Introduction to Computing Solved
Introduction to Computing Solved
Objective Questions
1. The simplest form of array is the ________ array.
1. multi-dimensional
2. two-dimensional
3. one-dimensional
4. All of the given
2. One of the major uses of the ________ operation is for
placing 0s in one part of a bit pattern while not disturbing the
other part.
1. AND
2. OR
3. XOR
4. NOR
3. Table group is a part of ________ ribbon:
1. Home
2. Insert
3. Design
4. View
4. In the United States the Privacy Act of 1974 was to protect
citizens from abusive use of databases:
1. Government
2. Public
3. Agencies
4. Companies
5. ________ tag is used to write paragraph in HTML document.
1. <p>
2. <pr>
3. <pa>
4. <pg>
6. ________ is used to store colorful images.
1. RGB
2. Pixel
3. Bitmap
Page | 1
4. Scaling
7. Let a list Fred, Alex, Diana, Byron, Carol
After sorted first sub list our list would be
1. Alex, Fred, Diana, Byron, Carol
2. Fred, Alex, Diana, Byron, Carol
3. Alex, Diana, Fred, Byron, Carol
4. Alex, Fred, Byron, Diana, Carol
8. Which of the following modems is slowest?
1. ISDN
2. Cable
3. DSL
4. Standard
9. To identify individual cells in a Computer's main memory,
each cell is assigned a unique "name", called its ________.
1. Path
2. Address
3. Place holder
4. Location
10. American use about 680 pounds of paper in a year:
1. Per person
2. Per company
3. Per newspaper
4. Per city
11. Data can come from:
1. Passwords
2. Personal software
3. Emails
4. All of the given
12. Shortcut for Track Changes in MS word is
1. Ctrl + Shift + T
2. Ctrl + Shift + D
3. Ctrl + Shift + E
4. Ctrl + Shift + F
13. Which of the following is not the advantage of TCP
over UDP?
1. Congestion control
2. Flow control
3. Connection establishment
Page | 2
4. Efficiency
14. Command that can immediately go to a page or any
marked location within your document.
1. Search
2. Go to
3. Format
4. Ribbon
15. ________ Network fails if a single node fails.
1. Ring
2. Bus
3. Star
4. None of the given
16. ________ is a tool that is used to organize data, such as
a check register.
1. Slide
2. Spread sheet
3. Transitions
4. Insert
17. What is the full form of ASP?
1. Active Start Pages
2. Active Server Pages
3. Alternate Server Pages
4. Alternate Start Pages
18. Robots identifies veins by:
1. Touching veins
2. Image processing
3. Artificial intelligence
4. Testing
19. TLD stands for ________.
1. Top Loud Domain
2. Top Level Domain
3. Top Lower Domain
4. Top low domain
20. One bit can contain only ________ value.
1. Zero
2. One
3. Two
4. Threw
Page | 3
21. A program DOCTOR developed by Joseph Weizenbaum in
the mid-1960s named as:
1. Alexa
2. Smart Doctor
3. Eliza
4. Joseph
22. Which Excess notation is used to represent 100 as Zero?
1. Excess 4
2. Excess 8
3. Excess 2
4. Excess 16
23. The end of a list is called the ________.
1. devon
2. tail
3. head
4. bob
24. FTP ________ could check all incoming files for the
presence of known viruses and block all infected files.
1. File server
2. Proxy server
3. Web server
4. Shared server
25. Home ribbon contains groups:
1. Paragraph
2. Font
3. Clipboard
4. All of the given
26. Ctrl+z is used for:
1. Redo
2. Undo
3. Save
4. Load
27. Non terminating expansions may also be a source of
________.
1. Logical error
2. Truncation errors
3. Overflow
4. Syntax error
Page | 4
28. ________ is a layered structure consisting of a number
of homogenous and simple processing elements.
1. Genetic Algorithms
2. Rule-based Systems
3. Feed-Forward Network
4. None of the given
29. Which of the following is a robot used in medical field :
1. Smart Doc
2. MED robot
3. Tug robot
4. Belgian robot
30. In ________ one user can executing several tasks
simultaneously.
1. Multiple program
2. Multilevel
3. Multitasking
4. Simple tasking
31. Which of the following is not true about firewall?
1. Firewall protects the entire network from inside intrusion
2. Firewall protects the entire domain from outside intrusion
3. Firewall protects the individual computer from outside intrusion
4. Firewall protects the individual computer from inside intrusion
32. The traditional development phase of the software life
cycle does not include the stage.
1. Design
2. Maintenance
3. Testing
4. Implementation
33. onFocus executes the specified JavaScript code when
________.
1. a window receives focus
2. a form element receives input focus
3. a window receives focus or a form element receives input focus
4. None of the given
34. The purpose of system ________ is to describe the
software's internal composition so that the software can be
maintained later in its life cycle.
1. quality assurance documentation
2. user documentation
Page | 5
3. system documentation
4. technical documentation
35. ________ tells how many places are required to move
radix point.
1. Exponent field
2. Sign bit
3. Significant bit
4. Mantissa field
36. ________ displays the document as it would appear if
printed and is the default view.
1. Web Layout
2. Print Layout
3. Read Mode
4. Draft Mode
37. Which software testing refers to tests that do not rely on
knowledge of the software's interior composition?
1. basis path testing
2. glass-box testing
3. black-box testing
4. white-box testing
38. Copyright can be applied on:
1. Dramatic work
2. Music
3. Artistic work
4. All of the given
39. ICQ, AIM and MSN Messenger are the examples of
________ services.
1. EMAIL
2. IM
3. FTP
4. IP
40. A pseudo code must have a consistent, concise notation
for representing recurring ________ structures.
1. Non-Semantic
2. Semantic
3. Markup
4. Text
41. An algorithm is ________ and distinct from its
representation.
Page | 6
1. Abstract
2. Clear
3. Vision
4. Visual
42. Process of understanding what the characteristics of
images means refer to:
1. Image understanding
2. Image processing
3. Image analysis
4. Image identifying
43. The storage of a value with a fractional part requires that
we store not only the pattern of 0s and 1s representing its
binary representation but also the position of the ________.
1. Decimal point
2. Radix point
3. Number
4. Factorial
44. CD stands for:
1. Computer Disc
2. Computer Data
3. Compact Disc
4. Compact Data
45. Which from the following is not a relational operator?
1. = =
2. > =
3. ! =
4. % =
46. Each sound has a ________.
1. Pixel
2. Geometric Structures
3. Wave
4. Scaling
Page | 8
54. ________ is not only used as a means of retrieving data
from mass storage but also as a means of retrieving items
from large blocks of data stored in main memory.
1. Database
2. Sequential
3. Hashing
4. Indexing
55. Which one is a unary operator?
1. AND
2. OR
3. NOT
4. EQUAL
56. In context of environment, computer science have
impacts:
1. Positive
2. Negative
3. Dangerous
4. Both positive & negative
57. How many iterations are required to find 88 in the
following array?
{5, 6, 77, 88, 99}
1. 1
2. 2
3. 3
4. 4
58. The fifth group in the home ribbon is the:
1. Style
2. Insert
3. Editing
4. Help
59. If the test for termination of a loop is executed after the
execution of body then loop is known as ________.
1. Post-test loop
2. Pre-test loop
3. Termination loop
4. Final loop
Page | 9
60. The test that machines will have a chance to pass
according to Turing was of:
1. 7 minutes
2. 2 minutes
3. 10 minutes
4. 5 minutes
61. In MS Word, the option of justify is in group ________.
1. Paragraph
2. Insert
3. Clipboard
4. Font
62. Third generation language attributes refer to
1. Particular machine
2. For all machine
3. For only required machine
4. None of the given
63. Access to the forbidden literature is because of:
1. Computer
2. Cyber Bullying
3. Identity Theft
4. Lacking privacy
64. A ________ is a collection whose entries have a
hierarchical organization similar to that of an organization
chart of a typical company.
1. graph
2. tree
3. queue
4. stack
65. What does VoIP stands for ________.
1. Virtually Over Internet Protocol
2. Voice Over Internet Protocol
3. Voice of Internet Protocol
4. Voice of International Protocol
66. Which one can lead user to leave your website?
1. Simple design
2. Poor navigation
3. Information layout
4. Adaptable design
Page | 10
67. This ________ view of the database is called a database
model.
1. theoretical
2. conceptual
3. logical
4. empirical
68. Font group includes options:
1. Typefaces
2. Highlight
3. Font size
4. All of the given
69. Design ribbon can have:
1. Symbols
2. Page border
3. Shapes
4. Word art
70. What will be the output of following pseudo code?
def Find Factorial():
fact = 2
i=1;
While (i<=7)
fact=fact*i;
i=i+1;
print(fact)
1. 5040
2. 10080
3. 120
4. 980
71. Suppose you are the presenter and you want your
audience in touch during presentation then what will you do?
1. Write long sentences on slides
2. Keep same color for background and text
3. Use of videos, animations and sounds
4. Using very small font size
72. 10.011 added to 100.11 produces
1. 111.088
2. 111.007
3. 111.001
4. 111.099
Page | 11
73. UTF-8 uses 24 to ________ bits.
1. 32
2. 30
3. 21
4. 90
74. USA has passed legislation allowing the government to
actively monitor citizens in the name of:
1. National ethics
2. Data security
3. National security
4. Data ethics
75. Find option inludes:
1. Find
2. Advance find
3. Go to
4. All of the given.
76. ________ is the most demanded job in United State.
1. System Agent
2. IT Administrator
3. Software Developer
4. Graphic Designer
77. An alternative to translators
1. Assembler
2. Compiler
3. Interpreter
4. Mnemonics
78. HDTV is the abbreviation of ________.
1. High demanded television
2. High defined television
3. High definition television
4. High demand television videos
79. When we draw a table in MS word the table have initial
column(s):
1. One
2. Zero
3. Two
4. Multiple
Page | 12
80. A file's ________ is normally stored as a separate file on
the same mass storage device as the ________.
1. index, indexed file
2. sequential, sequential file
3. database, database file
4. flat, flat file
81. In MS Word, we have to write an equation with 2 as a
number and 3 as its power. Which option is suitable for this
purpose?
1. Superscript
2. Subscript
3. Case
4. Font size
82. Word processor like Microsoft Word is an application that
1. Build editable word documents.
2. Build editable Program.
3. Build editable Questions.
4. Build editable excel files.
83. The amount of paper American use in a year is:
1. 83 million tons
2. 85 million tons
3. 90 million tons
4. 95 million tons
84. Computer security is also known as ________.
1. Cyber-security
2. Firewall-security
3. Privacy
4. Copyright
85. Microsoft Office includes:
1. WordPad
2. Scientific calculator
3. PDF reader
4. Word
86. The hexadecimal notation for:
111010000101010100010111
1. Is E85517
2. Is E855
3. Is F985517
4. Is E5517
Page | 13
87. The node at the top is called the ________ node.
1. head
2. root
3. terminal
4. siblings
88. Page Setup Group is in which ribbon of MS Word?
1. References
2. Page Layout
3. Insert
4. Review
89. If we want to link two sections of a same document we
generally use:
1. Hyperlink
2. Cross reference
3. Reference
4. Bookmark
90. The field of artificial intelligence is being pursued along
paths:
1. 5
2. 3
3. 2
4. 4
91. The Turing test result of program DOCTOR developed by
Joseph Weizenbaum was:
1. Ambiguous
2. Failed
3. No result
4. Passed
92. Leibniz's machines were achieved by observing the
________ positions.
1. Third gear
2. First gear
3. Final gear
4. Second gear
93. Illustration is a part of ribbon:
1. View
2. Insert
3. Home
4. Review
Page | 14
94. Which of the following is the component name of
iterative structures in which initial stage is established?
1. Modify
2. Initialize
3. Test
4. Declaration
95. A software license is a ________ between the owner and
user of a software product that grants the user certain
permissions to use the product without transferring
ownership rights to the intellectual property.
1. copyright
2. legal agreement
3. license agreement
4. GOMS
96. American throws away pieces of paper each year which
is equal to:
1. 1 billion trees
2. 2 billion trees
3. 2.5 billion trees
4. 1.5 billion trees
97. The ________ consists of the instructions that tell the
control unit to request an activity within the arithmetic/logic
unit.
1. Arithmetic/logic group
2. Control unit group
3. RISC group
4. RISC/CISC group
98. Correct syntax is
1. If (condition Statement A Else Statement B.
2. If condition) Statement A Else Statement B.
3. If (condition) Statement A Else Statement B.
4. If (condition)
99. Sometimes when a device is continuously running it
damages us by:
1. Utilizing time
2. Waves
3. Radiations
4. Privacy issues
Page | 15
100. To move from one page to other page on the web, a
hyperlink is given which is
1. Of blue color
2. underlined
3. Of red color
4. Of blue color and underlined
101. We can apply bullets from home ribbon group called:
1. Paragraph
2. Font
3. Clipboard
4. Styles
102. Eye for long amount of time is not meant to look:
1. 2D
2. Constantly
3. 1D
4. Continuously
103. ________ can store unique pattern of 21 bits.
1. ASCII
2. ANSI
3. Unicode
4. UTF-8
104. CPU and RAM are connected with ________ to
communicate with each other.
1. Controller
2. BUS
3. Cables
4. Ports
105. Time required to move the read/write heads from one
track to another.
1. Random time
2. Access time
3. Seek time
4. Rational time
106. A ________ is a storage area that contains such an
encoded address.
1. tree
2. pointer
3. graph
4. array
Page | 16
107. You can use ________ search engine for searching
images, movies, games or educational content.
1. Bing
2. Google
3. Yahoo
4. One Search
108. Easy access to online health centers is because of:
1. Computer science
2. Artificial intelligence
3. Database
4. Intelligent agents
109. CAN-SPAM Act applies in:
1. UK
2. US
3. UAE
4. Canada
110. The set of tasks that ensures the software is correctly
implements a specific function is known as
1. Modularity
2. Verification
3. Validation
4. Requirement gathering
111. ENIAC stands for:
1. Electronic numerical integrator and calculator
2. Electronic numbers and integrator and calculator
3. Electronic numerical integer and calculations
4. Electronic numbers integer and calculations
112. Matching geometric characteristics technique cannot
read:
1. Images
2. Pictures
3. Optical characters
4. Hand written material
113. Bit-map images compresses using the ________
algorithm.
1. LZV
2. LZW
3. LZE
4. None of the given
Page | 17
114. If we are interested to see the map of some location, we
can use map operator in the following way:
1. Location: map
2. Map: Location
3. Mph: map
4. Locations
115. One term could mean more than one thing for example
word: "Jaguar" is used in two meanings such as:
1. Car and helicopter
2. Car and bus
3. Animal and car
4. Car and Cat
116. In MS-word different type of effects on the text can be
applied with:
1. Text box
2. Word art
3. Quick parts
4. All of the given
117. The hackers normally add many ________ to such
websites as the information seeker of free music.
1. Viruses
2. Messages
3. Song
4. Alert
118. ________ tag only shows the particular pages related to
it.
1. @
2. *
3. " "
4. #
119. A specific example is the ________ series of standards,
which address numerous industrial activities such as design,
production, installation and servicing.
1. ISO 9000
2. IEEE
3. ISO/IEC 15504
4. SQA
Page | 18
120. Which of the following data types are recognized by
JavaScript?
1. Strings
2. Numbers
3. Undefined
4. All of the given
121. TIFF is abbreviation of ________?
1. Toggle Image File Format
2. Template Image File Format
3. Tagged Image File Frame
4. Tagged Image File Format
122. According to famous Job market website most of the jobs
are available in ________.
1. Economics
2. Computer Science
3. Mathematics
4. Biology
123. We need ________ memory to store data permanently.
1. Volatile
2. RAM
3. Non-Volatile
4. Address
124. Binary notation is a way of representing numeric values
using only the ________.
1. Digits 0 and 1
2. Digits 0 and 0
3. Digits 0 and 2
4. Digits 2 and 1
125. Main memory is also called ________.
1. ROM
2. RAM
3. Bits
4. Cache
126. ________ loop structure referred to as a posttest loop.
1. While
2. Repeat
3. For
4. For each
Page | 19
127. Information security Risk include:
1. Malicious code
2. Data collection from children
3. Online scam
4. Cyber bullying
128. Proofing group is in which ribbon of MS Word?
1. Page Layout
2. Design
3. Review
4. References
129. The process of using DNS to perform a translation is
called a ________.
1. DNS table
2. DNS translation
3. DNS lookup
4. DNS pattern
130. With computer science the access to private information
has:
1. Reduced
2. Increased
3. Removed
4. Controlled
131. Major component of syntactic analysis is:
1. Context
2. Identifying
3. Parsing
4. Understanding syntax
132. Ethical issues are related to:
1. Behavior principles
2. Linguistics principles
3. Moral principles
4. AI principles
133. Act that ranges government restrictions on wire taps to
include transmissions of data is:
1. COPPA
2. ECPA
3. HIPPA
4. Gramm-Leach-Biley
Page | 20
134. Actions according to environment knowledge:
1. Intelligent action
2. Reflex action
3. Predefined action
4. Simplest response
135. How do you initialize an array in C
1. int arr[3] = (1, 2, 3)
2. int arr[3] = {1, 2, 3}
3. int arr(3) = (1, 2, 3);
4. int arr(3) = {1, 2, 3}
136. A model which represents the shift away from strict
adherence to the waterfall model is:
1. Incremental model
2. Waterfall model
3. Spiral model
4. Iterative model
137. The default theme of MS-Word document is:
1. Paper
2. Flow
3. Word
4. Office
138. How many common forms of data mining?
1. Five
2. Four
3. Three
4. Two
139. While sending a message it is the ________ layer's
responsibility to provide an address that is compatible with
the Internet infrastructure.
1. Application
2. Network
3. Link
4. Transport
140. The instruction code to halt machine cycle is
1. C400
2. C100
3. C000
4. 35CE0
Page | 21
141. This conceptual view of the database is called a
________ model.
1. data structure
2. data science
3. database
4. data mining
142. Undo is used by:
1. Ctrl+r
2. Ctrl+u
3. Ctrl+z
4. Ctrl+y
143. The binary search algorithm uses ________.
1. Linear search
2. Divide and conquer method
3. Bubble sort technique
4. Quick sort technique
144. In 16 bits ________ can be store only.
1. 100
2. 99
3. 98
4. 97
145. Over which type of bus CPU can fetches its instructions
from memory?
1. Memory bus
2. System bus
3. Address bus
4. Central bus
146. In MS Word, Justify option is used to give spaces to the
paragraph on left and right side ________.
1. Greater
2. Smaller
3. Different
4. Equally
147. We can increase the size of text from home ribbon group
called:
1. Paragraph
2. Font
3. Clipboard
4. Styles
Page | 22
148. ________ was the first to implement the web.
1. Tim Berners-Lee
2. Steve Jobs
3. Alan Turing
4. Charles Babbage
149. Page group includes options:
1. Cover page
2. Page margins
3. Page colour
4. All of the given
150. If we want to end a page at a specific point and move to
the next page we can use:
1. Page move
2. Page break
3. Blank page
4. Page end
151. This finding maximum number function will keep on
going until we reach at the last value
[12, 18, 299, 38, 999, 89, 101, 500, 801, 45]
1. 45 each time
2. 801 each time
3. 12 each time
4. 38 each time
152. Ctrl+z is used for:
1. Undo
2. Redo
3. Save
4. Load
153. When you search in the Google by typing Google finds all
those pages which contains
1. All the terms given in the query
2. None of the terms given in the query
3. Some of the terms given in the query
4. Random
154. A single algorithm can be represented in ______ way(s).
1. Single
2. Many
3. Malicious
4. Modern
Page | 23
155. ________ is a short version of binary digit, a smallest
unit to store data.
1. Bit
2. Byte
3. Pattern
4. Mega Byte
156. Matching geometric characteristics technique of
recognizing images is used in:
1. Optical character recognition
2. Taking pictures
3. Sorting pictures
4. Mark recognition
157. Ribbon has types of commands:
1. One
2. Two
3. Three
4. Four
158. Phase 1 of problem-solving steps is ________.
1. Formulate the algorithm and represent it as a program
2. Evaluate the program for accuracy and for its potential as a tool
for solving other problems
3. Understand the problem
4. Get an idea of how an algorithmic function might solve the
problem
159. Microsoft Office includes:
1. Word
2. PDF reader
3. Wordpad
4. All of the given
160. RGB stands for
1. Roman, green, blue
2. Red, Green, Blue
3. Red, blue, yellow
4. Red, white, black
161. Hyperlinks have by default color:
1. Red
2. Blue
3. Black
4. Purple
Page | 24
162. ________ is used to combine different relations into one
relation.
1. PROJECT
2. COMBINE
3. SELECT
4. JOIN
163. If right circular shift is performed on a ________ eight
times, same bit pattern is obtained as it is started.
1. Bite size byte pattern
2. Byte pattern
3. Byte size bit pattern
4. Bit pattern
164. If a process is allowed to access memory cells outside its
allotted area, it can ________ data being used by other
process.
1. Alter and store
2. Access and alter
3. Read and write
4. Read and alter
165. Average amount of time required for the desired data to
rotate around to the read/write head once the head has been
positioned over the desired track.
1. Random TIME
2. Access time
3. Seek time
4. Rotational delay
166. Editing group have commands:
1. 2
2. 3
3. 4
4. 5
167. The style group in the home ribbon is the:
1. Fifth group
2. Second group
3. Fourth group
4. Third group
168. The binary of 8 in 2's complement notation will be 1000,
what will be the binary of -8?
1. 1001
Page | 25
2. 0000
3. 1000
4. 0100
169. 0011 + 0010 = ________
1. 0000
2. 0101
3. 1111
4. 1010
170. In main memory each cell has unique ________ address.
1. Byte
2. Bits
3. RAM
4. Cell
171. Appearance of each pixel is encoded to form ________.
1. Pixel
2. Geometric Structures
3. Bitmap
4. Scaling
172. Which tag is used to create a list item?
1. <litem>
2. <item>
3. <li>
4. <list>
173. Binary notation has ________ representation.
1. One
2. Two
3. Three
4. Four
174. RAM stands for:
1. Random access memory
2. Random archive memory
3. Random memor
4. Random accountable memory
175. Requiring certain degree of uniformity of the style, size
and orientation of symbols is a(n):
1. Advantage
2. Disadvantage
3. Fast processing
4. Ambiguity
Page | 26
176. The option of justify is in group:
1. Insert
2. Clipboard
3. Font
4. paragraph
177. In MS Word, shortcut key of paste is ________.
1. Ctrl+v
2. Alt+p
3. Alt+v
4. Ctrl+p
178. Programming languages are well-designed so that each
statement has ________ meaning.
1. Only one
2. Multiple
3. No
4. Same
179. The first programming language designed for the non-
technical users was:
1. Visual Basic
2. Ada
3. Basic
4. Cobol
180. What does MIDI stand for?
1. Magnetic information design interface
2. Musical information disk interface
3. Musical instrument digital interface
4. Music information disk interrogator
181. George Boole, who was a pioneer in the field of
mathematics called ________.
1. Subtraction
2. Algebra
3. Logic
4. Progression
182. A paradigm works on object called
1. Imperative paradigm
2. Declarative paradigm
3. Functional paradigm
4. Object oriented paradigm
Page | 27
183. Most ________ codes use today are Huffman codes.
1. Relative encoding
2. Frequency dependent
3. Run-length encoding
4. Differential encoding
184. We can customize indentation with:
1. Clipboard
2. Borders
3. Ruler
4. Justify
185. There are many types of sensors including:
1. Camera
2. Range sensor
3. Microphone
4. All of the given
186. Usual way of protecting software is:
1. Patent
2. Copyright
3. Rules
4. Company monogram
187. The description of the object's properties is called
1. Object
2. Class
3. Function
4. Instance
188. A device that responds to stimuli from its environment:
1. Computer
2. AI device
3. Agent
4. Router
189. Contact Risks include:
1. Online scam
2. Harmful Advice
3. Cyber bullying
4. Unsuitable products
190. Sds (Secure Digital Memory Cards) provide up to
1. 10 gbs of storage
2. 100 gbs of storage
Page | 28
3. Few gbs of storage
4. 1000 gbs of storage
191. In binary search, first of all value check at a point
1. Most left
2. Middle
3. Most right
4. Beginning
192. Generally how many steps a machine cycle have?
1. Two
2. Three
3. Four
4. Two or more
193. On social media, sometimes, a particular ________ is
very popular.
1. Hash tag
2. Symbol
3. Operator
4. Word
194. Software packages that allow users to access hypertext
on the Internet are called ________.
1. Hypersofts
2. Browsers
3. Linkers
4. Routers
195. The ________ ribbon is the ribbon that helps you to
design your slides as per your requirement.
1. Slide
2. Design
3. Layout
4. Insert
196. Which of the following soft wares help us optimizing the
various business processes of an organization as a single
system instead of a number of loosely coupled stand alone
systems?
1. OS
2. Vector Graphics
3. ERP
4. DSS
Page | 29
197. Robots can be guided by an
1. An external control device or the control may be embedded
within
2. An internal control device or the control may be embedded
within
3. Remote
4. Application
198. A clear flag state indicates that the resource is
________.
1. Available
2. Unavailable
3. Currently allocated
4. Ready
199. Attacks can be made to prevent access to websites by
crashing:
1. Websites
2. Servers
3. Network
4. Database
200. Files can be downloaded or uploaded using ________
protocol.
1. SMTP
2. FTP
3. TELNET
4. None of the given
201. OR operator is also represented by ________ sign.
1. }
2. |
3. @
4. *
202. Hexadecimal notation uses a ________ symbol to
represent a pattern of four bits.
1. Quad
2. SINGLE
3. Double
4. Triple
Page | 30
203. Bit is:
1. Basic unit of storage
2. Basic program of storage
3. Secondary unit of storage
4. Not a unit of storage
204. Repeated erasing slowly ________ the silicon dioxide
chambers.
1. Damages
2. Enhance
3. Increase
4. Decrease
205. Plagiarism is a major problem in:
1. Identify theft
2. Gaming addiction
3. Education
4. Online transaction
206. Disk operating system is ________ operating system
1. Menu driven
2. Graphical user interface
3. Command driven
4. None of the given
207. A track that leads to a simulation oriented methodology:
1. Intelligent
2. Proper
3. Theoretical
4. Engineering
208. Which is the correct format to find out a value from any
given list?
1. Search()
2. ()search
3. Search<>
4. To search
209. In CS, we store and link data in an organized way using
1. SDLC
2. MSDB
3. DMBS
4. DBMS
Page | 31
210. Which of the following is true about problem solving?
1. Ability to solve problems remains more of an artistic skill to be
developed
2. Ability to solve problems remains more of a non-artistic to be
developed
3. Ability to solve problems remains more of a rational skill to be
developed
4. Ability to solve problems remains more of a non-rational skill to
be developed
211. A ________ is a file that is accessed in a special manner
from its beginning to its end as though the information in the
file were arranged in one long row.
1. index file
2. sequential file
3. database file
4. flat file
212. If the result after comparison of two variables in
relational operators is False, then if statement returns value
1. 1
2. No
3. !
4. 0
213. Data were stored in memory; programs were part of the
________.
1. CPU
2. Cable
3. BUS
4. CACHE
214. A styles option includes font:
1. Size
2. Name
3. Colour
4. All of the given.
215. Cloud computing services provide reasonable guarantees
of ________ and ________.
1. Scalability, Reliability
2. Reliability, Privacy
3. Privacy, Security
4. Scalability, Security
Page | 32
216. In MS Word, shortcut key of cut is ________.
1. Ctrl+v
2. Ctrl+c
3. Ctrl+x
4. Ctrl+i
217. Float CGPA=2.5;
If (CGPA>=3.0)
Cout<<"Give Scholarship";
Else
Cout<<"Sorry you do not qualify for the Scholarship";
It will show output
1. Give Scholarship
2. Sorry you do not qualify for the Scholarship
3. Good
4. Display none
218. __ Keyword is used in python language to define a word.
1. Define
2. Def
3. Dfi
4. Dfn
219. There are ________ Basic Boolean operations are.
1. 1
2. 2
3. 3
4. 4
220. What is the full form of JSP?
1. Java Server Pages
2. Java Script Pages
3. Java Semantic Pages
4. Java Source Pages
221. Researchers are trying to develop systems that exhibit
intelligent behavior in ________ track.
1. Artificial
2. Intelligent
3. Engineering
4. Theoretical
222. Computer science has made hacking bank account:
1. Difficult
2. Impossible
Page | 33
3. Possible
4. Challenging
223. When we apply header it is shown at:
1. Bottom of document
2. Every page of document
3. Start page of document
4. End page of document
224. In binary Addition 1+1 is =
1. 10
2. 2
3. 5
4. 11
225. A significant example of iterative techniques is:
1. Relational process
2. Conventional process
3. Rational unified process
4. Unified process
226. Process is a ________ activity.
1. Botting activity
2. Dynamic activity
3. Static activity
4. Shifting activity
227. User can see directories or files by using ________.
1. Microsoft Explorer
2. Internet Explorer
3. Window explorer
4. User interface
228. By using 16 bits in 2's complement notation how many
maximum positive number can be represented
1. 32768
2. 32678
3. 32867
4. 32868
229. The process involved in a ________ is like copying the
data rather than moving it.
1. Transfer instruction
2. Load instruction
3. Move instruction
Page | 34
4. Shifting data
230. The special eye-catching effects between each slide of
MS PowerPoint is called:
1. Slide Show
2. Slide Variation
3. Slide View
4. Slide Transitions
231. ________ refers to functional paradigm.
1. Doctors
2. Mathematicians
3. Teachers
4. Lawyers
232. How Instruction can be fetched from the main memory to
CPU?
1. By using Controller
2. By using Modem
3. By using Bus
4. By using Special wiring
233. A CPU consists of three parts ________.
1. ALU/ control unit, register
2. ALU/MJPEJ/CU
3. CIRCUIT /Mp3 /CU
4. Ram/cache/ dram
234. George Boole invented the ________ operations.
1. Bit
2. Logical
3. Byte
4. Boolean
235. In some cases, the data collection process is readily
apparent, in others it is:
1. Outward
2. Subtle
3. Specious
4. Obvious
236. The E-mail client sends message to:
1. e-mail client
2. SMTP server
3. POP3 server
4. All of the given
Page | 35
237. Turing gave a percentage of a machine that will have a
chance to pass Turing test in year.
1. 2000
2. 2002
3. 2008
4. 2012
238. Voice over IP has ________ modes.
1. 2
2. 3
3. 4
4. 5
239. What will be the output of following OR expression 1010
OR 1111?
1. 1111
2. 0101
3. 0000
4. 1010
240. In MS Word, shortcut key to select the whole text in a
document is ________.
1. Alt+a
2. Ctrl+a
3. Ctrl+w
4. Alt+w
241. Information that was once buried in arcane records has
become accessible because of:
1. Online management
2. Database
3. Artificial intelligence
4. Computer
242. RISC is abbreviation of ________?
1. Redundant instruction set computer
2. Reduced instructive set computer
3. Reduced instructive set controller
4. Reduced instruction set computer
243. The first group in Design Ribbon of MS PowerPoint is:
1. Tables
2. Symbols
3. Themes
4. Variants
Page | 36
244. An object is actually a special case of the more general
concept of a ________.
1. Coupling
2. binding
3. cohesion
4. component
245. We can use Boolean operators specially to find relevant
pages.
1. "is ""am"
2. "And" "Or"
3. Is "it"
4. If else
246. If the RGB scheme is used to display an image of size
1024*768 pixels then the image will require ____ of storage.
1. 22.5 MB
2. 2.25 KB
3. 2.25 MB
4. None of the given
247. Ethics and legality are essential in many industries
including:
1. Government officer
2. Doctors
3. Teachers
4. All of the given
248. Information available on the web is:
1. Mostly Free of any cost
2. Costly
3. Totally free
4. Not accessible at all
249. Which of the following statement is true?
1. Repeater is more complex than a bridge.
2. Bridge is more complex than a repeater.
3. Bridge and repeater both are complex.
4. Bridge and repeater both are not complex.
250. IPR stands for:
1. Intellectual property restate
2. Intellectual property rights
3. Intellectual property resources
4. Intellectual property release
Page | 37
251. Quantity associated with each position is ________ the
quantity associated with the position to its right.
1. Twice
2. Single time
3. Thrice
4. Forth
252. Control structure iterates a set of instructions based on
the provided condition called
1. If-else
2. Conditional
3. Loop
4. Selection
253. A data cell of a table contains
1. only text
2. images
3. tables
4. all of the given
254. ________ is exemplified by two transactions, each of
which makes a deduction from the same account.
1. Incorrect summary problem
2. Time sharing
3. Potential problem
4. Lost update problem
255. A charity organization of London is:
1. EPC
2. CL
3. PI
4. INPC
256. The option of bullets is in group:
1. Insert
2. Clipboard
3. Font
4. paragraph
257. Electronic Theft include:
1. Online scam
2. Harmful Advice
3. Cyber bullying
4. Unsuitable products
Page | 38
258. Gaming addiction can cause problems:
1. Privacy issues
2. Environmental
3. Identity theft
4. Financial
259. In ________ digits on right side represent the fractional
part.
1. Fraction
2. Decimal
3. Hexadecimal
4. Binary
260. Content filtering works by matching _____ of characters:
1. Strings
2. Codes
3. Values
4. Paragraphs
261. Design phase is followed by ________.
1. Requirement analysis
2. Implementation
3. Testing
4. Maintenance
262. Learning procedural knowledge usually improves a
process:
1. Trial-and-error
2. Try-and-error
3. Process-and-error
4. Procedure-and-error
263. CPU required at least __ to fetch the instruction from
memory.
1. Two nanosecond
2. Nanosecond
3. Three nanosecond
4. One billion second
264. Which registers act as temporary holding places for data
being manipulated by the CPU?
1. Memory address register
2. Special purpose
3. General purpose
4. Memory buffer
Page | 39
265. What is the output of the following code?
Page | 40
271. Software licenses are:
1. Propriety
2. Free
3. Open source
4. All of the given
272. ________ is also consider as character.
1. Numbers
2. Small caps
3. Large caps
4. Space
273. In MS Word, we can highlight a text using color from
group ________.
1. Font
2. Paragraph
3. Clipboard
4. Insert
274. People are working in sitting position due to computer
science and thus have more chance to develop:
1. Thinking
2. Obesity
3. Harmful habits
4. Creativity
275. The repetitive use of an instruction or sequence of
instructions is called ________.
1. Loop
2. Statement
3. Condition
4. Pseudocode
276. Digits on left side of point represent the
1. Whole number
2. Factorial
277. Trial ware Softwares are used for
1. short period
2. long period
3. life time
4. None of the given
Page | 41
278. Which of these describes stepwise refinement?
1. It is a bottom up approach
2. Greedy Approach
3. It is a top down approach
4. Depth First Search
279. A mark or any other distinctive sign associated with
products is called:
1. Patent
2. Copyright
3. Trademark
4. Company monogram
280. Which of the following is used to store data in computer?
1. Hard Disk
2. Floppy Disk
3. Optical Disk
4. All of the given
281. The most popular system for representing integers
within today's computers is ________'s complement notation.
1. Three
2. Two
3. 0
4. One
282. Approximately how many entries a typical dictionary in a
word processor can contain?
1. 25,000 entries
2. 250,000 entries
3. 25,000 entries
4. More than 250,000 entries
283. We can add charts in MS-word from group:
1. Illustrations
2. Table
3. Symbols
4. Apps
284. The term ____ refers to a collection of data that is
multidimensional in the sense that internal links between its
entries make the information accessible from a variety of
perspectives:
1. data mining
2. data science
Page | 42
3. data structure
4. database
285. In particular, the chart that indicates the entire game is
overseen by a function named ________.
1. objects
2. control game
3. function
4. forms
286. Which of the following is not true about pseudo code?
1. Pseudo code is an unambiguous representation
2. Pseudo code is an informal representation
3. Pseudo code is an algorithms representation
4. Pseudo code is an ambiguous representation
287. Most famous word processor is:
1. MS-Excel
2. MS-word
3. WordPad
4. Notepad
288. Process states include the value of the program counter
as well as the contents of the ________.
1. Related memory cells
2. Registers and related memory cells
3. Registers
4. Registers and cache memory cells
289. When an application wants to display something on the
screen, it notifies the ________.
1. Window manager
2. Application
3. User software
4. Programming
290. The people present arround the e-waste gain:
1. Benefits
2. Diseases
3. Substances
4. Electronic waste
Page | 43
291. If you are interested to search a query for a specific file
type, you can include such ________ in the query.
1. File type
2. Version
3. Program type
4. Typing
292. Which unit transfers the data from memory into the
general purpose registers?
1. Control unit
2. Arithmetic unit
3. Logical unit
4. Shift
293. Which type of registers is used in program execution?
1. General purpose
2. CPU register
3. Special purpose
4. Memory address register
294. The pattern in which computer are connected together to
form a network is called :
1. Network Topology
2. Network Transmission
3. Network Protocol
4. None of the given
295. In ________ if two modules interact with the same item
of data, then modifications made to one module may affect
the other.
1. control coupling
2. data coupling
3. external binding
4. internal binding
296. Suppose we have an array named as "Student". And we
want to store 123 at index one (index 1).
So which statement is true?
1. Student(1)=123;
2. Student[1]=123;
3. Student{1}=123;
4. Student[1}=123;
Page | 44
297. ________ is a system that guards a private network.
1. Protocol
2. Firewall
3. Communication channel
4. None of the given
298. Which of the following language is used for server side
scripting?
1. HTML
2. JavaScript
3. CSS
4. PHP
299. Computer hardware is the collection of
1. Partials
2. Physical parts of a computer system
3. Software
4. Program
300. In binary Notation 11111111 is
1. 128
2. 255
3. 567
4. 127
301. The Binary Search Algorithm, what will be mid value in
second level of recursion in the following array.
{45, 77, 89, 90, 94, 99, 100} and key = 99
1. 89
2. 90
3. 94
4. 99
302. Any variable in JavaScript can hold any type of value, and
the that type can change midway through the program.
1. True
2. False
303. In excess notation ________ of bits are used to
represent each value.
1. Simple number
2. Fixed number
3. Variable number
4. Constant number
Page | 45