SSC Computer Awareness MCQ [200 MCQs]: Asked in Previous Year SSC Exams

2/5 - (4 votes)
Note

The following questions have been taken from previous year SSC examinations, including SSC CGL, SSC CHSL, SSC CPO.
Checkout All MCQs on Commputer Awareness 

Previous Year SSC Computer Awareness MCQ Set- 16

151. Which generation of computers had very large sizes?
A. First Generation
B. Second Generation
C. Third Generation
D. Fourth Generation

Answer – A. First Generation

Explanation-First Generation computers were developed in the 1940s and 1950s. These computers used vacuum tubes and had very large sizes. They were very expensive to build and maintain.


152. A program that has the capability to infect other programs and make copies of itself and spread into other programs is called [Uttarakhand PCS (Pre) 2012]
A. Worm
B. Virus
C. Trojan
D. None of these

Answer – B. Virus

Explanation-A virus is a type of malware that has the capability to infect other programs and make copies of itself to spread to other programs. This can cause damage to the infected computer and can also spread to other computers.


153. Which of the following is a part of the Central Processing Unit?
A. Printer
B. Keyboard
C. Mouse
D. Arithmetic & Logic unit

Answer – D. Arithmetic & Logic unit

Explanation-The Central Processing Unit (CPU) is the brain of the computer that performs all the processing tasks. It consists of two main parts: the Control Unit (CU) and the Arithmetic & Logic Unit (ALU). The ALU performs all the arithmetic and logic operations of the computer.


154. MIS is designed to provide the information needed for effective decision-making by:
A. Consumers
B. Workers
C. Foremen
D. Managers

Answer – D. Managers

Explanation-MIS (Management Information System) is a computer-based system that is designed to provide the information needed for effective decision-making by managers. MIS provides timely and accurate information that can be used to make informed decisions.


155. Which one of the following is a part of Infotech terminology? [UPPCS (Pre) 2011]
A. Protocol
B. Login
C. Archie
D. All of these

Answer –D. All of these

Explanation-Infotech terminology refers to the technical language used in the field of Information Technology. Protocol, login, and Archie are all examples of terms used in this field.


156. Microprocessors as switching devices are used in which generation of computers?
A. First Generation
B. Second Generation
C. Third Generation
D. Fourth Generation

Answer – D. Fourth Generation

Explanation-Microprocessors are used as switching devices in Fourth Generation computers. Fourth Generation computers were developed in the 1960s and 1970s and were based on integrated circuits. They were smaller, faster, and more reliable than previous generations of computers.


157. CAD stands for
A. Computer-aided design
B. Computer algorithm for design
C. Computer application in design
D. Computer analog design

Answer – A. Computer-aided design

Explanation-CAD (Computer-aided design) is the use of computer systems to assist in the creation, modification, analysis, or optimization of a design. CAD software is widely used in the field of architecture, engineering, and manufacturing to create 2D and 3D models of products and buildings.


158. Computer virus means [Tamil Nadu PSC (Pre) 2019 UPPCS (Pre) 1993]
A. A new virus
B. Plague virus
C. Destructive program
D. Hardware of computer

Answer – C. Destructive program

Explanation-A computer virus is a type of malicious software that can replicate itself and spread to other computers. It is a destructive program that can cause damage to the infected computer, steal data, or allow unauthorized access to the computer.


159. Which of the following devices can be used to directly image printed text?
A. OCR
B. OMR
C. MICR
D. All of the above

Answer – A. OCR

Explanation-OCR (Optical Character Recognition) is a technology that can be used to directly image printed text. It works by analyzing the shapes and patterns of the characters in the image and converting them into machine-readable text.


160. Junk e-mail is also called
A. Spam
B. Spoof
C. Sniffer script
D. Spool

Answer – A. Spam

Explanation-Junk e-mail is also called spam. It refers to unsolicited messages that are sent in bulk to a large number of recipients. Spam can be used for advertising, phishing, or spreading malware.


Share This:

As a professional blogger and passionate educator, I am driven by a deep-seated desire to share knowledge and empower others. With years of experience in the field, I am committed to providing valuable insights and guidance to aspiring learners. My passion lies in helping individuals discover their potential and achieve their goals. I am also a firm believer in the power of motivation and strive to inspire others to pursue their dreams with unwavering determination.

Leave a Comment

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
100% Free SEO Tools - Tool Kits PRO