0% found this document useful (0 votes)
1 views5 pages

Solved_MCQs

The document contains a series of solved multiple-choice questions (MCQs) covering various topics including logic expressions, data storage units, networking, software, cyber-crime, HTML, and algorithms. Each question is followed by the correct answer, providing a comprehensive overview of fundamental concepts in computer science and information technology. The content serves as a study guide for individuals preparing for exams or seeking to enhance their knowledge in these areas.

Uploaded by

Ali Chand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views5 pages

Solved_MCQs

The document contains a series of solved multiple-choice questions (MCQs) covering various topics including logic expressions, data storage units, networking, software, cyber-crime, HTML, and algorithms. Each question is followed by the correct answer, providing a comprehensive overview of fundamental concepts in computer science and information technology. The content serves as a study guide for individuals preparing for exams or seeking to enhance their knowledge in these areas.

Uploaded by

Ali Chand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Solved MCQs

1. 1. Expression (A+B).(A+C) is equal to:

**Answer:** B) A.B + A.C

2. 2. Petabyte is equal to:

**Answer:** C) (1024)^5 Bytes

3. 3. …… is used to assemble more than one proposition into one proposition:

**Answer:** C) Compound preposition

4. 4. A truth table is used to determine whether a statement is:

**Answer:** C) Both a and b (True and False)

5. 5. 'It is cold outside' is:

**Answer:** B) Moral preposition

6. 6. Number '17' is equal to ………. In binary numbers:

**Answer:** C) 10001

7. 7. In primary and secondary storage, data is stored in the form of:

**Answer:** C) Both a and b (Bits and Bytes)

8. 8. According to …….. law, there is no change in results if the priority of expression is


changed:

**Answer:** A) Associative law

9. 9. The order of application of two separate terms is not important in ……………

**Answer:** B) Commutative law

10. 10. Hexadecimal system has total …… numbers:

**Answer:** A) 16

11. 11. Data is provided for processing through ………..

**Answer:** A) RAM

12. 12. At least …… bytes/byte is required to store any piece of information in a computer's
memory:
**Answer:** A) 1

13. 13. The IPv4 address is made up of …… binary bits:

**Answer:** D) 31

14. 14. Routing is the process of taking data from one device and sending it to another
device in a different:

**Answer:** B) Network

15. 15. Web browsers and web servers function together as a ………. System:

**Answer:** D) Server

16. 16. Email stands for:

**Answer:** B) Electronic Mail

17. 17. A ______ accesses a service made available by a server:

**Answer:** B) Client

18. 18. The receiver must be capable of accepting the:

**Answer:** C) Message

19. 19. Routers connect multiple _______ together:

**Answer:** B) Networks

20. 20. _________ allow users to communicate using email, newsgroups, etc.:

**Answer:** B) Internet

21. 21. Which software is used for storing data?

**Answer:** D) Both a and b (Google Drive and Dropbox)

22. 22. Every data packet has an _______ address:

**Answer:** A) IP

23. 23. In a computer network, devices are connected through communication _______.

**Answer:** B) Channels

24. 24. Communication protocol covers:

**Answer:** D) All of the above (Authentication, Error detection, Correction)

25. 25. _______ is the process of encoding data:


**Answer:** B) Encryption

26. 26. Making illegal copies of software is called:

**Answer:** B) Hacking

27. 27. When a key has fewer characters than the text to encrypt, then repeating letters of
the key is called:

**Answer:** C) Interim Cipher text

28. 28. Which of the following doesn’t include types of software piracy?

**Answer:** B) Liability

29. 29. Which of the following is not a characteristic of a good password?

**Answer:** D) Password is your name only

30. 30. _______ is a cyber-crime attack to make a machine or network resource unavailable
for a user:

**Answer:** A) DOS

31. 31. Which of the following is not a cyber-crime?

**Answer:** D) Decryption

32. 32. Which of the following is not a characteristic of a phishing website?

**Answer:** A) Actual link to web content

33. 33. Which of the following is not a characteristic of phishing emails?

**Answer:** B) IT reminder

34. 34. _______ is a general term for any type of information processing that can be
represented mathematically:

**Answer:** A) Computation

35. 35. Using a computer for unauthorized activities is called:

**Answer:** A) Misuse

36. 36. The cipher text of 'Computer' is:

**Answer:** A) Dpnqvufs

37. 37. A hyperlink can be applied to:


**Answer:** C) Both A and B (Image and Text)

38. 38. The _______ element is a container for metadata:

**Answer:** B) <head>

39. 39. An individual list item can contain another entire list called:

**Answer:** B) Nested list

40. 40. _______ Tag makes the enclosed text bold:

**Answer:** D) <b>

41. 41. In 'body' tag, _______ is used to make a picture the background image of a webpage:

**Answer:** B) Background

42. 42. HTML is a computer language used to:

**Answer:** A) Create a webpage

43. 43. An HTML element usually consists of:

**Answer:** C) Start and End tags

44. 44. _______ is used to display data in tabular form:

**Answer:** B) <table>

45. 45. To save the HTML page, you can use:

**Answer:** D) Both A and B (.htm and .html)

46. 46. HTML is not a:

**Answer:** A) Programming language

47. 47. There are _______ types of headings in an HTML document:

**Answer:** D) 6

48. 48. A webpage can be created and modified using:

**Answer:** D) All of the above (Notepad++, TextEdit, Notepad)

49. 49. Checking if a solution exists is called:

**Answer:** C) Validation

50. 50. Due to which type of error does an algorithm work but gives incorrect answers?
**Answer:** B) Logical error

51. 51. Before solving a problem, it's ……. should be done:

**Answer:** C) Both A and B (Analysis and Planning)

52. 52. Which solution cannot be written with proper algorithm planning?

**Answer:** B) Candid solution

53. 53. ……. is used to test the solution:

**Answer:** C) Verification

54. 54. The image expression of the algorithm is:

**Answer:** C) Flowchart

55. 55. In a flowchart, the ……. symbol shows:

**Answer:** C) Process

56. 56. ……. Symbol indicates the stopping point of an algorithm:

**Answer:** A) Stop

57. 57. Which symbol is used for the beginning and end of the flowchart?

**Answer:** A) Terminal

58. 58. The word 'Algorithm' is derived from the name of which famous Arab scientist?

**Answer:** C) Muhammad Ibn Musa Al-Khwarizmi

59. 59. Flowchart uses different ……. to check the sequence of steps:

**Answer:** B) Symbols

You might also like