0% found this document useful (0 votes)
2K views33 pages

1st Year COMPUTER Full Book Solved MCQs by Bismillah Academy 0300-7980055

The document contains a set of 51 multiple choice questions related to computer fundamentals. The questions cover topics like computer hardware, software, operating systems, networks, the internet and other basic computer concepts. Answers to the questions are also provided.

Uploaded by

My Office
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views33 pages

1st Year COMPUTER Full Book Solved MCQs by Bismillah Academy 0300-7980055

The document contains a set of 51 multiple choice questions related to computer fundamentals. The questions cover topics like computer hardware, software, operating systems, networks, the internet and other basic computer concepts. Answers to the questions are also provided.

Uploaded by

My Office
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

1ST YEAR COMPUTER

Full Book MCQs


)‫(فائل کو شئیر کرنے سے پہلے کم از کم تین بار درود شریف پڑھ لیں۔‬

Teachers can Join our Official Whatsapp Group For Educational Material.

If You Want to Join our WhatsApp Group, Text us [‘’Your Complete Intro” ] on Whatsapp 0300-7980055
‫سیلیک‬
‫رٹیمکےکدعباپاتسکناریئوفرسںیموطبراریئنیم(لیم)اوروطبرڈیملکیاٹنٹسس(یفلیم) شنیکایتریےکےیل‬
‫امہرےاپسرشتفیالںیئ۔‬
)‫ج۔بلیصحتوھبآہنعلضوینچٹ‬222‫(کچربمن‬
Visit our Official Facebook PAGE (Just Click on Given Link) for Notes, Test Paper, Educational Material.
https://www.facebook.com/bismillahacademy223/

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


1st Year COMPUTER Full Book MCQ's

Objective Type

1. Encircle the Correct Option. ‫۔‬ ‫د دا ہ‬ ‫اب‬ ‫ در‬.1


1) An input device, which is used for playing computer games.
a) Light Pen b) Mouse c) Joy Stick d) Scanner

2) Which one connects two similar networks segments ?


a) Router b) Bridge c) Gate way d) Node

3) Frequency of analog signals measured in .


a) Sec b) BPS c) Volts d) Hertz

4) Extra segment register deals with .


a) Stock Data b) I/O Units c) Mathematical data d) Variables

5) The fly-by-wise system is used in.


a) Medical field b) Airline c) Educated field d) Business Field

6) In a spreadsheet , by default rows are labeled by .


a) Letters b) Special symbols c) Numerbs d) Underscore sign

7) Which of the following techniques uses modulation ?


a) Baseband b) Broadband c) Bandwidth d) Topology

8) World wide web was published / launched in .


a) 1980 b) 1985 c) 1989 d) 1993

9) Communication between computer and keyboard involves.


a) Simplex b) Half Duplex c) Full duplix d) None of these

10) The top most layer of OSI Model is .


a) Session b) Transport c) Presentation d) Application

11) The arithmetic/logic unit performs the following action :

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


a) Control computer b) Perform arithmetic c) Perform logical d) Both b and c
operation functions such as addition comparisons such as equal,
and subtraction etc . greater than , less .

12) The bar that Contains the name of program and document is.
a) Menu bar b) Status bar c) Title bar d) Tool bar

13) Which of the following is related to business ?


a) Marketing b) Stock Exchange c) Banks d) All of these

14) Folder.htt is a part of .


a) Microsoft office b) Microsoft Active c) Microsoft Zip Software d) Microsoft Antivirus
Desktop feature Features

15) Who is responsible for security of online data?


a) User b) Internet service c) LAN administrator d) Organization obtaining the
data

16) Smallest unit of computer memory is called .


a) Bit b) Byte c) Nibble d) Binary interval

17) The default orientation for printing is.


a) Portrait b) Vertical c) Landscape d) Horizontal

18) The length of an IPV4 address is .


a) 4 - bit b) 16 - bits c) 32 - bits d) 64 - bits

19) Amplitude is the characteristic of .


a) Digital signal b) Analog signal c) Parallel signal d) Serial transmission

20) Which function key is used for checking spelling and grammar in MS Word ?
a) F5 b) F7 c) F9 d) F12

21) Memory management is function of .


a) Application software b) Device Driver c) Utility program d) Operating System

22) Which operation is not performed by computers ?


a) Inputting b) Processing c) Controlling d) Understanding

23) A set of electrical paths used to transfer data is called .


a) Printer b) Keyboard c) Monitor d) Bus

24) Which is a storage device ?


a) Floppy b) CPU c) Clock d) BUS

25) Which component of CPU is responsible for interacting with primary memory ?
a) ALU b) Control Unit c) Bus d) Register
Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
26) Computer cannot boot if it does not have.
a) Computer b) Linker c) Interpreter d) Operating System

27) All physical media deals within .


a) Application layer b) Transport layer c) Presentation layer d) Physical layer

28) Which of the following is an example of System Software ?


a) Spread - sheet b) Operating System c) Text editor d) MS - Word

29) Electronic banking is also known as .


a) Cyber Banking b) Offline Banking c) Interactive Bankin d) Global Banking

30) CU stands for .


a) Control unit b) Cache unit c) Calculating unit d) Com unit

31) A virus that replicates itself is called a :


a) Bug b) Worm c) Vaccine d) Bomb

32) Which one is faster ?


a) RAM b) Cache c) Register d) Hard disk

33) Electric path used to transfer data is called .


a) Computer architecture b) Computer Bus c) Computer organization d) None of these

34) Which communication medium requires line-of-sight ?


a) Microwave b) Fiber optic c) Twisted part d) Coaxial

35) Which is a word - processor ?


a) MS-word b) MS-Excel c) Photoshop d) MS-Power Point

36) The printer which can print one complete line at a time is.
a) Dot matrix printer b) Daisy wheel printer c) Laser printer d) Line printer

37) The measurement of things such as finger prints and retinal scans used for security access is called .
a) Biometrics b) Computer Security c) Bio measurement d) Copyright

38) Which is not a Network Type .


a) LAN b) MAN c) WAN d) NAN

39) All are general purpose registers except .


a) EBX b) ECX c) EDX d) EEX

40) The order of stack is.


a) FIFO b) GIGO c) LIFO d) FIGO

41) BIT stands for .


a) Binary tree b) Binary digit c) Binary integer d) Binary interval
Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
42) Computer Based Weather forcasting depends on accurate collection of data from.
a) Weather stations b) Television c) Radar d) Antema

43) Which of the following memory is temporary ?


a) ROM b) RAM c) PROM d) ERROM

44) Shortcut key to save a file in MS Word is.


a) Ctrl + S b) Ctrl + F c) Alt + S d) Alt + F

45) The software used for workgroup computing is called _______


a) Groupware b) Freeware c) Shareware d) Firmware

46) Which one is storage device ?


a) Magnetic b) Printer c) Keyboard d) Camera

47) The component of computer that executes the instruction is called .


a) CPU b) Cache Unit c) RAM d) Mother Board

48) How many bits are carried by one line of data bus ?
a) 1 b) 2 c) 3 d) 4

49) Internet connects one computer from another by .


a) Architecture b) Manufacture c) IP address d) Brand Name

50) Terminal is a.
a) Device to give power b) Point at which data c) The last instruction in a d) Any input/output device
supply to computer enters or leaves the program
computer

51) Computer cannot boot if it does not have .


a) Internet b) Linker c) Interface d) Operating system

52) Which of the following can be used to check the spelling in MS Word?
a) Ctrl + F3 b) F7 c) Alt + F3 d) Ctrl + Shift + F3

53) Hardware components that permanently hold data and programs is called .
a) Primary storage b) Temporary storage c) Secondary storage d) CPU

54) Ctrl + Alt +Del is :


a) An invalid key combination b) Recognized by windows c) Used to close the active d) Both b and c
only window

55) 3 Bytes is equal to .


a) 16 bits b) 20 bits c) 24 bits d) 30 bits

56) Network standards are _________ types .


a) 2 b) 4 c) 6 d) 8
Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
57) It has been estimated that more than _____ percent of all personal computers have a word processor installed .
a) 70 b) 80 c) 90 d) 95

58) The actual working area in Microsoft Excel is :


a) Workbook b) Worksheet c) Spreadsheet d) Note of the above

59) Another name for free software :


a) Encrypted software b) Copy protected software c) Public domain software d) Shareware

60) The electronic circuit that executes computer instruction is called .


a) Keyboard b) CPU c) Monitor d) Hard Disk

61) Each computer on a network is called .


a) Node b) Bus c) Termination d) Point

62) _______ is not kind of register .


a) Flag b) Segment c) Math processor d) Accumulator

63) Typically cladding has diameter of _______ microns .


a) 120 b) 122 c) 124 d) 125

64) The microphone converts the sound into.


a) Mechanical signals b) Computer file c) Electrical signal d) Software

65) The RAM stands for .


a) Random Access b) Reading Available c) Road Access Memory d) Random Access Mode
Memory Memory

66) Physical path that connects the source and receiver known as .
a) Communication channel b) Encoder c) Declare d) Self Testing

67) ______ is a program for entering , calculating , manipulating and analyzing sets of numbers .
a) Word processor b) Text editor c) Spreadsheet software d) Word Art

68) According to the estimation , more than 90 percent of all personal computers have a ____ processor installed .
a) Spreadsheet b) Word c) Image d) Video

69) A computer can be linked to the internet through :


a) A phone-line modem b) DSL c) Cable modem d) All

70) A set of instructions that run the computer are :


a) hardware b) document c) CPUs d) software

71) Web pages are connected to one another using.


a) Hyperlinks b) Interlink c) HTTP d) Multimedia

72) The right of person to keep his information away from others is called.

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


a) Secrecy b) Privacy c) Right d) Private

73) The intersection of a row and a column is called.


a) Intersection b) Field c) Cell d) Address

74) Freely distributed Software without violating copy - right laws are called.
a) Share wave b) Copy protected c) Public Domain d) None of these

75) How many Character ASCII7 bit code represent.


a) 128 b) 256 c) 500 d) 364

76) The process of converting a digital signal to an analog signal is called.


a) Modulation b) Demodulation c) Conversion d) Merging

77) The programs that contains instructions to operate a device is called :


a) Device driver b) Device operator c) device linking d) Device system

78) __________ is the fastest communication mode.


a) Half Duplex b) Simplex c) Full Duplex d) Suplex

79) Which register holds the address of the next instruction to be fetched for execution.
a) PC b) IR c) MAR d) MBR

80) Mobile phone ( Cellular ) system often use .


a) MAN b) WAN c) LAN d) PAN

81) The cell range from A3 to G3 should be written as .


a) A3 - G3 b) A3 : G3 c) A3 ; G3 d) A3 = G3

82) Internal network of an organization that uses internet and web techniques is called .
a) Extrenet b) Intranet c) Uploading d) Downloading

83) All are general purpose registers except?


a) EBX b) Ecx c) EDx d) EEx

84) Transferring information from computer to internet is called .


a) Downloading b) Uploading c) Pasting d) Transferring

85) Which one is fastest ?


a) RAM b) Cashe c) Hard Disk d) Register

86) The folder , which contains administrative tools , is .


a) Installer b) Control panel c) Debugger d) Linker

87) A signal is a representation of .


a) Light wave b) Heat wave c) Sun wave d) Full wave

88) List of documents waiting to be printed on printer is called.


Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
a) Print List b) Print queue c) Print Stock d) Print iline

89) Which of the following protocols is used to access internet ?


a) Ethernet b) Arcnet c) TCP/IP d) SDL

90) Software that is used to view and search pages on internet is .


a) Web server b) Web browser c) Website d) Web pages

91) Testing of a program component is called .


a) Pilot Testing b) Isolating testing c) System testing d) Unit Testing

92) An operating system is a :


a) System utility b) Application software c) System software d) Software package

93) The modem's data transfer rate is measured is.


a) Kbps b) Mbps c) MBPS d) GBP's

94) Which layer in OSI model does data compression ?


a) Session layer b) Presentation layer c) Network layer d) Physical layer

95) The ________ Defense Department established a small computer network .


a) Russia b) USA c) China d) Japan

96) The cells of memory are logically organized into group of .


a) 8 bits b) 5 bits c) 12 bits d) 24 bits

97) Which of the following keyboard shortcuts is used to change the case ?
a) Ctrl + F3 b) Shift + F3 c) Alt + F3 d) Ctrl + Shift + F3

98) ______ is one of the most frequently used packages in any organization .
a) Language processing b) Word processing c) Spread sheet processing d) Character processing

99) The function in MS Excel is used to get the smallest value is called.
a) MAX b) MININUM c) MIN d) SMALLEST

100) The process of producing multiple copies of a document is called.


a) Word processing b) Image processing c) Spread sheets d) Reprographics

101) Which of the following was a Wide Area Network ( WAN ) connecting small number of computer users ?
a) ARPANET b) ARPA c) ISP d) Internet

102) Collection of 4 bits is called .


a) Byte b) 1 KB c) 1 MB d) Nibble

103) Software that is used to detect and removes the virus form the computer is called .
a) Pirated software b) Antivirus c) Virus d) Trojan Horse

104) Imaging uses what device to input data.


Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
a) Scanner b) Icon c) Bar code reader d) Tablet

105) Cabling on linear bus topology can be extended using which of following?
a) Terminator b) Barrel connector c) Network adapter card d) Medium attachment

106) Information technology is a combination of


a) Computing and b) Computing and c) Computing and d) Computing and
mechanical technology mechatronics technology communication technology electrical technology

107) Which of the following is not an example of system software ?


a) Operating system b) Drivers c) Utility program d) Microsoft office

108) How many bits are in one byte ?


a) 2 b) 8 c) 10 d) 12

109) A Telephone Conversation is an example of


a) Full __ duplex b) Half __ Duplex c) Simple transmission d) Duplex transmission
Transmission Transmission

110) The distance between each line of paragraph and margins is called.
a) Indents b) Line spasing c) Paragraph spacing d) Alignment

111) Each computer on a computer network is called a .


a) Link b) Code c) Node d) Mode

112) Header and footer option can be used from which menu ?
a) Tools b) Insert c) Edit d) View

113) How many worksheets are contained in a workbook by default?


a) 3 b) 4 c) 5 d) 6

114) The default number format assigned to a call is.


a) Currency b) Text c) Number d) General

115) If memory location is to be read , CPU places address .


a) MAR b) MBR c) PC d) Accumulator

116) Which of the following memory needs to be refreshed periodically ?


a) DRAM b) SRAM c) FRAM d) ROM

117) Window explorer acts as .


a) Directory Browser b) Word Editor c) Graphic Design d) Image viewer

118) Write space around printed page is called.


a) Margin area b) Cover area c) White area d) Blanks area

119) Data communication requires only a :

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


a) Sender b) Receiver c) Transmission Medium d) All of the above

120) The standard protocol for internet is .


a) TCP b) IP Address c) IP Protocol d) TCP/IP

121) Important property of fiber optic cable is .


a) Noise b) Refraction c) Interference d) Attenuation

122) The format of email address is .


a) Username#DNS-Address b) Username@DNS-Address c) Username & DNS- d) Username $ DNS-
Address Address

123) Who owns the internet ?


a) US government b) United Nations c) Pak telecom d) None of these

124) A computer virus is a .


a) Disease b) Software c) Hardware d) Bacteria

125) Types of software that can be freely distribute without violating copyright laws is called :
a) Shareware b) Public domain c) Copy protected d) a and b

126) CAL stands for.


a) Computer Assisted b) Computer aided c) Computer Added d) Computer Affected
Learning Learning Learning Learning

127) In MS - Excel , formula begins with .


a) > b) < c) = d) = =

128) Start and stops Bits are not required in these types of transmission .
a) Asynchronous b) Iso-synchronous c) Synchronous d) Monochronous

129) Which shortcut key is used for making the character bold ?
a) Alt + B b) CTRL + B c) Shift + B d) Alt + C

130) A secret word or numbers to be typed in on a keyboard before any activity can take place are called :
a) Biometric data b) Data encryption c) Password d) Private word

131) The size of segment register is.


a) 1 byte b) 4 bytes c) 2 bytes d) 8 bytes

132) A Kilobyte is exactly equal to


a) 1 bytes b) 100 bytes c) 256 bytes d) 1024 bytes

133) A device that connects multiple network using similar or different protocol is .
a) Router b) Bridge c) Gateway d) Repeater

134) Information is :

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


a) A marketable commodity b) Can be stolen while c) Should be free according d) All of above
leaving the original behind to the original hacker ethic
:

135) Which of the following type of data is used to displaying action and movement ?
a) Audio b) Video c) Image d) Text

136) Which CPU register holds the address of next instruction to be executed .
a) Instruction Register b) Memory address c) Memory Buffer Register d) Program Counter
register register

137) Many Products are designed by using.


a) CAD b) Robot c) CAM d) ATM

138) Window is the most popular product of .


a) Microsoft b) Sun system c) ANSI d) Hewlett

139) Which of the following device use the parallel transmission ?


a) Baseband b) Broadband c) Bandwidth d) Topology

140) A word processor can be used to.


a) Write Text b) Edit Text c) Print Text d) All of these

141) Which is also called secondary storage ?


a) RAM b) ROM c) Hard Disk d) Primary Storage

142) A set of instructions of computer are .


a) Hardware b) Documents c) CPU d) Software

143) The USA Defense Department initiated a small computer network called ARPA in .
a) 1969 b) 1976 c) 1978 d) 1980

144) Types of application software are .


a) 5 b) 4 c) 3 d) 2

145) A LAN is combination of:


a) Network adapter cards b) LAN cables c) LAN application software d) AB of above

146) CBT Software is used in.


a) Education b) Industry c) E-Commerce d) Business

147) Which of the following is a correct column address?


a) AA b) 25 c) 3B d) C5

148) Short cut key for paste is.


a) Ctrl + C b) Ctrl + A c) Ctrl + V d) Ctrl + P

149) Which one handles processor's communication with peripherals ?


Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
a) ALU b) CU c) I/O Unit d) Bus Interconnection

150) Which register holds the address of the next instruction to be fetched for execution?
a) PC b) MAR c) IR d) MBR

151) ________ is an example of de-facto standard .


a) ISO b) ANSI c) SNA d) IEEE

152) Checking a computer program for error is called .


a) Bugging b) Debugging c) Correcting d) Running

153) The Term that refers to all input , output and secondary storage devices .
a) Peripheral b) Central c) Attached d) Network

154) What layer of OSI mode does data compression?


a) Network b) Presentation c) Data Link d) Physical

155) Two different network can be joined by .


a) Gateway b) Bridge c) Network interface Card d) Cables

156) The function that is used to get the maximum value in MS - Excel is called .
a) MAX b) HIGHEST c) GREATER d) MAXIMUM

157) DSL stands for .


a) Domain Server Link b) Digital Subscriber Link c) Direct Server Lease d) Digital server Line

158) BIT stands for.


a) Binary integer b) Binary c) Binary Digit d) None of these

159) Graphic representation of data in named .


a) Graphics b) Picture c) Chart d) Figure

160) In 32 - bit IP addressing scheme , the value of address ranging from .


a) 0 to 31 b) 0 to 127 c) 0 to 255 d) Unlimited

161) Which component is responsible for comparing the contents of two piece of data ?
a) ALU b) Control unit c) Memory d) None

162) The layer that is responsible for flow control is called .


a) Application b) Session c) Physical d) Transport

163) Data and programs not being used by computer are store in :
a) secondary storage b) cache c) primary storage d) printer

164) The Process of transferring a file from a remote computer to a local computer is called .
a) Uploading b) Downloading c) Server Sharing d) Down Razing

165) A virus that replicates itself is called.


Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
a) Buy b) Vaccine c) Worm d) Bomb

166) Many industries are designing products by using.


a) CAD b) Robot c) CAM d) ATM

167) CPU includes all of the components except .


a) Primary storage b) Control unit c) ALU d) Register

168) The extension of an executable file is .


a) .xls b) .doc c) .ext d) .exe

169) Windows operating system was developed by .


a) Sun system b) Microsoft c) Hewlett d) JAVA

170) Which of the following is related to business ?


a) Marketing b) Stock Exchange c) Banks d) All of these

171) The vertical dimension of spread sheet is called.


a) Field b) Row c) Record d) Column

172) Modern computer can perform calculations or process at ________ high speed.
a) Per second b) Per minute c) Nino second d) None of these

173) Microwave transmission, coaxial cables, and fiber optics are example of :
a) Moderns b) Communications links c) Gateways d) Ring network

174) Under MS-DOS , a user communicates with the operating system by using.
a) Commands b) Instruction c) Routines d) Procedure

175) By default , windows save the documents created in MS - Word in the folder .
a) My documents b) My computer c) Recycle bin d) Windows Explorer

176) CAT stands for.


a) Computerised Axial b) Computer Aided c) Computer Axial d) None of these
Topography Topography Topography

177) Modern Computer can perform calculations of process.


a) Per Second b) Per minute c) Nino second d) None of these

178) Software can be removed / installed through .


a) Control Panel b) Recycle Bin c) My documents d) My computers

179) Testing All Modules of Programs together is called .


a) Volume Testing b) Composite Testing c) Program Testing d) System Testing

180) Which is not an antivirus program ?


a) Noters b) Redlof c) Dr. Salman d) McAfee

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


181) The output of the compiler is called .
a) The program b) Source code c) Linked code d) Object code

182) Viruses are transferred from one computer to another due to .


a) Exchange data and b) Dust in room c) Exchange of displaying d) High temperature of room
program screen

183) Typically , an ATM can be used to.


a) Keeping records b) Watching Movies c) Making budgets d) None of these

184) A device used for optical character recognition is a.


a) Wand reader b) Cursor c) Pen d) MICR reader

185) Which of the following is a word processor ?


a) MS Word b) MS Excel c) MS Access d) MS Power Point

186) The cell range from A3 to G3 should be written as.


a) A3 - G3 b) A3 : G3 c) A3 , G3 d) A3 . G3

187) Which is not included in document management system ?


a) Word processing b) Desktop Publishing c) Reprographic d) E - Shopping

188) The physical layout of network is known as .


a) Topology b) Session c) Link d) Style

189) The maximum number of primary partitions that can be created on a disk is .
a) 2 b) 4 c) 6 d) 8

190) _______ contains permanents IP address .


a) Client b) Server c) User d) Nic

191) A word book is a group of.


a) Tables b) Sheets c) Formulas d) Functions

192) The default number format assigned to a cell is .


a) Currency b) Number c) Text d) General

193) An Automated teller machine can be used for .


a) Keeping records b) Making budgets c) Watching Movies d) Withdraw Cash

194) A virus program is usually hidden in :


a) The operating system b) An application program c) The disk drive d) The operating system
only only and application programs

195) Which One is not a type of ROM ?


a) PROM b) EPROM c) FROM d) EEPROM

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


196) Computer based weather forecasting depends on accurate collection of data from.
a) Television b) Weather stations c) Radar d) Antenna

197) Smallest unit of memory is.


a) Byte b) Bit c) Character d) Word

198) Which of the following protocol is used to access web pages on world wide web.
a) TCP/IP b) Gopher c) HTTP d) HTML

199) Walkie talkie is an example of communication mode.


a) Simple Mode b) Full duplex Mode c) Half duplex mode d) Parallel Mode

200) The brain of computer that executes the instruction is called .


a) CPU b) RAM c) Motherboard d) System unit

201) Project 802 defines standards for which layers of the OSI model?
a) Application and b) Physical and Data c) Transport and Network d) Network and Data Link
presentation layers Link layers layers layers

202) A communication signal in the form of continuous wave called .


a) Digital b) Modulation c) Analog d) None of these

203) Which of the following is used to find information an world wide web?
a) Web browser b) Search engine c) Website d) Web server

204) A right of a person to keep his personal information away from the unauthorized access is called .
a) Piracy b) Privacy c) Personal issue d) Assets

205) Another word for pointer.


a) Monochrome b) Pixel c) Cursor d) None of these

206) Security protection for personal computer include :


a) Internal components b) Locks and cables c) Software d) All of these

207) Data Communication requires only.


a) Sender b) Transmission Medium c) Receiver d) All of these

208) The bar the contains the name of program and document is .
a) Menu bar b) Title bar c) Status bar d) Tool bar

209) A computer drives its basic strength from :


a) Speed b) Memory c) Accuracy d) All of above

210) Making illegal copies of Software is called .


a) Browsing b) Software threat c) Software piracy d) Collaboration

211) The presentation of data entered in the worksheet in a visual format is called .

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


a) Graphics b) Picture c) Header & Footer d) Chart

212) The step that performs the actions given in the instruction is called .
a) Fetch b) Calculator c) Decode d) Execute

213) An additional copy of your stored on storage media is called.


a) Backup of data b) Moving of data c) Set of data d) Transfering Data

214) Signals produced by computer to set over telephone line must be converted to .
a) Modem b) Analog signals c) Digital signals d) Microwave

215) CAL stands for.


a) Computer Aided b) Computer Added c) Computer Assist Learning d) None of these
Learning Learning

216) Which of the following function is used to get current data is MS Excel.
a) Month b) Year c) Today d) Exact

217) A person who gain illegal access to a computer system is called .


a) Hacker b) Worm c) Pirates d) User

218) Word processing software are used to create .


a) Newspapers b) Magazines c) Letters d) All of these

219) Another name for email program is .


a) Internet Explorer b) Mail server c) E-mail Client d) Web Client

220) Which of the following is related to business ?


a) Marketing b) Stock Exchange c) Banks d) All of these

221) Pressing and releasing the left mouse button quickly is called .
a) Left click b) Dropping c) Pointing d) Dragging

222) What percent of PCs in the world might have word processor installed
a) 10 b) 50 c) 80 d) 90

223) The last stage of SDLC is .


a) System development b) System maintenance c) System implementation d) Execution in computer

224) As compared to command line operating system , a GUI operating system is .


a) More difficult b) Easier to use c) More reliable d) More complicated

225) Communication channels can be divided into .


a) Two types b) Three types c) Four types d) Five types

226) Default name of first sheet in any work book is .


a) One b) Sheet 1 c) Sheet one d) First Sheet

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


227) Copying data from internet to computer is called .
a) Downloading b) Downsizing c) Uploading d) Transferring

228) A __________ is an automatic programmable machine.


a) CAD b) CAM c) CBT d) ROBOT

229) A Program that detects the viruses is called .


a) Virus b) Groupware c) Antivirus d) Shareware

230) Which Component of computer is responsible for comparing the contents of two pieces of data ?
a) ALU b) Control Unit c) Memory d) None of these

231) A collection of related worksheets form a .


a) Website b) Workbook c) Word Art d) Spreadsheet

232) One or more computers connected to a hub are .


a) Ring network b) Bus network c) Star network d) Mesh network

233) Which of the following is an absolute address ?


a) A1 b) A1 $ c) A$ 1$ d) None of the above

234) A Connection for similar network uses .


a) NIC b) Bridge c) Gateway d) Router

235) Which of the following is a spreadsheet ?


a) MS Word b) MS Excel c) MS Power Point d) Both a & b

236) Which of the following is not an example of E-Commerce ?


a) Electronic Banking b) Online Chatting c) Online Education d) E - Shopping

237) The topology used for a small number of computers is called .


a) Star b) Bus c) Mesh d) Ring

238) Which of the following is not an output device ?


a) Speaker b) Printer c) Plotter d) Scanner

239) Usually RAM has types .


a) 2 b) 3 c) 4 d) 5

240) Which one is a signal ?


a) I/O b) DMA c) Interrupt d) Memory

241) Soft copy refer to.


a) Screen output b) OCR c) Peripheral devices d) None of these

242) Which component is used to connect different part of the computer together ?
a) Bus interconnection b) Main Memory c) Control Unit d) None of these
Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
243) Web pages are connected to one another using.
a) Hyperlink b) Interlink c) Multimedia d) HTTP

244) The program that contains instructions to operate a device is called .


a) Device driver b) Device operator c) Device linking d) Device System

245) Extra segment register deals with.


a) Stock Data b) Mathematical data c) 1/0 units d) Variables

246) The data and program are stored permanently on the .


a) RAM b) CPU c) Secondary storage d) Primary storage

247) When creating MS Word document the default name of Document is.
a) File b) Document c) Word d) Doc

248) Typically , an ATM can be used to.


a) Keep records b) With draw Money c) Make budgets d) Watch Movies

249) An identification location in memory where data are kept is called .


a) Space b) Adress c) Location d) Cell

250) An Arrangement in which data can be received and simultaneously is called.


a) Simplex b) Half Puplix c) Full deplex d) Semi Duplix

251) Most Application of robotics are in which area?


a) Cooking b) Teaching c) Manufacturing d) Farming

252) Which of the following register acts are counter register ?


a) AX b) BX c) DX d) CX

253) The idea of sharing a program in memory was given by .


a) John Von Neuman b) Dr . Abdul Salam c) Dr . Abdul Qadir d) Pascal

254) Which of the following is a correct column address ?


a) AA b) 25 c) 3B d) C5

255) Which of the following feature enables you to reverse the change you have made to the document?
a) WYSIWYG b) Redo c) Undo d) GUI

256) A collection of related worksheets form a.


a) Website b) WordArt c) Workbook d) Spread sheet

257) The Software which is developed for particular customer is called .


a) Package b) System c) Shareware d) Customized Software

258) The Example of antivirus is .


a) McAfee b) Trojan Horse c) Worm d) Logic Bomb
Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
259) Temporary storage Area with in CPU is called .
a) Register b) ROMS c) RAM d) None of these

260) Windows explorer is used to :


a) Access the Internet b) Explorer system c) Perform maintenance on d) Navigate file and
resources the hard disk folders on the computer

261) The Media Access Control sub layer resides in which layer?
a) Physical b) Data link c) Network d) Transport

262) FDDI is a:
a) Ring network b) Star network c) Mesh network d) Bus network

263) Which of the following is Internet protocol ?


a) TCP/IP b) IEEE c) MAC d) SNA

264) The insertion print in a document is called.


a) Mouse b) Cusor c) End marks d) Erasor

265) Formula can only be applied on :


a) Values b) Labels c) Unmerged cells d) None of the above

266) The extension on MS Word file is.


a) Exxt b) .doc c) .Xts d) .rtx

267) .com , .edu and .gov are examples of .


a) Top level domain b) Protocol c) Tag d) E.mail

268) The modem's data transfer rate is measured is .


a) Kbps b) Mbps c) MBPS d) GBPs

269) CPU is an example of :


a) software b) A program c) hardware d) an output unit

270) The electronic circuits of computer system are called .


a) Software b) Hardware c) Firmware d) Shareware

271) _________ is not a kind of register.


a) Flag b) Accumulation c) Segment d) Math-Co-Processor

272) Which of the following is not Antivirus program ?


a) NOD 32 b) Dr . Dalman c) McAfee d) Logic bomb

273) The name for the screen clarity.


a) Resolution b) Discrete c) Pixel d) LCD

274) Interface used DOS is called .

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


a) Command line b) Menu driven interface c) Graphical User Interface d) Design Interface
interface

275) How many bits are there in 4 - bytes ?


a) 8 b) 16 c) 32 d) 64

276) Which type of Network is the internet ?


a) LAN b) MAN c) WAN d) Both B & C

277) Sparco department gives information about.


a) Robot b) Chatting c) Airline d) Weather

278) CBT stands for.


a) Computer Based Trade b) Computer Based c) Certificate Based d) Computer Basic
Training Training Training

279) Analog signals are measured in .


a) Hearty b) Volt c) Digit d) Watts

280) Which portion of the URL is the domain name?


a) Microsoft.com b) www c) http d) ://

281) Devices which are automatically detected by windows are called .


a) Plug and play b) Serial devices c) Automatic Devices d) Installed devices
devices

282) Which of the following is an absolute address?


a) AI b) $AI c) A$I d) $A$I

283) Internet surfing is an example of .


a) Simplex mode b) Half Duplex Mode c) Duplex Made d) Triplex

284) The actual working area in MS Excel is.


a) Work Book b) Spread Sheet c) Work Sheet d) Clip Board

285) The virus which activates on a specific data and time is called .
a) Chernobal b) Logic Bomb c) Redlof d) Trojan Horse

286) MICR stands for.


a) Magic in Character Redo b) Magnetic Ink Character c) Magnetic Ink Character d) None of these
Reader Recorder

287) If memory location is to be read , CPU places address in.


a) MAR b) PC c) MBR d) Accumulator

288) The Music and speech represent data .


a) Images b) Text c) Numeric d) Audio

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


289) Which one is an example of use of computer in education?
a) CAM b) CAD c) CAL d) CEL

290) How many worksheets are contained in a workbook by default ?


a) 3 b) 4 c) 5 d) 6

291) The process of producing multiple copies of a document is called .


a) Reprographics b) Word c) Spread Sheet d) Image

292) The electromagnetic or light waves that represent data are .


a) Pulse b) Information c) Waves d) Signal

293) Software to peruse the internet.


a) Gateway b) EFT c) Browser d) Teleconferencing

294) An important characteristic of RAM is .


a) Read Only b) Write Only c) Not Volatile d) Volatile

295) Two dissimilar networks can be connected using .


a) Bridge b) Repeater c) Hub d) Gateway

296) The Standard protocol for the internet is .


a) TCP b) IP Address c) IP Protocol d) TCP/IP

297) Which of the following is not a type of BUS ?


a) System Bus b) Data Bus c) Address Bus d) Time Bus

298) In MS Word , the data that is being copied or moved is.


a) Temporarily stored in b) Permanently stored in c) Temporarily stored in d) Permanently stored in
Recycle in Recycle bin Clipboard Clipboard

299) The intersection of a row and a column is called .


a) Intersection b) Cell c) Field d) Address

300) The right to use the software on the computer is called.


a) Software copyright b) Software Piracy c) Site Iicense d) Software Privacy

301) The set of rules to exchange data in a communication network is called .


a) Gateway b) Procedure c) Protocol d) Token

302) The extension of an executeable file is.


a) xls b) doe c) ext d) exe

303) Testing all program components together is called .


a) Volume testing b) System testing c) Group testing d) Composite testing

304) The Bottom layer of OSI model is .

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


a) Application b) Physical c) Transport d) Presentation

305) Which of the following is the most devastating loss to a computer ?


a) Loss of hardware b) Loss of software c) Loss of data d) Loss of printouts

306) Windows operating system was developed by .


a) Sun system b) Microsoft c) Hewlett d) JAVA

307) Which virus executes when starting the computer ?


a) Boot sector b) Logic bomb c) Trojan horse d) Redlof

308) During transmission the contents of the data are changed by using technique .
a) Changing b) Encryption c) Biometric d) Private data

309) Transmission permitting data to move only own way at a time is called.
a) Half Duplex b) Full Duplex c) Simplex d) Start/Stop

310) Which of the following keyboard shortcuts is used to change the case?
a) Ctrl + F3 b) F7 c) Shift + F3 d) Alt + F3

311) ____ is not a biometric technique.


a) Badge b) Retina c) Face d) Palm Print

312) Trojan Horse is a / an .


a) Antivirus b) Virus c) Business Software d) Hardware

313) Which is a storage device ?


a) CPU b) Clock c) Floppy d) Bus

314) Extra segment register deals with .


a) Stock Data b) I/O Units c) Mathematical data d) Variables

315) Clip board in MS-Word stores.


a) Entered text b) Deleted text c) Copied text d) Repeated text

316) What is the most common computer crime of these listed below :
a) Extortion of bank funds b) IRS database sabotage c) Putting people on d) Software piracy
junk mailing lists

317) Register that collect the result of computations are called .


a) Instruction pointer b) Storage Register c) Segment d) Accumulator

318) Add new hardware option exists in .


a) Main menu b) Status bar c) Task bar d) Control Panel

319) Another name of main memory is .


a) Primary storage b) Secondary memory c) Permanent Memory d) Tape storage

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


320) Another name for antivirus is
a) Vaccine b) Worm c) Trojan horse d) DES

321) Example of numeric data is .


a) 5.2 b) 6.4 c) 3456 d) All of these

322) System requirements are created during .


a) Analysis b) Preliminary c) Design d) Development investigation

323) Language translator is of _______ types .


a) 1 b) 3 c) 4 d) 5

324) Communication between a computer and a keyboard involves ____________ transmission.


a) Simplex b) Full duplex c) Half duplex d) Automatic

325) The secret word or number to be typed keyboard before an activity can take place is called .
a) Biocham b) Backup c) Password d) PC

326) Which bus allows the processor to communicate with peripheral device ?
a) System Bus b) Expansion Bus c) Data bus d) Control bus

327) Software to Browse internet is .


a) Gateway b) Bridge c) Browser d) Teleconferencing

328) Data processing is also known as.


a) Accuracy b) Speed c) Computing d) Merging

329) Which CPU register hold the address of next instruction to be executed?
a) Instruction Reqister b) Memory Buffer Register c) Memory address register d) Program Counter
register

330) Which is a type of RAM ?


a) SRAM b) CRAM c) ERAM d) FRAM

331) In Microsoft Windows files are recognized through their.


a) Name b) Extension c) Size d) Type

332) The transmission rate of modem can be measured in.


a) Bits per second b) Characters per second c) Bytes per second d) Words per second

333) The secret word used for data protection is .


a) Biocham b) Backup c) Password d) PC

334) CBT stands for.


a) Computer Based Trade b) Certificate Based Training c) Computer Based d) None of these
Training

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


335) Transmission mode is .
a) 1 b) 2 c) 3 d) 4

336) Data is transmitter block by block in .


a) Synchronous b) Asynchronous c) Digital Transmission d) Analog Transmission
Transmission Transmission

337) MaAfee is an example of .


a) Hacker b) Worm c) Virus d) Antivirus

338) ALU has ______ Units .


a) 2 b) 3 c) 4 d) 5

339) BIT stands for _____________ .


a) Binary Integer b) Binary Interval c) Binary digit d) None of these

340) PTCL is a .
a) Internet b) ISP c) Web browser d) Search engine

341) Most of data transmission over telephone lines use .


a) Serial Transmission b) Digital transmission c) Parallel Transmission d) Hybrid Transmission

342) A domain name is the text version of .


a) IP Address b) Hyperlink c) Hypertext d) HTML

343) An internet software that is used for transferring files from one computer to another .
a) FTP b) ELD c) Token d) Ethernet

344) The symbol that separates different parts of an e - mail address is .


a) $ b) # c) @ d) ^

345) Memory is made up of .


a) Set of wires b) Set of circuits c) Cells d) BIOS

346) The maximum number of primary partitions that can be created on disk is :
a) Two b) Three c) Four d) None of the above

347) The number of times a wave repeats during a specific time interval is called .
a) Pulse b) Amplitude c) Frequency d) Oscillation

348) Layer that is responsible for transferring frames in OSI model is .


a) Application layer b) Presentation layer c) Data link layer d) Session layer

349) A work book is a group of .


a) Tables b) Formulas c) Sheets d) Funtions

350) In the e - mail address , [email protected] , the world " me " is .

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


a) Password b) Username c) Server name d) Client computer

351) Digital signals are commonly called as .


a) Broadband b) Base Band c) Narrow band d) Frequency

352) Any change to the document can be reversed using option.


a) Redo b) Undo c) Do d) Again do

353) Data can be erased using ultravoilet rays written on .


a) RAM b) EROM c) EPROM d) EEPROM

354) A standard IP address is composed of .


a) 4 - bit b) 16 - bits c) 32 - bits d) 64 - bits

355) Which is harmful for computer ?


a) Antivirus b) Virus c) Free ware d) Share ware

356) The software which is used to control all parts of manufacturing process is called .
a) CAD b) MICR c) CAM d) ATM

357) One Mega Byte ( 1 MB ) is equal to .


a) 1 KB b) 100 KB c) 1024 KB d) 1024 Bytes

358) News server use _______ protocol to transfer articles among them .
a) NNTP b) ARCnet c) MIME d) FTP

359) Transmission from satellite to its earth-based station is called .


a) Down-link b) Uplink c) Gateways d) Ring network

360) BCD code is a _________ bit code.


a) 4 b) 8 c) 15 d) 32

361) A collection of related web pages is called .


a) WWW b) Web portal c) Web site d) Web server

362) Absolute reference are created by adding .


a) # sign b) % sign c) @ sign d) $ sign

363) As compared to command line operation system, a GUI operating system is :


a) More efficient b) Easier to use c) More reliable d) All of the above

364) One or more computer connected to a hub computer is a:


a) Ring network b) Node c) Information utility d) Star network

365) Which of the following is used to find information on world wide web?
a) Web Browser b) Web Site c) Search Engine d) Web Server

366) Which device does physical connection of each computer to a network ?


Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
a) Communication Channel b) Router c) Bridge d) Gateway Interface Card

367) An ink jet printer is an example of a (n).


a) Laser printer b) Impact printer c) COM printer d) Non impact printer

368) ______ is related to Business .


a) Bank b) Stock Exchange c) Marketing d) All of these

369) How many types of addressing scheme are ?


a) 2 b) 3 c) 4 d) 5

370) Header and footer option can be used from which menu ?
a) Tools b) Insert c) Edit d) View

371) The process of transferring data from one location to another is called .
a) Data processing b) Data communication c) Data computing d) Data sequencing

372) Internet explorer is used to .


a) Access the internet b) Perform maintenance task c) Explorer system d) Navigate file and folder
resources on computer

373) PTCL is a.
a) Internet b) ISP c) Web browser d) Search engine

374) The devices that receives data .


a) Source b) Sink c) Transmitter d) Encoder

375) Which Software is used to solve everyday person or business tasks .


a) Opening System b) Application Software c) System Software d) Device Drive

376) De-jure means .


a) By nature b) By law c) By fact d) By default

377) Many industries are designing products by using .


a) CAD b) Robot c) CAM d) ATM

378) The workgroup computing is also called _________


a) Groupware b) Collaborative computing c) Workgroup d) Parallel

379) The formula can only be applied on .


a) Values b) Labels c) Unmerged cells d) Title

380) __________ Character are represented by Unicode Scheme.


a) 45536 b) 65536 c) 55536 d) 75536

381) Which components is used to connect different parts of the computer together ?
a) Buses b) Control Unit c) Main Memory d) I/O Unit

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


382) The use of _________ has made a very vital impact on the society .
a) Banks b) Computers c) Departmental stores d) All of these

383) Most of the computer crimes are committed by .


a) Insiders b) Computer Programmers c) Outsiders d) Computer Experts

384) Which type of Network is the internet ?


a) LAN b) MAN c) WAN d) Both B & C

385) Which shortcut key for making the character bold?


a) Alt + B b) Shift + B c) Ctrl + B d) Alt + B

386) An operating system is a .


a) System unit b) System Software c) Application Software d) Software Package

387) Unicode is a ___________ bit code.


a) 16 b) 32 c) 64 d) 8

388) Total Number of layersin OSI model is .


a) 6 b) 7 c) 8 d) 9

389) How many bits are carried by one line of data bus ?
a) 1 b) 2 c) 3 d) 4

390) Header and footer option can be used from which menu?
a) Tools b) Edit c) Insert d) View

391) Select unguided media from the following .


a) Twisted pair b) Coaxial c) Fiber optic d) Satellite

392) A network that places all nodes on a single cable is called .


a) Star b) Mesh c) Ring d) Bus

393) The order of stack is .


a) FIFO b) LIFO c) GIGO d) FIGO

394) CPU sends command signals through


a) Data Bus b) Address Bus c) Control Bus d) Expansion Bus

395) Which one of the following is not a cause of virus ?


a) Pirated software b) Network c) Email d) Logic Bomb

396) What is not a LAN Topology ?


a) Star b) Ring c) Bus d) Band

397) When MS Word is opened , the name of default document or file is.
a) document 1 b) word 1 c) file 1 d) MS Word 1
Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
398) The specialty of spreadsheet software is working with ______
a) Words b) Numbers c) Cells d) Text

399) A web pages in written in .


a) HTML b) SQL c) FTP d) TCP/IP

400) Which one is a signal?


a) 1/0 b) DMA c) Interrupt d) Memory

401) How many pairs of computers can simultaneously communication on Ethernet LAN ?
a) 1 b) 2 c) 3 d) Multiple

402) Which of the following is an E-Mail client :


a) Internet explorer b) Outlook express c) Google d) None of above

403) How many types of partition are ?


a) 2 b) 4 c) 6 d) 8

404) The function that is used to get the minimum value is MS - Excel is called .
a) MAX b) MIN c) MINIMUM d) SMALLEST

405) Terminators are used in ______ topology .


a) Bus b) Star c) Ring d) Mesh

406) The right to use the software are on the computer is called .
a) Software piracy b) Intellectual property right c) Software license d) Software copyright

407) A cell at second column and 15th row has a cell reference .
a) 15A b) 15B c) B15 d) A15

408) Which of the following can be used to launch the Word Art.
a) Status bar b) Standard toolbar c) Ruler d) Drawing toolbar

409) Format C is an example of .


a) Antivirus b) Logic bomb c) Trojan Horse d) Redlof

410) Adding the text on top margin of the page in word processor we use,
a) Header b) Headnotes c) Footer d) Footnotes

411) All files that are deleted from computer are stored in .
a) My document b) Recycle bin c) Printer port d) Desktop

412) CBT Software is used in.


a) Education b) Industry c) E.Commerce d) Business

413) Which of the following is not an example of system software ?


a) MS -Word b) Operating System c) Device driver d) Utility Program
Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
414) Hardware is best described as .
a) Program b) Physical parts c) Procedure d) Hard copy

415) An online area , where users write discussions about a particular subject is called .
a) Email b) FTP c) Newsgroup d) Protocol

416) Which shortcut key for paste is .


a) Ctrl + C b) CTRL + V c) Ctrl + A d) Ctrl + P

417) Computer at home can be used.


a) Keeping records b) Watching Movies c) Making budgets d) All of these

418) Which of the following is not a type of Bus ?


a) Control Bus b) Data Bus c) Address Bus d) Information Bus

419) The vertical dimension of spread sheet is called .


a) Field b) Record c) Row d) Column

420) Which is communication device ?


a) Router b) USB c) CD d) Ethernet

421) Which is not included in DMS ?


a) Word processing b) Desktop publishing c) Reprographic d) E - Shopping

422) Software to use the internet is called .


a) Gateway b) Browser c) EFT d) Tele conference

423) The benefit of CAD may be summed up as.


a) Accuracy b) Speed and flexibility of c) Repeatability d) All of these
production

424) In EBCDIC, How many bits to represent characters are used?


a) 2 b) 4 c) 6 d) 8

425) Additional copy of our data is called .


a) Backup of data b) Taking of data c) Moving of data d) Forwarding of data

426) Which program is used to connect to a remote computer or internet ?


a) WWW ( World Wide b) FTP c) E.mail d) Telnet
Web )

427) Modern computers can perform or process at .


a) Per nano second b) Analog c) Per micro second d) None of these

428) This is the physical path over which a message travel :


a) Protocol b) Medium c) Single d) All of the above

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


429) Small images representing program file etc is called .
a) Menu b) GUI c) Command d) Icon

430) The address of instruction under the process of execution is contain within :
a) Program Counter b) Current Instruction c) Memory Address d) Memory Buffer register
register register

431) Data communication requires only .


a) Sender b) Receiver c) Medium d) All of these

432) In MS Word , the data that is being copied or moved is.


a) Temporarily stored in b) Permanently stored in c) Temporarily stored in d) Permanently stored in
Recycle bin Recycle bin Clipboard Clipboard

433) Signals produced by computer to set over telephone line must be converted to.
a) Modem b) Digital Signal c) Analog Signals d) Microwave

434) Which of the following function is used to get the current date in Excel ?
a) Exact( ) b) Today ( ) c) Month ( ) d) Year ( )

435) The operating system based on NT technology is


a) Windows 95 b) Windows 97 c) Windows 98 d) Windows 2000

436) Physical path that connects the source and receiver known as.
a) Communication channel b) Declare c) Ancoder d) Self Testing

437) The height of wave within a given period of time is known as .


a) Frequency b) Amplitude c) Oscillation d) Pulse

438) Which of the following is a word processor ?


a) Adobe Acrobat b) Photo Express c) MS Excel d) MS Word

439) Which Memory is used to speed up the computer processing ?


a) Cache b) ROM c) BIOS d) FRAM

440) Which one is the fastest .


a) RAM b) Cache c) Hard Disk d) Register

441) The layer of OSI model that establishes connection of user , maintains it and terminates it .
a) Presentation b) Application c) Transport d) Session

442) Which is the following protocol is used to access web pages on world wide web ?
a) TCP/IP b) Gopher c) HTTP d) HTML

443) Page Setup Option is available in which menu.


a) Format b) Insert c) Edit d) File

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


444) MAN stands for .
a) Metropolitan Area b) Metropolitan Arranged c) Market Area Network d) Manufactured
Network Networks Arrangement of Networks

445) GUI stands for .


a) General User Interface b) Graphical User c) Graphical User Icons d) Graphical Usage
Interface Interface

446) The step that performs the actions given in the instruction is called.
a) Fetch b) Decode c) Calculator d) Execute

447) Process of automating office tasks using computer is .


a) Office Support b) Office Automation c) Data Management d) Reprographics

448) Microwave transmission , coaxial cables are fiber optics are examples .
a) Modems b) Communication links c) Gateways d) Ring network

449) Identify LAN's Protocol .


a) TCP/IP b) UDP c) Ethernet d) HTTP

450) Expansion cards are inserted into .


a) Slots b) Plays c) CPU d) CBT

451) A program that disturbs / interferes with the working of a computer system is called .
a) Bacteria b) Anti - virus c) Virus d) Freeware

452) The process of touching an object with mouse pointer is called .


a) Pushing b) Dropping c) Dragging d) Pointing

453) Which is an automatic Programmable machine?


a) CAD b) CAM c) ATM d) ROBOT

454) Which of the following services are provided by internet ?


a) WWW b) FTP c) E-mail d) All of these

455) Who is responsible for security of online data ?


a) User b) LAN administrator c) Internet service d) Organization obtaining the
privider data

456) The process of sharing information among various members of workgroup through computer network is called.
a) Groupware b) Collaborative computing c) Workgroup computing d) Both B & C

457) Which one in not a virus ?


a) Trojan Horse b) Logic bomb c) McAfee d) Redlof

458) A television broadcast is an example of.


a) Full duplex b) Simplex c) Half Duplex d) Mid Duplex
Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI
459) Software to pursue the internet is called .
a) Gateway b) Browser c) EFT d) Tele conference

460) The number of argument in SQRT ( ) function MS - Excel is / are .


a) One b) Equal to Range c) Two d) Equal to column number

461) The length of IP address is :


a) 8 bits b) 16 bits c) 32 bits d) 64 bits

462) By default , windows save the documents created in MS Word in the folder .
a) My document b) My Computer c) Recycle bin d) Windows Explorer

463) The size of segment register is .


a) 1 byte b) 2 bytes c) 4 bytes d) 8 bytes

464) BIT stands for .


a) Binary integer b) Binary digit c) Binary internval d) None of these

465) The register holds the address of the next instruction to be fetched for execution .
a) Program counter b) Counter register c) Instruction register d) Base register

466) A collection of raw fact and figure is called .


a) Data b) Information c) Processing d) Procedure

467) The Out put of Computer is.


a) Program b) Source code c) Linked Code d) Object Code

468) The flow control and error control are the responsibility of .
a) Transport layer b) Network layer c) Data link layer d) Physical layer

469) The computers on internet that contains websites are called .


a) Central computers b) Clients c) Site computer d) Web servers

470) Computer Based weather forcastiny depends on accurate collection of data from.
a) Weather stations b) Television c) Radar d) Antema

471) Many networks includes a central computer that may be called.


a) Server b) Bridge c) Gateway d) Client

472) Most computer crime are committed by :


a) Hackers b) International spies c) Higher trained d) Company insiders who
computer consultants have no extraordinary
technical ingenuity :

473) Which media can be used for backup ?


a) RAM b) ROM c) CPU d) Hard Drive

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI


474) Which of the following device uses the parallel transmission ?
a) Mouse b) Keyboard c) Printer d) Light Pen

475) Initially , the network which connected four university computer system was named as .
a) Intranet b) ARPANET c) NSFNET d) CERNNET

476) A discussion group to exchange information like science and computer is called .
a) E - commerce b) Newsgroup c) FTP d) Chatting

477) CPU provides enabling signal through .


a) Data Bus b) Control Bus c) Address Bus d) Expansion Bus

478) Program's syntax errors are detected by .


a) Tester b) Interpreter c) Loader d) Debugger

479) Many banks provide the facility of .


a) CAD b) CAM c) ATM d) CBT

480) Computer based weather forecasting depends on accurate collection of data from.
a) Radar b) Antema c) Weather station d) Television

481) CPU is also called .


a) ALU b) CU c) Processor d) BUS

482) OSI model was created by .


a) ISO b) ANSI c) IBM d) NESPAK

483) The communication channel can be divided into .


a) Five types b) Four types c) Three types d) Two types

484) Which of the following media cannot be used as backup ?


a) Hard Disk b) Floppy Disk c) RAM d) ZIP disk

485) Software that is available free for a limited period is called ________ .
a) Freeware b) Shareware c) Groupware d) Netware

Bismillah Educational Project of Pakistan by MUHAMMAD USMAN KHICHI

You might also like