CS101 Solved MCQs by Junaid

  1. How many comparisons are required to sort the elements using intersection sort algorithm?
    13, 10, 9, 6, 33, 100
    a) 3
    b) 9
    c) 7
    d) 5
  2. Which One of the following is correct for the symbolic representation of Primitives?
    a) Semantic
    b) Systematic
    c) Abstract
    d) Syntax
  3. An algorithm is __ and distinct from its representation.
    a) Abstract
    b) Vision
    c) Visual
    d) Clear
  4. __ Connects computer over a large geographical area or world
    a) LAN
    b) MAN
    c) WAN
    d) PAN
  5. In computer, GUI stands for____
    a) General user interrupt
    b) Grayed user interface
    c) Graphical user interface
    d) Graphical utility icon
  6. Pseudo Code is a language_______
    a) Algorithm
    b) Independent
    c) Dependent
    d) Sequence
  7. You might search the following or similar thing and might get unpleasant results which
    might depress you.
    a) Stomach Condition
    b) Study
    c) Teaching
    d) Skin condition
  8. A single algorithm can be represented in _ way(s).
    a) Single
    b) Malicious
    c) Modern
    d) Many
  1. We need ______memory to store data permanently.
    a) Volatile
    b) DRAM
    c) RAM
    d) Non-Volatile
  2. Which one of the following is true about process?
    a) Activity of executing an algorithm
    b) Activity of executing a Program
    c) Abstract Representation of machine
    d) Activity of representing pseudo code
  3. One of the major uses of the___ operation is to place zeros in one part of a bit pattern while
    not disturbing the other part.
    a) XOR
    b) NOR
    c) AND
    d) OR
  4. Which of the following is true about TCP in comparison to UDP?
    a) Less reliable but more efficient
    b) More reliable and more efficient
    c) More reliable and less efficient
    d) Less reliable and less efficient
  1. Telnet is used to __ between two systems.
    a) Establish a secure remote connection
    b) Securely share information
    c) Establish a remote connection
    d) Securely transfer files
  2. one term can be used for more than one thing. For example, word “jaguar” is used in two
    meanings such as:
    a) Car and Cat
    b) Car and Bus
    c) Animal and Car
    d) Car and helicopter
  3. determines the number of bits to move radix point to either left or right.
    a) Exponent field
    b) Significant bit
    c) Sign bit
    d) Mantissa field
  4. Breaking the tasks into a number of subtasks compatible with the number of available
    processors is called____
    a) Interactive processing
    b) Scaling
    c) Throughput
    d) Load balancing
  5. __ is a malware which gathers data about your activities on the system and forwards
    it to the outside party without your consent.
    a) Worms
    b) Spyware
    c) Virus
    d) Trojan Horses
  6. Posttest loop structures refer to?
    a) Test for termination is performed before the body is executed
    b) Test for termination is performed as well as the body is executed
    c) Test for termination is performed after the body is executed
    d) Test for termination is performed with the body is executed AL-JUNATD TECH INSTITUTE
  7. Starting with vocabulary words and them giving students a reading passage is an example
    of:
    a) A top-down approach
    b) A cron-up approach
    c) A bottom-up approach
    d) A Pop-up approach
    AL-JUNAID INSTITUE OF GROUP
  8. _____refers to distributed systems that are more loosely coupled than clusters but that still
    work together to accomplish large tasks.
    a) Cloud computing
    b) Parallel Computing
    c) Quantum Computing
    d) Grid Computing
  9. Capacity of one sector CD is of __ KB.
    a) 2
    b) 4
    c) 1
    d) 3
  10. A________ transport layer is said to establish a connection before sending a message.
    a) HTTP
    b) SMTP
    c) TCP
    d) UDP
  11. A sequence of transaction in which the user establishes initial contact with a computer’s
    operating system is called_____?
    a) Logout
    b) Process
    c) Boot state
    d) Login
  12. Most________ codes used today are Huffman codes.
    a) Differential
    b) Relative
    c) Frequency-dependent
    d) Run-length
    29.__ contains the information needed by a browser the proper server and request the
    desired document.
    a) TCP
    b) UDP
    c) SMTP
    d) URL
  13. In black and whites, each pixel is represented as one bit- e.g., 0 for black and 1 for white. It
    is an example of________
    a) Matrix
    b) Email
    c) Facsimile
    d) Searching
  14. How many commons forms of data mining?
    a) Five
    b) Four
    c) Three
    d) Two
  15. In context of environment, computer science have impacts:
    a) Positive
    b) Negative
    c) Dangerous
    d) Both positive and negative
  16. Programming languages are well-designed so that each statement has______ meaning:
    a) Only once
    b) Multiple
    c) No
    d) Same
  17. Access to the forbidden literature is because of:
    a) Computer
    b) Cyber building
    c) Identity theft AL-JUNATD TECH INSTITUTE
    d) Lacking privacy
  18. Content filtering works by matching_____ of characters:
    a) String
    b) Codes
    c) Values
    d) Paragraphs
  19. Copyrights can be applied on:
    a) Dramatic works
    b) Music
    c) Artistic work
    d) All of these
  20. Editing Group have commands:
    a) 2
    b) 3
    c) 4
    d) 5
  21. A file’s________ is normally stored as a separate file on the same mass storage device as
    the _.
    a) Index, indexed file
    b) Sequential, sequential file
    c) Database, database file
    d) Flat, flat file
  22. Major components of syntactic analysis is:
    a) Context
    b) Identifying
    c) Parsing
    d) Understanding syntax
  23. In some cases, the data collection process is readily apparent; in others it is:
    a) Outward
    b) Subtle
    c) Specious
    d) Obvious AL-JUNATD TECH INSTITUTE
  24. Attacks can be made to prevent access to websites by crashing:
    a) Websites
    b) Servers
    c) Network
    d) Database
  25. Electronic Theft include:
    a) Online scam
    b) Harmful advice
    c) Cyber bullying
    d) Unsuitable products
  26. Page group includes options:
    a) Cover page
    b) Page margins
    c) Page color
    d) All of these
  27. Home ribbon contains groups:
    a) Paragraph
    b) Font
    c) Clipboard
    d) All of these
  28. Easy access to online health centers is because of:
    a) Computer science
    b) Artificial Intelligence
    c) Database
    d) Intelligent agents
  29. Microsoft office includes:
    a) Word
    b) Pdf reader
    c) WordPad
    d) All of these
  30. Software licenses are:
    a) Proprietary AL-JUNATD TECH INSTITUTE
    b) Free
    c) Open source
    d) All of these
  31. In the United States the privacy act of 1974 was to protect citizens from abusive use of
    databases:
    a) Government
    b) Public
    c) Agencies
    d) Companies
  32. Matching Geometric Characteristics technique Cannot read:
    a) Images
    b) Pictures
    c) Optical characters
    d) Handwritten Material
  33. The amount of paper use in a year is:
    a) 83 million users
    b) 85 million users
    c) 90 million users
    d) 95 million users
  34. ctrl + Z is used for
    a) Redo
    b) Undo
    c) Save
    d) Load
  35. A program DOCTOR developed by joseph Weizenbaum in the mid-1960’s named as:
    a) Alexa
    b) Smart Doctor
    c) Eliza
    d) Joseph
  36. Turing gave a percentage of a machine that will have a chance to pass Turing test in year:
    a) 2000
    a) 2002

AL-JUNAID INSTITUE OF GROUP

AL-JUNATD TECH INSTITUTE
b) 2008
c) 2012

  1. We can add charts in MS-word from group:
    a) Illustrations
    b) Table
    c) Symbols
    d) Apps
  2. Contact Risks include:
    a) Online Scam
    b) Harmful Advice
    c) Cyber Bullying
    d) Unsuitable products
  3. Computer Security is also Known as:
    a) System-Security
    b) Cyber-Security
    c) Password
    d) Copyright
  4. The people present around the e-waste gain:
    a) Benefits
    b) Diseases
    c) Substances
    d) Electronic waste
  5. Attacks can be made to prevent access to website by crashing:
    a) Website
    b) Servers
    c) Network
    d) Databases
  6. We can increase the size of text from home ribbon group called:
    a) Paragraph
    b) Font
    c) Clipboard
    d) Styles

AL-JUNAID INSTITUE OF GROUP

AL-JUNATD TECH INSTITUTE

  1. Most famous word processor is:
    a) MS- Excel
    b) MS-Word
    c) WordPad
    d) Notepad
  2. When we draw a table in MS-word the table have initial column(s):
    a) Zero
    b) One
    c) Two
    d) Multiple
  3. shortcut key to paste is:
    a) CTRL + P
    b) ALT + P
    c) CTRL + V
    d) ALT + V
  4. Researchers are trying to develop systems that exhibits intelligent behavior in _
    track:
    a) Theoretical
    b) Intelligent
    c) Artificial
    d) Engineering
  5. Pages is an option in the ribbon:
    a) Home
    b) Insert
    c) Review
    d) View
  6. There are many types of sensors including:
    a) Camera
    b) Range Sensors
    c) Microphone
    d) All of these
  7. Reports can be received at home through email because of advancement in: AL-JUNATD TECH INSTITUTE
    a) Computer science

AL-JUNAID INSTITUE OF GROUP

a) Artificial Intelligence
b) Medical databases
c) Hospitals

  1. MS-word is an example of:
    a) Digital software
    b) System software
    c) Word processors
    d) Utility Programs
  2. Ethics and legality are essentials in many industries including:
    a) Government Officers
    b) Doctors
    c) Teachers
    d) All of these
  3. shortcut key of cut is:
    a) CTRL + C
    b) CTRL + X
    c) CTRL + V
    d) CTRL + I
  4. Computer is known is also known as:
    a) System- Security
    b) Cyber-security
    c) Password
    d) Copyright
  5. In MS-Word different type of effects on the text can be applied with:
    a) Text box
    b) Word art
    c) Quick parts
    d) All of the given
  6. The field of artificial intelligence is being pursued along paths:
    a) 2
    b) 3 AL-JUNATD TECH INSTITUTE
    c) 4
    d) 5
  7. __ is not only used as a means of retrieving data from mass storage but also as a
    means of retrieving items form large blocks of data storage in main memory.
    a) Hashing
    b) Indexing
    c) Sequential
    d) Database
  8. ______option in MS-word prevent others from making changes to the selected text.
    a) Block Authors
    b) Protect Authors
    c) Restrict Authors
    d) Prevent Authors
  9. IPR stands for:
    a) Intellectual property restate
    b) Intellectual property rights
    c) Intellectual property resources
    d) Intellectual property release
  10. To control access to the printer, the _ must keep track of whether the printer has been
    allocated
    a) Process
    b) Operating systems
    c) Windows
    d) Booting
  11. __ loop structures referred to as a posttest loop
    a) While
    b) Repeat
    c) For
    d) For each
  12. By using MPEG and MP3 compression techniques, videos cameras are able to record video
    within____
    a) 128 GB storage AL-JUNATD TECH INSTITUTE
    b) 28 MB storage
    c) 128 MB storage
    d) 8 GB storage
  13. Who introduce the idea of storing the program in main memory?
    a) Jhon W. Mauchly
    b) Jhon Von Neumann
    c) J. Presper Eckert
    d) Konrad Zuse
  14. In the reverse engineering process, what refers to the sophistication of the design
    information that can be extracted from the source code?
    a) Interactive
    b) Completeness
    c) Abstraction level
    d) Direction level
  15. When we use _ tag while searching it shows only a particular pages related to it.
    a) @
    b) *
    c) “
    d) #
  16. In CS, we Store and link data in an organized Way using
    a) SDLC
    b) MSDB
    c) DMBS
    d) DBMS
  17. Termination condition is________.
    a) Negation of the condition
    b) Supporting
    c) Halting process
    d) Logical process
  18. If we are interested to see the map of some location, we can use map operator in the
    following way:
    a) Location: map AL-JUNATD TECH INSTITUTE
    b) Map: Location
    c) Mph: Map
    d) Locations
  19. The node or PC which sends requests for services is called_____
    a) Server
    b) Client
    c) Protocol
    d) ISP
  20. Which of the following technology is not related to the client side working?
    a) Java applets
    b) Java script
    c) PHP
    d) HTML
  21. In binary Addition 1+0=
    a) 8
    b) 4
    c) 2
    d) 1
  22. Computer does not stand any language except
    a) Machine Language
    b) Assembly Language
    c) Binary Language
    d) Programming Language
  23. CPU required at least _ to fetch instructions from memory.
    a) Two Nanosecond
    b) Nanosecond
    c) Three Nanosecond
    d) One billion second
  24. Each Textual Symbol is represented with a__________ pattern.
    a) Kilo byte
    b) Unique byte
    c) Byte AL-JUNATD TECH INSTITUTE
    d) Bit
  25. Which of the following is a disadvantage of a linear search?
    a) Requires more space
    b) Greater time Complexities compared to the other searching algorithms
    c) Not easy to understand
    d) Not easy to Implement
  26. In_________ digits on right side represent the fractional part.
    a) Fraction
    b) Decimal
    c) Hexadecimal
    d) Binary
  27. The control of a loop consists of the______ activities.
    a) Two
    b) Three AL-JUNAID INSTITUE OF GROUP
    c) Four
    d) Five
  28. Step wise refinement is a______ methodology in that it progresses from the general to the
    specific.
    a) Bottom up
    b) Top down
    c) Left to right
    d) Right to left
  29. which kind of server work as an intermediate between the client and server.
    a) Client server
    b) Server computer
    c) Super server
    d) Proxy server
  30. The impact of truncation error can be reduced by using________
    a) Longer exponents field
    b) Positive exponent field
    c) Floating point Notation
    d) Longer Mantissa field AL-JUNATD TECH INSTITUTE
  31. When you type a query in the search bar of google. Google finds all those pages which
    contain_________.
    a) All the terms given in the query
    b) None of the terms given in the query
    c) Some of the given terms give in the query
    d) Random
  32. Software units that communicate with controller or sometimes directly to peripheral devices
    called
    a) Utility program
    b) System software
    c) Device drivers
    d) Operating system
  33. Process states include the value of the program counter as well as the contents of the

a) Related memory cells
b) Registers and related memory cells
c) Registers
d) Registers and cache memory cells

  1. Approximately how many entries a typical dictionary in a word processor can contain?
    a) 25,000 entries
    b) 250,000 entries
    c) Less than 25,000 entries
    d) More than 250,000 entries
  2. Previously how many bits were used to store 2`s complement notation.
    a) 8 bits
    b) 16 bits
    c) 64 bits
    d) 128 bits
  3. Which of the following language is used for client-side scripting?
    a) Phyton
    b) JavaScript
    c) PHP
    d) ASP.net AL-JUNATD TECH INSTITUTE
  4. The memory manager allocates____.
    a) Mass storage space
    b) Memory space
    c) Space in the process table
    d) Storage space
  5. the bit 0 represent the value false and bit 1 represents the value_________.
    a) Wrong
    b) True/false
    c) True
    d) Empty
  6. If you want to search for an exact phrase on google ten enclose it in_________.
    a) @
    b) ” ” AL-JUNAID INSTITUE OF GROUP
    c) *
    d) #
  7. On social media, some times a particular _ is very popular.
    a) Hash tag
    b) Symbol
    c) Operator
    d) Word
  8. While (__): here what will be written?
    a) Body
    b) Condition
    c) Function definition
    d) Total number of code lines
  9. When applied to a list with n entries, the binary search algorithm will interrogate an
    average of __ entries
    a) Login
    b) N
    c) Log2n
    d) Nlogn
  10. The set of tasks that ensures the software is correctly implements a specific AL-JUNATD TECH INSTITUTE
    function is known as
    a) Modularity
    b) Verification
    c) Validation
    d) Requirement gathering
  11. Distinction between program believed to the correct and the program that is correct is
    a) Software Modularity
    b) Software requirements gathering
    c) Software verification
    d) Software validation
  12. Establishing a well-defined set of building blocks form which algorithm representations
    can b constructed such a building block is called a _.
    a) Program
    b) Primitive
    c) Block
    d) Pile
  13. The repetitive use of an instructions or sequences of instructions is an important
    algorithmic concept. One method of implementing such repetition is the iterative structure
    known as the_______.
    a) Loop
    b) IF ELSE
    c) Class
    d) Condition
  14. printer is an___________ device.
    a) Output
    b) Input
    c) Input/output
    d) None of the given options
  15. One is that a CPU should be designed to execute a minimal set of instructions. This
    approach is called a_________
    a) CISI
    b) RISC AL-JUNAID INSTITUE OF GROUP
    c) ENVIAC AL-JUNATD TECH INSTITUTE
    d) RISC/CISI
  16. The computers of the _ were not very flexible or efficient.
    a) 1940s and 1950s
    b) 1950s and 1960s
    c) 1930s d) 1961s and 1970`s
  17. Repeated erasing slowly________ the silicon dioxide chambers
    a) Damages
    b) Enhance
    c) Increase
    d) Decrease
  18. For a network to function reliably, it is important to establish rules by which activities are
    conducted. Such rules are called________.
    a) Properties
    b) Patterns
    c) Premises
    d) Protocols
  19. What is full form of JSP?
    a) Java server Pages
    b) Java Script pages
    c) Java semantic pages
    d) Java Source pages
  20. ENIAC stands for
    a) Electronic numerical integrator and calculator
    b) Electronic numbers and integrator and calculator
    c) Electronic numerical integer and calculations
    d) Electronic numbers integer and calculations
  21. Generally how many steps a machine cycle have?
    a) Two
    b) Three
    c) Four
    d) Two or more AL-JUNATD TECH INSTITUTE
  22. One of the earlier computing devices was the.
    a) Laptop
    b) ABACUS
    c) iPhone
    d) Windows
  23. If we have to insertion sort names Fred, Alex, Diana, Byron, Carol
    One approach to sorting this list is to note that the sublist consisting of
    a) Both Fred and Alex
    b) Only carol
    c) Only top name
    d) Sub list having 3 names
  24. if right circular shift is performed on a___________ eight times. Same bit pattern is
    obtained as it started.
    a) Bite size byte pattern
    b) Byte pattern
    c) Byte size and pattern
    d) Bit pattern
  25. A directories can contain other directories called subdirectories constructed a
    __.
    a) Directory system
    b) Network organization
    c) Tree organization
    d) Hierarchical organization
  26. A CPU consists of three parts_______.
    a) ALU/ control unit, register
    b) ALU/MJPEJ/CU
    c) CIRCUIT/MP3/CU
    d) RAM/CACHE/DRAM
  27. By using 16 bits in 2`s complement notation how many maximum positive number can be
    represented
    a) 32768
    b) 32678 AL-JUNATD TECH INSTITUTE
    c) 32867
    d) 32868
  28. Current status of the activity associated with the process is called the
    a) Process Status
    b) Process state
    c) Process association
    d) Process class
  29. A private Key is used to_______ messages.
    a) Send
    b) Receive
    c) Encrypt
    d) Decrypt
  30. which one of the following is not a property of a good algorithm?
    a) Consistency
    b) Unambiguousness
    c) Efficiency
    d) Time Taking
  31. Computer science approaches some problem by establishing a well-defined set of building
    blocks from which algorithms representations can be constructed. These building blocks
    are________
    a) Primitive
    b) Non-Primitive
    c) Scalar
    d) Non-scalar

Question No: 1
It represents the _ flow chart element.
► Flow Line
► Connector

AL-JUNATD TECH INSTITUTE
► Off-page connector
► Start or Stop.
Question No: 2
What is NOT a key factor while designing a website?
► Usability
► User-friendly
► Consistency
► Complexity

AL-JUNAID INSTITUE OF GROUP

Question No: 3:
_% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91
Question No: 4:
In JavaScript, a variable declaration is
► Optional
► Mandatory
► Not allowed
► None of the given
Question No: 5:
A protocol used for receiving email messages is called ___
.
► URL
► Telnet
► POP3

AL-JUNATD TECH INSTITUTE
► SMTP
Question No: 6:
Which is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above

AL-JUNAID INSTITUE OF GROUP

Question No: 7
Serial arrangement in which things follow logical order or a recurrent pattern, such as
statements executing one by one, is called _.
► Loop
► Sequence
► Condition
► Array
Question No: 8
Variables allow us to manipulate data through the __
.
► Actual Value
► Reference
► Length
► Name
Question No: 9
Fuzzy logic is based on __.
► Ground facts
► Experience
► Practice
► Approximation

AL-JUNATD TECH INSTITUTE
Question No: 10
Word Processor is a _____
► System Software
► Application Software
► Device
► Utility
Question No: 11
In the old days, databases did NOT support _.
► Number
► Boolean
► Video
► Text
Question No: 12
In tabular storage, fields placed in a particular row are strongly
.
► Independent
► Dependent
► Interrelated

AL-JUNAID INSTITUE OF GROUP

► Inconsistent
Question No: 13
Due to working at home, lack of interaction may result in _ professional growth.
► Slower
► Faster
► Higher
► Improved

AL-JUNATD TECH INSTITUTE
Question No: 14
Distance learning has got a boost due to the .
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
Question No: 15
__
technique can be used to create smooth animations or to display one of
several images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
Question No: 16
The _ is becoming the preferred organizational structure for more and more
organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
Question No: 17
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called __
.
► Telecom Engineering

AL-JUNATD TECH INSTITUTE
► Computer Engineering
► Computer Science
► Information Technology

Question No: 18
A large number of networks interconnected physically is called . ► LAN ► MAN ► Internet ► Network collection Question No: 19 TCP stands for __.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
Question No: 20
A collection of data organized in such a way that the computer can quickly search for a desired
data item is known as:
► Retrieving
► Database
► Information
► DBMS
Question No: 21
__ is simply a fast port that lets you connect computer peripherals and consumer
electronics to your computer without restart.

AL-JUNATD TECH INSTITUTE
► Freeware
► Shareware
► Firewire
► Firmware

Question No: 22
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
Question No: 23
The key property of the ‘Array’ object in JavaScript is:
► Value
► Length
► Name
► All of the given choices
Question No: 24
Which one is the example of spreadsheet software?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
Question No: 25

AL-JUNATD TECH INSTITUTE
The Encryption of data is related to:
► Data updates
► Data security
► Data integrity
► Data accessibility
Question No: 26
_ is the process of analyzing large databases to identify patterns. ► Data normalization ► Data management ► Data Mining ► None of the given options Question No: 27 Which is the user-friendly way of presenting data? ► Query ► Form ► Report ► All of the given options Question No: 28 JavaScript function fixed () has equivalent HTML tag-set .
 <.FIX>………………
 …………………

………………….

 ………………….
Question No: 29
Tags always placed between the and tags of a Web page:
► True
► False

AL-JUNATD TECH INSTITUTE
Question No: 30
Java script has —————– ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Question No: 31
Google Drive is an example of ———–.
►Grid and cluster Computing
►Cluster Computing
►Cloud Computing
►Grid Computing
Question No: 32
How many comparison are required to sort the element using insertion sort algorithm?
►3
►9
►7
►5
Question No: 33
Which one of the following is correct for the symbolic representation of primitives?
► Semantic
►Systematic
►Abstract
►syntax
Question No: 34
An algorithm is ——and district from its representation.
► Abstract
►vision
►Visual
►Clear
Question No: 35
———– Conects computer over a large geographical area od world.
►LAN

AL-JUNATD TECH INSTITUTE
►MAN
►WAN
►PAN
Question No: 36
In computer, GUI stands for———–.
►general user interrupt
►grayed user interface
►graphical user interface
►graphical utility icon
Question No: 37
Pseudo code is language:
►Algorithm
►independent
►dependent
►Sequence
Question No: 38
You might search the followings or similar thing and might get unpleasant result which might
depress you.
►Stomach condition
►Study
►Teaching
►Skin Condition
Question No: 39
A single algorithm can be represented In ——- way(s).
►Single
►malicious
►Modern
►Many
Question No: 40
The ——in the state of the process must be sufficient to determine uniquely and completely
the action required by each step.
► Date
►instruction
►program
►information

AL-JUNATD TECH INSTITUTE
Question No: 41
We need ———–memory to store data permanently.
►Volatile
►DRAM
►RAM
►Non- Volatile
Question No: 42
Which one of the following is true about a process?
► Activity of executing an algorithm
►Activity of executing a program
►abstract representation of machine
►Activity of representing pseudo code
Question No: 43
One of the major uses of the —- operation is to place zeros in on part of a bit pattern while not
disturbing the other part.
► XOR
►NOR
►AND
►OR
Question No: 44
Which of the following is true about TCP in comparison to UDP?
►Less reliable but more effcient
►more reliable and more efficient
►More reliable but less efficient
►less reliable and less efficient
Question No: 45
In 2s complement, the maximum positive number is represented by------► All 1s
►A single ‘0’ followed by all 1`s
►A single ‘1’ followed by all ‘0’s
►All ‘0’s

AL-JUNATD TECH INSTITUTE
Question No: 46
———— provides a network the internet connectivity.
► Hub
►Node
►Gateway
►Repeater
Question No: 47
Telnet is used to ——- between two systems.
► Establish a secure remote connection
►Securely share information
►Establish a remote connection
►securely transfer files
Question No: 48
One term could be used for more than one thing For example word “Jaguar” is used in two
meaning such as:
► Car and cat
►car and bus
►Animal and car
► Car and helicopter
Question No: 49
————— determine the number of bits to move radix point to either left to right.
► Exponent field
►Significant bit
►Sign bit
► Mantissa field
Question No: 50
Breaking the tasks into number of subtasks compatible with the number of available
processors is called……………
► Interactive processing
►Scaling
►throughput
►load balancing
Question No: 51
———– is a malware which gathers data about your activates on the system and forward it
to the outsides party without your consent.

AL-JUNATD TECH INSTITUTE
►Worms
►Spyware
►Virus
►Trojan Horses
Question No: 52
Post test loop structure refer to?
► Test for termination is performed before the body is executed.
► Test for termination is performed as well as the body is executed.
► Test for termination is performed after the body is executed.
►Test for termination is performed with the body is executed.
Question No: 53
Starting with vocabulary words and then giving student a reading passage is an examples of:
► A top- down approach
►A cron-up approach
►A bottom – up approach
►A pop- up approach
Question No: 54
————- refers to distributed systems that are more loosely coupled than cluster but that
still work together to accomplish large tasks.
►Cloud computing
►parallel computing
►Quantum computing
►Grid Computing
Question No: 55
Capacity of one sector of CD is of ————- KB.
►2
►4
►1
►3
Question No: 56
A ——— transport layer is used to establish a connection before sending a message
► HTTP
►SMTP

AL-JUNATD TECH INSTITUTE
►TCP
►UDP
Question No: 57
A sequence of transection in which the user establishes initial contact with a computer
operating system is called ———► logout
►process
►boot state
►log in
Question No: 58
Most——- codes used today are Huffman codes.
► Differential
►Relative
►Frequency- dependent
►Run-length
Question No: 59
————— contains the information needed by a browser to the contact the proper sever and
request the desired document.
►TCP
►UDP
►SMTP
►URL
Question No: 60
In black and white images, each pixel is represented as one bit – e.g.0 for black and 1 white. It
is as example of…
►Matrix
►Email
►Facsimile
►searching
When the user needs something to be done by the computer, he/she gives
instructions in the form of _Software
to computer Hardware

AL-JUNATD TECH INSTITUTE
 Software, Hardware
 Hardware, Software
 System Software, Application Software
 Graph, Monitor
Choose the correct sequence of technologies used in the evolution of computer
from starting to today.
 Mechanical, Electro mechanical, Vacuum Tubes, Transistors PG # 317
 Electro mechanical, Mechanical, Vacuum Tubes, Transistors
 Electronic, Mechanical, Electro mechanical
 Mechanical, Electrical, Quantum Computing, Transisters

language cannot be executed without an interpreter.
 FORTRAN
 Pascal
 LISP
 C#
is a related collection of WWW files that includes a beginning file called a
homepage



HTML
Website
HTTP
Web page

For drawing charts on the basis of mathematical calculations, which of the
following software is considered most efficient and easiest choice?
 Spreadsheet
 Word Processor
 Database Management System
 Dreamweaver

AL-JUNATD TECH INSTITUTE
Command which saves the selected text before deleting is
 Copy
 Delete
 Cut
 Undo
All the hardware components of the Computer system are installed on— ——— Microprocessor
 Motherboard
 Monitor
 Memory
By default in a web page Hyper Link for another web page is represented
as _ Blue and Underlined
 Blue only
 Black and Underlined
 Blue and Bold
 Blue and Underlined
Language of the microprocessor is called
 HTML
 COBOL
 FORTRAN
 INSTRUCTION SET
The structure in which another list starts before the first list is finished is called
.
 Multiple List
 Nested List PG # 52
 Ordered List
 Un-ordered List
retains its information when the power of the system is turned off.
 RAM
 DIMM
 ROM PG # 25
 SIMM

AL-JUNATD TECH INSTITUTE
In spreadsheets, cell address A12 means .
 Row A, Cloumn 12
 Row 12, Cloumn A
 Row 2,Cloumn A1
 Row A1, Cloumn 2
The key feature of Scientific/Engineering/Graphics applications is
 Intense calculations
 User-friendly
 Reliability
 Cost-effective
Total number of elements in flow chart are

.

 5
 6
 7 PG # 105
 8
The name of computer language used by the Defense Department of the United States
is
.
 Smalltalk
 C
 C++
 Ada
Which one of the following is the correct code syntax in JavaScript?
 onmouseover
 OnMouseOver
 onMouseOver PG # 97
 onMouseover

AL-JUNATD TECH INSTITUTE
The term “Identifier” in JavaScript refers to

.

 Value of a variable
 Name of a variable PG # 195
 A key word
 Type of a variable

The Web Pages developed for human as well as computer understanding are called as
.
 Static Web Pages
 Semantic Web Pages
 Dynamic Web Pages
 Java Web Pages
Which of the following is NOT a category of Mobile computers?
 Laptop
 Palmtop
 Desktop
 Wearable
Hexadecimal number system is based on ——— digits
 2
 8
 12
 16

Share