Class 10 Computer Chapter 5 Question Answer

Rate this post

Class 10 Computer Chapter 5 Question Answer. We covered all the Class 10 Computer Chapter 5 Question Answer in this post for free so that you can practice well for the exam.

Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.

These types of competitive MCQs appear in exams like SSC, Railway, Bank, Delhi Police, UPSSSC, UPSC (Pre), State PCS, CDS, NDA, Assistant Commandant, and other Competitive Examinations, etc.

We created all the competitive exam MCQs into several small posts on our website for your convenience.

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

You will get their respective links in the related posts section provided below.

Related Posts:

Questions hide

Class 10 Computer Chapter 5 Question Answer for Students

Which runs on computer hardware & serves as a platform for other software to run on?

a. Operating System

b. Application Software

c. System Software

d. All

Option a – Operating System

……… is the program run on a computer when the computer boots up. ( Class 10 Computer Chapter MCQ )

a. System software

b. System operations

c. Operating system

d. None

Option c – Operating System

Which is the first program run on a computer when the computer boots up?

a. System software

b. System operations

c. Operating system

d. None

Option c – Operating System

The ………. contains commands associated with the My Computer window. ( Class 10 Computer Chapter MCQ )

a. Standard menu

b. Start menu

c. System menu

d. None of the above

Option c – System menu

…….. is the layer of a computer system between the hardware and the user program.

a. Operating environment

b. Operating system

c. System environment

d. None of these

Option b – Operating System

Which is the layer of a computer system between the hardware & the user program. ( Class 10 Computer Chapter MCQ )

a. Operating environment

b. Operating system

c. System environment

d. None

Option b – Operating System

When you start up the computer, the boot-up storage at which the BIOS version, manufacturer & data are displayed on the monitor is called.

a. Bootstrap

b. Power-on self-test (POST)

c. System configuration

d. Kernel loading

Option b – Power-on self-test (POST)

The operating system is the most common type of …….. Software.

a. Communication

b. Application

c. System

d. Word processing software

Option c – System

Which of the following is/are external commands? ( Class 10 Computer Chapter MCQ )

a. Edit

b. Label

c. Sys

d. All of the above

Option d – All of the above

Which is not an external command?

a. Edit

b. XCOPY

c. Sys

d. None of the above

Option d – None of the above

Which of the following is not essential to shut down your computer? ( Class 10 Computer Chapter MCQ )

a. Save all opened files

b. Close all running applications

c. Switch off monitor

d. Cut off the power supply

Option c – Switch off monitor

…….. runs on computer hardware & serves as a platform for other systems to run on?

a. Operating system

b. Application system

c. System software

d. All of the above

Option a – Operating system

Read the following statement carefully & find out whether it is correct about the hacking or not. ( Class 10 Computer Chapter MCQ )

A. It can be possible that in some cases, hacking a computer or network can be legal.

B. No, in any situation, hacking cannot be legal

C. It may be possible that in some cases, it can be referred to as a legal task

D. None of these

Option b – No, in any situation, hacking cannot be legal

Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment & digital media platform?

A. Cyber law

B. Cyberethics

C. Cybersecurity

D. Cybersafety

Option b – Cyberethics

Which of the following refers to the violation of the principle if a computer is no longer accessible? ( Class 10 Computer Chapter MCQ )

A. Access control

B. Confidentiality

C. Availability

D. All of the above

Option c – Availability

Which one of the following refers to the technique used for verifying the integrity of the message?

A. Digital signature

B. Decryption algorithm

C. Protocol

D. Message Digest

Option d – Message Digest

Which one of the following is usually used in the process of Wi-Fi hacking? ( Class 10 Computer Chapter MCQ )

A. Aircrack-ng

B. Wireshark

C. Norton

D. All of the above

Option a – Aircrack-ng

Which of the following port & IP address scanners is famous among the users?

A. Cain and Abel

B. Angry IP Scanner

C. Snort

D. Ettercap

Option b – Angry IP Scanner

In ethical hacking & cybersecurity, there are …….. types of scanning: ( Class 10 Computer Chapter MCQ )

A. 1

B. 2

C. 3

D. 4

Option c – 3

………. is a type of software designed to help the user’s computer detect viruses & avoid them.

A. Malware

B. Antivirus

C. Adware

D. Both B and C

Option b – Antivirus

Which one of the following is a type of antivirus program?

A. Quick heal

B. Mcafee

C. Kaspersky

D. All of the above

Option d – All of the above

It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. It is known as the ……..

A. Antivirus

B. Firewall

C. Cookies

D. Malware

Option b – Firewall

Which of the following refers to stealing one’s idea or invention of others & using it for their own benefit?

A. Piracy

B. Plagiarism

C. Intellectual property rights

D. All of the above

Option d – All of the above

The output devices make it possible to

A. scan data

B. input data

C. store data

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

D. view or print data

Option d – view or print data

Which of the following is a valid IP address?

A. 192.900.168.1

B. 192.168.1.1

C. 192.168.900.1

D. 192.168.111.1111

Option b – 192.168.1.1

Who among the following is the odd one

A. Trojan horse

B. Virus

C. Spyware

D. Firmware

Option d – Firmware

A UPS ……..

A. limits damage caused by fluctuating levels of electricity

B. None of these

C. conducts a power-on self-test or POST

D. provides battery backup for a limited time

Option d – provides battery backup for a limited time

Which of the following is to be done by the auditor during the internet banking services audit?

A. All of the above

B. Tour the server room

C. Contract clearly states the services that will be provided by the vendor

D. The user is not allowed to log in after defined repeated failed attempts

Option b – Tour the server room

The taskbar is located

A. None of these

B. on the Quick Launch toolbar

C. on the Start menu

D. at the bottom of the screen

Option d – at the bottom of the screen

……… is the process whereby media files such as a video start playing as they are downloading.

A. pushing

B. pulling

C. flashing

D. streaming

Option d – streaming

Text in a column is generally aligned

A. None of these

B. justified

C. right

D. left

Option d – left

For electronic banking, we should ensure the existence & procedures with regard to

A. Identification of customers who become members electronically

B. All of the above

C. Steps for complying with the laws, rules & regulations

D. None of these

Option a – Identification of customers who become members electronically

Verification of login name & password is known as

A. Configuring

B. Logging

C. Certification

D. Authentication

Option d – Authentication

The ……… of a system includes the programs or instructions.

A. software

B. hardware

C. None of these

D. information

Option a – software

A group of related records in a database is called a(n)

A. key.

B. None of these

C. table.

D. column.

Option a – key

To protect the computer system against hackers & different kinds of viruses, one must always keep ……. on in the computer system.

A. Antivirus

B. Firewall

C. Vlc player

D. Script

Option b – Firewall

Code Red is a type of

A. An Antivirus Program

B. A photo editing software

C. A computer virus

D. A video editing software

Option c – A computer virus

Which of the following can be considered as the elements of cyber security?

A. Application Security

B. Operational Security

C. Network Security

D. All of the above

Option d – All of the above

Which of the following are famous & common cyber-attacks used by hackers to infiltrate the user’s system?

A. DDos & Drive-by Downloads

B. Malware & Malvertising

C. Phishing & Password attacks

D. All of the above

Option d – All of the above

Which one of the following is also referred to as malicious software?

A. Maliciousware

B. Badware

C. Illegalware

D. Malware

Option d – Malware

Hackers usually use the computer virus for ……. the purpose.

A. To log, and monitor each & every user’s stroke

B. To gain access to sensitive information like user’s ID & Passwords

C. To corrupt the user’s data stored in the computer system

D. All of the above

Option d – All of the above

In Wi-Fi Security, which of the following protocols is more used?

A. WPA

B. WPA2

C. WPS

D. Both A & C

Option b – WPA2

Which of the following is not a type of scanning?

A. Xmas Tree Scan

B. Cloud scan

C. Null Scan

D. SYN Stealth

Option b – Cloud scan

In system hacking, which of the following is the most crucial activity?

A. Information gathering

B. Covering tracks

C. Cracking passwords

D. None of the above

Option c – Cracking passwords

Which of the following are the types of scanning?

A. Network, vulnerability & port scanning

B. Port, network, and services

C. Client, Server, and network

D. None of the above

Option a – Network, vulnerability & port scanning

Which one of the following is actually considered the first computer virus?

A. Sasser

B. Blaster

C. Creeper

D. Both A and C

Option c – Creeper

What is Dr. Watson?

a. IT Expert

b. Diagnosis tool

c. Surgeon

d. None

Option b – Diagnosis tool

The command allows you to create a logical drive

a. Sort

b. Path

c. Subst

d. Batch

Option c – Subst

The command is used to create a logical drive for a specific location on the disk

a. Fdisk

b. Format

c. Subst

d. All of the above

Option c – Subst

You can move a window to a different position on your screen by dragging it by its

a. Move handle

b. Tail

c. Status bar

d. Title bar

Option a – Move handle

A bar that informs you of the available options in your computer, opened applications, and background running applications & can be used to switch between applications quickly is

a. Menu bar

b. Toolbar

c. Status bar

d. Taskbar

Option d – Taskbar

Which components appear in the initial Windows start-up display?

a. Dialog box

b. Start menu

c. Taskbar

d. All of the above

Option c – Taskbar

Taskbar is used for

a. Navigation program

b. Switching between programs

c. Start a program

d. All of the above

Option d – All of the above

To install the new font

a. Start > setting -> control panel -> font

b. Start > setting -> control panel -> font -> install new font

c. Start -> control panel -> font -> install new font

d. Start > setting -> font

Option b – Start > setting -> control panel -> font -> install new font

When a peripheral device needs immediate attention from the operating system, it generates a(n)

a. Interrupt

b. Spool

c. Stack

d. Page file

Option a – Interrupt

Underlined text, such as text & folder names is referred to as

a. Hyperlink

b. Menu

c. Source drive

d. None of these

Option a – Hyperlink

Which of the following is suitable after you install new drivers?

a. Shut Down

b. Restart

c. Sleep

d. Hibernate

Option b – Restart

Windows displays various options for shutdown. Which is suitable at the end of the day?

a. Shut Down

b. Restart

c. Sleep

d. Hibernate

Option a – Shut Down

Personal computers are connected to one another to form a

A. Enterprise

B. Server

C. None of these

D. Network

Option d – Network

A computer program that converts assembly language to machine language is

A. Intersection

B. Complicate

C. Comparator

D. Assembler

Option d – Assembler

It is necessary to install a(n) ……….. on a network if we want to share a broadband internet connection.

A. UPS

B. node

C. server

D. Router

Option d – Router

What do we call a network where elements may be separated by some distance? It usually involves two or more networks & dedicated high-speed telephone lines.

A. LAN

B. World Wide Web

C. WAN

D. URL

Option c – WAN

The most prevalent storage device for personal computers is

A. None of these

B. Laptop

C. USB personal computer

D. Floppy disc

Option d – Floppy disc

What type of device is a computer monitor?

A. Input

B. Output

C. Software

D. Processing

Option b – Output

The blinking symbol which indicates the next character will appear at which place, is called

A. None of these

B. Return key

C. Delete key

D. Cursor

Option d – Cursor

The keyboard shortcut for the CUT command is ………

A. Ctrl + W

B. Ctrl + Z

C. Ctrl + V

D. Ctrl + X

Option d – Ctrl + X

The Internet was originally a project for which government agency?

A. NSA

B. NASA

C. NSF

D. ARPA

Option d – ARPA

Why should you delete unknown e-mail attachments?

A. You could go to jail

B. It is bad manners

C. The person could track you down and hurt you

D. It might contain a virus that could hurt your computer

Option a – You could go to jail

The operating system is the most common type of ……. software.

A. System

B. Word processing

C. Antivirus

D. Communication

Option a – System

Which of the following refers to dangerous programs that can be caught by reopening email attachments & downloading software from the internet?

A. Spam

B. Virus

C. Utility

D. App

Option b – Virus

Which elements of a Word document can be displayed in color?

A. None of these

B. Only text

C. Only graphics

D. All elements

Option d – All elements

We covered all the class 10 computer chapter 5 question answer mcqs above in this post for free so that you can practice well for the exam.

Check out the latest MCQ content by visiting our mcqtube website homepage.

Also, check out:

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

Hello, I am the admin of mcqtube.com website. I am a blogger and app developer. Thanks.

Leave a Comment