/119
0 votes, 0 avg
7

ICT MCQS QUIZZES

AIOU students ICT QUIZZES

1 / 119

1. A collection of related web pages is called

2 / 119

2. A device that connect multiple networks using similar or different protocol;

3 / 119

3. The keyboard format that is most commonly used

4 / 119

4. The microphone converts the sound into

5 / 119

5. Trojan Horse is an example of

6 / 119

6. A small image that represents a program folder or file is called

7 / 119

7. The folder which contains administrator tools is

8 / 119

8. Format C is an example of

9 / 119

9. Analog signals are measured into

10 / 119

10. Formula of instructions that run the computer is

11 / 119

11. Soft copy refers to

12 / 119

12. A work book is a collection of

13 / 119

13. Web pages are written in which type of language is

14 / 119

14. The process of converting digital signals into analog signals via modem is

15 / 119

15. common font size used in business document is:

16 / 119

16. CBT software is used in

17 / 119

17. World wide web was established in:

18 / 119

18. The number of argument in SQRT() function in MS-excel is are

19 / 119

19. Electronic banking is also known as?

20 / 119

20. Which of the following is not an Antivirus program :

21 / 119

21. The actual working area in micro soft excel is

22 / 119

22. the minimum number of primary partitions that can be created on a basic disk are

23 / 119

23. A set of instruction that run the computer are

24 / 119

24. The devices that are automatically detected by windows are called

25 / 119

25. The term that refers to all input, output and secondary storage devices is called:

26 / 119

26. Communication between computer and keyboard involve the transmission:

27 / 119

27. Which of the following contains the administrative tools in operating system :

28 / 119

28. Dejure means

29 / 119

29. Which one of the following is not a cause of virus

30 / 119

30. The topology used for a small number of computer is called

31 / 119

31. The program that contains the instructions to operate a device is called

32 / 119

32. The component of CPU which responsible for interacting with RAM is

33 / 119

33. Which of the following is an example of system software?

34 / 119

34. which of the following can be used to launch the word art :

35 / 119

35. The operating system based on NT technology is:

36 / 119

36. A communication signal in the form of a continuous wave is called:

37 / 119

37. The output of the compiler is called

38 / 119

38. Most applications of robotics are in which area

39 / 119

39. Which one is the fastest

40 / 119

40. The device uses parallel transmission:

41 / 119

41. The process of producing multiple copies of a document is called

42 / 119

42. Trojan Horse is a type of

43 / 119

43. Which one is a an Automatic programmable machine:

44 / 119

44. Temporary storage area within CPU is called:

45 / 119

45. GUI stands for?

46 / 119

46. OSI model consists of

47 / 119

47. The top most layer of OSI model is

48 / 119

48. How many bits are there in 4-bytes?

49 / 119

49. Which is a type of RAM:

50 / 119

50. physical path that connects the source and receiver is known as;

51 / 119

51. Transferring information from computer to internet is called

52 / 119

52. Which components is used to connect different parts of the computer together?

53 / 119

53. Which of the following is used to get voice output

54 / 119

54. in spread-sheet,by default rows are labeled by:

55 / 119

55. Data processing is also known as:

56 / 119

56. Which function key is used for checking spelling and grammar in MS word

57 / 119

57. Which technology is used to read data on cheques

58 / 119

58. Which one is a faster memory?

59 / 119

59. Printed images can be converted into digital form using

60 / 119

60. XGA resolution is:

61 / 119

61. Temporary storage are within CPU is called

62 / 119

62. BIT stands for:

63 / 119

63. Which is not a bio metric technique for person identification

64 / 119

64. A device that connect multiple network using similar or different protocol is a :

65 / 119

65. how many types of language translator are there?

66 / 119

66. physical path that connects the source and receiver is known as:

67 / 119

67. Television and radio broadcasts are example of

68 / 119

68. A person who gains illegal access to a computer system is called

69 / 119

69. The fly-by-wire system is called used in

70 / 119

70. The extension of Ms-Word is :

71 / 119

71. Which of the following is not a type of bus in computer?

72 / 119

72. In MS-Excel, formula begins with:

73 / 119

73. Default name of first sheet in any work book is

74 / 119

74. RAM usually has ——types

75 / 119

75. Digital signals are commonly known as

76 / 119

76. The software which is used to control all part of manufacturing process is called :

77 / 119

77. Which of the following technique is used for modulation

78 / 119

78. which of the following techniques uses modulation?

79 / 119

79. How many characters ASCII-7bit code represents?

80 / 119

80. The communicational channels can be divided into

81 / 119

81. The extension of an executable file is

82 / 119

82. DSL stands for

83 / 119

83. How many characters ASCII-7bit code represents?

84 / 119

84. The process of transferring a file from remote computer to our local computer is

85 / 119

85. Which is not an output device

86 / 119

86. Which of the following keyboard shortcuts is used to change the case:

87 / 119

87. We press enter key in Ms word to create a

88 / 119

88. which of following coding scheme used by IBM

89 / 119

89. Clipboard stores—– in word processing.

90 / 119

90. Which of the following is not an example of system software

91 / 119

91. The length of IP address is

92 / 119

92. Another word for pointer is:

93 / 119

93. Electronic circuits that executes computer instructions is called

94 / 119

94. Which communication medium requires line-of-sight

95 / 119

95. which of following is not a type of network :

96 / 119

96. How many types of addressing scheme are there :

97 / 119

97. one or more computer connected to a hub is called:

98 / 119

98. Another name of antivirus is:

99 / 119

99. The secret word or number used for computer security is called:

100 / 119

100. layer that is responsible for transferring frames in OSI model is

101 / 119

101. The computers or internet that contain website are called

102 / 119

102. Testing all program components together in SDLC is called

103 / 119

103. CPU sends commands signals through

104 / 119

104. Terminators are used in——topology

105 / 119

105. Which of the following is an Antivirus ?

106 / 119

106. Making illegal copies of copyrighted software is called

107 / 119

107. A virus that replicate itself is called

108 / 119

108. The function that is used to get the maximum value in MS excel is called

109 / 119

109. The register holds the address of the next instruction to be fetched for execution

110 / 119

110. The keyboard layout that is most commonly used is the

111 / 119

111. The program that contain instruction to operate a device is called :

112 / 119

112. Which devices connects each computer to a network?

113 / 119

113. Moving up or down in word processing document is called

114 / 119

114. Data shown on display unit or played through audio is called

115 / 119

115. The microphone converts the sound into

116 / 119

116. Which is a communication device

117 / 119

117. one or more network connected to hub is called;

118 / 119

118. Software that is available free for a limited period is called

119 / 119

119. Each computer on a network is called

Your score is

0%

AIOU attempts to utilize innovation to understand its central goal; exceptional center has been given to Information and Communication Technology (ICT) to contact however many understudies as could be allowed and to wipe out the time space obstructions among instructors and understudy to involve ICT for reinforcing of managerial and adjusting divisions to contend industry.

The Information and Communication Technology Directorate of Allama Iqbal Open University is commanded to give IT principles, rules and strategy, vital arrangement, and advancement in the University. ICT Directorate keeps up with oversight for issues designated under this locale, and acts legitimately inside the extent of laid out approaches, systems and rules for its activities. Directorate of ICT’s liabilities and authority have developed since its creation. Directorate of ICT endeavors to offer committed Types of assistance to Staff, Students, Researchers, Faculty, Administration and Management. These particular administrations include:

� Create, carry out, and oversee organization to give a more powerful, proficient, and secure University wide framework;
� Give upgraded and extended broadcast communications administrations to meet the developing necessities of offices and units in the University;
� Help offices and units in giving secure, dependable, University wide IT tasks;
� Advance digital and organization security through oversaw and secure organization.
� Arrange and oversee University wide arrangements for quality IT items and administrations to decrease the expense and increment the worth of equipment, programming, and administrations;
� Create and carry out a venture engineering for AIOU that outcomes in rules and principles for data innovation;
� Give planning, and particular benchmarking endeavors that are directed by an unmistakable vision and objectives to make policymaking more engaged, powerful and client driven.
� To Promote Innovative Use of Information Technology that Adds Value to the scholastic climate
� To safeguard Technology and Information Assets.

Sections Of Directorate Of ICT

So as to offer productive types of assistance for its Students, Tutors and Faculty, AIOU has laid out new divisions and �Directorate of Information and Communication Technology� is one significant new office among those. This division has been laid out with following destinations.

This office has been laid out with following destinations.

  1. Innovative change of AIOU into a cutting edge Open Distance Learning University.
  2. Electronic media improvement to help Open Distance Learning.
  3. Online help administrations for Academic and Administrative capacities.
  4. To offer further help to the understudies and mentors of the college.
  5. To overhaul students� support benefits proficiently and successfully with the assistance of ICT and other present day advancements.

Under the radiance of above destinations, the Directorate plans to enjoy following forward going exercises:
� Foundation of elite level 3 prepared server farm with DR locales interconnected by means of secure VPN associations.
� Procure rapid worldwide network to work with the examination, e-Learning and understudy support administrations.
� Foundation of in-house programming improvement game plan (Al-Kasib) to cook the product needs of the college as well as give hands on learning open doors to our CS/IT understudies.
� Foundation of Management Information System to offer better help administrations to college staff as well as understudies.
� Foundation of Decision Support System for better arrangement/evaluation and work on the nature of administrations.
By actually laying out above help administrations and offices following partners will be benefited:

Leave a Reply

Your email address will not be published. Required fields are marked *