Computer (Shaheen Acadmy)
Computer (Shaheen Acadmy)
Computer (Shaheen Acadmy)
A. Floppy Disk
B. Hard Disk
C. RAM
D. CDROM
A. Floppy Disk
B. Tape
C. Network Drive.
D. All of the above
Answer: D
Answer: A
4. Which of the following are the cheapest memory devices in terms of Cost/Bit?
A. Semiconductor memories
B. Magnetic Disks
C. Compact Disks
D. Magnetic Tapes
Answer: C
5. Which of the following are the best units of data on an external storage device?
A. Bits
B. Bytes
C. Hertz
D. Clock cycles
Answer: B
A. Semiconductor Memories
B. Magnetic Disks
C. Magnetic Tapes
D. Compact Disks
Answer: A
A. Floppy Disk
B. CDROM
C. Hard Disk
D. None of these
Answer: B
A. Lotus
B. Pascal
C. MS-Excel
D. Netscape
Answer: B
9. What is a compiler?
B. A compiler converts the whole of a higher level program code into machine code in one step
Answer: B
Answer: B
11. When a key is pressed on the keyboard, which standard is used for converting the keystroke
into the corresponding bits?
A. ANSI
B. ASCII
C. EBCDIC
D. ISO
Answer: A
D. None of these
Answer: C
14. Which device is used as the standard pointing device in a Graphical User Environment?
A. Keyboard
B. Mouse
C. Joystick
D. Track ball
Answer: B
A. 2
B. 10
C. 16
D. 32
Answer: A
A. Binary B. Decimal
C. Hexadecimal D. Octal
Answer: A
A. Scanner B. Printer
Answer: D
18. Which of the following devices have a limitation that we can only store information to it but cannot
erase or modify it?
A. Floppy Disk
B. Hard Disk
C. Tape Drive
D. CDROM
Answer: D
A. Mechanical B. Electrical
Answer: D
20. Which of the following storage devices can store maximum amount of data?
A. Floppy Disk
B. Hard Disk
C. Compact Disk
D. Magneto Optic Disk
Answer: B
21. Which of the following is the largest manufacturer of Hard Disk Drives?
A. IBM
B. Seagate
C. Microsoft
D. 3M
Answer: B
22. The programs which are as permanent as hardware and stored in ROM is known as
A. Hardware
B. Software
C. Firmware
D. ROM ware
Answer: C
Answer: D
Answer: C
25. The earliest calculating devices are
A. Abacus B. Clock
Answer: A
A. Powers B. Pascal
Answer: D
A. 4 bits B. 8 bits
C. 16 bits D. 64 bits
Answer: B
Answer: B
Answer: A
A. Joystick B. Modem
Answer: B
Answer: B
A. 1416 B. 1614
C. 1641 D. 1804
Answer: B
C. 680 MB D. 680 GB
Answer: C
34. ATM stands for?
Answer:B
Answer: C
C. IC D. Bio Chips
Answer: C
Answer: A
38. What do you call a single point on a computer screen
A. Cell B. Element
C. Pixel D. Bit
Answer: C
Answer: A
40. Through which device the main components of the computer communicate with each other?
C. Monitor D. Memory
Answer: B
Answer: D
42. Which one is the Low Level Language?
C. Java D. C++
Answer: A
A. ROM B. BIOS
C. PROM D. RAM
Answer: D
Answer: D
C. NetMeeting D. FrontPage
Answer: B
C. Both A and B
Answer: C
47. _______ is used for scanning the pictures and putting them in digitized form in the computer.
A. CD-ROM B. Plotter
C. Bar-coder D. Scanner
Answer: D
Answer: C
A. 1 KB = 8 bytes B. 1 MB = 8 KB
Answer: C
A. CPU B. RAM
C. DCU D. VDU
Answer: A
Answer: A
A. 360KB B. 720KB
C. 1.2MB D. 1.44MB
Answer: D
C. Mini D. Micro
Answer: D
A. Laser B. Inkjet
C. Impact D. Drum
Answer: C
55. What is the full form of RAM?
Answer: B –
MS Office MCQs
Types of software programs usually includes
1. application programs
2. replicate programs
3. mathematical operations
4. both a and b
ANS D
MCQ: Set of programs with full set of documentation is considered as
1. database packages
2. file package
3. software
4. software packages
ANS D
MCQ: Specialized program that allows users to utilize in specific application is classified
as
1. relative programs
2. application programs
3. relative programs
4. replicate programs
ANS B
MCQ: Programs used to control system performance are classified as
1. experimental programs
2. system programs
3. specialized program
4. organized programs
ANS B
MCQ: System programs examples includes
1. operating system of computer
2. trace program
3. compiler
4. all of above
ANS D
Program which is readily available to computer users as part of software package is
classified as
1. library program
2. program library
3. software library
4. directory library
ANS A
MCQ: Process to exit from computer by giving correct instructions such as ‘EXIT’ is
classified as
1. log in
2. process out
3. process in
4. log out
ANS D
MCQ: Set of software authorized to specific users is considered as
1. software library
2. program library
3. directory library
4. library package
ANS B
MCQ: Function of running and loading programs and usage of peripherals is function of
1. operating system
2. enquiry system
3. dump programs
4. function system
ANS A
MCQ: If program can cope data errors, program is called
1. robust
2. reliable
3. unreliable
4. stable functioning
ANS A
MCQ: Commercial organization specializing preparation and design of software
package is classified as
1. library house
2. software houses
3. program houses
4. directory houses
ANS B
MCQ: Programs are fully tested and documented properly before including it into
1. library
2. directory
3. package
4. database
ANS A
MCQ: Program which is used to produce pictures and text and to organize it in
newspaper is classified as
1. text publishing package
2. desktop publishing package
3. experimental package
4. organizing publishing package
ANS B
MCQ: Several programs run at same time and storage is shared especially in
1. microcomputers
2. mainframe computers
3. enquiry computers
4. dump computers
ANS B
MCQ: Program which exactly perform operations that manual says is classified as
1. unreliable
2. stable functioning
3. robust
4. reliable
ANS D
Special set of characters that computer associates with specific user identification is
classified as
1. password
2. identity code
3. enquiry code
4. dump code
ANS A
MCQ: System program which performs one simple task is classified as
1. utility programs
2. function program
3. compiling program
4. enquiry program
ANS A
MCQ: Record of programs recorded as they run is classified as
1. producing a log
2. producing enquiry
3. producing dump programs
1. producing system functions
ANS A
MCQ: Program provides users with grid of rows and columns is classified as
1. spreadsheet
2. column grid
3. rows grid
4. reliability grid
ANS A
MCQ: Program packages that allows program users to design data files and select
information are called
1. file management
2. file enquiry
3. database package
4. all of above
ANS D
Collection of useful working routines and programs and is only available to users with
authorization is classified as
1. directory library
2. library package
3. program library
4. software library
ANS C
MCQ: Programs written by programmer to help computer users are considered as
1. software
2. software packages
3. database packages
4. file package
ANS A
MCQ: Set of software is held central by
1. computer installation
2. computer software
3. library files
4. directory files
ANS A
MCQ: Program used to transfer contents onto a printer from VDU screen is classified as
1. utility dump
2. screen dump
3. function dump
4. enquiry dump
ANS B
MCQ: In microcomputers, operating system is usually stored on
1. random access memory
2. read only memory
3. permanent memory
4. temporary memory
ANS B
System software’s are supplied by the
1. text slots
2. payroll programmers
3. manufacturer
4. enquiry programmers
ANS C
MCQ: Slots in spreadsheet that can be copied to other slots are classified as
1. relative slots
2. replicate slots
3. complicate slots
4. column slots
ANS B
MCQ: Process of gaining access to a computer by giving correct user identification is
classified as
1. process in
2. log out
3. log in
4. process out
ANS C
MCQ: Typing of words on keyboard to drive program with help of
1. menu
2. command
3. function words
4. editor
ANS B
MCQ: Library program may comes from
1. computer manufacturer
2. within computer installation
3. software houses
4. all of above
ANS D
Program produces experimental results for biologist research is classified as
1. specialized program
2. systematic programs
3. organized programs
4. experimental programs
ANS A
MCQ: Number and name system uses to identify user is called
1. user identification
2. operating identification
3. system identification
4. temporary identification
ANS A
MCQ: Slots in spreadsheet whose formula is not exactly copied are classified as
1. complicate slots
2. column slots
3. relative slots
4. replicate slots
ANS C
MCQ: Application program example includes
1. payroll program
2. desktop program
3. publishing program
4. editing program
ANS A
MCQ: Process of checking software suitability for any particular application is classified
as
1. evaluation of software
2. checking of software
3. directory of software
4. database of software
ANS A
Software which controls general operations of computer system is classified as
1. dump programs
2. function system
3. operating system
4. enquiry system
ANS C
MCQ: Application program used with all documentation is considered
1. applications package
2. replicate programs
3. application programs
4. systems programs
ANS A
1. System software is classified into
1. Operating system
2. Language processor
3. Both (a) and (b)
4. None of these
ANS C
2. Which one of the following is not a type of a language processor?
1. Compiler
2. Interpreter
3. Application software
4. Assembler
ANS C
3. Which one of the following utilities is used to store duplicate or multiple copies of
important files?
1. Antivirus
2. Disk defragmenter
3. Compression utility
4. Backup utility
ANS D
4. Which one of the following software is developed according to the user
requirement?
1. Operating system
2. System software
3. Customized software
4. Language processor
ANS C
5. Which of the following language uses only numbers such as 0s and 1s?
1. Compiler
2. Mnemonics
3. Interpreter
4. All of these
ANS B
1. The central processing unit (CPU) is often referred to as the “__________”
of a computer.
Answer: brain
2. In programming, a ____________ is a named storage location that can
hold data.
Answer: variable
3. HTML stands for HyperText Markup ____________.
Answer: Language
4. The process of finding and fixing errors in a program is known as
____________.
Answer: debugging
5. The ____________ programming paradigm emphasizes the use of
objects and classes.
Answer: object-oriented
6. RAM, or Random Access Memory, is a type of ____________ memory in
a computer.
Answer: volatile
7. A network protocol used for secure communication over a computer
network is ____________.
Answer: HTTPS
8. The acronym SQL stands for Structured Query ____________.
Answer: Language
9. The process of converting a high-level programming language into
machine code is called ____________.
Answer: compilation
10. JavaScript is commonly used for adding ____________ functionality to
web pages.
Answer: interactive
11. An algorithm is a step-by-step procedure or ____________ for solving a
problem.
Answer: formula
12. IP address is short for Internet ____________ address.
Answer: Protocol
13. The process of keeping multiple copies of data synchronized is known as
data ____________.
Answer: replication
14. A loop that continues to execute as long as a specified condition is true is
called a ____________ loop.
Answer: while
15. The file extension for a Python source code file is ____________.
Answer: .py
16. HTTP, the protocol used for transferring hypertext, stands for HyperText
Transfer ____________.
Answer: Protocol
17. The process of hiding the implementation details of an object is known as
____________.
Answer: encapsulation
18. A programming language known for its readability and simplicity is
____________.
Answer: Python
19. The binary system uses ____________ digits, 0 and 1, to represent
information.
Answer: two
20. HTML tags are enclosed in ____________ brackets.
Answer: angle
21. The process of converting a source code file into machine code at runtime
is called ____________ compilation.
Answer: just-in-time
22. In object-oriented programming, a blueprint for creating objects is called a
____________.
Answer: class
23. A device that connects multiple computer networks together is called a
____________.
Answer: router
24. The process of converting a string into its equivalent numeric value is
called ____________.
Answer: parsing
25. CSS stands for Cascading Style ____________.
Answer: Sheet
26. An if-else statement allows a program to make ____________ decisions based
on conditions.
Answer: conditional
27. The primary function of an operating system is to manage ____________
resources.
Answer: hardware
28. The process of transforming data into a secure format to prevent unauthorized
access is called ____________.
Answer: encryption
29. In database management, a collection of related information is called a
____________.
Answer: database
30. The process of verifying the identity of a user or system is known as
____________.
Answer: authentication
31. In networking, IP stands for Internet ____________.
Answer: Protocol
32. An array is a data structure that stores elements of the same ____________.
Answer: type
33. The acronym URL stands for Uniform Resource ____________.
Answer: Locator
34. A programming language commonly used for data analysis and machine learning
is ____________.
Answer: R
35. The ____________ is responsible for executing instructions stored in a
computer’s memory.
Answer: CPU
36. CSS3 introduces ____________ animations, allowing for smoother visual effects
on web pages.
Answer: transition
37. In cybersecurity, a program designed to detect and prevent unauthorized access
is called an ____________.
Answer: firewall
38. The process of converting a domain name into an IP address is known as
____________ resolution.
Answer: DNS
39. Python is known for its emphasis on code ____________, making it easy to read
and write.
Answer: readability
40. A programming language developed by Microsoft often used for web
development is ____________.
Answer: C#
41. The process of arranging data in a specific order, such as ascending or
descending, is called ____________.
Answer: sorting
42. The acronym API stands for Application Programming ____________.
Answer: Interface
43. A programming language commonly used for building dynamic and interactive
web pages is ____________.
Answer: JavaScript
44. In computer graphics, pixels are the smallest ____________ elements on a
display.
Answer: graphical
45. A type of cyber attack where malicious software encrypts a user’s data and
demands a ransom is called ____________.
Answer: ransomware
46. A programming language known for its versatility and use in system
programming is ____________.
Answer: C
47. The process of copying files from a local computer to a remote server is known
as ____________.
Answer: uploading
48. The concept of allowing different types of data to be used interchangeably is
known as ____________.
Answer: polymorphism
49. A data structure that follows the Last In, First Out (LIFO) principle is a
____________.
Answer: stack
50. The practice of concealing the complexity of a system by dividing it into smaller,
more manageable components is called ____________.
Answer: abstraction