1. Which of the key is not on the number keypad?

a. Ctrl
b. Del
c. Enter
d. Num lock

2. Which of the following is the shortcut control key for centering text?

a. Ctrl+B
b. Ctrl+C
c. Ctrl+E
d. Ctrl+F

3. Python is a -

a. Utility software
b. Unicode simplifier
c. Programming language
d. Antivirus

4. Which of the following group has only input devices?

a. Mouse, Keyboard and Monitor
b. Mouse, Keyboard and Printer
c. Mouse, Keyboard and Plotter
d. Mouse, Keyboard and Scanner

5. Spyware is a type of -

a. Highlighter
b. Navigator
c. Accounts software
d. Malware

6. Using output devices one can-

a. Process Data
b. Store Data
c. Scan Data
d. Print Data

7. Arrange in ascending order the units of memory TB, KB, GB, MB

a. TB>MB>GB>KB
b. MB>GB>TB>KB
c. TB>GB>MB>KB
d. GB>MB>KB>TB

8. Which computer memory is never erased?

a. RAM
b. ROM
c. CHIPS
d. BIOS

9. 1024 Terabyte=

a. 1 Gigabyte
b. 1 Zettabyte
c. 1 Exabyte
d. 1 Petabyte

10. USB Stands for-

a. Uniform Serial Bus
b. Universal Standard Bus
c. Universal Serial Bus
d. Universal Serial Bitrate

11. What does Fin Tech stand for?

a. Finance and Technology
b. Financial Technique
c. Finance and Technique
d. Financial Technology

12. The full form of `Wi-Fi' is

a. Wireless Facility
b. Wireless Field
c. Wireless Fidelity
d. Wireless Fiction

13. Which of the following is a C2C e-commmerce platform?

a. Daraz.com
b. Bikroy.com
c. Aarong.com
d. Alibaba.com

14. What is the smallest unit of data transmission?

a. MB
b. Bit
c. KB
d. Bytes

15. Which of the following is a social media company?

a. Linkedin
b. Apple
c. Amazon
d. Google

16. Which is used to measure the clock speed (the number of cycles) of the CPU per second?

a. Megahertz
b. Gigahertz
c. Decihertz
d. Zeptohertz

17. In which folder the unwanted mails are stored?

a. Drafts
b. Unread
c. Spam
d. Archive

18. Which of the following is used to select whole document?

a. Ctrl + C
b. Ctrl + X
c. Ctrl + A
d. Ctrl + W

19. Which of the following wireless communication system has the fastest speed?

a. Bluetooth
b. Wi-fi
c. WiMax
d. Fiber Optic

20. The output quality of a printer is measured by --

a. Dot per sq inch
b. Dot per second
c. Dot matrix per minute
d. Dots per inch

21. In a computer, text codes convert letters into --

a. Graphics
b. Binary format
c. Magnetic pulse
d. Characters

22. The symbol of "S" is used in Microsoft Excel for --

a. Copying the cell
b. Fixing the cell
c. Dragging the cell
d. Aligning the cell

23. In MS Word, the shortcut key Ctrl + O is used for --

a. Opening a document
b. Inserting a table
c. Saving a document
d. Defining a margin

24. Information on a computer is stored as what?

a. analog data
b. modem data
c. digital data
d. None of these

25. A collection of related information sorted and dealt with as a unit is a

a. Disk
b. Data
c. File
d. None

26. Which of the following is not term of information technology?

a. Cyber space
b. Light storage
c. Upload
d. Modem

27. Documents Movies Images and Photographs etc, are stored at a ?

a. Application Server
b. File server
c. Web Sever
d. Print Server

28. A word in a web page that, when clicked, opens another document.

a. Hyperlink
b. Anchor
c. Reference
d. URL

29. Information on a computer is stored as what?

a. analog data
b. modern data
c. digital data
d. None of these

30. All

a. on first page
b. on everypage
c. on alternative page
d. None of these

31. Which of the following is graphics solution for Word Processors?

a. Word Art
b. Clipart
c. Drop
d. All

32. What is a protion of a check document in which you set certain page formatting options?

a. Section
b. Page
c. Document
d. Page setup

33. Which Keys used to check spelling?

a. F2
b. F5
c. F7
d. F11

34. USB is which type of storage device?

a. Primary
b. Secondary
c. Tertiary
d. None of these

35. Who was the founder of Bluetooth?

a. Martin Cooper
b. Ericson
c. Steve Jobs
d. Apple

36. Electronic trespassing or criminal hacking is known as -

a. Cracking
b. Jacking
c. Spoofing
d. Smarming

37. Identify the language which is mainly used for Artificial Intelligence -

a. JAVA
b. J2EE
c. C
d. Prolog

38. Microsoft Office is an example of a-

a. Closed source software
b. Open source software
c. Horizontal market software
d. Vertical market software

39. Which of the following is not the components of a microprocessor?

a. ALU
b. Register Array
c. Hard Disk
d. Control Unit

40. Which of the following format is usually used to store data?

a. Decimal
b. BCD
c. Octal
d. Hexadecimal

41. For keeping internet activity anonymous and private by users, which one is used?

a. Dark Fiber
b. Dark Net
c. Dark Web
d. None of these

42. A chatbot or chatterbot is.

a. Hardware
b. Firmware
c. Humanware
d. Software

43. An offline UPS will typically take

a. 15 milliseconds
b. 8 milliseconds
c. 4 milliseconds
d. None of these

44. RTGS is a-

a. Payment system
b. Governance system
c. Right-based group
d. An anti-virus software

45. A Terabyte is equal to -

a. 1024 Megabytes
b. 1024 Kilobytes
c. 1024 Gigabytes
d. 1024 Bytes

46. If we want to connect a few computers in a small office, all the computers in one building, or all the computers in several buildings in close proximity, which type of network is required?

a. PAN
b. LAN
c. MAN
d. SAN

47. The keyboard command to reboot a computer is -

a. Ctrl + Alt + Tab
b. Ctrl + Shift + Del
c. Ctrl + Alt + Del
d. Ctrl + Alt + Shift

48. Which of the following is the strongest password?

a. ABCD1234
b. A1B2C3D4
c. PasSwOrD
d. SAXY59*&

49. RTGS is a(n) -

a. Governance system
b. Payment system
c. Right-based group
d. Anti-virus software

50. The process of copying files to a CD-ROM is known as -

a. Burning
b. Zipping
c. Digitizing
d. Ripping

51. A Gigabyte is equal to -

a. 1024 Bytes
b. 1024 Kilobytes
c. 1024 Megabytes
d. 1024 Terabytes

52. URL stands for -

a. Uniform Resource Locator
b. Uniform Resource Location
c. Undetected Resource Line
d. Uniformity of Resource Locator

53. Which one is the High-Level Programming language?

a. MS PowerPoint
b. MS Windows 10
c. Python
d. MySQL

54. Which one is the most popular Alternative Delivery Channels (ADCs) in Bangladesh?

a. MFS
b. POST
c. ATM
d. Internet Banking

55. Which one is Utility Software?

a. MS Word
b. Win-Zip
c. Firefox
d. Facebook

56. Find the odd one among the following-

a. C++
b. Linux
c. Windows 10
d. Macos

57. How many types of recipients are there in an e-mail system?

a. One
b. Two
c. Three
d. Four

58. Which is a type of computing that performs computation, storage and even applications as a service across a network?

a. Parallel computing
b. Cloud computing
c. Distributed computing
d. Virtual computing

59. RAM is also called as-

a. Virtual memory
b. Volatile Memory
c. Non-volatile memory
d. Cache memory

60. A hard disk drive can be directly connected to a PC via a-

a. SCSI interface
b. Parallel interface
c. WAN interface
d. USB interface

61. ____is not a form of data storage media.

a. Magnetic tape
b. Magnetic disc
c. Optical disc
d. A database

62. The computer command of "Ctrl+Alt+Delete" is applied to-

a. Copy text
b. Change a password
c. Copy and paste text
d. Shut down the computer

63. What is the decimal equivalent of the binary number of 10111 ?

a. 21
b. 39
c. 42
d. 23

64. Which of the following is the device used for converting maps, pictures and drawing into digital form for storage in computers?

a. Image scanner
b. Digitizer
c. MICR
d. Scanner

65. Which of the following computer language is written in Binary Codes only?

a. Pascal
b. Machine language
c. C
d. C+

66. Cyber Security Act was enacted in Bangladesh in the year-

a. 2018
b. 2020
c. 2022
d. 2023

67. Which of the following is not an image / graphic file format?

a. PNG
b. GIF
c. BMP
d. GUI

68. Which key board command is used to underline a word or sentence is Ms Word?

a. Alt+U
b. Ctrl+U
c. Alt+L
d. Ctrl+Alt+U

69. Number of different characters in ASCII coding system is-

a. 128
b. 2048
c. 4096
d. 8192

70. ABACUS is-

a. A hand operated calculating tool
b. A database management system
c. A programming language
d. An antivirus software

71. Who owns the Java programming language?

a. Oracle Corporation
b. Microsoft Corporation
c. Sun Microsystems
d. IBM

72. Which Memory has the highest speed of access?

a. RAM
b. Cache
c. Hard Disk
d. CD

73. Different banks of Bangladesh introduced Mobile Apps (Android version) for providing online financial services to its customers. Which of the following Mobile Apps have been launched by the scheduled banks?

a. bKash, MTB Smart Banking, iPay and Paytouch
b. UPAY, iPay, Nagad, FastPay and NexusPay
c. NexusPay, CellFin, Citytouch, UPAY and SKYBANKING
d. CellFin, IPay, Nagad, FastPay and Citytouch

74. Which of the following is a function of NPSB?

a. Establishing interoperability among banks for transaction
b. Establishing interoperability among mobile financial service providers
c. Allowing instantancous transfer of money
d. Allowing interoperability among banks and mobile financial service providers

75. Bitcoins are created as a reward for a process known as-

a. mining
b. wallet
c. bubble
d. ledger

76. Ctrl, Shift and Alt are called _____ keys.

a. Alphanumeric
b. Modifier
c. Adjustment
d. Function

77. A pixel is -

a. Computer program that draws picture
b. Picture stored in the secondary memory
c. The smallest resolvable part of a picture
d. Virus

78. Which of the following will translate images of text, drawings, and photos into digital form?

a. Digitizer
b. Modem
c. Scanner
d. Keyboard

79. In order to save a Word document as a web page you need to -

a. Put the appropriate graphics and links on the document
b. Save the document in simple text format
c. Use your web browser as an editor and save as URL
d. Save as HTML

80. Word processing, spreadsheet, and photo-editing are examples of.

a. Application Software
b. System Software
c. Web Development Software
d. Platform Software

81. In MS-Word, CTRL+E will result in -

a. Table
b. Centre alignment
c. Exit from MS word
d. Underlined text

82. Which of the following is not a valid data type in MS-Excel?

a. Number
b. Label
c. Character
d. Date/Time

83. _____ is the common language for Al.

a. Lisp
b. Java
c. PHP
d. Python

84. What is the meaning of OMR?

a. Optical Mark Reader
b. Optical Message Reader
c. Optical Message Render
d. Optical Mark Render

85. In MICR, 'C' stands for -

a. Character
b. Code
c. Color
d. Computer

86. The process of starting a computer is called-

a. Login
b. Booting
c. Formatting
d. Installing

87. What does the 'F5' key typically do in a web browser?

a. Opens a new tab
b. Refreshes the page
c. Closes the window
d. Opens the find tool

88. The smallest unit of data in a computer-

a. Byte
b. Bit
c. Nibble
d. Word

89. Which of the following is used to carry data in a computer?

a. Monitor
b. Cable
c. Bus
d. Fan

90. What kind of software is Microsoft Word?

a. Operating System
b. Web Browser
c. Application Software
d. Programming Language

91. The fastest storage device-

a. Hard Disk Drive (HDD)
b. Solid State Drive (SSD)
c. CD-ROM
d. Floppy Disk

92. What type of device is a scanner?

a. Storage
b. Input
c. Output
d. Processing

93. What is the full form of URL?

a. Uniform Resource Locator
b. Uniform Reference Link
c. Unique Resource Link
d. Universal Resource Location

94. Which of these is not a type of computer memory?

a. RAM
b. ROM
c. CPU
d. Cache

95. The main circuit board of a computer-

a. RAM
b. CPU
c. Hard Drive
d. Motherboard

96. Which company developed the Android operating system?

a. Apple
b. Microsoft
c. Google
d. IBM

97. Which of the following is not a characteristic of solid-state drives (SSDs)?

a. Non-volatile storage
b. Slower than HDD
c. No moving parts
d. More durable than HDD

98. What is the purpose of using 'CAPTCHA'?

a. Scanning for viruses
b. Encrypting data
c. Differentiating between humans and robots
d. Sharing files

99. Which of the following statements about RAM is not correct?

a. RAM is faster than SSD
b. RAM is volatile
c. RAM stores data permanently
d. RAM improves multitasking

100. What is the main function of a firewall in a computer network?

a. Cooling the CPU
b. Filtering incoming and outgoing traffic
c. Increasing internet speed
d. Managing user passwords

101. What kind of device is a joystick?

a. Input device
b. Output device
c. Processing device
d. Storage device

102. The technology company that conducted the first 'Quantum Internet' test in early 2025 Is-

a. Google
b. IBM
c. Huawei
d. Microsoft
e. Test Yourself

103. What is phishing?

a. Fixing bugs in software
b. Creating computer games
c. An internet scam to steal information
d. A type of firewall

104. What type of software is an operating system?

a. Application Software
b. System Software
c. Utility Software
d. Development Software

105. What does "IoT" mean?

a. Internet of Tools
b. Input over Technology
c. Internet of Things
d. Interconnected Optical Transmission