quiz selfmade (3)
quiz selfmade (3)
quiz selfmade (3)
a) Operating System
b) Mouse
Answer: b) Mouse
a) To display graphics
c) To perform calculations
d) To control robots
a) Creates websites
a) Yahoo
b) MSN
c) Google
d) Bing
Answer: c) Google
a) Type “weather”
8. What query should you use to convert 100 euros to Pakistani rupees on Google?
a) Currency conversion: 100 euros to PKR
c) Convert euros
d) To find images
10. What does adding a hyphen (-) before a word in a Google query do?
a) $
b) @
c) #
d) :
Answer: a) $
a) “Meaning of [term]”
b) “Define: [term]”
c) “[term] definition”
d) “[term] glossary”
b) Cybersecurity attacks
a) Punch card
b) ENIAC
c) Abacus
d) Vacuum tube
Answer: c) Abacus
1. What is a “bit”?
b) A programming language
c) A type of hardware
d) A storage device
a) Only numbers
b) Only characters
a) AND
b) OR
c) NOT
d) XOR
Answer: c) NOT
a) 2
b) 10
c) 16
d) 8
Answer: c) 16
a) ROM
b) RAM
c) Flash memory
d) Hard disk
Answer: b) RAM
a) Transistors
b) Magnetic disks
c) Optical layers
d) Silicon chips
c) Made of silicon
d) Lower durability
a) Optical technology
b) Flash memory
c) Magnetic disks
d) ROM chips
d) A graphical representation
a) Power method
b) ASCII encoding
c) Optical recording
d) Magnetic storage
a) To enhance quality
a) ASCII encoding
b) Huffman coding
d) Proximity search
a) Cache
b) Bus
c) Hard disk
d) RAM
Answer: b) Bus
a) Hard drive
b) Main memory
c) Cache memory
d) Network server
d) Networking capabilities
a) Data transfer
b) Arithmetic/Logic
c) Control group
d) File management
a) To store data
d) To compress data
a) Bit
b) Instruction
c) Byte
d) Algorithm
Answer: b) Instruction
13. What happens during the “fetch” phase of the machine cycle?
a) Fetch
b) Store
c) Execute
d) Compress
Answer: c) Execute
Lesson 38: Logic Operators
15. Which logic operator returns true only if both operands are false?
a) AND
b) OR
c) XOR
d) NOR
Answer: d) NOR
16. Which logic operator is used to compare two values for inequality?
a) AND
b) XOR
c) NOT
d) NAND
Answer: b) XOR
Answer: a) Moves all bits in a sequence to the left or right, cycling them
a) Logical shift
b) Arithmetic shift
c) Rotate
d) XOR
a) Managing networks
b) Performing calculations
c) Accessing memory
a) Addition (+)
b) Subtraction (-)
c) Multiplication (*)
d) Comparison (=)
c) Writing algorithms
d) Compressing data
b) Device drivers
d) User interface
a) Compressing data
b) Device drivers
c) Application software
d) Database systems
a) A piece of hardware
c) A user account
d) A storage device
a) RAM
b) CPU
c) Operating System
d) Hard Disk
d) A scheduling method
a) Memory partitioning
b) Semaphore mechanism
d) Disk defragmentation
b) Malware installation
c) Phishing emails
a) Firewalls
a) WAN
b) LAN
c) MAN
d) VPN
Answer: b) LAN
a) HTTP
b) SMTP
c) FTP
d) DNS
Answer: b) SMTP
a) Storing data
a) A single network
c) A private server
a) Peer-to-peer
b) Client-server
c) OSI model
d) FTP model
16. What does the application layer in the OSI model handle?
a) Physical connections
b) Data encryption
d) Network routing
c) Personal computers
d) Web browsers
a) Application layer
b) Transport layer
c) Network layer
d) Physical layer
a) SMTP
b) POP3
c) HTTP
d) IP
Answer: b) POP3
a) Central Copy
b) Carbon Copy
c) Common Contact
d) Communication Channel
Answer: b) Carbon Copy
b) Video over IP
d) Dedicated servers
a) Only audio
b) Only video
27. What is the primary protocol used for accessing the World Wide Web?
a) FTP
b) SMTP
c) HTTP
d) TCP
Answer: c) HTTP
a) A web browser
c) An internet protocol
d) A software application
a) To design databases
a) <img>
b) <a>
c) <link>
d) <href>
Answer: b) <a>
a) src
b) alt
c) href
d) path
Answer: a) src
a) <i>
b) <b>
c) <u>
d) <strong>
Answer: b) <b>
c) Compressing images
a) JavaScript
b) PHP
c) SQL
d) Python
Answer: a) JavaScript
a) To manage databases
c) To create animations
a) HTTP
b) FTP
c) TCP
d) DNS
Answer: c) TCP
a) Encrypting data
d) Routing packets
Answer: c) Providing user-specific services
a) Transport layer
b) Internet layer
d) Application layer
a) Phishing
b) Malware injection
c) Data encryption
d) Denial-of-service (DoS)
c) To compress files
a) Firewalls
b) Anti-virus software
d) User authentication
a) A programming language
c) A hardware component
a) Clear instructions
b) Ambiguity
c) Efficiency
Answer: b) Ambiguity
a) Reading input
b) Data encryption
c) Debugging software
d) Compiling a program
3. What is pseudocode?
a) A programming language
c) To manage databases
a) Divide
b) Combine
c) Solve directly
d) Ignore sub-problems
10. Which strategy works by making decisions and then revising them as needed?
b) Backtracking
c) Brute force
d) Recursion
Answer: b) Backtracking
12. What is the time complexity of sequential search in the worst case?
a) O(1)
b) O(n)
c) O(log n)
d) O(n^2)
Answer: b) O(n)
a) Initialization
b) Condition check
c) Iteration
d) Compilation
Answer: d) Compilation
a) A logical error
b) A break statement
c) A syntax warning
d) An increment operation
b) Infinite loops
d) Debugging software
Answer: a) Repeated execution when the number of iterations is known
18. Which statement in a loop changes the flow to the next iteration?
a) Continue
b) Break
c) Return
d) Exit
Answer: a) Continue
b) A large dataset
a) Pretest loop
b) Posttest loop
c) Infinite loop
d) Nested loop
Answer: b) Sorting elements by comparing and inserting them in their correct position
24. What is the time complexity of insertion sort in the worst case?
a) O(log n)
b) O(n)
c) O(n^2)
d) O(n log n)
Answer: c) O(n^2)
Lesson 103: Insertion Sort Algorithm Example
d) Ignores them
26. Which dataset would require the most iterations for insertion sort?
a) O(n)
b) O(log n)
c) O(n^2)
d) O(n log n)
Answer: b) O(log n)
c) A loop-based function
d) A mathematical equation
a) ASCII notation
b) Hexadecimal notation
c) Big-O notation
d) Boolean notation
a) Testing
b) Debugging
10. Which type of testing is performed after all components are integrated?
a) Unit testing
b) Regression testing
c) System testing
d) Static testing
[10:15 pm, 08/12/2024] Noor fatima: Here are MCQs for Lessons 91 to 108:
a) Reading input
b) Data encryption
c) Debugging software
d) Compiling a program
3. What is pseudocode?
a) A programming language
c) To manage databases
a) Divide
b) Combine
c) Solve directly
d) Ignore sub-problems
10. Which strategy works by making decisions and then revising them as needed?
b) Backtracking
c) Brute force
d) Recursion
Answer: b) Backtracking
12. What is the time complexity of sequential search in the worst case?
a) O(1)
b) O(n)
c) O(log n)
d) O(n^2)
Answer: b) O(n)
a) Initialization
b) Condition check
c) Iteration
d) Compilation
Answer: d) Compilation
a) A logical error
b) A break statement
c) A syntax warning
d) An increment operation
b) Infinite loops
d) Debugging software
18. Which statement in a loop changes the flow to the next iteration?
a) Continue
b) Break
c) Return
d) Exit
Answer: a) Continue
b) A large dataset
a) Pretest loop
b) Posttest loop
c) Infinite loop
d) Nested loop
Answer: b) Sorting elements by comparing and inserting them in their correct position
24. What is the time complexity of insertion sort in the worst case?
a) O(log n)
b) O(n)
c) O(n^2)
d) O(n log n)
Answer: c) O(n^2)
d) Ignores them
26. Which dataset would require the most iterations for insertion sort?
a) O(n)
b) O(log n)
c) O(n^2)
d) O(n log n)
Answer: b) O(log n)
Lesson 105: Recursive Control
c) A loop-based function
d) A mathematical equation