Spread the love/50 0 votes, 0 avg 3 ICT MCQS QUIZZES 03-01-23AIOU students ICT QUIZZES 1 / 50 1. Trojan Horse is an example of a) system software b) antivirus c) Virus d) hardware 2 / 50 2. The computers or internet that contain website are called a) clients b) web servers c) central computer d) site computer 3 / 50 3. in spread-sheet,by default rows are labeled by: a) underscore sign b) special symbols c) numbers d) letters 4 / 50 4. The software which is used to control all part of manufacturing process is called : a) MICR b) CAD c) ATM d) CAM 5 / 50 5. Electronic circuits that executes computer instructions is called a) CPU b) Keyboard c) Monitor d) hard disk 6 / 50 6. A communication signal in the form of a continuous wave is called: a) Analog signal b) digital signal c) binary signal d) discontinuous electrical signal 7 / 50 7. Another name of antivirus is: a) worm b) Trojan Horse c) Vaccine d) DES 8 / 50 8. which of following is not a type of network : a) WAN b) NAN c) LAN d) MAN 9 / 50 9. physical path that connects the source and receiver is known as: a) communication channel b) encoder c) decoder d) NIC card 10 / 50 10. Format C is an example of a) Trojan horse b) worm c) Redlof d) bomb 11 / 50 11. Electronic banking is also known as? a) Offline banking b) Interactive banking c) Global banking d) Cyber banking 12 / 50 12. Communication between computer and keyboard involve the transmission: a) Full-Duplex b) Simplex c) Automatic d) Half-Duplex 13 / 50 13. Which devices connects each computer to a network? a) bridge b) gateway c) Network interface Card d) router 14 / 50 14. Which is not an output device a) Scanner b) Monitor c) Printer d) Speaker 15 / 50 15. Digital signals are commonly known as a) Baseband b) band c) narrowband d) broadband 16 / 50 16. Which of the following is an example of system software? a) operating system b) text editor c) MS-word d) spread-sheet 17 / 50 17. Which one of the following is not a cause of virus a) pirated software b) network c) E-mail d) logic bomb 18 / 50 18. Television and radio broadcasts are example of a) full duplex transmission b) simplex transmission c) duplex transmission d) half duplex transmission 19 / 50 19. The register holds the address of the next instruction to be fetched for execution a) Base register b) Instruction register c) Counter register d) Program counter 20 / 50 20. Default name of first sheet in any work book is a) one b) first sheet c) sheet I d) sheet one 21 / 50 21. CPU sends commands signals through a) data bus b) control c) address bus d) expention bus 22 / 50 22. Which of the following is an Antivirus ? a) Logic bomb b) Trojan horse c) NOD32 d) Redlof 23 / 50 23. Trojan Horse is a type of a) horse b) antivirus c) virus d) hacker 24 / 50 24. The process of transferring a file from remote computer to our local computer is a) Uploading b) forward c) Downloading d) copy 25 / 50 25. RAM usually has ——types a) 5 b) 2 c) 3 d) 4 26 / 50 26. which of the following can be used to launch the word art : a) status bar b) drawing tool bar c) ruler d) standard toolbar 27 / 50 27. Which technology is used to read data on cheques a) CAT b) MICR c) OMR d) OCR 28 / 50 28. How many bits are there in 4-bytes? a) 16 b) 8 c) 64 d) 32 29 / 50 29. A work book is a collection of a) functions b) sheets c) formula d) table 30 / 50 30. Dejure means a) By law b) By nature c) By default d) By fact 31 / 50 31. OSI model consists of a) 11 layers b) 9 layers c) 5 layers d) 7 layers 32 / 50 32. The device uses parallel transmission: a) keyboard b) mouse c) Printer d) light pen 33 / 50 33. Formula of instructions that run the computer is a) Software b) Document c) Hardware d) CUPs 34 / 50 34. The process of converting digital signals into analog signals via modem is a) Modulation b) Merging c) Mixing d) Demodulation 35 / 50 35. DSL stands for a) Domain server b) Digital subscribe line c) Direct service Lease d) Distance service 36 / 50 36. We press enter key in Ms word to create a a) paragragh b) Line c) sentence d) document 37 / 50 37. The program that contains the instructions to operate a device is called a) device system b) Device driver c) device operator d) device operating system 38 / 50 38. Soft copy refers to a) presentation b) application c) screen output d) peripheral device 39 / 50 39. The term that refers to all input, output and secondary storage devices is called: a) internal memory b) port c) peripheral d) network point 40 / 50 40. Printed images can be converted into digital form using a) stylus b) Scanner c) mouse d) joy stick 41 / 50 41. A set of instruction that run the computer are a) Hardware b) CUPs c) Software d) Documents 42 / 50 42. The microphone converts the sound into a) Mechanical signals b) Computer file c) Signals d) Electrical signal 43 / 50 43. The output of the compiler is called a) Source code b) The program c) Linked code d) Object code 44 / 50 44. A virus that replicate itself is called a) boot sector virus b) worm c) bug d) Trojan horse 45 / 50 45. Clipboard stores—– in word processing. a) entered text b) repeated text c) copied text d) deleted text 46 / 50 46. the minimum number of primary partitions that can be created on a basic disk are a) 6 b) 2 c) 4 d) 8 47 / 50 47. Which is not a bio metric technique for person identification a) face b) retina c) pam print d) badge 48 / 50 48. Analog signals are measured into a) Herts b) digits c) watts d) volt 49 / 50 49. Which communication medium requires line-of-sight a) microwave b) fiber optic c) twisted pair d) coaxial 50 / 50 50. Software that is available free for a limited period is called a) Net ware b) Free ware c) Share ware d) Group ware Your score is LinkedIn Facebook Twitter 0% Restart quiz Send feedback Post Views: 648 Post navigation Aiou Workshop 5403| Test 1