In the name of ALLAH, the most beneficient, the most merciful

Introduction to Computing (CS101)

Multiple Choice Questions (MCQs)

 

Objective Questions

Question

The tasks performed to determine the existence of defects is called ____________.

  1. Debugging
  2. Testing
  3. Repairing
  4. Coding

Answer: 2 Chapter No. 44 

Question

There are _________ types of errors.

  1. 2
  2. 3
  3. 4
  4. 5

Answer: 2 Chapter No. 44 

Question

Web is a unique invention by humans in terms that it is:

  1. accessible to only the owners who control it
  2. accessible from particular locations only
  3. accessible to all humans
  4. accessible to only the educational institutes

Answer: 3 Chapter No. 43 

Question

______________ is in Executive team.

  1. Project Manager
  2. CEO
  3. Team Lead
  4. Developer

Answer: 2 Chapter No. 42 

Question

Planning and tracking of the project is the responsibility of the_______________.

  1. Project Manager
  2. Architect
  3. Developer
  4. Chief Executive Officer

Answer: 1 Chapter No. 42 

Question

The __________has changed marketing forever, redirecting it from a mass focus to a single person focus.

  1. Web
  2. Television
  3. Mobile
  4. Radio

Answer: 1 Chapter No. 40 

Question

_______________ based communication allows business entities to coordinate the activities of their globally spread units with greater accuracy.

  1. Intranet
  2. Internet
  3. Home
  4. LAN

Answer: 2 Chapter No. 40 

Question

The internet communities are ________.

  1. Geographical based
  2. Interest based
  3. Country based
  4. Religion based

Answer: 2 Chapter No. 40 

Question

We use __________ to stop Break-Ins.

  1. Scanners
  2. Intrusion detectors
  3. Firewalls
  4. Intrusion detectors and Firewalls

Answer: 2 Chapter No. 39 

Question

Yahoo Servers was recovered, from DoS attack, within

  1. 12 hours
  2. 3 hours
  3. 24 hours
  4. 3 days

Answer: 2 Chapter No. 39 

Question

The ________ virus may destroy or broadcast private data.

  1. Malicious
  2. Neutral
  3. Helpful
  4. DoS

Answer: 1 Chapter No. 39 

Question

_________ are harmless in the sense that they only make copies of themselves on the infected computer

  1. Trojan horses
  2. Logic- or time-bombs
  3. Worms
  4. Viruses

Answer: 3 Chapter No. 39 

Question

A virus consists of two parts:

  1. Computer and internet
  2. Transmission mechanism and Internet
  3. Transmission mechanism and Payload
  4. Internet access and Payload

Answer: 3 Chapter No. 39 

Question

_______is correct format to access a string Method.

  1. methodName.string( )
  2. string.methodName( )
  3. methodName().string
  4. string ().methodName

Answer: 2 Chapter No. 38 

Question

_________ returns a string containing characters copied from positions n to m-1

  1. charAT(n)
  2. substring (m)
  3. substring(n,m)
  4. None of the given

Answer: 3 Chapter No. 38 

Question

__________ can be used for entering, editing or viewing data, one record at a time

  1. Forms
  2. Reports
  3. Queries
  4. Tables

Answer: 1 Chapter No. 37 

Question

RDBMS stands for

  1. Relative Data Base Management System
  2. Relational Data Base Management System
  3. Recursive Data Base Management System
  4. Responsible Data Base Management System

Answer: 2 Chapter No. 37 

Question

_______ is a field that uniquely identifies each record stored in a table.

  1. Primary Key
  2. Foreign Key
  3. Secondary key
  4. Special Key

Answer: 1 Chapter No. 37 

Question

Hardware malfunctions is related to

  1. Data updates
  2. Data integrity
  3. Data security
  4. Data accessibility

Answer: 2 Chapter No. 36 

Question

Which function returns a randomly selected floating point number between 0 and 1?

  1. floor(x)
  2. ceil(x)
  3. random()
  4. round(x)

Answer: 3 Chapter No. 35 

Question

__________ returns a randomly selected, floating point number between 0 and 1.

  1. Math.random
  2. random
  3. random()
  4. None of the given

Answer: 3 Chapter No. 35 

Question

Autonomous Web Agents are also known as _____________.

  1. Mobile Agents
  2. Softbots
  3. Both "Mobile Agents" & "Softbots"
  4. None of these

Answer: 3 Chapter No. 34 

Question

Color mapping scheme reducing the size of 2.25 MB graphic to_______ MB.

  1. 0.90 MB
  2. 0.75 MB
  3. 1.00 MB
  4. None of these

Answer: 2 Chapter No. 33 

Question

There are __________ & __________ popular schemes to reduce the number of bytes that are required for storing graphics.

  1. Contrast & Color Control
  2. Dithering & Color Mapping
  3. Matching & Non-Matching
  4. None of these

Answer: 2 Chapter No. 33 

Question

_________ images enhanced to impart the illusion of depth.

  1. Parallel
  2. Diagonal
  3. Flat
  4. None of these

Answer: 3 Chapter No. 33 

Question

Bit-map images compresses using the __________ algorithm.

  1. LZV
  2. LZW
  3. LZE
  4. None of these

Answer: 2 Chapter No. 33 

Question

A string consisting of JavaScript statements enclosed in double or single ____________

  1. LINES
  2. EVENTS
  3. TAG’s
  4. QUOTES

Answer: 4 Chapter No. 32 

Question

Mixed-case capitalization of event handlers (e.g. onClick) is _________ for JavaScript event handlers defined in HTML code

  1. a Defined Rule
  2. a Requirement
  3. a Convention
  4. Necessary

Answer: 3 Chapter No. 32 

Question

VoIP stands for ___________________________

  1. Video over Internet Protocol
  2. Visual on Internet Protocol
  3. Voice over Internet Protocol
  4. None of these

Answer: 3 Chapter No. 30 

Question

________ is a type of computer-to-computer messaging.

  1. TCP
  2. Telnet
  3. E-mail
  4. FTP

Answer: 3 Chapter No. 30 

Question

____________ is used to transfer files between computers on a TCP/IP network.

  1. TCP
  2. FTP
  3. Telnet Protocol
  4. All of the given choices

Answer: 2 Chapter No. 30 

Question

__________ addresses are difficult to recognize and remember for humans.

  1. TCP
  2. IP
  3. SMTP
  4. None of these

Answer: 2 Chapter No. 30 

Question

Identify the correct statements about function arguments
I) A comma-separated list of data
II) Define the interface b/w function and rest of code
III) They are used to identify the function
IV) They Identify function’s type

  1. I and II Only
  2. II and III Only
  3. III and IV Only
  4. I, II and III Only

Answer: 1 Chapter No. 29 

Question

Function definition enclosed in a __________

  1. pair of curly braces
  2. Pair of parenthesis
  3. Pair of Brackets
  4. All of the given

Answer: 1 Chapter No. 29 

Question

Specifying the space in which a variable will be effective is called:

  1. Variable declaration
  2. Variable definition
  3. Variable Scope
  4. Variable garbage collection

Answer: 3 Chapter No. 29 

Question

____________ breaks down the message, to be sent over the internet, into packets.

  1. Protocol
  2. TCP
  3. IP
  4. NIC

Answer: 2 Chapter No. 28 

Question

Internet Enables:

  1. attractively-priced workers located in Pakistan to provide services to overseas clients
  2. users to easily share information with others located all over the world
  3. users to easily, inexpensively communicate with others remote users
  4. All of the given

Answer: 4 Chapter No. 28 

Question

When the packets reach the destination computer, Who reassembles them into the original message?

  1. UDP
  2. TCP
  3. UCP
  4. IP

Answer: 2 Chapter No. 28 

Question

TCP stands for:

  1. Transmission Control Practical
  2. Transmission Control Protocol
  3. Transfer Center Protocol
  4. None of the given choices

Answer: 2 Chapter No. 28 

Question

Files can be downloaded or uploaded using _______________ protocol.

  1. SMTP
  2. FTP
  3. TELNET
  4. None of the given choices

Answer: 2 Chapter No. 27 

Question

Electrical pulses received over telephone line are converted into messages (comprehensible by the computer) by using:

  1. Modulator
  2. Demodulator
  3. Both Modulator and Demodulator
  4. None of the given choices

Answer: 2 Chapter No. 27 

Question

Which of the following device can be used to control network traffic?

  1. Cable
  2. Connector
  3. Hub
  4. Repeater

Answer: 3 Chapter No. 27 

Question

One can download or upload files to a remote computer using ________ protocol.

  1. HTTP
  2. SMTP
  3. FTP
  4. TELNET

Answer: 3 Chapter No. 27 

Question

Users look for ________ solution.

  1. Optimal
  2. First good enough
  3. Good
  4. Best

Answer: 2 Chapter No. 25 

Question

Users __________, how things work.

  1. Analyze in detail
  2. Muddle through
  3. Figure out
  4. Read in detail

Answer: 2 Chapter No. 25 

Question

Which of the following keyword is used to jump out of switch statement as soon as match is found?

  1. default
  2. else
  3. jump
  4. break

Answer: 4 Chapter No. 23 

Question

Which of the following application is collections of cells?

  1. Word
  2. Excel
  3. PowerPoint
  4. Outlook Express

Answer: 2 Chapter No. 22 

Question

In SW Life cycle Thinking about the future phases generally results in ________and_______ .

  1. lesser delivery time ; higher quality
  2. more delivery time ; lesser quality
  3. risk-full scenarios ; more delivery time
  4. lesser quality ; more cost

Answer: 1 Chapter No. 20 

Question

Detailed plan of SW life cycle specifies two things that are the _________

  1. Required resources and expected cost
  2. Expected cost and budget
  3. Required resources and expected deliverables
  4. Time and cost

Answer: 4 Chapter No. 20 

Question

_________ is a high level language.

  1. Machine
  2. Assembly
  3. C++
  4. None of the given

Answer: 3 Chapter No. 19 

Question

BASIC stands for:

  1. Basic American Standard Information Code
  2. Beginner's All purpose Symbolic Instruction Code
  3. Brother and Sisters In Christ
  4. British American Scientific International Commercial

Answer: 2 Chapter No. 19 

Question

Batch programs do not

  1. Print or store the results
  2. Get input data
  3. Execute programs without the interference of user
  4. Provide event handling

Answer: 4 Chapter No. 19 

Question

A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks is called

  1. Software
  2. Programming language
  3. Device driver
  4. Interpreter

Answer: 2 Chapter No. 19 

Question

Programs that are typically started from a shell (or automatically via a scheduler) are called

  1. Batch programs
  2. Event-driven programs
  3. Sequential programs
  4. Application programs

Answer: 1 Chapter No. 19 

Question

A named collection of properties (data, state) and methods (instructions, behaviour) is called __________.

  1. Object
  2. Entity
  3. Relation
  4. Template

Answer: 1 Chapter No. 18 

Question

Some of the things that JavaScript can do! Choose incorrect option from following

  1. Control the appearance of the browser
  2. Read – Modify
  3. Control the content and appearance
  4. Interact with the user through event handlers

Answer: 2 Chapter No. 18 

Question

The “Ockham’s Razor,” principle states that when choosing among competing, successful solutions to a problem; choose the one which is the least ________

  1. Time Consuming
  2. Ambiguous
  3. Complex
  4. Restricted

Answer: 3 Chapter No. 16 

Question

Randomized algorithms are often ________ than deterministic algorithms for the same problem.

  1. Simpler and more slow
  2. Simpler and more efficient
  3. Complex and more efficient
  4. Complex and more slow

Answer: 2 Chapter No. 16 

Question

Sequence of steps that is taken to solve a problem is called _______.

  1. Algorithm
  2. Operating System
  3. Application software
  4. None of the above

Answer: 1 Chapter No. 16 

Question

In Analysis of Algorithms ________ generally measured in terms of the number of steps required to execute an algorithm

  1. Bandwidth
  2. Time
  3. Memory
  4. Logic functions

Answer: 2 Chapter No. 16 

Question

___________ is generally measured in terms of the number of steps required to execute an algorithm.

  1. Space
  2. Time
  3. Memory and time
  4. Bandwidth

Answer: 2 Chapter No. 16 

Question

Algorithm gives us:

  1. Definition of a problem
  2. Sequence of steps to solve a problem
  3. Proper understanding of a problem
  4. Solution to a problem

Answer: 4 Chapter No. 16 

Question

JavaScript consider every thing as:

  1. Control
  2. Window
  3. Object
  4. Statement

Answer: 3 Chapter No. 15 

Question

We can change the background color in HTML, using __________ attribute of

  1. background
  2. bgcolor
  3. backcolor
  4. backgroundcolor

Answer: 2 Chapter No. 15 

Question

The code in the _____________ portion is the right choice for developing larger JavaScript scripts.

  1. Body
  2. At End
  3. Head
  4. Separate

Answer: 3 Chapter No. 15 

Question

Using only Html we can create ______________.

  1. Dynamic web pages
  2. Static web pages
  3. Both Static and Dynamic pages
  4. None of these

Answer: 2 Chapter No. 15 

Question

WYSIWYG is:

  1. Software
  2. The abbreviation of "what you see is what you get"
  3. A Network company in Japan
  4. The abbreviation of "word you see is what you get"

Answer: 2 Chapter No. 14 

Question

You need to place University name on top of the every page of 100 pages document and Page number in the bottom of page. This can be done with the help of __________

  1. Reference initials
  2. Bullet and Numbering
  3. Borders and Shading
  4. Header and Footer

Answer: 4 Chapter No. 14 

Question

_________ helps in finding synonyms as well as antonyms in Word Processors

  1. Tables
  2. Thesaurus
  3. Spelling & Grammar
  4. Word Count

Answer: 2 Chapter No. 14 

Question

VisiCalc was the first popular __________ application on PC’s.

  1. Spreadsheet
  2. Word processor
  3. Presentation
  4. Database

Answer: 1 Chapter No. 13 

Question

A group of information is called

  1. File
  2. Database
  3. Record
  4. Field

Answer: 1 Chapter No. 13 

Question

To display a radio button on the web page, we use ___ tag.

  1. INPUTBUTTON
  2. INPUT
  3. RADIOBUTTON
  4. RADIO

Answer: 2 Chapter No. 12 

Question

When we use <INPUT type=“password”>, what will happen?

  1. Text will not be visible
  2. Text will be in normal format
  3. Text will be in **** format
  4. Text will be in #### format

Answer: 3 Chapter No. 12 

Question

In a HTML Form for file upload input element we use the following value in type attribute:

  1. Text
  2. Radio
  3. Hidden
  4. File

Answer: 4 Chapter No. 12 

Question

Disk operating system is _______ operating system

  1. Menu driven
  2. Graphical user interface
  3. Command driven
  4. None of the given

Answer: 3 Chapter No. 11 

Question

Which of the following is/are the parts of Operating system components?

  1. GUI
  2. Device Manager
  3. Shell
  4. All of these

Answer: 4 Chapter No. 11 

Question

__________ maintains index of names and location of the files.

  1. File Folder
  2. File manager
  3. File system
  4. Operating system

Answer: 2 Chapter No. 11 

Question

We need _____________ for memory management in computer.

  1. Software
  2. Hardware
  3. Operating System
  4. Application Software

Answer: 3 Chapter No. 11 

Question

Which of the following manages the HW and SW resources of the computer system?

  1. Hardware
  2. System Software
  3. Operating system
  4. Graphics Software

Answer: 3 Chapter No. 10 

Question

____________ translates the High level language program, one statement at time.

  1. Interpreter
  2. Compiler
  3. Utility program
  4. Anti virus software

Answer: 1 Chapter No. 10 

Question

__________ is the example of Shrink-wrapped software.

  1. PIA information system
  2. WinZip trial pack
  3. Linux
  4. MS Word

Answer: 4 Chapter No. 10 

Question

For writing a letter we can use ________ .

  1. MS Paint
  2. MS Word
  3. MS Excel
  4. Corel Draw

Answer: 2 Chapter No. 10 

Question

Computer directly understand the ___________ language

  1. human
  2. high level
  3. machine
  4. None of the given

Answer: 3 Chapter No. 10 

Question

ROWSPAN is used to extend the current cell to some

  1. columns
  2. rows
  3. columns & rows
  4. None of the given

Answer: 1 Chapter No. 9 

Question

    tag is used to
    1. underline text
    2. end the line
    3. create ordered list
    4. create unordered list

    Answer: 4 Chapter No. 9 

    Question

    Structures, in which another list starts before the first list is finished, are called:

    1. Multiple Lists
    2. Nested Lists
    3. Ordered Lists
    4. Un-ordered Lists

    Answer: 2 Chapter No. 9 

    Question

    1 byte consists of ____________ bits.

    1. 10
    2. 9
    3. 8
    4. None of the given choices

    Answer: 3 Chapter No. 8 

    Question

    1 byte consists of ____________ bits.

    1. 8
    2. 10
    3. 12
    4. 16

    Answer: 1 Chapter No. 8 

    Question

    Smallest unit of storage is:

    1. Bit
    2. Byte
    3. Mega Byte
    4. None of the given

    Answer: 1 Chapter No. 8 

    Question

    Register is a kind of _________ memory.

    1. Fast
    2. Super fast
    3. Slow
    4. Very slow

    Answer: 2 Chapter No. 7 

    Question

    Microprocessor are made up of semiconductor material called

    1. Aluminum
    2. Copper
    3. Silicon dioxide
    4. Silicon

    Answer: 4 Chapter No. 7 

    Question

    Today’s computers are based on the technology of ___________

    1. Punch cards
    2. Vacuum tubes
    3. Transistors
    4. Resistors

    Answer: 3 Chapter No. 7 

    Question

    Which one is correct?

    1. <HEAD> </HEAD>
    2. <HEAD> <END>
    3. <HEAD> </END>
    4. <HEAD> <\HEAD>

    Answer: 1 Chapter No. 6 

    Question

    Microphone is an input as well as output device. This statement is

    1. True
    2. False
    3. Meaningless

    Answer: 2 Chapter No. 4 

    Question

    _________ are personal computers that are designed to be easily transported and relocated.

    1. Desktops
    2. Portables
    3. Servers
    4. Workstations

    Answer: 2 Chapter No. 4 

    Question

    SCSI stands for:

    1. Small computer system interface
    2. System Common Small Integration
    3. Silicon Computer System Interface
    4. None of the given choices

    Answer: 1 Chapter No. 4 

    Question

    USB stands for:

    1. Uniform System Bill
    2. Universal System Bus
    3. Universal Serial Bus
    4. Unified Sequential Bus

    Answer: 3 Chapter No. 4 

    Question

    __________ can perform at or near the currently highest operational rate for computers.

    1. Microcomputers
    2. Supercomputers
    3. Personal Computers
    4. Mini Computers

    Answer: 2 Chapter No. 4 

    Question

    CD stands for:

    1. Computer Disc
    2. Computer Data
    3. Compact Disc
    4. Compact Data

    Answer: 3 Chapter No. 4 

    Question

    _________ is the best known builder for supercomputers.

    1. Sun
    2. Cray Research
    3. Microsoft
    4. Apple

    Answer: 2 Chapter No. 4 

    Question

    ______________ is volatile memory.

    1. RAM
    2. ROM
    3. Hard Disk
    4. CD ROM

    Answer: 1 Chapter No. 4 

    Question

    Information available on the web is:

    1. Mostly Free of any cost
    2. Costly
    3. Totally free
    4. Not accessible at all

    Answer: 1 Chapter No. 3 

    Question

    _________ is a related collection of WWW files that includes a beginning file called a homepage.

    1. HTML
    2. Website
    3. HTTP
    4. Web page

    Answer: 2 Chapter No. 3 

    Question

    The first Web browser with a GUI was generally available in:

    1. 1992
    2. 1993
    3. 1994
    4. 1995

    Answer: 2 Chapter No. 3 

    Question

    The Semantic Web is an idea of ______________

    1. John Von Neuman
    2. Ada
    3. Bill Gates
    4. Tim Berners-Lee

    Answer: 4 Chapter No. 3 

    Question

    HTTP stands for:

    1. Hyper Text Transparent Protocol
    2. Hyper Terminal Transfer Provider
    3. Hyper Text Transfer Procedure
    4. Hyper Text Transfer Protocol

    Answer: 4 Chapter No. 3 

    Question

    ____________ is a client program that uses HTTP to make requests to Web servers throughout the internet on behalf of the user.

    1. Web Application
    2. Web Browser
    3. Internet Application
    4. HTML

    Answer: 2 Chapter No. 3 

    Question

    Compared to vacuum tubes, Transistors offer:

    1. Much smaller size
    2. Better reliability
    3. Much lower cost
    4. All of the given choices

    Answer: 4 Chapter No. 2 

    Question

    ________ invented at the Imperial University in Tokyo by Yoshiro Nakamats.

    1. Hard drive
    2. Flash drive
    3. Floppy disk
    4. Optical disc

    Answer: 3 Chapter No. 2 

    Question

    Vacuum tubes were replaced by ____________

    1. Punch cards
    2. Transistors
    3. Micro Processors
    4. Resistors

    Answer: 2 Chapter No. 2 

    Question

    What will replace Transistors?

    1. Electro-mechanical computing
    2. Vacuum tube computing
    3. Quantum computing
    4. Nothing can replace Transistors

    Answer: 3 Chapter No. 2 

    Question

    If a computer could pass the Turing test then it would be able to:

    1. win a million dollar prize
    2. think like human beings
    3. think but slower than humans
    4. do the things faster

    Answer: 2 Chapter No. 2 

    Question

    The name of very first computer was _______________

    1. ABC
    2. BCD
    3. EDC
    4. None of the given choices

    Answer: 1 Chapter No. 2 

    Question

    World’s first large-scale, automatic digital computer was:

    1. Atanasoff-Berry Computer
    2. Harvard Mark 1
    3. ENIAC
    4. IBM-PC

    Answer: 1 Chapter No. 2 

    Question

    First computer designed for commercial applications was

    1. UNIVAC 1
    2. ENIAC
    3. EDVAC
    4. Atanasoff-Berry Computer

    Answer: 4 Chapter No. 2 

    Question

    Atanasoff-Berry Computer is the first computer that used:

    1. Binary number system
    2. Octal number system
    3. Decimal number system
    4. Hexadecimal number system

    Answer: 1 Chapter No. 2 

    Question

    DARPA stands for

    1. Defence Advanced Research Project Agency
    2. Direct Automatic Research Private Agency
    3. Defence Automatic Research Project Agency
    4. None of the given choices

    Answer: 1 Chapter No. 2 

    Question

    CERN releases WWW in:

    1. 1992
    2. 1993
    3. 1994
    4. None of the given choices

    Answer: 4 Chapter No. 2 

    Question

    A _________ translates a high-level language (that is easy to understand for humans) into a language that the computer can understand.

    1. Computer
    2. Transistor
    3. Compiler
    4. Device

    Answer: 3 Chapter No. 2 

    Question

    Spread sheet is a type of ____________.

    1. Productivity software
    2. Engineering software
    3. Mathematical software
    4. Business software

    Answer: 1 Chapter No. 1 

    Question

    World's first program was written by

    1. Charles Babbage
    2. Alfred Tennyson
    3. Ada Lovelace
    4. Bernoulli

    Answer: 3 Chapter No. 1 

    Question

    Who wrote the first program for Analytical engine?

    1. Babbage
    2. Lady Ada
    3. Haward
    4. Bernoulli

    Answer: 2 Chapter No. 1 

    Question

    Which language had been used by the US department of defense.

    1. Java script
    2. Binary language
    3. C++
    4. Ada

    Answer: 4 Chapter No. 1 

    Question

    Deep Blue was the name of:

    1. Human
    2. Computer
    3. City
    4. None of the given

    Answer: 2 Chapter No. 1 

    Question

    Analytical Engine was a machine of which type:

    1. non-programmable electronic machine
    2. programmable electromechanical
    3. programmable, mechanical, digital
    4. programmable but non-digital

    Answer: 3 Chapter No. 1 

    Question

    Architecture design is _________ design.

    1. Dependant
    2. Low Level
    3. High Level
    4. Secondary

    Answer: Chapter No.  

    Question

    TCP stands for :

    1. Transmission Control Practical
    2. Transmission Control Protocol
    3. Transfer Center Protocol
    4. None of the given

    Answer: Chapter No.  

    Question

    Heuristics are used because they

    1. Always give the best results
    2. Mostly gives good-enough results
    3. Don’t give wrong results
    4. Are commonly used as rule of thumb

    Answer: Chapter No.  

    Question

    A data value that appears directly in a statement is known as _______.

    1. Numeric Literals
    2. String Literals
    3. JavaScript Literals
    4. None of the given

    Answer: Chapter No.  

    Question

    To iterate each element of an array, the best know structure for iteration is:

    1. While loop structure
    2. If-else structure
    3. Switch statements
    4. For loop structure

    Answer: Chapter No.  

    Question

    ___________ is a special purpose computer that directs the data traffic when several paths are available.

    1. Bridge
    2. Router
    3. Gateway
    4. None of the given

    Answer: Chapter No.  

    Question

    VPN stands for:

    1. Virtual Public Network
    2. Virtual Private Network
    3. Visual Private Network
    4. Virtual Personal Network

    Answer: Chapter No.  

    Question

    Array can be defined as:

    1. An indexed list of elements
    2. A list of elements
    3. A collection of elements
    4. None of the given

    Answer: Chapter No.  

    Question

    The computer working independently with no connection to any other computer is called :

    1. Standalone
    2. Workstation
    3. Server
    4. None of the given

    Answer: Chapter No.  

    Question

    Email uses _______ protocol.

    1. SMTP
    2. HTTP
    3. FTP
    4. None of the given

    Answer: Chapter No.  

    Question

    In Spreadsheets, you can create relationship between two cells by using _____.

    1. Text
    2. Formulas
    3. Numbers
    4. None of the given

    Answer: Chapter No.  

    Question

    Browser is a _____________ used for browsing.

    1. Component
    2. Tool
    3. None of these
    4. Device

    Answer: 3 Chapter No.  

    Question

    The computer working independently with no connection to any other computer is called:

    1. Standalone
    2. Workstation
    3. Server
    4. None of the given choices

    Answer: 1 Chapter No.  

    Question

    _________ is also known as System Architecture.

    1. High level system design
    2. Low level system design
    3. Every system design
    4. Software Requirement

    Answer: 3 Chapter No.  

    Question

    Which one of these is NOT an example of storage devices?

    1. CD
    2. Floppy
    3. Hard Disk
    4. RAM

    Answer: 4 Chapter No.  

    Question

    The impact of a digit in a number is determined by its ____________

    1. Value
    2. Location
    3. Length
    4. None of above

    Answer: 2 Chapter No.  

    Question

    _________ was known as “mill” in Analytical engine.

    1. Memory
    2. Processor
    3. Monitor
    4. Mouse

    Answer: 2 Chapter No.  

    Question

    Which one of these is NOT an example of storage devices?

    1. Tape
    2. RAM
    3. Floppy
    4. DVD

    Answer: 2 Chapter No.