Class 10 Computer Chapter 5 Question Answer. We covered all the Class 10 Computer Chapter 5 Question Answer in this post for free so that you can practice well for the exam.
Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.
These types of competitive MCQs appear in exams like SSC, Railway, Bank, Delhi Police, UPSSSC, UPSC (Pre), State PCS, CDS, NDA, Assistant Commandant, and other Competitive Examinations, etc.
We created all the competitive exam MCQs into several small posts on our website for your convenience.
You will get their respective links in the related posts section provided below.
Related Posts:
- Basic Computer Questions and Answers PDF in Bengali
- MCQ Questions for Class 7 Computer with Answers
- Computer Skill Test Question Paper with Answer
Class 10 Computer Chapter 5 Question Answer for Students
Which runs on computer hardware & serves as a platform for other software to run on?
a. Operating System
b. Application Software
c. System Software
d. All
Option a – Operating System
……… is the program run on a computer when the computer boots up. ( Class 10 Computer Chapter MCQ )
a. System software
b. System operations
c. Operating system
d. None
Option c – Operating System
Which is the first program run on a computer when the computer boots up?
a. System software
b. System operations
c. Operating system
d. None
Option c – Operating System
The ………. contains commands associated with the My Computer window. ( Class 10 Computer Chapter MCQ )
a. Standard menu
b. Start menu
c. System menu
d. None of the above
Option c – System menu
…….. is the layer of a computer system between the hardware and the user program.
a. Operating environment
b. Operating system
c. System environment
d. None of these
Option b – Operating System
Which is the layer of a computer system between the hardware & the user program. ( Class 10 Computer Chapter MCQ )
a. Operating environment
b. Operating system
c. System environment
d. None
Option b – Operating System
When you start up the computer, the boot-up storage at which the BIOS version, manufacturer & data are displayed on the monitor is called.
a. Bootstrap
c. System configuration
d. Kernel loading
The operating system is the most common type of …….. Software.
b. Application
c. System
d. Word processing software
Option c – System
Which of the following is/are external commands? ( Class 10 Computer Chapter MCQ )
a. Edit
b. Label
c. Sys
d. All of the above
Option d – All of the above
Which is not an external command?
a. Edit
b. XCOPY
c. Sys
d. None of the above
Option d – None of the above
Which of the following is not essential to shut down your computer? ( Class 10 Computer Chapter MCQ )
a. Save all opened files
b. Close all running applications
c. Switch off monitor
d. Cut off the power supply
Option c – Switch off monitor
…….. runs on computer hardware & serves as a platform for other systems to run on?
a. Operating system
b. Application system
c. System software
d. All of the above
Option a – Operating system
Read the following statement carefully & find out whether it is correct about the hacking or not. ( Class 10 Computer Chapter MCQ )
A. It can be possible that in some cases, hacking a computer or network can be legal.
B. No, in any situation, hacking cannot be legal
C. It may be possible that in some cases, it can be referred to as a legal task
D. None of these
Option b – No, in any situation, hacking cannot be legal
A. Cyber law
B. Cyberethics
C. Cybersecurity
D. Cybersafety
Option b – Cyberethics
Which of the following refers to the violation of the principle if a computer is no longer accessible? ( Class 10 Computer Chapter MCQ )
A. Access control
B. Confidentiality
C. Availability
D. All of the above
Option c – Availability
Which one of the following refers to the technique used for verifying the integrity of the message?
A. Digital signature
B. Decryption algorithm
C. Protocol
D. Message Digest
Option d – Message Digest
Which one of the following is usually used in the process of Wi-Fi hacking? ( Class 10 Computer Chapter MCQ )
A. Aircrack-ng
B. Wireshark
C. Norton
D. All of the above
Option a – Aircrack-ng
Which of the following port & IP address scanners is famous among the users?
A. Cain and Abel
B. Angry IP Scanner
C. Snort
D. Ettercap
Option b – Angry IP Scanner
In ethical hacking & cybersecurity, there are …….. types of scanning: ( Class 10 Computer Chapter MCQ )
A. 1
B. 2
C. 3
D. 4
Option c – 3
………. is a type of software designed to help the user’s computer detect viruses & avoid them.
A. Malware
B. Antivirus
C. Adware
D. Both B and C
Option b – Antivirus
Which one of the following is a type of antivirus program?
A. Quick heal
B. Mcafee
C. Kaspersky
D. All of the above
Option d – All of the above
It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. It is known as the ……..
A. Antivirus
B. Firewall
C. Cookies
D. Malware
Option b – Firewall
Which of the following refers to stealing one’s idea or invention of others & using it for their own benefit?
A. Piracy
B. Plagiarism
C. Intellectual property rights
D. All of the above
Option d – All of the above
The output devices make it possible to
A. scan data
B. input data
C. store data
D. view or print data
Option d – view or print data
Which of the following is a valid IP address?
A. 192.900.168.1
B. 192.168.1.1
C. 192.168.900.1
D. 192.168.111.1111
Option b – 192.168.1.1
Who among the following is the odd one
A. Trojan horse
B. Virus
C. Spyware
D. Firmware
Option d – Firmware
A UPS ……..
A. limits damage caused by fluctuating levels of electricity
B. None of these
C. conducts a power-on self-test or POST
D. provides battery backup for a limited time
Option d – provides battery backup for a limited time
Which of the following is to be done by the auditor during the internet banking services audit?
A. All of the above
B. Tour the server room
C. Contract clearly states the services that will be provided by the vendor
D. The user is not allowed to log in after defined repeated failed attempts
Option b – Tour the server room
The taskbar is located
A. None of these
B. on the Quick Launch toolbar
C. on the Start menu
D. at the bottom of the screen
Option d – at the bottom of the screen
……… is the process whereby media files such as a video start playing as they are downloading.
A. pushing
B. pulling
C. flashing
D. streaming
Option d – streaming
Text in a column is generally aligned
A. None of these
B. justified
C. right
D. left
Option d – left
For electronic banking, we should ensure the existence & procedures with regard to
A. Identification of customers who become members electronically
B. All of the above
C. Steps for complying with the laws, rules & regulations
D. None of these
Option a – Identification of customers who become members electronically
Verification of login name & password is known as
A. Configuring
B. Logging
C. Certification
D. Authentication
Option d – Authentication
The ……… of a system includes the programs or instructions.
A. software
B. hardware
C. None of these
D. information
Option a – software
A. key.
B. None of these
C. table.
D. column.
Option a – key
To protect the computer system against hackers & different kinds of viruses, one must always keep ……. on in the computer system.
A. Antivirus
B. Firewall
C. Vlc player
D. Script
Option b – Firewall
Code Red is a type of
A. An Antivirus Program
B. A photo editing software
C. A computer virus
D. A video editing software
Option c – A computer virus
Which of the following can be considered as the elements of cyber security?
A. Application Security
B. Operational Security
C. Network Security
D. All of the above
Option d – All of the above
Which of the following are famous & common cyber-attacks used by hackers to infiltrate the user’s system?
A. DDos & Drive-by Downloads
B. Malware & Malvertising
C. Phishing & Password attacks
D. All of the above
Option d – All of the above
Which one of the following is also referred to as malicious software?
A. Maliciousware
B. Badware
C. Illegalware
D. Malware
Option d – Malware
Hackers usually use the computer virus for ……. the purpose.
A. To log, and monitor each & every user’s stroke
B. To gain access to sensitive information like user’s ID & Passwords
C. To corrupt the user’s data stored in the computer system
D. All of the above
Option d – All of the above
In Wi-Fi Security, which of the following protocols is more used?
A. WPA
B. WPA2
C. WPS
D. Both A & C
Option b – WPA2
Which of the following is not a type of scanning?
A. Xmas Tree Scan
B. Cloud scan
C. Null Scan
D. SYN Stealth
Option b – Cloud scan
In system hacking, which of the following is the most crucial activity?
A. Information gathering
B. Covering tracks
C. Cracking passwords
D. None of the above
Option c – Cracking passwords
Which of the following are the types of scanning?
A. Network, vulnerability & port scanning
B. Port, network, and services
C. Client, Server, and network
D. None of the above
Option a – Network, vulnerability & port scanning
Which one of the following is actually considered the first computer virus?
A. Sasser
B. Blaster
C. Creeper
D. Both A and C
Option c – Creeper
What is Dr. Watson?
a. IT Expert
b. Diagnosis tool
c. Surgeon
d. None
Option b – Diagnosis tool
The command allows you to create a logical drive
a. Sort
b. Path
c. Subst
d. Batch
Option c – Subst
The command is used to create a logical drive for a specific location on the disk
a. Fdisk
b. Format
c. Subst
d. All of the above
Option c – Subst
You can move a window to a different position on your screen by dragging it by its
a. Move handle
b. Tail
c. Status bar
d. Title bar
Option a – Move handle
A bar that informs you of the available options in your computer, opened applications, and background running applications & can be used to switch between applications quickly is
a. Menu bar
b. Toolbar
c. Status bar
d. Taskbar
Option d – Taskbar
Which components appear in the initial Windows start-up display?
a. Dialog box
b. Start menu
c. Taskbar
d. All of the above
Option c – Taskbar
Taskbar is used for
a. Navigation program
b. Switching between programs
c. Start a program
d. All of the above
Option d – All of the above
To install the new font
a. Start > setting -> control panel -> font
b. Start > setting -> control panel -> font -> install new font
c. Start -> control panel -> font -> install new font
d. Start > setting -> font
Option b – Start > setting -> control panel -> font -> install new font
When a peripheral device needs immediate attention from the operating system, it generates a(n)
a. Interrupt
b. Spool
c. Stack
d. Page file
Option a – Interrupt
Underlined text, such as text & folder names is referred to as
a. Hyperlink
b. Menu
c. Source drive
d. None of these
Option a – Hyperlink
Which of the following is suitable after you install new drivers?
a. Shut Down
b. Restart
c. Sleep
d. Hibernate
Option b – Restart
Windows displays various options for shutdown. Which is suitable at the end of the day?
a. Shut Down
b. Restart
c. Sleep
d. Hibernate
Option a – Shut Down
Personal computers are connected to one another to form a
A. Enterprise
B. Server
C. None of these
D. Network
Option d – Network
A computer program that converts assembly language to machine language is
A. Intersection
B. Complicate
C. Comparator
D. Assembler
Option d – Assembler
A. UPS
B. node
C. server
D. Router
Option d – Router
What do we call a network where elements may be separated by some distance? It usually involves two or more networks & dedicated high-speed telephone lines.
A. LAN
B. World Wide Web
C. WAN
D. URL
Option c – WAN
The most prevalent storage device for personal computers is
A. None of these
B. Laptop
C. USB personal computer
D. Floppy disc
Option d – Floppy disc
What type of device is a computer monitor?
A. Input
B. Output
C. Software
D. Processing
Option b – Output
The blinking symbol which indicates the next character will appear at which place, is called
A. None of these
B. Return key
C. Delete key
D. Cursor
Option d – Cursor
The keyboard shortcut for the CUT command is ………
A. Ctrl + W
B. Ctrl + Z
C. Ctrl + V
D. Ctrl + X
Option d – Ctrl + X
The Internet was originally a project for which government agency?
A. NSA
B. NASA
C. NSF
D. ARPA
Option d – ARPA
Why should you delete unknown e-mail attachments?
A. You could go to jail
B. It is bad manners
C. The person could track you down and hurt you
D. It might contain a virus that could hurt your computer
Option a – You could go to jail
The operating system is the most common type of ……. software.
A. System
B. Word processing
C. Antivirus
Option a – System
Which of the following refers to dangerous programs that can be caught by reopening email attachments & downloading software from the internet?
A. Spam
B. Virus
C. Utility
D. App
Option b – Virus
Which elements of a Word document can be displayed in color?
A. None of these
B. Only text
C. Only graphics
D. All elements
Option d – All elements
We covered all the class 10 computer chapter 5 question answer mcqs above in this post for free so that you can practice well for the exam.
Check out the latest MCQ content by visiting our mcqtube website homepage.
Also, check out:
- Computer Skill Test Question Paper
- BCA Computer Network Previous Year Question Papers
- Std 10 Computer Navneet PDF Gujarati Medium Download