0% found this document useful (0 votes)
9 views

CS 101 Module 1 to 81 Midterm Preparation by Muzammaldev

Uploaded by

newcompany0315
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

CS 101 Module 1 to 81 Midterm Preparation by Muzammaldev

Uploaded by

newcompany0315
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 189

CS 101 Midterm Preparation

Here are Top important MCQs from your CS101 module 1:

1. What does computer hardware refer to?

o (a) A set of programs

o (b) A set of instructions

o (c) Physical parts of a computer system

o (d) Software programs

2. What is the role of computer software?

o (a) Provide electricity to hardware

o (b) Instruct the computer on what tasks to perform

o (c) Generate hardware designs

o (d) Create physical storage

3. Which of the following is a component of computer hardware?

o (a) Motherboard

o (b) Operating system

o (c) Application program

o (d) Web browser

4. Computer programming is the process of:

o (a) Designing and building an executable program

o (b) Installing software

o (c) Connecting computers

o (d) Processing data

5. What is a computer network primarily used for?

o (a) Running multiple programs


o (b) Sharing resources

o (c) Installing software

o (d) Managing databases

6. Which of these fields involves creating images with computers?

o (a) Graphics

o (b) Algorithms

o (c) Networking

o (d) Programming

7. A robot can be described as:

o (a) A programmable machine capable of performing complex actions

o (b) A graphics software

o (c) A data storage tool

o (d) A computer component

8. What is a database?

o (a) A network of computers

o (b) A structured collection of data for rapid search and retrieval

o (c) A programming language

o (d) A robotic system

9. Which of the following is NOT part of information security?

o (a) Confidentiality

o (b) Animation

o (c) Integrity

o (d) Availability

10. An algorithm is defined as:

o (a) A set of instructions for performing a task

o (b) A computer's hardware


o (c) A networking component

o (d) A programming language

11. Information processing involves:

o (a) Designing graphics

o (b) Manipulation of digital information using IT systems

o (c) Creating algorithms

o (d) Building databases

12. Which application of Computer Science is used in the military?

o (a) Virtual reality

o (b) Pak Army

o (c) IoT

o (d) Security

13. Which field is ranked #1 in international job markets?

o (a) Banking

o (b) Software Development

o (c) Engineering

o (d) Medical

14. Which area of Computer Science deals with AI?

o (a) Back-End Development

o (b) Artificial Intelligence and Machine Learning

o (c) Databases

o (d) Robotics

15. What is the main purpose of studying the basics of Computer Science?

o (a) Focus solely on CS careers

o (b) Make complex topics easier

o (c) Apply knowledge in any field of study


o (d) Learn programming only

16. What does DBMS stand for?

o (a) Data Binding Machine System

o (b) Database Management System

o (c) Data Backup Machine System

o (d) Digital Backup Management System

17. What is the most shared resource in a computer network?

o (a) Graphics card

o (b) Internet connection

o (c) Database

o (d) Keyboard

18. Computer Science applications are found in which of the following fields?

o (a) Only Software Development

o (b) Telecom, Banking, and Hospitals

o (c) Mechanical Engineering

o (d) None of these

19. What does Forbes rank as the top Computer Science job?

o (a) UI Designer

o (b) Software Developer

o (c) IT Manager

o (d) Full-Stack Engineer

20. Which technology is NOT part of Computer Science applications?

o (a) IoT

o (b) Virtual Reality

o (c) Biology

o (d) Data Science


Here are Top important MCQs from your CS101 module 2:

1. What is Breadth First Learning?

o A) Learning one topic in depth first

o B) Learning the basics of multiple topics first

o C) Learning only one topic throughout the course

o D) None of the above

2. What is the other strategy of learning besides Breadth First Learning?

o A) Sequential Learning

o B) Depth First Learning

o C) Advanced Learning

o D) Parallel Learning

3. Which of the following is covered under 'Search Engine Usage Techniques'?

o A) Using multiple browsers

o B) Effective internet searching

o C) Building search engines

o D) None of the above

4. What does 'History of Computing' discuss?

o A) Future technologies

o B) Evolution of modern computers

o C) Current software tools

o D) None of the above

5. What does 'Data Storage' involve?

o A) How data is retrieved

o B) How data is stored in hardware

o C) How algorithms process data


o D) None of the above

6. What does 'Data Manipulation' include?

o A) Storage techniques

o B) Performing arithmetic operations in a computer

o C) Programming languages

o D) Data retrieval techniques

7. Which of the following controls the computer system?

o A) Database

o B) Algorithm

o C) Operating System

o D) Programming language

8. What is an Algorithm?

o A) A programming language

o B) A sequence of steps to perform a task

o C) A type of data structure

o D) None of the above

9. Which programming language basics are covered in this course?

o A) Java

o B) Python

o C) C++

o D) JavaScript

10. What is the role of Software Engineering?

o A) Designing only the user interface

o B) Developing software from requirements to testing

o C) Creating algorithms

o D) None of the above


11. What is 'Data Abstraction'?

o A) Removing all data

o B) Hiding complexities for easier understanding

o C) Writing complex algorithms

o D) None of the above

12. What is a DBMS?

o A) A storage device

o B) A tool for managing and organizing data

o C) A programming tool

o D) None of the above

13. What is the purpose of Artificial Intelligence?

o A) Storing data

o B) Making computers act intelligently

o C) Writing advanced algorithms

o D) Building operating systems

14. What is discussed under 'CS Impact on Society'?

o A) Software tools only

o B) Effect of CS on humans and society

o C) Hardware development

o D) None of the above

15. What does 'Content Filtering' involve?

o A) Creating filters for emails

o B) Blocking inappropriate content

o C) Managing databases

o D) Writing algorithms

16. Which tool is used for word processing in this course?


o A) Microsoft Excel

o B) Microsoft Word

o C) Microsoft PowerPoint

o D) None of the above

17. Which application is used for presentations?

o A) Microsoft Excel

o B) Microsoft Word

o C) Microsoft PowerPoint

o D) Google Docs

18. What is a Spreadsheet used for?

o A) Writing documents

o B) Performing calculations on data

o C) Making presentations

o D) Writing algorithms

19. Which DBMS tool is covered in this module?

o A) Microsoft Excel

o B) Microsoft Access

o C) Microsoft Word

o D) Microsoft PowerPoint

20. What does 'Web Page Development' cover?

o A) Using algorithms for websites

o B) Creating web pages using tools like Dreamweaver

o C) Writing complex code for websites

o D) None of the above


Here are Top important MCQs from your CS101 module 3:

1. What is the most widely used search engine?

o A) Yahoo

o B) MSN

o C) Google

o D) Bing

2. What does a query refer to in a search engine?

o A) A web page

o B) A set of words given for searching

o C) A shortcut key

o D) None of the above

3. What happens when you type a query in Google?

o A) It searches for related videos only

o B) It finds pages containing all the terms in the query

o C) It creates a new webpage

o D) It displays only advertisements

4. Which feature in Google allows searching by speaking?

o A) Search Bar

o B) Translate Option

o C) Microphone Icon

o D) Settings

5. How do you flip a coin using Google?

o A) By clicking on tools

o B) By using microphone

o C) By typing "Flip a Coin" in the search bar

o D) By using Google Assistant


6. What is a common mistake in query formulation?

o A) Using correct medical terms

o B) Using ambiguous or incorrect terms

o C) Writing queries in capital letters

o D) Searching multiple terms together

7. How can you improve search accuracy on Google?

o A) Type the query in lowercase

o B) Use precise and accurate terms

o C) Search using hashtags

o D) Write queries in paragraphs

8. What does case-insensitive mean in Google?

o A) It distinguishes between upper and lowercase

o B) It only recognizes capital letters

o C) It does not distinguish between uppercase and lowercase letters

o D) None of the above

9. What would Google likely interpret the query "Head of virtual university" as?

o A) The head office of Virtual University

o B) The Rector of Virtual University

o C) The Vice Chancellor of Virtual University

o D) None of the above

10. What is the correct query to find the head of Virtual University?

o A) Head of Virtual University

o B) Rector of Virtual University

o C) Office of Virtual University

o D) Chairman of Virtual University

11. What is the result of searching 'COMPUTER SCIENCE' and 'computer science'?
o A) Results will differ

o B) Uppercase queries give higher priority

o C) Results will be the same

o D) Google will ask to correct the query

12. Why should ambiguous terms be avoided in queries?

o A) They are too long

o B) They may lead to irrelevant results

o C) They are case-sensitive

o D) They increase the search time

13. What should you do if "Head Hurts" does not give relevant results?

o A) Use random keywords

o B) Use correct medical terms like "Headache"

o C) Use uppercase letters

o D) Use the microphone

14. What does Google prioritize when finding results?

o A) Pages with images

o B) Pages containing the terms given in the query

o C) Pages from specific websites only

o D) Pages with advertisements

15. Which of the following is a valid query?

o A) Closest Airport"

o B) "Virtual University in Islamabad"

o C) "Airport"

o D) None of the above

16. How does Google handle capitalization in queries?

o A) It prioritizes capital letters


o B) It ignores capitalization

o C) It converts all queries to lowercase

o D) It asks the user to choose

17. Why does using double quotes in queries matter?

o A) It makes Google ignore terms

o B) It looks for the exact phrase within the quotes

o C) It enhances the speed of searching

o D) It randomizes the search

18. Why is Google preferred over other search engines?

o A) It has better advertisements

o B) It has the largest market share

o C) It works faster only on mobile

o D) It supports limited languages

19. How do you search effectively using voice?

o A) By typing the query

o B) By clicking the microphone icon and speaking

o C) By enabling Google Assistant

o D) By typing commands

20. What does “Flip a Coin” demonstrate in Google?

o A) A calculator function

o B) An interactive feature for quick actions

o C) A hidden setting in Google

o D) A random generator
Here are Top important MCQs from your CS101 module 4:

1. How can you find the weather of Lahore on Google?

o A) By typing "Lahore temperature"

o B) By typing "Weather Lahore"

o C) By searching "Lahore forecast"

o D) By typing "Google Weather Lahore"

2. What happens when you type "12*391" on Google?

o A) It shows a multiplication tutorial

o B) It opens a calculator app

o C) It calculates the result and displays it on screen

o D) It shows a math-related webpage

3. Which query will NOT work for performing calculations on Google?

o A) "12+5"

o B) "15-3"

o C) "Maths sum 12 and 5"

o D) "10*2"

4. How can you check the exchange rate for Euros to Pakistani Rupees on Google?

o A) Type "Euro to PKR rate"

o B) Type "100 Euros in PKR"

o C) Type "PKR conversion"

o D) Type "Currency rate"

5. What query would you use to convert kilometers per hour to miles per hour on
Google?

o A) "Convert speed"

o B) "Kph to miles"

o C) "Kph in Mph"
o D) "Speed conversion"

6. What result will you get from typing "Sin 90" in Google?

o A) A random value

o B) The value of Sin(90) in degrees

o C) The result of 90*90

o D) A trigonometric tutorial

7. What does "80/100*200" calculate in Google?

o A) A ratio of 80 to 200

o B) The product of the calculation (160)

o C) A formula explanation

o D) A percentage only

8. Which of these queries will show a result in centimeters?

o A) "Length converter"

o B) "Height in meters"

o C) "m in cm"

o D) "Measure in cm"

9. What kind of result will "Baadshahi Mosque" display on Google?

o A) A historical overview

o B) Pictures, location, and details of Baadshahi Mosque

o C) A detailed map only

o D) A religious website

10. How can you find the profile of Pakistan's cricket team on Google?

o A) "Cricket team players"

o B) "Pakistan Cricket team"

o C) "National cricket players"

o D) "Pakistani cricketers"
11. What does typing "Minar e Pakistan" show on Google?

o A) A map only

o B) A detailed history

o C) Pictures, location, and details about Minar e Pakistan

o D) News about Minar e Pakistan

12. What tool does Google use to calculate "Subtract 10 from 30"?

o A) Math tutorial

o B) Built-in calculator

o C) Online math solver

o D) None of the above

13. What is displayed when you type "Pakistan Cricket team"?

o A) A match schedule

o B) Team details, rankings, and news

o C) Cricket tournament results

o D) A list of retired players

14. Which of the following is an example of a valid Google query for calculation?

o A) "How to calculate 12*5"

o B) "12*5"

o C) "Multiply numbers"

o D) "Perform a calculation"

15. How can you find the value of Tan(80) using Google?

o A) Type "What is Tan 80"

o B) Type "Tan 80"

o C) Type "Solve Tan 80"

o D) Type "Trigonometric value of 80"

16. What does Google NOT do when you search "100 Euros in PKR"?
o A) Display the exchange rate

o B) Convert 100 Euros to Pakistani Rupees

o C) Show a history of exchange rates

o D) Display live currency conversion

17. Which query converts miles to kilometers?

o A) "Miles converter"

o B) "Mph in Kph"

o C) "Miles in speed"

o D) "Miles calculation"

18. What kind of results does typing "Weather Lahore" give?

o A) General information about Lahore

o B) Current temperature and weather conditions in Lahore

o C) A forecast tutorial

o D) News about Lahore weather

19. What tool is activated in Google for mathematical queries like "12+5"?

o A) Graphing calculator

o B) Basic calculator

o C) Advanced math solver

o D) Algebraic tools

20. How can you search for historical places in Pakistan like "Minar e Pakistan"?

o A) Search "Tourist spots in Pakistan"

o B) Search the name directly like "Minar e Pakistan"

o C) Search "Historical places"

o D) Search "Tour guide"


Here are Top important MCQs from your CS101 module 5:

1. What does the "@" symbol in Google searches help you do?

o A) Search for hashtags

o B) Search on specific social media platforms

o C) Search for exact matches

o D) Search for a price

2. How would you search for the FIFA World Cup on Facebook using Google?

o A) "FIFA World Cup hashtag Facebook"

o B) "FIFA World Cup Facebook search"

o C) "FIFA World Cup @facebook"

o D) "FIFA Facebook World Cup"

3. Which query is used to search for a product within a specific price range in
PKR?

o A) "Laptop price 50000 PKR"

o B) "Buy laptop for 50000 PKR"

o C) "Laptop pkr 50000"

o D) "Price of laptop in 50000 PKR"

4. What is the purpose of a hashtag search, like "#education"?

o A) To find blog posts

o B) To search for hashtags on social media platforms

o C) To identify pages using the hashtag on Google

o D) To search for educational content only

5. How can you exclude specific words from your search results?

o A) By using the "@" symbol

o B) By placing the word in double quotes

o C) By adding a minus sign (-) before the word


o D) By using the "*" wildcard

6. If you search "Jaguar -cars", what result will you get?

o A) Results related to both cars and animals

o B) Results excluding "cars" and focusing on other meanings of "Jaguar"

o C) Only car-related results

o D) A mixture of unrelated results

7. What does enclosing a query in double quotes do?

o A) Excludes unrelated results

o B) Searches for the exact phrase as written

o C) Finds synonyms of the words in the query

o D) Broadens the search scope

8. Which query will give results for the exact phrase "Tallest Building in Pakistan"?

o A) Tallest Building in Pakistan

o B) "Tallest Building in Pakistan"

o C) Tallest "Building in Pakistan"

o D) "Tallest" Building in Pakistan

9. What is a wildcard search used for?

o A) To exclude specific words

o B) To search for phrases with missing or unknown words

o C) To find related hashtags

o D) To perform price-based searches

10. Which query will find pages with the phrase "is thicker than water" with any
word before it?

o A) "Is thicker than water"

o B) " is thicker than water"*

o C) "Word is thicker than water"


o D) "*thicker than water"

11. What will happen if you search without double quotes, e.g., Tallest Building in
Pakistan?

o A) Only exact matches are displayed

o B) Results will include any or all of the words in the query

o C) Results will exclude some words

o D) Google will suggest related phrases

12. How can you search for hashtags like "#education" on Google?

o A) Use the "@" symbol before the word

o B) Add a "#" symbol before the word

o C) Enclose the word in double quotes

o D) Add the word in brackets

13. What does the query "FIFA World Cup @Twitter" do?

o A) Searches for FIFA-related tweets on Twitter

o B) Searches Twitter results on Google

o C) Directs you to Twitter's homepage

o D) Shows FIFA World Cup official pages only

14. How does Google handle queries with a wildcard (*) symbol?

o A) It ignores the wildcard

o B) It replaces the wildcard with any matching word

o C) It shows incomplete results

o D) It provides suggestions for the missing word

15. What is the difference between "Tallest Building in Pakistan" and Tallest
Building in Pakistan searches?

o A) The second search excludes buildings outside Pakistan

o B) The first search finds the exact phrase, the second searches all words

o C) Both give the same results


o D) The first shows pictures, the second shows articles

16. What does adding a minus sign (-) in a query do?

o A) Limits search results to specific websites

o B) Excludes results containing the specified word

o C) Narrows the search to exact matches

o D) Allows searching on social media

17. What query format is used to find laptops around 50,000 PKR?

o A) "Laptops 50000 PKR"

o B) "Laptop pkr 50000"

o C) "Laptop price 50000"

o D) "Laptops costing 50000 PKR"

18. If you want to find pages about the phrase "is thicker than water," what should
you type?

o A) "* thicker than water"

o B) "is thicker than water"

o C) " is thicker than water"*

o D) "Is thicker"

19. Which symbol allows you to perform searches specifically on Twitter using
Google?

o A) #

o B) @

o C) -

o D) *

20. What is the main purpose of using double quotes in a search query?

o A) To exclude unrelated results

o B) To ensure the exact phrase is searched

o C) To find hashtags
o D) To search for synonyms

Here are Top important MCQs from your CS101 module 6:

1. How can you search within a range of numbers using Google search operators?

o A) Use the "@" symbol

o B) Use two dots (..) between the numbers

o C) Enclose the range in parentheses

o D) Use "And" between the numbers

2. What query would you use to search for laptops with prices between 25000 PKR
and 35000 PKR?

o A) "laptop pkr25000..pkr35000"

o B) "laptop pkr25000 - pkr35000"

o C) "laptop price between 25000 and 35000 PKR"

o D) "laptop pkr25000 to pkr35000"

3. Which of the following is an example of a Boolean operator search using "AND"?

o A) Computer Or Science

o B) Computer And Science

o C) Computer -Science

o D) Computer | Science

4. What does the query "Computer Or Science" do in Google search?

o A) Returns pages with only the word "computer"

o B) Returns pages with either "computer" or "science"

o C) Only shows pages with both terms together

o D) Excludes results with both terms

5. How would you search for results from a specific website, like YouTube?

o A) "virtual university site:youtube.com"

o B) "virtual university site: youtube.com"


o C) "site: youtube.com virtual university"

o D) "YouTube virtual university"

6. Which operator can be used to find websites similar to YouTube?

o A) related:youtube.com

o B) similar:youtube.com

o C) info:youtube.com

o D) web:youtube.com

7. What would the query "info:youtube.com" provide?

o A) YouTube’s contact information

o B) Information about the website youtube.com

o C) A list of videos on YouTube

o D) YouTube’s site map

8. Which query would show the cached version of a website?

o A) history:youtube.com

o B) cache:youtube.com

o C) backup:youtube.com

o D) past:youtube.com

9. How can you search for a specific file type like a PDF in Google?

o A) "Virtual University filetype:pdf"

o B) "Virtual University filetype:pdf"

o C) "Virtual University .pdf"

o D) "Virtual University file .pdf"

10. What does the query "Virtual University ext:pdf" search for?

o A) Only PDF files

o B) Only Word files

o C) PDF files related to "Virtual University"


o D) All file types

11. Which of the following is true about Boolean operators in Google search?

o A) "Or" operator narrows the search results

o B) "And" operator shows results containing both terms

o C) "And" is used to exclude words from results

o D) "Or" excludes results with both terms

12. What will "laptop pkr20000..pkr50000" return in Google?

o A) Laptops priced at 50000 PKR

o B) Laptops priced between 20000 and 50000 PKR

o C) Laptops with a price of 20000 or 50000 PKR

o D) Laptops priced less than 20000 PKR

13. Which query will provide results for pages about computers or science?

o A) Computer AND Science

o B) Computer OR Science

o C) Computer NOT Science

o D) Computer | Science

14. How would you search for "Virtual University" on a specific website, such as
YouTube?

o A) "Virtual University site:youtube.com"

o B) "Virtual University site: youtube.com"

o C) "YouTube virtual university"

o D) "Virtual University in YouTube"

15. Which search operator can you use to find a specific file type like a PDF?

o A) filetype:

o B) ext:

o C) file:
o D) format:

16. What is the function of the "related:" operator in Google search?

o A) It finds websites related to the specified site

o B) It finds results for specific file types

o C) It finds information about a website

o D) It finds pages on a particular domain

17. What would the search "laptop pkr10000..pkr20000" return?

o A) Laptops priced exactly 10000 or 20000 PKR

o B) Laptops priced between 10000 and 20000 PKR

o C) Laptops with price above 20000 PKR

o D) Laptops without a price range

18. How can you check the cached version of a webpage when the site is down?

o A) use the "archive:" operator

o B) use the "cache:" operator

o C) use the "backup:" operator

o D) use the "view:" operator

19. What does the Boolean operator "OR" do?

o A) Returns results with both terms

o B) Returns results with either of the terms

o C) Excludes results with both terms

o D) Returns results that contain neither term

20. If you search for "Virtual University site:youtube.com," what will you get?

o A) Results from the entire web

o B) Only results from the Virtual University site

o C) Results related to Virtual University from YouTube

o D) A list of YouTube videos


Here are Top important MCQs from your CS101 module 7:

1. What does the "stocks:" operator allow you to search for?

o A) The stock market trend of a particular company

o B) The current price of a stock

o C) Historical data on stock trends

o D) Stocks that are available for purchase

2. What is the correct search query to see the stock market trend for the company
"Apple"?

o A) stocks:apple

o B) stocks:aapl

o C) stock:apple

o D) stock:aapl

3. What would the search query "map:Lahore" show you?

o A) A map of Lahore with satellite view

o B) A map of Lahore

o C) A street view of Lahore

o D) Directions to Lahore

4. Which search operator would you use to find information about a movie?

o A) movie:Apple

o B) movie:steve jobs

o C) film:steve jobs

o D) cinema:steve jobs

5. If you want to compare the nutrient values of two foods, where would you go?

o A) Google Trends

o B) https://www.myfooddata.com/

o C) Google Maps
o D) Wikipedia

6. Which of the following search operators is used to find the definition of a word?

o A) explain:

o B) meaning:

o C) define:

o D) term:

7. What does the "define:" operator allow you to search for?

o A) Definitions of websites

o B) Definitions of search terms or concepts

o C) Definitions of terms

o D) Definitions of company names

8. Where can you search for images using Google?

o A) https://www.images.google.com/

o B) https://images.google.com/

o C) https://googleimages.com/

o D) https://search.google.com/images

9. What can you do with the image search feature on Google?

o A) Find definitions of images

o B) Find similar images to the query image

o C) Edit images

o D) Upload images

10. What is the "Tilt" feature in Google used for?

o A) To rotate images 360 degrees

o B) To rotate the Google screen to 360 degrees

o C) To tilt the text in Google

o D) To tilt Google maps


11. What will happen if you type "Tilt" in Google search?

o A) Google screen will rotate 360 degrees

o B) You will get images of tilted screens

o C) The search results will rotate 360 degrees

o D) Google search will display random results

12. What is the query used to find the stock market trend for "Apple"?

o A) stocks:apple

o B) stock:aapl

o C) stocks:aapl

o D) apple:stocks

13. Which of the following websites is used to compare food nutrient values?

o A) https://www.myfooddata.com/

o B) https://www.foodcompare.com

o C) https://www.foodnutrients.com

o D) https://www.foodanalysis.com

14. What search operator is used to see the map of a location like Lahore?

o A) location:Lahore

o B) map:Lahore

o C) find:Lahore

o D) area:Lahore

15. How can you perform a fun trick to tilt the Google screen?

o A) Use the "spin" command

o B) Type "rotate"

o C) Type "Tilt"

o D) Use the "funny" command

16. What type of information can you find using the "movie:" operator in Google?
o A) Latest movies in theaters

o B) Information about a particular movie

o C) Reviews of movies

o D) Movie trailers

17. What would the query "movie:steve jobs" return in Google?

o A) Reviews of Steve Jobs' life

o B) Movies about Steve Jobs

o C) Information about the movie Steve Jobs

o D) News articles about Steve Jobs

18. What can you use the "define:" operator for in Google search?

o A) To find synonyms of a word

o B) To search for definitions of words

o C) To find definitions of terms

o D) To get detailed meanings

19. Where would you go to perform an image search with a specific query in
Google?

o A) Google Photos

o B) Google Images

o C) Google Search

o D) Google Docs

20. Which of the following is a fun feature you can use on Google?

o A) Rotate images

o B) Tilt the Google screen

o C) Spin the Google page

o D) Zoom in on the Google logo


Here are Top important MCQs from your CS101 module 8:

1. What does the "intitle" operator do in Google search?

o A) It finds web pages with the search term in the title

o B) It finds web pages with the search term in the body

o C) It finds web pages with the search term in the URL

o D) It finds web pages with the search term in the header

2. What would the query "intitle:‘iPhone vs. android’" return?

o A) Web pages containing the phrase "iPhone vs. android" in the body

o B) Web pages containing the phrase "iPhone vs. android" in the title

o C) Web pages with "iPhone" or "android" anywhere

o D) Web pages with "iPhone" and "android" in the URL

3. What is the function of the "allintitle" operator?

o A) It finds web pages with all the search terms in the body

o B) It finds web pages with all the search terms in the title

o C) It finds web pages with any of the search terms in the body

o D) It finds web pages with any of the search terms in the URL

4. What will the query "allintitle:iphone vs. android" return?

o A) Web pages with the word "iphone" in the title and "android" in the URL

o B) Web pages with both "iphone" and "android" in the title

o C) Web pages with either "iphone" or "android" in the title

o D) Web pages with the phrase "iphone vs. android" in the body

5. What does the "inurl" operator find?

o A) Web pages with the search term in the title

o B) Web pages with the search term in the URL

o C) Web pages with the search term in the body

o D) Web pages with the search term in the header


6. What will the query "inurl:2018 ‘virtual university’" return?

o A) Web pages with "2018" in the URL and "virtual university" in the body

o B) Web pages with "2018" and "virtual university" in the title

o C) Web pages with "virtual university" in the URL and "2018" in the body

o D) Web pages with "virtual university" in the URL

7. What is the function of the "allinurl" operator?

o A) It finds web pages with any of the terms in the URL

o B) It finds web pages with all the terms in the URL

o C) It finds web pages with any of the terms in the body

o D) It finds web pages with all the terms in the body

8. What does the "intext" operator allow you to search for?

o A) The search term in the body of the document

o B) The search term in the title

o C) The search term in the URL

o D) The search term in the header

9. What will the query "intext:‘virtual university admissions 2018’" return?

o A) Web pages with "virtual university admissions 2018" in the URL

o B) Web pages with the exact phrase "virtual university admissions 2018"
in the body

o C) Web pages with "virtual university" and "admissions 2018" anywhere in


the body

o D) Web pages with the phrase "virtual university admissions"

10. What is the "allintext" operator used for?

o A) To find any of the search terms in the title

o B) To find all the search terms in the body of the document

o C) To find all the search terms in the URL

o D) To find all the search terms in the header


11. What will the query "allintext:virtual university admissions 2018" return?

o A) Web pages with "virtual university admissions 2018" as an exact phrase in


the title

o B) Web pages with any of the terms "virtual", "university", "admissions",


or "2018" in the body

o C) Web pages with "virtual university" and "admissions 2018" in the body

o D) Web pages with "virtual university admissions 2018" in the URL

12. What is a proximity search used for?

o A) To find documents with specific terms in the title

o B) To find documents with specific terms within a certain distance of


each other

o C) To find documents with specific terms in the header

o D) To find documents with all terms in the body

13. How would you use proximity search to find "Education" and "Virtual university"
within three words of each other?

o A) education IN(3) "virtual university"

o B) education AROUND(3) "virtual university"

o C) education WITHIN(3) "virtual university"

o D) education NEXT(3) "virtual university"

14. What will the query "education AROUND(3) ‘virtual university’" return?

o A) Web pages where "education" appears anywhere in the text

o B) Web pages where "virtual university" appears anywhere in the text

o C) Web pages where both "education" and "virtual university" are within
3 words of each other

o D) Web pages where "education" and "virtual university" appear in the title

15. What is the complex query "site:youtube.com -inurl:https" used for?

o A) To find pages on YouTube with secure HTTPS connections


o B) To find pages on YouTube that are not secured (no HTTPS)

o C) To find secure YouTube pages only

o D) To find YouTube pages that do not contain any URLs

16. What does the "site:" operator do in Google search?

o A) It finds pages with a specific keyword in the title

o B) It restricts search results to a specific website

o C) It finds pages with specific terms in the URL

o D) It finds pages with a specific file type

17. Which of the following operators is used to search for content within the title of
web pages?

o A) intitle

o B) intext

o C) inurl

o D) allintext

18. Which operator would you use to search for all terms within the URL of a web
page?

o A) inurl

o B) intitle

o C) allinurl

o D) intext

19. What does the "allintext" operator do?

o A) Finds any term in the body

o B) Finds all the terms in the body

o C) Finds any term in the URL

o D) Finds all the terms in the title

20. What operator would you use to search for web pages with the term "virtual
university" in the body?
o A) intitle:virtual university

o B) intext:virtual university

o C) allinurl:virtual university

o D) allintext:virtual university

Here are Top important MCQs from your CS101 module 9:

1. What is one of the reasons we should avoid certain searches on Google?

o A) To improve search results

o B) To avoid targeted advertisements

o C) To get better search rankings

o D) To increase the number of search results

2. Why should we avoid searching for our email address?

o A) It can trigger targeted ads

o B) It can lead to security threats

o C) It can increase search results

o D) It can help improve email services

3. Why should medical issues or drugs be avoided in search queries?

o A) It causes more irrelevant results

o B) It can trigger targeted ads related to health

o C) It can slow down the search engine

o D) It increases the chances of finding useful information

4. Which of the following is considered a reason why certain search queries


should be avoided?

o A) It can alert law enforcement agencies

o B) It helps the search engine optimize results

o C) It leads to faster search results


o D) It leads to more accurate results

5. Why should you avoid searching for "free music" on the internet?

o A) It often leads to better music recommendations

o B) It might expose you to viruses or malware

o C) It provides unnecessary information

o D) It increases the cost of streaming services

6. What is a possible consequence of searching for terms like "pressure cooker


bomb story"?

o A) Getting irrelevant search results

o B) Law enforcement agencies may track you

o C) It helps in finding useful information

o D) It leads to more advertisements

7. What is a common reason to avoid searching for terms like "suicide bomb" or
"killers"?

o A) They are sensitive topics that may alert security agencies

o B) They might provide irrelevant results

o C) They help in improving search engine algorithms

o D) They help in finding educational content

8. Why should you avoid searching for terms related to hacking?

o A) It might alert security agencies and lead to investigations

o B) It helps in improving cybersecurity knowledge

o C) It helps find legitimate hacking services

o D) It leads to an increase in search rankings

9. What is one of the potential dangers of searching for "how to make a computer
virus"?

o A) It can result in free software downloads

o B) It may expose you to harmful content or viruses


o C) It helps in finding useful programming tutorials

o D) It improves security awareness

10. What type of topics can lead to unpleasant or disturbing results in search
queries?

o A) Medical symptoms or gruesome content

o B) General information on computers

o C) Educational videos on healthy living

o D) Search results related to technology and security

11. Why is it unsafe to search for "killers" or "underworld" on the internet?

o A) It could improve knowledge of criminal justice

o B) It can attract the attention of law enforcement agencies

o C) It leads to better understanding of world events

o D) It could help in personal security

12. What is one potential danger of searching for "medical symptoms"?

o A) It helps in finding accurate medical advice

o B) It may cause unnecessary anxiety or panic

o C) It improves search engine results for health-related topics

o D) It leads to better medical treatment recommendations

13. Why should you avoid searching for topics like "terrorist attacks"?

o A) It provides useful news information

o B) It can cause unnecessary distress or alert security agencies

o C) It improves knowledge of current affairs

o D) It leads to educational content on global issues

14. What might happen if you search for terms related to religion or politics?

o A) It leads to increased political awareness

o B) It could lead to controversial or biased content


o C) It helps in finding diverse perspectives

o D) It improves your understanding of different beliefs

15. What should you avoid searching to prevent receiving unwanted or harmful
ads?

o A) Your favorite things

o B) Your job history

o C) Your location

o D) Your interests

16. What is a potential risk of searching for "poisons" or "how to make a bomb"?

o A) It might help find educational content on safety

o B) It could trigger law enforcement monitoring

o C) It leads to useful DIY projects

o D) It could help understand public safety measures

17. Why should you avoid searching for disturbing images like "smokers lungs"?

o A) They may improve awareness about health issues

o B) They might depress or disturb you

o C) They lead to informative health-related websites

o D) They help in finding smoking cessation programs

18. Which search term might cause security threats to your computer or data?

o A) Free Music

o B) Downloading free software from unreliable sites

o C) Information about famous musicians

o D) Lyrics of popular songs

19. Which of the following topics should you avoid to prevent upsetting search
results?

o A) Political news

o B) Religious discussions
o C) Skin conditions

o D) Animal care

20. What is a security concern when searching for "how to hack" online?

o A) Exposure to illegal and dangerous content

o B) Finding tutorials on ethical hacking

o C) Improving cybersecurity knowledge

o D) Accessing professional hacking tools

Here are Top important MCQs from your CS101 module 10:

1. What was one of the earliest computing devices?

o A) ENIAC

o B) Abacus

o C) Mark I

o D) Vacuum tube

2. Where is the origin of the abacus traced back to?

o A) Egypt

o B) Ancient China

o C) Ancient Greece

o D) Mesopotamia

3. What was the primary function of the abacus?

o A) Arithmetic calculations

o B) Storing data

o C) Printing results

o D) Generating random numbers


4. Which of the following was a technology used to improve computing after the
Middle Ages?

o A) Punch cards

o B) Gears

o C) Vacuum tubes

o D) Transistors

5. Who is credited with inventing the first gear-driven machine?

o A) Herman Hollerith

o B) Blaise Pascal

o C) Charles Babbage

o D) Gottfried Wilhelm Leibniz

6. What was the key contribution of Charles Babbage to computing?

o A) The invention of the abacus

o B) The design of a machine that would print results on paper

o C) The use of vacuum tubes in computers

o D) The creation of the first desktop computer

7. What innovation did Babbage's machine aim to eliminate?

o A) The need for electricity

o B) Transcription errors

o C) The need for a keyboard

o D) Storage limitations

8. What type of machine was used by Herman Hollerith to speed up the U.S.
Census of 1890?

o A) Punch card machine

o B) ENIAC

o C) Mechanical relay

o D) Punch card machine


9. What did Herman Hollerith's work ultimately lead to the creation of?

o A) IBM

o B) Microsoft

o C) ENIAC

o D) Apple

10. When were punch cards widely used to communicate with computers?

o A) 1960s

o B) 1970s

o C) 1980s

o D) 1950s

11. What is one of the key reasons mechanical-driven machines were replaced by
electronic-driven machines?

o A) Electronics provided more cost-effective solutions

o B) Mechanical machines were too fast

o C) Electronics improved gear positioning

o D) Mechanical machines could not handle complex calculations

12. Which machine was completed at Bell Laboratories in 1940 and was
electromechanical?

o A) ENIAC

o B) Mark I

o C) George Stibitz’s machine

o D) IBM PC

13. Who developed the Mark I machine at Harvard University?

o A) Blaise Pascal

o B) Charles Babbage

o C) Howard Aiken

o D) Steve Jobs
14. Which technology replaced electromechanical relays in computing machines?

o A) Vacuum tubes

o B) Integrated circuits

o C) Gears

o D) Punch cards

15. What was the ENIAC primarily used for?

o A) Storing data

o B) Numerical calculations

o C) Generating random numbers

o D) Programming computers

16. What was the size of the ENIAC machine?

o A) 50 square feet

o B) 500 square feet

o C) 1800 square feet

o D) 5000 square feet

17. How much did ENIAC cost to build?

o A) $200,000

o B) $487,000

o C) $1 million

o D) $2 million

18. Which of the following is one of the facts about ENIAC?

o A) It used only 1000 vacuum tubes

o B) It required 200 kilowatts of electricity

o C) It weighed less than 10 tons

o D) It was smaller than modern-day computers

19. What milestone is associated with the invention of transistors?


o A) The creation of the first vacuum tube

o B) The rapid advancement in computing technology

o C) The creation of the first punch card machine

o D) The development of the first desktop computer

20. What technology helped lead to the creation of personal computers in the
1970s?

o A) Vacuum tubes

o B) Transistors

o C) ENIAC

o D) Punch cards

Here are Top important MCQs from your CS101 module 11:

1. What is the basic unit of storage in computers?

o A) Byte

o B) Bit

o C) Kilobyte

o D) Gigabyte

2. What does the term 'bit' stand for?

o A) Binary Information Technology

o B) Binary Digit

o C) Basic Input Technology

o D) Binary Integer

3. Which of the following can a single bit represent?

o A) Only numbers

o B) Either 0 or 1

o C) Numbers and letters


o D) Only text

4. How many bits are in one byte?

o A) 8 bits

o B) 16 bits

o C) 4 bits

o D) 2 bits

5. How many bytes are in one kilobyte (KB)?

o A) 512 Bytes

o B) 1024 Bytes

o C) 2048 Bytes

o D) 1000 Bytes

6. What is the equivalent of 1 megabyte (MB) in kilobytes (KB)?

o A) 512 KB

o B) 500 KB

o C) 1024 KB

o D) 2000 KB

7. Which of the following is true about bits?

o A) One bit can represent only one number

o B) Bits can represent numbers, text, audio, video, and images

o C) Bits can only represent numbers

o D) Bits can only represent text

8. What does a bit in a computer chip represent?

o A) Electric charge (0 or 1)

o B) A physical object

o C) A color

o D) A sound
9. How many different patterns can be represented by two bits?

o A) 8

o B) 4

o C) 2

o D) 16

10. How many patterns can 4 bits represent?

o A) 64

o B) 256

o C) 16

o D) 32

11. What is the number of patterns that 3 bits can represent?

o A) 128

o B) 8

o C) 16

o D) 32

12. Which of the following is the bit pattern for the number 2 in binary?

o A) 0010

o B) 0001

o C) 0100

o D) 0110

13. What is the binary representation of the decimal number 65?

o A) 11000001

o B) 01000001

o C) 01000001

o D) 10000010
14. Which of the following is the correct way to represent the decimal number 27 in
binary?

o A) 11111

o B) 11011

o C) 10110

o D) 10001

15. Which of the following is the correct method for converting decimal to binary?

o A) Write the number in reverse order

o B) Use powers of 2 and assign bits to match the number

o C) Multiply the number by 2

o D) Add 1 to each bit

16. How many different patterns can 5 bits represent?

o A) 16

o B) 32

o C) 64

o D) 128

17. What is the binary equivalent of the decimal number 4?

o A) 100

o B) 0100

o C) 0110

o D) 0010

18. What is the binary pattern of the character “A” using ASCII code?

o A) 11000001

o B) 01000001

o C) 01100001

o D) 10000001
19. Which of the following is the correct decimal to binary conversion for 128?

o A) 00100000

o B) 10000000

o C) 10000000

o D) 11000000

20. What does the term 'ASCII' stand for in relation to bit patterns?

o A) Advanced Standard for Computing Instructions

o B) American Standard Code for Information Interchange

o C) Audio System Code for Information Interchange

o D) Artificial Standard Code for Information Interchange

Here are Top important MCQs from your CS101 module 12:

1. What does the bit 0 represent in Boolean operations?

o A) True

o B) False

o C) Undefined

o D) 1

2. Which Boolean operation produces an output of 1 only when both inputs are 1?

o A) AND

o B) OR

o C) XOR

o D) NOT

3. Which Boolean operation produces an output of 1 when any of the inputs are 1?

o A) AND

o B) OR

o C) XOR
o D) NOT

4. What does the XOR (exclusive or) operation produce when both inputs are the
same?

o A) 0

o B) 1

o C) Undefined

o D) It depends on the inputs

5. Which Boolean operation produces the output 1 when the inputs are different?

o A) AND

o B) OR

o C) XOR

o D) NOT

6. What does the NOT operation do to its input?

o A) Inverts the output

o B) Flips the bits

o C) Produces 1 if the input is 0, and 0 if the input is 1

o D) It keeps the input unchanged

7. Which of the following is an example of a Boolean operation?

o A) Subtraction

o B) AND

o C) Division

o D) Multiplication

8. If A = 1 and B = 1, what will the output be for the AND operation?

o A) 0

o B) 1

o C) Undefined
o D) 2

9. If A = 0 and B = 1, what will the output be for the OR operation?

o A) 1

o B) 0

o C) Undefined

o D) 2

10. In a NOT operation, if the input is 1, what will the output be?

o A) 0

o B) 1

o C) Undefined

o D) 2

11. What is the result of A AND B if A = 0 and B = 0?

o A) 1

o B) 0

o C) Undefined

o D) 2

12. Which of the following is the output of A OR B if A = 1 and B = 0?

o A) 1

o B) 0

o C) Undefined

o D) 2

13. What is the result of the XOR operation when both A and B are 0?

o A) 0

o B) 1

o C) Undefined

o D) 2
14. In Boolean operations, what is the output of 1 XOR 1?

o A) 0

o B) 1

o C) Undefined

o D) 2

15. Which Boolean operation is also known as exclusive OR (XOR)?

o A) AND

o B) XOR

o C) OR

o D) NOT

16. What does the AND operation result in when both inputs are 0?

o A) 1

o B) 0

o C) Undefined

o D) 2

17. What is the output of the NOT operation if the input is 0?

o A) 1

o B) 0

o C) Undefined

o D) 2

18. What is the Boolean result of A OR B when A = 0 and B = 0?

o A) 1

o B) 0

o C) Undefined

o D) 2

19. What is the output of the XOR operation when A = 1 and B = 1?


o A) 0

o B) 1

o C) Undefined

o D) 2

20. Which operation produces the output of 1 when both inputs are the same?

o A) XOR

o B) AND

o C) OR

o D) NOT

Here are Top important MCQs from your CS101 module 13:

1. Why do we need hexadecimal notation in computing?

o A) To represent binary patterns

o B) To represent decimal values

o C) To simplify long binary bit patterns

o D) To reduce the size of numbers

2. What does hexadecimal notation use to represent bit patterns?

o A) A pair of bits

o B) A symbol for each byte

o C) A single symbol for each group of four bits

o D) A binary pattern for each bit

3. How many bits does one hexadecimal symbol represent?

o A) 2 bits

o B) 8 bits

o C) 4 bits

o D) 16 bits
4. If the binary pattern is 111010000101010100010111, what is the corresponding
hexadecimal notation?

o A) 85517

o B) 1110 1000 0101 0101 0001 0111

o C) E85517

o D) 1111 1111 1010 1010

5. Which of the following is a correct hexadecimal representation for the binary


pattern 1110?

o A) E

o B) 1

o C) F

o D) A

6. What is the hexadecimal representation of the binary number 0101?

o A) 1

o B) 5

o C) 5

o D) 10

7. In hexadecimal notation, which symbol represents the binary pattern 1111?

o A) F

o B) E

o C) D

o D) A

8. What is the hexadecimal equivalent of the binary number 1010?

o A) 9

o B) A

o C) B

o D) 1
9. What is the benefit of using hexadecimal notation over binary notation?

o A) It is simpler for computers to process

o B) It is easier for humans to read and understand

o C) It represents fewer bits

o D) It is faster for computation

10. How would you represent the binary string 111010000101010100010111 in


hexadecimal?

o A) E85517

o B) 110101010101010

o C) 1110 1000 0101 0101 0001

o D) 10101010101010

Here are Top important MCQs from your CS101 module 14:

1. What is the main purpose of the circuits in a computer’s main memory?

o A) To manage input devices

o B) To store a single bit

o C) To store data temporarily

o D) To perform calculations

2. What is the unit of storage in a computer’s main memory?

o A) Cell

o B) Byte

o C) Word

o D) Bit

3. What is a typical example of a circuit used to store a bit in a computer?

o A) Transistor

o B) Microchip
o C) Flip-flop

o D) Capacitor

4. How many bits are typically stored in one cell of a computer’s main memory?

o A) 8 bits

o B) 16 bits

o C) 32 bits

o D) 64 bits

5. What is the main memory of a computer commonly called?

o A) Flash memory

o B) Random Access Memory (RAM)

o C) Storage device

o D) Cache memory

6. What type of memory stores bits as tiny electric charges and refreshes
frequently?

o A) DRAM (Dynamic RAM)

o B) ROM (Read-Only Memory)

o C) SRAM (Static RAM)

o D) Flash memory

7. What is the main characteristic of Synchronous DRAM (SDRAM)?

o A) It is a type of flash memory

o B) It stores bits as static charges

o C) It synchronizes with the system clock for faster access

o D) It does not require refreshing

8. In the memory organization of a computer, which bit is considered most


significant?

o A) The bit on the left side

o B) The bit in the middle


o C) The bit on the right side

o D) The first bit in memory

9. What does the address in computer memory identify?

o A) The type of memory

o B) The size of the memory

o C) The unique location of a cell in memory

o D) The speed of memory access

10. How many cells might a large computer have in its main memory?

o A) A few hundred cells

o B) Billions of cells

o C) Thousands of cells

o D) Millions of cells

Here are Top important MCQs from your CS101 module 15:

1. What is the main advantage of mass storage systems over main memory?

o A) Faster data access

o B) Larger storage capacity and less volatility

o C) Higher speed of processing

o D) Easier access

2. Which of the following is NOT considered a mass storage system?

o A) Magnetic disks

o B) CDs

o C) Flash drives

o D) RAM (Random Access Memory)

3. What is the primary function of a read/write head in a magnetic disk storage


system?
o A) To manage memory allocation

o B) To read data from and write data to the disk

o C) To store data in RAM

o D) To convert data into binary format

4. How are the tracks on a magnetic disk organized?

o A) In linear format

o B) In concentric circles

o C) In rows and columns

o D) Randomly

5. What is a typical size for the data contained in a sector of a magnetic disk?

o A) 10 bytes

o B) 1 KB

o C) 512 bytes to a few KBs

o D) 1 MB

6. What is "seek time" in the context of a magnetic disk?

o A) The time it takes for data to be written to the disk

o B) The time required to move the read/write heads from one track to
another

o C) The time taken for data to rotate under the read/write head

o D) The time taken for the disk to power on

7. What is "rotation delay" in a disk storage system?

o A) Time it takes to access random sectors

o B) The time required for the desired data to rotate to the read/write head

o C) Time for the head to move between zones

o D) Time to start reading the data

8. What does "access time" refer to in the context of a magnetic disk?


o A) Time for data to be written to a sector

o B) The sum of seek time and rotation delay

o C) Time for a disk to complete a full rotation

o D) Time it takes for the read/write head to move between sectors

9. What is the transfer rate of a disk system?

o A) The speed of the disk’s motor

o B) The rate at which data can be transferred to or from the disk

o C) The time it takes to read a single byte

o D) The number of sectors on the disk

10. What is "zoned-bit recording" in a magnetic disk system?

o A) The process of separating data by importance

o B) Adjacent tracks forming zones where all tracks within a zone have
equal sectors

o C) The organization of data in random order

o D) A technique for compressing data

Here are Top important MCQs from your CS101 module 16:

1. What is a key characteristic of a compact disk (CD)?

o A) 12 cm in diameter and consists of a reflective material

o B) 20 cm in diameter and consists of magnetic material

o C) 12 cm in diameter and uses a red laser for reading

o D) 5 cm in diameter and uses a blue-violet laser

2. What is the storage format used in CDs for audio recording?

o A) CD-DA (Compact Disk-Digital Audio)

o B) CD-ROM

o C) DVD-Audio
o D) Blu-ray

3. In a Compact Disk, how is the data stored?

o A) Data is stored on a single-track spiral from inside to outside

o B) Data is stored in separate tracks

o C) Data is stored in concentric circles

o D) Data is stored in sectors arranged randomly

4. What is the typical capacity of a sector on a CD?

o A) 5 KB

o B) 2 KB

o C) 10 KB

o D) 1 MB

5. What type of technology is used to retrieve data from a CD?

o A) Magnetic sensors

o B) Laser that detects irregularities on the reflective surface

o C) Light sensors

o D) Infrared technology

6. What is the primary difference between CDs and DVDs in terms of storage
capacity?

o A) CDs have no sectors, while DVDs do

o B) DVDs have multi-layered semi-transparent layers, providing more


storage

o C) DVDs use a red laser, while CDs use a blue laser

o D) DVDs store data only on the surface, unlike CDs

7. What is the main advantage of Blu-ray Disks (BDs) over DVDs?

o A) Blu-ray Disks have five times the capacity of DVDs

o B) Blu-ray Disks are less expensive than DVDs

o C) Blu-ray Disks use a red laser for data retrieval


o D) Blu-ray Disks are smaller in size than DVDs

8. Which type of light is used in Blu-ray Disks (BDs) for data retrieval?

o A) Red light

o B) Blue-violet light

o C) Green light

o D) Infrared light

9. What is the typical storage capacity of a CD?

o A) 1 GB

o B) 600 to 700 MB

o C) 2 GB

o D) 5 GB

10. Which optical system is best suited for storing long, continuous strings of data?

o A) Magnetic systems

o B) Blu-ray Disks

o C) Optical systems like CDs and DVDs

o D) Flash drives

Here are Top important MCQs from your CS101 module 17:

1. What is one of the main issues with magnetic and optical storage systems?

o A) Physical motion required (moving read/write heads, aiming laser


beams)

o B) High energy consumption

o C) Limited storage capacity

o D) High access time

2. How is data stored in flash drive technology?

o A) By sending electronic signals to trap electrons in tiny chambers of


silicon dioxide

o B) By using magnetic fields to align particles


o C) By creating pits on a reflective surface

o D) By encoding data using laser beams

3. What is the key advantage of flash drive technology over magnetic and optical
systems?

o A) Faster data retrieval

o B) No physical motion required for storing or retrieving data

o C) Larger storage capacity

o D) More reliable over long periods

4. What happens to the silicon dioxide chambers in flash drives over time?

o A) They expand with use

o B) Repeated erasing slowly damages them

o C) They become more efficient with use

o D) They regenerate with power cycles

5. Why are flash drives not suitable as a replacement for main memory?

o A) They are too slow

o B) Not reliable for long-term use and repeated alterations can damage
them

o C) They have higher power consumption

o D) They are not compatible with modern devices

6. What is one of the main uses for flash drives?

o A) Storing operating system files

o B) Storing data in portable devices like cameras and smartphones

o C) Operating as a permanent storage solution for servers

o D) Storing backup data for long-term archival

7. What is a disadvantage of SSDs (Solid State Disks) compared to magnetic


systems?

o A) SSDs are more costly than magnetic systems


o B) SSDs have slower access time

o C) SSDs are noisier than magnetic systems

o D) SSDs require more power than magnetic systems

8. What is the typical storage capacity of an SD (Secure Digital) card?

o A) Up to a few GBs of storage

o B) Up to 100 GBs

o C) Up to 1 TB

o D) Up to 500 MB

9. What is the difference between SDHC and SDXC?

o A) SDHC is used for larger devices, while SDXC is used for smaller devices

o B) SDHC provides up to 32 GB, while SDXC may exceed to TB

o C) SDHC has higher read speeds, while SDXC has higher write speeds

o D) SDHC is for high-capacity storage, while SDXC is for regular storage

10. Which of the following devices typically uses SD cards for storage?

o A) Personal computers

o B) Car navigation systems and cameras

o C) Desktop hard drives

o D) Server storage systems

Here are Top important MCQs from your CS101 module 18:

1. How is each textual symbol represented in computer memory?

o A) By a unique bit pattern

o B) By a unique byte pattern

o C) By a fixed pattern of bits

o D) By a numeric code

2. How many bits are normally used to represent each character in text?
o A) 8 bits

o B) 16 bits

o C) 4 bits

o D) 12 bits

3. What is the total number of bits required to represent the text "Virtual
University" (18 characters)?

o A) 144 bits

o B) 128 bits

o C) 72 bits

o D) 160 bits

4. Which organization developed the American Standard Code for Information


Interchange (ASCII)?

o A) International Organization for Standardization (ISO)

o B) American National Standards Institute (ANSI)

o C) World Wide Web Consortium (W3C)

o D) International Telecommunication Union (ITU)

5. How many unique combinations can be represented by ASCII codes?

o A) 512

o B) 256

o C) 128

o D) 64

6. What is the limitation of ASCII codes?

o A) It only supports digits and punctuation

o B) It supports only 128 characters

o C) It does not support control characters

o D) It only supports lowercase letters

7. Why were extensions to ASCII codes introduced by ISO?


o A) To increase the number of digits

o B) To support additional language symbols

o C) To reduce the file size of texts

o D) To standardize file formats

8. What is the limitation of ASCII extensions?

o A) They only support numbers

o B) 256 characters are insufficient to represent all language symbols

o C) They are not compatible with Unicode

o D) They only support Western languages

9. What is Unicode?

o A) A system for internationalizing codes, supporting thousands of


character sets

o B) A new version of ASCII that supports 128 characters

o C) A file format used for storing text files

o D) A system designed for Western language characters only

10. What is the advantage of UTF-8 encoding over ASCII?

o A) It uses only 8 bits for encoding

o B) It uses 24 to 32 bits, allowing for more symbols

o C) It supports fewer character sets than ASCII

o D) It is faster for processing short texts

.
Here are Top important MCQs from your CS101 module 19:

1. What is the issue with storing numeric values as Unicode?

o A) It is highly efficient for small numbers

o B) It is inefficient because it requires 16 bits for storing values like 12

o C) It consumes very little memory

o D) It supports fewer numeric values

2. How many numeric values can be represented by 16 bits?

o A) 128

o B) 65,536

o C) 256

o D) 32,768

3. What is binary notation used for?

o A) Representing numeric values using only the digits 0 and 1

o B) Representing numeric values using all digits

o C) Storing numbers as characters

o D) Storing numbers as text

4. What is the total number of numeric values that can be represented by 3 bits in
binary notation?

o A) 8

o B) 7

o C) 16

o D) 6

5. How many numeric values can be represented using 4 bits in binary notation?

o A) 8

o B) 16
o C) 10

o D) 12

6. How do you calculate the number of numeric values that can be represented by
n bits?

o A) n2n^2

o B) 2n2n

o C) 2n2^n

o D) n2−1n^2 - 1

7. Which of the following represents the binary notation for storing whole
numbers?

o A) Two’s complement

o B) Floating point notation

o C) ASCII encoding

o D) Hexadecimal notation

8. Which binary notation is used for representing fractional numbers?

o A) Two’s complement

o B) Floating point notation

o C) Signed binary notation

o D) Unsigned binary notation

9. How many numeric values can 16 bits represent in binary notation?

o A) 256

o B) 32,768

o C) 65,536

o D) 16

10. What is the relationship between the number of bits and the number of numeric
values in binary notation?

o A) More bits reduce the number of values


o B) More bits increase the number of values exponentially

o C) More bits increase the number of values exponentially

o D) The number of values is constant regardless of bits

Here are Top important MCQs from your CS101 module 20:

1. What is a pixel in the context of image representation?

o A) A collection of dots

o B) A line segment

o C) A color component

o D) A geometric structure

2. How is a black and white image represented in terms of pixels?

o A) One byte per pixel

o B) One bit per pixel (0 for black, 1 for white)

o C) One pixel per line

o D) One pixel per color

3. In a grayscale image, how many bits are typically used to store the shades of
gray?

o A) 8 bits

o B) 1 bit

o C) 16 bits

o D) 24 bits

4. What does the RGB encoding method use to represent one pixel in a colorful
image?

o A) One byte for red, one byte for blue, and one byte for yellow

o B) One byte for Red, one byte for Green, and one byte for Blue

o C) One byte for each shade of gray


o D) Four bytes for each pixel

5. In image representation, what does the brightness component represent?

o A) The difference between red and blue

o B) The sum of red, green, and blue values

o C) The intensity of the blue component

o D) The average of color components

6. What is chrominance in the context of image representation?

o A) The brightness of a pixel

o B) The amount of red and blue in a pixel

o C) The total color value of a pixel

o D) The sum of all color components

7. What happens to the image when scaling to a larger size?

o A) More pixels are required

o B) The image resolution remains the same

o C) The image becomes less detailed

o D) The image size decreases

8. What technique is used for scaling images to a larger size in digital images?

o A) Geometric structures for image scaling

o B) Pixel reproduction

o C) Compression algorithms

o D) Pixel averaging

9. Which of the following is a popular scalable font technology used by Microsoft


and Apple?

o A) TrueType

o B) PostScript

o C) TrueType and PostScript


o D) OpenType

10. Which of the following is NOT a use case for scalable fonts?

o A) Representing pixel-based images

o B) Computer Aided Design (CAD)

o C) Text rendering

o D) Font scalability across different devices

Here are Top important MCQs from your CS101 module 21:

1. What does the amplitude of sound refer to?

o A) The extent to which air particles are displaced

o B) The frequency of the sound

o C) The pitch of the sound

o D) The duration of the sound

2. How is sound encoded for digital storage?

o A) By sampling the amplitude of sound at regular intervals

o B) By measuring the pitch at regular intervals

o C) By converting frequency to numeric values

o D) By converting sound waves into color patterns

3. What is the typical sampling rate for long-distance telephone communication?

o A) 44100 samples per second

o B) 8000 samples per second

o C) 16000 samples per second

o D) 22050 samples per second


4. In modern CDs, how many samples per second are typically recorded for high
fidelity music?

o A) 44,100 samples per second

o B) 8000 samples per second

o C) 22050 samples per second

o D) 96000 samples per second

5. How many bits are used to store the data from each sample in modern CDs?

o A) 8 bits

o B) 16 bits

o C) 32 bits

o D) 64 bits

6. What is the role of MIDI (Musical Instrument Digital Interface) in sound


representation?

o A) It stores the sound wave directly

o B) It encodes directions for producing music rather than storing the


music itself

o C) It encodes the pitch and frequency of sounds

o D) It stores audio in high-definition formats

7. How much data does 2 seconds of MIDI sound typically require?

o A) 2 million bits

o B) 3 bytes

o C) 44,100 bits

o D) 16 bits

8. What is the main difference between MIDI and traditional sound encoding
methods?

o A) MIDI encodes the "sheet music" for performance, not the actual sound

o B) MIDI stores high-fidelity music recordings


o C) MIDI uses a higher sample rate than regular methods

o D) MIDI stores audio in stereo format

9. What does the data transfer rate for high-quality sound on CDs generally
amount to?

o A) 8000 bits per second

o B) Millions of bits per second

o C) 16,000 bits per second

o D) 44,100 bits per second

10. Which of the following is a limitation of using a low sample rate for encoding
sound?

o A) Reduced audio volume

o B) Lower sound quality and fidelity

o C) Higher storage requirements

o D) Increased data transmission time

Here are Top important MCQs from your CS101 module 22:

1. In binary notation, what is the quantity associated with each position?

o A) Twice the quantity associated with the position to its right

o B) Half the quantity associated with the position to its left

o C) Equal to the quantity associated with the position to its left

o D) A constant value for each position

2. What is the binary representation of the decimal number 32?

o A) 11110000

o B) 10000000

o C) 00100000

o D) 00010000
3. How is the binary system different from the decimal system?

o A) It uses only 0 and 1 at each position

o B) It uses digits from 0 to 9 at each position

o C) It uses the same values for each position as the decimal system

o D) It uses decimal values at the leftmost positions

4. What is the binary representation of the decimal number 255?

o A) 11111100

o B) 10101010

o C) 11111111

o D) 10000000

5. In the binary system, the rightmost position represents which power of 2?

o A) 2^0

o B) 2^1

o C) 2^2

o D) 2^3

6. What is the first step in the algorithm for converting a positive decimal number
to binary?

o A) Divide the number by 2

o B) Find the remainder when the number is divided by 2

o C) Multiply the number by 2

o D) Write the number as it is

7. To convert the decimal number 13 to binary, which of the following steps would
be followed first?

o A) Divide 13 by 2, the quotient is 6, and the remainder is 1

o B) Divide 13 by 2, the quotient is 6, and the remainder is 1

o C) Divide 13 by 3

o D) Divide 13 by 5
8. What is the correct binary representation for the decimal number 75?

o A) 1001010

o B) 1001011

o C) 1101010

o D) 1110101

9. What is the significance of the powers of 2 in binary representation?

o A) Each position represents a power of 2, starting from 2^0 at the


rightmost position

o B) Powers of 2 are used to represent the decimal digits

o C) The power of 2 increases as you move leftward in the binary number

o D) Powers of 2 are irrelevant in the binary system

10. What is the binary representation of the decimal number 128?

o A) 1000000

o B) 10000000

o C) 11000000

o D) 10100000
Here are Top important MCQs from your CS101 module 23:

1. What is the sum when adding two binary digits 1 and 1?

o A) 10

o B) 1

o C) 11

o D) 100

2. In binary addition, what do you do when the sum of two bits equals 2?

o A) Write 1 and carry 1

o B) Write 0 and carry 1

o C) Write 2 and carry 0

o D) Write 1 and carry 0

3. Which of the following is the correct sum for adding 1 and 0 in binary?

o A) 1

o B) 0

o C) 10

o D) 11

4. When performing binary addition, which direction do you add the bits?

o A) From right to left

o B) From left to right

o C) From top to bottom

o D) From bottom to top

5. If you add two binary digits 0 and 0, what is the sum?

o A) 0

o B) 1

o C) 10

o D) 11
6. What is the binary sum of 101 and 110?

o A) 1111

o B) 1011

o C) 1001

o D) 1101

7. When binary addition results in a carry, where does the carry go?

o A) To the next bit on the left

o B) To the next bit on the right

o C) To the next bit on the top

o D) It doesn't affect the result

8. What is the correct sum of 111 and 101 in binary addition?

o A) 1100

o B) 1111

o C) 1001

o D) 1101

9. Which rule applies when performing binary addition?

o A) If the sum of two bits is 2, write 0 and carry 1

o B) If the sum of two bits is 1, write 1 and carry 0

o C) If the sum of two bits is 3, write 1 and carry 1

o D) If the sum of two bits is 2, write 1 and carry 1

10. What do we do when the sum of two binary digits equals 1?

o A) Write 0 and carry 1

o B) Write 1 and carry 0

o C) Write 1 and carry 1

o D) Write 0 and carry 0


Here are Top important MCQs from your CS101 module 24:

1. What does the radix point in binary represent?

o A) A separator between whole numbers and fractions

o B) A separator between whole numbers and fractional parts

o C) A point for representing the number of bits

o D) A decimal point used for binary numbers

2. Which side of the radix point in binary represents the fractional part?

o A) The right side

o B) The left side

o C) The top side

o D) Both sides

3. What is the binary equivalent of the decimal number 1.5?

o A) 1.1

o B) 1.01

o C) 10.1

o D) 1.01

4. How do you perform binary addition with fractions?

o A) Align the fractions and add directly

o B) Align the radix points and perform binary addition as with whole
numbers

o C) Ignore the fractional part and add the whole numbers

o D) Convert the fractions to decimals before adding

5. Which of the following is the correct sum of 10.011 and 100.11 in binary
addition?

o A) 111.001

o B) 101.111

o C) 110.101
o D) 111.100

6. What does the left side of the radix point represent in binary numbers?

o A) The whole number part

o B) The fractional part

o C) The exponent in scientific notation

o D) The magnitude of the number

7. In binary fractions, how is the fractional part expressed?

o A) As a series of powers of 2

o B) As a series of powers of 10

o C) As a series of whole numbers

o D) As a series of negative powers of 2

8. Which binary number represents the fraction 0.25?

o A) 0.001

o B) 0.01

o C) 0.100

o D) 0.10

9. How is a binary fraction like 10.011 interpreted?

o A) 10 + 0.011

o B) 10 + (0.5 + 0.0625)

o C) 10 + (0.25 + 0.125)

o D) 10 + 0.11

10. When performing binary addition with fractions, what should be aligned?

o A) The whole numbers only

o B) The radix points

o C) The fractional parts only

o D) The powers of two


. Here are Top important MCQs from your CS101 module 25:

1. Which of the following is the most popular system for representing integers in
computers today?

o A) 2’s complement notation

o B) One’s complement notation

o C) Sign-magnitude notation

o D) Binary-coded decimal

2. In 2’s complement notation, what does the leftmost bit represent?

o A) Magnitude of the number

o B) Sign of the number

o C) Position of the number

o D) Exponent of the number

3. How many bits are commonly used in modern computers to represent integers
in 2’s complement notation?

o A) 8 bits

o B) 32 bits

o C) 16 bits

o D) 64 bits

4. What is the 2’s complement representation of -7 if the binary representation of


7 is 0111?

o A) 0110

o B) 1000

o C) 1001

o D) 1110

5. In 2’s complement notation, how do you convert a positive number to its


negative counterpart?

o A) Subtract one from the binary number


o B) Complement all the bits starting from the first 1

o C) Add one to the binary number

o D) Shift the bits to the left

6. What is the maximum positive number that can be represented with 4 bits in 2’s
complement notation?

o A) 15

o B) 8

o C) 7

o D) 4

7. What happens in 2’s complement addition if an overflow occurs?

o A) The result will be correct

o B) The result will be zero

o C) The result will be incorrect and will be deduced using the sign bit

o D) The result will be a negative value

8. Which of the following is an example of a 2’s complement addition overflow


error?

o A) 2 + 2 = 4

o B) 5 + 4 = 9 (cannot be stored in 4 bits)

o C) 7 + 3 = 10

o D) 6 + 1 = 7

9. What is the maximum positive number that can be represented in 32-bit 2’s
complement notation?

o A) 1,000,000

o B) 65,535

o C) 2,147,483,647

o D) 4,294,967,295
10. What problem occurred on September 19, 1989, due to 2’s complement
overflow?

o A) Negative overflow in hospital systems

o B) Hospital system malfunctioned due to 32,768 days passed since


January 1, 1900

o C) Loss of data in bank systems

o D) Overflow error in computer graphics

. Here are Top important MCQs from your CS101 module 26:

1. What is the primary characteristic of Excess Notation for representing integers?

o A) Fixed number of bits to represent each value

o B) Each value is an excess of its original binary value

o C) It uses variable-length bit patterns

o D) It only represents negative integers

2. In Excess Notation, what does the first bit pattern with 1 in the most significant
bit represent?

o A) The maximum value

o B) Zero

o C) The smallest positive number

o D) The largest negative number

3. In Excess 8 notation, what does the bit pattern 1011 represent?

o A) 3

o B) 8

o C) 11

o D) 0

4. In Excess 4 notation, what does the bit pattern 100 represent?


o A) Zero

o B) 4

o C) 1

o D) 3

5. What does the term "Excess 8" refer to in Excess Notation?

o A) A system that represents values as a multiple of 8

o B) A system that uses 8 as the base to represent zero

o C) A notation that uses 8 bits for every value

o D) A system that represents only values greater than 8

6. Which of the following represents the value zero in Excess 4 notation?

o A) 011

o B) 100

o C) 111

o D) 000

7. In the comparison of Excess 4 notation with Binary and 2’s complement, what is
the key difference?

o A) Excess notation shifts the zero point

o B) Binary and 2’s complement only represent positive numbers

o C) Binary and 2’s complement have the same representation for negative
numbers

o D) Excess notation does not use any fixed bits

8. What is the Excess 4 notation representation of the number 3 in binary?

o A) 000

o B) 011

o C) 111

o D) 100

9. In Excess 16 notation, what bit pattern represents the value zero?


o A) 011111

o B) 10000

o C) 11111

o D) 00000

10. How does Excess notation handle negative numbers?

o A) It does not represent negative numbers

o B) It uses preceding values to represent negative numbers

o C) Negative numbers are represented by negative binary numbers

o D) It uses separate bit patterns for negative and positive numbers

Here are Top important MCQs from your CS101 module 27:

1. What is the main difference between floating-point notation and integer


representation?

o A) Floating-point notation stores only whole numbers

o B) Floating-point notation stores both the pattern and the position of the
radix point

o C) Floating-point notation is only used for negative numbers

o D) Floating-point notation uses a fixed number of bits

2. In floating-point notation, what is the purpose of the exponent field?

o A) To represent the fractional part of the number

o B) To store the position of the radix point

o C) To represent the magnitude of the number

o D) To store the sign of the number

3. In an 8-bit floating-point representation, if the sign bit is 0, what does this


indicate?

o A) The value stored is nonnegative

o B) The value stored is negative


o C) The exponent is zero

o D) The mantissa is zero

4. In the example 01101011, what does the exponent field (110) represent in
excess notation?

o A) -1

o B) 2

o C) 3

o D) 1

5. How do you decode the value stored in the mantissa field of a floating-point
number?

o A) By reversing the binary digits

o B) By placing a radix point to the left of the mantissa and interpreting the
exponent

o C) By multiplying the mantissa by the exponent

o D) By directly converting the binary mantissa to decimal

6. When encoding the value 11/8 in floating-point notation, which of the following
would be the correct final byte?

o A) 0 1 0 1 1 0 0 0

o B) 0 0 1 1 0 0 1 1

o C) 0 1 0 1 1 0 0 1

o D) 0 0 1 1 1 1 0 1

7. What is meant by "normalized form" in floating-point representation?

o A) The mantissa starts with 0

o B) The exponent is always positive

o C) The mantissa starts with 1 for all nonzero values

o D) The exponent field is always 0


8. Which of the following bit patterns represents the number 3/8 in normalized
form in floating-point notation?

o A) 00111100

o B) 01000110

o C) 10001100

o D) 11000000

9. In the process of encoding a floating-point number, how is the mantissa field


filled?

o A) By copying the binary representation of the fractional part

o B) By filling with zeros after the first 1

o C) By copying the bit pattern starting with the leftmost 1 in the binary
representation

o D) By reversing the binary digits of the fractional part

10. What is the floating-point representation of zero?

o A) 11111111

o B) All 0s

o C) 01010101

o D) 00000001

Here are Top important MCQs from your CS101 module 28:

1. What problem occurs when storing the value 25/8 using a one-byte floating-
point system?

o A) The value becomes negative

o B) A truncation error occurs due to the limited size of the mantissa

o C) The exponent field overflows

o D) The mantissa field becomes zero


2. What does a truncation error in floating-point notation refer to?

o A) Loss of precision due to the limited size of the mantissa field

o B) Overflow of the exponent field

o C) Loss of the sign bit

o D) Inaccuracy in representing negative numbers

3. What is the main cause of truncation errors in floating-point notation?

o A) Incorrect rounding of values

o B) The limited size of the mantissa field

o C) A mismatch in the sign bit

o D) The exponent field being too small

4. How does using a longer mantissa field help reduce truncation errors?

o A) It increases the size of the exponent field

o B) It reduces the number of bits needed for the sign bit

o C) It allows for a more accurate representation of values

o D) It eliminates the need for normalization

5. What is a common issue when trying to express fractions like 1/3 or 1/10 in
binary?

o A) They are always represented with finite binary expansions

o B) They result in nonterminating binary expansions

o C) They cannot be represented as integers

o D) They cause errors only in integer arithmetic

6. In the example of manipulating dollars and cents, what could cause


inaccuracies when using floating-point notation?

o A) Storing values with more than 8 bits

o B) Nonterminating binary expansions for values like 1/10

o C) Using two’s complement representation

o D) Incorrect rounding of integer values


7. What is one approach to dealing with nonterminating binary expansions when
storing money values?

o A) Use more bits for the mantissa

o B) Manipulate data in smaller units (e.g., pennies) to avoid fractions

o C) Increase the size of the exponent field

o D) Represent all values as integers

8. In the example of adding 2½ to 1/8, why does truncation occur?

o A) The result cannot be accurately stored due to the 4-bit mantissa

o B) The exponent becomes too large

o C) The mantissa becomes too small

o D) The sum exceeds the maximum representable value

9. What is a suggested method for handling small truncation errors when adding
floating-point numbers?

o A) Add the largest number first

o B) Add the smallest quantities first to minimize truncation

o C) Add the smallest values together first before adding to larger


quantities

o D) Use a larger floating-point format immediately

10. When performing floating-point arithmetic, how can you ensure that small
quantities do not cause significant truncation errors?

o A) Use more bits for the exponent

o B) Perform additions in a specific order, starting with smaller quantities

o C) Always round the result

o D) Use integer arithmetic instead of floating-point arithmetic


Here are Top important MCQs from your CS101 module 29:

1. Which of the following is a lossless data compression technique?

o A) Run-length Encoding

o B) JPEG

o C) MP3

o D) MPEG

2. What does a lossless compression scheme ensure?

o A) Some data is lost during compression

o B) No data is lost during compression

o C) The data size is not reduced

o D) Compression is faster than lossy methods

3. In Huffman coding, the length of the bit pattern used to represent a data item is
related to:

o A) The frequency of the item’s use

o B) The number of characters in the item

o C) The size of the original data

o D) The memory space available

4. What is the purpose of Run-Length Encoding (RLE)?

o A) To compress data by replacing repeated elements with a single


element and a count

o B) To store data in a lossless manner using fixed-length codes

o C) To encode data into equal-length codes

o D) To approximate large data sequences for faster access

5. What type of data compression is typically used for images and audio files
where minor errors can be tolerated?

o A) Lossless compression

o B) Lossy compression
o C) Adaptive dictionary encoding

o D) Frequency-dependent encoding

6. Which data compression technique involves encoding the differences between


consecutive data units?

o A) Dictionary Encoding

o B) Differential Encoding (Relative Encoding)

o C) Huffman Encoding

o D) Run-Length Encoding

7. In the context of data compression, what is the main advantage of dictionary


encoding?

o A) It uses shorter codes for frequently occurring data items.

o B) It compresses data by removing spaces from the data.

o C) It encodes long sequences of data as references to a dictionary of


patterns.

o D) It reduces the bit rate of all types of files.

8. Which of the following is a feature of adaptive dictionary encoding (LZW)?

o A) The dictionary remains static during the encoding process.

o B) The dictionary can change dynamically during the encoding process.

o C) It uses a fixed-length code for each entry.

o D) It is a lossy compression technique.

9. In Lempel-Ziv-Welsh (LZW) encoding, how is a new dictionary entry added


during encoding?

o A) By adding a new character from the data stream.

o B) By merging two existing dictionary entries.

o C) By recognizing repeated patterns in the message and adding them to


the dictionary.

o D) By encoding individual characters into fixed-length codes.


10. Which of the following is a characteristic of lossy compression techniques?

o A) They are used for compressing text data.

o B) They provide higher compression ratios at the cost of losing some


data.

o C) They guarantee no data loss during compression.

o D) They are used only for encrypting data.

Here are Top important MCQs from your CS101 module 30:

1. Which of the following compression techniques does GIF use to improve its
efficiency?

o A) Run-Length Encoding

o B) LZW (Lempel-Ziv-Welsh) Encoding

o C) Discrete Cosine Transform

o D) Huffman Encoding

2. What is the maximum number of colors that can be represented in a GIF image?

o A) 512

o B) 1024

o C) 256

o D) 10240

3. Which of the following is a major limitation of GIF compression?

o A) It can only compress black-and-white images.

o B) It can only encode 256 colors, making it unsuitable for high-precision


applications.

o C) It is always lossless.

o D) It requires significant computational resources.

4. What feature of GIF makes it popular for simple animations?


o A) Its ability to handle large color palettes.

o B) The ability to use a transparent color to allow the background to show


through.

o C) It can compress photographic images.

o D) It supports high-resolution images.

5. What is the main advantage of JPEG’s lossy compression technique?

o A) It always retains the original image quality.

o B) It provides a high compression ratio, reducing image size with little


noticeable loss in quality.

o C) It works only on black-and-white images.

o D) It is lossless and can be used for all types of images.

6. In JPEG compression, why is chrominance reduced by averaging values over


two-by-two pixel squares?

o A) To reduce the file size without affecting brightness.

o B) To increase the contrast of the image.

o C) Because the human eye is less sensitive to changes in color


(chrominance) compared to brightness (luminance).

o D) To enhance color details in the image.

7. Which mathematical technique does JPEG use to transform image data for
better compression?

o A) Fourier Transform

o B) Discrete Cosine Transform

o C) Linear Regression

o D) Haar Transform

8. What happens in JPEG compression when pixel values in an eight-by-eight


block are below a certain threshold?

o A) They are left unchanged.

o B) They are replaced by zeros.


o C) They are doubled.

o D) They are merged into a single pixel.

9. What is TIFF mainly used for?

o A) As a format for storing photographs with metadata like date and


camera settings.

o B) As a lossy compression technique for photographs.

o C) For compressing images in web applications.

o D) As a format for simple animations.

10. Which compression method does TIFF use for compressing text document
images?

o A) Run-Length Encoding

o B) Huffman Encoding

o C) JPEG Compression

o D) Discrete Cosine Transform

Here are Top important MCQs from your CS101 module 31:

1. Who developed the MPEG standards for encoding and compressing audio and
video?

o A) ISO and the International Telecommunication Union (ITU)

o B) ISO under the leadership of the Motion Picture Experts Group (MPEG)

o C) The World Wide Web Consortium (W3C)

o D) The International Organization for Standardization (ISO) alone

2. What is the primary difference between I-frames and the pictures between I-
frames in MPEG video compression?

o A) I-frames are compressed using JPEG, while the other frames are not
compressed.
o B) I-frames are encoded in their entirety, while the other frames are
encoded relative to previous frames.

o C) I-frames are encoded using relative encoding, and the others are encoded
completely.

o D) There is no difference; all frames are encoded the same.

3. Which audio compression system was developed within the MPEG standards?

o A) AAC

o B) MP3

o C) FLAC

o D) WAV

4. What is "temporal masking" in the context of MP3 audio compression?

o A) The ability to detect sounds at one frequency.

o B) The inability of the human ear to detect softer sounds immediately


after a loud sound.

o C) The inability to detect high-frequency sounds.

o D) The ability to focus on high-pitched sounds over low-pitched ones.

5. Which of the following properties does MP3 compression take advantage of to


reduce file size?

o A) Temporal masking and frequency masking

o B) Compression by reducing the bit rate of the audio file.

o C) Compression by removing background noise.

o D) Temporal variation in audio signal quality.

6. What is the maximum video storage capacity achievable with MPEG


compression for one hour of video in 128MB of storage?

o A) 15 minutes of video

o B) One hour of video

o C) 10 hours of video
o D) 30 minutes of video

7. What is the primary goal of audio and video compression, aside from saving
storage space?

o A) To increase the size of the file for faster processing

o B) To ensure better sound and picture quality

o C) To allow timely transmission of information over communication


systems

o D) To encrypt the audio or video content

8. What is the typical transfer rate required for video presentations using MPEG
compression over communication paths?

o A) 4 Kbps

o B) 40 Mbps

o C) 10 Kbps

o D) 128 Kbps

9. How much storage space does one GB of storage provide for MP3 recordings?

o A) 50 songs

o B) 800 songs

o C) 200 songs

o D) 400 songs

10. Which unit is commonly used to measure the transfer speed for audio and
video compression systems?

o A) Hertz (Hz)

o B) Bits per second (bps)

o C) Bytes per second (Bps)

o D) Kilobytes per second (KBps)


Here are Top important MCQs from your CS101 module 32:

1. What are the three main parts of a CPU?

o A) Arithmetic unit, control unit, and input unit

o B) Arithmetic/logic unit, control unit, and register unit

o C) Arithmetic/logic unit, register unit, and main memory

o D) Control unit, input unit, and output unit

2. Which part of the CPU performs operations like addition and subtraction?

o A) Control unit

o B) Arithmetic/logic unit

o C) Register unit

o D) Main memory

3. What are the temporary storage cells within the register unit called?

o A) Buffers

o B) Registers

o C) Cache

o D) Data cells

4. Which type of registers holds the results of operations performed by the


arithmetic/logic unit?

o A) General-purpose registers

o B) General-purpose registers

o C) Special-purpose registers

o D) Cache registers

5. What is the role of the control unit in a CPU?

o A) It stores the data temporarily.

o B) It coordinates the machine’s activities.

o C) It performs arithmetic and logic operations.


o D) It connects the CPU to main memory.

6. How does the CPU transfer data between main memory and the registers?

o A) By using a memory chip

o B) Through a bus

o C) By directly reading from the hard drive

o D) Using a software program

7. What is the function of the bus in a CPU?

o A) It performs arithmetic operations.

o B) It transfers data between the CPU and main memory.

o C) It stores temporary data for the CPU.

o D) It controls the input and output devices.

8. In the process of adding two values stored in memory, what is the first step?

o A) Storing the result in memory

o B) Transferring the data from memory to registers

o C) Performing the addition operation

o D) Activating the arithmetic/logic unit

9. After adding two values stored in memory, where is the result placed?

o A) In the CPU registers

o B) In a general-purpose register

o C) In the control unit

o D) In the main memory

10. What must the CPU do before performing an operation on data stored in
memory?

o A) Perform the operation directly on memory

o B) Transfer the data from memory to the registers

o C) Store the data in cache memory


o D) Activate the output devices

Here are Top important MCQs from your CS101 module 33:

1. What was the main limitation of early computers in terms of flexibility?

o A) They had limited memory.

o B) The steps executed by each device were hardwired into the control
unit.

o C) They could not process data.

o D) They lacked any form of storage.

2. How was flexibility achieved in early electronic computers?

o A) By upgrading the software

o B) By rewiring the CPU through a pegboard arrangement.

o C) By using larger memory modules

o D) By adding more registers

3. Who is credited with the breakthrough idea of storing a program in memory?

o A) Alan Turing

o B) John von Neumann (though incorrectly)

o C) Charles Babbage

o D) Bill Gates

4. What is the stored-program concept?

o A) Programs are hardwired into the CPU

o B) Programs are encoded and stored in main memory, just like data.

o C) Programs are stored on external storage devices

o D) Programs are stored in specialized registers

5. How does the control unit execute instructions in the stored-program concept?
o A) It directly fetches the data from storage devices.

o B) It rewires the CPU for each new program.

o C) It extracts the program from memory, decodes it, and executes the
instructions.

o D) It stores the program in registers for quick access.

6. Why was the idea of storing a program in memory difficult to understand


initially?

o A) People thought programs and data were the same.

o B) People thought programs and data were different entities.

o C) People had no concept of memory storage at the time.

o D) People couldn't figure out how to store programs.

7. What happens when the contents of the computer’s memory are changed?

o A) The CPU needs to be rewired.

o B) The program that the machine follows can be changed.

o C) The control unit shuts down.

o D) The program is permanently deleted.

8. Which of the following is a benefit of the stored-program concept?

o A) It allows the CPU to be manually rewired.

o B) It allows a program to be changed without physically rewiring the CPU.

o C) It stores programs in the hard drive.

o D) It simplifies the control unit design.

9. What does the stored-program concept replace in early computers?

o A) External storage devices

o B) Hardwiring the steps executed by each device in the control unit.

o C) Data processing units

o D) Memory storage techniques

10. Why is the stored-program concept now considered obvious?


o A) It was initially a complex idea but is now universally adopted.

o B) It has become the standard approach used today in computing.

o C) It is rarely used in modern computing.

o D) It is only used for specific applications.

Here are Top important MCQs from your CS101 module 34:

1. What is machine language in the context of CPUs?

o A) A set of instructions that the CPU can’t execute

o B) A high-level programming language used to write software

o C) A collection of instructions encoded as bit patterns that the CPU can


execute

o D) A binary encoding system for storing data in memory

2. What does a machine instruction refer to?

o A) A command that is written in a high-level language

o B) An instruction expressed in machine language that the CPU can


decode and execute

o C) A set of tasks for the operating system to perform

o D) A program written in assembly language

3. What is the main advantage of designing a CPU with a minimal set of machine
instructions?

o A) It makes the machine efficient, fast, and less expensive to


manufacture.

o B) It reduces the machine’s processing speed.

o C) It allows for more complex instructions.

o D) It supports more complex operating systems.

4. What type of CPU architecture is associated with a minimal set of instructions?


o A) Reduced Instruction Set Computer (RISC)

o B) Complex Instruction Set Computer (CISC)

o C) Microprocessor

o D) Multi-core processor

5. What is the advantage of a CPU with the ability to execute a large number of
complex instructions?

o A) It can better cope with the increasing complexities of modern


software.

o B) It is faster and more power-efficient.

o C) It has a smaller instruction set.

o D) It is easier to manufacture.

6. Which of the following is an example of a CISC processor?

o A) PowerPC

o B) ARM

o C) Intel processors used in PCs

o D) Qualcomm processors

7. What is an example of a RISC processor?

o A) PowerPC processors used in Apple Macintosh

o B) Intel processors used in PCs

o C) ARM processors used in smartphones

o D) Qualcomm processors used in PCs

8. What was the main issue with CISC processors in the 1990s and into the
millennium?

o A) They were too power-efficient.

o B) They consumed too much electrical power.

o C) They were too complex to manufacture.

o D) They lacked enough instructions to support modern software.


9. What is the primary advantage of ARM-based RISC processors?

o A) Low power consumption

o B) High processing speed

o C) Large instruction set

o D) Complex software compatibility

10. In what devices are ARM-based processors commonly found?

o A) Game controllers, digital TVs, navigation systems, and smartphones

o B) Desktop computers and laptops

o C) Server racks

o D) Mainframe computers

Here are Top important MCQs from your CS101 module 35:

1. Which of the following is NOT a category of machine instructions?

o A) Data Transfer Group

o B) Memory Management Group

o C) Arithmetic/Logic Group

o D) Control Group

2. What is the primary function of the data transfer group in machine instructions?

o A) To perform arithmetic operations

o B) To move data from one location to another

o C) To manage memory storage

o D) To control the execution of the program

3. What is a common term used for the instruction that transfers data from
memory to a register?

o A) LOAD
o B) ADD

o C) STORE

o D) MOVE

4. What is the term used for transferring the contents of a register to a memory
cell?

o A) STORE

o B) LOAD

o C) TRANSFER

o D) COPY

5. What is the main purpose of the arithmetic/logic group of instructions?

o A) To request operations within the arithmetic/logic unit

o B) To move data between memory locations

o C) To direct the execution of the program

o D) To control input/output operations

6. Which of the following is NOT part of the arithmetic/logic unit's operations?

o A) Addition

o B) Moving data between registers

o C) Subtraction

o D) Logical AND

7. What does the control group of instructions primarily do?

o A) Perform arithmetic and logic operations

o B) Direct the execution of the program

o C) Handle input/output operations

o D) Move data between registers and memory

8. Which type of instructions handles the communication with external devices


such as printers, keyboards, and disk drives?

o A) I/O instructions
o B) Data transfer instructions

o C) Arithmetic instructions

o D) Control instructions

9. Which instruction would be used to load the contents of a memory cell into a
general-purpose register?

o A) LOAD

o B) STORE

o C) TRANSFER

o D) MOVE

10. What does the term "clone" better describe in the context of machine
instructions?

o A) Data transfer instructions that copy data instead of moving it

o B) Arithmetic operations that duplicate data

o C) Instructions that delete data from memory

o D) Control instructions that change the program flow

Here are Top important MCQs from your CS101 module 36:

1. Where is the machine instruction fetched from in the program execution


process?

o A) From the CPU cache

o B) From main memory

o C) From the control unit

o D) From the arithmetic/logic unit

2. What happens to each instruction once it is fetched from memory in the CPU?

o A) It is immediately executed without any processing

o B) It is decoded and then obeyed


o C) It is stored in a special-purpose register

o D) It is stored back into main memory

3. What is the role of the Program Counter in the program execution process?

o A) It contains the address of the next instruction to be executed

o B) It holds the current instruction being executed

o C) It stores the result of the executed instruction

o D) It holds the program’s start address

4. Which special-purpose register holds the instruction currently being executed?

o A) Program Counter

o B) Instruction Register

o C) Memory Address Register

o D) Data Register

5. What is the function of the JUMP instruction in a program?

o A) It stores the result of an operation in memory

o B) It changes the order of execution by specifying a new memory address

o C) It transfers data between CPU and memory

o D) It increments the Program Counter

6. What is the machine cycle in the context of program execution?

o A) The time it takes to execute one instruction

o B) The sequence of steps the CPU follows to execute an instruction

o C) The time the CPU spends transferring data between memory and registers

o D) The process of decoding instructions

7. Which of the following best describes the role of the Bus in the CPU and main
memory linkage?

o A) It stores the results of executed instructions

o B) It controls the flow of instructions between the CPU and memory


o C) It carries the machine instructions from memory to the CPU

o D) It decodes instructions for execution

8. What would happen if the Program Counter did not work correctly during
program execution?

o A) The CPU would fetch instructions from the wrong memory location

o B) The CPU would execute instructions in the wrong order

o C) Both A and B

o D) The instruction register would malfunction

9. Which part of the CPU is responsible for fetching instructions?

o A) Control Unit

o B) Arithmetic/Logic Unit

o C) Data Register

o D) Instruction Register

10. What is the main function of the Instruction Register in the program execution
cycle?

o A) It stores the next instruction to be executed

o B) It holds the instruction currently being executed

o C) It increments the Program Counter

o D) It transfers data between memory and the CPU


Here are Top important MCQs from your CS101 module 37:

1. What is the first instruction in the program that reads two numbers and adds
them?

o A) Load register 6 with the contents of memory address 6D

o B) Load register 5 with the contents of memory address 6C

o C) Add the contents of registers 5 and 6

o D) Store the result in memory location 6E

2. What does the CPU do after placing an instruction in the instruction register?

o A) It starts the next cycle without any further actions

o B) It decodes the instruction and executes it

o C) It stores the instruction in memory

o D) It fetches the next instruction immediately

3. After fetching the instruction 166D, what is the next address in the program
counter?

o A) A2

o B) A4

o C) A6

o D) A8

4. What happens during the execution step when the instruction to load register 6
is decoded?

o A) Register 6 is loaded with the contents of memory address 6D

o B) Register 5 is loaded with the contents of memory address 6D

o C) The program counter is reset to A2

o D) The instruction is stored in the memory

5. What is the result of the addition performed by the arithmetic/logic unit?

o A) The sum is stored in register 5


o B) The sum is stored in register 0

o C) The sum is discarded

o D) The sum is sent to the instruction register

6. When is the memory location 6E updated with the sum?

o A) After the instruction "Load register 6 with the contents of memory address
6D"

o B) After the instruction "Store the result in memory location 6E"

o C) During the fetch phase

o D) After the halt instruction is executed

7. Which instruction in the program halts the machine?

o A) Load register 5

o B) Halt instruction (C000)

o C) Store the result in memory location 6E

o D) Add the contents of registers 5 and 6

8. What is the purpose of the program counter in this example?

o A) It stores the results of the executed instructions

o B) It holds the address of the next instruction to be fetched

o C) It performs the arithmetic/logic operations

o D) It increments the instruction register

9. What does the instruction 5056 in the program represent?

o A) It is the instruction to add the contents of registers 5 and 6

o B) It is the instruction to load register 6 with memory address 6D

o C) It is the instruction to halt the machine

o D) It is the instruction to store the result in memory

10. What happens when the halt instruction (C000) is decoded and executed?

o A) The program continues to the next instruction


o B) The machine stops, and the program is completed

o C) The sum is stored in register 5

o D) The program counter resets to A0

Here are Top important MCQs from your CS101 module 38:

1. What is the result of ANDing the bit patterns 10011010 and 11001001?

o A) 11001010

o B) 10001000

o C) 11000000

o D) 11111111

2. What is the purpose of the AND operation in bitwise manipulation?

o A) To copy the entire bit pattern

o B) To place 0s in one part of a bit pattern while preserving the other part

o C) To replace all bits with 1s

o D) To duplicate all bits

3. In the AND operation, what happens if the first operand is 00001111 and the
second operand is unknown?

o A) The four most significant bits of the result will be 0s

o B) The result will have all bits as 1

o C) The four least significant bits will be 1s

o D) The result will be the same as the second operand

4. What is a common use of the AND operation in digital image manipulation?

o A) Filtering certain colors out of an RGB image

o B) Inverting the colors of an image


o C) Reversing the pixel order

o D) Blurring an image

5. In the context of a bit map, how can the third bit from the high-order end be
checked?

o A) By ORing the byte with a mask

o B) By ANDing the byte with the mask 00100000

o C) By XORing the byte with the mask 11111111

o D) By setting the third bit to 1

6. What operation is performed to change the third bit from the high-order end to
0, leaving other bits unchanged?

o A) XOR with 00100000

o B) AND with 11011111

o C) OR with 00100000

o D) XOR with 11011111

7. What is the result of ORing any byte with 11110000?

o A) It sets the least significant four bits to 1

o B) It sets the most significant four bits to 1, leaving the least significant
bits unchanged

o C) It inverts the entire byte

o D) It clears all bits

8. What is the purpose of using the OR operation with a mask?

o A) To duplicate part of a bit string while placing 0s in the non-duplicated part

o B) To duplicate part of a bit string while putting 1s in the non-duplicated part

o C) To force a 1 in the specified positions of the bit pattern

o D) To clear the bits at specific positions

9. What is the result of XORing any byte with a mask of all 1s?

o A) It keeps the byte unchanged


o B) It produces the complement of the byte

o C) It reverses the bit order

o D) It clears all bits in the byte

10. What effect does XORing an RGB bitmap image with a mask of all 1s have?

o A) It inverts the colors of the image, turning light colors into dark ones
and vice versa

o B) It changes the image's brightness

o C) It flips the image upside down

o D) It clears the image

Here are Top important MCQs from your CS101 module 39:

1. What happens when we perform a right shift operation on a byte of bits?

o A) The leftmost bit falls off, and the rightmost bit is duplicated

o B) The rightmost bit falls off, and a hole appears at the leftmost end

o C) The byte gets inverted

o D) The byte gets duplicated

2. What distinguishes a circular shift (rotation) from other shift operations?

o A) The bit that falls off the edge is discarded

o B) The bit that falls off the edge is placed in the hole at the opposite end

o C) The byte is multiplied by two

o D) The byte is divided by two

3. If a right circular shift is performed on a byte size bit pattern eight times, what
happens?

o A) The byte is doubled

o B) The byte is halved


o C) The bit pattern returns to its original form

o D) The byte is shifted one position left

4. In a logical shift, what happens to the bit that falls off the edge of the byte?

o A) It is placed in the opposite end

o B) It is discarded, and the hole is filled with a 0

o C) It is copied to the next position

o D) It becomes the new sign bit

5. What is the practical use of a left logical shift in binary operations?

o A) To divide a number by two

o B) To multiply a number by two

o C) To invert the bits of a number

o D) To preserve the sign bit

6. What is the effect of a right logical shift on the binary representation of a


number?

o A) It doubles the number

o B) It inverts the binary digits

o C) It divides the number by two

o D) It multiplies the number by ten

7. What is an arithmetic shift operation?

o A) A shift that discards the sign bit

o B) A shift that inverts the sign bit

o C) A shift that leaves the sign bit unchanged

o D) A shift that duplicates the sign bit

8. What happens during an arithmetic right shift when the sign bit is at the
position of the hole created by the shift?

o A) The hole is filled with a 1

o B) The hole is filled with a 0


o C) The hole is filled with the original sign bit value

o D) The sign bit is shifted to the left

9. What is the main difference between a logical and an arithmetic shift?

o A) A logical shift always preserves the sign bit, while an arithmetic shift
discards it

o B) In an arithmetic shift, the sign bit is preserved, but a logical shift fills
the hole with a 0

o C) An arithmetic shift operates only on negative numbers

o D) A logical shift only works for positive numbers

10. Why is it important to preserve the sign bit in certain shift operations?

o A) To keep the byte from overflowing

o B) To ensure correct results in signed binary representations (e.g., two’s


complement)

o C) To avoid shifting beyond the byte’s capacity

o D) To prevent truncation of data

Here are Top important MCQs from your CS101 module 40:

1. How can subtraction be simulated in binary arithmetic?

o A) By multiplication and division

o B) By addition and negation

o C) By left and right shifts

o D) By logical AND operation

2. What is the binary equivalent of performing 7 - 5 using 2’s complement?

o A) 7 + (-5)

o B) 7 * 5

o C) 7 / 5

o D) 7 + 5
3. What is the fundamental idea behind multiplication in binary arithmetic?

o A) Repetitive addition

o B) Subtraction

o C) Left shifting

o D) Right shifting

4. How is multiplication of 8 by 3 performed in binary arithmetic?

o A) By dividing 8 by 3

o B) By adding 8 three times

o C) By shifting 8 to the left

o D) By shifting 8 to the right

5. How is division generally achieved in small CPUs that only support addition or
subtraction?

o A) By multiplying the dividend and divisor

o B) By repeated subtraction

o C) By using logical shifts

o D) By using bitwise operations

6. What happens when binary numbers are stored in 2’s complement notation?

o A) They require floating-point arithmetic

o B) They are straightforward to perform arithmetic operations

o C) They make subtraction easier

o D) They use only the mantissa for calculations

7. What is required when performing arithmetic operations on binary numbers


stored in floating-point notation?

o A) Only the sign bit

o B) Mantissa, exponent, and sign bit

o C) Only the exponent

o D) Only the mantissa and sign bit


8. What distinguishes the way arithmetic operations are performed on numbers in
2’s complement vs. floating-point notation?

o A) Floating-point numbers cannot be used for subtraction

o B) Floating-point arithmetic uses the mantissa, exponent, and sign bit

o C) 2’s complement arithmetic does not support multiplication

o D) Floating-point arithmetic does not require any additional components for


multiplication

9. What is the most basic operation used to achieve division in some CPUs that
only have addition and subtraction operations?

o A) Subtraction

o B) Multiplication

o C) Logical AND

o D) Logical OR

10. Why is floating-point arithmetic more complex than 2’s complement


arithmetic?

o A) It requires handling both negative and positive values

o B) It involves working with the mantissa, exponent, and sign bit

o C) It uses additional binary shifts

o D) It requires extra memory for storing results


Here are Top important MCQs from your CS101 module 41:

1. What is the primary role of a controller in a computer system?

o A. Perform calculations for the CPU

o B. Facilitate communication between the computer and peripheral


devices

o C. Manage the computer's operating system

o D. Store large amounts of data

2. Where can a controller be located in a computer?

o A. Only on the computer's motherboard

o B. On the motherboard or as a circuit board plugged into the


motherboard

o C. Only externally connected to the computer

o D. Only within the peripheral devices

3. What feature allows controllers to connect external devices to a computer?

o A. Ports

o B. Drivers

o C. Cache memory

o D. RAM slots

4. What components might a controller itself include?

o A. High-speed network adapters

o B. Its own memory circuitry and simple CPU

o C. Graphics processing units

o D. Virtual memory modules


5. What is an example of a standardized controller that supports multiple
devices?

o A. PCI Express

o B. Universal Serial Bus (USB)

o C. SATA

o D. CMOS

6. Which of the following devices can communicate with a USB controller?

o A. Only storage devices

o B. Only printers and scanners

o C. Mice, printers, scanners, and digital cameras

o D. Only external hard drives

7. How does a controller communicate with the computer’s CPU?

o A. Directly through the power supply

o B. By connections to the bus shared with the CPU and main memory

o C. Through the internet

o D. Using wireless signals

8. What instruction is used by the CPU to send data to a controller?

o A. LOAD instruction

o B. STORE instruction

o C. TRANSFER instruction

o D. DELETE instruction

9. How does a CPU receive data from a controller?


o A. By using an instruction similar to a LOAD instruction

o B. By executing a MOVE instruction

o C. By accessing the hard drive directly

o D. By connecting through a port

10. What advancement has made controllers more flexible in recent years?

• A. Development of standards like USB and FireWire

• B. Reduction in the size of computers

• C. Integration of GPUs with controllers

• D. Removal of the need for peripheral devices

Here are Top important MCQs from your CS101 module 42:

1. What does Direct Memory Access (DMA) enable a controller to do?

o A. Access the CPU directly

o B. Access main memory without CPU intervention

o C. Perform calculations for the CPU

o D. Execute programs stored in memory

2. How does DMA improve a computer's performance?

o A. By speeding up the CPU's clock rate

o B. By allowing the CPU and controller to operate simultaneously

o C. By reducing the size of the memory

o D. By eliminating the need for a bus

3. What is an example of a task performed using DMA?


o A. The CPU fetching data from a disk

o B. A controller transferring data from a disk to main memory

o C. A controller executing instructions from memory

o D. The CPU connecting directly to a peripheral device

4. What is the main benefit of DMA in data transfer operations?

o A. Reduces memory usage

o B. Prevents the CPU from being idle during data transfers

o C. Improves the speed of disk rotation

o D. Decreases the size of peripheral devices

5. What is a disadvantage of using DMA?

o A. It complicates communication over the bus

o B. It slows down the CPU

o C. It requires larger storage devices

o D. It prevents the CPU from executing programs

6. What is the von Neumann bottleneck?

o A. The central bus becoming a point of contention between the CPU and
controllers

o B. A limitation of disk rotation speeds

o C. A design flaw in main memory architecture

o D. An error in controller communication

7. How does the von Neumann architecture contribute to the bottleneck issue?

o A. By reducing memory bandwidth


o B. By requiring all data to pass through a central bus

o C. By increasing the size of controllers

o D. By limiting the number of instructions the CPU can execute

8. What must the CPU do to initiate a DMA operation?

o A. Directly transfer data to the disk

o B. Send a request to the controller via a bit pattern

o C. Stop all other operations during the data transfer

o D. Access memory directly

9. What happens on the bus during a DMA operation?

o A. Only the CPU accesses main memory

o B. Only the controller accesses main memory

o C. Both the CPU and controllers compete for bus access

o D. The CPU shuts down temporarily

10. What is a primary design challenge when using DMA?

• A. Increasing controller speed

• B. Coordinating communication over the bus

• C. Reducing the size of controllers

• D. Increasing the number of devices connected to the bus


Here are Top important MCQs from your CS101 module 43:

1. How does parallel communication transfer data?

o A. By sending multiple signals simultaneously on separate lines

o B. By sending data one after another on the same line

o C. By converting bit patterns into audible tones

o D. By using modems for long-distance communication

2. What is an advantage of parallel communication?

o A. Faster data transfer rates

o B. Requires simple architecture

o C. Can only handle short-distance communication

o D. Compatible with older Ethernet standards

3. What is a drawback of parallel communication?

o A. Slow data transfer rates

o B. Requires complex architecture

o C. Only suitable for long distances

o D. Does not support high-speed communication

4. What is an example of serial communication?

o A. Parallel port

o B. PCI bus

o C. USB and FireWire

o D. HDMI cables
5. How does serial communication transfer data?

o A. By using multiple lines for multiple signals

o B. By transferring data one after another

o C. By splitting signals into smaller packets

o D. By encoding data into audible tones

6. Which communication method has a higher data transfer rate?

o A. Parallel communication

o B. Serial communication

o C. Traditional voice lines

o D. DSL connections

7. What is the function of a modem?

o A. Transfer data at high speeds over short distances

o B. Convert bit patterns into audible tones

o C. Establish parallel communication between devices

o D. Increase the bandwidth of Ethernet connections

8. What is the unit for measuring data transfer rates?

o A. Bits per second (bps)

o B. Bytes per second (Bps)

o C. Hertz (Hz)

o D. Frames per second (fps)

9. Which of the following supports faster long-distance communication?

o A. USB
o B. Parallel communication

o C. DSL (Digital Subscriber Line)

o D. Ethernet for short distances

10. What is the relationship between kilobits (kbps) and kilobytes (KB)?

• A. 1 kbps = 100 KB per second

• B. 8 kbps = 1 GB per second

• C. 8 kbps = 1 KB per second

• D. 1 kbps = 8 KB per second

Here are Top important MCQs from your CS101 module 44:

1. What is the approximate speed of light in terms of distance covered in a


nanosecond?

o A) 1 meter

o B) 1 foot

o C) 10 feet

o D) 1 kilometer

2. Why does fetching an instruction from memory take at least 2 nanoseconds in a


CPU?

o A) Due to memory access delay

o B) Because the read request and the instruction both take 1 nanosecond
each

o C) Because memory is slow

o D) Due to processing delays in the CPU

3. What is the main purpose of improving a computer’s performance?

o A) To decrease memory size

o B) To improve throughput
o C) To reduce nanoseconds

o D) To minimize CPU cycles

4. What does the term throughput refer to in computing?

o A) The speed of a single instruction execution

o B) The memory access time

o C) The total amount of work accomplished in a given time

o D) The size of the pipeline

5. What is pipelining in the context of computer architecture?

o A) Increasing CPU speed

o B) Allowing steps in the machine cycle to overlap

o C) Minimizing memory usage

o D) Increasing instruction size

6. How does pipelining improve a computer’s performance?

o A) By reducing the execution speed of individual instructions

o B) By eliminating JUMP instructions

o C) By increasing the total throughput of the machine

o D) By reducing CPU size

7. What happens to pipelining performance when a JUMP instruction is executed?

o A) It speeds up the process

o B) The instructions in the pipeline may become useless

o C) The pipeline executes multiple instructions

o D) The JUMP instruction fetches instructions faster

8. How do modern machine designs extend the concept of pipelining?

o A) By executing only one instruction at a time

o B) By reducing throughput

o C) By fetching and executing multiple instructions simultaneously


o D) By avoiding JUMP instructions

9. Why does pipelining increase throughput but not execution speed of individual
instructions?

o A) It reduces execution time for all instructions

o B) It allows multiple instructions to be processed simultaneously

o C) It eliminates the need for instruction fetch

o D) It minimizes memory latency

10. What is the primary limitation of pipelining in the presence of JUMP


instructions?

o A) It slows down memory access

o B) It reduces execution speed

o C) Prefetched instructions may not be the required ones

o D) It stops overlapping operations

Here are Top important MCQs from your CS101 module 45:

1. What was the primary role of early operating systems?

o A) To provide user-friendly interfaces

o B) To simplify program setup and streamline transitions between jobs

o C) To develop computer games

o D) To enable multitasking

2. What is batch processing?

o A) Executing multiple jobs simultaneously

o B) Interactive communication between the user and the program

o C) Collecting and executing jobs in a single batch without user


interaction

o D) Managing memory allocation


3. What is a job queue in batch processing systems?

o A) A list of completed jobs

o B) A memory allocation technique

o C) A storage organization where jobs are ordered in first-in, first-out


(FIFO) fashion

o D) A method for storing user data

4. What is the primary drawback of batch processing systems?

o A) High memory usage

o B) Lack of user interaction with their jobs during execution

o C) Inability to execute jobs in a sequence

o D) Absence of job priorities

5. What is job control language (JCL)?

o A) A programming language for developing games

o B) A language used for terminal interactions

o C) A system used to encode instructions for preparing the machine for a


job

o D) A method for prioritizing jobs in the queue

6. How do modern PC operating systems communicate with users?

o A) Through manual job setup

o B) By displaying error messages such as “network not available”

o C) By executing batch jobs silently

o D) Through job control language (JCL)

7. What is interactive processing?

o A) Running batch jobs with user priority

o B) Allowing users to interact with programs during their execution

o C) A queue management system

o D) A type of memory allocation


8. Which of the following applications is suitable for batch processing?

o A) Word processing systems

o B) Reservation systems

o C) Payroll processing

o D) Computer games

9. What device was used for user interaction in early interactive processing
systems?

o A) Personal computers

o B) Terminals, which were similar to electronic typewriters

o C) Batch processors

o D) Workstations

10. What feature of modern terminals differentiates them from earlier terminals?

o A) They require batch processing

o B) They function as stand-alone computers when needed

o C) They lack user interactivity

o D) They rely solely on JCL

Here are Top important MCQs from your CS101 module 46:

1. What is the primary goal of interactive processing?

o A) To execute tasks without a deadline

o B) To provide real-time responses

o C) To respond to users with sufficiently fast time

o D) To prioritize multi-user tasks

2. What is real-time processing?


o A) Performing tasks according to deadlines in the external real-world
environment

o B) Executing tasks without deadlines

o C) Performing tasks with no user interaction

o D) Handling large data storage operations

3. Which of the following is an example of real-time processing?

o A) Word processing

o B) Cruise missile or radar systems

o C) Payroll processing

o D) Database management

4. Why was real-time processing easier to implement in the 60s and 70s for single
users?

o A) Computers were cheaper

o B) Because computers in the 60s and 70s were expensive and each
machine served only one user

o C) Real-time processing was not a concern at that time

o D) Single-user systems had more advanced technology

5. What is time-sharing in operating systems?

o A) Service to multiple users at the same time by switching between them


rapidly

o B) Assigning tasks based on user priority

o C) Allowing a single user to use the system at a time

o D) Using the computer to execute only one job

6. What is the purpose of time-sharing systems?

o A) To allow one user to perform multiple tasks at the same time

o B) To allow multiple users to access and use the system simultaneously

o C) To execute tasks without any time limits


o D) To execute background processes only

7. What is multi-programming in operating systems?

o A) Executing several tasks by switching between them at small time


intervals

o B) Allowing one user to perform multiple tasks at once

o C) Running multiple tasks in parallel on separate processors

o D) Handling only one program at a time

8. What is multitasking in modern operating systems?

o A) Running multiple programs with separate users

o B) One user executing several tasks simultaneously

o C) Time-sharing between multiple users

o D) Switching between background processes

9. How many users could early time-sharing systems handle simultaneously?

o A) 5 users

o B) 10 users

o C) 30 users

o D) 100 users

10. What is the relationship between multiprogramming and multitasking in


modern systems?

o A) They are different concepts, with no overlap

o B) Multiprogramming is used in both single-user and multi-user systems,


while multitasking refers to a single user performing several tasks

o C) Multiprogramming refers to serving multiple users at once

o D) Multitasking is used for real-time processing


Here are Top important MCQs from your CS101 module 47:

1. What replaced the role of a computer operator in modern systems?

o A) System analyst

o B) System administrator

o C) Network administrator

o D) IT technician

2. In modern systems, what is the role of a system administrator?

o A) To execute programs for users

o B) To manage the computer system, install new equipment, and enforce


regulations

o C) To maintain the hardware

o D) To operate the machines manually

3. What type of machines are embedded systems typically found in?

o A) Personal computers

o B) Devices like medical equipment, vehicles, home appliances, and cell


phones

o C) Servers

o D) Mainframes

4. What is a characteristic of embedded operating systems?

o A) They must conserve battery power, meet real-time deadlines, and


operate with minimal human oversight

o B) They are used only in mainframes

o C) They require heavy user interaction

o D) They are mainly for multi-user, time-sharing environments

5. What is the significance of multiprocessor machines in modern operating


systems?

o A) They allow single-task processing


o B) They only handle multiple users at once

o C) They provide time-sharing and multitasking capabilities by assigning


tasks to different processors

o D) They focus only on time-sharing

6. What challenge do operating systems face when using multiprocessor


systems?

o A) Load balancing and scaling tasks across multiple processors

o B) Managing multiple users

o C) Increasing the machine’s clock speed

o D) Simplifying user interfaces

7. Which of the following is an example of an embedded operating system?

o A) Windows 10

o B) VxWORKS, Windows CE, Palm OS

o C) Linux

o D) macOS

8. What is the role of mass storage devices in time-sharing systems?

o A) To store user inputs

o B) To store commonly used programs and data files for easy access

o C) To store program errors

o D) To execute commands directly

9. What marked the end of the role of computer operators in many systems?

o A) The shift to personal computers

o B) The introduction of cloud computing

o C) The rise of multi-user, time-sharing systems and user autonomy

o D) The invention of the GUI (Graphical User Interface)

10. What does load balancing in a multiprocessor system involve?


o A) Dynamically allocating tasks to processors to ensure all processors
are used efficiently

o B) Increasing memory usage

o C) Prioritizing user tasks

o D) Balancing user inputs and outputs

Here are Top important MCQs from your CS101 module 48:

1. What are the two broad categories into which a machine's software can be
divided?

o A) Application software and utility software

o B) Application software and system software

o C) Operating system and application software

o D) System software and database software

2. What type of software performs tasks particular to the machine’s utilization?

o A) System software

o B) Application software

o C) Utility software

o D) Network software

3. Which of the following is an example of application software?

o A) Operating system

o B) Spreadsheets and database systems

o C) Disk formatting tools

o D) Network communication software

4. What does system software provide for application software?

o A) User interface

o B) Infrastructure

o C) Task-specific programs
o D) Security features

5. Which of the following is classified as system software?

o A) Operating system

o B) Word processor

o C) Spreadsheet program

o D) Game software

6. What is the purpose of utility software?

o A) To manage user data

o B) To extend or customize the capabilities of the operating system

o C) To run applications

o D) To handle communication tasks

7. What is an example of utility software?

o A) Software for formatting a magnetic disk

o B) Spreadsheet

o C) Database management system

o D) Word processing program

8. Why are certain activities implemented as utility software rather than in the
operating system?

o A) To make the operating system more complex

o B) To allow easier customization of system software to meet specific


needs

o C) To reduce the cost of the operating system

o D) To improve the system’s security

9. What is a key difference between application software and system software?

o A) Application software is always installed on a computer, while system


software is optional
o B) Application software is task-specific, while system software provides
the foundation for these tasks

o C) System software is used by end-users, while application software is only


for system administrators

o D) Application software runs without system software

10. Which type of software might be customized by companies or individuals based


on their needs?

o A) Operating system

o B) Utility software

o C) Application software

o D) Both A and B

Here are Top important MCQs from your CS101 module 49:

1. What part of an operating system handles communication with users?

o A) File management system

o B) User interface

o C) Memory management

o D) Process scheduler

2. Which of the following is the traditional method of user interface in older


systems?

o A) Shell

o B) Graphical User Interface (GUI)

o C) Window manager

o D) Command Line Interface (CLI)

3. What does a graphical user interface (GUI) use to represent objects for
manipulation?
o A) Text

o B) Icons

o C) Voice commands

o D) Text boxes

4. Which input device is commonly used in modern GUIs for issuing commands?

o A) Mouse

o B) Keyboard

o C) Joystick

o D) Touchpad

5. What recent advancement in user interfaces allows users to manipulate icons


directly with their fingers?

o A) Trackball

o B) Touch screens

o C) Stylus

o D) Voice recognition

6. What is a key feature of three-dimensional user interfaces that are subjects of


current research?

o A) They use two-dimensional projections

o B) They are based on text commands

o C) They use 3D projection systems, tactile devices, and surround sound

o D) They do not allow for interaction with the computer

7. What is the role of the window manager in a GUI?

o A) To execute commands from the user

o B) To allocate space on the screen and manage windows

o C) To handle system security

o D) To manage file storage


8. In which operating system can users select from a variety of shells such as
Bourne shell, C shell, and X11?

o A) UNIX

o B) Windows

o C) Linux

o D) OS X

9. What was the role of early versions of Microsoft Windows in relation to MS-
DOS?

o A) Windows was a shell for UNIX

o B) Windows was built into MS-DOS

o C) Windows was a GUI application loaded from MS-DOS

o D) Windows replaced MS-DOS entirely

10. What is a typical feature of window managers in modern GUIs?

o A) They only allocate memory

o B) They provide voice recognition

o C) They control the style of the GUI and offer customizable options

o D) They manage system processes

Here are Top important MCQs from your CS101 module 50:

1. What is the internal part of an operating system that performs basic functions
required by the computer?

o A) Shell

o B) Kernel

o C) File manager

o D) Window manager
2. Which component of the kernel manages the computer's mass storage and
files?

o A) Memory manager

o B) File manager

o C) Scheduler

o D) Dispatcher

3. What is the purpose of directories in an operating system?

o A) To execute programs

o B) To store operating system files

o C) To organize and group files based on their purposes

o D) To perform memory management

4. How is a directory path typically expressed?

o A) By using file extensions

o B) By listing directories separated by slashes

o C) By assigning numerical values to each directory

o D) By using hierarchical symbols

5. What happens when a file is accessed in an operating system?

o A) The system automatically opens the file

o B) The file manager is bypassed

o C) The file manager grants access to the file after approval

o D) The file is directly manipulated without any checks

6. What is the role of a device driver in an operating system?

o A) To monitor CPU usage

o B) To manage communication with peripheral devices

o C) To execute user commands

o D) To control memory allocation


7. In a multitasking environment, what is the primary responsibility of the memory
manager?

o A) To store files on the disk

o B) To coordinate the use of main memory and allocate space for


programs

o C) To manage user input

o D) To schedule tasks for execution

8. What is paging in an operating system?

o A) A method to execute multiple tasks simultaneously

o B) A technique for rotating programs and data between main memory and
mass storage

o C) A method for assigning priority to tasks

o D) A way to increase processor speed

9. What is virtual memory in an operating system?

o A) Memory located on the processor

o B) A fictional memory space created by paging to simulate larger


memory

o C) A type of storage memory

o D) A memory reserved for the operating system

10. What is the role of the scheduler in a multiprogramming system?

o A) To determine which activities are to be executed

o B) To allocate memory space

o C) To manage device drivers

o D) To monitor the temperature of the CPU


Here are Top important MCQs from your CS101 module 51:

1. What is the process of transferring the operating system from mass storage to
main memory when a computer is first turned on?

o A) Shutdown

o B) Booting

o C) Restart

o D) Bootstrapping

2. What is the program counter of a CPU set to when the computer is powered on?

o A) Random memory address

o B) A predetermined address

o C) The last executed address

o D) The operating system's address

3. Why does main memory lose its data when a computer is turned off?

o A) It is programmed to do so

o B) Because it uses volatile memory

o C) Due to a software failure

o D) It is a hardware design feature

4. What type of memory is used to store the initial program for booting?

o A) Random Access Memory (RAM)

o B) Read-Only Memory (ROM)

o C) Cache memory

o D) Flash memory

5. Which type of memory is typically used in modern PCs for booting?

o A) Magnetic disk

o B) Flash memory

o C) Static RAM
o D) Dynamic RAM

6. What is the program called that is stored in ROM and begins executing when the
computer is turned on?

o A) Operating System

o B) Boot loader

o C) Kernel

o D) Device driver

7. What happens once the boot loader loads the operating system into main
memory?

o A) The system shuts down

o B) The boot loader executes a jump instruction to the operating system

o C) The computer runs diagnostics

o D) The BIOS takes control

8. Why is it not efficient to store the entire operating system in ROM for general-
purpose computers?

o A) ROM has limited storage capacity

o B) Operating systems undergo frequent updates

o C) ROM is too slow for large systems

o D) ROM cannot store non-volatile data

9. What is typically stored in ROM in embedded systems, like smartphones?

o A) The entire operating system

o B) The boot loader

o C) Temporary data files

o D) User applications

10. Why is mass storage used instead of ROM for booting in general-purpose
computers?

o A) Mass storage is faster


o B) ROM is not compatible with modern OS

o C) Mass storage allows for easier updates to the operating system

o D) Mass storage has better reliability

Here are Top important MCQs from your CS101 module 52:

1. What is the fundamental concept that distinguishes a program from the activity
of executing a program in modern operating systems?

o A) File

o B) Process

o C) Thread

o D) Task

2. Which of the following best describes the difference between static and
dynamic activity in the context of operating systems?

o A) Static refers to data, while dynamic refers to execution.

o B) Static refers to the program, and dynamic refers to the execution of


the program.

o C) Static refers to system resources, and dynamic refers to application


software.

o D) Static refers to the CPU, and dynamic refers to the RAM.

3. What is the activity of executing a program under the control of the operating
system called?

o A) Process

o B) Thread

o C) Program

o D) Execution

4. What is associated with a process that represents the current status of the
activity?
o A) Program counter

o B) Process state

o C) Thread state

o D) System state

5. Which of the following is NOT part of the process state?

o A) Program counter value

o B) CPU register values

o C) Program name

o D) Values in associated memory cells

6. What does the snapshot of a machine at a particular time during execution


include?

o A) Only the program counter

o B) Only the CPU registers

o C) The program counter, CPU registers, and associated memory cells

o D) Only the program

7. How does the operating system coordinate the execution of application


software, utility software, or the OS itself?

o A) By allocating memory

o B) By scheduling processes

o C) By managing hardware resources

o D) All of the above

8. What analogy is often used to describe the distinction between a program and
the activity of executing the program?

o A) A car and its engine

o B) A book and reading the book

o C) A music sheet and playing the music

o D) A map and traveling


9. The current state of a process, including the values in CPU registers, is known
as:

o A) Process counter

o B) Process state

o C) Program counter

o D) Thread state

10. Which of the following is not part of a process's snapshot at a particular time?

o A) Program counter

o B) CPU registers

o C) User input data

o D) Memory values

Here are Top important MCQs from your CS101 module 53:

1. Which of the following components within the operating system kernel


coordinates the execution of processes?

o A) Scheduler

o B) Scheduler and Dispatcher

o C) Process Table

o D) Interrupt Handler

2. What is the role of the scheduler in an operating system?

o A) To execute processes

o B) To maintain a record of processes and manage their execution

o C) To assign priorities to the CPU

o D) To handle interrupt signals

3. Which data structure does the scheduler use to keep track of all processes in
the system?
o A) Memory table

o B) Process table

o C) Execution log

o D) Interrupt queue

4. What information is typically stored in a process table entry?

o A) The program’s name

o B) Memory area assigned to the process, process priority, and its state
(ready or waiting)

o C) CPU register values

o D) The process’s time slice

5. In a multitasking system, how is time divided for processes to execute?

o A) By priority

o B) By time slice

o C) By process state

o D) By process type

6. What is a process switch also known as?

o A) Context switching

o B) Context switch

o C) Process scheduling

o D) Interrupt processing

7. What action does the CPU take when it receives an interrupt signal?

o A) It stops all processes

o B) It initiates a time slice

o C) It saves the current process state and begins executing an interrupt


handler

o D) It executes the highest priority process

8. What is the task of the interrupt handler?


o A) To execute the current process

o B) To resume execution from the interrupt

o C) To describe how the dispatcher should respond to the interrupt signal

o D) To restart the timer circuit

9. How does the dispatcher select the next process to run after an interrupt?

o A) By random selection

o B) By process priority among waiting processes

o C) By selecting the highest priority process among the ready processes

o D) By selecting the process with the shortest execution time

10. Which of the following is necessary for the success of a multiprogramming


system?

o A) The ability to divide time equally among processes

o B) The ability to stop and restart processes, preserving their state

o C) The ability to execute processes without preemption

o D) The ability to stop and restart processes, preserving their state

Here are Top important MCQs from your CS101 module 54:

1. Which of the following is NOT a type of resource allocated by the operating


system?

o A) File access

o B) Memory space

o C) Processor usage

o D) Time slices

2. Which component of the operating system allocates access to files?

o A) Scheduler

o B) Dispatcher
o C) File manager

o D) Memory manager

3. What does the memory manager allocate in the operating system?

o A) Access to files

o B) Memory space

o C) Time slices

o D) Space in the process table

4. Which component of the operating system allocates time slices to processes?

o A) File manager

o B) Dispatcher

o C) Scheduler

o D) Memory manager

5. What is a potential problem in resource allocation when two processes demand


the same resource?

o A) Race condition

o B) Deadlock

o C) Memory leak

o D) Starvation

6. What can happen when Process A is using Resource 1 and waiting for Resource
2, while Process B is using Resource 2 and waiting for Resource 1?

o A) Resource starvation

o B) Deadlock

o C) Resource contention

o D) Infinite loop

7. Why is resource allocation not as simple as it seems in operating systems?

o A) Because the system needs to ensure only one process can use each
resource at a time
o B) Because the resources are automatically released after use

o C) Because multiple processes may compete for the same resources

o D) Because processes don’t always need resources

8. What must be considered when designing reliable resource allocation


algorithms?

o A) Process priorities

o B) Time slices

o C) All possible contingencies, no matter how small

o D) Hardware configurations

9. Which component allocates space in the process table?

o A) Dispatcher

o B) Scheduler

o C) Memory manager

o D) File manager

10. Which of the following describes a situation where two processes are in a
deadlock state?

o A) Both processes are stuck in an infinite loop

o B) One process is using a resource while another waits for it

o C) One process is using a resource and waiting for another resource that
is held by the other process

o D) One process is scheduled to run after the other


Here are Top important MCQs from your CS101 module 55:

1. What is the primary purpose of a semaphore in an operating system?

o A) To allocate resources

o B) To control access to a shared resource

o C) To manage process scheduling

o D) To monitor system performance

2. In the context of semaphores, what does a "set" flag indicate?

o A) The resource is available

o B) The resource is currently allocated

o C) The semaphore is being tested

o D) The process is waiting

3. What issue arises when the operating system uses a flag to control access to a
shared resource, like a printer?

o A) Multiple processes cannot request the resource at once

o B) A process can be interrupted, leading to two processes accessing the


resource simultaneously

o C) The flag cannot be set by multiple processes

o D) The resource becomes locked permanently

4. What can be used to prevent a process from being interrupted during the task of
testing and setting a flag?

o A) Multi-core processing

o B) Interrupt disable and interrupt enable instructions

o C) Shared memory

o D) Process priorities

5. Which of the following ensures that no interruption occurs during the flag-
setting process?

o A) A simple lock
o B) Disabling interrupts during the flag-setting process

o C) The test-and-set instruction

o D) Mutual exclusion

6. What is the advantage of using the test-and-set instruction in semaphore


implementation?

o A) It increases the speed of process execution

o B) It prevents the flag-setting process from being interrupted

o C) It allows for multiple processes to access the critical region

o D) It allocates more resources

7. In the semaphore system, what is the critical region?

o A) The section of code that should be executed without interruptions

o B) The section of code that should be executed by only one process at a


time

o C) The section of code that manages interrupts

o D) The section of code that manages user input

8. What is the concept of mutual exclusion in semaphore systems?

o A) Allowing multiple processes to execute a critical region


simultaneously

o B) Restricting access to a critical region to only one process at a time

o C) Allocating resources based on process priority

o D) Managing process execution order

9. What must a process do before entering a critical region?

o A) Disable interrupts

o B) Find the semaphore clear and set it before entering

o C) Wait until the resource is fully allocated

o D) Execute its time slice


10. What happens if a process finds the semaphore set when trying to enter a
critical region?

o A) The process is allowed to enter the critical region

o B) The process must wait until the semaphore is cleared

o C) The process is terminated

o D) The process can enter the critical region and allocate the resource

Here are Top important MCQs from your CS101 module 56:

1. What is deadlock in an operating system?

o A) A condition where a process waits indefinitely for resources

o B) A condition where two or more processes are blocked, waiting for


resources allocated to each other

o C) A condition where no processes can create subtasks

o D) A situation where resources are shared among multiple processes

2. Which of the following is NOT a condition for deadlock to occur?

o A) Competition for non-sharable resources

o B) Resources are requested on a partial basis

o C) Allocated resources cannot be forcibly retrieved

o D) Processes must execute in parallel

3. What is forking in the context of operating systems?

o A) Allocating resources to a process

o B) Creating new processes to perform subtasks

o C) Blocking processes due to resource contention

o D) Terminating a process to free resources

4. What is deadlock detection and correction?

o A) Preventing deadlock by sharing resources


o B) Detecting deadlock when it occurs and forcibly retrieving allocated
resources

o C) Reallocating resources before deadlock happens

o D) Stopping all processes to restart resource allocation

5. What is the technical term for forcibly removing processes to break a


deadlock?

o A) Termination

o B) Killing

o C) Reallocation

o D) Blocking

6. How does the "request all resources at once" technique help in deadlock
avoidance?

o A) It removes the need for resource sharing

o B) It avoids partial allocation of resources

o C) It prevents processes from requesting additional resources later

o D) It ensures resources are always available

7. What is spooling in the context of deadlock avoidance?

o A) Allocating resources on demand

o B) Storing output data in memory for later use

o C) Storing data for output in mass storage to simulate resource sharing

o D) Removing processes from the process table

8. Which condition does spooling address to prevent deadlock?

o A) Resources are requested on a partial basis

o B) Competition for non-sharable resources

o C) Resources cannot be forcibly retrieved

o D) Processes must execute sequentially

9. What is the purpose of deadlock avoidance schemes?


o A) To detect and resolve deadlock once it occurs

o B) To prevent deadlock from occurring by modifying resource allocation

o C) To terminate all processes involved in a deadlock

o D) To increase the availability of resources

10. Which of the following is an example of a sharable resource created by


spooling?

o A) A shared printer queue

o B) A single printer for multiple processes

o C) A simulated printer via a mass storage device

o D) A set of dedicated printers for each process

Here are Top important MCQs from your CS101 module 57:

1. What is the purpose of establishing user accounts in an operating system?

o A) To manage system resources efficiently

o B) To allocate memory and processing power

o C) To control access to the system and its resources

o D) To optimize the computer's performance

2. Who is responsible for managing accounts and settings in an operating system?

o A) Normal user

o B) Software developer

o C) Super user or administrator

o D) Network manager

3. What is auditing software used for?

o A) Optimizing system performance


o B) Creating user accounts

o C) Recording and analyzing activities within the computer system

o D) Improving file management

4. What might a flood of incorrect password attempts indicate?

o A) A software bug

o B) A system update is needed

o C) An unauthorized user attempting to gain access

o D) Network congestion

5. What is sniffing software designed to do?

o A) Optimize system performance

o B) Enhance user experience

o C) Record and report system activities to an intruder

o D) Delete unauthorized user accounts

6. What is an example of sniffing software?

o A) A word processor

o B) Antivirus software

o C) A program simulating the operating system’s login procedure

o D) A file compression tool

7. What behavior might indicate that an unauthorized user has accessed an


account?

o A) Frequent login attempts

o B) Activities that do not conform to the user’s past behavior

o C) Slow system performance

o D) Changes in file permissions

8. Which of the following is a common mistake made by users that compromises


system security?

o A) Logging out after use


o B) Using encryption software

o C) Selecting passwords that are easy to guess

o D) Updating software regularly

9. Why is transferring offline storage devices between machines a security risk?

o A) It slows down the system

o B) It exposes the devices to potential degradation or malware

o C) It requires additional user permissions

o D) It increases system memory usage

10. How do institutions address user carelessness in maintaining security?

o A) Using stronger hardware

o B) Adopting and enforcing security policies

o C) Limiting system access to one user

o D) Increasing processor speeds

Here are Top important MCQs from your CS101 module 58:

1. What is the primary goal of an intruder who gains access to a computer system?

o A) To improve system performance

o B) To assist the administrator

o C) To explore for information or insert destructive software

o D) To enhance memory management

2. Why is the administrator’s password closely guarded?

o A) To prevent file duplication

o B) To allow access to all users

o C) To prevent unauthorized access to critical privileges

o D) To reduce system errors


3. What is the purpose of special-purpose registers in CPUs designed for
multiprogramming systems?

o A) To allocate additional memory

o B) To store user credentials

o C) To store the upper and lower memory limits for processes

o D) To monitor system performance

4. What happens when a process references memory outside its allotted area?

o A) The system ignores the reference

o B) The CPU transfers control to the operating system

o C) The memory manager automatically extends the area

o D) The process terminates immediately

5. What is the purpose of privilege levels in CPUs?

o A) To enhance the CPU’s speed

o B) To allow users to modify operating system files

o C) To restrict access to certain instructions

o D) To improve multiprogramming efficiency

6. Which of the following is a privileged instruction?

o A) Adding two numbers

o B) Allocating memory to a process

o C) Changing the contents of memory limit registers

o D) Reading data from a file

7. What happens when a privileged instruction is executed in non-privileged


mode?

o A) The CPU ignores the instruction

o B) An interrupt is triggered

o C) The process terminates

o D) The instruction executes partially


8. Why is maintaining privilege levels important in operating system design?

o A) To optimize CPU usage

o B) To prevent malicious actions and programming errors

o C) To allow faster execution of processes

o D) To ensure seamless multitasking

9. What could happen if a process is allowed to alter the timer controlling the
system's multiprogramming?

o A) The process becomes faster

o B) The process could dominate the machine by extending its time slice

o C) The operating system crashes

o D) The CPU halts

10. Which of the following is NOT a consequence of allowing a process to access


memory cells outside its designated area?

o A) Reading data used by other processes

o B) Altering data used by other processes

o C) Increasing system performance

o D) Compromising system security

Here are Top important MCQs from your CS101 module 59:

1. What is the primary use of a Personal Area Network (PAN)?

o A) To connect computers across cities

o B) To enable short-range communications, such as between a wireless


mouse and PC

o C) To link computers in a university

o D) To span a local community


2. Which network type typically connects computers in a single building or
building complex?

o A) Wide Area Network (WAN)

o B) Metropolitan Area Network (MAN)

o C) Local Area Network (LAN)

o D) Personal Area Network (PAN)

3. What is a distinguishing feature of an open network?

o A) It requires license fees for usage

o B) Its design is freely circulated and publicly available

o C) It is only for private organizational use

o D) It is used for short-range communication

4. What governs communication across the Internet?

o A) Novell Inc. standards

o B) Star topology protocols

o C) TCP/IP protocol suite

o D) Proprietary designs

5. Which of the following is an example of a closed or proprietary network?

o A) The Internet

o B) A network developed by Novell Inc.

o C) A LAN within a university

o D) A public Wi-Fi network

6. What is the defining characteristic of a star topology?

o A) Machines are connected in a circular arrangement

o B) One machine serves as the central focal point for all others

o C) Machines are connected to a common communication line

o D) It uses only wired connections


7. What is the central machine in a star topology wireless network called?

o A) Hub

o B) Router

o C) Access Point (AP)

o D) Ethernet

8. Which network topology uses a common communication line called a bus?

o A) Star

o B) Bus

o C) Ring

o D) Mesh

9. What is one of the most popular networking systems based on the bus
topology?

o A) Novell NetWare

o B) Ethernet

o C) Wi-Fi

o D) TCP/IP

10. Which network type is typically used to link machines over large distances,
such as across cities or countries?

o A) LAN

o B) PAN

o C) WAN

o D) MAN
Here are Top important MCQs from your CS101 module 60:

1. What is the primary purpose of protocols in networking?

o A) To establish physical connections between machines

o B) To define rules for reliable and coordinated communication

o C) To control hardware components

o D) To monitor network traffic

2. Which protocol is used in Ethernet-based bus networks to manage message


transmissions?

o A) TCP/IP

o B) CSMA/CA

o C) CSMA/CD

o D) IEEE 802.11

3. In the CSMA/CD protocol, what happens if two machines transmit at the same
time?

o A) The transmission is canceled permanently

o B) The transmission continues without interruption

o C) Both machines detect the collision and retry after random delays

o D) The machines prioritize based on signal strength

4. Why is CSMA/CD not suitable for wireless star networks?

o A) Wireless networks lack access points

o B) Wireless signals are stronger than wired signals

o C) Collisions may not be detected due to the hidden terminal problem

o D) Star networks do not use protocols

5. What is the hidden terminal problem in wireless networks?

o A) A machine failing to detect the AP

o B) Signals from machines being blocked from one another

o C) Machines not transmitting messages at all


o D) AP rejecting all requests

6. What is the primary protocol used in wireless networks to avoid collisions?

o A) CSMA/CD

o B) CSMA/CA

o C) Ethernet

o D) TCP/IP

7. What is a key difference between CSMA/CD and CSMA/CA protocols?

o A) CSMA/CD avoids collisions, while CSMA/CA detects them

o B) CSMA/CD uses acknowledgment messages, while CSMA/CA does not

o C) CSMA/CD detects collisions, while CSMA/CA avoids them

o D) CSMA/CA is used only in wired networks

8. How do machines in a wireless network know when to transmit messages under


CSMA/CA?

o A) They wait for AP acknowledgment of every transmission

o B) They wait for a silent channel and retry after random delays if busy

o C) They monitor all transmissions directly

o D) They transmit immediately upon detecting silence

9. What does a machine in a WiFi network do if the AP is busy with a hidden


terminal?

o A) Transmit immediately

o B) Retry until successful

o C) Wait for the AP to acknowledge the request

o D) Cancel the transmission

10. Why does a wireless network require the AP to send acknowledgments for
requests?

o A) To confirm data transmission speed

o B) To ensure machines know when the AP is busy or free


o C) To prioritize certain machines over others

o D) To reduce network speed

Here are Top important MCQs from your CS101 module 61:

1. What is the primary function of a repeater in a bus network?

o A) To filter messages based on destination

o B) To pass and amplify signals between two buses

o C) To connect multiple buses simultaneously

o D) To forward messages based on internet-wide addresses

2. How does a bridge improve network efficiency compared to a repeater?

o A) By amplifying signals more effectively

o B) By connecting multiple buses

o C) By forwarding only messages destined for another bus

o D) By changing the protocol of the network

3. What is the key difference between a bridge and a switch?

o A) Bridges connect more networks than switches

o B) Switches amplify signals while bridges do not

o C) Bridges operate only in wireless networks

o D) Switches connect multiple buses and forward messages to specific


spokes

4. What happens when networks are connected using repeaters, bridges, or


switches?

o A) They form a decentralized internet

o B) They operate as a single extended network using the same protocol

o C) Each network operates independently

o D) Protocols of the original networks are replaced

5. What is an internet in the context of networking?


o A) A single network that uses routers

o B) A network of networks where each maintains its individuality

o C) Any WiFi network

o D) A network using repeaters

6. What is the primary function of a router in an internet?

o A) To amplify signals across networks

o B) To forward messages while maintaining network individuality

o C) To act as an access point for local machines

o D) To merge protocols of different networks

7. Why do routers use forwarding tables?

o A) To amplify signals more efficiently

o B) To create local network addresses

o C) To determine the proper direction for forwarding messages

o D) To connect multiple buses

8. What is the purpose of the "gateway" in a network?

o A) To merge two Ethernet networks

o B) To amplify signals across the internet

o C) To act as the passageway between a network and the outside world

o D) To change the network's local addresses

9. What type of addressing system is used in an internet?

o A) Local-only addressing

o B) Repeater-based addressing

o C) Internet-wide unique addressing

o D) Protocol-based addressing

10. In most residential WiFi networks, what does the term "gateway" typically refer
to?
o A) A standalone router

o B) A switch connected to the router

o C) A combined access point and router unit

o D) A forwarding table for routers

Here are Top important MCQs from your CS101 module 62:

1. What is inter-process communication in networking?

o A) Communication between networks

o B) Communication between processes to coordinate actions and


perform tasks

o C) Communication between routers

o D) Communication over the internet

2. What role does a client play in the client/server model?

o A) Provides services to other processes

o B) Makes requests to a server

o C) Executes continuously to provide services

o D) Shares files with peers

3. Which of the following is an example of the client/server model?

o A) Sharing music files via a swarm

o B) Using a print server in an office network

o C) Instant messaging between users

o D) Playing competitive games over the internet

4. What distinguishes the peer-to-peer (P2P) model from the client/server model?

o A) In the P2P model, processes provide and receive services from each
other

o B) The P2P model uses centralized servers for efficiency


o C) The P2P model does not involve temporary processes

o D) The P2P model is only used for file distribution

5. What is a common application of the peer-to-peer model?

o A) Distributing files such as music or movies over the Internet

o B) Centralized data storage for an organization

o C) Hosting a website

o D) Managing network routers

6. Why is the P2P model often preferred for file sharing?

o A) It ensures centralized control over file distribution

o B) It distributes the service task over many peers

o C) It enforces copyright laws more effectively

o D) It provides a faster internet connection

7. What is a "swarm" in the context of file distribution?

o A) A central server managing file downloads

o B) A collection of peers sharing files in a P2P system

o C) A type of router configuration

o D) A messaging network

8. What is a disadvantage of the P2P model for file sharing?

o A) It requires a central distribution center

o B) It is less efficient than the client/server model

o C) It complicates legal enforcement of copyright laws

o D) It does not support temporary processes

9. What is a misconception about peer-to-peer networks?

o A) They require a centralized server

o B) They are limited to file sharing

o C) The term refers to a property of the network itself


o D) They only work with certain protocols

10. Can a process switch between the client/server and peer-to-peer models?

o A) No, it must choose one model exclusively

o B) Only when using a centralized network

o C) Yes, it can use both models over the same network

o D) Only when using specific file-sharing protocols

Here are Top important MCQs from your CS101 module 63:

1. What is a distributed system?

o A) A system that runs on a single computer

o B) A network of routers and switches

o C) A software system consisting of processes executing on different


computers

o D) A centralized computing system

2. What is the primary goal of prefabricated systems in distributed computing?

o A) To provide a common infrastructure for communication and security

o B) To eliminate the need for networking

o C) To replace distributed applications entirely

o D) To decentralize software development

3. What is the purpose of cluster computing?

o A) To create a single supercomputer

o B) To replace all independent computers with one central machine

o C) To allow many independent computers to work closely together for


high availability and load balancing

o D) To run multiple operating systems on the same computer

4. What is an advantage of cluster computing?

o A) High cost and high maintenance


o B) Low reliability compared to supercomputers

o C) High availability and automatic load-balancing

o D) Exclusively designed for scientific research

5. What distinguishes grid computing from cluster computing?

o A) Grid computing is more loosely coupled than cluster computing

o B) Grid computing is exclusively for supercomputers

o C) Grid computing cannot handle large tasks

o D) Grid computing requires specialized hardware

6. Which of the following is an example of grid computing?

o A) Amazon Elastic Compute Cloud

o B) Google Drive and Google Apps

o C) Berkeley’s Open Infrastructure for Network Computing (BOINC)

o D) Office networking systems

7. What is the primary advantage of cloud computing?

o A) Eliminates the need for Internet connectivity

o B) Requires maintaining individual data centers

o C) Provides access to huge pools of shared computing resources as


needed

o D) Ensures complete control over data and hardware

8. Which of the following is an example of a cloud computing service?

o A) BOINC

o B) Condor

o C) Amazon’s Elastic Compute Cloud

o D) High-speed networking

9. What concern is associated with cloud computing?

o A) Lack of scalability
o B) Poor reliability guarantees

o C) Privacy and security issues

o D) Excessive hardware ownership by clients

10. What is the key similarity between cloud computing and early electrical grids?

o A) Both rely on centralized control of individual resources

o B) Both require specific physical locations for operation

o C) Both eliminate the need for individual businesses to maintain their


own infrastructure

o D) Both are exclusively designed for scientific tasks

Here are Top important MCQs from your CS101 module 64:

1. What is an Internet Service Provider (ISP)?

o A) A device that connects end systems to the Internet

o B) An organization that constructs and maintains networks connected to


the Internet

o C) A type of router used in home networks

o D) A software application for Internet access

2. What is the primary role of tier-1 ISPs?

o A) To provide Internet access to individual homes

o B) To serve as the backbone of the Internet with high-speed international


WANs

o C) To operate wireless access points

o D) To supply local Internet services to businesses


3. How do tier-2 ISPs differ from tier-1 ISPs?

o A) They are more regional in scope and less capable

o B) They focus exclusively on end-user access

o C) They operate only within universities and corporations

o D) They provide free Internet access to all users

4. What is the role of a tier-3 ISP?

o A) To maintain the Internet backbone

o B) To provide access to the Internet core for individual homes and


businesses

o C) To manage international WANs

o D) To connect different tier-1 ISPs

5. What is another name for a tier-3 ISP?

o A) Backbone ISP

o B) Global ISP

o C) Access ISP

o D) Cellular ISP

6. Which devices are referred to as end systems or hosts?

o A) Only personal computers

o B) Only laptops and mobile phones

o C) Any device that benefits from communicating with other devices

o D) Only networking routers

7. What is the primary role of an access point (AP) in WiFi technology?


o A) To connect to an access ISP and provide Internet access to devices
within its range

o B) To act as a tier-1 ISP

o C) To maintain the Internet’s backbone infrastructure

o D) To generate data packets for the Internet

8. What is a WiFi hot spot?

o A) A device that replaces routers

o B) An area within the range of an access point providing Internet access

o C) A network exclusively for home appliances

o D) A server that hosts websites

9. What is the cellular equivalent of a WiFi hot spot?

o A) Router

o B) Cell

o C) ISP

o D) Intranet

10. How does the cellular industry provide continuous service as devices move?

o A) By connecting devices only to tier-2 ISPs

o B) By using static connections to single cells

o C) By coordinating "routers" generating cells to maintain seamless


transitions
Here are Top important MCQs from your CS101 module 65:

1. What is an IP address?

o A) A name used to identify domains on the Internet

o B) A physical location identifier for computers

o C) A unique identifying address assigned to computers in the Internet


system

o D) A device that connects to the Internet

2. What is the size of an IP address in the ongoing transition?

o A) 64 bits

o B) 32 bits only

o C) 256 bits

o D) 128 bits

3. Which organization awards IP address blocks to ISPs?

o A) Internet Service Providers (ISPs)

o B) Internet Corporation for Assigned Names and Numbers (ICANN)

o C) DNS servers

o D) Network Providers Association

4. How is an IP address written in dotted decimal notation?

o A) As a continuous binary string

o B) As bytes separated by periods, each byte expressed in base 10

o C) As hexadecimal values

o D) As a sequence of alphabets

5. What does the suffix in a domain name represent?

o A) The IP address of the domain

o B) The server type hosting the domain


o C) The domain’s classification (e.g., com, edu, gov)

o D) The organization’s registration number

6. What is the purpose of DNS?

o A) To create mnemonic names for IP addresses

o B) To translate mnemonic domain names into IP addresses

o C) To provide Internet services

o D) To allocate IP addresses

7. What are the servers used for address translation called?

o A) Internet Servers

o B) Domain Registrars

o C) Name Servers

o D) Access ISPs

8. What is a TLD in domain names?

o A) The top-level domain suffix (e.g., com, org, edu)

o B) The server location identifier

o C) A specific part of the IP address

o D) The subdomain of a network

9. What does a subdomain in a domain name represent?

o A) A unique IP address assigned to a machine

o B) A smaller organizational unit within a domain

o C) The mnemonic name assigned to the DNS server

o D) The physical location of a domain

10. Why do small organizations often use an ISP’s resources for their domains?

o A) To maintain their own DNS servers

o B) To assign IP addresses to other entities


o C) To avoid the cost of establishing and maintaining their own name
server

o D) To provide high-speed Internet connections

Here are Top important MCQs from your CS101 module 66:

1. Which protocol is used by a newsreader application to contact servers?

o A) FTP

o B) NNTP

o C) HTTP

o D) Telnet

2. What protocol has replaced Telnet for secure remote computer access?

o A) FTP

o B) HTTP

o C) SSH

o D) SMTP

3. Which protocol has become a universal standard for most Internet applications
today?

o A) FTP

o B) HTTP

o C) NNTP

o D) VoIP

4. What is VoIP used for?

o A) Video streaming

o B) File transfer

o C) Voice communication over the Internet


o D) Remote desktop access

5. Which of the following is a major challenge for VoIP services?

o A) Transferring audio data

o B) Low bandwidth availability

o C) Integration with traditional telephone systems

o D) Lack of secure communication protocols

6. Which governments are likely to heavily tax or outlaw VoIP?

o A) Countries with high Internet bandwidth

o B) Countries with free Internet services

o C) Countries owning traditional telephone companies

o D) Countries with no telecommunication regulations

7. What is Internet multimedia streaming?

o A) Downloading files for later use

o B) Sending voice messages through email

o C) Transporting audio and video in real-time

o D) Secure data transfer

8. Which two services are responsible for consuming over half of the Internet
bandwidth?

o A) Facebook and Twitter

o B) Netflix and YouTube

o C) VoIP and IM

o D) FTP and Telnet

9. What was the volume of Netflix streaming in the first quarter of 2013?

o A) 1 billion hours

o B) 3 billion hours

o C) 4 billion hours
o D) 10 billion hours

10. What is one of the oldest uses of the Internet?

o A) Streaming multimedia

o B) Voice communication

o C) Electronic mail (email)

o D) File transfer

Here are Top important MCQs from your CS101 module 67:

1. Which of the following is the oldest messaging application on the Internet?

o A) Twitter-based tweets

o B) Facebook wall

o C) Instant messaging

o D) Electronic mail (Email)

2. Which protocol is used to send text-based email messages?

o A) POP3

o B) IMAP

o C) SMTP

o D) MIME

3. What is the role of MIME in email communication?

o A) It allows users to download emails.

o B) It encrypts email messages for security.

o C) It converts non-ASCII content into SMTP-compatible form.

o D) It compresses large email attachments.


4. Which protocol is used to store messages on the mail server instead of the
local machine?

o A) SMTP

o B) IMAP

o C) POP3

o D) MIME

5. What is the advantage of using POP3 over IMAP?

o A) It allows sending email messages.

o B) It supports multiple email folders.

o C) It stores emails on the local machine.

o D) It converts non-ASCII to ASCII.

6. In the example where [email protected] sends an email to


[email protected], which protocol is used for transferring the email
between servers?

o A) POP3

o B) IMAP

o C) SMTP

o D) MIME

7. Which protocol is primarily used by email clients to retrieve messages stored


on the mail server?

o A) IMAP

o B) SMTP

o C) MIME

o D) FTP

8. What is the function of the Post Office Protocol Version 3 (POP3)?

o A) To convert emails into ASCII form

o B) To download and store emails on the local machine


o C) To send emails to recipients

o D) To organize emails into folders on the server

9. What allows users to organize and maintain email messages in folders on the
server?

o A) SMTP

o B) POP3

o C) IMAP

o D) MIME

10. Which combination of protocols is required for a complete email system that
includes sending and receiving emails?

o A) IMAP and MIME

o B) SMTP and POP3/IMAP

o C) SMTP and FTP

o D) SMTP, POP3, and IMAP

Here are Top important MCQs from your CS101 module 68:

1. What does VoIP (Voice over Internet Protocol) use for voice communication?

o A) Traditional telephone systems

o B) Internet infrastructure

o C) Analog telephone signals

o D) Wireless telephone systems

2. Which model does VoIP use for transferring audio data between machines?

o A) Client-server model

o B) P2P (Peer-to-Peer) model

o C) TCP/IP model

o D) Star topology
3. What is one of the main challenges faced by VoIP systems beyond simple data
transfer?

o A) Initiating and receiving calls, linking with traditional telephone


systems

o B) Sending data over long distances

o C) Handling large volumes of video data

o D) Providing Wi-Fi services

4. Why do some governments tax or outlaw VoIP systems?

o A) Because VoIP threatens traditional telephone systems owned by the


government

o B) Because VoIP consumes too much bandwidth

o C) Because VoIP uses illegal frequencies

o D) Because VoIP provides high security

5. Which of the following is an example of a VoIP soft phone system?

o A) Skype

o B) WhatsApp

o C) Zoom

o D) Telegram

6. What is one drawback of Skype as a VoIP system?

o A) It is not widely compatible with other networks.

o B) It is a proprietary system with limited transparency and verification.

o C) It is not secure for communication.

o D) It is too expensive for general users.

7. What is the function of an analog telephone adapter in VoIP systems?

o A) To provide access to mobile phones

o B) To connect a traditional telephone to VoIP services provided by an ISP

o C) To connect a computer to the phone network


o D) To replace a traditional telephone with an Ethernet phone

8. What type of VoIP system is increasingly used by large organizations to replace


traditional phone systems?

o A) VoIP soft phones

o B) Analog telephone adapters

o C) Embedded VoIP phones

o D) Wireless VoIP phones

9. How do smartphones use VoIP technology on 4G networks?

o A) They use proprietary cellular networks.

o B) They access the Internet through gateways.

o C) They are IP-based devices that connect directly to the Internet via 4G
networks.

o D) They require analog adapters to make VoIP calls.

10. What is the main advantage of using VoIP over traditional telephone systems for
large organizations?

o A) It increases security.

o B) It offers a better sound quality.

o C) It reduces costs and enhances features.

o D) It improves hardware reliability.


Here are Top important MCQs from your CS101 module 73:

1. What does the anchor tag <a> in HTML allow you to do?

o A) Embed a video

o B) Create a hyperlink to another webpage

o C) Display an image

o D) Change the text color

2. Which attribute is used to specify the URL in an anchor tag?

o A) src

o B) url

o C) href

o D) target

3. Which of the following is the correct syntax for a link in HTML?

o A) <link href="http://example.com">here</link>

o B) <a href="http://example.com">here</a>

o C) <a url="http://example.com">here</a>

o D) <a link="http://example.com">here</a>

4. What does the src attribute in the <img> tag specify?

o A) The file format of the image

o B) The source location of the image

o C) The size of the image

o D) The title of the image

5. Where does the image appear if the <img> tag is placed right after the <body>
tag in an HTML document?

o A) At the bottom of the webpage

o B) At the top of the webpage

o C) In the footer section


o D) In the header section

6. What happens if the image tag <img


src="http://Images.com/Images/OurPic.jpg"> is placed at the end of the
document?

o A) The image won't display

o B) The image will appear in the center of the page

o C) The image will display at the bottom of the webpage

o D) The image will be hidden

7. What is the function of the href attribute in the anchor tag?

o A) It specifies the text of the link

o B) It defines the size of the linked image

o C) It defines the destination URL for the link

o D) It specifies the type of link (external or internal)

8. Which of the following is the correct HTML syntax for displaying an image in a
webpage?

o A) <image src="http://example.com/image.jpg">

o B) <img src="http://example.com/image.jpg">

o C) <src image="http://example.com/image.jpg">

o D) <pic src="http://example.com/image.jpg">

9. If you wanted to link the word 'here' to another webpage with the URL
http://crafty.com/demo.html, which HTML element would you use?

o A) <link>

o B) <img>

o C) <a>

o D) <button>

10. What would happen if the anchor tag <a


href="http://crafty.com/demo.html">here</a> is clicked?
o A) The text 'here' would be displayed as a heading

o B) A new image would be displayed

o C) The browser would navigate to the URL http://crafty.com/demo.html

o D) Nothing would happen

Here are Top important MCQs from your CS101 module 74:

1. Which website provides information about all HTML tags and their usage?

o A) W3Schools

o B) StackOverflow

o C) MDN Web Docs

o D) HTML.com

2. What happens when you click on the <b> tag on the W3Schools website?

o A) You are redirected to a different webpage

o B) You are shown the details and usage of the <b> tag

o C) The page refreshes

o D) The code is executed

3. What is the purpose of the green "Try it Yourself" button on W3Schools?

o A) To show the raw HTML code

o B) To display the code and its output side by side

o C) To redirect to another page

o D) To generate HTML code automatically

4. In W3Schools, when using the "Try it Yourself" feature, where is the code
displayed?

o A) In a new browser tab

o B) On the left side of the screen


o C) In the middle of the page

o D) On the right side of the screen

5. What does the <b> tag in HTML do?

o A) Makes text bold

o B) Boldens the enclosed text

o C) Italicizes the enclosed text

o D) Adds a background color

6. Where can you find information about how to use specific HTML tags like <b>?

o A) W3Schools

o B) GitHub

o C) WordPress

o D) Reddit

7. When you click the "Try it Yourself" button, what happens on the W3Schools
website?

o A) It shows a list of related tutorials

o B) It runs the code in an online editor and shows the output

o C) It redirects to a different website

o D) It downloads the file to your computer

8. What is shown on the right side of the screen in the "Try it Yourself" feature on
W3Schools?

o A) The HTML structure of the website

o B) The output of the HTML code

o C) A tutorial video

o D) The source code of the website

9. What is the primary purpose of the W3Schools website?

o A) To provide forums for discussing HTML

o B) To offer tutorials and information on HTML tags and their usage


o C) To sell HTML courses

o D) To provide downloadable HTML templates

10. What is an example of an HTML tag you can learn more about on W3Schools?

o A) <img>

o B) <a>

o C) <div>

o D) All of the above

Here are Top important MCQs from your CS101 module 75:

1. What does XML stand for?

o A) eXtensible Markup Language

o B) Extra Markup Language

o C) Extended Macro Language

o D) External Markup Language

2. What is one of the main advantages of XML?

o A) It only supports text documents

o B) It allows the creation of new markup languages for different


applications

o C) It is used only for multimedia presentations

o D) It is designed specifically for web pages

3. What is the difference between HTML and XML?

o A) HTML emphasizes semantics, while XML focuses on appearance

o B) HTML is primarily for web pages, while XML is used for data
representation

o C) XML is obsolete and no longer used

o D) HTML supports only text, while XML supports multimedia


4. Which markup language is based on the XML standard and used for web pages?

o A) SGML

o B) HTML

o C) XHTML

o D) CSS

5. What does XML allow that HTML does not?

o A) Emphasis on semantics rather than appearance

o B) Web page creation

o C) Embedded multimedia files

o D) Page formatting

6. In the XML system, how are components delineated?

o A) By curly braces

o B) By the symbols < and >

o C) By square brackets

o D) By semicolons

7. What is a key feature of semantic-oriented tags in XML?

o A) They focus on the appearance of data

o B) They emphasize the meaning of the data rather than its format

o C) They are used only for mathematical expressions

o D) They define the order of data

8. Why is XML considered a better option than HTML for representing certain types
of data?

o A) XML only allows simple data representations

o B) XML provides a standardized framework for various types of data

o C) XML is only compatible with text data

o D) XML is easier to use than HTML


9. What would a semantic web enable that the current web does not?

o A) Better formatting of documents

o B) Search engines to understand the meaning of data

o C) More images and multimedia in web pages

o D) Faster web browsing

10. What can semantic tags help search engines identify that non-semantic tags
cannot?

o A) The style of the content

o B) Specific ingredients in a recipe or data in a document

o C) The layout of the document

o D) Keywords within the content

Here are Top important MCQs from your CS101 module 76:

1. How many layers are there in the Internet software model?

o A) 3

o B) 4

o C) 5

o D) 6

2. Which layer is responsible for preparing a message for transmission over the
network?

o A) Network layer

o B) Transport layer

o C) Link layer

o D) Application layer
3. In the layered approach, which layer is responsible for delivering the message
to the destination application?

o A) Transport layer

o B) Link layer

o C) Application layer

o D) Network layer

4. What is the primary function of the link layer in the Internet software model?

o A) Handle message routing

o B) Transmit the message over the physical network

o C) Process data for web applications

o D) Manage connections between devices

5. Which layer handles the communication between different networks?

o A) Link layer

o B) Network layer

o C) Transport layer

o D) Application layer

6. Which of the following best describes the flow of a message in the Internet
software model?

o A) It flows from the application layer to the link layer, then to the transport
and network layers

o B) It flows from the application layer down through transport and network
layers, and then is transmitted by the link layer

o C) It only passes through the transport layer

o D) It only passes through the network layer

7. What happens when a message is received by the link layer at the destination?

o A) It is discarded

o B) It is passed up through the layers until it reaches the application layer


o C) It is processed by the network layer

o D) It is immediately sent back to the sender

8. Which layer is typically responsible for handling the user interface and
application-specific logic?

o A) Link layer

o B) Application layer

o C) Transport layer

o D) Network layer

9. What does the transport layer ensure when transmitting a message?

o A) The message reaches the destination quickly

o B) Reliable delivery of the message

o C) The message is encrypted

o D) The message is formatted correctly

10. What is the role of the network layer in the Internet software model?

o A) It ensures the security of the data

o B) It maintains the data connection

o C) It handles the routing and forwarding of messages across networks

o D) It displays the message to the user

Here are Top important MCQs from your CS101 module 78:

1. What is the responsibility of the application layer in the Internet software


model?

o A) To route messages across networks

o B) To provide an address compatible with the Internet infrastructure

o C) To divide long messages into small segments

o D) To ensure the reliability of message transmission


2. Which service does the application layer use to translate mnemonic addresses
into Internet-compatible IP addresses?

o A) DNS

o B) Name servers

o C) Transport layer

o D) Network routers

3. What is the primary role of the transport layer in the Internet software model?

o A) To send messages to the application layer

o B) To ensure that messages are properly formatted for transmission

o C) To route packets across networks

o D) To provide encryption services

4. Why does the transport layer divide long messages into smaller segments?

o A) To avoid data loss

o B) To prevent blocking the flow of other messages at Internet routers

o C) To reduce transmission errors

o D) To improve message encryption

5. What do the transport layer's small segments, also called packets, include to
facilitate reassembly at the destination?

o A) Data checksum

o B) Sequence numbers

o C) Destination IP addresses

o D) Routing paths

6. At what layer are the small segments treated as individual, unrelated messages
during transmission?

o A) Link layer

o B) Network layer

o C) Application layer
o D) Transport layer

7. What happens when packets related to a common message travel through


different paths on the Internet?

o A) The packets are discarded

o B) They are treated as unrelated messages until they reach the


destination

o C) The packets are merged automatically

o D) They are encrypted to prevent interception

8. How are the segments of a message reassembled at the destination?

o A) By using encryption keys

o B) By examining the IP address of each packet

o C) By using the sequence numbers added by the transport layer

o D) By waiting for the longest packet to arrive first

9. What analogy is used in the text to explain the role of the transport layer?

o A) Sending a letter via postal service

o B) Shipping packages through a shipping company

o C) Sending messages over the phone

o D) Delivering emails

10. What is the main advantage of dividing messages into smaller segments at the
transport layer?

o A) Reducing the overall size of the message

o B) Improving the flow of messages by preventing congestion at routers

o C) Ensuring that messages are delivered securely

o D) Preventing message duplication


Here are Top important MCQs from your CS101 module 79:

1. What is the main responsibility of the network layer in the Internet software
model?

o A) To manage the transmission of packets within a network

o B) To decide the direction in which a packet should be sent at each step

o C) To divide long messages into smaller segments

o D) To maintain the forwarding table

2. Which layer is responsible for maintaining the router's forwarding table?

o A) Link layer

o B) Application layer

o C) Network layer

o D) Transport layer

3. What is the link layer’s responsibility when receiving a packet at the router?

o A) To reassemble the message

o B) To transmit the packet to the next destination

o C) To divide the message into smaller segments

o D) To assign a unique port number to the message

4. Which method does the link layer apply when using Ethernet as the network?

o A) CSMA/CA

o B) CSMA/CD

o C) DNS

o D) Dynamic routing

5. How is the final destination of a packet determined at an intermediate stop?

o A) By using the IP address of the packet

o B) By using the forwarding table of the network layer


o C) By analyzing the message header

o D) By inspecting the link layer

6. At the final destination, which layer hands the packet to the transport layer?

o A) Application layer

o B) Network layer

o C) Link layer

o D) Router layer

7. How does the transport layer reassemble the original message?

o A) By using the IP address of the message

o B) By decrypting the packet

o C) By using the sequence numbers assigned to the segments

o D) By inspecting the application header

8. What is the role of port numbers in the transport layer?

o A) To identify the source and destination networks

o B) To assign the correct application within the application layer

o C) To determine the security level of a message

o D) To compress the message

9. Which port number does a web browser use to access an HTTP server?

o A) 25

o B) 80

o C) 443

o D) 21

10. What is the primary function of the link layer in the Internet software model?

o A) To divide large messages into small packets

o B) To direct packets through routers

o C) To handle the actual transmission of packets


o D) To assign port numbers to applications

Here are Top important MCQs from your CS101 module 80:

1. Which transport layer protocol is more efficient and streamlined but less
reliable?

o A) TCP

o B) UDP

o C) HTTP

o D) FTP

2. In which scenario is UDP typically preferred over TCP?

o A) Email transfer

o B) DNS lookups and VoIP

o C) File transfers

o D) Web browsing

3. What is the primary task of the IP protocol in the TCP/IP model?

o A) To transfer messages reliably

o B) To assign port numbers to applications

o C) To forward and route packets through the Internet

o D) To handle encryption and decryption

4. What does the IP network layer append to each packet to prevent it from
circulating indefinitely?

o A) Sequence number

o B) Hop count (Time to Live)

o C) Checksum

o D) Destination address

5. What happens to the hop count value as a packet is forwarded by each router?
o A) It is incremented by one

o B) It is decremented by one

o C) It remains unchanged

o D) It is replaced with the router ID

6. What is the initial hop count value that is generally sufficient for packets to
reach their destination in today’s Internet?

o A) 32

o B) 128

o C) 64

o D) 256

7. Why is TCP preferred for email transmission?

o A) It is faster than UDP

o B) It ensures timely delivery

o C) It is less time-sensitive, offering reliability

o D) It is more efficient for high-speed transmission

8. What is the purpose of the hop count value in packet forwarding?

o A) To increase the packet's priority

o B) To limit the number of times a packet is forwarded

o C) To track the packet's route

o D) To secure the packet during transmission

9. Which protocol is known for its ability to handle routing updates among
neighboring network layers?

o A) DNS

o B) HTTP

o C) IP

o D) ICMP

10. What type of applications would benefit from using UDP over TCP?
o A) Banking transactions

o B) Real-time applications like VoIP and DNS lookups

o C) Large file transfers

o D) Secure communications

You might also like