0% found this document useful (0 votes)
40 views

BSc CSIT Entrance computer and general IT questions

The document contains over 100 multiple-choice questions (MCQs) covering various topics in Computer Science and Information Technology, including fundamentals of computing, data structures, computer networks, database management systems, programming, cybersecurity, operating systems, software engineering, and miscellaneous questions. Each section presents questions with four answer options, testing knowledge on key concepts and terminology in the field. This resource is designed for students preparing for a BSc in Computer Science and Information Technology entrance exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

BSc CSIT Entrance computer and general IT questions

The document contains over 100 multiple-choice questions (MCQs) covering various topics in Computer Science and Information Technology, including fundamentals of computing, data structures, computer networks, database management systems, programming, cybersecurity, operating systems, software engineering, and miscellaneous questions. Each section presents questions with four answer options, testing knowledge on key concepts and terminology in the field. This resource is designed for students preparing for a BSc in Computer Science and Information Technology entrance exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

BSc CSIT Entrance: 100+ MCQs on Computer Science & IT

1. Fundamentals of Computing
1. Who is known as the father of computers?
a) Charles Babbage
b) Alan Turing
c) Bill Gates
d) Steve Jobs
2. What is the full form of CPU?
a) Central Processing Unit
b) Computer Processing Unit
c) Central Performance Unit
d) Core Processing Unit
3. Which of the following is NOT an input device?
a) Keyboard
b) Mouse
c) Monitor
d) Scanner
4. The primary function of an operating system is to:
a) Manage hardware and software resources
b) Perform calculations
c) Create web pages
d) Develop applications
5. What is the smallest unit of data in a computer?
a) Byte
b) Bit
c) Nibble
d) Kilobyte
6. Which number system is used in modern computers?
a) Decimal
b) Binary
c) Octal
d) Hexadecimal
7. One byte consists of how many bits?
a) 4
b) 8
c) 16
d) 32
8. A computer program that converts an entire program into machine
language at once is called:
a) Compiler
b) Interpreter
c) Assembler
d) Loader
9. What does RAM stand for?
a) Read Access Memory
b) Random Allocation Memory
c) Random Access Memory
d) Read-Only Memory
10.The software that enables hardware and application software to
communicate with each other is called:
a) System software
b) Middleware
c) Utility software
d) Firmware
2. Data Structures & Algorithms
11.Which data structure uses LIFO (Last In First Out) order?
a) Queue
b) Stack
c) Linked List
d) Array
12.In a linked list, elements are stored in:
a) Continuous memory locations
b) Non-contiguous memory locations
c) Registers
d) Cache memory
13.What is the worst-case time complexity of binary search?
a) O(n)
b) O(n log n)
c) O(log n)
d) O(1)
14.A queue follows which principle?
a) LIFO
b) FIFO
c) FILO
d) Random Order
15.The process of arranging data in a logical sequence is called:
a) Sorting
b) Searching
c) Indexing
d) Merging
16.Which of the following sorting algorithms has the best time complexity?
a) Bubble Sort
b) Quick Sort
c) Insertion Sort
d) Merge Sort
17.A binary tree with n nodes has a maximum height of:
a) log(n)
b) n
c) n/2
d) 2n
18.The time complexity of linear search is:
a) O(1)
b) O(n)
c) O(log n)
d) O(n log n)
19.A graph consists of:
a) Nodes and Edges
b) Vertices only
c) Edges only
d) None of the above
20.Which of the following data structures is best suited for implementing
recursion?
a) Stack
b) Queue
c) Linked List
d) Array
3. Computer Networks & Internet
21.What does HTTP stand for?
a) Hyper Text Transfer Protocol
b) High Transfer Text Protocol
c) Hyperlink Text Transfer Protocol
d) None of the above
22.What is the full form of IP in networking?
a) Internet Protocol
b) Internal Processing
c) Internet Processing
d) Interconnected Protocol
23.Which of the following is an example of a private IP address?
a) 192.168.1.1
b) 8.8.8.8
c) 172.16.0.1
d) Both a & c
24.What type of network covers a large geographical area?
a) LAN
b) MAN
c) WAN
d) PAN
25.In networking, FTP is used for:
a) File Transfer
b) Email communication
c) Remote access
d) Routing
26.What is the default port number for HTTP?
a) 443
b) 80
c) 21
d) 25
27.Which device is used to connect two different networks?
a) Hub
b) Switch
c) Router
d) Repeater
28.The data unit at the network layer is called:
a) Frame
b) Segment
c) Packet
d) Bit
29.Which OSI layer is responsible for encryption?
a) Data Link Layer
b) Application Layer
c) Presentation Layer
d) Transport Layer
4. Database Management Systems (DBMS)
30.What is the full form of SQL?
a) Structured Query Language
b) Sequential Query Language
c) Standard Query Language
d) Systematic Query Language
31.A primary key in a database:
a) Can be null
b) Can have duplicate values
c) Uniquely identifies a record
d) Is always a number
32.In SQL, which clause is used to filter records?
a) ORDER BY
b) GROUP BY
c) HAVING
d) WHERE
33.Which type of database stores data in tables?
a) NoSQL
b) Relational Database
c) Hierarchical Database
d) Object-Oriented Database
34.Which SQL command is used to remove all records from a table without
deleting its structure?
a) DELETE
b) DROP
c) TRUNCATE
d) REMOVE
35.What is ACID in databases?
a) Atomicity, Consistency, Isolation, Durability
b) Authentication, Connectivity, Integrity, Deployment
c) Automation, Calculation, Integration, Deduction
d) None of the above
36.In SQL, which command is used to retrieve data?
a) SELECT
b) FETCH
c) EXTRACT
d) READ
37.A foreign key in a database is used to:
a) Uniquely identify records
b) Establish a relationship between tables
c) Store encrypted data
d) None of the above
38.The command to delete a table permanently is:
a) DELETE
b) DROP
c) REMOVE
d) TRUNCATE
39.Normalization in databases is used to:
a) Reduce redundancy
b) Increase complexity
c) Make tables larger
d) Improve indexing
5. Programming & Software Development
40.Which of the following is NOT a programming language?
a) Java
b) Python
c) HTML
d) Swift
41.What is the process of finding and fixing errors in a program called?
a) Debugging
b) Compiling
c) Interpreting
d) Executing
42.In Python, which symbol is used for a single-line comment?
a) //
b) #
c) /* */
d) --
43.The first high-level programming language was:
a) C
b) Python
c) FORTRAN
d) Pascal
44.In C programming, which data type is used to store decimal values?
a) int
b) float
c) char
d) boolean
45.What will be the output of 5 / 2 in Python 3?
a) 2.5
b) 2
c) 2.0
d) 5/2
46.Which loop is best suited for iterating a known number of times?
a) for loop
b) while loop
c) do-while loop
d) infinite loop
47.In object-oriented programming (OOP), which feature enables code
reuse?
a) Inheritance
b) Polymorphism
c) Encapsulation
d) Abstraction
48.What is the correct syntax to declare a function in C?
a) function myFunc() {}
b) void myFunc() {}
c) def myFunc():
d) func myFunc() {}
49.What is an IDE?
a) Integrated Development Environment
b) Interactive Debugging Engine
c) Internal Data Exchange
d) Information Data Editor
6. Cybersecurity & Ethical Hacking
50.What does VPN stand for?
a) Virtual Private Network
b) Very Personal Network
c) Variable Processing Node
d) Verified Protected Network
51.A brute-force attack is:
a) Guessing passwords by trying multiple combinations
b) Attacking a server with a virus
c) Stealing data by phishing
d) Encrypting files and demanding ransom
52.A firewall is used to:
a) Prevent unauthorized access to a network
b) Speed up internet browsing
c) Hack into secured systems
d) Improve Wi-Fi signals
53.The strongest type of encryption is:
a) AES
b) DES
c) MD5
d) SHA-256
54.Phishing attacks usually involve:
a) Fake emails or websites to steal information
b) Overloading a system with requests
c) Stealing physical devices
d) Crashing a server
55.What is two-factor authentication (2FA)?
a) Using two passwords for login
b) A method that requires two forms of verification
c) A technique for breaking encryption
d) A type of antivirus software
7. Operating Systems
56.What is the primary function of an operating system?
a) Process management
b) Memory management
c) File management
d) All of the above
57.Which of the following is NOT an operating system?
a) Windows
b) Linux
c) Oracle
d) macOS
58.The part of the OS that manages hardware and software communication is
called:
a) Kernel
b) Shell
c) BIOS
d) Bootloader
59.What is a deadlock in an operating system?
a) A condition where multiple processes are waiting for each other
indefinitely
b) A process that runs infinitely
c) A type of memory leak
d) A security breach
60.Which of the following is an example of an open-source OS?
a) Windows 10
b) Linux Ubuntu
c) macOS
d) Solaris
61.In process management, what is a PCB (Process Control Block)?
a) A data structure that stores process information
b) A memory segment in RAM
c) A security protocol
d) A file management system
62.Which scheduling algorithm executes the shortest job first?
a) FCFS (First Come First Serve)
b) SJF (Shortest Job First)
c) Round Robin
d) Priority Scheduling
63.Virtual memory is:
a) A type of RAM
b) A technique to extend RAM using secondary storage
c) A physical memory chip
d) A cloud storage service
64.What is thrashing in an OS?
a) Excessive swapping between RAM and disk
b) A type of security attack
c) A memory compression technique
d) A CPU scheduling method
65.Which file system is used by Windows OS?
a) ext4
b) FAT32
c) NTFS
d) HFS+

8. Computer Networks
66.What does IP stand for?
a) Internet Provider
b) Internet Protocol
c) Internal Processing
d) International Packet
67.Which protocol is used for secure data transfer over the web?
a) HTTP
b) FTP
c) HTTPS
d) SMTP
68.The maximum number of IP addresses in IPv4 is:
a) 4 billion
b) 1 million
c) 64 thousand
d) Unlimited
69.What does DNS do?
a) Assigns MAC addresses to devices
b) Translates domain names to IP addresses
c) Encrypts network traffic
d) Filters spam emails
70.Which network topology has a central hub connecting all devices?
a) Bus topology
b) Ring topology
c) Star topology
d) Mesh topology
71.Which of the following is NOT a networking device?
a) Router
b) Switch
c) Compiler
d) Modem
72.What does TCP/IP stand for?
a) Transmission Control Protocol/Internet Protocol
b) Text Control Protocol/Internet Processing
c) Technical Computer Processing/Internal Packet
d) None of the above
73.The default port number for HTTP is:
a) 22
b) 53
c) 80
d) 443
74.A firewall is used to:
a) Block unauthorized network access
b) Increase internet speed
c) Store temporary data
d) Encrypt files
75.In networking, what is a MAC address?
a) A unique address assigned to network devices
b) A public IP address
c) A wireless encryption method
d) A type of firewall

9. Software Engineering & Development


76.The Software Development Life Cycle (SDLC) consists of how many
phases?
a) 3
b) 5
c) 7
d) 9
77.What is Agile methodology?
a) A fast software testing technique
b) A flexible approach to software development
c) A debugging process
d) A networking protocol
78.UML stands for:
a) Unified Modeling Language
b) Universal Markup Language
c) Unique Machine Learning
d) None of the above
79.In software engineering, which model follows a sequential approach?
a) Agile
b) Spiral Model
c) Waterfall Model
d) Prototype Model
80.What does version control software do?
a) Manages changes in code
b) Checks for software updates
c) Improves RAM performance
d) Enhances software security

10. Miscellaneous Computer Science Questions


81.What is the full form of AI?
a) Automated Integration
b) Artificial Intelligence
c) Advanced Internet
d) Augmented Information
82.The father of Computer Science is:
a) Alan Turing
b) Charles Babbage
c) Dennis Ritchie
d) Tim Berners-Lee
83.A byte consists of how many bits?
a) 4
b) 8
c) 16
d) 32
84.What is the full form of GPU?
a) General Processing Unit
b) Graphical Processing Unit
c) Global Processing Unit
d) Grid Processing Unit
85.The fastest type of memory is:
a) RAM
b) SSD
c) Cache Memory
d) HDD
86.What does ASCII stand for?
a) American Standard Code for Information Interchange
b) Advanced System Code for Internet Interference
c) Automated Symbolic Code for Integrated Information
d) None of the above
87.What is an algorithm?
a) A process to solve a problem step by step
b) A computer virus
c) A programming language
d) A type of network
88.The first mechanical computer was designed by:
a) Bill Gates
b) Steve Jobs
c) Charles Babbage
d) Alan Turing
89.The binary number system consists of:
a) 0 and 1
b) 1 to 9
c) A to Z
d) 10 to 99
90.The brain of a computer is:
a) CPU
b) RAM
c) Hard Disk
d) GPU

91. Which of the following is NOT a programming language?


a) Python
b) Java
c) HTML
d) SQL
92. What does API stand for?
a) Advanced Programming Interface
b) Application Programming Interface
c) Automated Processing Instruction
d) Advanced Packet Interchange
93. Which logic gate gives an output of 1 only when both inputs are 1?
a) OR
b) AND
c) NOR
d) XOR
94. What is the base of the hexadecimal number system?
a) 2
b) 8
c) 10
d) 16
95. Which of the following is an example of a relational database management system
(RDBMS)?
a) MySQL
b) MongoDB
c) Firebase
d) Neo4j
96. Which of the following is a markup language?
a) Python
b) CSS
c) HTML
d) JavaScript
97. Which of the following is a correct example of an operating system shell?
a) Windows Explorer
b) Linux Bash
c) Google Chrome
d) Notepad
98. What does the acronym LAN stand for?
a) Local Area Network
b) Large Area Network
c) Linked Automated Network
d) Logical Access Node
99. Which type of machine learning algorithm is used when labeled data is NOT
available?
a) Supervised Learning
b) Unsupervised Learning
c) Reinforcement Learning
d) Deep Learning

100. Who invented the World Wide Web (WWW)?


a) Bill Gates
b) Steve Jobs
c) Tim Berners-Lee
d) Linus Torvalds

Answers to All MCQs (1-100)

 a) Charles Babbage
 b) Central Processing Unit
 c) Monitor
 a) Manage hardware and software resources
 b) Bit
 b) Binary
 b) 8
 a) Compiler
 c) Random Access Memory
 b) Middleware
 b) Stack
 b) Non-contiguous memory locations
 c) O(log n)
 b) FIFO
 a) Sorting
 d) Merge Sort
 b) n
 b) O(n)
 a) Nodes and Edges
 a) Stack
 a) Hyper Text Transfer Protocol
 a) Internet Protocol
 d) Both a & c
 c) WAN
 a) File Transfer
 b) 80
 c) Router
 c) Packet
 c) Presentation Layer
 a) Structured Query Language
 c) Uniquely identifies a record
 d) WHERE
 b) Relational Database
 c) TRUNCATE
 a) Atomicity, Consistency, Isolation, Durability
 a) SELECT
 b) Establish a relationship between tables
 b) DROP
 a) Reduce redundancy
 c) HTML
 a) Debugging
 b) #
 c) FORTRAN
 b) float
 a) 2.5
 a) for loop
 a) Inheritance
 b) void myFunc() {}
 a) Integrated Development Environment
 a) Virtual Private Network
 a) Guessing passwords by trying multiple combinations
 a) Prevent unauthorized access to a network
 a) AES
 a) Fake emails or websites to steal information
 b) A method that requires two forms of verification
 d) All of the above
 c) Oracle
 c) Oracle
 a) Kernel
 a) A condition where multiple processes are waiting for each other indefinitely
 b) Linux Ubuntu
 a) A data structure that stores process information
 b) SJF (Shortest Job First)
 b) A technique to extend RAM using secondary storage
 a) Excessive swapping between RAM and disk
 c) NTFS
 b) Internet Protocol
 c) HTTPS
 a) 4 billion
 b) Translates domain names to IP addresses
 c) Star topology
 c) Compiler
 a) Transmission Control Protocol/Internet Protocol
 c) 80
 a) Block unauthorized network access
 a) A unique address assigned to network devices
 c) 7
 b) A flexible approach to software development
 a) Unified Modeling Language
 c) Waterfall Model
 a) Manages changes in code
 b) Artificial Intelligence
 a) Alan Turing
 b) 8
 b) Graphical Processing Unit
 c) Cache Memory
 a) American Standard Code for Information Interchange
 a) A process to solve a problem step by step
 c) Charles Babbage
 a) 0 and 1
 c) HTML
 b) Application Programming Interface
 b) AND
 d) 16
 a) MySQL
 c) HTML
 b) Linux Bash
 a) Local Area Network
 b) Unsupervised Learning
 c) Tim Berners-Lee

You might also like