Spread the love/90 95 Aiou Workshop 5403| Full Test 1 / 90 1) The binary number 0 and 1 is represented by a : a) Word b) Byte c) Bit d) Character 2 / 90 2) Which of the following is not part of a URL? a) Path b) Protocol c) Server d) End tag 3 / 90 3) An unwanted message sent through e-mail is called: a) Virus b) Junk c) Attachment d) Hoax 4 / 90 4) A tool that is used to generate form letters is called: a) Mail Ready b) Mail merge c) Letter writer d) Grammar Ready 5 / 90 5) XGA supports colors up to: a) 1 million b) 16.7 billion c) 16.7 million d) 1 billion 6 / 90 6) Which of the following is a protocol a) URl b) http c) .com d) HTML 7 / 90 7) Which of the following is valid Website Address? a) www.it.com b) it4.com c) ww.hello.com d) %VW . hello 8 / 90 8) Who owns the Internet? a) U.S. Government b) United Nations c) None d) Pak Telecom 9 / 90 9) Which protocol works on the concepts of ring topology and a token? a) Ethernet b) TCP/IP c) ARCnet d) Token Ring 10 / 90 10) Which of the following is not a machine instruction? a) END b) MON c) ORG d) b and c 11 / 90 11) How a virus reaches from one computer to another? a) Exchange of display screen b) Exchange of printer c) Data is exchanged between computers d) Exchange of keyboard 12 / 90 12) The chart,graph,pictures and freehand drawing are examples of: a) Audio data b) Image data c) Numeric data d) Text data 13 / 90 13) Select unguided media from the following: a) Fiber optic b) Coaxial c) Satellite d) Twisted pair 14 / 90 14) The types.of signals can be: a) Analog b) Digital and Analog c) Digital d) Analog 15 / 90 15) Which component handles the processor communication with its peripheral, a) I/O Unit b) NIC c) CU d) ASCII 16 / 90 16) Data shown on display unit or played through audio is called: a) Soft copy b) Hard copy c) Photocopy d) Shared copy 17 / 90 17) The typical fiber optic cable consists of very narrow strand of glass called: a) Core b) Base c) Sheet d) Cladding 18 / 90 18) The area in which text is entered, manipulated and viewed is called: a) Document window b) Window c) Text area d) Documentation area 19 / 90 19) The layer is used to control how a bit-streams of data is sent and received over physical medium a) transport layer b) Physical layer c) Presentation layer d) Session layer 20 / 90 20) System analysis produces which of the following results : a) All b) Review of existing system c) Design constraints d) Requirements definition 21 / 90 21) The companies that use networks can save time and money because network allow users to share: a) Software Program b) ALL c) Hardware Devices d) Information 22 / 90 22) Each computer on a network is called a: a) Link b) Code c) Mode d) Node 23 / 90 23) A LAN is a combination of: a) LAN cables b) Network card c) ALL d) LAN software 24 / 90 24) CBT software is used in: a) Manufacturing b) Farming c) Forecasting d) Education 25 / 90 25) MAN stands for: a) Metropolitan arranged network b) Massive Area Networks c) Metropolitan area network d) Marked area network 26 / 90 26) Which key removes the character to the left of the cursor : a) Esc b) Alt c) Backspace d) Delete 27 / 90 27) The extension of MS-Word file is: a) jpg b) wrd c) xls d) doc 28 / 90 28) The process of modifying information system to meet changing needs is called : a) System management b) System modification c) System upkeep d) System maintenance 29 / 90 29) The speed of laser printer is measured in : a) Page per min b) Character per sec c) Words per min d) Lines per min 30 / 90 30) Mistakes that cause a running program to produce incorrect results are called: a) Syntax error b) Logic error c) Program error d) None 31 / 90 31) The fly-by-wire system is used in: a) Medical field b) Airline c) Education field d) Car 32 / 90 32) The process of training personnel to use the new systems is done during : a) Development b) Analysis c) Implementation d) Design 33 / 90 33) Computers derive its basic strength from: a) All b) Accuracy c) Memory d) Speed 34 / 90 34) A network that covers a large geographic distance such as a country is called a: a) WAN b) LAN c) PAN d) MAN 35 / 90 35) Which of the following is not a:data communication mode? a) Auto. b) Half-duplex c) Full-duplex. d) Simplex Half-duplex 36 / 90 36) The arithmetic/logic unit performs the following a) Perform arithmetic functions & Perform logical comparisons b) Perform arithmetic functions c) Control computer operations d) Perform logical comparisons 37 / 90 37) Which of the following is not included in document management system? a) Reprographic b) Desktop publishing c) Word-processing d) E-Shopping 38 / 90 38) The process of transferring data electronically from one place to another is caled a) Data Sequence b) NIC c) Data processing d) Data communication 39 / 90 39) DNS stands for: a) Decimal Numeric System b) Decimal Number System c) Dual Number System d) Domain Name System 40 / 90 40) The size of EAX register can be up to: a) 4 bytes b) 8 bytes c) 4 bit d) 4 KB 41 / 90 41) The format of an email address is: a) User name$DNS.com b) User name# DNS Address c) User name@ DNS Address d) User name& DNS Address. 42 / 90 42) Which of the following is NOT a benefit of computer networks? a) Connect people b) Produce high quality programs c) Reduce hardware costs d) Enable shared applications 43 / 90 43) The most widely used web protocol is: a) URL b) HTTP c) HTML d) LSP 44 / 90 44) The CPU is housed in a single chip called: a) Microprocesso b) Data processor c) Graphic processor d) Language processor 45 / 90 45) Exhaustive data gathering is done during : a) Preliminary Investigation b) Analysis c) Design d) Development 46 / 90 46) The process of storing the programs and data in memory is called. a) CPU b) Floppy Disk c) Data communication d) Stored-program concept 47 / 90 47) Which of the following is used to edit text in a document? a) Delete key b) Cut and paste c) Backspace key d) all 48 / 90 48) The normal orientation for printing is: a) Portrait b) Landscape c) Vertical d) Horizontal 49 / 90 49) Which of the following one is not a virus? a) MCAfee b) Reflof c) Trojan Horse d) Logic Bomb 50 / 90 50) The term that define, the size and style of a typeface is : a) Point b) Font c) size d) Character 51 / 90 51) The restricted access to the server computer room is a form of: a) Physical security b) Logical security c) User security d) Enterprise security 52 / 90 52) In WAN, the communication software that allows a personal computer to appear as terminal is call a) Terminal emulation software b) Teleconferencing software c) Electronic mail software d) Bulletin board system 53 / 90 53) Pictures can be added to the document by selecting ________ option from menu bar a) Enter-TextBox b) Go-TextBox c) Input-TextBox d) Insert-Picture 54 / 90 54) A major category of software is : a) Application and system b) System and design c) System and development d) Application and design 55 / 90 55) A device used for optical-character recognition is a: a) Wand reader b) pen c) MICR reader d) MCCR reader 56 / 90 56) Which of the following key is used to save a file? a) F5 b) F9 c) F3 d) F2 57 / 90 57) The output of the compiler is called: a) Source code b) Linked code c) Object code d) Library code 58 / 90 58) Pressing Ins key will: a) To insert image in document b) Toggle between Undo and Redo. c) Toggle between insertion and overtype mode d) Insert a character into the document. 59 / 90 59) All of the following may be stored in registers EXCEPT: a) Memory addresses b) CPU instruction set c) Data d) Program instructions 60 / 90 60) A type of language in which instructions are written in binary form is called: a) None b) Assembly language c) Machine language d) High level language 61 / 90 61) The hardware device that temporarily holds data and program is called : a) Primary storage b) Output c) CPU d) Secondary storage 62 / 90 62) IBM stands for: a) International Business machine b) Internet Bulletin Machine c) Internat d) Internet Business Machine 63 / 90 63) The statements written by the programmer are called: a) Syntax b) Source code c) None d) Object code 64 / 90 64) In the Web address, http://www.microsoft.com, http is: a) Domain name b) Path c) End tag d) Protocol 65 / 90 65) Checking a computer program for errors is called: a) Running b) Debugging c) Correcting d) Bugging 66 / 90 66) Which of the following errors are NOT detected by compiler? a) Logical error b) None c) Syntax error d) Both a and b 67 / 90 67) The key that is used to delete a character to the left of the cursor is: a) Home b) Backspace c) Ctrl+Tab d) Del 68 / 90 68) The size of the characters to be printed is measured in. a) Weight b) Points c) Degrees d) inches 69 / 90 69) OSI reference model has: a) 2 layers b) 7 layers c) 9 layers d) 5 layers 70 / 90 70) which of the following header file contains information about common mathematical functions? a) stdio.h b) conio.h c) None d) math.h 71 / 90 71) Which of the following is related to business? a) Stock exchanges b) All c) Marketing d) Banks 72 / 90 72) The name of header file is written between: a) <> b) {} c) ( ) 73 / 90 73) Which device uses light to determine the location of pencil marks on sheets? a) Stylus b) Optical–mark reader c) Bar-code reader d) MICR 74 / 90 74) The data moves between the internal components of the computer using: a) Cable b) Link c) Connector d) Bus 75 / 90 75) Which register holds the address of next instruction to be fetched for execution? a) IR b) MAR c) PC d) MBR 76 / 90 76) Which of the following is a search engine? a) Microsoft b) Google c) Internet explorer d) MIME 77 / 90 77) Windows 2000 is a: a) All b) Multitasking operating system c) Multiuser operating system d) Multiprocessing operating system 78 / 90 78) Transmission media are usually categorized as_ a) Baseband and broadband b) Guided or unguided c) Fixed or unfixed d) Good and bad 79 / 90 79) The most commonly used LAN protocol is: a) ARCnet b) Token Ring c) Ethernet d) WiMax 80 / 90 80) Which of the following media can be used for backup? a) Tape Device b) All c) Floppy Diskette d) Zip Disk 81 / 90 81) Full-duplex communication is made. possible by the.devices known as: a) Multiplexer: b) .Mouse c) ..Keyboard. d) Modem 82 / 90 82) Which of the following memories allows simultaneous read and write operations? a) ROM b) EEPROM c) RAM d) EPROM 83 / 90 83) Many banks provide the facility of: a) CBT b) CAM c) CAD d) ATM 84 / 90 84) The advantage of an LCD monitor is that it is: a) More compact b) Size c) Color d) Lighter & Faster 85 / 90 85) Which of the following is an example of a font weight? a) Helvetica b) Bold c) 12 pt d) Italic 86 / 90 86) What is the difference between hardware and software? a) Hardware is metal but software is plastic b) Hardware is permanent but software is temporary c) Hardware is tangible but software is intangible d) Hardware is reliable but software is unreliable 87 / 90 87) The internal transfer of binary data in a computer uses mode. a) .Sequential b) Parallel c) Direct d) Serial 88 / 90 88) The direction of paper in printing is referred to as a) Page style b) Page position c) Orientation d) Directionnel position 89 / 90 89) The process of linking library files with object cod is known as: a) Executing b) Linking c) Compiler d) Saving 90 / 90 90) The name of the document is displayed: a) Menu bar b) Status Bar c) Title Bar d) Scrollbar Your score is LinkedIn Facebook Twitter VKontakte Post Views: 493 Post navigation Aiou Workshop 5403| Test 6 Rawalpindi Board First year Computer Science all past papers MCQS.