Computer class 11 GSEB Solutions Chapter 1. We covered all the Computer Class 11 GSEB Solutions Chapter 1 MCQs in this post for free so that you can practice well for the exam.
Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.
These types of competitive MCQs appear in exams like SSC, Railway, Bank, Delhi Police, UPSSSC, UPSC (Pre), State PCS, CDS, NDA, Assistant Commandant, and other Competitive Examinations, etc.
We created all the competitive exam MCQs into several small posts on our website for your convenience.
You will get their respective links in the related posts section provided below.
Related Posts:
- 11th Computer Science Public Question Paper English Medium
- Computer Fundamental Question PDF
- Computer Network Question Paper for BCA
Computer class 11 GSEB Solutions Chapter 1 for Students
A process is a
a) single thread of execution.
b) program in the execution
c) program in the memory
d) task
Option b – program in the execution
The word-processing feature that catches most random typographical errors & misspellings is known as
a) Grammar checker
b) Spell checker
c) Word checker
d) None of the these
Option b – Spell checker
What is the smallest unit of the information?
a) A bit
b) A byte
c) A block
d) A nibble
Option a – A bit
What is the decimal equivalent of the binary number 10111?
a) 21
b) 39
c) 42
d) 23
Option d – 23
What is the term for a temporary storage area that compensates for differences in data flow between devices?
a) Buffer
b) Bus
c) Channel
d) Modem
Option a – Buffer
ISDN stands for
A. Integrated Services Digital Network
B. Integrated Services Data Network
C. Integrated Security Digital Network
D. Integrated Security Data Network
Option a – Integrated Services Digital Network
TCP stands for
A. Transmission Control Protocol
B. Transistor Control Protocol
C. Transform Control Protocol
D. Transmission Communicational Protocol
Option a – Transmission Control Protocol
VIRUS stands for
A. Very Important Record User Searched
B. Very Intelligent Result Until Searched
C. Vital Information Resource Under Siege
D. Viral Important Record User Searched
Option c – Vital Information Resource Under Siege
What is the full form of APL?
A. Array Programming Language
B. Array Programming Level
C. A Programming Language
D. A Procedural Language
Option c – A Programming Language
COBOL stands for
A. Common Business Oriented Language
B. Central Business Oriented Language
C. Common Binary Oriented Language
D. Central Binary Oriented Language
Option a – Common Business Oriented Language
1GL refers to
A. First Generation Logic
B. First Generation Logarithms
C. First Generation Light computer
D. First Generation Programming Language
Option d – First Generation Programming Language
……….. is a step-by-step procedure for calculations, data processing & automated reasoning.
A) None of these
B) Flow Chart
C) Program
D) Algorithm
Option d – Algorithm
MICR technology is mainly used by the banking industry. MICR denotes
A) Magnetic Ink Character Recognition
B) Magnetic Ink Computer Reading
C) Management Ink Check Reading
D) Magnetic Ink Code Recognition
Option a – Magnetic Ink Character Recognition
If the ………. bit in X.25 standard is set to 1, it means that there is more than one packet.
A) D
B) Q
C) None of these
D) M
Option d – M
……….. is a process of dividing the disk into tracks & sectors.
A) Tracking
B) Crashing
C) Alloting
D) Formatting
Option d – Formatting
An error is also known as
A) Cursor
B) Debug
C) None of these
D) Bug
Option d – Bug
Which of the following is used to access a file from the computer store?
A) retrieve
B) find
C) file
D) insert
Option b – find
When a file is saved for the first time …….
A) it must be given a name to identify it
B) file name & folder name must be the same
C) it only needs a name if it is not going to be printed
D) a copy is automatically printed
Option a – it must be given a name to identify it
Which one of the following would not be considered as a form of secondary storage?
A) hard disk
B) Floppy disk
C) optical disk
D) RAM
Option d – RAM
OSI reference model has …….. layers.
A) 7
B) 4
C) 5
D) 8
Option a – 7
In a database, ………. fields store numbers used to perform calculations.
A) numeric
B) None of these
C) key
D) alphanumeric
Option a – numeric
What is the function of a Recycle Bin?
A) Stores Document file
B) Stores temporary file
C) Stores deleted file
D) None of these
Option c – Stores deleted file
To avoid the wastage of memory, the instruction length should be
A) Of word size which is multiple of character size
B) Of file size only
C) Of word size only
D) None of these
Option a – Of word size which is multiple of character size
What do we call the pictorial representation that uses predefined symbols to describe either the logic of a computer program or the data flow & processing steps of a system?
A) Algorithm
B) Flowchart
C) Block diagram
D) Loop
Option b – Flowchart
The peak cell rate (PCR), sustainable cell rate (SCR), & maximum burst size (MBS) are used for the measurement of?
A) Bandwidth
B) Channel Capacity
C) Frequency Modulation
D) Amplitude distortion
Option a – Bandwidth
What do we call a CPU that is designed specifically to handle the communications processing task with the main purpose is to off-loading the communications processing task from the host computer so that the host computer can be dedicated to applications & data processing jobs?
A) Backend processor
B) Front-end processor
C) Node processor
D) File Server
Option b – Front-end processor
Which among the following is the time period during which a computer is malfunctioning or not operating correctly due to machine failures?
A) Downtime
B) Uptime
C) Response time
D) Runtime
Option a – Downtime
What would be the number of bytes transferred at the rate of 1 Kilobit per second?
A) 100
B) 108
C) 125
D) 140
Option c – 125
What do we call the automatic execution of high-priority computer programs that have been designed to pre-empt the use of computer resources?
A) Foreground processing
B) Background processing
C) Black processing
D) White processing
Option a – Foreground processing
What is the use of Digitizer as an input device?
A) To convert graphic & pictorial data into binary inputs
B) To convert graphic & pictorial data into analog inputs
C) Debugging
D) None of the above
Option a – To convert graphic & pictorial data into binary inputs
What do we call a storage device where the access time is effectively independent of the location of the data?
A) Direct Access Storage Device
B) Secondary Storage Device
C) Primary Storage Device
D) Gateway Device
Option a – Direct Access Storage Device
When you purchase a product over a Mobile Phone, the transaction is called
A) Web Commerce
B) m-Commerce
C) Mobile Purchases
D) e-Commerce
Option b – m-Commerce
Which of the following is not an output device?
A) Plotter
B) Mouse
C) Laser Printer
D) Monitor
Option b – Mouse
Which of the following is not an object-oriented language?
A) Java
B) C++
C) PASCAL
D) Visual Basic
Option c – PASCAL
A system component called ………. is a multipurpose, programmable device that accepts digital data as input, processes it according to instructions stored in its memory & provides results as output.
A) ROM
B) Cache
C) Floppy disk
D) Microprocessor
Option d – Microprocessor
………. is the process of carrying out commands.
A) Fetching
B) Storing
C) Executing
D) Decoding
Option c – Executing
Compilers are the software
A) used for translation
B) used as interpreters
C) designed for customers
D) used for translation of the system
Option d – used for translation of the system
A file that contains readymade layouts, theme effects, background styles & even contents for presentation is called
A) Wizard
B) Auto style
C) Pre styling
D) Template
Option d – Template
Which of the following is not an example of hardware?
A) Monitor
B) Mouse
C) EXCEL
D) None of these
Option c – EXCEL
A directory within a directory is called
A) Junior Directory
B) Sub-Directory
C) None of these
D) Part Directory
Option b – Sub-Directory
What is output?
A) What the processor takes from the user
B) None of these
C) What the user gives to the processor
D) What the processor gives to the user
Option d – What the processor gives to the user
The process of transferring files from a computer on the Internet to your computer is called
A) downsizing
B) FTP
C) downloading
D) uploading
Option c – downloading
……… is the process of finding errors in software code.
A) Testing
B) Interpreting
C) Compiling
D) Debugging
Option d – Debugging
By CD you can
A) Write
B) Either Read or Write
C) None of these
D) Read and Write
Option d – Read and Write
Which process checks to ensure the components of the computer are operating & connected properly?
A) None of these
B) Booting
C) Processing
D) Saving
Option b – Booting
Which of the following are all considered advantages of e-mail?
A) Global, convenient & Microsoft owned
B) Printable, global & expensive
C) None of these
D) Convenience, speed of delivery, generality & reliability
Option d – Convenience, speed of delivery, generality & reliability
Which of the following are valid Min. & Max. Zoom sizes in MS Office?
A) 10, 100
B) None of these
C) 20, 250
D) 10, 500
Option d – 10, 500
A permanent virtual circuit involves-
A) Connection establishment
B) Connection release
C) Data transfer
D) None of these
Option c – Data transfer
A) Programs
B) Labels
C) Indexes
D) Folders
Option d – Folders
What type of network connection is not a way of connecting to the Internet?
A) ISDN
B) None of these
C) TCP/IP
D) T1
Option c – TCP/IP
……… are small programs stored on the hard drive that tell the computer how to communicate with a specific hardware device such as a printer, network card, or modem.
A) Device drivers
B) Hardware movers
C) Abstraction layer
D) Input routines
Option a – Device drivers
The brain of a computer is-
A) Megabyte
B) Floppy Disk
C) COBOL
D) CPU
Option d – CPU
Digital Banking can be resorted through:
A) Mobile phones
B) Internet
C) Telephones
D) All of the above
Option d – All of the above
To indent the first paragraph of your report, you should use this key
A) Space bar
B) Tab key
C) Shift key
D) Return key
Option b – Tab key
A repair for a known software bug, usually available at no charge on the Internet, is called a(n)
A) Version
B) Patch
C) Tutorial
D) FAQ
Option b – Patch
Information travels between components on the motherboard through-
A) Peripherals
B) Flash memory
C) Buses
D) CMOS
Option c – Buses
Which of the following operating systems is not owned and licensed by a company?
A) Unix
B) Mac
C) Windows
D) Windows 2000
Option a – Unix
The word wrap feature
A. Automatically move the text to the next line when necessary
B. Appears at the bottom of the document
C. Allows you to type over text
D. Is the short horizontal line
Option a – Automatically move the text to the next line when necessary
How can you make the selected character superscripted?
A. Ctrl + =
B. Ctrl + Shift + =
C. Alt + Ctrl + Shift +=
D. None of the above
Option b – Ctrl + Shift + =
When typing in a word field manually, what must you press to insert the code’s braces?
A. Ctrl + F6
B. Ctrl + F9
C. Alt + F11
D. Shift + F12
Option c – Ctrl + F9
What is the shortcut key to open the Open dialog box?
A. F12
B. Shift + F12
C. Alt + F12
D. Ctrl + F12
Option d – Ctrl + F12
What is the shortcut key to split a table?
A. Ctrl + Alt + Enter
B. Ctrl + Shift + Enter
C. Alt + Shift + Enter
D. Alt + Space + Enter
Option b – Ctrl + Shift + Enter
Which key is used to increase the left indent?
A. Ctrl + I
B. Ctrl + M
C. Alt + I
D. F10
Option b – Ctrl + M
When the same word is used in multiple locations or a word is used that is not quite appropriate, a thesaurus can be used to look up a(n) ………. or a word similar in meaning.
A. Synonym
B. Homonym
C. Antonym
D. Metronym
Option a – Synonym
How many different documents can you open at one time?
A. No more than three
B. Only one
C. As many as your computer memory will hold
D. As many as your taskbar can display
Option c – As many as your computer memory will hold
Which of the following is the second step in creating a macro?
A. Start recording
B. Using your mouse or keyboard, perform the task you want to automate
C. Assign a keyboard shortcut to the macro
D. Give the macro a name
Option c – Assign a keyboard shortcut to the macro
When assigning a shortcut key to a symbol, you should always try to select a key or key combination that is:
A. Unassigned
B. Located on the ten-key pad section of your keyboard
C. Assigned to another task
D. From the same font family as the symbol
Option a – Unassigned
One security method is encryption. But encryption does nothing to keep digital pests & hackers out. To accomplish this goal, we need
A) Firewalls
B) Anti Virus
C) Router
D) Bridges
Option a – Firewalls
Files are organized after storing in
A) None of these
B) Indices
C) Lists
D) Folders
Option d – Folders
Softcopy is the intangible output, so then what is hardcopy?
A) The physical parts of the computer
B) The physical output devices
C) The printed output
D) None of these
Option c – The printed output
The ability of an OS to run more than one application at a time is called
A) Multi-user computing
B) Object-oriented programming
C) None of these
D) Multitasking
Option d – Multitasking
Which among the following is not a web browser?
A) Opera
B) Netscape
C) Mozilla
D) Google
Option d – Google
Which is not an operating system?
A) MS-DOS
B) Windows 98
C) All of the above
D) Windows 95
Option c – All of the above
Video processors consist of …….. & …….. which store & process images.
A) VGA & Memory
B) CPU & memory
C) CPU & VGA
D) VGA & VGI
Option a – VGA & Memory
An EULA in computing stands for:
A) Everyday-User Learning Assistance
B) Employee Use Legal Arrangement
C) End-User License Agreement
D) End-Use License Arrangement
Option c – End-User License Agreement
Which of the following could be digital input devices for computers?
A) Microphone
B) Scanner
C) Digital camcorder
D) All of the above
Option d – All of the above
…….. are a type of inexpensive digital camera that remains tethered to a computer & used for video conferencing, video chatting & live Web broadcasts.
A) Browserpics
B) Webpics
C) Webcams
D) None of these
Option c – Webcams
When CD players were introduced & iPods came into the market, the demand for Walkman went down. This is an example of:
A) Declining Demand
B) Negative Demand
C) Latent Demand
D) Irregular Demand
Option a – Declining Demand
In DOS, the primary name of a file can have a maximum of ……… characters.
A) 10
B) 20
C) None of these
D) 30
Option a – 10
We covered all the Computer class 11 GSEB Solutions chapter 1 above in this post for free so that you can practice well for the exam.
Check out the latest MCQ content by visiting our mcqtube website homepage.
Also, check out:
- Basic Computer Knowledge Interview Questions Answers
- Class 9 Computer Chapter 2 Question Answers
- Basic Computer Questions PDF Free Download