100% found this document useful (2 votes)
879 views17 pages

Grand MCQs CS101 Prepration File

The document provides a list of 50 multiple choice questions related to computer science topics like computer graphics, security controls, algorithms, search engines, computer hardware, memory, operating systems, buses, and communication. It encourages subscribing to a YouTube channel called "TECH SOLO SOFT" for more computer science quiz preparation files and important MCQs. The questions cover a wide range of foundational CS concepts in a multiple choice quiz format.

Uploaded by

Hamza Ali Soomro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
879 views17 pages

Grand MCQs CS101 Prepration File

The document provides a list of 50 multiple choice questions related to computer science topics like computer graphics, security controls, algorithms, search engines, computer hardware, memory, operating systems, buses, and communication. It encourages subscribing to a YouTube channel called "TECH SOLO SOFT" for more computer science quiz preparation files and important MCQs. The questions cover a wide range of foundational CS concepts in a multiple choice quiz format.

Uploaded by

Hamza Ali Soomro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

SOHAIL ZUBAIR

PLEASE SUBSCRIBE MY CHANNEL ON YOUTUBE “TECH SOLO SOFT”


CS101 GRAND QUIZ PREPARATION FILE MOST IMPORTANT MCQS.
1. Computer __________ is the discipline of generating images with the aid of computers.
a. Data Base
b. Robots
c. Graphics
d. Network
2. Which controls_____________________ are put in place to provide confidentiality, integrity,
and availability for all components of computer systems.
a. Data Base
b. Robots
c. Security
d. Network
3. An/A _________ is a set of instructions designed to perform a specific task.
a. Flow Chart
b. Algorithm
c. Computer Language
d. Sequence Diagram
4. From following which is not a search engine
a. Google
b. Yahoo
c. Hotmail
d. Apachi
5. If you are searching Virtual University Pages on Google you query should be
a. “virtual university site: youtube.com”
b. “virtual university site on youtube.com”
c. “youtube.com virtual university”
d. “virtual university site; youtube.com”
6. Which query should be used to search a cache version of website?
a. cachhe:youtube.com
b. cache:youtube.com
c. cache;youtube.com
d. cacheversion:youtube.com
7. The ___________ operator finds all those web pages which contains the mentioned query in the
URL of the web pages.
a. “inurl”
b. “intext”
c. “allintitle”
d. “Intitle”
8. the followings and related things must not be searched over the internet Except:
a. Your email
b. Medical issues and drugs
c. Your name
d. Your website
9. Which of the following Dangerous to Search on google?
a. pressure cooker bomb story
b. Suicide bomb
c. Medical Symptoms
d. All of the given
10. One of the earlier computing devices was the _______________.
a. Adda
b. Mark-1
c. Blasé Pascal Computer
d. Abacus
11. ENIAC stands for ______________________
a. electronic numbering integrator and calculator
b. electronic numerical integrator and calculation
c. electronic numerical integrator and calculator
d. electronic numbered integrator and calculator
12. In Computer, all kind of information is stored in ______________.it is the basic unit of storage.
a. ROM
b. Floppy
c. Byte
d. Bit
13. More flexible machines, such as the ENIAC (electronic numerical integrator and calculator)
developed by
a. Charles Babbage
b. Thomas Addison
c. John Mauchly & J. Presper Eckert
d. J. Presper Eckert
14. Representing character “A” we need to represent it using digit __________
a. 66
b. 65
c. 64
d. 67
15. ____________takes one input, produces 1 when input is 0 and produces 0, when the input is 1
a. Or operation
b. XOR operation
c. And operation
d. Not operation
16. In the Hexadecimal number system the base is _____
a. 10
b. 8
c. 2
d. 16
17. Computer contains a large collection of circuits (such as flip -flops), each capable of storing ____
a. Single bit
b. Double bit
c. Zero
d. None to use for storing
18. To identify individual cells in a Computer’s main memory, each cell is assigned a unique “name,”
called__________________.
a. Its Location
b. Its address
c. Its value
d. None of given
19. The types of RAM ________________ that applies additional techniques to decrease the time
needed to retrieve the contents from its memory cells
a. DRAM
b. PRAM
c. SDRAM
d. EPRAM
20. Time required to move the read/write heads from one track to another is called______
a. Rotation Delay
b. Access Time
c. Seek Time
d. Move time
21. The sum of seek time and rotation delay is called_______
a. Transfer time
b. Access Time
c. Product delay
d. Transfer rate
22. DVD stands for
a. Digital Video Disk
b. Digital Video Data
c. Digital Versatile Disks
d. Different Verity Disk
23. Which statement is false regarding Pixel
a. Collection of dots – Pixel short for Picture Element.
b. Appearance of each pixel is encoded to form bit map.
c. Collection of lines and curves
d. None of the above.
24. MIDI stands for
a. Musical Instrument Digital Interface
b. Medium Instrument Digital Interface
c. Musical Instrument Data Interface
d. Multiplexer Instrument Data Interface
25. Data compression schemes fall into two categories. Some are lossless, others are_________.
a. Loss free
b. Loss able
c. Lossy
d. Loss
26. Another lossless data compression technique is __________________________
a. frequency-dependent encoding
b. frequency-Independent encoding
c. Haffman codes
d. None of given
27. A variation of dictionary encoding is ______________________________
a. dynamic dictionary encoding
b. adaptive dictionary encoding
c. selective adaptive dictionary encoding
d. both a & b
28. The MPEG standard developed under the leadership of ________________
a. IEEE
b. ISO
c. OSI
d. FCC
29. HDTV stands for
a. Host driven TV
b. High Defect TV
c. High Definition TV
d. High Demand TV
30. MPEG stands for
a. Motion Picture Experts Group
b. Motion Priority Experts General
c. Motion Picture Experts General
d. Mandatory Picture Experts Group
31. The best-known system for compressing audio is_________
a. MPEG
b. JPEG
c. MP3
d. MP4
32. The __________ unit, which contains the circuitry for coordinating the machine’s activities
a. Control
b. ALU
c. Memory Unit
d. Register
33. The _____________ registers serve as temporary holding places for data being manipulated by
the CPU.
a. Special purpose
b. General-purpose
c. Temporary purpose
d. Necessary purpose
34. CPU and main memory are connected by a collection of wires called a _____________
a. Register
b. Address
c. Grand Cable
d. Bus
35. Early computers were not known for their ____________
a. Performance
b. Speed
c. Complexity
d. Flexibility
36. The idea of storing a computer’s program in its main memory is called the ______________
a. stored-program concept
b. Loader Program
c. Storing
d. Memory Unit
37. This collection of instructions along with the encoding system is called the _____
a. Machine language.
b. Complier
c. Assembler
d. Interpreter
38. RISC stands for
a. reduced arithmetic set Components
b. ready arithmetic serial connection
c. reduced instruction set computer
d. reduced instruction set Connection
39. RISC architecture is that such a machine is efficient, fast, and _________to manufacture.
a. less expensive
b. more expensive
c. less complex
d. more complex
40. CISC Stands for?
a. Complete instruction set computer
b. Common instruction set computer
c. Complex instruction set computer
d. Critical instruction set computer
41. a machine’s instructions can be categorized into _____________ grouping
a. two
b. three
c. four
d. five
42. The _________ group consists of the instructions that tell the control unit to request an activity
within the arithmetic/logic unit.
a. Control
b. Data transfer
c. arithmetic/logic
d. None of given
43. The order is as the instructions are stored in memory otherwise specified by a ___________
a. Goto
b. Jump
c. Branch
d. Priority
44. The ____________ contains the address of next instruction to be executed
a. Instruction Register
b. Program Counter
c. Memory register
d. Flag
45. Bitwise operations that combine ___________ strings of bits to produce a single output string
by applying the basic operation to individual columns.
a. Two
b. Three
c. Four
d. One
46. The result of XORing these patterns would produce?
1010
1011
a. 1011
b. 1010
c. 0001
d. 1001
47. Shifts that leave the sign bit unchanged are sometimes called_________________________.
a. Bitwise operator
b. Binary shift
c. Arithmetic shifts
d. None of given
48. USB stands for?
a. Universal Synchronous Bus
b. Universal Serial Bus
c. Universal System Bus
d. Universal Synchronous Bandwidth
49. The ability of a controller to access main memory is known as ________________
a. Carrere Sense Multiple Access
b. Direct Memory Access
c. Controller Memory Access
d. Bus Controller
50. Communication between computing devices is handled over _______types of paths
a. Two
b. Three
c. Five
d. Seven
51. USB and FireWire are examples __________ type of communication over a short distance.
a. Parallel communication
b. Serial communication
c. Direct communication
d. Indirect communication
52. Electric pulses travel through a wire __________ than the speed of light.
a. no faster
b. more faster
c. equal to the speed of light
d. none of given
53. ___________, which refers to the total amount of work the machine can accomplish in a given
amount of time.
a. Bandwidth
b. Efficiency
c. Throughput
d. Both A & C
54. The computers of the 1940s and 1950s were not very______________.
a. Complex
b. Efficient
c. Flexible
d. All of the given
55. The execution of each program, called a ____________
a. Code
b. Compiler
c. Job
d. Program
56. ___________ the execution of jobs by collecting them in a single batch, then executing them
without further interaction with the user.
a. Group processing
b. Time sharing
c. batch processing
d. multiuser
57. In batch processing systems, the jobs residing in mass storage wait for execution mass storage is
called ____________
a. Main memory
b. Batch queue
c. Processing queue
d. Job queue
58. Processor's time which is shared among multiple users simultaneously is termed as ____?
a. Real-time Processing
b. Batch Processing
c. Multi-programming
d. Time sharing
59. Multiprogramming operating systems to maximize ___________ so that to reduce the idle time
of the CPU.
a. Memory utilization
b. I/O utilization
c. CPU utilization
d. Code utilization
60. You may work on a word document with one program while listening to music as the same time
with another program this is example of ____________ type of operating system.
a. Real Time
b. Batch Processing
c. Multi-programming
d. Multi-tasking
61. Computer software are divided into __________ broad categories
a. 2
b. 4
c. 6
d. 8
62. _________________consists of the programs for performing tasks particular to the machine’s
utilization.
a. System software
b. Application software
c. Operating system
d. Linux
63. GUI stands for
a. Graphic User Interface
b. Graphical User Interface
c. Geographical User interface
d. Graphical User Interaction
64. A ________ refers to the part of an operating system, program, or device that allows a user to
enter and receive information.
a. Shall
b. I/O controller
c. user interface (UI)
d. none of given
65. An important component within today’s GUI shells is the ____________________?
a. MS-DOS
b. Shell
c. window manager
d. Application manger
66. In contrast to an operating system’s user interface, the internal part of an operating system is
called the ______________.
a. Kernel
b. Interpreter
c. Compiler
d. Shell
67. The central part of an operating system is the ____________?
a. GUI
b. Shell
c. Interface
d. Kernel
68. What is operating system?
a) collection of programs that manages hardware resources
b) system service provider to the application programs
c) link to interface the hardware and application programs
d) all of the mentioned
69. Which one of the following is not true?
a) kernel is the program that constitutes the central core of the operating system
b) kernel is the first part of operating system to load into memory during booting
c) kernel is made of various modules which cannot be loaded in running operating system
d) kernel remains in the memory during the entire computer session
70. Which one of the following error will be handle by the operating system?
a) power failure
b) lack of paper in printer
c) connection failure in the network
d) all of the mentioned
71. What is the main function of the command interpreter?
a) to get and execute the next user-specified command
b) to provide the interface between the API and application program
c) to handle the files in operating system
d) none of the mentioned
72. By operating system, the resource management can be done via __________
a) time division multiplexing
b) space division multiplexing
c) time and space division multiplexing
d) none of the mentioned
73. For the convenience of the machine’s users, most file managers allow files to be grouped into a
bundle called a ______________
a. Batch
b. Directory
c. Folder
d. Directory or folder.
74. A chain of directories within directories is called a__________________.
a. Directory hierarchy
b. directory path
c. Directory group
d. None of given
75. A ___________ is a computer program that controls a particular device that is connected to
your computer.
a. Virus
b. Worms
c. device driver
d. utility software
76. An imaginary memory area supported by some operating systems (for example, Windows but
not DOS) in conjunction with the hardware.
a. Windows manager
b. Conceptual memory
c. Virtual memory
d. RAM
77. In a general-purpose computer, a program called the ___________ is permanently stored in the
machine’s ROM.
a. Program loader
b. CMOS
c. boot loader
d. kernel
78. The activity of executing a program under the control of the operating system is known as a
______________
a. Thread
b. Memory block
c. Process.
d. Application program
79. The systems which allow only one process execution at a time, are called __________
a) uniprogramming systems
b) uniprocessing systems
c) unitasking systems
d) none of the mentioned
80. In operating system, each process has its own __________
a) address space and global variables
b) open files
c) pending alarms, signals and signal handlers
d) all of the mentioned
81. A process can be terminated due to __________
a) normal exit
b) fatal error
c) killed by another process
d) all of the mentioned
82. In Unix, Which system call creates the new process?
a) fork
b) create
c) new
d) none of the mentioned
83. What is the ready state of a process?
a) when process is scheduled to run after some execution
b) when process is unable to run until some task has been completed
c) when process is using the CPU
d) none of the mentioned
84. What is interprocess communication?
a) communication within the process
b) communication between two process
c) communication between two threads of same process
d) none of the mentioned
85. A set of processes is deadlock if __________
a) each process is blocked and will remain so forever
b) each process is terminated
c) all processes are trying to kill each other
d) none of the mentioned
86. Which of the following two operations are provided by the IPC facility?
a) write & delete message
b) delete & receive message
c) send & delete message
d) receive & send message
87. The __________ allocates space in the process table
a. Scheduler
b. Memory manager
c. File manager
d. Dispatcher
88. An un-interruptible unit is known as ____________
a) single
b) atomic
c) static
d) none of the mentioned
89. Semaphore is a/an _______ to solve the critical section problem.
a) hardware for a system
b) special program for a system
c) integer variable
d) none of the mentioned
90. If the semaphore value is negative ____________
a) its magnitude is the number of processes waiting on that semaphore
b) it is invalid
c) no operation can be further performed on it until the signal operation is performed on it
d) none of the mentioned
91. The TestAndSet instruction is executed :
a) after a particular process
b) periodically
c) atomically
d) None of these
92. a __________ occurs when a process or thread enters a waiting state because a requested
system resource is held by another waiting process.
a. Close loop
b. Deadlock
c. Deathlike
d. Process overlap
93. This technique of holding data for output at a later but more convenient time is called_______.
a. Spooling
b. Sniffing
c. Remerging
d. Store and forward
94. An important task performed by operating systems is to protect the computer’s resources from
access by ______________.
a. Multiple user
b. Database administrator
c. Semaphore
d. Unauthorized personnel
95. Which user has/have the highly privileged access to the operating system?
a. Guest user
b. Administrator
c. Super user
d. Both B & C
96. A ________________ is a software or hardware tool that allows the user to monitor your
internet traffic in real time.
a. MAC spoofing
b. Spooler
c. Sniffer
d. Trojan horse
97. What is the benefit of the Networking?
A. File Sharing
B. Easier access to Resources
C. Easier Backups
D. All of the Above
98. Which of the following is not the Networking Devices?
A. Gateways
B. Linux
C. Routers
D. Firewalls
99. What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
100. Which of the following can be Software?
A. Routers
B. Firewalls
C. Gateway
D. Modems
101. What is the use of Ping command?
A. To test a device on the network is reachable
B. To test a hard disk fault
C. To test a bug in a Application
D. To test a Pinter Quality
102. The IETF standards documents are called ________
a) RFC
b) RCF
c) ID
d) DFC
103. In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are ___________
a) Added
b) Removed
c) Rearranged
d) Modified
104. When collection of various computers seems a single coherent system to its client, then
it is called _________
a) computer network
b) distributed system
c) networking system
d) mail system
105. In computer network nodes are _________
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned
106. Communication channel is shared by all the machines on the network in ________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network
107. Bluetooth is an example of __________
a) personal area network
b) local area network
c) virtual private network
d) wide area network
108. A __________ is a device that forwards packets between networks by processing the
routing information included in the packet.
a) bridge
b) firewall
c) router
d) hub
109. Network congestion occurs _________
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure
110. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
111. DSL telcos provide which of the following services?
a) Wired phone access
b) ISP
c) Wired phone access and ISP
d) Network routing and ISP
112. How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5
b) 7
c) 6
d) 10
113. Which of the following layers is an addition to OSI model when compared with TCP IP
model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer
114. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive
data at B is ____________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
115. Physical or logical arrangement of network is __________
a) Topology
b) Routing
c) Networking
d) Control
116. __________As an example of a more recent Internet application
a. HTTP
b. FTP
c. MS Office
d. VoIP
117. Data communication system within a building or campus is________
a) LAN
b) WAN
c) MAN
d) PAN
118. WAN stands for __________
a) World area network
b) Wide area network
c) Web area network
d) Web access network
119. _____ is the multiplexing technique that shifts each signal to a different carrier
frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM

120. What are the Three common types of computer Networks?


a.
ROM, MAN,LAN
b.
RAM,WAN,LAN
c.
MAN,LAN,WAN
d.
NONE OF THE ABOVE
121. A DNS client is called _________
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
122. DNS database contains _______
a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
123. Wildcard domain names start with label _______
a) @
b) *
c) &
d) #
124. The domain name system is maintained by _______
a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned
125. HTML stands for
a. Hyper Text Transfer Protocol
b. Hyper Text Transfer Process
c. Hyper Text transformation Protocol
d. Hyper Transit Transfer Protocol
126. A computer ________ is a malicious code which self-replicates by copying itself to other
programs.
a) program
b) virus
c) application
d) worm.
127. Which of the following is a type of program that either pretends to have, or is described
as having, a set of useful or desirable features but actually contains damaging code.
A) Trojans
B) Viruses
C) Worm
D) Adware
E) Bots
128. Which of the following is a software that, once installed on your computer, tracks your
internet browsing habits and sends you popups containing advertisements related to the sites
and topics you’ve visited?
A) Backdoors
B) Adware
C) Malware
D) Bots
E) Spyware
129. What is the software called that’s designed to exploit a computer user and is a broad
term covering computer viruses, worms, Trojan, adware, etc.?
A) Backdoors
B) Key-logger
C) Malware
D) Bots
130. What is the software called which when get downloaded on computer scans your hard
drive for personal information and your internet browsing habits?
A) Backdoors
B) Key-logger
C) Malware
D) Spyware
131. ____________is an artificial and informal language that helps programmers
develop algorithms.
a. Pseudo code
b. Program
c. Flowchart
d. None of given

You might also like