In the name of ALLAH, the most beneficient, the most merciful

Introduction to Computing (CS101)

Multiple Choice Questions (MCQs)

Objective Questions

  1. Suppose we have an array named as "Student". And we want to store 123 at index one (index 1).
    So which statement is true?

    1. Student(1)=123;
    2. Student[1]=123;
    3. Student{1}=123;
    4. Student[1}=123;
  2. Undo is used by:

    1. Ctrl+r
    2. Ctrl+u
    3. Ctrl+z
    4. Ctrl+y
  3. In MS Word, Paste option is a part of home ribbon group called ________.

    1. Insert
    2. Font
    3. Paragraph
    4. Clipboard
  4. onFocus executes the specified JavaScript code when ________.

    1. a window receives focus
    2. a form element receives input focus
    3. a window receives focus or a form element receives input focus
    4. None of the given
  5. How do you initialize an array in C

    1. int arr[3] = (1, 2, 3)
    2. int arr[3] = {1, 2, 3}
    3. int arr(3) = (1, 2, 3);
    4. int arr(3) = {1, 2, 3}
  6. Each sound have a ________.

    1. Pixel
    2. Geometric Structures
    3. Wave
    4. Scaling
  7. Most famous word processor is:

    1. MS-Excel
    2. MS-word
    3. Wordpad
    4. Notepad
  8. Trialware Softwares are used for

    1. short period
    2. long period
    3. life time
    4. None of the given
  9. Requiring certain degree of uniformity of the style, size and orientation of symbols is a(n):

    1. Advantage
    2. Disadvantage
    3. Fast processing
    4. Ambiguity
  10. Word processor like Microsoft Word is an application that

    1. Build editable word documents.
    2. Build editable Program.
    3. Build editable Questions.
    4. Build editable excel files.
  11. Electronic Theft include:

    1. Online scam
    2. Harmful Advice
    3. Cyber bullying
    4. Unsuitable products
  12. ________ refers to functional paradigm.

    1. Doctors
    2. Mathematicians
    3. Teachers
    4. Lawyers
  13. FTP ________ could check all incoming files for the presence of known viruses and block all infected files.

    1. File server
    2. Proxy server
    3. Web server
    4. Shared server
  14. The test that machines will have a chance to pass according to Turing was of:

    1. 7 minutes
    2. 2 minutes
    3. 10 minutes
    4. 5 minutes
  15. ________ can store unique pattern of 21 bits.

    1. ASCII
    2. ANSI
    3. Unicode
    4. UTF-8
  16. RGB stands for

    1. Roman, green, blue
    2. Red, Green, Blue
    3. Red, blue, yellow
    4. Red, white, black
  17. Which software testing refers to tests that do not rely on knowledge of the software's interior composition?

    1. basis path testing
    2. glass-box testing
    3. black-box testing
    4. white-box testing
  18. In MS Word, the option of justify is in group ________.

    1. Paragraph
    2. Insert
    3. Clipboard
    4. Font
  19. Design ribbon can have:

    1. Symbols
    2. Page border
    3. Shapes
    4. Word art
  20. Attacks that can be made to prevent access to websites:

    1. Hacking
    2. Malicious
    3. DDOS
    4. Intruder
  21. If the test for termination of a loop is executed after the execution of body then loop is known as ________.

    1. Post-test loop
    2. Pre-test loop
    3. Termination loop
    4. Final loop
  22. Robots can be guided by an

    1. An external control device or the control may be embedded within
    2. An internal control device or the control may be embedded within
    3. Remote
    4. Application
  23. Microsoft Office includes:

    1. Word
    2. PDF reader
    3. Wordpad
    4. All of the given
  24. Which registers act as temporary holding places for data being manipulated by the CPU?

    1. Memory address register
    2. Special purpose
    3. General purpose
    4. Memory buffer
  25. Act that ranges government restrictions on wire taps to include transmissions of data is:

    1. COPPA
    2. ECPA
    3. HIPPA
    4. Gramm-Leach-Biley
  26. ________ tag only shows the particular pages related to it.

    1. @
    2. *
    3. " "
    4. #
  27. If the result after comparison of two variables in relational operators is False, then if statement returns value

    1. 1
    2. No
    3. !
    4. 0
  28. Which of the following is not the advantage of TCP over UDP?

    1. Congestion control
    2. Flow control
    3. Connection establishment
    4. Efficiency
  29. Which of the following is a robot used in medical field :

    1. Smart Doc
    2. MED robot
    3. Tug robot
    4. Belgian robot
  30. One term could mean more than one thing for example word: "Jaguar" is used in two meanings such as:

    1. Car and helicopter
    2. Car and bus
    3. Animal and car
    4. Car and Cat
  31. Which of the following is the component name of iterative structures in which initial stage is established.

    1. Modify
    2. Initialize
    3. Test
    4. Declaration
  32. Access to the forbidden literature is because of:

    1. Computer
    2. Cyber Bullying
    3. Identity Theft
    4. Lacking privacy
  33. Ribbon has types of commands:

    1. One
    2. Two
    3. Three
    4. Four
  34. ________ is the most demanded job in United State.

    1. System Agent
    2. IT Administrator
    3. Software Developer
    4. Graphic Designer
  35. A model which represents the shift away from strict adherence to the waterfall model is:

    1. Incremental model
    2. Waterfall model
    3. Spiral model
    4. Iterative model
  36. This conceptual view of the database is called a ________ model.

    1. data structure
    2. data science
    3. database
    4. data mining
  37. The special eye-catching effects between each slide of MS PowerPoint is called:

    1. Slide Show
    2. Slide Variation
    3. Slide View
    4. Slide Transitions
  38. User can see directories or files by using ________.

    1. Microsoft Explorer
    2. Internet Explorer
    3. Window explorer
    4. User interface
  39. Hyperlinks have by default color:

    1. Red
    2. Blue
    3. Black
    4. Purple
  40. When an application wants to display something on the screen, it notifies the ________.

    1. Window manager
    2. Application
    3. User software
    4. Programming
  41. how Instruction can be fetched from the main memory to CPU?

    1. By using Controller
    2. By using Modem
    3. By using Bus
    4. By using Special wiring
  42. Ctrl+z is used for:

    1. Undo
    2. Redo
    3. Save
    4. Load
  43. Bit is:

    1. Basic unit of storage
    2. Basic program of storage
    3. Secondary unit of storage
    4. Not a unit of storage
  44. We need ________ memory to store data permanently.

    1. Volatile
    2. RAM
    3. Non-Volatile
    4. Address
  45. Design phase is followed by ________.

    1. Requirement analysis
    2. Implementation
    3. Testing
    4. Maintenance
  46. Which one can lead user to leave your website?

    1. Simple design
    2. Poor navigation
    3. Information layout
    4. Adaptable design
  47. In MS Word, shortcut key of paste is ________.

    1. Ctrl+v
    2. Alt+p
    3. Alt+v
    4. Ctrl+p
  48. Easy access to online health centres is because of:

    1. Computer science
    2. Artificial intelligence
    3. Database
    4. Intelligent agents
  49. Repeated erasing slowly ________ the silicon dioxide chambers.

    1. Damages
    2. Enhance
    3. Increase
    4. Decrease
  50. The hackers normally add many ________ to such websites as the information seeker of free music.

    1. Viruses
    2. Messages
    3. Song
    4. Alert
  51. Which of the following language is used for server side scripting?

    1. HTML
    2. JavaScript
    3. CSS
    4. PHP
  52. Which tag is used to create a list item?

    1. <litem>
    2. <item>
    3. <li>
    4. <list>
  53. Leibniz's machines were achieved by observing the ________ positions.

    1. Third gear
    2. First gear
    3. Final gear
    4. Second gear
  54. A ________ is a collection whose entries have a hierarchical organization similar to that of an organization chart of a typical company.

    1. graph
    2. tree
    3. queue
    4. stack
  55. Which of the following language is related to functional paradigm.

    1. Prolog
    2. Python
    3. Smalltalk
    4. LISP
  56. Computer hardware is the collection of

    1. Partials
    2. Physical parts of a computer system
    3. Software
    4. Program
  57. A mark or any other distinctive sign associated with products is called:

    1. Patent
    2. Copyright
    3. Trademark
    4. Company monogram
  58. If you want to search for an exact phrase on Google then enclose it in ________.

    1. @
    2. " "
    3. *
    4. #
  59. To move from one page to other page on the web, a hyperlink is given which is

    1. Of blue color
    2. underlined
    3. Of red color
    4. Of blue color and underlined
  60. The ________ consists of the instructions that tell the control unit to request an activity within the arithmetic/logic unit.

    1. Arithmetic/logic group
    2. Control unit group
    3. RISC group
    4. RISC/CISC group
  61. In binary Notation 11111111 is

    1. 128
    2. 255
    3. 567
    4. 127
  62. Quantity associated with each position is ________ the quantity associated with the position to its right.

    1. Twice
    2. Single time
    3. Thrice
    4. Forth
  63. Process states include the value of the program counter as well as the contents of the ________.

    1. Related memory cells
    2. Registers and related memory cells
    3. Registers
    4. Registers and cache memory cells
  64. Appearance of each pixel is encoded to form ________.

    1. Pixel
    2. Geometric Structures
    3. Bitmap
    4. Scaling
  65. CAN-SPAM Act applies in:

    1. UK
    2. US
    3. UAE
    4. Canada
  66. The style group in the home ribbon is the:

    1. Fifth group
    2. Second group
    3. Fourth group
    4. Third group
  67. A clear flag state indicates that the resource is ________.

    1. Available
    2. Unavailable
    3. Currently allocated
    4. Ready
  68. A styles option includes font:

    1. Size
    2. Name
    3. Colour
    4. All of the given.
  69. The field of artificial intelligence is being pursued along paths:

    1. 5
    2. 3
    3. 2
    4. 4
  70. If we want to end a page at a specific point and move to the next page we can use:

    1. Page move
    2. Page break
    3. Blank page
    4. Page end
  71. This ________ view of the database is called a database model.

    1. theoretical
    2. conceptual
    3. logical
    4. empirical
  72. What is the full form of ASP?

    1. Active Start Pages
    2. Active Server Pages
    3. Alternate Server Pages
    4. Alternate Start Pages
  73. In binary Addition 1+1 is =

    1. 10
    2. 2
    3. 5
    4. 11
  74. A program that is believed to be correct and a program that is correct. The two are

    1. Same
    2. Not same
    3. Not necessarily same
    4. Totally same
  75. While sending a message it is the ________ layer's responsibility to provide an address that is compatible with the Internet infrastructure.

    1. Application
    2. Network
    3. Link
    4. Transport
  76. To identify individual cells in a Computer's main memory, each cell is assigned a unique "name", called its ________.

    1. Path
    2. Address
    3. Place holder
    4. Location
  77. Computer science has made hacking bank account:

    1. Difficult
    2. Impossible
    3. Possible
    4. Challenging
  78. What does VoIP stands for ________.

    1. Virtually Over Internet Protocol
    2. Voice Over Internet Protocol
    3. Voice of Internet Protocol
    4. Voice of International Protocol
  79. Command that can immediately go to a page or any marked location within your document.

    1. Search
    2. Go to
    3. Format
    4. Ribbon
  80. HDTV is the abbreviation of ________.

    1. High demanded television
    2. High defined television
    3. High definition television
    4. High demand television videos
  81. One of the major uses of the ________ operation is for placing 0s in one part of a bit pattern while not disturbing the other part.

    1. AND
    2. OR
    3. XOR
    4. NOR
  82. IPR stands for:

    1. Intellectual property restate
    2. Intellectual property rights
    3. Intellectual property resources
    4. Intellectual property release
  83. The repetitive use of an instruction or sequence of instructions is called ________.

    1. Loop
    2. Statement
    3. Condition
    4. Pseudocode
  84. A significant example of iterative techniques is:

    1. Relational process
    2. Conventional process
    3. Rational unified process
    4. Unified process
  85. ________ is also consider as character.

    1. Numbers
    2. Small caps
    3. Large caps
    4. Space
  86. A CPU consists of three parts ________.

    1. ALU/ control unit, register
    2. ALU/MJPEJ/CU
    3. CIRCUIT /Mp3 /CU
    4. Ram/cache/ dram
  87. ________ tag is used to write paragraph in HTML document.

    1. <p>
    2. <pr>
    3. <pa>
    4. <pg>
  88. ________ is exemplified by two transactions, each of which makes a deduction from the same account.

    1. Incorrect summary problem
    2. Time sharing
    3. Potential problem
    4. Lost update problem
  89. On social media, sometimes, a particular ________ is very popular.

    1. Hash tag
    2. Symbol
    3. Operator
    4. Word
  90. Float CGPA=2.5;
    If (CGPA>=3.0)
    Cout<<"Give Scholarship";
    Else
    Cout<<"Sorry you do not qualify for the Scholarship";
    It will show output

    1. Give Scholarship
    2. Sorry you do not qualify for the Scholarship
    3. Good
    4. Display none
  91. With computer science the access to private information has:

    1. Reduced
    2. Increased
    3. Removed
    4. Controlled
  92. The binary search algorithm uses ________.

    1. Linear search
    2. Divide and conquer method
    3. Bubble sort technique
    4. Quick sort technique
  93. The first group in Design Ribbon of MS PowerPoint is:

    1. Tables
    2. Symbols
    3. Themes
    4. Variants
  94. Content filtering works by matching ________ of characters:

    1. Strings
    2. Codes
    3. Values
    4. Paragraphs
  95. The most popular system for representing integers within today's computers is ________'s complement notation.

    1. Three
    2. Two
    3. 0
    4. One
  96. A charity organization of London is:

    1. EPC
    2. CL
    3. PI
    4. INPC
  97. In particular, the chart that indicates the entire game is overseen by a function named ________.

    1. objects
    2. controlgame
    3. function
    4. forms
  98. The simplest form of array is the ________ array.

    1. multi-dimensional
    2. two-dimensional
    3. one-dimensional
    4. All of the given
  99. UTF-8 uses 24 to ________ bits.

    1. 32
    2. 30
    3. 21
    4. 90
  100. Software packages that allow users to access hypertext on the Internet are called ________.

    1. Hypersofts
    2. Browsers
    3. Linkers
    4. Routers
  101. Microsoft Office includes:

    1. Wordpad
    2. Scientific calculator
    3. PDF reader
    4. Word
  102. The ________ ribbon is the ribbon that helps you to design your slides as per your requirement.

    1. Slide
    2. Design
    3. Layout
    4. Insert
  103. Time required to move the read/write heads from one track to another.

    1. Random time
    2. Access time
    3. Seek time
    4. Rational time
  104. Table group is a part of ________ ribbon:

    1. Home
    2. Insert
    3. Design
    4. View
  105. An algorithm is ________ and distinct from its representation.

    1. Abstract
    2. Clear
    3. Vision
    4. Visual
  106. Some of the elements of a spreadsheet are:

    1. Cells, Numbers, Text, Formulae
    2. Cells, workbooks, Text, Numbers,Formulae
    3. Cells, Workbooks, Function calls, graphs
    4. Rows, Columns, flow charts, Auto calculations
  107. What does MIDI stand for?

    1. Magnetic information design interface
    2. Musical information disk interface
    3. Musical instrument digital interface
    4. Music information disk interrogator
  108. Digits on left side of point represent the

    1. Whole number
    2. Factorial
  109. If the RGB scheme is used to display an image of size 1024*768 pixels then the image will require ________ of storage.

    1. 22.5 MB
    2. 2.25 KB
    3. 2.25 MB
    4. None of the given
  110. How many iterations are required to find 88 in the following array?
    {5, 6, 77, 88, 99}

    1. 1
    2. 2
    3. 3
    4. 4
  111. In ________ if two modules interact with the same item of data, then modifications made to one module may affect the other.

    1. control coupling
    2. data coupling
    3. external binding
    4. internal binding
  112. How many common forms of data mining?

    1. Five
    2. Four
    3. Three
    4. Two
  113. Data can come from:

    1. Passwords
    2. Personal software
    3. Emails
    4. All of the given
  114. If you are interested to search a query for a specific file type, you can include such ________ in the query.

    1. File type
    2. Version
    3. Program type
    4. Typing
  115. Third generation language attributes refer to

    1. Particular machine
    2. For all machine
    3. For only required machine
    4. None of the given
  116. Gaming addiction can cause problems:

    1. Privacy issues
    2. Environmental
    3. Identity theft
    4. Financial
  117. A ________ is a storage area that contains such an encoded address.

    1. tree
    2. pointer
    3. graph
    4. array
  118. Turing gave a percentage of a machine that will have a chance to pass Turing test in year.

    1. 2000
    2. 2002
    3. 2008
    4. 2012
  119. By using 16 bits in 2's complement notation how many maximum positive number can be represented

    1. 32768
    2. 32678
    3. 32867
    4. 32868
  120. According to famous Job market website most of the jobs are available in ________.

    1. Economics
    2. Computer Science
    3. Mathematics
    4. Biology
  121. Page Setup Group is in which ribbon of MS Word?

    1. Refrences
    2. Page Layout
    3. Insert
    4. Review
  122. Non terminating expansions may also be a source of ________.

    1. Logical error
    2. Truncation errors
    3. Overflow
    4. Syntax error
  123. Control structure iterates a set of instructions based on the provided condition called

    1. If-else
    2. Conditional
    3. Loop
    4. Selection
  124. RISC is abbreviation of ________?

    1. Redundant instruction set computer
    2. Reduced instructive set computer
    3. Reduced instructive set controller
    4. Reduced instruction set computer
  125. We can increase the size of text from home ribbon group called:

    1. Paragraph
    2. Font
    3. Clipboard
    4. Styles
  126. A software license is a ________ between the owner and user of a software product that grants the user certain permissions to use the product without transferring ownership rights to the intellectual property.

    1. copyright
    2. legal agreement
    3. license agreement
    4. GOMS
  127. In the United States the Privacy Act of 1974 was to protect citizens from abusive use of databases:

    1. Government
    2. Public
    3. Agencies
    4. Companies
  128. In MS Word, shortcut key of cut is ________.

    1. Ctrl+v
    2. Ctrl+c
    3. Ctrl+x
    4. Ctrl+i
  129. ________ is not only used as a means of retrieving data from mass storage but also as a means of retrieving items from large blocks of data stored in main memory.

    1. Database
    2. Sequential
    3. Hashing
    4. Indexing
  130. You can use ________ search engine for searching images, movies, games or educational content.

    1. Bing
    2. Google
    3. Yahoo
    4. One Search
  131. George Boole, who was a pioneer in the field of mathematics called ________.

    1. Subtraction
    2. Algebra
    3. Logic
    4. Progression
  132. The hexadecimal notation for: 111010000101010100010111

    1. Is E85517
    2. Is E855
    3. Is F985517
    4. Is E5517
  133. The node at the top is called the ________ node.

    1. head
    2. root
    3. terminal
    4. siblings
  134. Information available on the web is:

    1. Mostly Free of any cost
    2. Costly
    3. Totally free
    4. Not accessible at all
  135. A single algorithm can be represented in ________ way(s).

    1. Single
    2. Many
    3. Malicious
    4. Modern
  136. Sds (Secure Digital Memory Cards) provide up to

    1. 10 gbs of storage
    2. 100 gbs of storage
    3. Few gbs of storage
    4. 1000 gbs of storage
  137. The fifth group in the home ribbon is the:

    1. Style
    2. Insert
    3. Editing
    4. Help
  138. Binary notation is a way of representing numeric values using only the ________.

    1. Digits 0 and 1
    2. Digits 0 and 0
    3. Digits 0 and 2
    4. Digits 2 and 1
  139. In CS, we store and link data in an organized way using

    1. SDLC
    2. MSDB
    3. DMBS
    4. DBMS
  140. If we are interested to see the map of some location, we can use map operator in the following way:

    1. Location: map
    2. Map: Location
    3. Mph: map
    4. Locations
  141. Which unit transfers the data from memory into the general purpose registers?

    1. Control unit
    2. Arithmetic unit
    3. Logical unit
    4. Shift
  142. American use about 680 pounds of paper in a year:

    1. Per person
    2. Per company
    3. Per newspaper
    4. Per city
  143. ________ tells how many places are required to move radix point.

    1. Exponent field
    2. Sign bit
    3. Significant bit
    4. Mantissa field
  144. Which one is a unary operator?

    1. AND
    2. OR
    3. NOT
    4. EQUAL
  145. Process of understanding what the characteristics of images means refer to:

    1. Image understanding
    2. Image processing
    3. Image analysis
    4. Image identifying
  146. Phase 1 of problem-solving steps is ________.

    1. Formulate the algorithm and and represent it as a program
    2. Evaluate the program for accuracy and for its potential as a tool for solving other problems
    3. Understand the problem
    4. Get an idea of how an algorithmic function might solve the problem
  147. Which of the following data types are recognized by JavaScript?

    1. Strings
    2. Numbers
    3. Undefined
    4. All of the given
  148. Disk operating system is ________ operating system

    1. Menu driven
    2. Graphical user interface
    3. Command driven
    4. None of the given
  149. Over which type of bus CPU can fetches its instructions from memory?

    1. Memory bus
    2. System bus
    3. Address bus
    4. Central bus
  150. Which of these describes stepwise refinement?

    1. It is a bottom up approach
    2. Greedy Approach
    3. It is a top down approach
    4. Depth First Search
  151. Find option inludes:

    1. Find
    2. Advance find
    3. Go to
    4. All of the given.
  152. ________ is used to store colorful images.

    1. RGB
    2. Pixel
    3. Bitmap
    4. Scaling
  153. One bit can contain only ________ value.

    1. Zero
    2. One
    3. Two
    4. Threw
  154. Binary notation has ________ representation.

    1. One
    2. Two
    3. Three
    4. Four
  155. ________ is used to combine different relations into one relation.

    1. PROJECT
    2. COMBINE
    3. SELECT
    4. JOIN
  156. We can customize indentation with:

    1. Clipboard
    2. Borders
    3. Ruler
    4. Justify
  157. This finding maximum number function will keep on going until we reach at the last value
    [12, 18, 299, 38, 999, 89, 101, 500, 801, 45]

    1. 45 each time
    2. 801 each time
    3. 12 each time
    4. 38 each time
  158. TLD stands for ________.

    1. Top Loud Domain
    2. Top Level Domain
    3. Top Lower Domain
    4. Top low domain
  159. The traditional development phase of the software life cycle does not include the stage.

    1. Design
    2. Maintenance
    3. Testing
    4. Implementation
  160. Page group includes options:

    1. Cover page
    2. Page margins
    3. Page colour
    4. All of the given
  161. The storage of a value with a fractional part requires that we store not only the pattern of 0s and 1s representing its binary representation but also the position of the ________.

    1. Decimal point
    2. Radix point
    3. Number
    4. Factorial
  162. What is the full form of JSP?

    1. Java Server Pages
    2. Java Script Pages
    3. Java Semantic Pages
    4. Java Source Pages
  163. Ethical issues are related to:

    1. Behaviour principles
    2. Linguistics principles
    3. Moral principles
    4. AI principles
  164. A paradigm works on object called

    1. Imperative paradigm
    2. Declarative paradigm
    3. Functional paradigm
    4. Object oriented paradigm
  165. To select shapes that are hidden or behind text we can click:

    1. Select Objects
    2. Select shapes
    3. Select hidden
    4. Select all
  166. An alternative to translators

    1. Assembler
    2. Compiler
    3. Interpreter
    4. Mnemonics
  167. The instruction code to halt machine cycle is

    1. C400
    2. C100
    3. C000
    4. 35CE0
  168. CD stands for:

    1. Computer Disc
    2. Computer Data
    3. Compact Disc
    4. Compact Data
  169. Programming languages are well-designed so that each statement has ________ meaning.

    1. Only one
    2. Multiple
    3. No
    4. Same
  170. ICQ, AIM and MSN Messenger are the examples of ________ services.

    1. EMAIL
    2. IM
    3. FTP
    4. IP
  171. Which of the following statement is true?

    1. Repeater is more complex than a bridge.
    2. Bridge is more complex than a repeater.
    3. Bridge and repeater both are complex.
    4. Bridge and repeater both are not complex.
  172. Computer security is also known as ________.

    1. Cyber-security
    2. Firewall-security
    3. Privacy
    4. Copyright
  173. If a process is allowed to access memory cells outside its allotted area, it can ________ data being used by other process.

    1. Alter and store
    2. Access and alter
    3. Read and write
    4. Read and alter
  174. Ctrl+z is used for:

    1. Redo
    2. Undo
    3. Save
    4. Load
  175. ________ is a layered structure consisting of a number of homogenous and simple processing elements.

    1. Genetic Algorithms
    2. Rule-based Systems
    3. Feed-Forward Network
    4. None of the given
  176. Ethics and legality are essential in many industries including:

    1. Government officer
    2. Doctors
    3. Teachers
    4. All of the given
  177. People are working in sitting position due to computer science and thus have more chance to develop:

    1. Thinking
    2. Obesity
    3. Harmful habits
    4. Creativity
  178. We can apply bullets from home ribbon group called:

    1. Paragraph
    2. Font
    3. Clipboard
    4. Styles
  179. ________ loop structure referred to as a posttest loop.

    1. While
    2. Repeat
    3. For
    4. For each
  180. If we want to link two sections of a same document we generally use:

    1. Hyperlink
    2. Cross reference
    3. Reference
    4. Bookmark
  181. Shortcut for Track Changes in MS word is

    1. Ctrl + Shift + T
    2. Ctrl + Shift + D
    3. Ctrl + Shift + E
    4. Ctrl + Shift + F
  182. Editing group have commands:

    1. 2
    2. 3
    3. 4
    4. 5
  183. ________ displays the document as it would appear if printed and is the default view.

    1. Web Layout
    2. Print Layout
    3. Read Mode
    4. Draft Mode
  184. Matching geometric characteristics technique cannot read:

    1. Images
    2. Pictures
    3. Optical characters
    4. Handwritten material
  185. Generally how many steps a machine cycle have?

    1. Two
    2. Three
    3. Four
    4. Two or more
  186. A track that leads to a simulation oriented methodology:

    1. Intelligent
    2. Proper
    3. Theoretical
    4. Engineering
  187. Home ribbon contains groups:

    1. Paragraph
    2. Font
    3. Clipboard
    4. All of the given
  188. The default theme of MS-Word document is:

    1. Paper
    2. Flow
    3. Word
    4. Office
  189. If you search on Google that "how can I hack?", then it would be so ________ for your security.

    1. Difficult
    2. Dangerous
    3. Insecure
    4. Grateful
  190. OR operator is also represented by ________ sign.

    1. }
    2. |
    3. @
    4. *
  191. The E-mail client sends message to:

    1. e-mail client
    2. SMTP server
    3. POP3 server
    4. All of the given
  192. Illustration is a part of ribbon:

    1. View
    2. Insert
    3. Home
    4. Review
  193. The process of using DNS to perform a translation is called a ________.

    1. DNS table
    2. DNS translation
    3. DNS lookup
    4. DNS pattern
  194. Approximately how many entries a typical dictionary in a word processor can contain?

    1. 25,000 entries
    2. 250,000 entries
    3. 25,000 entries
    4. More than 250,000 entries
  195. The people present arround the e-waste gain:

    1. Benefits
    2. Diseases
    3. Substances
    4. Electronic waste
  196. The amount of paper American use in a year is:

    1. 83 million tons
    2. 85 million tons
    3. 90 million tons
    4. 95 million tons
  197. Actions according to environment knowledge:

    1. Intelligent action
    2. Reflex action
    3. Predefined action
    4. Simplest response
  198. In main memory each cell has unique ________ address.

    1. Byte
    2. Bits
    3. RAM
    4. Cell
  199. Information that was once buried in arcane records has become accessible because of:

    1. Online management
    2. Database
    3. Artificial intelligence
    4. Computer
  200. In ________ digits on right side represent the fractional part.

    1. Fraction
    2. Decimal
    3. Hexadecimal
    4. Binary
  201. Which is the correct format to find out a value from any given list?

    1. Search()
    2. ()search
    3. Search<>
    4. To search
  202. The binary of 8 in 2's complement notation will be 1000, what will be the binary of -8?

    1. 1001
    2. 0000
    3. 1000
    4. 0100
  203. Dynamic ram - Stores bits as tiny electric Charge.

    1. Refreshes no times a second
    2. Refreshes many times a second
    3. Refreshes one times a second
    4. Refreshes two times a second
  204. Which Excess notation is used to represent 100 as Zero?

    1. Excess 4
    2. Excess 8
    3. Excess 2
    4. Excess 16
  205. The Binary Search Algorithm, what will be mid value in second level of recursion in the following array.
    {45, 77, 89, 90, 94, 99, 100} and key = 99

    1. 89
    2. 90
    3. 94
    4. 99
  206. Which of the following modems is slowest?

    1. ISDN
    2. Cable
    3. DSL
    4. Standard
  207. CPU and RAM are connected with ________ to communicate with each other.

    1. Controller
    2. BUS
    3. Cables
    4. Ports
  208. The purpose of system ________ is to describe the software's internal composition so that the software can be maintained later in its life cycle.

    1. quality assurance documentation
    2. user documentation
    3. system documentation
    4. technical documentation
  209. Information security Risk include:

    1. Malicious code
    2. Data collection from children
    3. Online scam
    4. Cyber bullying
  210. The Turing test result of program DOCTOR developed by Joseph Weizenbaum was:

    1. Ambiguous
    2. Failed
    3. No result
    4. Passed
  211. Font group includes options:

    1. Typefaces
    2. Highlight
    3. Font size
    4. All of the given
  212. In 16 bits ________ can be store only.

    1. 100
    2. 99
    3. 98
    4. 97
  213. Suppose you are the presenter and you want your audience in touch during presentation then what will you do?

    1. Write long sentences on slides
    2. Keep same color for background and text
    3. Use of videos, animations and sounds
    4. Using very small font size
  214. The description of the object's properties is called

    1. Object
    2. Class
    3. Function
    4. Instance
  215. Which from the following is not a relational operator.

    1. = =
    2. > =
    3. ! =
    4. % =
  216. We can use Boolean operators specially to find relevant pages.

    1. "is ""am"
    2. "And" "Or"
    3. Is "it"
    4. If else
  217. ________ keyword is used in python language to define a word.

    1. Define
    2. Def
    3. Dfi
    4. Dfn
  218. ________ is a short version of binary digit, a smallest unit to store data.

    1. Bit
    2. Byte
    3. Pattern
    4. Mega Byte
  219. Attacks can be made to prevent access to websites by crashing:

    1. Websites
    2. Servers
    3. Network
    4. Database
  220. Which of the following is true about problem solving?

    1. Ability to solve problems remains more of an artistic skill to be developed
    2. Ability to solve problems remains more of a non-artistic to be developed
    3. Ability to solve problems remains more of a rational skill to be developed
    4. Ability to solve problems remains more of a non-rational skill to be developed
  221. Contact Risks include:

    1. Online scam
    2. Harmful Advice
    3. Cyber bullying
    4. Unsuitable products
  222. In MS Word, Justify option is used to give spaces to the paragraph on left and right side ________.

    1. Greater
    2. Smaller
    3. Different
    4. Equally
  223. Data were stored in memory, programs were part of the ________.

    1. CPU
    2. Cable
    3. BUS
    4. CACHE
  224. The end of a list is called the ________.

    1. devon
    2. tail
    3. head
    4. bob
  225. Copyright can be applied on:

    1. Dramatic work
    2. Music
    3. Artistic work
    4. All of the given
  226. USA has passed legislation allowing the government to actively monitor citizens in the name of:

    1. National ethics
    2. Data security
    3. National security
    4. Data ethics
  227. ENIAC stands for:

    1. Electronic numerical integrator and calculator
    2. Electronic numbers and integrator and calculator
    3. Electronic numerical integer and calculations
    4. Electronic numbers integer and calculations
  228. Files can be downloaded or uploaded using ________ protocol.

    1. SMTP
    2. FTP
    3. TELNET
    4. None of the given
  229. George Boole invented the ________ operations.

    1. Bit
    2. Logical
    3. Byte
    4. Boolean
  230. If right circular shift is performed on a ________ eight times, same bit pattern is obtained as it is started.

    1. Bite size byte pattern
    2. Byte pattern
    3. Byte size bit pattern
    4. Bit pattern
  231. American throws away pieces of paper each year which is equal to:

    1. 1 billion trees
    2. 2 billion trees
    3. 2.5 billion trees
    4. 1.5 billion trees
  232. Cloud computing services provide reasonable guarantees of ________ and ________.

    1. Scalability, Reliability
    2. Reliability, Privacy
    3. Privacy, Security
    4. Scalability, Security
  233. ________ begins the paragraph with a large letter that spills down into the text:

    1. Word art
    2. Quick parts
    3. Drop cap
    4. Text box
  234. A specific example is the ________ series of standards, which address numerous industrial activities such as design, production, installation and servicing.

    1. ISO 9000
    2. IEEE
    3. ISO/IEC 15504
    4. SQA
  235. The process involved in a ________ is like copying the data rather than moving it.

    1. Transfer instruction
    2. Load instruction
    3. Move instruction
    4. Shifting data
  236. Which of the following is not true about firewall?

    1. Firewall protects the entire network from inside intrusion
    2. Firewall protects the entire domain from outside intrusion
    3. Firewall protects the individual computer from outside intrusion
    4. Firewall protects the individual computer from inside intrusion
  237. Smallest unit of storage is:

    1. Bit
    2. Byte
    3. Mega Byte
    4. None of the given
  238. ________ was the first to implement the web.

    1. Tim Berners-Lee
    2. Steve Jobs
    3. Alan Turing
    4. Charles Babbage
  239. Researchers are trying to develop systems that exhibits intelligent behavior in ________ track.

    1. Artificial
    2. Intelligent
    3. Engineering
    4. Theoretical
  240. The set of tasks that ensures the software is correctly implements a specific function is known as

    1. Modularity
    2. Verification
    3. Validation
    4. Requirement gathering
  241. In excess notation ________ of bits are used to represent each value.

    1. Simple number
    2. Fixed number
    3. Variable number
    4. Constant number
  242. Voice over IP has ________ modes.

    1. 2
    2. 3
    3. 4
    4. 5
  243. Process is a ________ activity.

    1. Botting activity
    2. Dynamic activity
    3. Static activity
    4. Shifting activity
  244. ________ network fails if a single node fails.

    1. Ring
    2. Bus
    3. Star
    4. None of the given
  245. In context of environment, computer science have impacts:

    1. Positive
    2. Negative
    3. Dangerous
    4. Both positive & negative
  246. Bit-map images compresses using the ________ algorithm.

    1. LZV
    2. LZW
    3. LZE
    4. None of the given
  247. The option of justify is in group:

    1. Insert
    2. Clipboard
    3. Font
    4. paragraph
  248. TIFF is abbreviation of ________?

    1. Toggle Image File Format
    2. Template Image File Format
    3. Tagged Image File Frame
    4. Tagged Image File Format
  249. Which of the following is used to store data in computer?

    1. Hard Disk
    2. Floppy Disk
    3. Optical Disk
    4. All of the given
  250. 10.011 added to 100.11 produces

    1. 111.088
    2. 111.007
    3. 111.001
    4. 111.099
  251. Sometimes when a device is continuously running it damages us by:

    1. Utilizing time
    2. Waves
    3. Radiations
    4. Privacy issues
  252. Learning procedural knowledge usually improves a process:

    1. Trial-and-error
    2. Try-and-error
    3. Process-and-error
    4. Procedure-and-error
  253. In MS Word, we have to write an equation with 2 as a number and 3 as its power. Which option is suitable for this purpose?

    1. Superscript
    2. Subscript
    3. Case
    4. Font size
  254. Hexadecimal notation uses a ________ symbol to represent a pattern of four bits.

    1. Quad
    2. SINGLE
    3. Double
    4. Triple
  255. The device that is used to store data is called:

    1. Input Device
    2. Output Device
    3. Storage Device
    4. None of the given
  256. What will be the output of following OR expression 1010 OR 1111?

    1. 1111
    2. 0101
    3. 0000
    4. 1010
  257. Correct syntax is

    1. If (condition Statement A Else Statement B.
    2. If condition) Statement A Else Statement B.
    3. If (condition) Statement A Else Statement B.
    4. If (condition)
  258. Main memory is also called ________.

    1. ROM
    2. RAM
    3. Bits
    4. Cache
  259. A ________ is a file that is accessed in a special manner from its beginning to its end as though the information in the file were arranged in one long row.

    1. index file
    2. sequential file
    3. database file
    4. flat file
  260. Proofing group is in which ribbon of MS Word?

    1. Page Layout
    2. Design
    3. Review
    4. References
  261. The option of bullets is in group:

    1. Insert
    2. Clipboard
    3. Font
    4. paragraph
  262. Matching geometric characteristics technique of recognizing images is used in:

    1. Optical character recognition
    2. Taking pictures
    3. Sorting pictures
    4. Mark recognition
  263. When we draw a table in MS word the table have initial column(s):

    1. One
    2. Zero
    3. Two
    4. Multiple
  264. RAM stands for:

    1. Random access memory
    2. Random archive memory
    3. Random memor
    4. Random accountable memory
  265. A file's ________ is normally stored as a separate file on the same mass storage device as the ________.

    1. index, indexed file
    2. sequential, sequential file
    3. database, database file
    4. flat, flat file
  266. Which of the following softwares help us optimizing the various business processes of an organization as a single system instead of a number of loosely coupled stand alone systems?

    1. OS
    2. Vector Graphics
    3. ERP
    4. DSS
  267. The term ________ refers to a collection of data that is multidimensional in the sense that internal links between its entries make the information accessible from a variety of perspectives:

    1. data mining
    2. data science
    3. data structure
    4. database
  268. We can add charts in MS-word from group:

    1. Illustrations
    2. Table
    3. Symbols
    4. Apps
  269. In MS Word, shortcut key to select the whole text in a document is ________.

    1. Alt+a
    2. Ctrl+a
    3. Ctrl+w
    4. Alt+w
  270. In binary search, first of all value check at a point

    1. Most left
    2. Middle
    3. Most right
    4. Beginning
  271. When we apply header it is ahown at:

    1. Bottom of document
    2. Every page of document
    3. Start page of document
    4. End page of document
  272. A program DOCTOR developed by Joseph Weizenbaum in the mid-1960s named as:

    1. Alexa
    2. Smart Doctor
    3. Eliza
    4. Joseph
  273. The first programming language designed for the non-technical users was:

    1. Visual Basic
    2. Ada
    3. Basic
    4. Cobol
  274. What is the output of the following code?

    int sum = 14;
    if (sum < 20)
    cout < < "Under";
    if (sum > 20) cout < < "Over";

    1. Under
    2. Over
    3. Under the limit
    4. Over the limit
  275. Any variable in JavaScript can hold any type of value, and the that type can change midway through the program.

    1. True
    2. False
  276. What will be the output of following pseudo code?
    def FindFactorial():
    fact = 2
    i=1;
    While (i<=7)
    fact=fact*i;
    i=i+1;
    print(fact)

    1. 5040
    2. 10080
    3. 120
    4. 980
  277. Let a list Fred, Alex, Diana, Byron, Carol
    After sorted first sublist our list would be

    1. Alex, Fred, Diana, Byron, Carol
    2. Fred, Alex, Diana, Byron, Carol
    3. Alex, Diana, Fred, Byron, Carol
    4. Alex, Fred, Byron, Diana, Carol
  278. Which of the following is not true about pseudo code?

    1. Pseudo code is an unambiguous representation
    2. Pseudo code is an informal representation
    3. Pseudo code is an algorithms representation
    4. Pseudo code is an ambiguous representation
  279. Robots identifies veins by:

    1. Touching veins
    2. Image processing
    3. Artificial intelligence
    4. Testing
  280. In MS Word, we can highlight a text using color from group ________.

    1. Font
    2. Paragraph
    3. Clipboard
    4. Insert
  281. There are many types of sensors including:

    1. Camera
    2. Range sensor
    3. Microphone
    4. All of the given
  282. In ________ one user can executing several tasks simultaneously.

    1. Multiple program
    2. Multilevel
    3. Multitasking
    4. Simple tasking
  283. A pseudocode must have a consistent, concise notation for representing recurring ________ structures.

    1. Non-Semantic
    2. Semantic
    3. Markup
    4. Text
  284. CPU required at least ________ to fetch the instruction from memory.

    1. Two nanosecond
    2. Nanosecond
    3. Three nanosecond
    4. One billion second
  285. A data cell of a table contains

    1. only text
    2. images
    3. tables
    4. all of the given
  286. Plagiarism is a major problem in:

    1. Identify theft
    2. Gaming addiction
    3. Education
    4. Online transaction
  287. ________ is a tool that is used to organize data, such as a check register.

    1. Slide
    2. Spreadsheet
    3. Transitions
    4. Insert
  288. ________ is a system that guards a private network.

    1. Protocol
    2. Firewall
    3. Communication channel
    4. None of the given
  289. There are ________ Basic Boolean operations are.

    1. 1
    2. 2
    3. 3
    4. 4
  290. In MS-word different type of effects on the text can be applied with:

    1. Text box
    2. Word art
    3. Quick parts
    4. All of the given
  291. A device that responds to stimuli from its environment:

    1. Computer
    2. AI device
    3. Agent
    4. Router
  292. Major component of syntactic analysis is:

    1. Context
    2. Identifying
    3. Parsing
    4. Understanding syntax
  293. Eye for long amount of time is not meant to look:

    1. 2D
    2. Constantly
    3. 1D
    4. Continuously
  294. Software licenses are:

    1. Proprietry
    2. Free
    3. Open source
    4. All of the given
  295. Most ________ codes use today are Huffman codes.

    1. Relative encoding
    2. Frequency dependent
    3. Run-length encoding
    4. Differential encoding
  296. The pattern in which computer are connected together to form a network is called :

    1. Network Topology
    2. Network Transmission
    3. Network Protocol
    4. None of the given
  297. An object is actually a special case of the more general concept of a ________.

    1. Coupling
    2. binding
    3. cohesion
    4. component
  298. Usual way of protecting software is:

    1. Patent
    2. Copyright
    3. Rules
    4. Company monogram
  299. Which type of registers is used in program execution?

    1. General purpose
    2. CPU register
    3. Special purpose
    4. Memory address register
  300. When you search in the Google by typing Google finds all those pages which contains

    1. All the terms given in the query
    2. None of the terms given in the query
    3. Some of the terms given in the query
    4. Random
  301. 0011 + 0010 = ________

    1. 0000
    2. 0101
    3. 1111
    4. 1010
  302. In some cases, the data collection process is readily apparent, in others it is:

    1. Outward
    2. Subtle
    3. Specious
    4. Obvious
  303. Average amount of time required for the desired data to rotate around to the read/write head once the head has been positioned over the desired track.

    1. Random TIME
    2. Access time
    3. Seek time
    4. Rotational delay