AIOU Test date 3nd test admin 4 years ago Spread the love /50 0 votes, 0 avg 3 ICT MCQS QUIZZES 03-01-23 AIOU students ICT QUIZZES 1 / 50 1. The keyboard layout that is most commonly used is the a) qinerty b) QWERTY c) inriter d) splitter 2 / 50 2. A work book is a collection of a) functions b) table c) formula d) sheets 3 / 50 3. Which one is the fastest a) RAM b) register c) cache d) hard disk 4 / 50 4. A person who gains illegal access to a computer system is called a) hacker b) network c) computer consultant d) computer operator 5 / 50 5. Which one is a an Automatic programmable machine: a) keyboard b) mouse c) Robot d) Cd-drive 6 / 50 6. Which of the following is an Antivirus ? a) Trojan horse b) Redlof c) Logic bomb d) NOD32 7 / 50 7. The extension of Ms-Word is : a) .doc b) .wrd c) .mp3 d) .bmp 8 / 50 8. Most applications of robotics are in which area a) farming b) cooking c) manufacturing d) technique 9 / 50 9. common font size used in business document is: a) 10-points b) 16-points c) 14-points d) 12-points 10 / 50 10. Communication between computer and keyboard involve the transmission: a) Full-Duplex b) Half-Duplex c) Automatic d) Simplex 11 / 50 11. Which of the following is not an example of system software a) Microsoft office b) drives c) operating system d) utility program 12 / 50 12. The device uses parallel transmission: a) light pen b) mouse c) Printer d) keyboard 13 / 50 13. Dejure means a) By nature b) By law c) By fact d) By default 14 / 50 14. Moving up or down in word processing document is called a) pull-down b) Scrolling c) line movement d) word-wrap 15 / 50 15. Clipboard stores—– in word processing. a) copied text b) deleted text c) entered text d) repeated text 16 / 50 16. Which one is a faster memory? a) RAM b) ROM c) cache d) Register 17 / 50 17. Which is not a bio metric technique for person identification a) retina b) pam print c) face d) badge 18 / 50 18. Trojan Horse is an example of a) hardware b) antivirus c) Virus d) system software 19 / 50 19. A small image that represents a program folder or file is called a) command b) ICON c) menue d) GUI 20 / 50 20. Which is a communication device a) USB b) Ethernet c) UTP d) Router 21 / 50 21. The communicational channels can be divided into a) 3 types b) two types c) 5 types d) 4 types 22 / 50 22. How many bits are there in 4-bytes? a) 16 b) 64 c) 8 d) 32 23 / 50 23. Another word for pointer is: a) monochrome b) cursor c) pixel d) director 24 / 50 24. which of the following techniques uses modulation? a) bus-width b) base band c) Broad band d) bandwidth 25 / 50 25. Which components is used to connect different parts of the computer together? a) main memory b) I/O unit c) control unit d) buses 26 / 50 26. The computers or internet that contain website are called a) clients b) central computer c) web servers d) site computer 27 / 50 27. The operating system based on NT technology is: a) windows 97 b) Windows 95 c) Windows 2000 d) windows 98 28 / 50 28. Software that is available free for a limited period is called a) Share ware b) Group ware c) Net ware d) Free ware 29 / 50 29. The length of IP address is a) 24 bits b) 8 bits c) 32 bits d) 16 bits 30 / 50 30. Terminators are used in——topology a) ring b) Bus c) star d) mesh 31 / 50 31. Testing all program components together in SDLC is called a) volume testing b) system testing c) group testing d) composite testing 32 / 50 32. OSI model consists of a) 11 layers b) 7 layers c) 5 layers d) 9 layers 33 / 50 33. DSL stands for a) Domain server b) Direct service Lease c) Digital subscribe line d) Distance service 34 / 50 34. Which is a type of RAM: a) FRAM b) ERAM c) SRAM d) CRAM 35 / 50 35. The top most layer of OSI model is a) presentation b) transport c) Application d) session 36 / 50 36. GUI stands for? a) Graphical usage interface b) General user interface c) Graphical user icons d) Graphical user interface 37 / 50 37. Each computer on a network is called a) Mode b) Node c) Link d) Code 38 / 50 38. Which is not an output device a) Scanner b) Printer c) Monitor d) Speaker 39 / 50 39. The extension of an executable file is a) .xis b) .doc c) .ext d) .exe 40 / 50 40. Temporary storage area within CPU is called: a) ROM b) hard disk c) registers d) RAM 41 / 50 41. Printed images can be converted into digital form using a) stylus b) mouse c) joy stick d) Scanner 42 / 50 42. BIT stands for: a) binary digit b) binary interval c) binary tree d) binary integer 43 / 50 43. The process of transferring a file from remote computer to our local computer is a) copy b) Uploading c) Downloading d) forward 44 / 50 44. The microphone converts the sound into a) Computer file b) Electrical signal c) Mechanical signals d) Signals 45 / 50 45. physical path that connects the source and receiver is known as; a) communication channel b) NIC card c) decoder d) encoder 46 / 50 46. which of following coding scheme used by IBM a) BCD b) ATM c) CAM d) MICR 47 / 50 47. The program that contains the instructions to operate a device is called a) device operator b) device system c) device operating system d) Device driver 48 / 50 48. A device that connect multiple networks using similar or different protocol; a) gateway b) repeater c) router d) bridge 49 / 50 49. Temporary storage are within CPU is called a) cache b) registers c) RAM d) ROM 50 / 50 50. Another name of antivirus is: a) DES b) Vaccine c) worm d) Trojan Horse Your score is LinkedIn Facebook Twitter 0% Restart quiz Send feedback {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…