Odia govt jobs   »   Top 30 Computer Awareness MCQs for...

Top 30 Computer Awareness MCQs for OSSC CGL 20 August 2024

Prepare for the OSSC CGL with these Top 30 Computer Awareness MCQs, designed to enhance your knowledge. Covering fundamental concepts in computing, from hardware to software and beyond, these questions aim to sharpen your understanding and boost your confidence. Whether you’re familiarizing yourself with basic terminology or delving into more advanced topics, this curated set ensures comprehensive preparation. Master concepts like operating systems, networking, and data structures, vital for success in the OSSC CGL examination. Elevate your computer awareness proficiency and ace the test with ease.

Top 30 Computer Awareness MCQs For OSSC CGL

Which operating system was released in 1985?
(a) Android
(b) Windows
(c) Mac OS
(d) iOS
Ans. (b) Windows

Which of the following was the first operating system released?
(a) UNIX
(b) MS-DOS
(c) iOS
(d) Windows Phone
Ans. (a) UNIX

The Chrome OS was launched in which year?
(a) 2008
(b) 2010
(c) 2011
(d) 2013
Ans. (c) 2011

iOS, the mobile operating system, was introduced in:
(a) 2005
(b) 2006
(c) 2007
(d) 2008
Ans. (c) 2007

Which operating system debuted in 1999?
(a) Firefox OS
(b) Android
(c) Blackberry OS
(d) Windows Phone
Ans. (c) Blackberry OS

Which OS was the first to be released among the following?
(a) Mac OS
(b) Windows Phone
(c) Firefox OS
(d) Android
Ans. (a) Mac OS

MS-DOS, an early operating system, was released in:
(a) 1981
(b) 1983
(c) 1985
(d) 1987
Ans. (a) 1981

Android was released in which year?
(a) 2007
(b) 2008
(c) 2009
(d) 2010
Ans. (b) 2008

The Firefox OS, known for its use in mobile devices, was introduced in:
(a) 2009
(b) 2011
(c) 2012
(d) 2013
Ans. (d) 2013

Windows Phone, a mobile OS developed by Microsoft, was launched in:
(a) 2008
(b) 2009
(c) 2010
(d) 2011
Ans. (c) 2010

Which of the following is not a component of DBMS?
(a) Data
(b) Users
(c) Software
(d) Internet
Ans. (d) Internet

What type of data is referred to as “Metadata”?
(a) Actual data entered by the user
(b) Data that describes other data
(c) Application structure
(d) Backup data
Ans. (b) Data that describes other data

In DBMS, which key uniquely identifies a record in a table?
(a) Foreign Key
(b) Primary Key
(c) Composite Key
(d) Candidate Key
Ans. (b) Primary Key

What is the main advantage of using a Database Management System?
(a) Increases redundancy
(b) Restricts data access
(c) Easy to manage large amounts of data
(d) No backup and recovery needed
Ans. (c) Easy to manage large amounts of data

Which language is commonly used to manage a relational database?
(a) HTML
(b) SQL
(c) Python
(d) Java
Ans. (b) SQL

What does the acronym DDL stand for in the context of DBMS?
(a) Data Distribution Language
(b) Data Description Language
(c) Data Definition Language
(d) Data Decision Language
Ans. (c) Data Definition Language

Which of the following best describes a “Foreign Key”?
(a) It is a key that uniquely identifies each record in a database
(b) It is a key used to link two tables together
(c) It is a key that is used to encrypt data
(d) It is a backup key used in case of primary key failure
Ans. (b) It is a key used to link two tables together

What is “Application MetaData” in DBMS?
(a) The actual data entered by the user
(b) The structure and format of queries
(c) Data about data
(d) The hardware used for storage
Ans. (b) The structure and format of queries

How does DBMS handle data redundancy?
(a) It increases redundancy to ensure data safety
(b) It eliminates redundancy by using a single database file
(c) It backs up redundant data for recovery
(d) It ignores redundancy issues
Ans. (b) It eliminates redundancy by using a single database file

Which component of DBMS is responsible for data backup and recovery?
(a) Users
(b) Hardware
(c) Software
(d) Data
Ans. (c) Software

What is a computer virus?
(a) A harmless software
(b) A beneficial program
(c) A malicious piece of code
(d) A system utility
Ans: (c) A malicious piece of code

Which of the following is an example of antivirus software?
(a) Windows Media Player
(b) McAfee
(c) Microsoft Word
(d) Adobe Reader
Ans: (b) McAfee

Malware is primarily designed to:
(a) Improve system performance
(b) Provide free software updates
(c) Disrupt computer operations
(d) Protect computer data
Ans: (c) Disrupt computer operations

A computer worm is a type of malware that:
(a) Is attached to other software
(b) Self-replicates and spreads through networks
(c) Requires user interaction to execute
(d) Disguises itself as legitimate software
Ans: (b) Self-replicates and spreads through networks

Which of the following best describes a Trojan horse?
(a) Self-replicating malware
(b) Harmless application
(c) Malicious software disguised as legitimate
(d) A tool for software development
Ans: (c) Malicious software disguised as legitimate

What is the primary function of authorization in computer security?
(a) Encrypting data
(b) Specifying access rights to resources
(c) Scanning for malware
(d) Improving system speed
Ans: (b) Specifying access rights to resources

Authentication is the process of:
(a) Encrypting information
(b) Comparing credentials to a database
(c) Developing software
(d) Installing updates
Ans: (b) Comparing credentials to a database

Who is a hacker?
(a) A person who creates antivirus software
(b) A person who breaks into computer systems
(c) A system administrator
(d) A software developer
Ans: (b) A person who breaks into computer systems

Phishing is typically carried out through:
(a) Direct physical access to computers
(b) Sending fake emails or messages
(c) Installing antivirus software
(d) Creating strong passwords
Ans: (b) Sending fake emails or messages

A spoofing attack involves:
(a) Installing antivirus software
(b) Impersonating another user or system
(c) Encrypting data for security
(d) Improving system performance
Ans: (b) Impersonating another user or system

pdpCourseImgOSSC CGLRE Prelims 2024 | Complete Online Test Series By Adda247