MCQ on Introduction to Computer and Basic Concepts | NIELIT ECC

Advertisement

Q71. What is the primary function of a “device driver”?
a) To control hardware devices and allow communication with the operating system
b) To manage network connections
c) To provide a user interface
d) To create and edit documents

Show Answer

Correct Answer: a) To control hardware devices and allow communication with the operating system
Explanation: Device drivers are software that enable the operating system to communicate with and control hardware devices.

Q72. What does the term “binary system” refer to?
a) A system that uses multiple symbols for data representation
b) A system that uses only two symbols, 0 and 1, for data representation
c) A system for organizing files on disk
d) A system for network management

Show Answer

Correct Answer: b) A system that uses only two symbols, 0 and 1, for data representation
Explanation: The binary system is a numerical system that uses only two symbols, 0 and 1, to represent data in computing.

Q73. What is the purpose of “file compression”?
a) To encrypt files for security
b) To reduce the size of files for storage or transmission
c) To convert files into different formats
d) To recover deleted files

Show Answer

Correct Answer: b) To reduce the size of files for storage or transmission
Explanation: File compression reduces the size of files to save storage space or make transmission faster.

Q74. Which of the following is an example of an output device?
a) Keyboard
b) Mouse
c) Monitor
d) Scanner

Show Answer

Correct Answer: c) Monitor
Explanation: A monitor is an output device used to display visual information from a computer.

Q75. What does “network topology” refer to?
a) The layout and arrangement of network devices and connections
b) The speed of network data transfer
c) The security protocols used in a network
d) The type of network cables used

Show Answer

Correct Answer: a) The layout and arrangement of network devices and connections
Explanation: Network topology describes how network devices and connections are arranged and organized within a network.

Q76. What is the primary role of a “router” in a network?
a) To connect different networks and manage data traffic between them
b) To store data permanently
c) To create and edit documents
d) To provide a user interface

Show Answer

Correct Answer: a) To connect different networks and manage data traffic between them
Explanation: A router connects multiple networks and manages the flow of data between them, directing traffic to its destination.

Q77. What does “data recovery” involve?
a) The process of backing up data
b) The process of restoring lost or damaged data
c) The process of encrypting data
d) The process of creating new data

Show Answer

Correct Answer: b) The process of restoring lost or damaged data
Explanation: Data recovery involves retrieving lost or damaged data from storage devices or backups.

Q78. Which of the following is an example of a portable storage device?
a) Hard Disk Drive
b) SSD
c) Flash Drive
d) RAM

Show Answer

Correct Answer: c) Flash Drive
Explanation: A flash drive is a portable storage device that can easily be carried and used to store and transfer data.

Q79. What is the function of “virtual memory” in a computer?
a) To increase the physical memory capacity
b) To use a portion of the hard drive as additional RAM
c) To store data permanently
d) To manage network connections

Show Answer

Correct Answer: b) To use a portion of the hard drive as additional RAM
Explanation: Virtual memory allows a computer to use a portion of the hard drive as additional RAM to extend the available memory for running applications.

Q80. What does “user authentication” involve?
a) The process of creating new user accounts
b) The process of verifying the identity of users before granting access to systems
c) The process of managing user data
d) The process of installing software

Show Answer

Correct Answer: b) The process of verifying the identity of users before granting access to systems
Explanation: User authentication involves verifying a user’s identity through methods such as passwords or biometric data to ensure secure access to systems.

Advertisement
error: Content is protected !!
Scroll to Top