTA” in marketing means:
- Call-To-Action
- Computer-Tested Algorithm
- Certified Technical Advisor
- Central Traffic Authority
79. Shopify is a(n):
- E-commerce platform
- Programming language
- Cybersecurity tool
- Data structure
80. “Backlinks” improve:
- SEO ranking
- CPU performance
- Screen resolution
- Battery life
81. Gmail’s “Confidential Mode” prevents:
- Forwarding/printing
- Spam
- Account deletion
- Ads
82. OTP codes expire to:
- Enhance security
- Save storage
- Reduce network load
- Improve screen brightness
83. Adobe Photoshop is a:
- Raster graphics editor
- Video editor
- Database tool
- Programming IDE
84. “Canva” is used for:
- Graphic design
- Coding
- Data analysis
- OS development
85. “404 Error” means:
- Page not found
- Server overload
- Payment required
- Access denied
86. Python’s “NumPy” library is for:
- Numerical computing
- Web design
- Cybersecurity
- Hardware control
87. “Big Data” refers to:
- Large datasets
- Big screens
- Long passwords
- High-resolution images
88. “Firewall” protects against:
- Unauthorized access
- Power surges
- Screen burn-in
- Data compression
89. “Dropbox” is a:
- Cloud storage service
- Programming language
- Operating system
- Graphics card
90. “Agile” is a:
- Software development method
- Cybersecurity tool
- Hardware component
- Network protocol
91. “MidJourney” generates:
- AI art
- Spreadsheets
- Databases
- Emails
92. “CAPTCHA” verifies:
- Human users
- Network speed
- Screen resolution
- CPU temperature
93. “Meta” owns:
- Facebook & Instagram
- Google & YouTube
- Microsoft & LinkedIn
- Apple & macOS
94. “Git” is used for:
- Version control
- Graphic design
- Data storage
- Email encryption
95. “Responsive design” ensures websites work on:
- All devices
- Windows only
- High-end PCs
- Printers
96. A “Zero-Day Vulnerability” refers to:
- An unpatched software flaw
- A expired password
- A new firewall
- A hardware defect
97. “MapReduce” is used for:
- Processing large datasets in parallel
- Data visualization
- Network routing
- Screen rendering
98. Proof-of-Work (PoW) consensus requires:
- High computational power
- Centralized authority
- Low energy usage
- Physical hardware tokens
99. “Dark Patterns” in UI design are:
- Deceptive interfaces that manipulate users
- Low-contrast color schemes
- Voice-controlled systems
- Touchscreen gestures
100. The “Trolley Problem” is often discussed in:
- AI ethics
- Database design
- Network topology
- Screen manufacturing
