11th Computer Science Public Question Paper PDF Download. We covered all the 11th Computer Science Public Question Paper PDF Download file provided in this post for free so that you can practice well for the exam.
Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.
These types of competitive MCQs appear in exams like SSC, Railway, Bank, Delhi Police, UPSSSC, UPSC (Pre), State PCS, CDS, NDA, Assistant Commandant, and other Competitive Examinations, etc.
We created all the competitive exam MCQs into several small posts on our website for your convenience.
You will get their respective links in the related posts section provided below.
Related Posts:
- Computer Proficiency Test Question Paper
- Computer One Liner PDF in Gujarati PDF Download
- Computer Question and Answer in Bengali with Answers PDF
11th Computer Science Public Question Paper PDF Download for Students
TTL stands for
(A) Time-To-Login
(B) Time-To-Live
(C) Transistor-Transistor-Live
(D) None of these
Option b – Time-To-Live
Which protocol is used to report error messages ( 11th Computer Science MCQ )
(A) TCP
(B) IP
(C) ICMP
(D) SMTP
Option c – ICMP
Which is the error message reported by ICMP
(A) Time exceeded
(B) Host unreachable
(C) Echo request
(D) All of these
Option d – All of these
What is the use of IP source routing ( 11th Computer Science MCQ )
(A) Mapping the network drive
(B) Troubleshooting
(C) Performance
(D) All of the above
Option d – All of the above
Which is the IP source routing method
(A) SSR
(B) LSR
(C) LLR
(D) Both A & B
Option d – Both A & B
What is the type of port ( 11th Computer Science MCQ )
(A) Serial
(B) Parallel
(C) AGP
(D) All of these
Option d – All of these
Parallel ports can transfer …….. bits of data at a time-
(A) 2
(B) 4
(C) 8
(D) 16
Option c – 8
Parallel Port can not connect ( 11th Computer Science MCQ )
(A) Printers
(B) Scanners
(C) Telephones
(D) Monitors
Option d – Monitors
In computer which range is in registered ports
(A) 0 to 1023
(B) 1024 to 49151
(C) 49151 to 65535
(D) None of these
Option b – 1024 to 49151
USB stands for
(A) United Serial Bus
(B) Universal Serial By-Pass
(C) Universal System Bus
(D) Universal Serial Bus
Option d – Universal Serial Bus
Which is the fastest port for data transfer ( 11th Computer Science MCQ )
(A) USB
(B) Serial
(C) Parallel
(D) FireWire
Option d – FireWire
The default port for HTTP
(A) 13
(B) 80
(C) 8080
(D) 25
Option b – 80
Which is not part of the UDP datagram ( 11th Computer Science MCQ )
(A) Source Port
(B) Destination Port
(C) Checksum
(D) None of these
Option d – None of these
Which is the type of socket-
(A) Datagram
(B) Stream
(C) Raw
(d) All of these
Option d – All of these
In which layer of OSI model IP is available ( 11th Computer Science MCQ )
(A) Layer 1
(B) Layer 2
(C) Layer 3
(D) Layer 4
Option c – Layer 3
IP is defined in
(A) RFC 790
(B) RFC 791
(C) RFC 792
(D) RFC 793
Option b – RFC 791
How do you change column width to fit the contents? ( 11th Computer Science MCQ )
a) Single-click the boundary to the left of the column heading
b) Double-click the boundary to the right of the column heading
c) Press Alt & single-click anywhere in the column
d) All of the above
Option b – Double-click the boundary to the right of the column heading
When you work with large worksheets, you may need to
a) Size the worksheet to fit the specific number of pages
b) Add & remove page breaks
c) Specify only certain print areas
d) All of the above
Option d – All of the above
Hyperlinks cannot be
a) Special shapes like stars & banners
b) Drawing objects like rectangles and ovals
c) Pictures
d) All can be hyperlinks
Option d – All can be hyperlinks
You can use the horizontal and vertical scroll bars to ( 11th Computer Science MCQ )
a) Split a worksheet into two panes
b) View different rows and columns
c) Edit the contents of a cell
d) View different worksheets
Option b – View different rows and columns
What do we call a computer program that organizes data in rows & columns of cells? You might use this type of program to keep a record of the money you earned mowing lawns over the summer.
a) Spreadsheet program
b) Database program
c) Word processor program
d) Desktop publisher program
Option a – Spreadsheet program
a) Standard
b) Formatting
c) Drawing
d) Picture
Option d – Picture
What function displays row data in a column or column data in a row?
a) Hyperlink
b) Index
c) Transpose
d) Rows
Option c – Transpose
The Name box ( 11th Computer Science MCQ )
a) Shows the location of the previously active cell
b) Appears to the left of the formula bar
c) Appears below the status bar
d) Appears below the menu bar
Option b – Appears to the left of the formula bar
Which type of the following malware does not replicate or clone themselves through infection?
A. Rootkits
B. Trojans
C. Worms
D. Viruses
Option b – Trojans
Which of the following malware types allows the attacker to access the administrative controls and enables him or her to do almost anything he wants to do with the infected computers?
A. RATS
B. Worms
C. Rootkits
D. Botnets
Option a – RATS
Which of the following statements is true about Trojans? ( 11th Computer Science MCQ )
A. Trojans perform tasks for which they are designed or programmed
B. Trojans replicate themselves or clone themselves through infections
C. Trojans do nothing harmful to the user’s computer systems
D. None of the above
Option a – Trojans perform tasks for which they are designed or programmed
Which of the following is just the opposite of the Open Design principle?
A. Security through obscurity
B. Least common mechanism
C. Least privileges
D. Work factor
Option a – Security through obscurity
Which of the following is a type of independent malicious program that never requires any host program? ( 11th Computer Science MCQ )
A. Trojan horse
B. Worm
C. Trap door
D. Virus
Option b – Worm
The term “CHAP” stands for ………..
A. Circuit Hardware Authentication Protocols
B. Challenge Hardware Authentication Protocols
C. Challenge Handshake Authentication Protocols
D. Circuit Handshake Authentication Protocols
Option c – Challenge Handshake Authentication Protocols
A …….. is an electronic device that processes data, converting it into information. ( 11th Computer Science MCQ )
A. stylus
B. None of these
C. case
D. computer
Option d – computer
Something that has easily understood instructions is said to be
A. icon
B. word processing
C. user friendly
D. information
Option c – user friendly
Disk Operating System (DOS) was designed to work with which of the following input devices? ( 11th Computer Science MCQ )
A. Mouse
B. Xbox
C. Printer
D. Keyboard
Option d – Keyboard
Which of the following is not a storage device?
A. CD
B. Floppy disk
C. Hard Disk
D. Printer
Option d – Printer
A SIMM has how many pins? ( 11th Computer Science MCQ )
A. 40
B. 20
C. 34
D. 36
Option a – 40
URL is a reference to a resource on the internet, URL stands for
A. Universal Resource List
B. Uniform Resource Locator
C. Uniform Resource Locator
D. Uniform Resource List
Option b – Uniform Resource Locator
A …….. uses laser technology to store large amounts of information. ( 11th Computer Science MCQ )
A. None of these
B. Floppy Disk
C. Hard disk
D. Compact Disc Read-only memory (CD-ROM)
Option d – Compact Disc Read-only memory (CD-ROM)
When sending an e-mail, the …….. line describes the contents of the message.
A. contents
B. subject
C. None of these
D. CC
Option b – subject
A device that connects to a network without the use of cables is said to be ( 11th Computer Science MCQ )
A. None of these
B. open source
C. centralized
D. Wireless
Option d – Wireless
Which of the following peripheral devices displays information to a user?
A. Monitor
B. Secondary storage media
C. None of these
D. Secondary storage devices
Option a – Monitor
A ……… contains specific rules & words that express the logical steps of an algorithm. ( 11th Computer Science MCQ )
A. None of these
B. programming structure
C. programming language
D. syntax
Option c – programming language
What does RAM stand for?
A. Read Accessed & Maintain
B. Random Active Memory
C. Read Active Memory
D. Random Access Memory
Option d – Random Access Memory
VoIP stands for ( 11th Computer Science MCQ )
A. Version over IP
B. Voice on IP
C. Vote over IP
D. Voice over IP
Option d – Voice over IP
Which supercomputer is developed by Indian scientists?
A. Param
B. Super 301
C. Compaq Presario
D. CRAY YMP
Option a – Param
One Gigabyte is approximately equal to: ( 11th Computer Science MCQ )
A. 1,000,000 bytes
B. 1,000,000,000 bytes
C. 1,000,000,000,000 bytes
D. None of these
Option b – 1,000,000,000 bytes
Check the odd term out:
A. Linux
B. Windows
C. Internet
D. Unix
Option c – Internet
The errors that can be pointed out by the compiler are:
A. Syntax error
B. Symantic error
C. Logical error
D. Internal error
Option a – Syntax error
What is the control unit’s function in the CPU?
A. To transfer data to primary storage
B. To store program instructions
C. To perform logic functions
D. To decode program instructions
Option c – To perform logic functions
What do you use to create a chart?
A. Pie Wizard
B. Excel Wizard
C. Data Wizard
D. Chart Wizard
Option d – Chart Wizard
C is?
A. A machine language
B. A third generation high-level language
C. An assembly language
D. All of the above
Option b – A third generation high-level language
A device that converts digital signals to analog signals is:
A. A modem
B. A packet
C. A block
D. Both A and B
Option a – A modem
Which of the following is the most powerful type of computer?
A. Supermicro
B. Super computer
C. Super conductor
D. Megaframe
Option b – Super computer
The ……….. is the administrative section of the computer system?
A. Central Processing Unit
B. Control Unit
C. Input Unit
D. Memory Unit
Option a – Central Processing Unit
Find the odd man out:
A. FTP
B. TCP
C. POP
D. SAP
Option c – POP
Which of the following is NOT an operating system?
A. Window NT
B. Java
C. Dos
D. Unix
Option b – Java
One kilobyte is equal to:
A. 1000 bytes
B. 1024 bytes
C. 100 bytes
D. 1023 bytes
Option b – 1024 bytes
Which of the following is not an example of an operating system?
A. Windows 98
B. BSD Unix
C. Microsoft Office XP
D. Red Hat Linux
Option c – Microsoft Office XP
IC chips used in computers are usually made of:
A. Lead
B. Silicon
C. Chromium
D. Gold
Option b – Silicon
The default port for SMTP is
(A) 22
(B) 23
(C) 24
(D) 25
Option d – 25
SNMP used for
(A) Sending Message
(B) Network management
(C) Domain Management
(d) Sending files
Option b – Network management
Which agency assigns IPS
(A) IEEE
(B) ANSI
(C) ICANN
(D) BSNL
Option c – ICANN
Which is the component of the IP
(A) Client Identifier
(B) Server Identifier
(C) Host Identifier
(d) Both B & C
Option d – Both B & C
Which IP address is reserved for loopback or local host-
(A) 192.168.0.0
(B) 127.0.0.0
(C) 127.0.0.1
(D) None of these
Option c – 127.0.0.1
Which class of IP is used in smaller organizations-
(A) Class A
(B) Class B
(C) Class C
(D) Class D
Option c – Class C
The size of the IPv4 is
(A) 16 Bits
(B) 32 Bits
(C) 64 Bits
(D) 128 Bits
Option b – 32 Bits
Which is the part of IP
(A) Netid
(B) Subnetid
(C) Hosted
(D) All of these
Option d – All of these
In a TCP header source & destination header contain-
(A) 8 Bits
(B) 16 Bits
(C) 32 Bits
(D) 128 Bits
Option c – 32 Bits
Which is the false statement-
(A) TCP enable dataflow for monitoring
(B) It avoids network saturation
(C) TCP makes communication between server & client.
(D) In the TCP/IP model Internet layer is closest to the user.
Option d – In the TCP/IP model Internet layer is closest to the user
Which is not the application level protocol-
(A) FTP
(B) S/MIME
(C) PGP
(d) HTTP
Option a – FTP
RDP server runs on
(A) Computers
(B) Switches
(C) Routers
(D) Servers
Option c – Routers
RDP client runs on
(A) Clients
(B) Routers
(C) Hosts
(D) Servers
Option c – Hosts
Which is the false statement
(A) Telnet is used for remote login
(B) FTP can transfer files between two hosts
(C) SMTP used to send mail message
(D) TFTP rely on TCP
Option d – TFTP rely on TCP
In any organization, company, or firm, the policies of information security come under ………
A. CIA Triad
B. Confidentiality
C. Authenticity
D. None of the above
Option a – CIA Triad
Why are factors like Confidentiality, Integrity, Availability & Authenticity considered as the fundamentals?
A. They help in understanding the hacking process
B. These are the main elements of any security breach
C. They help to understand security and its components in a better manner
D. All of the above
Option c – They help to understand security and its components in a better manner
In order to ensure the security of the data/information, we need to …….. the data
A. Encrypt
B. Decrypt
C. Delete the data
D. None of the above
Option a – Encrypt
Which of the following is usually considered as the default port number of Apache & several other web servers?
A. 40
B. 80
C. 87
D. None of the above
Option b – 80
DNS translates a Domain name into
A. Hex
B. Binary
C. IP
D. URL
Option c – IP
Which one of the following systems cannot be considered as an example of an operating system?
A. Windows 8
B. Red Hat Linux
C. BSD Linux
D. Microsoft Office
Option d – Microsoft Office
In the CIA Triad, which one of the following is not involved?
A. Availability
B. Confidentiality
C. Authenticity
D. Integrity
Option c – Authenticity
We covered all the 11th computer science public question paper pdf download file provided above in this post for free so that you can practice well for the exam.
Check out the latest MCQ content by visiting our mcqtube website homepage.
Also, check out:
- B.A 1st Year Computer Book PDF in Hindi
- STD 10 Computer MCQ Gujarati Medium
- Objective Questions of Computer Science