0% found this document useful (0 votes)
12 views

cs101 michkey

The document provides a collection of important multiple-choice questions (MCQs) for a CS-101 midterm exam, covering various computing topics. It includes questions on computer architecture, programming languages, HTML, and software concepts. Additionally, it offers services such as LMS handling, assignments, and project support, along with contact information for further assistance.

Uploaded by

Talha Sajid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

cs101 michkey

The document provides a collection of important multiple-choice questions (MCQs) for a CS-101 midterm exam, covering various computing topics. It includes questions on computer architecture, programming languages, HTML, and software concepts. Additionally, it offers services such as LMS handling, assignments, and project support, along with contact information for further assistance.

Uploaded by

Talha Sajid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

Learning With Mickey ch Mickey

ch

CS-101( Introduction to computing)


Mid Term Important Solved Mcqs
By Mickey Ch

80 to 100% Marks
We offers:
We also offers:
 LMS Handling

 Assignments  CS 619 Projects

 Quizes Follow us on youtube:


@mickeych8525
 GDB

 Mid&Final Term important Notes

Whatsapp
#0333-6166150
Email:
[email protected]
Whatsapp#0333-6166150
Learning With Mickey ch

Q NO 01:
is the best known builder for supercomputers.
A. Sun
B. Cray Research
C. Microsoft
D. Apple
Q NO 02:
The weaknesses of the computer are:
A. Pattern recognition & Storage
B. Speed & Innovative ideas
C. Pattern recognition & Innovative ideas
D. Speed & Storage
Q NO 03:
team is responsible for the maintenance, expansion , improvement of the
infrastructure consisting of workstations, networking equipment, software and network
security.
A. Support
B. Configuration Management
C. Quality Assurance
D. Developer
Q NO 04 :
team consists on the sharpest technical minds in the company.

A. Architecture
B. Business Development
C. Configuration Management
D. Developer
Q NO 05:
Detailed plan, specifying the required resources and expected deliverables, is done in phase.
A. Planning
B. User Requirements
C. Design
D. Developer Specification
Q NO 06:
We can change the background color in HTML, using attribute of <body>
A. background
B. bgcolor
C. backcolor
D. backgroundcolor
Q NO 07:
In the context of JavaScript, x in the statement x=x+20; is a(an) .
A. Constant
B. Object
C. Variable
D. Integer
Q NO 08:
is used to terminate JavaScript statements.
A. Colon
B. Semicolon
C. Apostrophe
D. Double quotes

Whatsapp#0333-6166150
Learning With Mickey ch

Q NO 09:
brought the use of mouse-driven graphical user
interface in computing.
A. Apple Macintosh
B. Microsoft
C. Create
D. IBM
Q NO 10:
While writing Pseudo code of an algorithm, there are rules to follow.
A. Standard
B. No standard
C. Strict
D. Pre-defined
Q NO 11:
If we use <INPUT type= “password” > in HTML, what will happen?
A. Text will not be visible
B. Text will be in normal format
C. Text will be in **** format
D. Text will be in #### format
Q NO 12:
What will be the value of str ?
A. HelloWorld
B. Hello World
C. Hello + World
D. It will result in error
Q NO 13:
The man power, technical resources and duration required to develop a purposed
system areestimated inphase.
A. Testing
B. Feasibility
C. Planning
D. Designing
Q NO 14:
The text written in between is only displayed on the webpage.
A. <BODY/></BODY>
B. <BODY></HEAD>
C. <HEAD></HEAD>
D. <BODY></BODY>
Q NO 15:
Which one of the following is NOT a component of Rule Based System?
A. Rule Compiler
B. Rule Interpreter
C. Rules Base
D. Working Memory
Q NO 16:
The political process is also influenced by the use of .
A. Discussion forums
B. Newsgroups
C. Mailing lists
D. All of the given options

Whatsapp#0333-6166150
Learning With Mickey ch

Q NO 17:
Trinoo is a software.
A. DoS
B. Scanning
C. Utility
D. None of the given options
Q NO 18:
Ada is a programming language specifically designed for
A. Analytical Engine
B. Difference Engine
C. Harvard Mark 1
D. Mechanical engine
Q NO 19:
Writing a response, multiple statements are separated from each other with the help of
A. Period ( . )
B. Comma ( , )
C. Colon ( : )
D. Semicolon ( ; )
Q NO 20:
JavaScript, first element of an array has the index:
A. 1
B. -1
C. 2
D. None of the given choices
Q NO 21:
Please choose one Ada is a ---------------------
A. programming language
B. Programmer
C. mother of Computing
D. All of the given
Q NO 22:
Select the best option in the context of HTML and JavaScript.
A. Both are case sensitive
B. Both are not case sensitive
C. JavaScript is case sensitive but HTML is not
D. HTML is case sensitive but JavaScript is not
Q NO 23:
Anchor tag is used to create:
A. Address
B. Hyperlink
C. Paragraph
D. Title
Q NO 24:
-------------operator is used to assign values to JavaScript variables.
A. Comparison
B. Binary
C. Assignment
D. Logical
Q NO 25:
A is the key part in all the modern aged electronic equipments.
A. Diode
B. Resister

Whatsapp#0333-6166150
Learning With Mickey ch

C. Capacitor
D. Transistor
Q NO 26:
specifically designed to developbusiness applications.
A. BASIC
B. FORTRAN
C. COBOL
D. Perl
Q NO 27:
A tool that helps you to find the synonyms is called .
A. Language
B. Paragraph
C. Thesaurus
D. Symbol
Q NO 28:
The “page title tag” is written inside the tag.
A. Body
B. Head
C. Meta
D. Script
Q NO 29:
If you have to draw some charts on the basis of mathematical calculations then
which one ofthe software from the following list will be your preference?
A. Spreadsheet
B. Word Processor
C. Database Management System
D. Dreamweaver
Q NO 30:
There are tags in html.
A. Only Single
B. Only Paired
C. Single and Paired
D. Multiple
Q NO 31:
Computers loses accuracy for a task after doing that task for:
A. One millions of times
B. One billions of times
C. One trillions of times
D. Computer never loses accuracy
Q NO 32:
What will be the result of the following formula in Spreadsheet
application?SUM (A2:A3)= (Assume that A2 = 25, A3= -75)
A. 50
B. 100
C. 25
D. -50
Q NO 33:
attribute of FORM tag is used to mention a URL when the form is being
submitted.
A. Name

Whatsapp#0333-6166150
Learning With Mickey ch

B. Action
C. Method
D. Submit
Q NO 34:
N a truth table, we have all the for all the related for
afunction.
A. Input – Outputs
B. Outputs – Inputs
C. Process – Inputs
D. Inputs – Processes
Q NO 35:
Bringing subsystems together to form the system is called ► Merging
A. Integration
B. Merging
C. Splitting
D. Operation & Maintenance
Q NO 36:
is / are more suitable technique (s) for a developer to use in order to constructthe actual
code of a software.
A. Pseudo code
B. Flow chart
C. Algorithm
D. Heuristics
Q NO 37:
UNIVAC contained vacuum tubes and was able to process
instructions per second.
A. 5000, 5000
B. 19000, 5000
C. 5000, 2000
D. 19000, 2000
Q NO 38:
Punched Cards were invented first time for the purpose of .
A. Calculation
B. Entering Patterns in Textile Looms
C. Storing Data
D. Playing Cards
Q NO 40:
Which of the following computer can be considered as a portable computer?
A. PC PG
B. Mainframe
C. PDA
D. Supercomputer
Q NO 41:
Which one of the following devices acts as the main controller of a computer
system?
A. CPU
B. RAM
C. ROM
D. Hard drive
Q NO 42:
A new cell using HTML is added in table row by <TD>..</TD>

Whatsapp#0333-6166150
Learning With Mickey ch

A. <TC>…</TC>
B. <TR>…</TR>
C. <TD>…</TD>
D. <NC>…</NC>
Q NO 43:
Waterfall is a sequential life-cycle model.
A. Spiral
B. Sequential
C. Circular
D. Spherical
Q NO 44:
To allow a user for multiple selection from a list on a webpage, the web
developer makes useof .
A. Check box
B. Text box
C. Radio button
D. Text area
Q NO 45:
provide the facility of data manipulation through references
instead of theactual values.
A. Constants
B. Variables
C. Data Types
D. Operators
Q NO 46:
Which of the following is a single tag in HTML?
A. TH
B. TD
C. HR
D. TR
Q NO 47:
Which one of the following is not a valid value for the “type” attribute of <INPUT>
tag?
A. Password
B. Reset
C. Width
D. Submit
Q NO 48:
A multi user operating system allows many users to take
advantage of the computer’s resources, simultaneously
A. Single user
B. Multi- user
C. Single tasking
D. Multi tasking
Q NO 49:
Anti Virus software is a kind of .
A. Utility Program
B. System Software
C. Device Driver
D. Freeware
Q NO 50:

Whatsapp#0333-6166150
Learning With Mickey ch

The microprocessors that do not have a separate unit to handle floating point data are
.
A. Not able to handle floating point operations
B. Slower than other microprocessors PG # 35
C. Costly than other microprocessors
D. Not invented yet
Q NO 51:
Which computer category is widely used in our daily life?
A. Super Computer
B. Main Frame
C. Personal Computer
D. Laptop
Q NO 52:
Which of the following is not a type of page margin in MS Word?
A. Left
B. Right
C. Centre
D. Top
Q NO 53:
Base of the octal number system is .
A. 2
B. 16
C. 7
D. 8
Q NO 54:
Concatenate Operator in JavaScript is used to elements.
A. Subtract
B. Multiple
C. Join
D. Add
Q NO 55:
Human are better than computers at:
A. Efficiency
B. Accuracy
C. Pattern recognition
D. None of the given choices
Q NO 56:
Notepad is an example of
A. System Software
B. Application Software
C. Device Driver
D. Kernal
Q NO 57:
If a computer could pass the Turing test then it would be able to:
A. think like human beings
B. do the things faster
C. win a million dollar prize
D. store more information
Q NO 58:
All processes of a microprocessor are processed under the supervision of .
A. Memory Unit
B. Floating Point Unit

Whatsapp#0333-6166150
Learning With Mickey ch

C. Control Unit
D. Arithmetic and Logic Unit
Q NO 59:
Which one of the following is not an Application Software?
A. Word Processor
B. Web Browser
C. Microsoft Windows
D. MS Excel
Q NO 60:
In html, the text area tag (<textarea>) defines:
A. A multi-line text input control
B. An input control
C. Html form for the user input
D. A group of related options in a selected list
Q NO 61:
In the context of computer evolution, was built to help University
to solve the .
A. ENIAC, artillery tables
B. UNIVAC, numeric and textual information
C. ABC, Simultaneous linear equations
D. Harvard Mark 1, gunnery and ballistic calculation
Q NO 62:
My friend claims to have a better algorithm than the existing one. We can
say his algorithm isbetter than the existing algorithms if it is .
A. Easier to analyze and easier to implement
B. Easier to analyze but difficult to implement
C. Difficult to analyze and difficult to implement
D. Difficult to analyze but easier to implement.
Q NO 63:
is the essential property of every JavaScript object.
A. Color
B. Width
C. Name
D. Size
Q NO 64:
A program designed to activate an alarm after every two hours is the example of
Size.
A. Batch Program
B. Event Driven Program
C. Time Program
D. Real Time Program
Q NO 65:
_____is considered the first electronic digital computer.
A. ABC
B. UNVAC 1
C. Harvard Mark 1
D. ENIAC
Q NO 66:
A software that allows an operating system to interact with a hardware device is called
.
A. Compiler

Whatsapp#0333-6166150
Learning With Mickey ch

B. Linker
C. Driver
D. Kernel
Q NO 67:
Which of the following is Not a type of RAM?
A. SIMM
B. ROM
C. DIMM
D. DDR
Q NO 68:
Today’s fastest computer can do of calculations in a second.
A. Thousands
B. Billions
C. Trillions
D. Millions
Q NO 69:
computers have low power consumption processors.
A. Personal
B. Laptop
C. Super
D. Main Frame
Q NO 70:
Which of the following is Not a type of RAM?
A. BIOS
B. SIMM
C. DIMM
D. DDR
Q NO 71:
a user is using CGI script on a UNIX server, then the script type is called
A. Client side scripting
B. Server side scripting
C. Stand-alone scripting
D. GUI scripting
Q NO 72:
When we run a program in a computer, the actual execution of the program takes
place in .
A. RAM
B. ROM
C. Microprocessor
D. Hard Disk
Q NO 73:
In this URL http://www.msn.com , identifies the domain name
A. http
B. www
C. msn
D. com
Q NO 74:
Which one of the following is not a suitable option when we talk about JavaScript
language?
A. Object based lalanguag
B. Markup language

Whatsapp#0333-6166150
Learning With Mickey ch

C. Interpreted language
D. Event driven language
Q NO 75:
It represents the input or output flow chart element.
A. Process
B. Input or Output
C. Decision
D. Connector
Q NO 76:
Java script interact with user through Event handlers
A. Special control
B. Internet explorer
C. Event handlers
D. Java script does not interact with user
Q NO 77:
Select the voltage combination, not supported by PC’s power supply.
A. +3.3 and +5 V DC
B. -12 and +12 V DC
C. -10 and +10 V DC
D. -5 and + 5 V D C
Q NO 78:
What is the shortcut key to open the cell format window in MS Excel?
A. Ctrl + 1
B. Ctrl + F
C. Ctrl + 4
D. Ctrl + Shift + Enter
Q NO 79:
Graphics creation in JavaScript is .
A. Easy
B. Difficult
C. Simple
D. Not Possible
Q NO 80:
Which of the following software is the best suited to tie together all important
activities andmajor systems of an organization into a single software system?
A. DSS
B. OS
C. ERP
D. MMS
Q NO 81:
Relationship among the cells of MS Excel sheet can be created by .
A. Relationship diagram
B. Formatting
C. Formula
D. Test
Q NO 82:
Language translator is a computer .
A. Program
B. Hardware
C. Internet Browser
D. Mobile device
Q NO 83:

Whatsapp#0333-6166150
Learning With Mickey ch

When we use <INPUT type=“password”>, what will happen? Text will be in **** format
A. Text will not be visible
B. Text will be in normal format
C. Text will be in **** format
D. Text will be in #### format

Q NO 84:
The world first computer program was written to compute: bernoulli’s sequence
A. Simple sequence
B. Multiple sequence
C. Bernoulli’s sequence
D. Increasing sequence
Q NO 85:
Which of the following is/are Word Processing software?
A. Word Perfect
B. StarOffice
C. MS Word
D. All of the Above
Q NO 86:
For computers, number system is natural.
A. Decimal
B. Octal
C. Binary
D. Hexadecimal
Q NO 87:
Forms can be submitted through get & post methods
A. INCLUDE, POST
B. INCLUDE, GET
C. GET, POST
D. SEND, POST
Q NO 88:
In software development, process, normally the coding phase consumes time of the whole
duration required for the development.
A. 15 %
B. 80 %
C. 75 %
D. 50 %
Q NO 89:
Select the variable name which is invalid in JavaScript:
A. While
B. sum
C. _sum
D. cs_101
Q NO 90:
A set of stand alone productivity applications designed to work together known as
Productivity software suites .
A. Productivity software suites
B. Compiled software
C. Secure software
D. Intelligent software
Q NO 91:
JavaScript stores all numbers as .

Whatsapp#0333-6166150
Learning With Mickey ch

A. Integers
B. Floating point numbers
C. String
D. Dynamic typed
Q NO 92:
Bit-mapped graphics is also known as raster graphics
A. Vector
B. Raster
C. Scalar
D. Simple
Q NO 93:
Which of the following symbol is used in JavaScript to add multiple line
comments in aprogram?
A. /
B. //
C. /*
D. //*
Q NO 94:
converts the source code written in high level
language intomachine language code.
A. Utilities
B. Drivers
C. Language Translator
D. System Software
Q NO 95:
The effect of paragraph tag (<P></P>) in a webpage, is that it:
A. Brings the cursor to the next line
B. Brings back the cursor to the previous line
C. Brings the cursor to the next after next line
D. Keeps the cursor in the same line
Q NO 97:
semicolon is used to terminate all JavaScript statements.
A. Colon
B. Semicolon
C. Underscore
D. Apostrophe
Q NO 98:
The number of steps required to execute an algorithm can be used to measure .
A. Space
B. Time
C. Memory
D. Bandwidth
Q NO 99:
There are NO Standard rules to write the Pseudo Code.
A. Standard
B. No standard
C. Pre-defined
D. Strict
Q NO 100:
Just like JavaScript, was used for writing script.
A. FORTRAN
B. QBasic

Whatsapp#0333-6166150
Learning With Mickey ch

C. Perl
D. JAVA
Q NO 101:
In order to refer to an object’s property is used.
A. Comma
B. Asterisk
C. Dot
D. Ampersand
Q NO 102:
Hexadecimal number system is based on -------- digits
A. 2
B. 8
C. 12
D. 16
Q NO 103:
The name of computer language used by the Defense Department of the United States is .
A. Smalltalk
B. C
C. C++
D. Ada
Q NO 104:
Language of the microprocessor is called
A. HTML
B. COBOL
C. FORTRAN
D. INSTRUCTION SET
Q NO 105:
Command which saves the selected text before deleting is
A. Copy
B. Delete
C. Cut
D. Undo
Q NO 106:
A sequence of transection in which the user establishes initial contact with a computer
operating system is called ----------
A. logout
B. process
C. boot state
D. log in
Q NO 107:
Capacity of one sector of CD is of ---- KB.
A. 2
B. 4
C. 1
D. 3
Q NO 108:
Post test loop structure refer to?
A. Test for termination is performed before the body is executed.
B. Test for termination is performed as well as the body is executed.
C. Test for termination is performed after the body is executed.
D. Test for termination is performed with the body is executed.
Q NO 109:
Starting with vocabulary words and then giving student a reading passage is an examples of:
A. A top- down approach

Whatsapp#0333-6166150
Learning With Mickey ch

B. A cron-up approach
C. A bottom – up approach
D. A pop- up approach
Q NO 110:
One term could be used for more than one thing For example word “Jaguar” is used in two
meaning such as:
A. Car and cat
B. car and bus
C. Animal and car
D. Car and helicopter
Q NO 111:
In 2`s complement, the maximum positive number is represented by-------
A. All 1`s
B. A single ‘0’ followed by all 1`s
C. A single ‘1’ followed by all ‘0’s
D. All ‘0’s
Q NO 112:
Pseudo code is language:
A. Algorithm
B. independent
C. dependent
D. Sequence
Q NO 113:
Which of the following is not an Operating System?
A. DOS
B. Windows XP
C. Linux
D. MS Access
Q NO 114:
In html, the text area tag (<textarea>) defines:
A. A multi-line text input control
B. An input control
C. Html form for the user input
D. A group of related options in a selected list
Q NO 115:
Software development starts from and ends with .
A. Design, Coding
B. Concept, Designing
C. Coding, Testing
D. Concept, Decommissioning
Q NO 116:
Communication protocol is a that governs the flow of information over a
network
A. Set of protocols
B. Set of rules
C. Device
D. Set of methods
Q NO 117:
In , up gradation/ repair is possible without switching off the computer.
A. Super Computer
B. Main Frame
C. Server
D. Laptop
Q NO 118:

Whatsapp#0333-6166150
Learning With Mickey ch

A lot of information is available over the internet, we can access that


information by using anapplication called .
A. URL
B. Browser
C. HTML
D. Compiler
Q NO 119:
A is the key part in all the modern aged electronic equipments.
A. Vacuum tubes
B. Heating fan
C. Electro-mechanical device
D. Transistor
Q NO 120:
Google Drive is an example of
A. Grid and cluster computing
B. Cluster computing
C. Cloud computing
D. Grid computing
Q NO 121:
How many comparisons are required to sort the elements using intersection sort algorithm?
13, 10, 9, 6, 33, 100
A. 3
B. 9
C. 7
D. 5
Q NO 122:
Which One of the following is correct for the symbolic representation of Primitives?
A. Semantic
B. Systematic
C. Abstract
D. Syntax
Q NO 123:
An algorithm is and distinct from its representation.
A. Abstract
B. Vision
C. Visual
D. Clear
Q NO 124:
Connects computer over a large geographical area or world
A. LAN
B. MAN
C. WAN
D. PAN
Q NO 125:
In computer, GUI stands for_
A. General user interrupt
B. Grayed user interface
C. Graphical user interface
D. Graphical utility icon
Q NO 126:
Pseudo Code is a language

Whatsapp#0333-6166150
Learning With Mickey ch

A. Algorithm
B. Independent
C. Dependent
D. Sequence
Q NO 127:
You might search the following or similar thing and might get unpleasant results which
might depress you.
A. Stomach Condition
B. Study
C. Teaching
D. Skin condition
Q NO 128:
A single algorithm can be represented in __ way(s).
A. Single
B. Malicious
C. Modern
D. Many
Q NO 129:
The in the state of process must be sufficient to determine uniquely
andcompletelythe actions required by each step.
A. Data
B. Instructions
C. Program
D. Information
Q NO 130:
We need memory to store data permanently.
A. Volatile
B. DRAM
C. RAM
D. Non-Volatile
Q NO 131:
Which one of the following is true about process?
A. Activity of executing an algorithm
B. Activity of executing a Program
C. Abstract Representation of machine
D. Activity of representing pseudo code
Q NO 132:
One of the major uses of the operation is to place zeros in one part of a bit pattern while not
disturbing the other part.
A. XOR
B. NOR
C. AND
D. OR
Q NO 133:
Which of the following is true about TCP in comparison to UDP?
A. Less reliable but more efficient
B. More reliable and more efficient
C. More reliable and less efficient
D. Less reliable and less efficient
Q NO 134:
In 2’s complement the notation, the maximum positive number is represented by .

Whatsapp#0333-6166150
Learning With Mickey ch

A. All 1’s
B. A single ‘0’ followed by all 1’s
C. A single ‘1’ is followed by all 0’s
D. All 0’s
Q NO 135:
provides a network the internet connectivity
A. Hub
B. Node
C. Gateway
D. Repeater
Q NO 136:
Telnet is used to between two systems.
A. Establish a secure remote connection
B. Securely share information
C. Establish a remote connection
D. Securely transfer files
Q NO 137:
one term can be used for more than one thing. For example, word “jaguar” is used in two
meanings such as:
A. Car and Cat
B. Car and Bus
C. Animal and Car
D. Car and helicopter
Q NO 128:
Determines the number of bits to move radix point to either left or right.
A. Exponent field
B. Significant bit
C. Sign bit
D. Mantissa field
Q NO 129:
Breaking the tasks into a number of subtasks compatible with the number of available
processors is called
A. Interactive processing
B. Scaling
C. Throughput
D. Load balancing
Q NO 130:
Posttest loop structures refer to?
A. Test for termination is performed before the body is executed
B. Test for termination is performed as well as the body is executed
C. Test for termination is performed after the body is executed
D. Test for termination is performed with the body is executed
Q NO 131:
is a malware which gathers data about your activities on the system and forwards it to
the outside party without your consent.
A. Worms
B. Spyware
C. Virus
D. Trojan Horses
Q NO 132:

Whatsapp#0333-6166150
Learning With Mickey ch

refers to distributed systems that are more loosely coupled than clusters but that still
work together to accomplish large tasks.
A. Cloud computing
B. Parallel Computing
C. Quantum Computing
D. Grid Computing
Q NO 133:
Capacity of one sector CD is of KB.
A. 2
B. 4
C. 1
D. 3
Q NO 134:
A transport layer is said to establish a connection before sending a message.
A. HTTP
B. SMTP
C. TCP
D. UDP
Q NO 135:
Starting with vocabulary words and them giving students a reading passage is an example of:
A. A top-down approach
B. A cron-up approach
C. A bottom-up approach
D. A Pop-up approach
Q NO 136:
A sequence of transaction in which the user establishes initial contact with a computer’s
operating system is called ?
A. Logout
B. Process
C. Boot state
D. Login
Q NO 137:
contains the information needed by a browser the proper server and request the desired
document.
A. TCP
B. UDP
C. SMTP
D. URL
Q NO 138:
In black and whites, each pixel is represented as one bit- e.g., 0 for black and 1 for white. It is
an example of____.
A. Matrix
B. Email
C. Facsimile
D. Searching
Q NO 139:
How many commons forms of data mining?
A. Five
B. Four
C. Three

Whatsapp#0333-6166150
Learning With Mickey ch

D. Two
Q NO 140:
Programming languages are well-designed so that each statement has meaning:
A. Only once
B. Multiple
C. No
D. Same
Q NO 141:
In context of environment, computer science have impacts:
A. Positive
B. Negative
C. Dangerous
D. Both positive and negative
Q NO 142:
Content filtering works by matching of characters:
A. String
B. Codes
C. Values
D. Paragraphs
Q NO 143:
Copyrights can be applied on:
A. Dramatic works
B. Music
C. Artistic work
D. All of these
Q NO 144:
A file’s is normally stored as a separate file on the same mass storage device as the .
A. Index, indexed file
B. Sequential, sequential file
C. Database, database file
D. Flat, flat file
Q NO 145:
Major components of syntactic analysis is:
A. Context
B. Identifying
C. Parsing
D. Understanding syntax
Q NO 146:
In some cases, the data collection process is readily apparent; in others it is:
A. Outward
B. Subtle
C. Specious
D. Obvious
Q NO 147:
Attacks can be made to prevent access to websites by crashing:
A. Websites
B. Servers
C. Network
D. Database
Q NO 148:

Whatsapp#0333-6166150
Learning With Mickey ch

Page group includes options:


A. Cover page
B. Page margins
C. Page color
D. All of these
Q NO 149:
Home ribbon contains groups:
A. Paragraph
B. Font
C. Clipboard
D. All of these
Q NO 150:
Easy access to online health centers is because of:
A. Computer science
B. Artificial Intelligence
C. Database
D. Intelligent agents
Q NO 151:
Electronic Theft include:
A. Online scam
B. Harmful advice
C. Cyber bullying
D. Unsuitable products
Q NO 152:
Microsoft office includes:
A. Word
B. Pdf reader
C. WordPad
D. All of these
Q NO 153:
In the United States the privacy act of 1974 was to protect citizens from abusive use of
databases:
A. Government
B. Public
C. Agencies
D. Companies
Q NO 154:
Matching Geometric Characteristics technique Cannot read:
A. Images
B. Pictures
C. Optical characters
D. Handwritten Material
Q NO 155:
Most codes used today are Huffman codes.
A. Differential
B. Relative
C. Frequency-dependent
D. Run-length
Q NO 156:

Whatsapp#0333-6166150
Learning With Mickey ch

Access to the forbidden literature is because of:


A. Computer
B. Cyber building
C. Identity theft
D. Lacking privacy
Q NO 157:
Editing Group have commands:
A. 2
B. 3
C. 4
D. 5
Q NO 158:
Software licenses are:
A. Proprietary
B. Free
C. Open source
D. All of these
Q NO 159:
The amount of paper use in a year is:
A. 83 million users
B. 85 million users
C. 90 million users
D. 95 million users
Q NO 160:
ctrl + Z is used for
A. Redo
B. Undo
C. Save
D. Load
Q NO 161:
A program DOCTOR developed by joseph Weizenbaum in the mid-1960’s named as:
A. Alexa
B. Smart Doctor
C. Eliza
D. Joseph
Q NO 162:
Turing gave a percentage of a machine that will have a chance to pass Turing test in year:
A. 2000
B. 2008
C. 2012
D. 2002
Q NO 163:
We can add charts in MS-word from group:
A. Illustrations
B. Table
C. Symbols
D. Apps
Q NO 164:
Contact Risks include:
A. Online Scam
B. Harmful Advice
C. Cyber Bullying

Whatsapp#0333-6166150
Learning With Mickey ch

D. Unsuitable products
Q NO 165:
Computer Security is also Known as:
A. System-Security
B. Cyber-Security
C. Password
D. Copyright
Q NO 166:
The people present around the e-waste gain:
A. Benefits
B. Diseases
C. Substances
D. Electronic waste
Q NO 167:
We can increase the size of text from home ribbon group called:
A. Paragraph
B. Font
C. Clipboard
D. Styles
Q NO 168:
Most famous word processor is:
A. MS- Excel
B. MS-Word
C. WordPad
D. Notepad
Q NO 169:
When we draw a table in MS-word the table have initial column(s):
A. Zero
B. One
C. Two
D. Multiple
Q NO 170:
shortcut key to paste is:
A. CTRL + P
B. ALT + P
C. CTRL + V
D. ALT + V
Q NO 171:
Researchers are trying to develop systems that exhibits intelligent behavior in
track:
A. Theoretical
B. Intelligent
C. Artificial
D. Engineering
Q NO 172:
Pages is an option in the ribbon:
A. Home
B. Insert
C. Review
D. View
Q NO 173:
There are many types of sensors including:

Whatsapp#0333-6166150
Learning With Mickey ch

A. Camera
B. Range Sensors
C. Microphone
D. All of these
Q NO 174:
Reports can be received at home through email because of advancement in:
A. Computer science
B. Artificial Intelligence
C. Medical databases
D. Hospitals
Q NO 175:
MS-word is an example of:
A. Digital software
B. System software
C. Word processors
D. Utility Programs
Q NO 176:
Ethics and legality are essentials in many industries including:
A. Government Officers
B. Doctors
C. Teachers
D. All of these
Q NO 177:
Computer is known is also known as:
A. System- Security
B. Cyber-security
C. Password
D. Copyright
Q NO 178:
In MS-Word different type of effects on the text can be applied with:
A. Text box
B. Word art
C. Quick parts
D. All of the given
Q NO 179:
The field of artificial intelligence is being pursued along paths:
A. 2
B. 3
C. 4
D. 5
Q NO 180:
is not only used as a means of retrieving data from mass storage but also as a means of
retrieving items form large blocks of data storage in main memory.
A. Hashing
B. Indexing
C. Sequential
D. Database
Q NO 181:
option in MS-word prevent others from making changes to the selected text

Whatsapp#0333-6166150
Learning With Mickey ch

A. Block Authors
B. Protect Authors
C. Restrict Authors
D. Prevent Authors
Q NO 182:
IPR stands for:
A. Intellectual property restate
B. Intellectual property rights
C. Intellectual property resources
D. Intellectual property release
Q NO 183:
To control access to the printer, the must keep track of whether the printer has been
allocated
A. Process
B. Operating systems
C. Windows
D. Booting
Q NO 184:
loop structures referred to as a posttest loop
A. While
B. Repeat
C. For
D. For each
Q NO 185:
By using MPEG and MP3 compression techniques, videos cameras are able to record video
within .
A. 128 GB storage
B. 28 MB storage
C. 128 MB storage
D. 8 GB storage
Q NO 186:
Who introduce the idea of storing the program in main memory?
A. Jhon W. Mauchly
B. Jhon Von Neumann
C. J. Presper Eckert
D. Konrad Zuse
Q NO 187:
In the reverse engineering process, what refers to the sophistication of the design
information that can be extracted from the source code?
A. Interactive
B. Completeness
C. Abstraction level
D. Direction level
Q NO 188:
When we use tag while searching it shows only a particular pages related to it.
A. @
B. *
C. ``
D. #
Q NO 189:

Whatsapp#0333-6166150
Learning With Mickey ch

In CS, we Store and link data in an organized Way using


A. SDLC
B. MSDB
C. DMBS
D. DBMS
Q NO 190:
Termination condition is .
A. Negation of the condition
B. Supporting
C. Halting process
D. Logical process
Q NO 191:
If we are interested to see the map of some location, we can use map operator in the
following way:
A. Location: map
B. Map: Location
C. Mph: Map
D. Locations
Q NO 192:
The node or PC which sends requests for services is called
A. Server
B. Client
C. Protocol
D. ISP
Q NO 193:
Which of the following technology is not related to the client side working?
A. Java applets
B. Java script
C. PHP
D. HTML
Q NO 194:
In binary Addition 1+0=
A. 8
B. 4
C. 2
D. 1
Q NO 195:
Computer does not stand any language except
A. Machine Language
B. Assembly Language
C. Binary Language
D. Programming Language
Q NO 196:
CPU required at least to fetch instructions from memory.
A. Two Nanosecond
B. Nanosecond
C. Three Nanosecond
D. One billion second
Q NO 197:
Each Textual Symbol is represented with a pattern.

Whatsapp#0333-6166150
Learning With Mickey ch

A. Kilo byte
B. Unique byte
C. Byte
D. Bit
Q NO 198:
Which of the following is a disadvantage of a linear search?
A. Requires more space
B. Greater time Complexities compared to the other searching algorithms
C. Not easy to understand
D. Not easy to Implement
Q NO 199:

In digits on right side represent the fractional part.


A. Fraction
B. Decimal
C. Hexadecimal
D. Binary
Q NO 200:
The control of a loop consists of the activities.
A. Two
B. Three
C. Four
D. Five
Q NO 201:
Step wise refinement is a methodology in that it progresses from the general to the
specific.
A. Bottom up
B. Top down
C. Left to right
D. Right to left
Q NO 202:
which kind of server work as an intermediate between the client and server.
A. Client server
B. Server computer
C. Super server
D. Proxy server
Q NO 203:
The impact of truncation error can be reduced by using
A. Longer exponents field
B. Positive exponent field
C. Floating point Notation
D. Longer Mantissa field
Q NO 204:
When you type a query in the search bar of google. Google finds all those pages which contain
.
A. All the terms given in the query
B. None of the terms given in the query
C. Some of the given terms give in the query
D. Random
Q NO 205:

Whatsapp#0333-6166150
Learning With Mickey ch

Software units that communicate with controller or sometimes directly to peripheral devices
called
A. Utility program
B. System software
C. Device drivers
D. Operating system
Q NO 206:
Process states include the value of the program counter as well as the contents of the .
A. Related memory cells
B. Registers and related memory cells
C. Registers
D. Registers and cache memory cells
Q NO 207:
Approximately how many entries a typical dictionary in a word processor can contain?
A. 25,000 entries
B. 250,000 entries
C. Less than 25,000 entries
D. More than 250,000 entries
Q NO 208:
Previously how many bits were used to store 2`s complement notation.
A. 8 bits
B. 16 bits
C. 64 bits
D. 128 bits
Q NO 209:
Which of the following language is used for client-side scripting?
A. Phyton
B. JavaScript
C. PHp
D. ASP.net
Q NO 210:
The memory manager allocates _.
A. Mass storage space
B. Memory space
C. Space in the process table
D. Storage space
Q NO 211:
the bit 0 represent the value false and bit 1 represents the value .
A. Wrong
B. True/false
C. True
D. Empty
Q NO 212:
If you want to search for an exact phrase on google ten enclose it in .
A. @
B. ” ”
C. *
D. #
Q NO 213:
On social media, some times a particular is very popular.
A. Hash tag

Whatsapp#0333-6166150
Learning With Mickey ch

B. Symbol
C. Operator
D. Word
Q NO 214:
While ( ): here what will be written?
A. Body
B. Condition
C. Function definition
D. Total number of code lines
Q NO 215:
When applied to a list with n entries, the binary search algorithm will interrogate anaverage of
entries
A. Login
B. N
C. Log2n
D. Nlogn
Q NO 216:
The set of tasks that ensures the software is correctly implements a specific function is known
as
A. Modularity
B. Verification
C. Validation
D. Requirement gathering
Q NO 217:
Distinction between program believed to the correct and the program that is correct is
A. Software Modularity
B. Software requirements gathering
C. Software verification
D. Software validation
Q NO 218:
Establishing a well-defined set of building blocks form which algorithm representations can
b constructed such a building block is called a .
A. Program
B. Primitive
C. Block
D. Pile
Q NO 219:
The repetitive use of an instructions or sequences of instructions is an important algorithmic
concept. One method of implementing such repetition is the iterative structure known as the
.
A. Loop
B. IF ELSE
C. Class
D. Condition
Q NO 220:
printer is an device.
A. Output
B. Input
C. Input/output
D. None of the given options
Q NO 221:

Whatsapp#0333-6166150
Learning With Mickey ch

One is that a CPU should be designed to execute a minimal set of instructions. This approach is
called a
A. CISI
B. RISC
C. ENVIAC
D. RISC/CISI
Q NO 222:
The computers of the were not very flexible or efficient.
A. 1940`s and 1950`s
B. 1950`s and 1960`s
C. 1930`s
D. 1961`s and 1970`s
Q NO 223:
Repeated erasing slowly_ the silicon dioxide chambers
A. Damages
B. Enhance
C. Increase
D. Decrease
Q NO 224:
For a network to function reliably, it is important to establish rules by which activities are
conducted. Such rules are called .
A. Properties
B. Patterns
C. Premises
D. Protocols
Q NO 225:
What is full form of JSP?
A. Java server Pages
B. Java Script pages
C. Java semantic pages
D. Java Source pages
Q NO 226:
ENIAC stands for
A. Electronic numerical integrator and calculator
B. Electronic numbers and integrator and calculator
C. Electronic numerical integer and calculations
D. Electronic numbers integer and calculations
Q NO 227:
Generally how many steps a machine cycle have?
A. Two
B. Three
C. Four
D. Two or more
Q NO 228:
One of the earlier computing devices was the.
A. Laptop
B. ABACUS
C. iPhone
D. Windows
Q NO 229:

Whatsapp#0333-6166150
Learning With Mickey ch

If we have to insertion sort names Fred, Alex, Diana, Byron, Carol One approach to sorting this
list is to note that the sublist consisting of
A. Both Fred and Alex
B. Only carol
C. Only top name
D. Sub list having 3 names
Q NO 230:
if right circular shift is performed on a_ eight times. Same bit pattern isobtained
as it started.
A. Bite size byte pattern
B. Byte pattern
C. Byte size and pattern
D. Bit pattern
Q NO 231:
A directories can contain other directories called subdirectories constructed a .
A. Directory system
B. Network organization
C. Tree organization
D. Hierarchical organization
Q NO 232:
A CPU consists of three parts .
A. ALU/ control unit, register
B. ALU/MJPEJ/CU
C. CIRCUIT/MP3/CU
D. RAM/CACHE/DRAM
Q NO 233:
By using 16 bits in 2`s complement notation how many maximum positive number can be
represented
A. 32768
B. 32678
C. 32867
D. 32868
Q NO 234:
Current status of the activity associated with the process is called the
A. Process Status
B. Process state
C. Process association
D. Process class
Q NO 235:
A private Key is used to messages.
A. Send
B. Receive
C. Encrypt
D. Decrypt
Q NO 236:
which one of the following is not a property of a good algorithm?
A. Consistency
B. Unambiguousness
C. Efficiency
D. Time Taking
Q NO 237:

Whatsapp#0333-6166150
Learning With Mickey ch

It represents the flow chart element.


A. Flow Line
B. Connector
C. Off-page connector
D. Start or Stop.
Q NO 238:
What is NOT a key factor while designing a website?
A. Usability
B. User-friendly
C. Consistency
D. Complexity
Q NO 239:
% of the users have left websites in frustration due to poor navigation.
A. 40
B. 62
C. 83
D. 91
Q NO 240:
In JavaScript, a variable declaration is
A. Optional
B. Mandatory
C. Not allowed
D. None of the given
Q NO 241:
A protocol used for receiving email messages is called .
A. URL
B. Telnet
C. POP3
D. SMTP
Q NO 242:
Which is correct?
A. onUnload
B. onUnLoad
C. onUNLOAD
D. All of the above
Q NO 243:
Serial arrangement in which things follow logical order or a recurrent pattern, such as
statements executing one by one, is called .
A. Loop
B. Sequence
C. Condition
D. Array
Q NO 244:
Variables allow us to manipulate data through the .
A. Actual Value
B. Reference
C. Length
D. Name
Q NO 245:
Fuzzy logic is based on .
A. Ground facts
B. Experience

Whatsapp#0333-6166150
Learning With Mickey ch

C. Practice
D. Approximation
Q NO 246:
Word Processor is a
A. System Software
B. Application Software
C. Device
D. Utility
Q NO 247:
In the old days, databases did NOT support .
A. Number
B. Boolean
C. Video
D. Text
Q NO 248:
In tabular storage, fields placed in a particular row are strongly .
A. Independent
B. Dependent
C. Interrelated
D. Inconsistent
Q NO 249:
Due to working at home, lack of interaction may result in _ professional growth.
A. Slower
B. Faster
C. Higher
D. Improved
Q NO 250:
Distance learning has got a boost due to the .
A. Easy communication
B. Online interactive contents
C. Flexibility
D. All of the given options
Q NO 251:
technique can be used to create smooth animations or to display one of
several images based on the requirement.
A. Image downloading
B. Image preloading
C. Image uploading
D. Image postloading
Q NO 252:
The is becoming the preferred organizational structure for more and more organizations with
the passage of time.
A. Tree structured organizational model
B. Network paradigm
C. Hierarchical structure
D. None of the given options
Q NO 252:
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called .
A. Telecom Engineering
B. Computer Engineering

Whatsapp#0333-6166150
Learning With Mickey ch

C. Computer Science
D. Information Technology
Q NO 253:
A large number of networks interconnected physically is called .
A. LAN
B. MAN
C. Internet
D. Network collection
Q NO 254:
TCP stands for .
A. Transfer Center protocol
B. Transmission Control Protocol
C. Transmission Center Protocol
D. Telephone Center Protocol
Q NO 255:
A collection of data organized in such a way that the computer can quickly search for a
desired data item is known as:
A. Retrieving
B. Database
C. Information
D. DBMS
Q NO 256:
The key property of the ‘Array’ object in JavaScript is:
A. Value
B. Length
C. Name
D. All of the given choices
Q NO 257:
Which one is the example of spreadsheet software?
A. MS Word
B. MS PowerPoint
C. MS Excel
D. MS Access
Q NO 258:
The Encryption of data is related to:
A. Data updates
B. Data security
C. Data integrity
D. Data accessibility
Q NO 259:
is the process of analyzing large databases to identify patterns.
A. Data normalization
B. Data management
C. Data Mining
D. None of the given options
Q NO 260:
In a good presentation each slide should contain .
A. Heading
B. Phrases not sentences
C. Sentences not phrases
D. Heading, sentences not phrases

Whatsapp#0333-6166150

You might also like