Computers have become an essential part of our daily lives, from work to entertainment to communication. Understanding computer basics is essential for anyone who uses a computer, whether it is for personal or professional use. In this article, we will cover some of the fundamental concepts of computing. And if you want to start a career in IT, you might want to attend one of the best coding bootcamps.
Computers consist of two main components: hardware and software. Hardware refers to the physical components of a computer, such as the central processing unit (CPU), the monitor, the keyboard, and the mouse. Software, on the other hand, refers to the programs and applications that run on the computer. Examples of software include Microsoft Word, Google Chrome, and Adobe Photoshop.
An operating system (OS) is the software that manages a computer’s hardware and software resources. The operating system is responsible for performing basic tasks, such as controlling and allocating memory, managing input and output devices, and providing security. Examples of operating systems include Microsoft Windows, macOS, and Linux.
Memory refers to the storage capacity of a computer. There are two types of memory: primary memory and secondary memory. Primary memory, also known as RAM (Random Access Memory), is used by the computer to temporarily store data and programs that are currently in use. Secondary memory, such as hard disk drives (HDD) and solid-state drives (SSD), is used to store data and programs permanently.
Input devices are used to provide input to the computer. Examples of input devices include the keyboard, mouse, and microphone. Output devices are used to display the output generated by the computer. Examples of output devices include the monitor, printer, and speakers.
The internet is a global network of computers that are connected to each other. The internet enables users to communicate, share information, and access resources from anywhere in the world. You can simply search for do math homework for me and find a reliable service that can assist you. Additionally, you may come across valuable information or connect with individuals facing similar challenges, enabling you to collaborate in finding solutions together. Networks refer to a group of computers that are connected to each other, either physically or wirelessly. Networks can be used to share resources, such as printers and files, and to communicate between computers.
Here are some common computer basic questions and their answers:
S.No. | Question | Answer |
---|---|---|
1. | Who is the father of Computer science? | Charles Babbage |
2. | In a computer, most processing takes place in _______? | CPU |
3. | In which type of computer, data are represented as discrete signals? | Digital Computer |
4. | Scientific Name of Computer? | Sillico sapiens |
5. | What is the name of the display feature that highlights are of the screen which requires operator attention? | Reverse Video |
6. | Computers, combine both measuring and counting, are called _______? | Hybrid Computer |
7. | What is FORTRAN? | Formula Translation |
8. | What translates and executes program at run time line by line? | Interpreter |
9. | What converts an entire program into machine language? | Compiler |
10. | Who is the father of personal computer? | Edward Robert |
11. | EEPROM stands for _______? | Electronic Erasable Programmable Read Only Memory |
12. | Who developed the first electronic computer? | J.V. Atansoff |
13. | Which programming languages are classified as low level languages? | Assembly Language |
14. | The first web browser is _______? | Mosaic |
15. | First page of Website is termed as _______? | Homepage |
16. | IBM stands for _______? | International Business Machines |
17. | Office LANs, which are scattered geographically on large scale, can be connected by the use of corporate _______? | WAN ( wide area network ) |
18. | To move a copy of file from one computer to another over a communication channel is called? | File Transfer |
19. | Large transaction processing systems in automated organisations use _______? | Batch Processing |
20. | MICR stands for _______? | Magnetic Ink Character Recognition |
21. | Name of 1st electronic computer? | ENIAC |
22. | No. of different characters in ASCII coding system? | 1024 |
23. | MSIC stands for _______? | Medium Scale Integrated Circuits |
24. | The scrambling of code is known as _______? | Encryption |
25. | The first computers were programmed using _______? | Machine Language |
26. | A fault in a computer program which prevents it from working correctly is known as _______? | Bug |
27. | Which button makes alphabets/letters in uppercase and lowercase and numbers to symbols? | Shift |
28. | When a computer is switched on, the booting process performs _______? | Power on self test |
29. | What is the software frequently utilized by end users called (like Word, PowerPoint)? | Application Software |
30. | Unit of measurement of the output quality of a printer? | Dot per sq. inch |
31. | Switching device of fifth generation computer is _______? | VLSI |
32. | The unit KIPS is used to measure the speed of _______? | Processor |
33. | DOS stands for _______? | Disk Operating System |
34. | What is a joy stick primarily in computers used for? | Computer Gaming |
35. | In 1999, the Melissa virus was a widely publicized _______? | E-mail virus |
36. | Which of the following commands is given to reboot the computer? | Ctrl+Alt+Del |
37. | What is correcting errors in a program called? | Debugging |
38. | BCD is _______? | Binary Coded Decimal |
39. | What type of virus uses computer hosts to reproduce itself? | Worm |
40. | SMTP, FTP and DNS are applications of the _______ layer? | Application |
41. | Which command is used to select the whole document? | Ctrl+A |
42. | COBOL is an acronym for _______? | Common Business Oriented Language |
43. | The ability of an OS to run more than one application at a time is called? | Multitasking |
44. | What is the functional key to display save-as box? | F12 |
45. | Full form of NOS? | Network Operating system |
46. | Something which has easily understood instructions is said to be _______? | Analog Data |
47. | A modem is connected to a _______? | Telephone Line |
48. | Refresh Rate of monitor is measured in? | Hertz |
49. | What was the chief component of first generation computer? | Vacuum tube & Valves |
50. | Name the Father of Computer Mouse? | Douglas Engelbart |
51. | A program that performs a useful task while simultaneously allowing destructive acts is _______? | Trojan Horse |
52. | The geometric arrangement of devices on the network is called _______? | Topology |
53. | The basic goal of computer process is to convert data into _______? | Information |
54. | Where are the CPU and memory located? | Motherboard |
55. | Who is known as the founder of IBM Company? | Thomas J. Watson |
56. | An image on a computer screen is made up of _______? | Pixels |
57. | Full form of MAN? | Metropolitan Area Network |
58. | Which command in DOS can be used to recover accidentally deleted files? | UNDELETE |
59. | A computer program that converts an entire program into machine language atone time is called _______? | Characters |
60. | In which year, the Microsoft company was founded? | 1975 |
61. | What is the personal computer operating system that organizes and uses a graphic desktop environment? | Windows |
62. | What are Light pen and joystick? | Input Devices |
63. | What is a half byte also called as? | Nibble |
64. | SMPS stands for _______? | Switched mode Power Supply |
65. | What do we use to change the appearance and positioning of text document in MSWord? | Formatting |
66. | A _______ is approximately a million bytes? | Megabyte |
67. | Daisy wheel, Drum, chain etc are the _______? | Printers |
68. | XML stands for _______? | Extensible Markup Language |
69. | What kind of scheme is the HTTP protocol? | Request/Response |
70. | Magnetic disk is an example of _______? | Secondary Memory |
71. | What is the meaning of OSI, in terms of computers ? | Open system Interconnection |
72. | Which type of storage device is a BIOS ? | Primary |
73. | What is the extension type of the excel 2007 files? | .xlsx |
74. | Collecting personal information and effectively posing as another individual is known as the crime of _______? | Identity theft |
75. | The amount of vertical space between lines of text in a document is called _______? | Line Spacing |
76. | A computer cannot ‘boot’ if it does not have the _______? | Operating system |
77. | What is the other name for programmed chip? | LSIC |
78. | A normal CD- ROM usually can store up to _______ data? | 680 MB |
79. | What does DMA stand for? | Direct Memory Access |
80. | Full form of LAN? | Local Area Network |
81. | ASCII stands for _______? | American Standard Code for Information Interchange |
82. | Second Generation computers were developed during _______? | 1956-65 |
83. | When did arch rivals IBM and Apple Computers Inc. decide to join hands? | 1991 |
84. | What kind of memory is both static and non-volatile? | ROM |
85. | An error in software or hardware is called a bug. What is the alternative computer jargon for it? | Glitch |
86. | Unwanted repetitious messages, such as unsolicited bulk e-mail is known as _______? | Spam |
87. | The common name for the crime of stealing passwords is _______? | Spoofing |
88. | BIOS stands for _______? | Basic Input Output System |
89. | Who is regarded as Father of “C” programming language? | Dennis Ritchie |
90. | RAM can be treated as the _______ for the computer’s processor. | Waiting Room |
91. | Computers manipulate data in many ways, and this manipulation is called _______? | Processing |
92. | Joshy, Perfumes are examples of _______? | Viruses |
93. | The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called _______? | Computer Forensics |
94. | Where does most data go first with in a computer memory hierarchy? | RAM |
95. | Help Menu is available at which button? | Start |
96. | Which file contains permanent data and gets updated during the processing of transactions? | Master File |
97. | A DVD is an example of an _______? | Optical Disc |
98. | Which is most common tool used to restrict access to computer system? | Passwords |
99. | The technology that stores only essential instructions on a microprocessor chip and thus enhances its speed is referred as _______? | RISC |
100. | What is the name of an application program that gathers user information and sends it to someone through the Internet? | Spybot |
IT technology is outlined, not just with the simple background in hardware and software systems, but also with a wide variety of different technical issues. This IT information covers wide-ranging topics, including mobile devices, cloud computing, use systems, and security. And with the certification exams 220-901 and 220-902 or the new tests ExamSnap 220-1002, IT technicians are refined to become more ready to face the changing digital world.
Also read: How to build your own PC | 50 Important Questions Related To Computer Technology
Please visit: CWAssignments to get your assignments done online
Suggested Read Articles:
50 Important Questions Related To Computer Technology | cisco ccna practice test 200-301
You may also like:- Top 10 Computer Fundamentals Questions and Answers
- Quiz Time – Testing Your Knowledge on Popular Computer Questions
- 15 Important Questions Related to Computer
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 14
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 13
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 12
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 11
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 10
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 9
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 8