Computer Fundamentals MCQ Updated Data - April, 2026

Computer Fundamentals MCQ Updated Data - April, 2026
Score: 0 / 10

21.What is the main advantage of using SSD over HDD??

  • A Higher capacity
  • B Faster data access speed
  • C Lower cost
  • D Greater durability

Correct Answer: (B) Faster data access speed

Explanation: SSD offers faster data access speeds compared to HDD, making it advantageous for performance.

22.Which protocol is primarily used for secure communication over a computer network??

  • A HTTP
  • B FTP
  • C TCP
  • D HTTPS

Correct Answer: (D) HTTPS

Explanation: HTTPS (Hypertext Transfer Protocol Secure) is the protocol used for secure web communication.

23.What is the primary purpose of a GPU in a computer system??

  • A Data storage
  • B Processing graphics and images
  • C Network communication
  • D System booting

Correct Answer: (B) Processing graphics and images

Explanation: The GPU (Graphics Processing Unit) is designed specifically for processing graphics and images.

24.Which of the following best describes 'malware'??

  • A Legitimate software
  • B Software for data recovery
  • C Malicious software designed to harm or exploit devices
  • D Operating system updates

Correct Answer: (C) Malicious software designed to harm or exploit devices

Explanation: Malware is any software intentionally designed to cause damage or perform unauthorized activities on a computer system.

25.Which device connects multiple computers in a network to prepare for data broadcasting??

  • A Router
  • B Switch
  • C Modem
  • D Repeater

Correct Answer: (B) Switch

Explanation: A switch connects multiple devices in a network and manages the data traffic among them.

26.In computing, what does the term 'phishing' refer to??

  • A A method to recover lost passwords
  • B A technique for protecting personal data
  • C Fraudulent attempts to obtain sensitive information
  • D A process for data encryption

Correct Answer: (C) Fraudulent attempts to obtain sensitive information

Explanation: Phishing is a method used by cybercriminals to trick individuals into providing sensitive information.

27.What is the primary role of RAM in a computer??

  • A Long-term data storage
  • B Temporary data storage for active processes
  • C Data backup
  • D Network communication

Correct Answer: (B) Temporary data storage for active processes

Explanation: RAM (Random Access Memory) provides temporary storage for data that is actively being used by the CPU.

28.Which of the following is an example of an input device??

  • A Monitor
  • B Printer
  • C Keyboard
  • D Projector

Correct Answer: (C) Keyboard

Explanation: A keyboard is an input device used to enter data into a computer system.

29.What type of network topology connects all devices to a single central hub??

  • A Mesh
  • B Star
  • C Ring
  • D Bus

Correct Answer: (B) Star

Explanation: In a star topology, all devices are connected to a central device (hub), forming a star-like structure.

30.Which of the following file formats is typically associated with vector graphics??

  • A .jpg
  • B .png
  • C .svg
  • D .gif

Correct Answer: (C) .svg

Explanation: The .svg (Scalable Vector Graphics) format is used for vector graphics that can scale without loss of quality.