Spread the love/90 95 Aiou Workshop 5403| Full Test 1 / 90 1) IBM stands for: a) Internet Business Machine b) Internat c) International Business machine d) Internet Bulletin Machine 2 / 90 2) Which of the following is faster printer : a) Laser b) Inkjet c) Daisy wheel d) Dot-Matrix 3 / 90 3) Entering and editing text can be done most efficiently using a: a) Desktop publishing program b) Typewriter c) Spreadsheet d) Word processing program 4 / 90 4) Two types of display devices are____displays. a) Impact and non-impact b) Flat-panel and CRT c) Stylus and puck d) Inkjet and Laser 5 / 90 5) Which of the following is the most damaging loss to a company? a) Loss of printouts b) Loss of data c) Loss of software d) Loss of hardware 6 / 90 6) In star topology, the central device is called: a) Hub b) links c) Medium d) Node 7 / 90 7) Which of the following components is used to convert first.c to first.exe? a) compiler & linker b) None c) header & linker d) compiler & header 8 / 90 8) ________ is used to control all the parts of a manufacturing process. a) MICR b) CAD c) ATM d) CAM 9 / 90 9) All files deleted from computer are stored in: a) Temporary files b) Sys-tray c) Recycle Bin d) My documents 10 / 90 10) Application software is available in many forms except : a) Commercial software b) Scientific software c) Financial software d) Device drivers 11 / 90 11) A device that is used to connect two computers using telephone line is called: a) Ethernet Card b) Modem c) Sound Card d) Graphic Card 12 / 90 12) Which of the following is a keyboard event? a) Key up and Key down b) Key down c) Key up d) Key drag 13 / 90 13) C is a: a) Machine Language b) Low-level language c) Assembly language d) High level language 14 / 90 14) A port on the computer may be connected to: a) Expansion card and Motherboard b) Motherboard c) Expansion card d) CPU 15 / 90 15) The four numbers in an IP address are called:: a) Octets b) Octal c) Bytes d) Codec 16 / 90 16) Ctrl + Alt + Del is: a) Both b and c b) Recognized by Windows only c) An invalid key combination d) Used to close the active window 17 / 90 17) FTP facility is used to: a) File Transfer b) Transfer protocol c) Check PC d) Connect to internet 18 / 90 18) The process of transferring a file from our own computer to the remote computer on a network: a) Sharing b) Downloading c) Pasting d) Uploading 19 / 90 19) Digital signal represents a sequence of values. a) Unique b) Bytes c) Discrete d) Continuous. 20 / 90 20) Most computer crime are committed by: a) Highly paid computer consultant b) International spies c) Hackers d) Computer operators 21 / 90 21) Which of the following is not a Secondary storage device : a) CD-ROM b) Hard disk c) DVD-ROM d) CPU 22 / 90 22) Electronic banking is also known as: a) Global banking b) Cyber banking c) Offline banking d) Interactive banking 23 / 90 23) Which is a correct association between hardware device and action : a) CPU-data manipulation b) Scanner-processing c) Keyboard-connectivity d) CD-ROM-output 24 / 90 24) Which device uses light to determine the location of pencil marks on sheets? a) Stylus b) MICR c) Bar-code reader d) Optical–mark reader 25 / 90 25) Which printer should be used on mainframes for high-volume report printing : a) Daisy wheel printer b) Active matrix printer c) Line printer d) Dot-Matrix printer 26 / 90 26) Which of the following is valid Website Address? a) ww.hello.com b) www.it.com c) %VW . hello d) it4.com 27 / 90 27) Cabling on a linear bus topology can be extended using which of following? a) Barrel Connector b) Medium attachment c) Network adapter card d) Terminator 28 / 90 28) How many bits are in one byte : a) 2 b) 4 c) 8 d) 3 29 / 90 29) What comes after the analysis phase in the SDLC : a) Support b) Implementation c) Design d) Testing 30 / 90 30) A computer program that converts an entire program into machine language at one time is called: a) Interpreter b) Compiler c) Commander d) Simulator 31 / 90 31) Drag and Drop means to select the item hold down the mouse and: a) All b) Move text between documents c) Move files from one window to another d) Move files from one folder to another 32 / 90 32) The microphone converts the sound into: a) Computer file b) Mechanical signals c) Software d) Electrical signal 33 / 90 33) Data link layer lies between the physical layer and the_______layer a) Network b) Transport c) Session d) Presentation 34 / 90 34) Computer based weather forecasting depends on accurate collection of data from: a) Antenna b) Weather stations c) Radar d) Television 35 / 90 35) The device used to recieve data and information from computer includes: a) Printer b) All c) Monitor d) Speaker 36 / 90 36) Mail services are available to network users through the_______layer. a) Transport b) Session c) Presentation d) Application 37 / 90 37) Typically, data transfer rate in LAN are of the order of: a) Megabit persecond b) Terabit per second c) KiloBIt per second d) Bits per second 38 / 90 38) The primary difference between a LAN and a WAN is: a) The variety of hardware devices b) The number of hardware devices c) The number of software programs available d) Distance 39 / 90 39) Which of the following keys is used to cancel an operation : a) Del b) Pause c) Esc d) Enter 40 / 90 40) A set of illegal instructions inserted into a legitimate computer program is called: a) Worm b) Trapdoor c) Bomb d) Trojan horse 41 / 90 41) Typically, an ATM can be used to: a) Make budgets b) Withdraw cash c) Watch Movies d) Keep records 42 / 90 42) Information technology is a combination of : a) Computing and mechatronics technology b) Computing and Communication technology c) Computing and mechanical technology d) Computing and electrical technology 43 / 90 43) Which of the following is NOT a type of RAM? a) Quick RAM & Stable RAM b) Stable RAM c) Dynamic RAM d) Quick RAM 44 / 90 44) Websites are hosted on___________computers on the Internet. a) Server b) Service provider c) Browser d) Client 45 / 90 45) The command used to move text from one document to another is: a) Replace b) Edit c) Format d) Cut-and-Paste 46 / 90 46) Which of the following is a mouse event? a) Right click b) Double click c) Click d) All 47 / 90 47) Transfers data between main memory and I/O devices without using CPU? a) DMA b) Port c) DDA d) BRA 48 / 90 48) A computer network must contain at least number of computers: a) Two b) One c) Four d) Three 49 / 90 49) The process of training personnel to use the new systems is done during : a) Analysis b) Development c) Implementation d) Design 50 / 90 50) Who is responsible of security of online data? a) Internet Service provider b) User c) LAN Administrator d) Organization obtaining the data 51 / 90 51) DPI stand for : a) Digit per inch b) Data per inch c) Decimal per inch d) Dot per inch 52 / 90 52) The internal transfer of binary data in a computer uses mode. a) Serial b) .Sequential c) Direct d) Parallel 53 / 90 53) ISP stands for: a) Interlinked Services Provision b) Intranet’s Service Party c) International Service Provider d) Internet Service Provider 54 / 90 54) The layer that is concerned with addressing and routing is called: a) Network b) Physical c) transport d) Presentation 55 / 90 55) Which of the following task is related to Preliminary investigation : a) Feasibility study b) System specifications c) All d) System scope 56 / 90 56) Which of the following is not a biometric technique: a) Face b) Badge c) Retina d) Palm print 57 / 90 57) The name of the document is displayed: a) Scrollbar b) Title Bar c) Menu bar d) Status Bar 58 / 90 58) A network that places all nodes on a single cable is called: a) Tree b) none of these c) Bus d) Mesh 59 / 90 59) Which of the following code can represent up to 65,536 symbols? a) Unicode b) ASCII c) BCD d) EBCDIC 60 / 90 60) E ARPA stands for: a) Arizona’s Russian Program of Association b) Advanced Residential Programming Association c) American Rational Program Association d) Advanced Research Project Agency 61 / 90 61) Which of the following reason causes the syntax error a) using a variable without declaration b) Missing any of the delimiters c) All d) Missing statement terminator 62 / 90 62) The “.exe” file is produced by:. a) Compiler b) Loader c) interpreter d) linker 63 / 90 63) A type of communication that sends data using flow control to synchronize data between sender a) Isochronous b) .2 c) Asynchronous transmission d) Synchronous transmission 64 / 90 64) Which kind of signal is mostly required by telephone lines? a) Digital b) High c) Low d) Analog 65 / 90 65) Which menu is used to insert page numbers in the document? a) Insert b) File c) Format d) Window 66 / 90 66) Computer transmit data in the form of codes. a) Binary b) Analog c) None d) Decimal 67 / 90 67) which of the following language Is ideal to write business application a) COBOL b) PASCAL c) None d) BASIC 68 / 90 68) A____is a computer that provides services to other computers of the network. a) Client b) Host c) DNS d) Web browser 69 / 90 69) The World Wide Web was introduced in: a) 1989 b) Mid-1970s c) 1960s d) 2000 70 / 90 70) Times New Roman is an example of a: a) Sans serif font b) Serif font c) Three-dimensional font d) Boldface font 71 / 90 71) Which type of network covers a small area? a) NAN b) LAN c) WAN d) MAN 72 / 90 72) A file that is sent along with an email is known as: a) Attachment b) Folder c) Document d) Header 73 / 90 73) Which modem is used to transmit data signals through air instead of cable? a) Internal b) All c) External d) Wireless 74 / 90 74) Pressing Ins key will: a) To insert image in document b) Toggle between insertion and overtype mode c) Toggle between Undo and Redo. d) Insert a character into the document. 75 / 90 75) CPU includes all of the following components EXCEPT a) Register b) Primary storage c) ALU d) Control Unit 76 / 90 76) The height of wave within a given period of time is known as: a) Phase b) Pulse c) Frequency d) Amplitude 77 / 90 77) Mistakes that cause a running program to produce incorrect results are called: a) Program error b) None c) Logic error d) Syntax error 78 / 90 78) Which of the following is based on NT Technology? a) Windows b) Window 3.1 c) Windows 95 d) Windows 2000 79 / 90 79) The font that does not display little lines at the top and bottom of character is: a) European b) American c) serif d) Sans-serif 80 / 90 80) The extension of C source program is: a) .obj b) .h c) .c d) .exe 81 / 90 81) Segmentation and reassembly is the responsibility of: a) 5th layer b) 6th layer c) 4th layer d) 3rd layer 82 / 90 82) Which of the following is an email client? a) Windows explore b) Internet explorer c) Outlook express d) Mozilla Firefox 83 / 90 83) Data link have two separate sub-layers known as: a) Ethernet b) LLC and MAC c) CS And MA d) TOKEN and RING 84 / 90 84) Which device is used to capture video using standard analog camcorder or VCR: a) Video digitizer b) Digital camcorder c) Image recorder d) Video captures card 85 / 90 85) A pixel might be displayed as: a) All b) Blue c) White d) Black 86 / 90 86) An example of non-numerical data is: a) Address b) Roll No c) Marks d) Bank balance 87 / 90 87) Another name for main memory is : a) Secondary storage b) Permament storage c) Tape storage d) Primary storage 88 / 90 88) Which of the following is a top-level domain? a) http b) HTML c) .com d) URL 89 / 90 89) A well-defined set of instructions given to the computer is called: a) Hardware b) Software c) Bug d) None 90 / 90 90) Which of the following is the entering point in Windows? a) My computer b) Desktop c) Windows explorer d) My document Your score is LinkedIn Facebook Twitter VKontakte Post Views: 548 Post navigation Aiou Workshop 5403| Test 6 Rawalpindi Board First year Computer Science all past papers MCQS.