/50 0 votes, 0 avg 2 ICT MCQS QUIZZES 03-01-23AIOU students ICT QUIZZES 1 / 50 1. Temporary storage area within CPU is called: a) registers b) hard disk c) ROM d) RAM 2 / 50 2. How many characters ASCII-7bit code represents? a) 1024 b) 512 c) 128 d) 256 3 / 50 3. A device that connect multiple networks using similar or different protocol; a) repeater b) bridge c) gateway d) router 4 / 50 4. in spread-sheet,by default rows are labeled by: a) numbers b) letters c) special symbols d) underscore sign 5 / 50 5. The process of converting digital signals into analog signals via modem is a) Mixing b) Modulation c) Demodulation d) Merging 6 / 50 6. Trojan Horse is a type of a) hacker b) virus c) antivirus d) horse 7 / 50 7. Software that is available free for a limited period is called a) Free ware b) Net ware c) Group ware d) Share ware 8 / 50 8. Each computer on a network is called a) Link b) Node c) Mode d) Code 9 / 50 9. Electronic banking is also known as? a) Offline banking b) Global banking c) Cyber banking d) Interactive banking 10 / 50 10. The output of the compiler is called a) Linked code b) The program c) Object code d) Source code 11 / 50 11. How many types of addressing scheme are there : a) 4 b) 2 c) 5 d) 3 12 / 50 12. OSI model consists of a) 5 layers b) 9 layers c) 11 layers d) 7 layers 13 / 50 13. The microphone converts the sound into a) Mechanical signals b) Electrical signal c) Software d) Computer file 14 / 50 14. Data shown on display unit or played through audio is called a) shared copy b) Soft copy c) Hardcopy d) photo copy 15 / 50 15. Temporary storage are within CPU is called a) cache b) registers c) ROM d) RAM 16 / 50 16. Making illegal copies of copyrighted software is called a) software distribution b) software piracy c) software browsing d) software hacking 17 / 50 17. which of following coding scheme used by IBM a) MICR b) CAM c) ATM d) BCD 18 / 50 18. Which of the following is not a type of bus in computer? a) control bus b) address bus c) data bus d) timer bus 19 / 50 19. Which function key is used for checking spelling and grammar in MS word a) F4 b) F2 c) F7 d) F1 20 / 50 20. How many bits are there in 4-bytes? a) 16 b) 64 c) 8 d) 32 21 / 50 21. Default name of first sheet in any work book is a) one b) first sheet c) sheet I d) sheet one 22 / 50 22. physical path that connects the source and receiver is known as; a) decoder b) communication channel c) NIC card d) encoder 23 / 50 23. Which of the following is an Antivirus ? a) Redlof b) Trojan horse c) Logic bomb d) NOD32 24 / 50 24. The extension of an executable file is a) .doc b) .exe c) .ext d) .xis 25 / 50 25. Testing all program components together in SDLC is called a) system testing b) composite testing c) group testing d) volume testing 26 / 50 26. The process of producing multiple copies of a document is called a) data management b) reprographics c) desktop publishing d) image processing 27 / 50 27. The program that contains the instructions to operate a device is called a) device operating system b) Device driver c) device system d) device operator 28 / 50 28. The actual working area in micro soft excel is a) lotus-123 b) data base c) work book d) worksheet 29 / 50 29. Which one of the following is not a cause of virus a) logic bomb b) E-mail c) pirated software d) network 30 / 50 30. common font size used in business document is: a) 12-points b) 10-points c) 14-points d) 16-points 31 / 50 31. DSL stands for a) Distance service b) Domain server c) Direct service Lease d) Digital subscribe line 32 / 50 32. The devices that are automatically detected by windows are called a) Automatic devices b) plug and play devices c) serial devices d) installed devices 33 / 50 33. We press enter key in Ms word to create a a) sentence b) Line c) document d) paragragh 34 / 50 34. which of the following techniques uses modulation? a) bus-width b) bandwidth c) base band d) Broad band 35 / 50 35. Formula of instructions that run the computer is a) Hardware b) Document c) CUPs d) Software 36 / 50 36. The fly-by-wire system is called used in a) Airline b) edcation c) industry d) medical 37 / 50 37. The component of CPU which responsible for interacting with RAM is a) register b) ALU c) Control unit d) hard disk 38 / 50 38. A person who gains illegal access to a computer system is called a) computer consultant b) network c) computer operator d) hacker 39 / 50 39. physical path that connects the source and receiver is known as: a) communication channel b) NIC card c) decoder d) encoder 40 / 50 40. How many characters ASCII-7bit code represents? a) 512 b) 128 c) 64 d) 256 41 / 50 41. Which of the following is not an example of system software a) operating system b) utility program c) Microsoft office d) drives 42 / 50 42. how many types of language translator are there? a) 2 b) 4 c) 1 d) 3 43 / 50 43. The register holds the address of the next instruction to be fetched for execution a) Counter register b) Base register c) Instruction register d) Program counter 44 / 50 44. RAM usually has ——types a) 4 b) 3 c) 5 d) 2 45 / 50 45. The folder which contains administrator tools is a) linker b) installer c) control panel d) debugger 46 / 50 46. which of following is not a type of network : a) MAN b) LAN c) NAN d) WAN 47 / 50 47. CBT software is used in a) industry b) business c) education d) E-commerce 48 / 50 48. the minimum number of primary partitions that can be created on a basic disk are a) 6 b) 2 c) 8 d) 4 49 / 50 49. Which of the following contains the administrative tools in operating system : a) control panel b) my document folder c) recycle bin d) internet explorer 50 / 50 50. Moving up or down in word processing document is called a) Scrolling b) pull-down c) line movement d) word-wrap Your score is LinkedIn Facebook Twitter 0% Restart quiz Send feedback Post Views: 166 Post navigation Aiou Workshop 5403| Test 1