Spread the love/90 95 Aiou Workshop 5403| Full Test 1 / 90 1) Select unguided media from the following: a) Satellite b) Fiber optic c) Coaxial d) Twisted pair 2 / 90 2) The higher resolution means: a) More accurate voice recogination b) Larger pixel size c) Bigger picture d) Greater number of pixels 3 / 90 3) Which of the following device is used to get soft copy output? a) Plotter b) Scanner c) Printer d) Monitor 4 / 90 4) The transmission rate of modem can be measured in: a) Words per second b) Bytes per second c) Bits per second d) Characters per second 5 / 90 5) A LAN protocol in which all computers and devices on the network pass a special signal known as: a) Ethernet b) ARCnet c) Token d) TCP/IP 6 / 90 6) Most computer crime are committed by: a) International spies b) Highly paid computer consultant c) Hackers d) Computer operators 7 / 90 7) The white space around printed page is called: a) Margin area b) Cover area c) Blank area d) white area 8 / 90 8) How many characters of data does a byte usually represent : a) 2 b) 3 c) 1 d) 4 9 / 90 9) Which of the following can be set using Format Paragraph command? a) Line spacing and Indents b) Indents c) Margins d) Line spacing 10 / 90 10) The feature of Word use to change fonts color, size, style is called a) Formatting b) Fonts c) Composing d) Styles 11 / 90 11) The speed of laser printer is measured in : a) Lines per min b) Character per sec c) Page per min d) Words per min 12 / 90 12) A 32-bit bus is _________ than a 16-bit bus. a) a and b b) Wider c) Faster d) Longer 13 / 90 13) The term that define, the size and style of a typeface is : a) Character b) size c) Point d) Font 14 / 90 14) Many networks include a central computer called: a) Server b) Gateway c) Clint d) Bridge 15 / 90 15) The computers in wide geographical area can be efficiently connected by: a) WiFi b) Coaxial cable c) Twisted pair d) Satellite 16 / 90 16) The network architecture that allows every computer to act as client as well as a server is: a) peer-to-peer b) Host system c) Client/Server d) Server System 17 / 90 17) A font is described by its: a) All b) Typeface c) Presentation d) Height 18 / 90 18) Websites are hosted on___________computers on the Internet. a) Client b) Service provider c) Browser d) Server 19 / 90 19) Unicode uses: a) 132-bitโ b) 16-bit c) 32-bit d) 64-bit 20 / 90 20) Pressing and releasing the left mouse button quickly is called: a) Dragging b) Clicking c) Dropping d) Pointing 21 / 90 21) Which of the following is harmful for computers? a) Freeware b) Virus c) Shareware d) Antivirus 22 / 90 22) Which of the following is used to surf Internet? a) Internet explorer b) Start button c) Window explorer d) Control Panel 23 / 90 23) The benefits of CAD include: a) Repeatability b) All c) Accuracy d) Speed & flexibility of 24 / 90 24) Word processing includes the process of: a) All b) Editing text c) Formatting d) Entering text 25 / 90 25) A collection of documents stored on computes permanently connected with Internet around the worl a) FTP b) Email c) Telnet d) WWW 26 / 90 26) The services on the Internet include a) WWW b) ALL c) FTP d) E-MAIL 27 / 90 27) A network that transmits data over citywide distance faster than LAN is: a) NAN b) LAN c) WAN d) MAN 28 / 90 28) All of the following are properties of a monitor expect: a) Speed b) Color c) Size d) Resolution 29 / 90 29) FTP facility is used to: a) Check PC b) Connect to internet c) File Transfer d) Transfer protocol 30 / 90 30) Which of the following is not an output device : a) Scanner b) Monitor c) Speaker d) Printer 31 / 90 31) Writing programs in machine language is: a) None b) Less time-consuming c) Both a and c d) Less tedious 32 / 90 32) Which term is commonly used to refer to software or program errors: a) Short circuit b) Bug c) Crash d) Down 33 / 90 33) McAfee is an example of: a) Worm b) Virus c) Hacker d) Antivirus 34 / 90 34) The height of wave within a given period of time is known as: a) Frequency b) Amplitude c) Pulse d) Phase 35 / 90 35) The layer is used to control how a bit-streams of data is sent and received over physical medium a) Physical layer b) Session layer c) Presentation layer d) transport layer 36 / 90 36) When starting Word, the name of the default document is: a) Document1 b) File1 c) WPD1 d) word1 37 / 90 37) scorn, .edu and .goy- are examples of: a) Protocol b) Top level domain c) Email d) Tag 38 / 90 38) What comes after the analysis phase in the SDLC : a) Support b) Design c) Testing d) Implementation 39 / 90 39) Which of the following memories allows simultaneous read and write operations? a) EEPROM b) RAM c) EPROM d) ROM 40 / 90 40) Software that controls computing resources is called : a) Computing software b) System software c) Package software d) Custom software 41 / 90 41) The electron beam scanning is a characteristic of: a) Flat panel monitors b) Laser printers c) Cathode ray tubes d) Liquid crystal display 42 / 90 42) The memory cells are logically organized into group of: a) 24 bits b) 8 bits c) 5bits d) 12 bits 43 / 90 43) Hardware is best described as : a) Printed copy file b) A program c) Physical parts d) Logical part 44 / 90 44) OMR stand for : a) Optimum mark reader b) Optical map reader c) Optical mark reader d) Optical mark radiation 45 / 90 45) Clipboard stores: a) Repeated text b) Entered text c) Copied text d) Deleted text 46 / 90 46) TCP/IP stands for a) Transfer Collected protocol/International protocol b) Transfered Collector Protocol/Internet Protocol c) Transitional Covered Protocol/Internet Protocol d) Transmission Control Protocol/Internet Protocol 47 / 90 47) C is a: a) Assembly language b) High level language c) Low-level language d) Machine Language 48 / 90 48) Which of the following is used to print large maps and drawing : a) Plotters b) Daisy wheel printer c) Line printer d) Plotters 49 / 90 49) The types.of signals can be: a) Analog b) Digital c) Analog d) Digital and Analog 50 / 90 50) ___________allow the processor to communicate with peripheral devices. a) System bus b) Expansion bus c) Memory bus d) Processor bus 51 / 90 51) The number of bits a computer can process at one time is sometimes called : a) Bit strength b) Word size c) Bit size d) Crunch capacity 52 / 90 52) Which of the following is used to manage files and folders? a) Windows Explorer b) Window Accessories c) Control Panel d) Internet Explorer 53 / 90 53) DNS stands for: a) Decimal Number System b) Dual Number System c) Domain Name System d) Decimal Numeric System 54 / 90 54) Which of the following language provided the basis for the development C a) Pascal b) B c) Java d) C++ 55 / 90 55) A computer program that converts an entire program into machine language at one time is called: a) Simulator b) Compiler c) Interpreter d) Commander 56 / 90 56) In star topology, the central device is called: a) Hub b) Node c) Medium d) links 57 / 90 57) All of the following are top-level domains EXCEPT: a) .org b) .bus c) .gov d) .edu 58 / 90 58) Which of the following is the entering point in Windows? a) My document b) My computer c) Windows explorer d) Desktop 59 / 90 59) Which of the following is a search engine? a) Internet explorer b) Google c) Microsoft d) MIME 60 / 90 60) Which medium transmits voice and data via air as high-frequency radio waves? a) Twisted pair b) Coaxial cable c) Microwave d) Fiber-optic cable 61 / 90 61) Memory consists of: a) Data communication b) Cells c) none of these d) ports 62 / 90 62) Transfers data between main memory and I/O devices without using CPU? a) Port b) BRA c) DMA d) DDA 63 / 90 63) EEPROM stand for a) Electrically Enriched Programmable Read Only Memory b) Electronically Erasable Programmable Read Only Memory c) Easily Erasable Programmable Read Only Memory d) Electrically Erasable Programmable Read Only Memory 64 / 90 64) RAM usually has ______ types a) 5 b) 4 c) 3 d) 2 65 / 90 65) The restricted access to the server computer room is a form of: a) Enterprise security b) Physical security c) User security d) Logical security 66 / 90 66) A network that covers a limited geographic distance such as an office is called: a) MAN b) LAN c) WAN d) TAN 67 / 90 67) The size of the characters to be printed is measured in. a) inches b) Points c) Degrees d) Weight 68 / 90 68) Which multiplexing technique shifts each signal to a different carrier frequency? a) FDM b) TDM c) DFM d) TTD 69 / 90 69) A well-defined set of instructions given to the computer is called: a) Software b) Hardware c) Bug d) None 70 / 90 70) Which of the following is not a type of printer? a) Flatbed b) Impact c) Inkjet d) Laser 71 / 90 71) PTCL is a: a) ISP b) Internet c) Search engine d) Web browser 72 / 90 72) Types of translators are: a) Compilers b) All c) Assemblers d) Interpreters 73 / 90 73) Which of the following is an authentication methodology? a) Access cards b) Piracy c) Biometrics d) PIN 74 / 90 74) A modem allows computers to access other computers through following types of connection a) Cable b) Phone lines c) Offline d) Wireless 75 / 90 75) Which of the following is related to business? a) Banks b) Stock exchanges c) All d) Marketing 76 / 90 76) Which of the following is a web browser? a) Internet Explorer b) Web Search c) Windows Explorer d) System Explorer 77 / 90 77) A bus with 32 lines can carry ______ bytes of data. a) 64 b) 32 c) 2 d) 4 78 / 90 78) The number of frequencies that can fit on a link at one time is called: a) Bandwidth b) Modulation c) Codec d) Demodulation 79 / 90 79) Which of the following method is used in data gathering step of Systems Analysis : a) All b) Questionnaires c) Sampling d) Interview 80 / 90 80) Star topology is less expensive than: a) Tree b) Mesh c) All d) star 81 / 90 81) A programโs syntax errors are detected by: a) Device operator b) Device Driver c) Device System d) Device linking 82 / 90 82) A computer network in which all computers have equal status and no one have control over others: a) Dedicated b) Client-server c) Client-to-client d) Peer-to-peer 83 / 90 83) What type of network is the Internet? a) LAN b) NAN c) MAN d) WAN 84 / 90 84) A collection of raw facts and figure is called: a) Information b) Procedure c) Processing d) Data 85 / 90 85) A computer main function is to : a) Create data from information b) Convert data into information c) Convert information to storage d) Display data 86 / 90 86) FormatC is an example of: a) Trojan horse b) Boot sector c) Chernobal d) Logic Bomb 87 / 90 87) A computer can be linked to the Internet through: a) All b) DSL c) Cable Modem d) Phone-line modem 88 / 90 88) Which of the following is an email client? a) Outlook express b) Mozilla Firefox c) Windows explore d) Internet explorer 89 / 90 89) Another name for free software is: a) Shareware b) Public domain software c) Encrypted software d) Copy protected software 90 / 90 90) Ctrl + Alt + Del is: a) An invalid key combination b) Both b and c c) Recognized by Windows only d) Used to close the active window Your score is LinkedIn Facebook Twitter VKontakte Post Views: 626 Post navigation Aiou Workshop 5403| Test 6 Rawalpindi Board First year Computer Science all past papers MCQS.