Computer Awareness knowledge is essential for various competitive exams, including those conducted by the Odisha Sub-ordinate Staff Selection Commission (OSSSC) for the posts of Livestock Inspector (LSI), Forester, and Forest Guard (FG). To help candidates prepare effectively, here are 30 multiple-choice questions (MCQs) covering a wide range of topics in computer fundamentals:
Top 30 Computer Awareness MCQs for OSSSC LSI, Forester, FG
- Which of the following is not a positional number system?
a) Roman Number System
b) Octal Number System
c) Binary Number System
d) Hexadecimal Number System
Answer: a) Roman Number System - The value of radix in the binary number system is _____________
a) 2
b) 8
c) 10
d) 1
Answer: a) 2 - The binary equivalent of the decimal number 10 is __________
a) 0010
b) 10
c) 1010
d) 010
Answer: c) 1010 - A computer language that is written in binary codes only is _____
a) machine language
b) C
c) C#
d) Pascal
Answer: a) machine language - The octal equivalent of 1100101.001010 is ______
a) 624.12
b) 145.12
c) 154.12
d) 145.21
Answer: b) 145.12 - The input hexadecimal representation of 1110 is _______________
a) 0111
b) E
c) 15
d) 14
Answer: b) E - A bit in computer terminology means either 0 or 1.
a) True
b) False
Answer: a) True - Convert the binary equivalent 10101 to its decimal equivalent.
a) 21
b) 12
c) 22
d) 31
Answer: a) 21 - Which of the following is not a binary number?
a) 1111
b) 101
c) 11E
d) 000
Answer: c) 11E - Which of the following is the correct representation of a binary number?
a) (124)2
b) 1110
c) (110)2
d) (000)2
Answer: d) (000)2 - Which field encompasses a variety of computer networks, both public and private, used in everyday jobs?
a) Artificial Intelligence
b) Machine Learning
c) Network Security
d) Information Technology
Answer: c) Network Security - Does Network Security provide authentication and access control for resources?
a) True
b) False
Answer: a) True - Which is not an objective of network security?
a) Identification
b) Authentication
c) Access control
d) Lock
Answer: d) Lock - What is a part of network identification?
a) UserID
b) Password
c) OTP
d) Fingerprint
Answer: a) UserID - What is the process of verifying the identity of a user?
a) Authentication
b) Identification
c) Validation
d) Verification
Answer: a) Authentication - Which concern of authentication deals with user rights?
a) General access
b) Functional authentication
c) Functional authorization
d) Auto-verification
Answer: c) Functional authorization - What does CHAP stand for?
a) Challenge Handshake Authentication Protocol
b) Challenge Hardware Authentication Protocol
c) Circuit Hardware Authentication Protocol
d) Circuit Handshake Authentication Protocol
Answer:a) Challenge Handshake Authentication Protocol - Which security feature controls access to resources in an operating system?
a) Authentication
b) Identification
c) Validation
d) Access control
Answer: d) Access control - What is an algorithm used in encryption called?
a) Algorithm
b) Procedure
c) Cipher
d) Module
Answer: c) Cipher - What is the information transformed in encryption?
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
Answer: a) Plain text - What term in computer terminology refers to a change in the technology a computer is/was being used?
a) development
b) generation
c) advancement
d) growth
Answer: b) generation - Was the fourth generation of computers based on integrated circuits?
a) True
b) False
Answer: b) False - Which generation of computers was based on VLSI microprocessors?
a) 1st
b) 2nd
c) 3rd
d) 4th
Answer: d) 4th - Which generation of computers started with the use of vacuum tubes as basic components?
a) 1st
b) 2nd
c) 3rd
d) 4th
Answer: a) 1st - In which generation of computers was batch processing mainly used?
a) 1st
b) 2nd
c) 3rd
d) 4th
Answer: a) 1st - Which emerging branch of computer science focuses on making computers think like human beings?
a) Block chain
b) VR
c) AI
d) Cloud computing
Answer: c) AI - What does ULSI stand for?
a) Ultra Large Scale Integration
b) Under Lower Scale Integration
c) Ultra Lower Scale Integration
d) Under Large Scale Integration
Answer: a) Ultra Large Scale Integration - Which generation of computers saw the use of Time sharing, Real time systems, Networks, and Distributed Operating Systems?
a) 1st
b) 2nd
c) 5th
d) 4th
Answer:d) 4th - What does HLL stand for?
a) High Level Language
b) High Layman’s Language
c) High Level Lesson
d) High Layman’s Lesson
Answer: a) High Level Language - What was the period of the second generation of computers?
a) 1st
b) 2nd
c) 5th
d) 4th
Answer: b) 2nd