In the name of ALLAH, the most beneficient, the most merciful

Introduction to Computing (CS101)

Multiple Choice Questions (MCQs)

Objective Questions

  1. Which tag is used to create a list item?

    1. <litem>
    2. <item>
    3. <li>
    4. <list>
  2. Which of the following softwares help us optimizing the various business processes of an organization as a single system instead of a number of loosely coupled stand alone systems?

    1. OS
    2. Vector Graphics
    3. ERP
    4. DSS
  3. A data cell of a table contains

    1. only text
    2. images
    3. tables
    4. all of the given
  4. To move from one page to other page on the web, a hyperlink is given which is

    1. Of blue color
    2. underlined
    3. Of red color
    4. Of blue color and underlined
  5. Trialware Softwares are used for

    1. short period
    2. long period
    3. life time
    4. None of the given
  6. The first programming language designed for the non-technical users was:

    1. Visual Basic
    2. Ada
    3. Basic
    4. Cobol
  7. Which is the correct format to find out a value from any given list?

    1. Search()
    2. ()search
    3. Search<>
    4. To search
  8. Binary notation is a way of representing numeric values using only the ________.

    1. Digits 0 and 1
    2. Digits 0 and 0
    3. Digits 0 and 2
    4. Digits 2 and 1
  9. In excess notation ________ of bits are used to represent each value.

    1. Simple number
    2. Fixed number
    3. Variable number
    4. Constant number
  10. ________ is a short version of binary digit, a smallest unit to store data.

    1. Bit
    2. Byte
    3. Pattern
    4. Mega Byte
  11. ________ loop structure referred to as a posttest loop.

    1. While
    2. Repeat
    3. For
    4. For each
  12. A program that is believed to be correct and a program that is correct. The two are

    1. Same
    2. Not same
    3. Not necessarily same
    4. Totally same
  13. The set of tasks that ensures the software is correctly implements a specific function is known as

    1. Modularity
    2. Verification
    3. Validation
    4. Requirement gathering
  14. You can use ________ search engine for searching images, movies, games or educational content.

    1. Bing
    2. Google
    3. Yahoo
    4. One Search
  15. Which of the following is the component name of iterative structures in which initial stage is established.

    1. Modify
    2. Initialize
    3. Test
    4. Declaration
  16. ________ was the first to implement the web.

    1. Tim Berners-Lee
    2. Steve Jobs
    3. Alan Turing
    4. Charles Babbage
  17. Which of these describes stepwise refinement?

    1. It is a bottom up approach
    2. Greedy Approach
    3. It is a top down approach
    4. Depth First Search
  18. FTP ________ could check all incoming files for the presence of known viruses and block all infected files.

    1. File server
    2. Proxy server
    3. Web server
    4. Shared server
  19. When an application wants to display something on the screen, it notifies the ________.

    1. Window manager
    2. Application
    3. User software
    4. Programming
  20. Process is a ________ activity.

    1. Botting activity
    2. Dynamic activity
    3. Static activity
    4. Shifting activity
  21. 0011 + 0010 = ________

    1. 0000
    2. 0101
    3. 1111
    4. 1010
  22. Which type of registers is used in program execution?

    1. General purpose
    2. CPU register
    3. Special purpose
    4. Memory address register
  23. RISC is abbreviation of ________?

    1. Redundant instruction set computer
    2. Reduced instructive set computer
    3. Reduced instructive set controller
    4. Reduced instruction set computer
  24. ________ is used to store colorful images.

    1. RGB
    2. Pixel
    3. Bitmap
    4. Scaling
  25. Generally how many steps a machine cycle have?

    1. Two
    2. Three
    3. Four
    4. Two or more
  26. Bit is:

    1. Basic unit of storage
    2. Basic program of storage
    3. Secondary unit of storage
    4. Not a unit of storage
  27. ________ can store unique pattern of 21 bits.

    1. ASCII
    2. ANSI
    3. Unicode
    4. UTF-8
  28. TLD stands for ________.

    1. Top Loud Domain
    2. Top Level Domain
    3. Top Lower Domain
    4. Top low domain
  29. TIFF is abbreviation of ________?

    1. Toggle Image File Format
    2. Template Image File Format
    3. Tagged Image File Frame
    4. Tagged Image File Format
  30. Digits on left side of point represent the

    1. Whole number
    2. Factorial
  31. User can see directories or files by using ________.

    1. Microsoft Explorer
    2. Internet Explorer
    3. Window explorer
    4. User interface
  32. The device that is used to store data is called:

    1. Input Device
    2. Output Device
    3. Storage Device
    4. None of the given
  33. What does MIDI stand for?

    1. Magnetic information design interface
    2. Musical information disk interface
    3. Musical instrument digital interface
    4. Music information disk interrogator
  34. What is the full form of JSP?

    1. Java Server Pages
    2. Java Script Pages
    3. Java Semantic Pages
    4. Java Source Pages
  35. If the test for termination of a loop is executed after the execution of body then loop is known as ________.

    1. Post-test loop
    2. Pre-test loop
    3. Termination loop
    4. Final loop
  36. On social media, sometimes, a particular ________ is very popular.

    1. Hash tag
    2. Symbol
    3. Operator
    4. Word
  37. What does VoIP stands for ________.

    1. Virtually Over Internet Protocol
    2. Voice Over Internet Protocol
    3. Voice of Internet Protocol
    4. Voice of International Protocol
  38. Which of the following is not true about firewall?

    1. Firewall protects the entire network from inside intrusion
    2. Firewall protects the entire domain from outside intrusion
    3. Firewall protects the individual computer from outside intrusion
    4. Firewall protects the individual computer from inside intrusion
  39. While sending a message it is the ________ layer's responsibility to provide an address that is compatible with the Internet infrastructure.

    1. Application
    2. Network
    3. Link
    4. Transport
  40. Sds (Secure Digital Memory Cards) provide up to

    1. 10 gbs of storage
    2. 100 gbs of storage
    3. Few gbs of storage
    4. 1000 gbs of storage
  41. The binary search algorithm uses ________.

    1. Linear search
    2. Divide and conquer method
    3. Bubble sort technique
    4. Quick sort technique
  42. In ________ digits on right side represent the fractional part.

    1. Fraction
    2. Decimal
    3. Hexadecimal
    4. Binary
  43. Most ________ codes use today are Huffman codes.

    1. Relative encoding
    2. Frequency dependent
    3. Run-length encoding
    4. Differential encoding
  44. A clear flag state indicates that the resource is ________.

    1. Available
    2. Unavailable
    3. Currently allocated
    4. Ready
  45. Which of the following is used to store data in computer?

    1. Hard Disk
    2. Floppy Disk
    3. Optical Disk
    4. All of the given
  46. If you are interested to search a query for a specific file type, you can include such ________ in the query.

    1. File type
    2. Version
    3. Program type
    4. Typing
  47. OR operator is also represented by ________ sign.

    1. }
    2. |
    3. @
    4. *
  48. The hackers normally add many ________ to such websites as the information seeker of free music.

    1. Viruses
    2. Messages
    3. Song
    4. Alert
  49. In binary search, first of all value check at a point

    1. Most left
    2. Middle
    3. Most right
    4. Beginning
  50. One of the major uses of the ________ operation is for placing 0s in one part of a bit pattern while not disturbing the other part.

    1. AND
    2. OR
    3. XOR
    4. NOR
  51. ________ is the most demanded job in United State.

    1. System Agent
    2. IT Administrator
    3. Software Developer
    4. Graphic Designer
  52. Cloud computing services provide reasonable guarantees of ________ and ________.

    1. Scalability, Reliability
    2. Reliability, Privacy
    3. Privacy, Security
    4. Scalability, Security
  53. What is the full form of ASP?

    1. Active Start Pages
    2. Active Server Pages
    3. Alternate Server Pages
    4. Alternate Start Pages
  54. A single algorithm can be represented in ________ way(s).

    1. Single
    2. Many
    3. Malicious
    4. Modern
  55. An algorithm is ________ and distinct from its representation.

    1. Abstract
    2. Clear
    3. Vision
    4. Visual
  56. What will be the output of following pseudo code?
    def FindFactorial():
    fact = 2
    i=1;
    While (i<=7)
    fact=fact*i;
    i=i+1;
    print(fact)

    1. 5040
    2. 10080
    3. 120
    4. 980
  57. By using 16 bits in 2's complement notation how many maximum positive number can be represented

    1. 32768
    2. 32678
    3. 32867
    4. 32868
  58. In ________ one user can executing several tasks simultaneously.

    1. Multiple program
    2. Multilevel
    3. Multitasking
    4. Simple tasking
  59. The hexadecimal notation for: 111010000101010100010111

    1. Is E85517
    2. Is E855
    3. Is F985517
    4. Is E5517
  60. In main memory each cell has unique ________ address.

    1. Byte
    2. Bits
    3. RAM
    4. Cell
  61. Repeated erasing slowly ________ the silicon dioxide chambers.

    1. Damages
    2. Enhance
    3. Increase
    4. Decrease
  62. In binary Notation 11111111 is

    1. 128
    2. 255
    3. 567
    4. 127
  63. What will be the output of following OR expression 1010 OR 1111?

    1. 1111
    2. 0101
    3. 0000
    4. 1010
  64. Data were stored in memory, programs were part of the ________.

    1. CPU
    2. Cable
    3. BUS
    4. CACHE
  65. UTF-8 uses 24 to ________ bits.

    1. 32
    2. 30
    3. 21
    4. 90
  66. To identify individual cells in a Computer's main memory, each cell is assigned a unique "name", called its ________.

    1. Path
    2. Address
    3. Place holder
    4. Location
  67. The repetitive use of an instruction or sequence of instructions is called ________.

    1. Loop
    2. Statement
    3. Condition
    4. Pseudocode
  68. This finding maximum number function will keep on going until we reach at the last value
    [12, 18, 299, 38, 999, 89, 101, 500, 801, 45]

    1. 45 each time
    2. 801 each time
    3. 12 each time
    4. 38 each time
  69. Dynamic ram - Stores bits as tiny electric Charge.

    1. Refreshes no times a second
    2. Refreshes many times a second
    3. Refreshes one times a second
    4. Refreshes two times a second
  70. If you want to search for an exact phrase on Google then enclose it in ________.

    1. @
    2. " "
    3. *
    4. #
  71. A pseudocode must have a consistent, concise notation for representing recurring ________ structures.

    1. Non-Semantic
    2. Semantic
    3. Markup
    4. Text
  72. If a process is allowed to access memory cells outside its allotted area, it can ________ data being used by other process.

    1. Alter and store
    2. Access and alter
    3. Read and write
    4. Read and alter
  73. The Binary Search Algorithm, what will be mid value in second level of recursion in the following array.
    {45, 77, 89, 90, 94, 99, 100} and key = 99

    1. 89
    2. 90
    3. 94
    4. 99
  74. Robots can be guided by an

    1. An external control device or the control may be embedded within
    2. An internal control device or the control may be embedded within
    3. Remote
    4. Application
  75. Which of the following language is used for server side scripting?

    1. HTML
    2. JavaScript
    3. CSS
    4. PHP
  76. Process states include the value of the program counter as well as the contents of the ________.

    1. Related memory cells
    2. Registers and related memory cells
    3. Registers
    4. Registers and cache memory cells
  77. How many iterations are required to find 88 in the following array?
    {5, 6, 77, 88, 99}

    1. 1
    2. 2
    3. 3
    4. 4
  78. 10.011 added to 100.11 produces

    1. 111.088
    2. 111.007
    3. 111.001
    4. 111.099
  79. The instruction code to halt machine cycle is

    1. C400
    2. C100
    3. C000
    4. 35CE0
  80. Which Excess notation is used to represent 100 as Zero?

    1. Excess 4
    2. Excess 8
    3. Excess 2
    4. Excess 16
  81. ________ tag is used to write paragraph in HTML document.

    1. <p>
    2. <pr>
    3. <pa>
    4. <pg>
  82. Let a list Fred, Alex, Diana, Byron, Carol
    After sorted first sublist our list would be

    1. Alex, Fred, Diana, Byron, Carol
    2. Fred, Alex, Diana, Byron, Carol
    3. Alex, Diana, Fred, Byron, Carol
    4. Alex, Fred, Byron, Diana, Carol
  83. Which of the following is not true about pseudo code?

    1. Pseudo code is an unambiguous representation
    2. Pseudo code is an informal representation
    3. Pseudo code is an algorithms representation
    4. Pseudo code is an ambiguous representation
  84. Which of the following statement is true?

    1. Repeater is more complex than a bridge.
    2. Bridge is more complex than a repeater.
    3. Bridge and repeater both are complex.
    4. Bridge and repeater both are not complex.
  85. The storage of a value with a fractional part requires that we store not only the pattern of 0s and 1s representing its binary representation but also the position of the ________.

    1. Decimal point
    2. Radix point
    3. Number
    4. Factorial
  86. Software packages that allow users to access hypertext on the Internet are called ________.

    1. Hypersofts
    2. Browsers
    3. Linkers
    4. Routers
  87. ________ is also consider as character.

    1. Numbers
    2. Small caps
    3. Large caps
    4. Space
  88. Word processor like Microsoft Word is an application that

    1. Build editable word documents.
    2. Build editable Program.
    3. Build editable Questions.
    4. Build editable excel files.
  89. ________ keyword is used in python language to define a word.

    1. Define
    2. Def
    3. Dfi
    4. Dfn
  90. Appearance of each pixel is encoded to form ________.

    1. Pixel
    2. Geometric Structures
    3. Bitmap
    4. Scaling
  91. Average amount of time required for the desired data to rotate around to the read/write head once the head has been positioned over the desired track.

    1. Random TIME
    2. Access time
    3. Seek time
    4. Rotational delay
  92. Which of the following is true about problem solving?

    1. Ability to solve problems remains more of an artistic skill to be developed
    2. Ability to solve problems remains more of a non-artistic to be developed
    3. Ability to solve problems remains more of a rational skill to be developed
    4. Ability to solve problems remains more of a non-rational skill to be developed
  93. When you search in the Google by typing Google finds all those pages which contains

    1. All the terms given in the query
    2. None of the terms given in the query
    3. Some of the terms given in the query
    4. Random
  94. Non terminating expansions may also be a source of ________.

    1. Logical error
    2. Truncation errors
    3. Overflow
    4. Syntax error
  95. Which of the following is not the advantage of TCP over UDP?

    1. Congestion control
    2. Flow control
    3. Connection establishment
    4. Efficiency
  96. Phase 1 of problem-solving steps is ________.

    1. Formulate the algorithm and and represent it as a program
    2. Evaluate the program for accuracy and for its potential as a tool for solving other problems
    3. Understand the problem
    4. Get an idea of how an algorithmic function might solve the problem
  97. Which unit transfers the data from memory into the general purpose registers?

    1. Control unit
    2. Arithmetic unit
    3. Logical unit
    4. Shift
  98. Time required to move the read/write heads from one track to another.

    1. Random time
    2. Access time
    3. Seek time
    4. Rational time
  99. RAM stands for:

    1. Random access memory
    2. Random archive memory
    3. Random memor
    4. Random accountable memory
  100. If we are interested to see the map of some location, we can use map operator in the following way:

    1. Location: map
    2. Map: Location
    3. Mph: map
    4. Locations
  101. If right circular shift is performed on a ________ eight times, same bit pattern is obtained as it is started.

    1. Bite size byte pattern
    2. Byte pattern
    3. Byte size bit pattern
    4. Bit pattern
  102. Quantity associated with each position is ________ the quantity associated with the position to its right.

    1. Twice
    2. Single time
    3. Thrice
    4. Forth
  103. According to famous Job market website most of the jobs are available in ________.

    1. Economics
    2. Computer Science
    3. Mathematics
    4. Biology
  104. We can use Boolean operators specially to find relevant pages.

    1. "is ""am"
    2. "And" "Or"
    3. Is "it"
    4. If else
  105. Main memory is also called ________.

    1. ROM
    2. RAM
    3. Bits
    4. Cache
  106. In binary Addition 1+1 is =

    1. 10
    2. 2
    3. 5
    4. 11
  107. Hexadecimal notation uses a ________ symbol to represent a pattern of four bits.

    1. Quad
    2. SINGLE
    3. Double
    4. Triple
  108. One term could mean more than one thing for example word: "Jaguar" is used in two meanings such as:

    1. Car and helicopter
    2. Car and bus
    3. Animal and car
    4. Car and Cat
  109. ENIAC stands for:

    1. Electronic numerical integrator and calculator
    2. Electronic numbers and integrator and calculator
    3. Electronic numerical integer and calculations
    4. Electronic numbers integer and calculations
  110. HDTV is the abbreviation of ________.

    1. High demanded television
    2. High defined television
    3. High definition television
    4. High demand television videos
  111. The most popular system for representing integers within today's computers is ________'s complement notation.

    1. Three
    2. Two
    3. 0
    4. One
  112. Each sound have a ________.

    1. Pixel
    2. Geometric Structures
    3. Wave
    4. Scaling
  113. Binary notation has ________ representation.

    1. One
    2. Two
    3. Three
    4. Four
  114. In CS, we store and link data in an organized way using

    1. SDLC
    2. MSDB
    3. DMBS
    4. DBMS
  115. The binary of 8 in 2's complement notation will be 1000, what will be the binary of -8?

    1. 1001
    2. 0000
    3. 1000
    4. 0100
  116. Approximately how many entries a typical dictionary in a word processor can contain?

    1. 25,000 entries
    2. 250,000 entries
    3. 25,000 entries
    4. More than 250,000 entries
  117. Computer hardware is the collection of

    1. Partials
    2. Physical parts of a computer system
    3. Software
    4. Program
  118. The ________ consists of the instructions that tell the control unit to request an activity within the arithmetic/logic unit.

    1. Arithmetic/logic group
    2. Control unit group
    3. RISC group
    4. RISC/CISC group
  119. CPU required at least ________ to fetch the instruction from memory.

    1. Two nanosecond
    2. Nanosecond
    3. Three nanosecond
    4. One billion second
  120. One bit can contain only ________ value.

    1. Zero
    2. One
    3. Two
    4. Threw
  121. RGB stands for

    1. Roman, green, blue
    2. Red, Green, Blue
    3. Red, blue, yellow
    4. Red, white, black
  122. If you search on Google that "how can I hack?", then it would be so ________ for your security.

    1. Difficult
    2. Dangerous
    3. Insecure
    4. Grateful
  123. CPU and RAM are connected with ________ to communicate with each other.

    1. Controller
    2. BUS
    3. Cables
    4. Ports
  124. ________ tells how many places are required to move radix point.

    1. Exponent field
    2. Sign bit
    3. Significant bit
    4. Mantissa field
  125. how Instruction can be fetched from the main memory to CPU?

    1. By using Controller
    2. By using Modem
    3. By using Bus
    4. By using Special wiring
  126. There are ________ Basic Boolean operations are.

    1. 1
    2. 2
    3. 3
    4. 4
  127. We need ________ memory to store data permanently.

    1. Volatile
    2. RAM
    3. Non-Volatile
    4. Address
  128. In 16 bits ________ can be store only.

    1. 100
    2. 99
    3. 98
    4. 97
  129. The process involved in a ________ is like copying the data rather than moving it.

    1. Transfer instruction
    2. Load instruction
    3. Move instruction
    4. Shifting data
  130. George Boole, who was a pioneer in the field of mathematics called ________.

    1. Subtraction
    2. Algebra
    3. Logic
    4. Progression
  131. A CPU consists of three parts ________.

    1. ALU/ control unit, register
    2. ALU/MJPEJ/CU
    3. CIRCUIT /Mp3 /CU
    4. Ram/cache/ dram
  132. George Boole invented the ________ operations.

    1. Bit
    2. Logical
    3. Byte
    4. Boolean
  133. Over which type of bus CPU can fetches its instructions from memory?

    1. Memory bus
    2. System bus
    3. Address bus
    4. Central bus
  134. ________ tag only shows the particular pages related to it.

    1. @
    2. *
    3. " "
    4. #
  135. Which registers act as temporary holding places for data being manipulated by the CPU?

    1. Memory address register
    2. Special purpose
    3. General purpose
    4. Memory buffer
  136. Leibniz's machines were achieved by observing the ________ positions.

    1. Third gear
    2. First gear
    3. Final gear
    4. Second gear
  137. Information available on the web is:

    1. Mostly Free of any cost
    2. Costly
    3. Totally free
    4. Not accessible at all
  138. CD stands for:

    1. Computer Disc
    2. Computer Data
    3. Compact Disc
    4. Compact Data
  139. Smallest unit of storage is:

    1. Bit
    2. Byte
    3. Mega Byte
    4. None of the given
  140. Disk operating system is ________ operating system

    1. Menu driven
    2. Graphical user interface
    3. Command driven
    4. None of the given