Basic ComputerGK in Bengali PDF. We covered all the Basic ComputerGK in Bengali PDF file provided in this post for free so that you can practice well for the exam.
A microprocessor is the brain of the Computer & is also called an
(a) Microchip
(b) Macrochip
(c) Calculator
(d) Macroprocessor
Explanation: A microprocessor is the central processing chip inside a Computer that performs calculations, logical operations, and controls overall system activity. It executes instructions given by software and coordinates Communication between memory and input/output devices. Because it handles nearly all processing tasks, it is often described as the “brain” of the Computer system. It continuously follows the instruction cycle of fetching data, decoding it, and executing operations in a repeated loop. Modern microprocessors are built using integrated circuit Technology, allowing millions of transistors to be packed into a very small chip, which makes them extremely fast and efficient. Their performance determines how quickly a Computer can run applications and handle multitasking. By managing data flow and processing instructions, it acts as the core unit that drives the entire computing system’s functionality and responsiveness.
Option a - Microchip
Main memory works in conjunction with
(a) Special function cards
(b) RAM
(c) CPU
(d) Intel
Explanation: Main memory is the primary working storage area in a Computer where active programs and data are kept for quick access during processing. It works closely with the central processing unit, supplying it with instructions and receiving processed results. This cooperation ensures that tasks are executed efficiently without delays caused by slower storage devices like hard disks. The processor continuously reads from and writes to main memory while running applications, making it a crucial part of system performance. Data stored in this memory is temporary and is lost when the system is turned off. The interaction between memory and processing unit forms a continuous cycle of data exchange, which allows the Computer to function smoothly and respond quickly to user commands and software operations.
Option c - CPU
The primary goal of a Computer system is to turn data into
(a) Ideas
(b) Suggestions
(c) Information
(d) Reports
Explanation: A computer system is designed to take raw facts or figures and process them through a sequence of operations to produce meaningful output. This transformation process is the core function of computing systems and is achieved using hardware and software working together. Input data is first collected from users or devices, then processed through computational steps such as arithmetic operations, logical comparisons, and data manipulation. The processed result becomes organized and meaningful output that can be used for decision-making or further analysis. The efficiency of this transformation depends on how well the system manages instructions, memory, and processing units. The entire system is built around converting unstructured input into a usable form that supports human understanding and practical applications in real-world tasks.
Option c - Information
Once information is input into a computer it becomes
(a) Objects
(b) Data
(c) Ideas
(d) Facts
Explanation: When raw input is entered into a computer system, it is converted into a form that the machine can understand and process. This transformation allows the system to store, manipulate, and analyze the data using its internal processing mechanisms. Input devices such as keyboards or sensors convert human-readable information into machine-readable form. Once inside the system, this information is temporarily stored and processed according to programmed instructions. The processing unit then performs operations on it to generate meaningful output. This stage is crucial because it marks the transition from external input to internal system representation, enabling computation and decision-making processes. The handling of this transformed data is fundamental to all computing tasks, from simple calculations to complex operations.
Option b - Data
An electronic device, operating under the control of information, that can accept data, process the data, produce output & store the results for future use
(a) Input
(b) Computer
(c) Software
(d) Hardware
Explanation: This refers to a general-purpose machine designed to perform a wide range of computational tasks by following programmed instructions. It works by receiving input, processing it using a central processing mechanism, producing output in a usable form, and storing results for later use. The system is controlled by software that directs how data should be handled at each stage. Its operation involves continuous interaction between hardware components such as memory, processing units, and input/output devices. The ability to store processed information allows it to be reused or analyzed later, making it highly efficient for various applications. This structured workflow enables automation of tasks and supports both simple and complex problem-solving processes across different fields of use.
Option b - Computer
Arithmetic logic unit & control unit sections have special purpose locations called
(a) Registers
(b) RAM
(c) BIOS
(d) I/O
Explanation: Inside a central processing unit, there are dedicated functional areas that temporarily hold data and instructions during processing. These small, high-speed storage locations are used to quickly access information needed for arithmetic operations, logical comparisons, and control activities. They help improve processing speed by reducing the need to access slower main memory repeatedly. These storage elements work closely with both the arithmetic logic unit and the control unit to ensure smooth execution of instructions. They hold intermediate results, control signals, and addresses during computation. Their role is essential in maintaining efficient data flow within the processor, enabling faster execution of tasks and better overall system performance.
Option a - Registers
Which part of the computer is used for calculating & comparing?
(a) ALU
(b) Control Unit
(c) Disk Unit
(d) Modem
Explanation: Within a computer system, there is a dedicated functional unit responsible for performing mathematical calculations and logical comparisons. It handles operations such as addition, subtraction, multiplication, division, and decision-making comparisons like greater than, less than, or equal to. This unit is a core component of the processor and works closely with control mechanisms to execute instructions. It receives data from memory, processes it according to instructions, and sends results back for storage or further processing. Its efficiency directly affects the computational speed of the entire system. By handling both arithmetic and logical operations, it plays a central role in executing program instructions and supporting decision-based processing tasks.
Option a - ALU
Which unit controls the movement of signals between CPU & I/O?
(a) ALU
(b) Control Unit
(c) Memory Unit
(d) Secondary Storage
Explanation: In a computer system, there is a control mechanism responsible for managing how data and signals move between the processing unit and input/output devices. It ensures that instructions are properly executed and that data is transferred at the correct time and in the correct sequence. This coordination prevents conflicts and ensures smooth operation of the system. It interprets instructions and sends control signals to different parts of the computer, directing when and how data should move. This unit does not process data itself but manages Communication between components. Its role is essential in maintaining synchronization within the system, allowing efficient interaction between the processor, memory, and external devices.
Option b - Control Unit
The three main parts of the processor are
(a) ALU, Control Unit & Registers
(b) ALU, Control Unit & RAM
(c) Cache, Control Unit & Registers
(d) Control Unit, Registers & RAM
Explanation: A processor is composed of key functional components that work together to execute instructions and manage system operations. These components handle different responsibilities such as performing calculations, controlling instruction flow, and temporarily storing data during processing. One part performs arithmetic and logical operations, another manages instruction execution and coordination, and the third provides fast temporary storage for data and instructions. Together, they form an integrated system that enables efficient processing of program instructions. Their interaction ensures that data is fetched, processed, and stored in an organized manner. This structure is fundamental to computer architecture and determines how quickly and efficiently a system can perform tasks.
Option a - ALU, Control Unit & Registers
The basic computer processing cycle consists of ..........
(a) Input, processing & output
(b) Systems & Application
(c) Data, information & applications
(d) Hardware, Software &Storage
Explanation: The processing cycle in a computer describes the sequence of steps used to execute instructions and complete tasks. It begins with receiving input data, followed by processing it according to programmed instructions. After processing, the system generates output that provides meaningful results to the user. In many cases, the processed data is also stored for future use. This cycle repeats continuously as long as the system is running, enabling it to handle multiple tasks efficiently. The coordination between input devices, processing units, memory, and output devices ensures smooth execution of this cycle. It forms the foundation of how computers operate and perform all computational activities.
Option a - Input, processing & output
'C' in CPU denotes .........
(a) Central
(b) Common
(c) Convenient
(d) Computer
Explanation: The abbreviation CPU refers to the main processing unit of a computer system responsible for executing instructions and controlling operations. It acts as the central component that manages all computational tasks and system coordination. The letter representing its core function indicates its role in organizing and directing processing activities within the system. It continuously interprets instructions from programs, performs required operations, and manages data flow between memory and input/output devices. This central role makes it essential for system performance, as all software operations depend on its ability to process instructions efficiently.
Option a - Central
........ devices convert human-understandable data & programs into a form that the computer.
Explanation: In a computer system, there are devices designed to take information that humans can understand and convert it into a format that the machine can process. These devices act as intermediaries between users and the internal system, allowing input such as text, images, or commands to be transformed into digital signals. This conversion is necessary because computers operate using binary data. Once converted, the information is sent to the processing unit for execution. These devices play a crucial role in enabling Communication between humans and computers, making it possible to input data efficiently for processing and further use.
Option d - Input
The term GIGO is related to .........
(a) Accuracy
(b) Automatic
(c) Flexibility
(d) Versatility
Explanation: In computing, this term highlights the dependency of output quality on input quality. If incorrect or poor-quality data is entered into a system, the results produced after processing will also be unreliable or meaningless. The concept is widely used to emphasize the importance of accurate data entry and proper validation before processing begins. Computers strictly follow instructions and do not judge correctness on their own, so any errors in input directly affect final results. This principle is especially important in data processing systems, databases, and programming environments where even small mistakes can lead to incorrect outcomes. It reinforces the idea that system reliability depends heavily on the accuracy of initial data provided.
Option a - Accuracy
A computer executes programs in the sequence of ........
(a) Store, Fetch, Execute
(b) Fetch, Decode, Execute
(c) Execute, Fetch, Decode
(d) Decode, Fetch, Execute
Explanation: A computer follows a structured instruction cycle to run programs in an organized manner. It begins by retrieving instructions from memory, then interpreting what each instruction means, and finally carrying out the required operation. This cycle repeats continuously for every instruction in a program. The system ensures that each step is completed before moving to the next, maintaining proper order and logical flow. This sequential execution allows programs to function correctly and produce expected results. The coordination between memory and processing unit is essential in maintaining this flow. By following this structured process, the system can efficiently execute complex tasks and manage multiple operations step by step.
Option b - Fetch, Decode, Execute
The Communication line between CPU memory & peripherals is called a ........
(a) Bus
(b) Line
(c) Media
(d) All of these
Explanation: In a computer system, different components such as the processor, memory, and input/output devices need a structured pathway to exchange data and signals. This Communication pathway allows information to move between components efficiently and in an organized manner. It consists of multiple lines that carry data, addresses, and control signals. These lines ensure that instructions and data reach the correct destination within the system. Without this structured Communication path, the internal components would not be able to coordinate effectively. It plays a crucial role in system performance by enabling smooth and synchronized interaction between all major parts of the computer architecture.
Option a - Bus
Instruction in Computer languages consists of
(a) OPCODE
(b) OPERAND
(c) Both of the above
(d) None of these
Explanation: A computer instruction is made up of components that tell the system what operation to perform and on which data. One part specifies the operation to be executed, such as addition or movement of data, while the other part identifies the data or memory location involved in that operation. Together, these components form a complete command that the processor can understand and execute. This structure allows programs to be broken into small, manageable steps that the system processes sequentially. Each instruction is decoded by the processor before execution, ensuring proper operation. This combination of operation code and data reference is essential for defining tasks in machine-level programming.
Explanation: A computer is an electronic system designed to accept input, process data according to instructions, produce output, and store results for future use. It operates using a combination of hardware components and software programs that work together to perform a wide range of tasks. The system follows a structured process where data is received, transformed into meaningful information, and then delivered to the user in a usable form. It can perform both simple and complex operations at high speed and accuracy. Its ability to automate tasks and handle large volumes of data makes it an essential tool in various fields such as education, business, science, and Communication.
Explanation: An automated banking machine is a self-service electronic device that allows users to perform basic financial transactions without the need for direct assistance from Bank staff. It is connected to a secure bankingNetwork and enables operations such as cash withdrawal, balance inquiry, and account-related services. Users interact with the system through a secure interface using authentication methods like cards and personal codes. The system processes requests in real time by communicating with the Bank’s central database. This Technology provides convenience, reduces waiting time, and allows banking services to be accessed at any time, making financial transactions faster and more efficient.
Option c - Withdrawal of Cash without staff
Application Software
1. is used to control the operating system
2. is designed to help programmers
3. performs a specific task for computer users
4. is used for making designs only
5. All of the above
Explanation: Application software refers to programs designed to perform specific tasks for users, such as writing documents, creating spreadsheets, or designing presentations. These programs run on top of system software and are developed to solve particular user needs. They help users complete real-world tasks efficiently by providing tools and features tailored for specific purposes. Unlike system-level software, which manages hardware and system operations, this type of software focuses directly on user-oriented functions. It can range from simple utilities to complex professional tools used in industries like business, education, and engineering. Its main purpose is to improve productivity and simplify task execution.
Option 3 - performs a specific task for computer users
Data structure includes
1. Array
2. Execution statement
3. Interaction
4. Both (2) and (3)
5. List
Explanation: In computing, data structures refer to ways of organizing and storing data so that it can be used efficiently. They define how data is arranged in memory and how operations such as searching, insertion, and deletion are performed. Common forms include linear and non-linear arrangements that help manage information systematically. Proper use of structured data improves program performance and reduces processing time. It is an essential concept in programming and algorithm design because it allows developers to handle large amounts of data effectively. By organizing data logically, systems can process information more efficiently and support complex operations in software applications.
Option 1 - Array
The ……… key will launch the start buttons.
1. esc
2. shift
3. windows
4. shortcut
5. None of these
Explanation: In computer systems, certain keys on the keyboard are assigned special functions that help users interact with the operating system quickly. One such key is used to open the main system menu, which provides access to installed programs, settings, and power options. This key acts as a shortcut to the system’s primary interface, reducing the need to navigate through multiple steps using a mouse. It is commonly found on standard keyboards and is integrated with the operating system’s graphical user interface. When pressed, it immediately triggers the display of the system start interface, allowing users to quickly launch applications or access system tools. This feature improves usability and efficiency in everyday computing tasks.
Option 3 - windows
To move to the beginning of a line of text, press the ……… key.
1. home
2. a
3. page up
4. enter
5. None of these
Explanation: In text editing environments, certain keyboard keys are designed to help users navigate quickly within a document. One such key is used to instantly move the cursor to the start of the current line without requiring manual scrolling or arrow key movement. This improves typing efficiency and editing speed, especially when working with large documents. It is commonly used in word processors, code editors, and text-based applications. By providing quick cursor positioning, it helps users edit or insert text at precise locations. This function is part of standard keyboard navigation shortcuts that enhance productivity and streamline document editing tasks.
Option 1 - home
When sending an e-mail, the ……… line describes the contents of the message.
1. to
2. subject
3. contents
4. CC
5. None of these
Explanation: In electronic mail Communication, there is a specific field that provides a brief summary of the message content. This helps the recipient understand the purpose of the email before opening it. It acts like a title or heading for the message and is especially useful when managing multiple emails in an inbox. This field improves organization and allows users to prioritize important messages. Email systems use it to categorize and display messages efficiently. It is a standard part of email structure and plays an important role in Communication clarity and message identification.
Option 2 - subject
Which groupings do you work with when formatting text in Word?
1. Tables, paragraphs, and indexes
2. Paragraphs, indexes, and sections
3. Characters, sections, and paragraphs
4. Indexes, characters, and tables
5. None of these
Explanation: In word processing applications, text formatting is organized into different structural elements that control how content appears on a page. These include character-level formatting such as font style and size, paragraph-level formatting such as alignment and spacing, and document-level structures such as sections. These groupings allow users to control both the appearance and structure of written content effectively. By combining these formatting levels, users can create well-organized and visually structured documents. This system makes it easier to manage large documents by separating formatting responsibilities into logical categories, improving readability and document design flexibility.
Option 1 - Tables, paragraphs, and indexes
Which of the following is the largest unit of storage?
1. GB
2. KB
3. MB
4. TB
5. None of these
Explanation: Computer storage is measured in hierarchical units that represent increasing capacities of digital data. These units range from small measurements used for basic data to extremely large units used for massive storage systems. Each unit is a multiple of the previous one, based on binary or decimal scaling depending on context. The largest unit among commonly used storage measurements represents the highest capacity for storing digital information in modern computing systems. It is typically used in large-scale data centers, cloud storage systems, and enterprise-level storage solutions where massive amounts of data are handled efficiently.
Option 4 - TB
The ……… tells the computer how to use its components.
Explanation: In a computer system, a specific type of software is responsible for managing hardware resources and coordinating system operations. It acts as an interface between the user and the hardware, ensuring that all components work together efficiently. This software controls memory usage, process scheduling, file management, and device Communication. It provides the necessary Environment for application programs to run smoothly. Without it, users would not be able to interact with hardware effectively. It is essential for system functionality because it manages all internal operations and ensures proper execution of tasks across different hardware components.
Option 3 - operating system
The hardware device that acts as both a switching and connecting unit is called a(n)
1. RS-232 C Port
2. Concentrator
3. Multiplexer
4. Communication processor
5. None of these
Explanation: In computer networking and communication systems, certain devices are used to manage data flow between multiple systems or channels. A switching device directs data to the correct destination, while a connecting device allows multiple communication lines to be linked efficiently. This type of hardware is used in communication networks to optimize data transmission and reduce congestion. It plays a key role in managing traffic between different devices and ensuring smooth data exchange. Such devices are commonly used in telecommunications and computer networks to improve connectivity and system performance.
Option 3 - Multiplexer
The device that assembles groups of characters into complete messages prior to their entering the CPU is called
1. An Interpreter
2. A Compiler
3. A Communication processor
4. An Editor
5. A Translator
Explanation: In computing systems, certain devices or software components are responsible for organizing raw input data into structured messages before processing. These components collect individual characters or data units and combine them into meaningful information that can be interpreted by the central processing unit. This preparation step ensures that data is properly formatted and complete before execution begins. It is commonly used in communication systems and data processing environments where input arrives in fragments. By assembling data into structured form, it improves processing accuracy and ensures that instructions are correctly interpreted by the system.
Option 3 - A Communication processor
What is the full form of DMA?
(a) Direct Memory Access
(b) Dynamic Memory Access
(c) Direct Method Access
(d) Double Memory Access
Explanation: In computer architecture, DMA refers to a technique that allows certain hardware subsystems to access main memory independently of the central processing unit. This improves system efficiency by reducing the load on the processor during data transfer operations. It is commonly used in high-speed input/output operations such as disk transfers and multimedia processing. By allowing direct data movement between memory and devices, it increases overall system performance and reduces processing delays. This mechanism is an important part of modern computer design for optimizing data transfer speed and CPU utilization.
Option a - Direct Memory Access
The processor must have two inputs ..........
(a) Instructions & data
(b) Information & data
(c) Input & Output
(d) CPU & Instructions
Explanation: A processor performs operations on information provided to it through specific inputs required for computation. These inputs typically include the data to be processed and the instructions that define what operation should be performed on that data. The processor continuously reads these inputs, interprets the instruction SET, and executes the required operation in sequence. This input structure is essential for proper functioning because computation cannot occur without both elements working together. The data provides the values, while the instruction defines the action to be performed. Together, they enable the system to carry out meaningful processing tasks in an organized manner.
Option a - Instructions & data
.......... defines the parameters of the action & depends on the operation.
(a) Op-Code
(b) Operand
(c) Instructions
(d) Data
Explanation: In computer instruction formats, one part of an instruction specifies what operation needs to be performed, while another part determines the data or location involved in that operation. The component that defines the nature of the action plays a key role in guiding the processor about what task to execute, such as addition, subtraction, or data movement. It works in coordination with other instruction fields that provide required operands. This structured format ensures that each instruction is clearly interpreted and executed by the processor without ambiguity. It is a fundamental concept in machine-level programming and instruction design.
Option b - Operand
The address of the I/O device or memory is carried by the ........
(a) Data Bus
(b) Expansion Bus
(c) Address Bus
(d) System Bus
Explanation: In computer architecture, different types of communication pathways are used to transfer data, control signals, and addressing information between components. The specific pathway responsible for carrying location information helps the processor identify where data should be read from or written to. This ensures that instructions are executed correctly by directing operations to the proper memory location or input/output device. It plays a crucial role in system organization by separating address information from actual data transfer. This separation improves efficiency and allows the processor to manage memory and device communication accurately during execution.
Option c - Address Bus
A physical connection between the microprocessor memory & other parts of the microcomputer is known as ..........
(a) Path
(b) Address Bus
(c) Route
(d) All of these
Explanation: In a microcomputer system, different components such as the processor, memory, and input/output devices are interconnected through structured communication pathways. These pathways allow the transfer of data, addresses, and control signals between system components. The physical link ensures that all parts of the system can communicate effectively and work together in a coordinated manner. It is essential for enabling data exchange and instruction execution across the system. Without this connection, the processor would not be able to access memory or control peripheral devices, making it a fundamental part of computer architecture.
Option b - Address Bus
The read/write line belongs to
(a) the data bus
(b) the control bus
(c) the address bus
(d) CPU bus
Explanation: In computer systems, control signals are used to manage the operations of data transfer between the processor, memory, and input/output devices. One such signal determines whether data should be read from memory or written into it. This signal is part of the control mechanism that ensures correct execution of instructions. It does not carry data itself but only controls the direction of data flow. By managing read and write operations, it helps maintain proper synchronization and prevents conflicts during memory access. This function is essential for accurate and efficient system operation.
Option b - the control bus
The name of the location of a particular piece of data is its ........
(a) Address
(b) Memory Name
(c) Storage
(d) Data Location
Explanation: In computer memory systems, every stored piece of information is assigned a unique identifier that indicates where it is located. This identifier allows the processor to access data efficiently during program execution. It acts like a reference point that helps locate information in memory storage. Without this identification system, retrieving data would be inefficient and disorganized. The system uses this structured addressing method to manage large amounts of information systematically. It plays a key role in memory organization and data retrieval processes within a computer system.
Option a - Address
Which of the following is used to connect the different external devices?
(a) Address Bus
(b) Data Bus
(c) Control Bus
(d) External Bus
Explanation: In computer systems, multiple communication pathways are used to transfer data between internal components and external devices. One specific type of pathway is responsible for linking peripheral devices such as printers, keyboards, and storage units to the main system. This connection allows data and control signals to be exchanged between the computer and external hardware. It ensures proper coordination between different devices and the central processing unit. By enabling communication between external components and the system, it plays a vital role in expanding the functionality of the computer.
Option d - External Bus
A temporary storage area, attached to the CPU, for I/O operations, is a .........
(a) Chip
(b) Buffer
(c) Register
(d) Core
Explanation: In computer systems, a small high-speed storage area is used to temporarily hold data during input and output operations. This storage helps smooth data transfer between the processor and external devices by holding information briefly before it is processed or transmitted. It improves efficiency by reducing delays caused by differences in processing speeds between components. This temporary storage plays an important role in buffering data during communication between devices. It ensures that data is transferred in an organized manner without loss or interruption during system operations.
Option c - Buffer
Who wrote the first computer program?
[A] Ada Lovelace
[B] Charles Babbage
[C] Herman Hollerith
[D] Joseph Marie Jacquard
Explanation: The earliest known computer program was written in the 19th century by a mathematician who worked closely with early mechanical computing concepts. She is recognized for creating an algorithm intended for use on an analytical engine, which was a proposed mechanical general-purpose computer. Her work demonstrated that such machines could go beyond calculations and perform complex logical operations. This contribution is considered foundational in the History of computer programming. Her ideas laid the groundwork for modern programming concepts and computational theory, making her a pioneering figure in computer science.
Option a - Ada Lovelace
Which of the following cannot be done through the computers?
Explanation: Computers are versatile machines capable of performing a wide range of digital tasks such as communication, data processing, entertainment, and online services. However, they are limited to electronic and programmed activities and cannot perform physical real-world actions on their own. They rely entirely on software instructions and user input to function. While they can simulate, assist, or facilitate many services, they cannot directly perform tasks that require physical execution in the real world without external devices or human involvement. This distinction highlights the boundary between digital processing and physical actions.
Explanation: In computer storage systems, digital information is measured in hierarchical units based on binary progression. Each unit represents a multiple of the previous one, allowing efficient representation of large amounts of data. A megabyte is a commonly used unit that represents a substantial amount of digital storage, often used for files such as documents, images, and small multimedia items. It is derived from smaller units like bytes and kilobytes, following a structured scaling system used in computing. This measurement helps in understanding storage capacity in devices such as computers, mobile phones, and storage drives. The concept is essential for comparing and managing data sizes across different systems and applications.
Option c - 1 million bytes
What is MS Word?
[A] A big word
[B] A dictionary
[C] A word processor
[D] A computer name given devices
Explanation: MS Word is a software application used for creating, editing, formatting, and printing text-based documents. It provides a user-friendly interface with tools for writing letters, reports, resumes, and other professional documents. It supports features such as text formatting, spell checking, inserting images, tables, and page layout customization. This software is widely used in offices, schools, and personal work due to its flexibility and ease of use. It is part of a larger software suite designed for productivity tasks. By offering structured document creation tools, it helps users produce well-organized and visually clear written content efficiently.
Option c - A word processor
Select the odd one out of the given devices.
[A] Hard disk drive
[B] Keyboard
[C] Pen drive
[D] Floppy disk
Explanation: Computer hardware devices are generally categorized based on their function, such as input, output, or storage devices. Input devices send data into the system, output devices display results, and storage devices hold data for later use. When identifying an odd one out, the classification depends on whether a device performs a different role compared to others in the same group. For example, storage devices like drives and memory units differ from input devices like keyboards. This classification helps in understanding the role of each hardware component in a computer system and how they contribute to overall functionality.
Option b - Keyboard
What is the full form of GMail
[A] Google Mail
[B] Google Meet
[C] Good Manners
[D] Gala Meet
Explanation: Gmail is a widely used electronic mail service that allows users to send and receive messages over the internet. It is developed as a web-based communication platform that supports text messages, file attachments, and multimedia sharing. The service operates through email protocols that enable communication between users across different locations. It is integrated with other online services to provide secure and efficient messaging. Gmail is commonly used for personal, educational, and professional communication. It organizes messages into folders and uses filters to manage incoming emails effectively, improving user experience and communication efficiency.
Option a - Google Mail
Which of the following words describes the term e-mail'?
[A] Electric mail
[B] Express mail
[C] Energetic mail
[D] Electronic mail
Explanation: Electronic mail is a digital communication system that allows messages to be sent and received through computer networks, especially the internet. It replaces traditional postal mail by enabling instant communication between users regardless of location. The system uses electronic devices and Network protocols to transfer messages from one user to another. It supports text, images, and file attachments, making communication more flexible and efficient. This Technology has become an essential part of modern communication systems in both personal and professional environments due to its speed and convenience.
Option d - Electronic mail
What does a byte represent in the Common computers?
[A] Data
[B] Software
[C] Hardware
[D] None of the above
Explanation: In computing, data is stored and processed in binary form using basic units of measurement. A byte is a fundamental unit that represents a collection of binary digits used to encode a single character or symbol. It is widely used in memory storage and data processing systems to measure file sizes and storage capacity. Bytes form the basis for larger units like kilobytes, megabytes, and gigabytes. This structure allows computers to handle text, numbers, and multimedia data efficiently. It plays a key role in how information is stored, processed, and transmitted in digital systems.
Option a - Data
By default, your documents print ---- in mode.
[A] Landscape
[B] Page setup
[C] Portrait
[D] Print view
Explanation: When a document is printed using standard settings, it follows a predefined page orientation that determines how content is arranged on paper. This default setting is commonly used for most text-based documents such as letters and reports. It ensures that content is displayed vertically, making it easier to read and format. Users can change this setting depending on the type of document they are creating, such as switching to a wider layout for tables or charts. The default mode is designed to suit general document formatting needs in most word processing applications.
Option c - Portrait
Select the word that completes the given sentence. Charles Babbage, the computer inventor, was a
[A] Doctor
[B] Chemist
[C] Physicist
[D] Mathematician
Explanation: Charles Babbage is widely known for his contributions to the development of early computing concepts and mechanical calculation devices. He designed the analytical engine, which is considered a foundational model for modern computers. His work focused on mathematical principles and mechanical engineering to create machines capable of performing complex calculations automatically. His ideas introduced concepts such as programmable machines and automated computation. These contributions earned him recognition as a pioneer in the field of computing and a key figure in the History of computer science and mathematical innovation.
Option d - Mathematician
When was the Google search engine' created?
[A] 1969
[B] 1996
[C] 1998
[D] 2008
Explanation: The Google search engine was developed in the late 1990s as a tool to organize and retrieve information from the internet efficiently. It was created by researchers who aimed to improve search accuracy and speed compared to existing systems. The platform uses algorithms to rank web pages based on relevance and importance. Over time, it became one of the most widely used search engines in the world. Its development marked a major advancement in internet Technology, transforming how users access and interact with online information globally.
Option c - 1998
……… refers to the copying and archiving of - computer data, where the primary purpose is to recover data after its loss (due to deletion or corruption).
1. Reverse data
2. Extraction of data
3. Back up of data
4. Version change
5. All of the above
Explanation: In computing systems, there is a process used to create duplicate copies of important data so that it can be restored in case of accidental loss, corruption, or system failure. This process involves storing copies of files in separate locations to ensure data safety and reliability. It is widely used in organizations and personal systems to protect against unexpected data loss. The process ensures continuity of work by allowing users to restore previous versions of files or complete datasets. It is a critical part of data management and system security strategies.
Option 3 - Back up of data
An email attachment is a computer file, documents, and images sent along with an ……….
1. email message
2. email extension
3. inbox
4. insert file
5. All of the above
Explanation: In electronic communication systems, additional files can be included with a message to share information beyond plain text. These files may include documents, images, audio, video, or other digital formats that are linked to the main message. They are transmitted together with the email through internet protocols and can be downloaded or viewed by the recipient depending on compatibility. This feature enhances communication by allowing users to exchange rich content in a single message. It is widely used in professional, educational, and personal communication to share detailed information efficiently without sending multiple messages.
Option 1 - email message
TSO stands for
1. Time-Sharing Operation
2. Time-Sharing Option
3. Time Support Option
4. Time Synchronous Option
5. None of these
Explanation: In computing and mainframe environments, this term refers to a system feature that allows multiple users to interact with a computer simultaneously. It enables users to log in, execute commands, and run programs in a shared computing Environment. This approach improves system utilization by dividing processing time among different users efficiently. It is commonly used in large organizational systems where multiple tasks need to be handled at the same time. The concept is important in time-sharing systems, where resources are allocated dynamically to ensure smooth and efficient operation for all connected users.
Option 2 - Time-Sharing Option
Which of the following is known as a Network of Networks?
1. LAN
2. WAN
3. MAN
4. Internet
5. None of these
Explanation: In computer networking, there exists a global system that connects millions of smaller networks together, allowing communication and data exchange across the world. It is built using interconnected systems such as local networks, wide-area networks, and other communication infrastructures. This large-scale Network enables services like web browsing, email, and online communication. It operates using standardized protocols that ensure devices can communicate regardless of location or platform. This interconnected structure forms the foundation of modern digital communication and information sharing across countries and continents.
Option 4 - Internet
What refers to how the system can quickly transform to support environmental changes?
1. Reliability
2. Salability
3. Availability
4. Maintainability
5. None of these
Explanation: In system design and computing, there are quality attributes that describe how well a system responds to changes in its Environment or requirements. This concept focuses on the ability of a system to adapt quickly when conditions such as workload, user demand, or configuration change. It ensures that the system remains efficient and functional under varying conditions. This characteristic is important for maintaining performance and reliability in dynamic computing environments. It reflects the system’s flexibility and responsiveness to evolving needs without significant disruption.
Option 4 - Maintainability
Booting up of PC depends on factors like ……… so that files function without errors.
1. the hardware
2. BIOS
3. Operating system
4. All of the above
5. None of these
Explanation: When a computer starts, it goes through a startup process that prepares the system for operation. This process depends on several essential components working correctly to load system files and initialize hardware. The system firmware, operating system, and hardware components all play a role in ensuring smooth startup. If any of these elements are not functioning properly, errors may occur during loading. The boot process ensures that the system is ready for user interaction by initializing memory, devices, and core system services in a proper sequence.
Option 4 - All of the above
How many Gigabytes is equal to 1 petabyte?
1. 104857
2. 1048576
3.1
4. 10485
5. None of these
Explanation: In digital storage measurement, data units follow a hierarchical structure where each level represents a significantly larger capacity than the previous one. A petabyte is a very large storage unit used in large-scale data systems such as cloud storage and data centers. It is derived by multiplying smaller units like terabytes and gigabytes using binary-based scaling. This system allows efficient representation of extremely large data volumes. Understanding these conversions is important in fields such as data science, networking, and storage management, where large-scale data handling is required.
Option 2 - 1048576
.xil, .doc, .ppt are extensions of ………. respectively.
1. Word document, Presentation, Excel
2. Presentation, Excel, Word document
3. Excel, Word document, Presentation
4. Excel, Presentation, Word document
5. None of these
Explanation: In computing, file extensions are used to identify the format and type of data stored in a file. Each extension is associated with a specific application or software that can open and edit it. For example, spreadsheet files, word processing documents, and presentation files each have distinct formats. These extensions help the operating system recognize which program should be used to open the file. They also ensure proper handling of data structure and formatting. Understanding file extensions is essential for managing different types of digital documents effectively.
Option 3 - Excel, Word document, Presentation
PIN stands for ………
1. Password Indentification Number
2. Public Indentification Number
3. Private Indentification Number
4. Public Identification Number
5. None of the above
Explanation: In digital security systems, a short numeric code is used to verify the identity of a user during authentication processes. This code is typically kept confidential and is required for accessing secure systems such as banking services or electronic devices. It adds a layer of security by ensuring that only authorized users can gain access. The concept is widely used in financial transactions, ATM usage, and online services. It helps protect sensitive information by requiring a correct code before granting access to accounts or systems.
Option 5 - None of the above
Which hardware device enables a computer to send and receive information over telephone lines by converting the digital data used by the computer into an analog signal used on phone lines and then converting it back once received on the other end.
1. Demodulator
2. Modulator
3. Modern
4. Ethernet
5. All of the above
Explanation: In communication systems, a special device is used to facilitate data transfer over telephone lines by converting signals between digital and analog formats. Computers work with digital signals, while traditional telephone lines transmit analog signals, so conversion is necessary for communication. This device performs both modulation and demodulation functions to enable smooth data exchange between systems. It allows users to connect to networks and access online services using telephone infrastructure. It plays a key role in enabling internet connectivity in earlier communication systems and supports data transmission across different mediums.
Option 3 - Modern
………. are descended from early text formatting tools, it is the earliest applications for personal computer in office productivity.
1. Word processor
2. Diskettes
3. Printer
4. Plotter
5. None of these
Explanation: In personal computing, early software tools were designed to help users create and edit written documents efficiently on computers instead of typewriters. These tools evolved from basic text editing utilities that allowed simple typing and formatting. Over time, they developed advanced features such as formatting text, inserting tables, correcting spelling, and structuring documents. They became one of the first widely used categories of software in office environments because they improved speed, accuracy, and productivity in document creation. These applications laid the foundation for modern office productivity suites used in businesses, schools, and personal work environments today.
Option 3 - Printer
………. is a concept to abstractly represent all instances of a group of similar things.
1. Revoke
2. Data Manipulation Language
3. Data Definition language
4. Data Control Language
5. Entity
Explanation: In computer science and programming, there is a fundamental idea used to define a general structure that represents a collection of similar objects or entities. This concept allows programmers to model real-world entities in a simplified way by grouping shared characteristics and behaviors. It helps in organizing data and designing systems more efficiently by reducing complexity. This abstraction is widely used in software design, especially in object-oriented programming, where it forms the basis for creating reusable and scalable code structures. It enables better system design by focusing on common properties rather than individual details.
Option 2 - Data Manipulation Language
The full form of FTP is
1. File Transfer Protocol
2. File Transit Protocol
3. Folder Transfer Protocol
4. File Transfer Procedure
5. None of these
Explanation: In computer networking, there is a standard protocol used for transferring files between computers over a Network such as the internet. This protocol defines rules for how data is exchanged, ensuring reliable and organized file transfer. It is commonly used for uploading and downloading files between servers and client systems. It operates using a client-server model where one system requests files and another provides them. This protocol is widely used in web development, data sharing, and remote file management, making it an important part of Network communication systems.
Option 1 - File Transfer Protocol
Which area of the microprocessor is used to temporarily store instructions and data?
1. Register
2. ALU
3. Accumulator
4. Cache memory
5. Interrupt control
Explanation: Inside a microprocessor, there are small, high-speed storage locations used during the execution of instructions. These storage areas hold data and instructions that are currently being processed, allowing quick access without repeatedly going to main memory. This improves processing speed and efficiency. These temporary storage locations are essential for holding intermediate results and control information during computation. They play a critical role in the instruction execution cycle by enabling fast data manipulation and smooth operation of the processor. Without them, the system would experience delays due to slower memory access times.
Option 4 - Cache memory
………. are usually real Technology buffs who modify computer hardware or software in a way that alters the creator's original content.
1. Crackers
2. Hackers
3. Virus
4. Software engineer
5. None of these
Explanation: In computing Culture, there are individuals who have strong technical skills and an interest in exploring, modifying, or experimenting with computer systems. These individuals often analyze software or hardware deeply and may modify systems for learning, testing, or customization purposes. Depending on intent, such activities can be ethical or unethical. They are generally highly knowledgeable about system architecture, programming, and security. Their work may involve improving systems, finding vulnerabilities, or customizing existing technologies. This group plays a significant role in cybersecurity research and system development understanding.
Option 2 - Hackers
In computing ……….. is a term that means replacing hardware, software, or firmware with a new or better version, in order to bring the system up to date or to improve its characteristics.
1. Upgrading
2. Installing
3. New version
4. Replacement
5. None of these
Explanation: In computer systems, there is a process used to improve performance or add new features by replacing existing components or software with newer versions. This process ensures that systems remain efficient, secure, and compatible with modern requirements. It can involve installing newer software versions, upgrading hardware components, or updating firmware. This improves system speed, functionality, and security. It is commonly performed to fix bugs, enhance features, or support new technologies. Regular improvements through this process help maintain optimal system performance and extend the lifespan of computing systems.
Option 1 - Upgrading
What is the blinking symbol on a computer screen?
1. Mouse
2. Cursor
3. Cathode Ray tube
4. Logo
5. Palm cursor
Explanation: In graphical user interfaces, a small visual indicator appears on the screen to show the current position where text will be inserted or edited. This indicator moves as the user types or navigates through text. It helps users understand where the next input will appear in a document or application. It is commonly seen in word processors, text editors, and input fields. This visual marker is essential for user interaction with text-based systems, providing clear feedback during typing and editing tasks.
Option 2 - Cursor
What is the most common way to get a virus on your computer's hard disk?
1. By installing games from CD ROMs
2. By opening e-mails
3. By uploading pictures from mobile to computers
4. By sending e-mails
5. None of these
Explanation: In computer security, malicious software can enter a system through various online and offline sources. One of the most common ways is through internet-based communication channels where files or messages are exchanged. When users open unsafe attachments or interact with suspicious content, harmful programs can be installed on the system without permission. These malicious programs can damage files, slow down performance, or steal data. Understanding how such infections occur is important for maintaining system security and practicing safe computing habits, including avoiding unknown sources and using security software.
3. Marketing the usage of banking transactions through the internet
4. Transactions with forcing countries
5. None of these
Explanation: In modern financial systems, banking services are increasingly delivered through digital platforms connected to the internet. This allows customers to perform transactions such as fund transfers, bill payments, and account management without visiting a physical branch. Marketing in this context refers to promoting and encouraging the use of these online banking services among customers. It focuses on increasing awareness about convenience, speed, and accessibility of digital transactions. Banks use various communication channels to educate users about secure online practices and benefits. This approach helps expand the use of Technology-driven financial services and improves customer engagement with banking systems.
Option 3 - Marketing the usage of banking transactions through the internet
…… are devices used to transmit data over telecommunications lines.
1. Drives
2. Drive bays
3. Modems
4. Platform
5. None of these
Explanation: In communication systems, certain hardware devices are designed to send and receive data across long-distance networks using telephone or communication lines. These devices convert digital signals from computers into transmission formats suitable for communication channels and then reconvert them back into digital form at the receiving end. This enables smooth data exchange between systems located in different places. They play an important role in connecting computers to wide-area networks and facilitating internet access. Such devices are essential in enabling remote communication and data transfer across telecommunication infrastructure.
Option 3 - Modems
Most websites have a main page, the ……. which acts as a doorway to the rest of the website pages.
1. Search engine
2. Home page
3. Browser
4. URL
5. None of these
Explanation: In web design and internet navigation, every website typically begins with a central entry page that provides access to other sections of the site. This page contains links, menus, and information that guide users to different parts of the website. It serves as the starting point for browsing content and is designed to give an overview of what the site offers. Users can navigate from this page to subpages such as services, contact information, or additional resources. It plays a key role in organizing website structure and improving user experience during online navigation.
Option 2 - Home page
If you are going to a site you use often, instead of having to type in the address every time, you should ….
1. Save it as a file
2. Make a copy of it
3. Bookmark it
4. Delete it
5. None of these
Explanation: In web browsing, users often visit certain websites repeatedly. To save time and improve convenience, browsers provide a feature that allows users to store website addresses for quick access later. This eliminates the need to manually enter the full web address each time. Instead, users can simply select the saved link from a list or menu in the browser. This feature improves browsing efficiency and enhances user experience by making frequently visited websites easier to access. It is commonly used in all modern web browsers for better navigation management.
Option 3 - Bookmark it
The output which is made up of pictures, sounds, and video is called ….
1. COM
2. Hard copy
3. Graphics
4. Multimedia
5. None of these
Explanation: In digital systems, different types of media such as images, audio, and video can be combined to create rich and interactive content. This form of output is widely used in entertainment, education, and communication applications. It enhances user experience by integrating multiple forms of information into a single presentation. Computers process and display this content using specialized software and hardware capable of handling complex data formats. This type of output is common in presentations, websites, games, and multimedia applications, making information more engaging and easier to understand.
Option 4 - Multimedia
WWW stands for ……..
1. World Work Web
2. Wide Work Web
3. Wide World Web
4. World Wide Web
5. None of these
Explanation: In internet Technology, there is a global system of interlinked web pages and resources that can be accessed through browsers using the internet. It allows users to view and navigate information stored on servers around the world using hyperlinks. This system forms the foundation of web-based communication and information sharing. It operates using standard protocols that enable seamless access to websites, documents, and multimedia content. It is one of the most widely used services on the internet and has transformed how people access and share information globally.
Option 4 - World Wide Web
The vast Network of computers that connects millions of people all over the world is called ……
1. LAN
2. Web
3. Hypertext
4. Internet
5. None of these
Explanation: In modern communication systems, there exists a global infrastructure that connects computers across different regions, allowing users to share information and communicate instantly. This Network is made up of interconnected smaller networks such as local and wide-area networks. It enables services like email, web browsing, file sharing, and online communication. It operates using standardized protocols that ensure compatibility between different devices and systems. This global connectivity has revolutionized communication, education, business, and entertainment by enabling instant access to information and services worldwide.
Option 4 - Internet
A program designed to destroy data on your computer that can travel to infect other computers is called a ……..
Explanation: In computer security, there are malicious programs created to harm systems by damaging or deleting data and spreading to other computers. These programs often attach themselves to files or programs and replicate when those files are shared or executed. They can cause significant damage by corrupting data, slowing system performance, or disrupting normal operations. Such threats spread through networks, removable storage devices, or downloads from unsafe sources. Protecting systems from these threats requires security measures such as antivirus software and safe computing practices.
Option 4 - Virus
We covered all the Basic computer GK in Bengali pdf file provided above in this post for free so that you can practice well for the exam.
My name is Vamshi Krishna and I am from Kamareddy, a district in Telangana. I am a graduate and by profession, I am an android app developer and also interested in blogging.