Spread the love/90 95 Aiou Workshop 5403| Full Test 1 / 90 1) Which value in start bit indicates that the transmission line is idle? a) .4 b) .2 c) .3 d) .1 2 / 90 2) Computer virus is simply a: a) Hardware component b) Set of computer instructions or code c) Type of bacteria d) A disease 3 / 90 3) XGA supports the resolution up to: a) 800×600 b) 640×400 c) 1024×768 d) 640×480 4 / 90 4) How many types of addressing scheme are used on the Internet? a) 8 b) 2 c) 3 d) 5 5 / 90 5) Full-duplex communication is made. possible by the.devices known as: a) Modem b) Multiplexer: c) .Mouse d) ..Keyboard. 6 / 90 6) Which pointing device is commonly used for gaming. a) Pointing stick b) Touchpad c) Joystick d) Light pen 7 / 90 7) Compiled programs typically, execute faster because: a) None of the above b) Compiled programs are read and executed a line at a time c) Compiled programs do not require any data d) Compiled programs are already in a machine-readable form. 8 / 90 8) The process of producing multiple copies of a document is called: a) Reprographics b) Spreadsheet c) Image processing d) Word processing 9 / 90 9) Which function key is used for checking spelling and grammar in Word? a) F1 b) F2 c) F12 d) F7 10 / 90 10) Which of the following features is provided with a modem? a) Transmission rate b) All c) Self-testing d) Speeds 11 / 90 11) A virus that replicates itself is called: a) Vaccine b) Worm c) Bug d) Bomb 12 / 90 12) A bit can represent how many different values : a) 3 b) 5 c) 1 d) 2 13 / 90 13) Two dissimilar networks can be connected by a: a) Bus b) Gateway c) Bridge d) a and b 14 / 90 14) The files can exist in folders but folders cannot exist in: a) Subfolders b) Paths c) Files d) Folders 15 / 90 15) Which of the following transmission media is used in LAN? a) Telephone line b) Satellite c) Microwave d) Coaxial cable 16 / 90 16) Which of the following services is provided by the operating system? a) Hardware Management b) User interface c) All of these d) File-system Management 17 / 90 17) Protecting computers and the information they contain against unwanted access is called: a) Electronic policing b) Computer security c) Computer monitoring d) Audit control 18 / 90 18) A collection of raw facts and figure is called: a) Information b) Procedure c) Data d) Processing 19 / 90 19) Times New Roman is an example of a: a) Sans serif font b) Three-dimensional font c) Serif font d) Boldface font 20 / 90 20) The four numbers in an IP address are called:: a) Octal b) Codec c) Octets d) Bytes 21 / 90 21) The area in which text is entered, manipulated and viewed is called: a) Window b) Document window c) Text area d) Documentation area 22 / 90 22) A telephone conversation is’an example of:. a) Simplex transmission b) Half-duplex transmission c) .Duplex transmission d) Full-duplex transmission: 23 / 90 23) Star topology is less expensive than: a) Mesh b) Tree c) All d) star 24 / 90 24) Transmission media are usually categorized as_ a) Good and bad b) Baseband and broadband c) Guided or unguided d) Fixed or unfixed 25 / 90 25) CPU includes all of the following components EXCEPT a) Control Unit b) Primary storage c) Register d) ALU 26 / 90 26) Which menu is used to insert page numbers in the document? a) Insert b) File c) Format d) Window 27 / 90 27) CPU stands for : a) Central product unit b) Central programming unit c) Central processing unit d) Computing program usage 28 / 90 28) ALU has _______ units: a) 3 b) 4 c) 5 d) 2 29 / 90 29) Which of the following is not a Secondary storage device : a) DVD-ROM b) Hard disk c) CD-ROM d) CPU 30 / 90 30) The device driver is a type of : a) Application software b) Package software c) System software d) Utility program 31 / 90 31) Computer programs are also known ac a) Firmware b) Software c) Hardware d) None 32 / 90 32) Font effects include: a) All b) Strikethrough c) Outline d) Shadow 33 / 90 33) GB is approximately : a) 100KB b) 100MB c) 1024MB d) 1000KB 34 / 90 34) DSL stands for a) Digital Subscriber Link b) Distance Server Line c) Digital subscriber Line d) Domain System Line 35 / 90 35) The electron beam scanning is a characteristic of: a) Cathode ray tubes b) Flat panel monitors c) Laser printers d) Liquid crystal display 36 / 90 36) CBT stands for: a) Computer Based training b) Certificate Based Training c) Computer Basic Training d) Computer Based Trade 37 / 90 37) The communication across WAN occurs using: a) Any b) Satellite links c) Microwaves d) Telephone Line 38 / 90 38) The binary number 0 and 1 is represented by a : a) Character b) Word c) Bit d) Byte 39 / 90 39) The types of files that can be attached to an e-mail message include: a) Spreadsheets b) Text c) All d) Graphics 40 / 90 40) An example of a pointing device used with portable computers is: a) Trackball b) All c) Pointing stick d) Touchpad 41 / 90 41) The arithmetic/logic unit can perform a) subtraction b) Multiplication c) Addition d) All 42 / 90 42) Which of the following is a biometric technique for person identification? a) PIN b) Password c) Access card d) Fingerprint 43 / 90 43) Which of the following is an example of packaged software : a) All b) MS power point c) MS excel d) MS word 44 / 90 44) Which of the following media can be used for backup? a) Floppy Diskette b) Tape Device c) Zip Disk d) All 45 / 90 45) NIC allows direct connection to: a) Modem b) Printer c) Network d) Moniter 46 / 90 46) The smallest unit of information in the computer is : a) Character b) Word c) Bit d) Byte 47 / 90 47) Electronic commerce (e-commerce) is the process of: a) Sharing of business information b) Maintaining business relationship c) Conducting business transactions d) All 48 / 90 48) The word window has many commonelements of a typical window such as: a) All b) Borders c) Menu bar d) Title bar 49 / 90 49) which of the following header a) None b) conio.h c) math.h d) stdio.h 50 / 90 50) SUPARCO department gives information about: a) ROBOT b) Airline c) Chatting d) Weather 51 / 90 51) Computers derive its basic strength from: a) Accuracy b) Memory c) Speed d) All 52 / 90 52) Which of the following language provided the basis for the development C a) C++ b) B c) Java d) Pascal 53 / 90 53) A feature commonly available with word processors is: a) All b) Multicolumn tables c) Spell checker d) Automatic footnoting 54 / 90 54) The layer that provides services that directly support user application: a) transport layer b) Session layer c) Presentation layer d) Application layer 55 / 90 55) Which of the following is the entering point in Windows? a) Windows explorer b) My computer c) My document d) Desktop 56 / 90 56) A set of rules that must be followed to develop a program is called: a) Bug b) Preprocessor c) Syntax d) Debug 57 / 90 57) The extension of C source program is: a) .c b) .exe c) .h d) .obj 58 / 90 58) Which of the following can be used to launch the word Art a) Ruler b) status bar c) Drawing toolbar d) Standard toolbar 59 / 90 59) Which of the following has the fastest speed? a) SRAM b) ROM c) EEPROM d) Cache 60 / 90 60) The extension of the header file is: a) .txt b) .CPP c) .c d) .h 61 / 90 61) Which of the following key is used to load a program it memory to run? a) CTRL+S b) ALT+F9 c) CTRL+F9 d) ALT+F5 62 / 90 62) stdio stands for: a) String input-output b) Symbolic input output c) Standard input output d) Simple input output 63 / 90 63) The boards used to connect additional devices to the computer are connected to the motherboard thr a) Expansion slots b) Connectors c) Sector d) Links 64 / 90 64) Which type of network covers a small area? a) NAN b) MAN c) LAN d) WAN 65 / 90 65) The output of the compiler is called: a) Linked code b) Source code c) Library code d) Object code 66 / 90 66) Times New Roman is an example of a: a) Sans serif font b) Boldface font c) Serif font d) Three-dimensional font 67 / 90 67) Which of the following task is related to Preliminary investigation : a) All b) System scope c) System specifications d) Feasibility study 68 / 90 68) Add New Hardware option is available in: a) Control panel b) Status bar c) Task bar d) Main menu 69 / 90 69) The expression may be: a) arithmetic expression b) Constant c) string d) All 70 / 90 70) A device used to connect similar networks is called: a) Bus b) Bridge c) All d) Gateway 71 / 90 71) BCD stands for: a) Bidirectional coded decimal b) Byte coded decimal c) Base coded decimal d) Binary coded decimal 72 / 90 72) Computer is a combination of : a) Knowledge b) Both a and b c) hardware d) software 73 / 90 73) The temporary storage area within CPU is called: a) RAM b) Registers c) ROMs d) HDD 74 / 90 74) Which malicious program is activated when a specific set of conditions are met? a) Trojan horse b) Worm c) Virus d) Logic bomb 75 / 90 75) Pictures can be added to the document by selecting ________ option from menu bar a) Go-TextBox b) Insert-Picture c) Input-TextBox d) Enter-TextBox 76 / 90 76) The shape of the insertion point symbol is: a) Vertical line b) Arrow c) Horizontal line d) Circle 77 / 90 77) Bps is short for: a) Bytes per second b) Binary packets a second c) Baud per second d) Bits per second 78 / 90 78) EEPROM chips: a) Can be reprogrammed electronically b) none of these c) Can be reprogrammed by ultraviolet light d) Cannot be reprogrammed 79 / 90 79) Which of the following is used for static RAM technology? a) Secondary storage b) Primary memory c) Registers d) Cache memory 80 / 90 80) conio stands for: a) Console input output b) Complex input output c) Character input output d) Common input output 81 / 90 81) A program that interferes with the normal working of a computer is called: a) Freeware b) Bateria c) Virus d) Antivirus 82 / 90 82) FDDI is a __________network. a) Star b) Tree c) Mesh d) Ring 83 / 90 83) The benefits of CAD include: a) All b) Speed & flexibility of c) Repeatability d) Accuracy 84 / 90 84) The hardware component that permanently holds data and program is called : a) CPU b) Output c) Primary storage d) Secondary storage 85 / 90 85) .The conversation over a walkie-talkie radio is-an example of: a) Duplex transmission b) Half-duplex transmission. c) Simplex transmission d) Full-duplex transmission 86 / 90 86) Data can be erased using ultraviolet rays written on: a) EPROM b) EPROM c) EEPROM d) RAM 87 / 90 87) The most commonly used LAN protocol is: a) WiMax b) Token Ring c) Ethernet d) ARCnet 88 / 90 88) OSI reference model has: a) 9 layers b) 2 layers c) 7 layers d) 5 layers 89 / 90 89) Which of the following is based on NT Technology? a) Window 3.1 b) Windows 95 c) Windows 2000 d) Windows 90 / 90 90) DFD stand for : a) Digital Flow Diagram b) Data Flow Design c) Data Flow Diagram d) Data Definition Diagram Your score is LinkedIn Facebook Twitter VKontakte Post Views: 381 Post navigation Aiou Workshop 5403| Test 6 Rawalpindi Board First year Computer Science all past papers MCQS.