Spread the love/50 0 votes, 0 avg 3 ICT MCQS QUIZZES 03-01-23AIOU students ICT QUIZZES 1 / 50 1. Which one of the following is not a cause of virus a) network b) logic bomb c) pirated software d) E-mail 2 / 50 2. How many characters ASCII-7bit code represents? a) 1024 b) 128 c) 512 d) 256 3 / 50 3. BIT stands for: a) binary tree b) binary interval c) binary digit d) binary integer 4 / 50 4. DSL stands for a) Direct service Lease b) Domain server c) Distance service d) Digital subscribe line 5 / 50 5. layer that is responsible for transferring frames in OSI model is a) application layer b) session layer c) data link layer d) presentation layer 6 / 50 6. Soft copy refers to a) application b) peripheral device c) screen output d) presentation 7 / 50 7. physical path that connects the source and receiver is known as: a) encoder b) NIC card c) communication channel d) decoder 8 / 50 8. which of the following can be used to launch the word art : a) status bar b) ruler c) standard toolbar d) drawing tool bar 9 / 50 9. The software which is used to control all part of manufacturing process is called : a) MICR b) CAM c) CAD d) ATM 10 / 50 10. Default name of first sheet in any work book is a) sheet one b) sheet I c) one d) first sheet 11 / 50 11. common font size used in business document is: a) 16-points b) 10-points c) 14-points d) 12-points 12 / 50 12. OSI model consists of a) 9 layers b) 11 layers c) 7 layers d) 5 layers 13 / 50 13. Which of the following contains the administrative tools in operating system : a) internet explorer b) control panel c) my document folder d) recycle bin 14 / 50 14. The communicational channels can be divided into a) 5 types b) 4 types c) 3 types d) two types 15 / 50 15. The number of argument in SQRT() function in MS-excel is are a) two b) equal to column number c) one d) equal to range 16 / 50 16. The microphone converts the sound into a) Computer file b) Mechanical signals c) Electrical signal d) Software 17 / 50 17. A device that connect multiple network using similar or different protocol is a : a) bridge b) gateway c) router d) repeater 18 / 50 18. Which of the following technique is used for modulation a) base band b) bit band c) broad band d) band with 19 / 50 19. Which is not a bio metric technique for person identification a) badge b) pam print c) retina d) face 20 / 50 20. Most applications of robotics are in which area a) manufacturing b) farming c) technique d) cooking 21 / 50 21. Which components is used to connect different parts of the computer together? a) control unit b) buses c) main memory d) I/O unit 22 / 50 22. Which of the following is not an example of system software a) Microsoft office b) utility program c) operating system d) drives 23 / 50 23. A virus that replicate itself is called a) Trojan horse b) bug c) worm d) boot sector virus 24 / 50 24. Which of the following keyboard shortcuts is used to change the case: a) Ctrl+F2 b) shift+F3 c) Ctrl+F3 d) alt+F3 25 / 50 25. The operating system based on NT technology is: a) Windows 2000 b) Windows 95 c) windows 98 d) windows 97 26 / 50 26. Making illegal copies of copyrighted software is called a) software browsing b) software hacking c) software distribution d) software piracy 27 / 50 27. CPU sends commands signals through a) address bus b) expention bus c) data bus d) control 28 / 50 28. Testing all program components together in SDLC is called a) composite testing b) volume testing c) system testing d) group testing 29 / 50 29. Another name of antivirus is: a) DES b) Trojan Horse c) Vaccine d) worm 30 / 50 30. which of following is not a type of network : a) NAN b) WAN c) LAN d) MAN 31 / 50 31. GUI stands for? a) Graphical usage interface b) Graphical user interface c) General user interface d) Graphical user icons 32 / 50 32. The program that contains the instructions to operate a device is called a) device system b) device operator c) Device driver d) device operating system 33 / 50 33. Which function key is used for checking spelling and grammar in MS word a) F4 b) F7 c) F1 d) F2 34 / 50 34. The component of CPU which responsible for interacting with RAM is a) hard disk b) ALU c) register d) Control unit 35 / 50 35. Digital signals are commonly known as a) narrowband b) Baseband c) band d) broadband 36 / 50 36. How many bits are there in 4-bytes? a) 8 b) 32 c) 64 d) 16 37 / 50 37. A person who gains illegal access to a computer system is called a) network b) hacker c) computer operator d) computer consultant 38 / 50 38. Which communication medium requires line-of-sight a) twisted pair b) fiber optic c) coaxial d) microwave 39 / 50 39. one or more network connected to hub is called; a) ring network b) bus network c) mesh network d) star network 40 / 50 40. The devices that are automatically detected by windows are called a) serial devices b) Automatic devices c) installed devices d) plug and play devices 41 / 50 41. Formula of instructions that run the computer is a) Software b) Document c) CUPs d) Hardware 42 / 50 42. We press enter key in Ms word to create a a) sentence b) paragragh c) document d) Line 43 / 50 43. in spread-sheet,by default rows are labeled by: a) numbers b) letters c) special symbols d) underscore sign 44 / 50 44. The top most layer of OSI model is a) transport b) Application c) presentation d) session 45 / 50 45. physical path that connects the source and receiver is known as; a) communication channel b) NIC card c) decoder d) encoder 46 / 50 46. Which of the following is an example of system software? a) text editor b) operating system c) MS-word d) spread-sheet 47 / 50 47. The term that refers to all input, output and secondary storage devices is called: a) network point b) internal memory c) port d) peripheral 48 / 50 48. The extension of Ms-Word is : a) .bmp b) .wrd c) .doc d) .mp3 49 / 50 49. Printed images can be converted into digital form using a) mouse b) joy stick c) Scanner d) stylus 50 / 50 50. World wide web was established in: a) 1980 b) 1985 c) 1989 d) 1992 Your score is LinkedIn Facebook Twitter 0% Restart quiz Send feedback Post Views: 658 Post navigation Aiou Workshop 5403| Test 1