JKSSB Computer MCQs for High-Scoring Preparation

Computer questions in JKSSB are no longer basic.
They test concepts.
They test accuracy.
They test clarity.

This set focuses on long and tricky questions.
Built from PYQs and expected exam traps.


JKSSB Computer MCQs

  1. A computer system stores temporary data, running instructions, and intermediate results in a memory which loses its content once power supply is switched off. Identify this memory.
    A. ROM
    B. Cache
    C. RAM
    D. Secondary storage
    Answer. C
  2. Which component of CPU is mainly responsible for decoding instructions and controlling the flow of data between memory, ALU, and input-output devices
    A. Register
    B. Arithmetic Logic Unit
    C. Control Unit
    D. Cache memory
    Answer. C
  3. In a computer, which unit converts the alternating current received from the power supply into a form usable by internal components
    A. UPS
    B. SMPS
    C. Transformer
    D. Stabilizer
    Answer. B
  4. Computers understand instructions written in binary format because
    A. Binary is easy to program
    B. CPU operates using electrical signals
    C. Storage devices use binary
    D. Binary reduces memory usage
    Answer. B
  5. A file size of 2048 bytes is equal to
    A. 2 KB
    B. 1 KB
    C. 512 bytes
    D. 4 KB
    Answer. A
  6. Which memory retains data even after the system is shut down and is mainly used to store firmware
    A. RAM
    B. Cache
    C. ROM
    D. Register
    Answer. C
  7. CPU clock speed measured in gigahertz refers to
    A. Number of instructions per second
    B. Number of operations per cycle
    C. Number of cycles per second
    D. Size of processor cache
    Answer. C
  8. A touchscreen is categorized as both input and output device because
    A. It processes data
    B. It displays output and accepts touch input
    C. It stores data
    D. It controls memory
    Answer. B
  9. Which operating system allows users to modify its source code freely
    A. Windows
    B. macOS
    C. Linux
    D. DOS
    Answer. C
  10. When a file is deleted using Shift + Delete in Windows, the file
    A. Moves to recycle bin
    B. Gets compressed
    C. Is permanently removed
    D. Gets hidden
    Answer. C
  11. BIOS plays a critical role during system startup because it
    A. Loads application software
    B. Initializes hardware and starts booting
    C. Connects to the internet
    D. Manages files
    Answer. B
  12. Which category of software acts as an interface between hardware and user
    A. Utility software
    B. Application software
    C. System software
    D. Firmware
    Answer. C
  13. Executable files in Windows operating system usually have which extension
    A. .run
    B. .bin
    C. .exe
    D. .sys
    Answer. C
  14. A URL is mainly used to
    A. Identify hardware devices
    B. Locate resources on the internet
    C. Encrypt data
    D. Transfer files
    Answer. B
  15. Which protocol ensures reliable email delivery from sender to mail server
    A. POP3
    B. IMAP
    C. SMTP
    D. FTP
    Answer. C
  16. POP3 protocol is mainly designed to
    A. Send emails securely
    B. Receive emails from server
    C. Encrypt emails
    D. Share files
    Answer. B
  17. Which network device selects the best path to forward data packets between networks
    A. Hub
    B. Switch
    C. Router
    D. Bridge
    Answer. C
  18. A bit represents
    A. A character
    B. A binary digit
    C. A byte
    D. A word
    Answer. B
  19. A computer virus differs from a Trojan because a virus
    A. Requires user permission
    B. Replicates itself
    C. Cannot damage files
    D. Works offline only
    Answer. B
  20. Google Drive is an example of
    A. Local storage
    B. Optical storage
    C. Cloud-based storage
    D. Temporary storage
    Answer. C
  21. Pressing F5 key in a browser usually
    A. Opens help
    B. Reloads the current page
    C. Closes the tab
    D. Saves the page
    Answer. B
  22. Which memory improves system performance by storing frequently accessed data
    A. ROM
    B. RAM
    C. Cache
    D. Hard disk
    Answer. C
  23. In Windows command line, which command is used to view file attributes
    A. dir
    B. attrib
    C. list
    D. tree
    Answer. B
  24. The default file format of MS Word 2016 and later versions is
    A. .doc
    B. .txt
    C. .docx
    D. .rtf
    Answer. C
  25. Which MS Office application is best suited for numerical calculations and data analysis
    A. Word
    B. PowerPoint
    C. Excel
    D. Access
    Answer. C
  26. To rename a file in Windows using keyboard, which function key is used
    A. F1
    B. F2
    C. F4
    D. F6
    Answer. B
  27. Which storage device is considered secondary storage
    A. Register
    B. Cache
    C. RAM
    D. Hard disk
    Answer. D
  28. HTTP protocol is mainly used for
    A. Email transfer
    B. Secure communication
    C. Web page transfer
    D. File compression
    Answer. C
  29. CPU executes instructions written in which language
    A. High-level language
    B. Assembly language
    C. Machine language
    D. Java bytecode
    Answer. C
  30. Port number 80 is associated with
    A. FTP
    B. SMTP
    C. HTTP
    D. HTTPS
    Answer. C
  31. NTFS file system offers advantage over FAT32 because it supports
    A. Smaller files
    B. Larger partitions and security features
    C. Slower access
    D. Limited permissions
    Answer. B
  32. Which software actively scans, detects, and removes malicious programs
    A. Firewall
    B. Backup utility
    C. Antivirus
    D. Disk cleanup
    Answer. C
  33. Which of the following is an output device
    A. Scanner
    B. Joystick
    C. Monitor
    D. Light pen
    Answer. C
  34. First generation computers were based on
    A. Transistors
    B. Integrated circuits
    C. Vacuum tubes
    D. Microprocessors
    Answer. C
  35. Arithmetic and logical operations in CPU are performed by
    A. Control Unit
    B. Register
    C. ALU
    D. Cache
    Answer. C
  36. Task Manager opens directly in Windows using
    A. Ctrl + Alt + Delete
    B. Ctrl + Shift + Esc
    C. Alt + F4
    D. Windows + R
    Answer. B
  37. PowerPoint presentation files are saved by default with extension
    A. .ppt
    B. .pps
    C. .pptx
    D. .ppx
    Answer. C
  38. Which of the following is an example of operating system
    A. Photoshop
    B. Linux
    C. Excel
    D. Chrome
    Answer. B
  39. The shutdown command in Windows is mainly used to
    A. Restart Explorer
    B. Close programs
    C. Power off system
    D. Lock screen
    Answer. C
  40. Cache memory is located
    A. On hard disk
    B. Inside CPU or close to it
    C. On motherboard only
    D. Inside RAM
    Answer. B
  41. UPS is used to
    A. Increase processing speed
    B. Provide temporary power backup
    C. Cool the system
    D. Store data
    Answer. B
  42. Chrome, Firefox, and Edge are examples of
    A. Search engines
    B. Operating systems
    C. Web browsers
    D. Servers
    Answer. C
  43. HTTPS is considered secure because it
    A. Compresses data
    B. Encrypts communication
    C. Blocks pop-ups
    D. Uses FTP
    Answer. B
  44. Windows + L key combination is used to
    A. Log out
    B. Lock the system
    C. Shut down
    D. Restart
    Answer. B
  45. SSD is faster than HDD because SSD
    A. Uses magnetic disks
    B. Has moving parts
    C. Uses flash memory
    D. Consumes more power
    Answer. C
  46. A compiler differs from an interpreter because a compiler
    A. Translates code line by line
    B. Converts entire program at once
    C. Executes code directly
    D. Stores data
    Answer. B
  47. Booting instructions of a computer are stored in
    A. RAM
    B. Cache
    C. ROM
    D. Hard disk
    Answer. C
  48. In DOS, which command is used to copy files from one location to another
    A. move
    B. copy
    C. paste
    D. transfer
    Answer. B
  49. Which of the following is NOT an operating system
    A. Android
    B. Windows
    C. Oracle
    D. Linux
    Answer. C
  50. The Windows key on keyboard primarily
    A. Opens Control Panel
    B. Opens Start Menu
    C. Locks system
    D. Opens browser
    Answer. B

Why You Must Practice Tough Computer MCQs

• JKSSB questions are no longer basic
• PYQ patterns repeat concepts
• Long questions test understanding
• Computer section gives safe marks


JKSSB Computer MCQs require deep understanding of fundamentals, not shortcuts. This tough 50-question set reflects real exam difficulty and PYQ trends. Revise these questions multiple times and combine them with mock tests to secure maximum marks in the JKSSB computer section.

J&K Reorganisation Act 2019 MCQs for JKSSB Exams 

JK Police Constable New Posts Advertisement 2025: 1815 Vacancies, Eligibility, Selection Process, Syllabus

Top Online & Hybrid Learning Platforms for Students in India (2026 Guide)

Leave a Comment