OSSSC CRE MAIN- 1 ST AUGUST
2025
RI ARI AMIN SFS ICDS
100 COMPUTER MCQ
Class Link -
https://youtu.be/HW7O35UkEDE
1. What is another name for Computer Security?
A. Data Science
B. Artificial Intelligence
C. Cybersecurity
D. Hardware Management
2. What is a computer virus?
A. A hardware fault
B. A type of programming language
C. A small software program that interferes with computer
operations
D. A tool to improve system performance
3. Which of the following is considered a major source
of virus attacks?
A. Power outage
B. Overheating of computer
C. Downloadable programs
D. Mouse malfunction
4. Cracked software often contains:
A. System updates
B. Legal licenses
C. Viruses and bugs
D. Backup files
5. Which of the following ensures that unauthorized
users do not access the computer system?
A. Access Control List
B. System Access Control
C. Firewall Configuration
D. Anti-virus Software
6. What monitors who can access data and for what
purpose?
A. Data Shielding
B. File Encryption
C. Data Access Control
D. System Configuration
7. Which of the following handles offline procedures
to maintain security in a system?
A. System Encryption
B. System and Security Administration
C. Virus Scanning
D. User Authentication
8. Which component of computer security ensures
that data is not viewed by unauthorized users?
A. Privacy
B. Integrity
C. Confidentiality
D. Availability
9. Which component ensures that information cannot
be modified without detection?
A. Non-repudiation
B. Authentication
C. Encryption
D. Integrity
10. The process of verifying a user's identity through
login and password is called:
A. Authorization
B. Cryptography
C. Authentication
D. Validation
11. What component guarantees timely and
uninterrupted access to services by authorized users?
A. Availability
B. Integrity
C. Confidentiality
D. Steganography
12. What term refers to the encrypted form of a
message?
A. Key Cipher
B. Cipher Text
C. Access Code
D. Data Tunnel
13. What is the process of converting cipher text back
into readable form?
A. Steganography
B. Key Management
C. Decryption
D. Authentication
14. What does the term Malware stand for?
A. Major Application Layer Software
B. Malicious Software
C. Memory Allocation Software
D. Malware Alert Resource
15. Which of the following is NOT a type of malware?
A. Trojan Horse
B. Worm
C. Firewall
D. Spyware
16. What is the full form of VIRUS in computer
terminology?
A. Vital Information Resources Under Siege
B. Very Important Resource Utilization System
C. Verified Internet Resource Update Software
D. Virtual Intelligent Resource Utility Setup
17. What is the primary function of a computer virus?
A. Optimize speed
B. Provide security
C. Self-replicate and cause harm
D. Compress files
18. Which was the first self-replicating computer virus
created in 1971?
A. Brain
B. Creeper
C. ILOVEYOU
D. Nimda
The first boot sector virus discovered in 1986 is known
as:
A. Creeper
B. Code Red
C. Brain
D. Melissa
20. Which malware replicates itself to spread through
a computer network?
A. Trojan
B. Worm
C. Rootkit
D. Spyware
21. Which type of malware appears legitimate but
actually performs malicious activity?
A. Worm
B. Virus
C. Trojan Horse
D. Keylogger
22. Trojans differ from viruses because they:
A. Replicate like viruses
B. Spread over networks
C. Do not self-replicate
D. Are used to protect data
23. Which of the following is NOT a symptom of
malware attack?
A. System runs faster than usual
B. Files are missing
C. Odd messages on the screen
D. PC restarts repeatedly
24. Spyware is designed to:
A. Boost system performance
B. Encrypt user data
C. Monitor and steal user activity
D. Provide antivirus protection
25. Which of these is an example of spyware?
A. FinFisher
B. Beast
C. Brain
D. Morris
26. Which of the following is also known as
Masquerade?
A. Phishing
B. Spoofing
C. Rootkit
D. Spam
27. The act of illegally accessing a system or network
is called:
A. Phishing
B. Cracking
C. Hacking
D. Spamming
28. Which of the following can lead to Denial of
Service (DoS) attack?
A. Spoofing
B. Hacking
C. Spam
D. Cracking
29. Which of the following is also known as
'Masquerade'?
a) Hacking
b) Spoofing
c) Phishing
d) Cracking
30. Which of the following tools is used in Cracking?
a) Email filters
b) Password crackers
c) Antivirus
d) Proxy server
31. The act of fraudulently acquiring sensitive
information by impersonating a trustworthy entity is
called:
a) Spamming
b) Spoofing
c) Phishing
d) Hacking
32. Which software displays unwanted
advertisements automatically?
a) Malware
b) Trojan
c) Rootkit
d) Adware
33. Which of the following gains administrative access
without being detected?
a) Trojan
b) Rootkit
c) Worm
d) Logic Bomb
34. Spam refers to:
a) Software bugs
b) Email viruses
c) Unsolicited bulk email messages
d) Password cracking
35. Which security measure verifies the identity of a
message sender and ensures content integrity?
a) Proxy Server
b) Digital Signature
c) Adware
d) Patches
36. A Digital Certificate is primarily used to:
a) Generate passwords
b) Encrypt database
c) Verify the sender's identity
d) Format hard disks
37. Which of the following acts as a barrier between a
trusted internal network and untrusted external
network?
a) Proxy
b) Logic bomb
c) Firewall
d) Rootkit
38. Which type of password is more secure?
a) User’s name
b) Birth date
c) Mobile number
d) Combination of alphabets, numbers, symbols
39. Eavesdropping means:
a) Changing the content of files
b) Intercepting private communication in real-time
c) Stealing passwords
d) Damaging hard disk
40. What is the purpose of a 'patch' in computer
security?
a) To upgrade operating system
b) To enhance graphics
c) To fix bugs and vulnerabilities
d) To format memory
41. Logic Bombs are activated when:
a) Email is sent
b) File is downloaded
c) Specific conditions are met
d) Password is entered
42. Which of the following acts as a firewall and hides
true network addresses?
a) Rootkit
b) Digital Certificate
c) Proxy Server
d) Adware
43. File Access Permissions do NOT include:
a) Read
b) Write
c) Execute
d) Share
44. Which of the following applies security
mechanisms to specific applications like FTP or
Telnet?
a) Proxy Server
b) Application Gateway
c) Firewall
d) Cracker
45. IoT stands for:
a) Internet of Technology
b) Interface of Tools
c) Internet of Things
d) Integration of Telecom
46. Which of the following can be used for IoT
connectivity?
a) Wi-Fi
b) Bluetooth
c) Mobile Networks
d) All of the above
47. Which of the following devices can function like a
mini-computer and uses a touchscreen for
interaction?
a) SmartBand
b) Bluetooth Speaker
c) Smartphone
d) Spy Pen
48. luetooth speakers primarily use which frequency
band?
a) 900 MHz
b) 1.2 GHz
c) 2.4 to 2.485 GHz
d) 5 GHz only
49. A device mounted on an unmanned aerial vehicle
(UAV) that captures images or video is known as a:
a) SmartBand
b) Drone Camera
c) Smart Glass
d) Bluetooth Speaker
50. What does ‘BHIM’ in BHIM App stand for?
a) Bharat Interface for Messaging
b) Bharat Interface for Money
c) Banking and Health Information Module
d) Banking Help in Mobile
51. The BHIM App is based on which digital payment
interface?
a) RTGS
b) IMPS
c) NEFT
d) UPI
52. What is the Speed of the Computer-
(A) Data
(B) HZ
(C) FLOPS
(D) MIPS
53. The recently visited website URLs are stored under
______ option on the browser.
(A) Autofill
(B) History
(C) Search engine
(D) Downloads
54. What is the full from of DSL?
(A) Digital Subscriber Line
(B) Digital Superior Line
(C) Digital Sub Line
(D) Digital Sub connector Line
55. Which shortcut is used to reload the webpage?
(A) F7
(B) F6
(C) F8
(D) F5
56. What is the full from of ISP?
(A) Internet Service Provider
(B) Intranet Service Provider
(C) Internet Service Producer
(D) Internet Source Provider
57. What is the shortcut to justify a paragraph in Word?
(A) Ctrl+E
(B) Ctrl+R
(C) Ctrl+J
(D) Ctrl+L
58. In Excel, combining two or more cells into one cell is
called _________.
(A) Merge
(B) Concatenate
(C) Wrap Text
(D) Justify
59. Which option in Microsoft Word helps you copy the
formatting information of a text and apply in multiple
places?
(A) Format color
(B) Format Select
(C) Format Painter
(D) Format Copy
60. The logical size of a file can be reduced and easily
attached to emails using __________.
(A) Compression
(B) Decryption
(C) Fragmentation
(D) Encryption
61. The website that is available only within the office
network is called _________.
(A) Intranet sites
(B) Social media sites
(C) e-Commerce sites
(D) Internet sites
62. Which among the following is a device that is used to
connect more number of LANs?
(A) Repeater
(B) Bridge
(C) Switch
(D) Router
63. What is the full form of IMAP in e- mail System?
(a) Internal Mail Access Protocol
(b) Internet Manage Access Protocol
(c) Integral Message Access Protocol
(d) Internet Message Access Protocol
64. Which of the following is designed to control the
operations of a computer?
(a) User
(b) Application Software
(c) System Software
(d) Utility Software
65. What is the file extension of Ms outlook?
(a) .edb
(b) .accdb
(c) .png
(d) .txt
66. Arranging of data in a logical sequence is called
(a) Sorting
(b) Classifying
(c) Reproducing
(d) Summarizing
67. 1 byte equals to
(a) One bit
(b) Four bits
(c) Eight bits
(d) Sixteen bits
68. Which type of file is created by word processing
programs?
(a) Database file
(b) Storage file
(c) Worksheet file
(d) Document file
69. Which of the following menu types is also called a
dropdown menu?
(a) Fly-out
(b) Cascading
(c) Pop-up
(d) Pull-down
70. Computers manipulate data in many ways, and this
manipulation is called _________
(a) Utilizing
(b) Batching
(c) Upgrading
(d) Processing
71. The page to create Presentation in Power Point is
called _.
A. Sheet
B. Paper
C. Slide
D. Documents
72. How many types of layouts are in the power point
A. 9
B. 5
C. 6
D. None of these
73. Which of the following is the default page setup
orientation for slides in PowerPoint ?
A. Vertical
B. Portrait
C. Landscape
D. Horizontal
74. Extension of a PowerPoint template is______.
A. .pptx
B. .potx
C. .ppsx
D. .ppsm
75. The document can be zoom maximum upto
A. 100%
B. 200%
C. 400%
D. 500%
76. ______ is the personal assistant that is integrated into
Windows 10 Operating System.
(A) Siri
(B) Alexa
(C) Cortana
(D) Thumbnail
77. Main memory is a ______ storage device that loses its
contents when power is turned off.
(A) Magnetic
(B) Transistor
(C) Volatile
(D) Permanent
78. What is the shortcut key to move to the next cell in a
row?
(A) Home
(B) End
(C) Tab
(D) Esc
79. ______ operating system was developed at AT&T Bell
Laboratories in the late 1960s written in C language.
(A) DOS
(B) MAC
(C) UNIX
(D) BASIC
80. You can move your content on a document further
away using ______ option.
(A) Italic
(B) Indent
(C) Underline
(D) Bold
81. The block of text inserted automatically at the end of
an email message is called ______.
(A) Email name
(B) Email subject
(C) Email signature
(D) URL
82. A/An ______ is a basic unit of communication over a
digital network.
(A) access point
(B) switch
(C) router
(D) data packet
83. In a standard keyboard, the keys Alt, Shift, and Ctrl are
called as ______.
(A) Function keys
(B) Special purpose keys
(C) Navigation keys
(D) Numeric keys
84. Which among the following is not a flash memory?
(A) SSD
(B) SD Card
(C) DDR
(D) USB
85. Using ______ option in Microsoft Word, you can create
quick access to web pages with a click.
(A) Quick Link
(B) Illustration
(C) Hyperlink
(D) Bookmark
86. What is Symbian?
(A) Windows operating system
(B) Mobile operating system
(C) MS-DOS operating system
(D) Linux-based mobile phone operating system
87. What does CC denote in emails?
(A) Common Copy
(B) Carbon Copy
(C) Complete Copy
(D) Communication Copy
88. ______ option in Microsoft Excel can be used to make
the text appear on multiple lines within a cell.
(A) Rich Text
(B) Multi Text
(C) Wrap Text
(D) Auto Text
89. The run command that you can use to quickly open
the PowerPoint application is ______.
(A) Winword
(B) Iexplore
(C) Powerpnt
(D) WinPower
90. What is the full form of 'WAN' in networking?
(A) Wide Area Network
(B) Wireless Area Network
(C) WiFi Area Network
(D) Work Area Network
91. What is the ASCII value for ‘A’?
(A) 84
(B) 65
(C) 85
(D) 68
92. In a browser, the URL of the current page is displayed
at
a) Toolbar
b) Address bar
c) Title bar
d) Menu bar
93. What is BCC in email?
a) Block content creation
b) Behind Content Copy
c) Blind Carbon Copy
d) None of these
94. DNS stands for
a) Domain Name Signal
b) Domain Name System
c) Domain Name Server
d) Domain Number System
95. Which of the following is used to summarize data in a
table in Microsoft Access?
a) Report
b) Form
c) Query
d) Table Design View
96. Which of the following is used to create a pivot table in
Microsoft Access?
a) Pivot Table Wizard
b) Pivot Table Design View
c) SQL View
d) All of the above
97. A cookie:
a) Stores information about the user's web activity
b) Stores software developed by the user
c) Stores the password of the user
d) Stores the commands used by the user
98. Which of the following options in Windows 10 allows
you to uninstall or change installed software applications?
a) Control Panel
b) Task Manager
c) Windows Installer
d) Windows Update
99. The contents of the active cell are displayed in:
a) Cell Range
b) Formula Bar
c) Title Bar
d) Name Box
100. What does 'Gutter' refer to in the Page Setup settings
of the Microsoft Work Processor?
a) Page orientation
b) Page type
c) Page margin
d) Page preview