Multiple Choice Questions (MCQs)
Computer security is also known as ________.
In binary Notation 11111111 is
USA has passed legislation allowing the government to actively monitor citizens in the name of:
The default theme of MS-Word document is:
If we want to link two sections of a same document we generally use:
You can use ________ search engine for searching images, movies, games or educational content.
Most famous word processor is:
The Binary Search Algorithm, what will be mid value in second level of recursion in the following array. {45, 77, 89, 90, 94, 99, 100} and key = 99
Cloud computing services provide reasonable guarantees of ________ and ________.
________ begins the paragraph with a large letter that spills down into the text:
Which unit transfers the data from memory into the general purpose registers?
We can increase the size of text from home ribbon group called:
________ was the first to implement the web.
Binary notation has ________ representation.
Each sound have a ________.
On social media, sometimes, a particular ________ is very popular.
Process states include the value of the program counter as well as the contents of the ________.
Which of the following is not true about pseudo code?
One of the major uses of the ________ operation is for placing 0s in one part of a bit pattern while not disturbing the other part.
Robots can be guided by an
We can apply bullets from home ribbon group called:
Matching geometric characteristics technique of recognizing images is used in:
People are working in sitting position due to computer science and thus have more chance to develop:
A program that is believed to be correct and a program that is correct. The two are
The field of artificial intelligence is being pursued along paths:
The binary search algorithm uses ________.
In the United States the Privacy Act of 1974 was to protect citizens from abusive use of databases:
In MS Word, the option of justify is in group ________.
Turing gave a percentage of a machine that will have a chance to pass Turing test in year.
Which of the following language is used for server side scripting?
How do you initialize an array in C
The first programming language designed for the non-technical users was:
CAN-SPAM Act applies in:
The hackers normally add many ________ to such websites as the information seeker of free music.
Design phase is followed by ________.
Learning procedural knowledge usually improves a process:
Contact Risks include:
The fifth group in the home ribbon is the:
ICQ, AIM and MSN Messenger are the examples of ________ services.
If you are interested to search a query for a specific file type, you can include such ________ in the query.
Ethics and legality are essential in many industries including:
Which of the following is true about problem solving?
Ctrl+z is used for:
________ refers to functional paradigm.
A mark or any other distinctive sign associated with products is called:
In ________ if two modules interact with the same item of data, then modifications made to one module may affect the other.
Main memory is also called ________.
Sometimes when a device is continuously running it damages us by:
________ displays the document as it would appear if printed and is the default view.
If the RGB scheme is used to display an image of size 1024*768 pixels then the image will require ________ of storage.
Dynamic ram - Stores bits as tiny electric Charge.
Correct syntax is
The simplest form of array is the ________ array.
Which of the following is used to store data in computer?
Proofing group is in which ribbon of MS Word?
________ network fails if a single node fails.
0011 + 0010 = ________
The Turing test result of program DOCTOR developed by Joseph Weizenbaum was:
The style group in the home ribbon is the:
An algorithm is ________ and distinct from its representation.
Which of the following is the component name of iterative structures in which initial stage is established.
If the result after comparison of two variables in relational operators is False, then if statement returns value
Approximately how many entries a typical dictionary in a word processor can contain?
Bit is:
The E-mail client sends message to:
________ is the most demanded job in United State.
________ tag is used to write paragraph in HTML document.
Which of the following softwares help us optimizing the various business processes of an organization as a single system instead of a number of loosely coupled stand alone systems?
________ tells how many places are required to move radix point.
Which type of registers is used in program execution?
Editing group have commands:
What will be the output of following pseudo code? def FindFactorial(): fact = 2 i=1; While (i<=7) fact=fact*i; i=i+1; print(fact)
What is the output of the following code? int sum = 14; if (sum < 20) cout < < "Under"; if (sum > 20) cout < < "Over";
Attacks can be made to prevent access to websites by crashing:
Home ribbon contains groups:
When we draw a table in MS word the table have initial column(s):
How many common forms of data mining?
Information available on the web is:
Command that can immediately go to a page or any marked location within your document.
When an application wants to display something on the screen, it notifies the ________.
Phase 1 of problem-solving steps is ________.
In MS Word, we can highlight a text using color from group ________.
Robots identifies veins by:
Requiring certain degree of uniformity of the style, size and orientation of symbols is a(n):
onFocus executes the specified JavaScript code when ________.
This finding maximum number function will keep on going until we reach at the last value [12, 18, 299, 38, 999, 89, 101, 500, 801, 45]
While sending a message it is the ________ layer's responsibility to provide an address that is compatible with the Internet infrastructure.
The term ________ refers to a collection of data that is multidimensional in the sense that internal links between its entries make the information accessible from a variety of perspectives:
An alternative to translators
Binary notation is a way of representing numeric values using only the ________.
In MS Word, we have to write an equation with 2 as a number and 3 as its power. Which option is suitable for this purpose?
What does MIDI stand for?
The instruction code to halt machine cycle is
________ is used to store colorful images.
________ is a tool that is used to organize data, such as a check register.
Hyperlinks have by default color:
A ________ is a collection whose entries have a hierarchical organization similar to that of an organization chart of a typical company.
CD stands for:
Which software testing refers to tests that do not rely on knowledge of the software's interior composition?
Let a list Fred, Alex, Diana, Byron, Carol After sorted first sublist our list would be
Voice over IP has ________ modes.
TLD stands for ________.
Information security Risk include:
Disk operating system is ________ operating system
A device that responds to stimuli from its environment:
Plagiarism is a major problem in:
Find option inludes:
If we are interested to see the map of some location, we can use map operator in the following way:
Any variable in JavaScript can hold any type of value, and the that type can change midway through the program.
FTP ________ could check all incoming files for the presence of known viruses and block all infected files.
A ________ is a storage area that contains such an encoded address.
In MS Word, shortcut key of cut is ________.
Which Excess notation is used to represent 100 as Zero?
Which of these describes stepwise refinement?
In MS Word, Paste option is a part of home ribbon group called ________.
10.011 added to 100.11 produces
Which registers act as temporary holding places for data being manipulated by the CPU?
In binary Addition 1+1 is =
If you want to search for an exact phrase on Google then enclose it in ________.
By using 16 bits in 2's complement notation how many maximum positive number can be represented
The repetitive use of an instruction or sequence of instructions is called ________.
The device that is used to store data is called:
We can use Boolean operators specially to find relevant pages.
The description of the object's properties is called
Sds (Secure Digital Memory Cards) provide up to
Float CGPA=2.5; If (CGPA>=3.0) Cout<<"Give Scholarship"; Else Cout<<"Sorry you do not qualify for the Scholarship"; It will show output
RAM stands for:
Design ribbon can have:
Suppose you are the presenter and you want your audience in touch during presentation then what will you do?
Which of the following is a robot used in medical field :
When you search in the Google by typing Google finds all those pages which contains
Major component of syntactic analysis is:
________ is also consider as character.
Which is the correct format to find out a value from any given list?
The process involved in a ________ is like copying the data rather than moving it.
One bit can contain only ________ value.
Content filtering works by matching ________ of characters:
________ can store unique pattern of 21 bits.
This ________ view of the database is called a database model.
American throws away pieces of paper each year which is equal to:
The storage of a value with a fractional part requires that we store not only the pattern of 0s and 1s representing its binary representation but also the position of the ________.
In MS Word, shortcut key of paste is ________.
The people present arround the e-waste gain:
If a process is allowed to access memory cells outside its allotted area, it can ________ data being used by other process.
User can see directories or files by using ________.
A file's ________ is normally stored as a separate file on the same mass storage device as the ________.
Page group includes options:
In MS Word, shortcut key to select the whole text in a document is ________.
A specific example is the ________ series of standards, which address numerous industrial activities such as design, production, installation and servicing.
If we want to end a page at a specific point and move to the next page we can use:
Computer science has made hacking bank account:
This conceptual view of the database is called a ________ model.
A software license is a ________ between the owner and user of a software product that grants the user certain permissions to use the product without transferring ownership rights to the intellectual property.
A pseudocode must have a consistent, concise notation for representing recurring ________ structures.
There are many types of sensors including:
A significant example of iterative techniques is:
The purpose of system ________ is to describe the software's internal composition so that the software can be maintained later in its life cycle.
We can add charts in MS-word from group:
In context of environment, computer science have impacts:
Process is a ________ activity.
A track that leads to a simulation oriented methodology:
Hexadecimal notation uses a ________ symbol to represent a pattern of four bits.
CPU and RAM are connected with ________ to communicate with each other.
Gaming addiction can cause problems:
Word processor like Microsoft Word is an application that
Easy access to online health centres is because of:
Researchers are trying to develop systems that exhibits intelligent behavior in ________ track.
Table group is a part of ________ ribbon:
In particular, the chart that indicates the entire game is overseen by a function named ________.
Control structure iterates a set of instructions based on the provided condition called
The test that machines will have a chance to pass according to Turing was of:
Act that ranges government restrictions on wire taps to include transmissions of data is:
Software licenses are:
Eye for long amount of time is not meant to look:
What will be the output of following OR expression 1010 OR 1111?
Shortcut for Track Changes in MS word is
With computer science the access to private information has:
A charity organization of London is:
In ________ one user can executing several tasks simultaneously.
how Instruction can be fetched from the main memory to CPU?
The hexadecimal notation for: 111010000101010100010111
Files can be downloaded or uploaded using ________ protocol.
Which of the following statement is true?
Leibniz's machines were achieved by observing the ________ positions.
An object is actually a special case of the more general concept of a ________.
A ________ is a file that is accessed in a special manner from its beginning to its end as though the information in the file were arranged in one long row.
We can customize indentation with:
The traditional development phase of the software life cycle does not include the stage.
Which one can lead user to leave your website?
Electronic Theft include:
To move from one page to other page on the web, a hyperlink is given which is
Average amount of time required for the desired data to rotate around to the read/write head once the head has been positioned over the desired track.
RGB stands for
In CS, we store and link data in an organized way using
Copyright can be applied on:
The node at the top is called the ________ node.
Over which type of bus CPU can fetches its instructions from memory?
The ________ ribbon is the ribbon that helps you to design your slides as per your requirement.
Which of the following is not true about firewall?
IPR stands for:
What is the full form of ASP?
RISC is abbreviation of ________?
What does VoIP stands for ________.
The process of using DNS to perform a translation is called a ________.
One term could mean more than one thing for example word: "Jaguar" is used in two meanings such as:
Software packages that allow users to access hypertext on the Internet are called ________.
According to famous Job market website most of the jobs are available in ________.
Data can come from:
Programming languages are well-designed so that each statement has ________ meaning.
Which of the following is not the advantage of TCP over UDP?
The end of a list is called the ________.
Non terminating expansions may also be a source of ________.
George Boole invented the ________ operations.
In MS-word different type of effects on the text can be applied with:
Page Setup Group is in which ribbon of MS Word?
We need ________ memory to store data permanently.
In ________ digits on right side represent the fractional part.
American use about 680 pounds of paper in a year:
Illustration is a part of ribbon:
If the test for termination of a loop is executed after the execution of body then loop is known as ________.
________ is a system that guards a private network.
How many iterations are required to find 88 in the following array? {5, 6, 77, 88, 99}
In 16 bits ________ can be store only.
The ________ consists of the instructions that tell the control unit to request an activity within the arithmetic/logic unit.
Which of the following modems is slowest?
________ keyword is used in python language to define a word.
A model which represents the shift away from strict adherence to the waterfall model is:
Matching geometric characteristics technique cannot read:
Smallest unit of storage is:
UTF-8 uses 24 to ________ bits.
Microsoft Office includes:
Appearance of each pixel is encoded to form ________.
The amount of paper American use in a year is:
________ is a short version of binary digit, a smallest unit to store data.
Bit-map images compresses using the ________ algorithm.
Suppose we have an array named as "Student". And we want to store 123 at index one (index 1). So which statement is true?
Information that was once buried in arcane records has become accessible because of:
There are ________ Basic Boolean operations are.
Which of the following language is related to functional paradigm.
Trialware Softwares are used for
Font group includes options:
Time required to move the read/write heads from one track to another.
The first group in Design Ribbon of MS PowerPoint is:
TIFF is abbreviation of ________?
Undo is used by:
In main memory each cell has unique ________ address.
If right circular shift is performed on a ________ eight times, same bit pattern is obtained as it is started.
Which one is a unary operator?
________ tag only shows the particular pages related to it.
HDTV is the abbreviation of ________.
Process of understanding what the characteristics of images means refer to:
A data cell of a table contains
Actions according to environment knowledge:
George Boole, who was a pioneer in the field of mathematics called ________.
Which from the following is not a relational operator.
When we apply header it is ahown at:
Most ________ codes use today are Huffman codes.
OR operator is also represented by ________ sign.
In excess notation ________ of bits are used to represent each value.
________ is not only used as a means of retrieving data from mass storage but also as a means of retrieving items from large blocks of data stored in main memory.
________ is used to combine different relations into one relation.
A clear flag state indicates that the resource is ________.
The set of tasks that ensures the software is correctly implements a specific function is known as
________ loop structure referred to as a posttest loop.
Access to the forbidden literature is because of:
Which tag is used to create a list item?
Repeated erasing slowly ________ the silicon dioxide chambers.
Third generation language attributes refer to
Data were stored in memory, programs were part of the ________.
Quantity associated with each position is ________ the quantity associated with the position to its right.
The most popular system for representing integers within today's computers is ________'s complement notation.
Computer hardware is the collection of
________ is a layered structure consisting of a number of homogenous and simple processing elements.
The option of justify is in group:
In MS Word, Justify option is used to give spaces to the paragraph on left and right side ________.
A program DOCTOR developed by Joseph Weizenbaum in the mid-1960s named as:
In some cases, the data collection process is readily apparent, in others it is:
A styles option includes font:
A CPU consists of three parts ________.
Usual way of protecting software is:
A single algorithm can be represented in ________ way(s).
The option of bullets is in group:
Ribbon has types of commands:
Ethical issues are related to:
The binary of 8 in 2's complement notation will be 1000, what will be the binary of -8?
What is the full form of JSP?
The special eye-catching effects between each slide of MS PowerPoint is called:
To identify individual cells in a Computer's main memory, each cell is assigned a unique "name", called its ________.
Some of the elements of a spreadsheet are:
A paradigm works on object called
Attacks that can be made to prevent access to websites:
CPU required at least ________ to fetch the instruction from memory.
________ is exemplified by two transactions, each of which makes a deduction from the same account.
If you search on Google that "how can I hack?", then it would be so ________ for your security.
Generally how many steps a machine cycle have?
ENIAC stands for:
To select shapes that are hidden or behind text we can click:
Which of the following data types are recognized by JavaScript?
Digits on left side of point represent the
The pattern in which computer are connected together to form a network is called :
In binary search, first of all value check at a point
Select a course code for Objective Questions:
Select a course code for Subjective Questions: