Class 10 Computer Chapter 5 Question Answer

Questions

    Class 10 Computer Chapter 5 Question Answer. We covered all the Class 10 Computer Chapter 5 Question Answer in this post for free so that you can practice well for the exam.

    Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.



    These types of competitive MCQs appear in exams like SSC, Railway, Bank, Delhi Police, UPSSSC, UPSC (Pre), State PCS, CDS, NDA, Assistant Commandant, and other Competitive Examinations, etc.

    We created all the competitive exam MCQs into several small posts on our website for your convenience.

    Join Telegram Group and Get FREE Alerts! Join Now

    Join WhatsApp Group For FREE Alerts! Join Now

    You will get their respective links in the related posts section provided below.

    Related Posts:

    Class 10 Computer Chapter 5 Question Answer for Students

    Quick Quiz

    Which runs on computer hardware & serves as a platform for other software to run on?

    a. Operating System

    b. Application Software

    c. System Software

    d. All

    Option a – Operating System

    ……… is the program run on a computer when the computer boots up. ( Class 10 Computer Chapter MCQ )

    a. System software

    b. System operations

    c. Operating system

    d. None

    Option c – Operating System

    Which is the first program run on a computer when the computer boots up?

    a. System software

    b. System operations

    c. Operating system

    d. None

    Option c – Operating System

    The ………. contains commands associated with the My Computer window. ( Class 10 Computer Chapter MCQ )

    a. Standard menu

    b. Start menu

    c. System menu

    d. None of the above

    Option c – System menu

    …….. is the layer of a computer system between the hardware and the user program.

    a. Operating environment

    b. Operating system

    c. System environment

    d. None of these

    Option b – Operating System

    Which is the layer of a computer system between the hardware & the user program. ( Class 10 Computer Chapter MCQ )

    a. Operating environment

    b. Operating system

    c. System environment

    d. None

    Option b – Operating System

    When you start up the computer, the boot-up storage at which the BIOS version, manufacturer & data are displayed on the monitor is called.

    a. Bootstrap

    b. Power-on self-test (POST)

    c. System configuration

    d. Kernel loading

    Option b – Power-on self-test (POST)

    The operating system is the most common type of …….. Software.

    a. Communication

    b. Application

    c. System

    d. Word processing software

    Option c – System

    Which of the following is/are external commands? ( Class 10 Computer Chapter MCQ )

    a. Edit

    b. Label

    c. Sys

    d. All of the above

    Option d – All of the above

    Which is not an external command?

    a. Edit

    b. XCOPY

    c. Sys

    d. None of the above

    Option d – None of the above

    Which of the following is not essential to shut down your computer? ( Class 10 Computer Chapter MCQ )

    a. Save all opened files

    b. Close all running applications

    c. Switch off monitor

    d. Cut off the power supply

    Option c – Switch off monitor

    …….. runs on computer hardware & serves as a platform for other systems to run on?

    a. Operating system

    b. Application system

    c. System software

    d. All of the above

    Option a – Operating system

    Read the following statement carefully & find out whether it is correct about the hacking or not. ( Class 10 Computer Chapter MCQ )

    A. It can be possible that in some cases, hacking a computer or network can be legal.

    B. No, in any situation, hacking cannot be legal

    C. It may be possible that in some cases, it can be referred to as a legal task

    D. None of these

    Option b – No, in any situation, hacking cannot be legal

    Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment & digital media platform?

    A. Cyber law

    B. Cyberethics

    C. Cybersecurity

    D. Cybersafety

    Option b – Cyberethics

    Which of the following refers to the violation of the principle if a computer is no longer accessible? ( Class 10 Computer Chapter MCQ )

    A. Access control

    B. Confidentiality

    C. Availability

    D. All of the above

    Option c – Availability

    Which one of the following refers to the technique used for verifying the integrity of the message?

    A. Digital signature

    B. Decryption algorithm

    C. Protocol

    D. Message Digest

    Option d – Message Digest

    Which one of the following is usually used in the process of Wi-Fi hacking? ( Class 10 Computer Chapter MCQ )

    A. Aircrack-ng

    B. Wireshark

    C. Norton

    D. All of the above

    Option a – Aircrack-ng

    Which of the following port & IP address scanners is famous among the users?

    A. Cain and Abel

    B. Angry IP Scanner

    C. Snort

    D. Ettercap

    Option b – Angry IP Scanner

    In ethical hacking & cybersecurity, there are …….. types of scanning: ( Class 10 Computer Chapter MCQ )

    A. 1

    B. 2

    C. 3

    D. 4

    Option c – 3

    ………. is a type of software designed to help the user’s computer detect viruses & avoid them.

    A. Malware

    B. Antivirus

    C. Adware

    D. Both B and C

    Option b – Antivirus

    Which one of the following is a type of antivirus program?

    A. Quick heal

    B. Mcafee

    C. Kaspersky

    D. All of the above

    Option d – All of the above

    It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. It is known as the ……..

    A. Antivirus

    B. Firewall

    C. Cookies

    D. Malware

    Option b – Firewall

    Which of the following refers to stealing one’s idea or invention of others & using it for their own benefit?

    A. Piracy

    B. Plagiarism

    C. Intellectual property rights

    D. All of the above

    Option d – All of the above

    The output devices make it possible to

    A. scan data

    B. input data

    C. store data

    D. view or print data

    Option d – view or print data

    Which of the following is a valid IP address?

    A. 192.900.168.1

    B. 192.168.1.1

    C. 192.168.900.1

    D. 192.168.111.1111

    Option b – 192.168.1.1

    Who among the following is the odd one

    A. Trojan horse

    B. Virus

    C. Spyware

    D. Firmware

    Option d – Firmware

    A UPS ……..

    A. limits damage caused by fluctuating levels of electricity

    B. None of these

    C. conducts a power-on self-test or POST

    D. provides battery backup for a limited time

    Option d – provides battery backup for a limited time

    Which of the following is to be done by the auditor during the internet banking services audit?

    A. All of the above

    B. Tour the server room

    C. Contract clearly states the services that will be provided by the vendor

    D. The user is not allowed to log in after defined repeated failed attempts

    Option b – Tour the server room

    The taskbar is located

    A. None of these

    B. on the Quick Launch toolbar

    C. on the Start menu

    D. at the bottom of the screen

    Option d – at the bottom of the screen

    ……… is the process whereby media files such as a video start playing as they are downloading.

    A. pushing

    B. pulling

    C. flashing

    D. streaming

    Option d – streaming

    Text in a column is generally aligned

    A. None of these

    B. justified

    C. right

    D. left

    Option d – left

    For electronic banking, we should ensure the existence & procedures with regard to

    A. Identification of customers who become members electronically

    B. All of the above

    C. Steps for complying with the laws, rules & regulations

    D. None of these

    Option a – Identification of customers who become members electronically

    Verification of login name & password is known as

    A. Configuring

    B. Logging

    C. Certification

    D. Authentication

    Option d – Authentication

    The ……… of a system includes the programs or instructions.

    A. software

    B. hardware

    C. None of these

    D. information

    Option a – software

    A group of related records in a database is called a(n)

    A. key.

    B. None of these

    C. table.

    D. column.

    Option a – key

    To protect the computer system against hackers & different kinds of viruses, one must always keep ……. on in the computer system.

    A. Antivirus

    B. Firewall

    C. Vlc player

    D. Script

    Option b – Firewall

    Code Red is a type of

    A. An Antivirus Program

    B. A photo editing software

    C. A computer virus

    D. A video editing software

    Option c – A computer virus

    Which of the following can be considered as the elements of cyber security?

    A. Application Security

    B. Operational Security

    C. Network Security

    D. All of the above

    Option d – All of the above

    Which of the following are famous & common cyber-attacks used by hackers to infiltrate the user’s system?

    A. DDos & Drive-by Downloads

    B. Malware & Malvertising

    C. Phishing & Password attacks

    D. All of the above

    Option d – All of the above

    Which one of the following is also referred to as malicious software?

    A. Maliciousware

    B. Badware

    C. Illegalware

    D. Malware

    Option d – Malware

    Hackers usually use the computer virus for ……. the purpose.

    A. To log, and monitor each & every user’s stroke

    B. To gain access to sensitive information like user’s ID & Passwords

    C. To corrupt the user’s data stored in the computer system

    D. All of the above

    Option d – All of the above

    In Wi-Fi Security, which of the following protocols is more used?

    A. WPA

    B. WPA2

    C. WPS

    D. Both A & C

    Option b – WPA2

    Which of the following is not a type of scanning?

    A. Xmas Tree Scan

    B. Cloud scan

    C. Null Scan

    D. SYN Stealth

    Option b – Cloud scan

    In system hacking, which of the following is the most crucial activity?

    A. Information gathering

    B. Covering tracks

    C. Cracking passwords

    D. None of the above

    Option c – Cracking passwords

    Which of the following are the types of scanning?

    A. Network, vulnerability & port scanning

    B. Port, network, and services

    C. Client, Server, and network

    D. None of the above

    Option a – Network, vulnerability & port scanning

    Which one of the following is actually considered the first computer virus?

    A. Sasser

    B. Blaster

    C. Creeper

    D. Both A and C

    Option c – Creeper

    What is Dr. Watson?

    a. IT Expert

    b. Diagnosis tool

    c. Surgeon

    d. None

    Option b – Diagnosis tool

    The command allows you to create a logical drive

    a. Sort

    b. Path

    c. Subst

    d. Batch

    Option c – Subst

    The command is used to create a logical drive for a specific location on the disk

    a. Fdisk

    b. Format

    c. Subst

    d. All of the above

    Option c – Subst

    You can move a window to a different position on your screen by dragging it by its

    a. Move handle

    b. Tail

    c. Status bar

    d. Title bar

    Option a – Move handle

    A bar that informs you of the available options in your computer, opened applications, and background running applications & can be used to switch between applications quickly is

    a. Menu bar

    b. Toolbar

    c. Status bar

    d. Taskbar

    Option d – Taskbar

    Which components appear in the initial Windows start-up display?

    a. Dialog box

    b. Start menu

    c. Taskbar

    d. All of the above

    Option c – Taskbar

    Taskbar is used for

    a. Navigation program

    b. Switching between programs

    c. Start a program

    d. All of the above

    Option d – All of the above

    To install the new font

    a. Start > setting -> control panel -> font

    b. Start > setting -> control panel -> font -> install new font

    c. Start -> control panel -> font -> install new font

    d. Start > setting -> font

    Option b – Start > setting -> control panel -> font -> install new font

    When a peripheral device needs immediate attention from the operating system, it generates a(n)

    a. Interrupt

    b. Spool

    c. Stack

    d. Page file

    Option a – Interrupt

    Underlined text, such as text & folder names is referred to as

    a. Hyperlink

    b. Menu

    c. Source drive

    d. None of these

    Option a – Hyperlink

    Which of the following is suitable after you install new drivers?

    a. Shut Down

    b. Restart

    c. Sleep

    d. Hibernate

    Option b – Restart

    Windows displays various options for shutdown. Which is suitable at the end of the day?

    a. Shut Down

    b. Restart

    c. Sleep

    d. Hibernate

    Option a – Shut Down

    Personal computers are connected to one another to form a

    A. Enterprise

    B. Server

    C. None of these

    D. Network

    Option d – Network

    A computer program that converts assembly language to machine language is

    A. Intersection

    B. Complicate

    C. Comparator

    D. Assembler

    Option d – Assembler

    It is necessary to install a(n) ……….. on a network if we want to share a broadband internet connection.

    A. UPS

    B. node

    C. server

    D. Router

    Option d – Router

    What do we call a network where elements may be separated by some distance? It usually involves two or more networks & dedicated high-speed telephone lines.

    A. LAN

    B. World Wide Web

    C. WAN

    D. URL

    Option c – WAN

    The most prevalent storage device for personal computers is

    A. None of these

    B. Laptop

    C. USB personal computer

    D. Floppy disc

    Option d – Floppy disc

    What type of device is a computer monitor?

    A. Input

    B. Output

    C. Software

    D. Processing

    Option b – Output

    The blinking symbol which indicates the next character will appear at which place, is called

    A. None of these

    B. Return key

    C. Delete key

    D. Cursor

    Option d – Cursor

    The keyboard shortcut for the CUT command is ………

    A. Ctrl + W

    B. Ctrl + Z

    C. Ctrl + V

    D. Ctrl + X

    Option d – Ctrl + X

    The Internet was originally a project for which government agency?

    A. NSA

    B. NASA

    C. NSF

    D. ARPA

    Option d – ARPA

    Why should you delete unknown e-mail attachments?

    A. You could go to jail

    B. It is bad manners

    C. The person could track you down and hurt you

    D. It might contain a virus that could hurt your computer

    Option a – You could go to jail

    The operating system is the most common type of ……. software.

    A. System

    B. Word processing

    C. Antivirus

    D. Communication

    Option a – System

    Which of the following refers to dangerous programs that can be caught by reopening email attachments & downloading software from the internet?

    A. Spam

    B. Virus

    C. Utility

    D. App

    Option b – Virus

    Which elements of a Word document can be displayed in color?

    A. None of these

    B. Only text

    C. Only graphics

    D. All elements

    Option d – All elements

    We covered all the class 10 computer chapter 5 question answer mcqs above in this post for free so that you can practice well for the exam.

    Check out the latest MCQ content by visiting our mcqtube website homepage.

    Also, check out:

    Hello, I am the admin of mcqtube.com website. I am a blogger and app developer. Thanks.

    Leave a Comment

    Floating ChatBot
    Ask

    Doubt?, Ask me Anything



    Sticky Bottom Popup