Computer class 11 GSEB Solutions Chapter 1

Computer class 11 GSEB Solutions Chapter 1. We covered all the Computer Class 11 GSEB Solutions Chapter 1 MCQs in this post for free so that you can practice well for the exam.

Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.

These types of competitive MCQs appear in exams like SSC, Railway, Bank, Delhi Police, UPSSSC, UPSC (Pre), State PCS, CDS, NDA, Assistant Commandant, and other Competitive Examinations, etc.

We created all the competitive exam MCQs into several small posts on our website for your convenience.

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

You will get their respective links in the related posts section provided below.

Related Posts:

Questions hide

Computer class 11 GSEB Solutions Chapter 1 for Students

A process is a

a) single thread of execution.

b) program in the execution

c) program in the memory

d) task

Option b – program in the execution

The word-processing feature that catches most random typographical errors & misspellings is known as

a) Grammar checker

b) Spell checker

c) Word checker

d) None of the these

Option b – Spell checker

What is the smallest unit of the information?

a) A bit

b) A byte

c) A block

d) A nibble

Option a – A bit

What is the decimal equivalent of the binary number 10111?

a) 21

b) 39

c) 42

d) 23

Option d – 23

What is the term for a temporary storage area that compensates for differences in data flow between devices?

a) Buffer

b) Bus

c) Channel

d) Modem

Option a – Buffer

ISDN stands for

A. Integrated Services Digital Network

B. Integrated Services Data Network

C. Integrated Security Digital Network

D. Integrated Security Data Network

Option a – Integrated Services Digital Network

TCP stands for

A. Transmission Control Protocol

B. Transistor Control Protocol

C. Transform Control Protocol

D. Transmission Communicational Protocol

Option a – Transmission Control Protocol

VIRUS stands for

A. Very Important Record User Searched

B. Very Intelligent Result Until Searched

C. Vital Information Resource Under Siege

D. Viral Important Record User Searched

Option c – Vital Information Resource Under Siege

What is the full form of APL?

A. Array Programming Language

B. Array Programming Level

C. A Programming Language

D. A Procedural Language

Option c – A Programming Language

COBOL stands for

A. Common Business Oriented Language

B. Central Business Oriented Language

C. Common Binary Oriented Language

D. Central Binary Oriented Language

Option a – Common Business Oriented Language

1GL refers to

A. First Generation Logic

B. First Generation Logarithms

C. First Generation Light computer

D. First Generation Programming Language

Option d – First Generation Programming Language

……….. is a step-by-step procedure for calculations, data processing & automated reasoning.

A) None of these

B) Flow Chart

C) Program

D) Algorithm

Option d – Algorithm

MICR technology is mainly used by the banking industry. MICR denotes

A) Magnetic Ink Character Recognition

B) Magnetic Ink Computer Reading

C) Management Ink Check Reading

D) Magnetic Ink Code Recognition

Option a – Magnetic Ink Character Recognition

If the ………. bit in X.25 standard is set to 1, it means that there is more than one packet.

A) D

B) Q

C) None of these

D) M

Option d – M

……….. is a process of dividing the disk into tracks & sectors.

A) Tracking

B) Crashing

C) Alloting

D) Formatting

Option d – Formatting

An error is also known as

A) Cursor

B) Debug

C) None of these

D) Bug

Option d – Bug

Which of the following is used to access a file from the computer store?

A) retrieve

B) find

C) file

D) insert

Option b – find

When a file is saved for the first time …….

A) it must be given a name to identify it

B) file name & folder name must be the same

C) it only needs a name if it is not going to be printed

D) a copy is automatically printed

Option a – it must be given a name to identify it

Which one of the following would not be considered as a form of secondary storage?

A) hard disk

B) Floppy disk

C) optical disk

D) RAM

Option d – RAM

OSI reference model has …….. layers.

A) 7

B) 4

C) 5

D) 8

Option a – 7

In a database, ………. fields store numbers used to perform calculations.

A) numeric

B) None of these

C) key

D) alphanumeric

Option a – numeric

What is the function of a Recycle Bin?

A) Stores Document file

B) Stores temporary file

C) Stores deleted file

D) None of these

Option c – Stores deleted file

To avoid the wastage of memory, the instruction length should be

A) Of word size which is multiple of character size

B) Of file size only

C) Of word size only

D) None of these

Option a – Of word size which is multiple of character size

What do we call the pictorial representation that uses predefined symbols to describe either the logic of a computer program or the data flow & processing steps of a system?

A) Algorithm

B) Flowchart

C) Block diagram

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

D) Loop

Option b – Flowchart

The peak cell rate (PCR), sustainable cell rate (SCR), & maximum burst size (MBS) are used for the measurement of?

A) Bandwidth

B) Channel Capacity

C) Frequency Modulation

D) Amplitude distortion

Option a – Bandwidth

What do we call a CPU that is designed specifically to handle the communications processing task with the main purpose is to off-loading the communications processing task from the host computer so that the host computer can be dedicated to applications & data processing jobs?

A) Backend processor

B) Front-end processor

C) Node processor

D) File Server

Option b – Front-end processor

Which among the following is the time period during which a computer is malfunctioning or not operating correctly due to machine failures?

A) Downtime

B) Uptime

C) Response time

D) Runtime

Option a – Downtime

What would be the number of bytes transferred at the rate of 1 Kilobit per second?

A) 100

B) 108

C) 125

D) 140

Option c – 125

What do we call the automatic execution of high-priority computer programs that have been designed to pre-empt the use of computer resources?

A) Foreground processing

B) Background processing

C) Black processing

D) White processing

Option a – Foreground processing

What is the use of Digitizer as an input device?

A) To convert graphic & pictorial data into binary inputs

B) To convert graphic & pictorial data into analog inputs

C) Debugging

D) None of the above

Option a – To convert graphic & pictorial data into binary inputs

What do we call a storage device where the access time is effectively independent of the location of the data?

A) Direct Access Storage Device

B) Secondary Storage Device

C) Primary Storage Device

D) Gateway Device

Option a – Direct Access Storage Device

When you purchase a product over a Mobile Phone, the transaction is called

A) Web Commerce

B) m-Commerce

C) Mobile Purchases

D) e-Commerce

Option b – m-Commerce

Which of the following is not an output device?

A) Plotter

B) Mouse

C) Laser Printer

D) Monitor

Option b – Mouse

Which of the following is not an object-oriented language?

A) Java

B) C++

C) PASCAL

D) Visual Basic

Option c – PASCAL

A system component called ………. is a multipurpose, programmable device that accepts digital data as input, processes it according to instructions stored in its memory & provides results as output.

A) ROM

B) Cache

C) Floppy disk

D) Microprocessor

Option d – Microprocessor

………. is the process of carrying out commands.

A) Fetching

B) Storing

C) Executing

D) Decoding

Option c – Executing

Compilers are the software

A) used for translation

B) used as interpreters

C) designed for customers

D) used for translation of the system

Option d – used for translation of the system

A file that contains readymade layouts, theme effects, background styles & even contents for presentation is called

A) Wizard

B) Auto style

C) Pre styling

D) Template

Option d – Template

Which of the following is not an example of hardware?

A) Monitor

B) Mouse

C) EXCEL

D) None of these

Option c – EXCEL

A directory within a directory is called

A) Junior Directory

B) Sub-Directory

C) None of these

D) Part Directory

Option b – Sub-Directory

What is output?

A) What the processor takes from the user

B) None of these

C) What the user gives to the processor

D) What the processor gives to the user

Option d – What the processor gives to the user

The process of transferring files from a computer on the Internet to your computer is called

A) downsizing

B) FTP

C) downloading

D) uploading

Option c – downloading

……… is the process of finding errors in software code.

A) Testing

B) Interpreting

C) Compiling

D) Debugging

Option d – Debugging

By CD you can

A) Write

B) Either Read or Write

C) None of these

D) Read and Write

Option d – Read and Write

Which process checks to ensure the components of the computer are operating & connected properly?

A) None of these

B) Booting

C) Processing

D) Saving

Option b – Booting

Which of the following are all considered advantages of e-mail?

A) Global, convenient & Microsoft owned

B) Printable, global & expensive

C) None of these

D) Convenience, speed of delivery, generality & reliability

Option d – Convenience, speed of delivery, generality & reliability

Which of the following are valid Min. & Max. Zoom sizes in MS Office?

A) 10, 100

B) None of these

C) 20, 250

D) 10, 500

Option d – 10, 500

A permanent virtual circuit involves-

A) Connection establishment

B) Connection release

C) Data transfer

D) None of these

Option c – Data transfer

Which of the following refers to containers used to store related documents located on the computer?

A) Programs

B) Labels

C) Indexes

D) Folders

Option d – Folders

What type of network connection is not a way of connecting to the Internet?

A) ISDN

B) None of these

C) TCP/IP

D) T1

Option c – TCP/IP

……… are small programs stored on the hard drive that tell the computer how to communicate with a specific hardware device such as a printer, network card, or modem.

A) Device drivers

B) Hardware movers

C) Abstraction layer

D) Input routines

Option a – Device drivers

The brain of a computer is-

A) Megabyte

B) Floppy Disk

C) COBOL

D) CPU

Option d – CPU

Digital Banking can be resorted through:

A) Mobile phones

B) Internet

C) Telephones

D) All of the above

Option d – All of the above

To indent the first paragraph of your report, you should use this key

A) Space bar

B) Tab key

C) Shift key

D) Return key

Option b – Tab key

A repair for a known software bug, usually available at no charge on the Internet, is called a(n)

A) Version

B) Patch

C) Tutorial

D) FAQ

Option b – Patch

Information travels between components on the motherboard through-

A) Peripherals

B) Flash memory

C) Buses

D) CMOS

Option c – Buses

Which of the following operating systems is not owned and licensed by a company?

A) Unix

B) Mac

C) Windows

D) Windows 2000

Option a – Unix

The word wrap feature

A. Automatically move the text to the next line when necessary

B. Appears at the bottom of the document

C. Allows you to type over text

D. Is the short horizontal line

Option a – Automatically move the text to the next line when necessary

How can you make the selected character superscripted?

A. Ctrl + =

B. Ctrl + Shift + =

C. Alt + Ctrl + Shift +=

D. None of the above

Option b – Ctrl + Shift + =

When typing in a word field manually, what must you press to insert the code’s braces?

A. Ctrl + F6

B. Ctrl + F9

C. Alt + F11

D. Shift + F12

Option c – Ctrl + F9

What is the shortcut key to open the Open dialog box?

A. F12

B. Shift + F12

C. Alt + F12

D. Ctrl + F12

Option d – Ctrl + F12

What is the shortcut key to split a table?

A. Ctrl + Alt + Enter

B. Ctrl + Shift + Enter

C. Alt + Shift + Enter

D. Alt + Space + Enter

Option b – Ctrl + Shift + Enter

Which key is used to increase the left indent?

A. Ctrl + I

B. Ctrl + M

C. Alt + I

D. F10

Option b – Ctrl + M

When the same word is used in multiple locations or a word is used that is not quite appropriate, a thesaurus can be used to look up a(n) ………. or a word similar in meaning.

A. Synonym

B. Homonym

C. Antonym

D. Metronym

Option a – Synonym

How many different documents can you open at one time?

A. No more than three

B. Only one

C. As many as your computer memory will hold

D. As many as your taskbar can display

Option c – As many as your computer memory will hold

Which of the following is the second step in creating a macro?

A. Start recording

B. Using your mouse or keyboard, perform the task you want to automate

C. Assign a keyboard shortcut to the macro

D. Give the macro a name

Option c – Assign a keyboard shortcut to the macro

When assigning a shortcut key to a symbol, you should always try to select a key or key combination that is:

A. Unassigned

B. Located on the ten-key pad section of your keyboard

C. Assigned to another task

D. From the same font family as the symbol

Option a – Unassigned

One security method is encryption. But encryption does nothing to keep digital pests & hackers out. To accomplish this goal, we need

A) Firewalls

B) Anti Virus

C) Router

D) Bridges

Option a – Firewalls

Files are organized after storing in

A) None of these

B) Indices

C) Lists

D) Folders

Option d – Folders

Softcopy is the intangible output, so then what is hardcopy?

A) The physical parts of the computer

B) The physical output devices

C) The printed output

D) None of these

Option c – The printed output

The ability of an OS to run more than one application at a time is called

A) Multi-user computing

B) Object-oriented programming

C) None of these

D) Multitasking

Option d – Multitasking

Which among the following is not a web browser?

A) Opera

B) Netscape

C) Mozilla

D) Google

Option d – Google

Which is not an operating system?

A) MS-DOS

B) Windows 98

C) All of the above

D) Windows 95

Option c – All of the above

Video processors consist of …….. & …….. which store & process images.

A) VGA & Memory

B) CPU & memory

C) CPU & VGA

D) VGA & VGI

Option a – VGA & Memory

An EULA in computing stands for:

A) Everyday-User Learning Assistance

B) Employee Use Legal Arrangement

C) End-User License Agreement

D) End-Use License Arrangement

Option c – End-User License Agreement

Which of the following could be digital input devices for computers?

A) Microphone

B) Scanner

C) Digital camcorder

D) All of the above

Option d – All of the above

…….. are a type of inexpensive digital camera that remains tethered to a computer & used for video conferencing, video chatting & live Web broadcasts.

A) Browserpics

B) Webpics

C) Webcams

D) None of these

Option c – Webcams

When CD players were introduced & iPods came into the market, the demand for Walkman went down. This is an example of:

A) Declining Demand

B) Negative Demand

C) Latent Demand

D) Irregular Demand

Option a – Declining Demand

In DOS, the primary name of a file can have a maximum of ……… characters.

A) 10

B) 20

C) None of these

D) 30

Option a – 10

We covered all the Computer class 11 GSEB Solutions chapter 1 above in this post for free so that you can practice well for the exam.

Check out the latest MCQ content by visiting our mcqtube website homepage.

Also, check out:

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

Hello, I am the admin of mcqtube.com website. I am a blogger and app developer. Thanks.

Leave a Comment

Sticky Bottom Popup