Spread the love/90 95 Aiou Workshop 5403| Full Test 1 / 90 1) Which of the following cannot be set using the Format command? a) Margins b) Tabs and indents c) Alignment d) Line spacing 2 / 90 2) The restricted access to the server computer room is a form of: a) Physical security b) Enterprise security c) Logical security d) User security 3 / 90 3) Which of the following is an authentication methodology? a) Access cards b) Biometrics c) Piracy d) PIN 4 / 90 4) CPU consists of the following parts: a) Operating system and ALU b) CU and Main Memory c) Operating system and application d) Control Unit and ALU 5 / 90 5) A bus that moves data between the central processor and memory is known as: a) Processor bus b) CPU bus c) I/O bus d) Data bus 6 / 90 6) Which of the following features is provided with a modem? a) Self-testing b) All c) Speeds d) Transmission rate 7 / 90 7) The key that is used to delete a character to the left of the cursor is: a) Del b) Backspace c) Ctrl+Tab d) Home 8 / 90 8) MICR stands for: a) Magic in Character Redo b) Magical Ink Character Reader c) Magnetic Ink Character Recorder d) Magnetic Ink Character Reader 9 / 90 9) A 32-bit bus is _________ than a 16-bit bus. a) a and b b) Longer c) Wider d) Faster 10 / 90 10) A standard IP address is composed of a total of: a) 256 bits b) 16 bits c) 4 bits d) 32 bits 11 / 90 11) Which of the following is based on NT Technology? a) Window 3.1 b) Windows 95 c) Windows d) Windows 2000 12 / 90 12) RAM stands for a) Readily available memory b) Remember all memory c) Random access memory d) . Read and more memory 13 / 90 13) In the e-mail address me@pu.edu, the world “me” is: a) Server name. b) User name c) Client computer d) Password 14 / 90 14) How many characters can Unicode represcnt? a) 500 b) 10,000 c) 65,536 d) 15,000 15 / 90 15) VCR stands for: a) Video Cassette Recorder b) Voltage Controlled Timer c) Virtual Control Room d) Visual Control Response 16 / 90 16) Which of the following is not a type of user interface? a) System interface b) Design interface c) Command-line d) System interface and Design interface 17 / 90 17) Which software is used to solve every day personal or business tasks? a) Operating system b) Device drives c) System software d) Application software 18 / 90 18) Which of the following is a protocol a) http b) HTML c) .com d) URl 19 / 90 19) NIC allows direct connection to: a) Printer b) Modem c) Moniter d) Network 20 / 90 20) Which of the following keys is used to cancel an operation : a) Enter b) Del c) Esc d) Pause 21 / 90 21) The difference between ROM and RAM is: a) ROM is larger b) ROM is nonvolatile & ROM is read only c) ROM is read only d) ROM is larger 22 / 90 22) A virus that replicates itself is called: a) Worm b) Vaccine c) Bomb d) Bug 23 / 90 23) A lab with twenty computers and a laser printer is an example_____ of area network a) Little b) Local c) Limited d) Line 24 / 90 24) A statement that starts with a # is called a: a) None b) Comment c) Preprocessor directive d) Keyword 25 / 90 25) The basic structure of C program consists of: a) All b) main() function c) Program body d) Preprocessor Directive 26 / 90 26) Which of the following is used for static RAM technology? a) Primary memory b) Cache memory c) Registers d) Secondary storage 27 / 90 27) Mail services are available to network users through the_______layer. a) Application b) Session c) Transport d) Presentation 28 / 90 28) Which type of bus transmits control signal like ACKS? a) Data bus b) Serial bus c) Address bus d) Control bus 29 / 90 29) What type of network is the Internet? a) NAN b) WAN c) MAN d) LAN 30 / 90 30) Which component is used to connect different parts of computer together? a) Power Supply b) Control Unit c) Main memory d) Bus Interconnection 31 / 90 31) Which of the following is the insulation on a fiber-optic cable? a) Cladding b) . Braiding c) Housing d) Sheathing 32 / 90 32) Many products are designed by using? a) ROBOT b) CAM c) ATM d) CAD 33 / 90 33) One or more computers connected to a hub is called: a) Ring network b) Star Network c) Bus Network d) Band network 34 / 90 34) A common type of diagram in most project management software is : a) Data flow diagram b) System flowchart c) Gantt chart d) CASE tool 35 / 90 35) The standard protocol for the Internet is: a) TCP/IP b) IP address c) IP protocol d) TCP 36 / 90 36) Which problem occurs when two workstations on shared Ethernet try to access LAN at the same time a) Deadlock b) Termination c) Accident d) Collision 37 / 90 37) Which of the following protocol is used to access web pages on Word Wide Web? a) Ethernet b) HTML c) Gopher d) HTTP 38 / 90 38) Application software is available in many forms except : a) Scientific software b) Financial software c) Commercial software d) Device drivers 39 / 90 39) A program that interferes with the normal working of a computer is called: a) Bateria b) Freeware c) Virus d) Antivirus 40 / 90 40) All of the following may be stored in registers EXCEPT: a) CPU instruction set b) Program instructions c) Data d) Memory addresses 41 / 90 41) The hardware device that temporarily holds data and program is called : a) Output b) Primary storage c) CPU d) Secondary storage 42 / 90 42) Electronic commerce (e-commerce) is the process of: a) All b) Maintaining business relationship c) Conducting business transactions d) Sharing of business information 43 / 90 43) How many devices can exist between a sending and receiving host? a) Any. b) 1 c) 2 d) 10 44 / 90 44) ______is used to product attractive documents using photos, artwork and graphics: a) Image processing b) Desktop publishing c) Reprographics d) Spreadsheet 45 / 90 45) Which register holds base location of all executable instructions in the program? a) CS b) DS c) SS d) ES 46 / 90 46) The tool used to find a similar or alternative word in a document is called: a) Style b) Thesaurus c) Finder d) Dictionary 47 / 90 47) Which device uses light to determine the location of pencil marks on sheets? a) Stylus b) MICR c) Optical–mark reader d) Bar-code reader 48 / 90 48) Which type of flat-panel computer screen provides the highest-quality image? a) CRT b) ELD c) Gas plasma d) LCD 49 / 90 49) A person who gains illegal access to a computer system is called: a) Network controller b) Computer operator c) Authorized person d) Hacker 50 / 90 50) The type of conversion in which a subset of users migrate to new system while others continue to use a) Direct b) Phased c) Parallel d) Pilot 51 / 90 51) Which of the following is communications device a) UTP b) USB c) Ethernet d) Router 52 / 90 52) The lowest resolution for color graphics display is: a) XGA b) VESA c) CAD d) VGA 53 / 90 53) Which of the following is not a graphical user interface? a) DOS b) Windows c) Linux d) Mac OS 54 / 90 54) Which of the following key is used to save a file? a) F5 b) F3 c) F2 d) F9 55 / 90 55) A collection of related web pages is called: a) Internet b) Linking c) Web site d) Web-link 56 / 90 56) The layer is used to control how a bit-streams of data is sent and received over physical medium a) Presentation layer b) transport layer c) Physical layer d) Session layer 57 / 90 57) The communication across WAN occurs using: a) Microwaves b) Any c) Satellite links d) Telephone Line 58 / 90 58) News server use_____ protocol to transfer articles among them. a) NITP b) ARCnet c) FTP d) MIME 59 / 90 59) A computer network in which all computers have equal status and no one have control over others: a) Client-to-client b) Dedicated c) Peer-to-peer d) Client-server 60 / 90 60) The boards used to connect additional devices to the computer are connected to the motherboard thr a) Expansion slots b) Connectors c) Sector d) Links 61 / 90 61) The four numbers in an IP address are called:: a) Bytes b) Codec c) Octets d) Octal 62 / 90 62) A major category of software is : a) System and development b) Application and design c) Application and system d) System and design 63 / 90 63) Every webpage has unique address on the World Wide Web known as: a) Hyperlink b) HTTP c) URL d) HTML 64 / 90 64) A type of communication that sends that uses a clock to control timing of bits being sent is called: a) Asynchronous transmission b) Synchronous transmission c) Monochronous transmission d) Isochronous transmission 65 / 90 65) Writing programs in machine language is: a) None b) Both a and c c) Less tedious d) Less time-consuming 66 / 90 66) Textbox can be created by selecting _________option from the menu bar: a) Go-TextBox b) Enter-TextBox c) Input-TextBox d) Insert-TextBox 67 / 90 67) A set collection of a large number of computers all over the world connected to one another is a) Interlink b) Internet 68 / 90 68) Which of the following coding schemes uses 4-bit code? a) Unicode b) EBCDIC c) BCD d) ASCII. 69 / 90 69) Which of the following is not a biometric technique: a) Badge b) Face c) Retina d) Palm print 70 / 90 70) The size of the file that can be attached to an email depends on: a) Email Protocol b) Service provider c) Email client d) Web browser 71 / 90 71) The size of the characters to be printed is measured in. a) Weight b) Points c) inches d) Degrees 72 / 90 72) Printers and monitors are common forms of : a) Processing devices b) Storage devices c) Input devices d) Output devices 73 / 90 73) Which type of printer operates most like a photocopy machine : a) Inkjet printer b) Line printer c) Laser printer d) Dot-Matrix printer 74 / 90 74) Which of the following transmission media is used in LAN? a) Satellite b) Microwave c) Telephone line d) Coaxial cable 75 / 90 75) The services on the Internet include a) FTP b) WWW c) ALL d) E-MAIL 76 / 90 76) Which of the following is NOT an example of a program bug? a) Logic error b) Run-time error c) Operator error d) Syntax error 77 / 90 77) Typically, an ATM can be used to: a) Withdraw cash b) Watch Movies c) Keep records d) Make budgets 78 / 90 78) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) religious b) secular c) professional d) trained 79 / 90 79) C statements end with a: a) Period b) semicolon c) semicolon d) None 80 / 90 80) ASCII code was.developed by: a) Simplex transmission b) Full-duplex c) ANSI.. d) Duplex 81 / 90 81) Digital signals are commonly known as: a) Narrowband b) Broadband c) Baseband d) Band 82 / 90 82) A set of buttons to execute commands in a word processing document is called: a) Menu b) Button list c) Dialog d) Toolbar 83 / 90 83) How many characters of data does a byte usually represent : a) 4 b) 1 c) 2 d) 3 84 / 90 84) Which of the following is not cause of virus? a) Pirated software b) Networks c) E-mail d) Logic bomb 85 / 90 85) A port on the computer may be connected to: a) Motherboard b) CPU c) Expansion card and Motherboard d) Expansion card 86 / 90 86) Which mode replace, the existing text? a) Overtype b) Insert mode c) Change d) Replace 87 / 90 87) A computer main function is to : a) Display data b) Convert information to storage c) Convert data into information d) Create data from information 88 / 90 88) The system that translates an IP address into an human-readable name is called: a) Domain name system b) Domain c) Domain numbering system d) IP system 89 / 90 89) The companies that use networks can save time and money because network allow users to share: a) Hardware Devices b) Information c) Software Program d) ALL 90 / 90 90) Which of the following acts as an interface between the user and the hardware? a) Language processor b) Utility program c) Operating system d) MS Word Your score is LinkedIn Facebook Twitter VKontakte Post Views: 646 Post navigation Aiou Workshop 5403| Test 6 Rawalpindi Board First year Computer Science all past papers MCQS.