Express Pakistan
provide latest news and update
ICT MCQS QUIZZES 03-01-23
AIOU students ICT QUIZZES
1 / 50
1. Which is not a bio metric technique for person identification
2 / 50
2. The actual working area in micro soft excel is
3 / 50
3. Trojan Horse is a type of
4 / 50
4. CBT software is used in
5 / 50
5. How many characters ASCII-7bit code represents?
6 / 50
6. The process of producing multiple copies of a document is called
7 / 50
7. World wide web was established in:
8 / 50
8. XGA resolution is:
9 / 50
9. Testing all program components together in SDLC is called
10 / 50
10. Transferring information from computer to internet is called
11 / 50
11. A virus that replicate itself is called
12 / 50
12. how many types of language translator are there?
13 / 50
13. Temporary storage area within CPU is called:
14 / 50
14. Analog signals are measured into
15 / 50
15. Formula of instructions that run the computer is
16 / 50
16. Printed images can be converted into digital form using
17 / 50
17. The devices that are automatically detected by windows are called
18 / 50
18. The program that contain instruction to operate a device is called :
19 / 50
19. Each computer on a network is called
20 / 50
20. Terminators are used in——topology
21 / 50
21. In MS-Excel, formula begins with:
22 / 50
22. DSL stands for
23 / 50
23. layer that is responsible for transferring frames in OSI model is
24 / 50
24. We press enter key in Ms word to create a
25 / 50
25. The process of converting digital signals into analog signals via modem is
26 / 50
26. The term that refers to all input, output and secondary storage devices is called:
27 / 50
27. Default name of first sheet in any work book is
28 / 50
28. A small image that represents a program folder or file is called
29 / 50
29. The computers or internet that contain website are called
30 / 50
30. How many characters ASCII-7bit code represents?
31 / 50
31. Which is a communication device
32 / 50
32. A set of instruction that run the computer are
33 / 50
33. Which of the following is an example of system software?
34 / 50
34. one or more network connected to hub is called;
35 / 50
35. Another word for pointer is:
36 / 50
36. in spread-sheet,by default rows are labeled by:
37 / 50
37. Which of the following is not an example of system software
38 / 50
38. The register holds the address of the next instruction to be fetched for execution
39 / 50
39. How many types of addressing scheme are there :
40 / 50
40. GUI stands for?
41 / 50
41. The output of the compiler is called
42 / 50
42. Which one of the following is not a cause of virus
43 / 50
43. Trojan Horse is an example of
44 / 50
44. which of the following techniques uses modulation?
45 / 50
45. one or more computer connected to a hub is called:
46 / 50
46. Which devices connects each computer to a network?
47 / 50
47. Which one is a faster memory?
48 / 50
48. Most applications of robotics are in which area
49 / 50
49. common font size used in business document is:
50 / 50
50. RAM usually has ——types
Your score is
Restart quiz