Site icon Express Pakistan

AIOU Test date 3nd test

Spread the love
/50
0 votes, 0 avg
3

ICT MCQS QUIZZES 03-01-23

AIOU students ICT QUIZZES

1 / 50

1. Formula of instructions that run the computer is

2 / 50

2. XGA resolution is:

3 / 50

3. Which one of the following is not a cause of virus

4 / 50

4. Data shown on display unit or played through audio is called

5 / 50

5. Making illegal copies of copyrighted software is called

6 / 50

6. The output of the compiler is called

7 / 50

7. Trojan Horse is a type of

8 / 50

8. Printed images can be converted into digital form using

9 / 50

9. OSI model consists of

10 / 50

10. A device that connect multiple networks using similar or different protocol;

11 / 50

11. The devices that are automatically detected by windows are called

12 / 50

12. Electronic circuits that executes computer instructions is called

13 / 50

13. The operating system based on NT technology is:

14 / 50

14. Analog signals are measured into

15 / 50

15. Another name of antivirus is:

16 / 50

16. The program that contains the instructions to operate a device is called

17 / 50

17. Dejure means

18 / 50

18. The keyboard layout that is most commonly used is the

19 / 50

19. A set of instruction that run the computer are

20 / 50

20. Television and radio broadcasts are example of

21 / 50

21. one or more network connected to hub is called;

22 / 50

22. The process of transferring a file from remote computer to our local computer is

23 / 50

23. The function that is used to get the maximum value in MS excel is called

24 / 50

24. A device that connect multiple network using similar or different protocol is a :

25 / 50

25. Which is not a bio metric technique for person identification

26 / 50

26. How many characters ASCII-7bit code represents?

27 / 50

27. The fly-by-wire system is called used in

28 / 50

28. The topology used for a small number of computer is called

29 / 50

29. In MS-Excel, formula begins with:

30 / 50

30. The computers or internet that contain website are called

31 / 50

31. The secret word or number used for computer security is called:

32 / 50

32. Transferring information from computer to internet is called

33 / 50

33. Which is a communication device

34 / 50

34. The process of producing multiple copies of a document is called

35 / 50

35. CBT software is used in

36 / 50

36. A person who gains illegal access to a computer system is called

37 / 50

37. Software that is available free for a limited period is called

38 / 50

38. Which of the following is not an example of system software

39 / 50

39. How many types of addressing scheme are there :

40 / 50

40. Most applications of robotics are in which area

41 / 50

41. How many characters ASCII-7bit code represents?

42 / 50

42. Default name of first sheet in any work book is

43 / 50

43. Which of the following keyboard shortcuts is used to change the case:

44 / 50

44. Clipboard stores—– in word processing.

45 / 50

45. Which devices connects each computer to a network?

46 / 50

46. RAM usually has ——types

47 / 50

47. Format C is an example of

48 / 50

48. Electronic banking is also known as?

49 / 50

49. Which one is the fastest

50 / 50

50. The term that refers to all input, output and secondary storage devices is called:

Your score is

0%

Exit mobile version