Logo Courage Library

50 Most Expected MCQ

Delhi Police Exam

Self-Paced Quick Practice

Courage Library Logo

How to Use This Practice Section

1

Try to answer each question before viewing the answer

2

Click "View Answer" to check your response

3

Note down questions you get wrong for revision

4

Time yourself to improve speed for the actual exam

1. MCQs with Hidden Answers

1

Which of the following is an input device?

Options: (a) Monitor (b) Keyboard (c) Printer (d) Speaker

View Answer

Keyboard

2

Which of these is an output device?

Options: (a) Mouse (b) Scanner (c) Speaker (d) Keyboard

View Answer

Speaker

3

CPU stands for:

Options: (a) Central Processing Unit (b) Control Program Unit (c) Computer Power Unit (d) Central Power Unit

View Answer

Central Processing Unit

4

RAM is used for:

Options: (a) Permanent storage (b) Temporary storage (c) Printing (d) Input processing

View Answer

Temporary storage

5

ROM is:

Options: (a) Read-Only Memory (b) Random Output Memory (c) Rapid Operating Memory (d) Readable Operating Memory

View Answer

Read-Only Memory

6

Which generation of computers used vacuum tubes?

Options: (a) 1st (b) 2nd (c) 3rd (d) 4th

View Answer

1st

7

Which generation of computers used microprocessors?

Options: (a) 3rd (b) 4th (c) 5th (d) 2nd

View Answer

4th

8

MS Word is an example of:

Options: (a) System Software (b) Application Software (c) Utility Software (d) Operating System

View Answer

Application Software

9

Which shortcut is used to copy text in Word?

Options: (a) Ctrl + V (b) Ctrl + X (c) Ctrl + C (d) Ctrl + Z

View Answer

Ctrl + C

10

Ctrl + P is used to:

Options: (a) Print document (b) Paste content (c) Open document (d) Save document

View Answer

Print document

11

Which of these is used to scan printed text into digital form?

Options: (a) OCR (b) MICR (c) Speaker (d) Monitor

View Answer

OCR

12

Which of these is a type of malware?

Options: (a) Trojan (b) VPN (c) Firewall (d) Router

View Answer

Trojan

13

Ransomware primarily:

Options: (a) Encrypts files and demands payment (b) Deletes software (c) Speeds up system (d) Prints documents

View Answer

Encrypts files and demands payment

14

Which of these is an antivirus software?

Options: (a) Avast (b) MS Word (c) Chrome (d) Windows Explorer

View Answer

Avast

15

Which of the following is used to browse the internet securely?

Options: (a) HTTP (b) HTTPS (c) FTP (d) POP3

View Answer

HTTPS

16

A firewall is used to:

Options: (a) Protect network from unauthorized access (b) Encrypt files (c) Speed up CPU (d) Print files

View Answer

Protect network from unauthorized access

17

Which of the following is a batch OS?

Options: (a) Windows 10 (b) Linux (c) Early IBM computers (d) Android

View Answer

Early IBM computers

18

Which type of OS allows multiple users to run programs simultaneously?

Options: (a) Real-time (b) Multitasking (c) Batch (d) Single-user

View Answer

Multitasking

19

Which of the following is a permanent storage device?

Options: (a) RAM (b) ROM (c) CPU (d) Cache

View Answer

ROM

20

What is the full form of BIOS?

Options: (a) Basic Input Output System (b) Binary Input Output Software (c) Basic Internal Operating System (d) Binary Internal Output System

View Answer

Basic Input Output System

21

IP address is used to:

Options: (a) Identify computers on a network (b) Encrypt data (c) Speed up system (d) Print files

View Answer

Identify computers on a network

22

LAN stands for:

Options: (a) Large Area Network (b) Local Area Network (c) Logical Area Network (d) Linear Area Network

View Answer

Local Area Network

23

WAN stands for:

Options: (a) Wide Area Network (b) Wireless Area Network (c) Wide Access Network (d) Wired Area Network

View Answer

Wide Area Network

24

HTTP stands for:

Options: (a) HyperText Transfer Protocol (b) HyperText Transmission Process (c) Hyper Transfer Text Protocol (d) HyperText Transfer Process

View Answer

HyperText Transfer Protocol

25

HTML is used for:

Options: (a) Writing software programs (b) Designing websites (c) Storing files (d) Encrypting data

View Answer

Designing websites

26

PDF stands for:

Options: (a) Portable Document Format (b) Public Document File (c) Personal Data File (d) Protected Document Format

View Answer

Portable Document Format

27

Which of these is a storage device?

Options: (a) SSD (b) Monitor (c) Keyboard (d) Printer

View Answer

SSD

28

HDD stands for:

Options: (a) Hard Disk Drive (b) High Data Device (c) Hard Data Disk (d) Host Disk Drive

View Answer

Hard Disk Drive

29

USB stands for:

Options: (a) Universal Serial Bus (b) Universal Storage Bus (c) User Serial Bus (d) Unified Serial Bus

View Answer

Universal Serial Bus

30

Which device converts digital data to printed output?

Options: (a) Monitor (b) Printer (c) Keyboard (d) Scanner

View Answer

Printer

31

Which of the following is an example of malware?

Options: (a) Worm (b) Firewall (c) Proxy (d) Router

View Answer

Worm

32

Which of these is used for video conferencing?

Options: (a) MS Word (b) Zoom (c) Excel (d) Paint

View Answer

Zoom

33

Trojan horse is a type of:

Options: (a) Virus (b) Worm (c) Malware (d) Software

View Answer

Malware

34

Which of these is an example of an input device for banking?

Options: (a) MICR (b) OCR (c) Scanner (d) Keyboard

View Answer

MICR

35

Which device projects visual output on a screen?

Options: (a) Monitor (b) Projector (c) Printer (d) Keyboard

View Answer

Projector

36

Conditional formatting is used in Excel to:

Options: (a) Highlight cells based on criteria (b) Sort data (c) Filter data (d) Create charts

View Answer

Highlight cells based on criteria

37

SUM function in Excel is used to:

Options: (a) Subtract numbers (b) Add numbers (c) Multiply numbers (d) Divide numbers

View Answer

Add numbers

38

COUNTIF function in Excel:

Options: (a) Counts cells based on a condition (b) Adds numbers (c) Finds average (d) Sorts data

View Answer

Counts cells based on a condition

39

Which of these chart types is used for percentage distribution?

Options: (a) Bar chart (b) Pie chart (c) Line chart (d) Column chart

View Answer

Pie chart

40

Which key combination is used to undo in Excel?

Options: (a) Ctrl + Z (b) Ctrl + X (c) Ctrl + V (d) Ctrl + Y

View Answer

Ctrl + Z

41

What is the function of antivirus software?

Options: (a) Detect and remove malware (b) Backup files (c) Encrypt data (d) Print documents

View Answer

Detect and remove malware

42

Which OS is used in mobile devices?

Options: (a) Android (b) Windows 10 (c) Linux (d) MS-DOS

View Answer

Android

43

Which of these is a batch OS example?

Options: (a) DOS (b) Windows 10 (c) Linux (d) Android

View Answer

DOS

44

Which of these is used to prevent phishing attacks?

Options: (a) Strong passwords (b) Sharing credentials (c) Downloading all files (d) Clicking unknown links

View Answer

Strong passwords

45

Which key combination is used to cut text?

Options: (a) Ctrl + C (b) Ctrl + V (c) Ctrl + X (d) Ctrl + P

View Answer

Ctrl + X

46

HTTPS ensures:

Options: (a) Secure data transmission (b) Fast internet (c) Large storage (d) Data deletion

View Answer

Secure data transmission

47

Which of these converts domain names to IP addresses?

Options: (a) FTP (b) DNS (c) HTTP (d) SMTP

View Answer

DNS

48

Which of these is a real-time OS example?

Options: (a) Windows (b) VxWorks (c) Linux (d) DOS

View Answer

VxWorks

49

Which Excel feature allows you to filter data based on conditions?

Options: (a) Sorting (b) Filtering (c) Chart (d) SUM function

View Answer

Filtering

50

The primary function of RAM is:

Options: (a) Permanent storage (b) Temporary storage (c) Processing data (d) Input data

View Answer

Temporary storage

Practice Progress 50/50

Congratulations! You've completed all 50 questions.

💡 Exam Tip

Memorizing these 50 expected MCQs covers almost all frequently asked topics in Delhi Police computer & cyber awareness section, including hardware, software, OS, MS Office, Excel, networking, internet security, malware, and cybercrime.

Previous
Developed By Jan Mohammad
Next

Master Computer Fundamentals for Delhi Police Exam!

Join Courage Library for comprehensive study materials and expert guidance.

Be a Couragian!