Ch-01: Computer System - MCQs - PDF
Ch-01: Computer System - MCQs - PDF
Chapter
01 Computer Systems
MULTIPLE CHOICE QUESTIONS
1. The computer system primarily consists of:
a. Hardware b. Software
c. Peripheral devices d. Hardware and software
2. Which component of CPU performs arithmetic and logical operations?
a. Memory unit b. Control unit
c. Arithmetic and Logic unit d. Output unit
3. Which component of a computer system presents the processed results to the
user?
a. input devices b. output devices
c. CPU d. Memory
4. Which component of a computer system receives data from the user?
a. Input devices b. Output devices
c. CPU d. Memory
5. The main function of CPU in a computer system is to:
a. Store data permanently b. Perform calculations
c. Display output d. Access Internet
6. How many states does an electronic switch have?
a. One b. Two
c. Three d. Four
7. The binary system uses two digits _____ to represent information.
a. 1 and 2 b. 0 and 2
c. 0 and 1 d. 1 and 10
1|P age
Computer Science Class-11
2|P age
Computer Science Class-11
16. An ______ is a continuous electrical signal that can vary over a range of values:
a. Digital signals b. Analog signals
c. Binary signals d. Discrete signal
17. What type of waveform represents analog signals?
a. Discrete waveform b. Digital waveform
c. Continuous waveform d. Square waveform
18. _____ represent information using a series of discrete values, typically 0 and 1.
a. Analog signals b. Digital signals
c. Continuous values d. Variable states
19. ______ are the building blocks of digital circuits.
a. Logic gates b. Microprocessors
c. Transformers d. Diodes
20. How many basic logic gates are there in digital circuit?
a. 2 b. 3
c. 4 d. 5
21. Which of the following is NOT a basic logic gate?
a. AND gate b. OR gate
c. NOT gate d. IF gate
22. What is the number of possible input combinations for a 2-input AND gate?
a. 2 b. 4
c. 8 d. 16
23. What is the number of possible input combinations for a 3-input AND gate?
a. 2 b. 4
c. 8 d. 16
24. The gate produces LOW output when at least one input is HIGH:
a. AND b. NAND
c. OR d. NOR
3|P age
Computer Science Class-11
4|P age
Computer Science Class-11
5|P age
Computer Science Class-11
6|P age
Computer Science Class-11
52. Which column in a truth table represents the output of a logic circuit for
different input combinations?
a. Leftmost column b. Middle column
c. Rightmost column d. All columns
53. In a truth table, what does the column on the lift typically represent?
a. Output of the gate b. Names of the logic gates
c. Inputs to the gate d. Description of the operation
54. How many possible input combinations are there for the three inputs in the
truth table?
a. 4 b. 8
c. 16 d. 64
55. The purpose of Boolean Identities in Boolean algebra is to:
a. Generate random values b. Simply Boolean expressions
c. Describe analog signals d. Create new Boolean variables
56. Boolean Identities involve operations on:
a. Decimal numbers b. Real numbers
c. Binary values (0 and 1) d. Letters of the alphabet
57. Which Boolean Identity states that A.(B+C) = AB+AC)?
a. Involution Law b. Distributive Law
c. Complement Law d. Idempotent Law
58. Which Boolean Identity ensures that A+0=A?
a. Identity Law b. Complement Law
c. Distributive Law d. Idempotent Law
59. Which Boolean Identity guarantees that A+AB=A?
a. Absorption Law b. Complement Law
c. Distributive Law d. Involution Law
7|P age
Computer Science Class-11
8|P age
Computer Science Class-11
69. Flip-flops are widely used in which of the following to store binary
information?
a. Sequential circuits b. Combinational circuits
c. Analog circuits d. Oscillatory circuits
70. In digital signal processing (DSP) circuits, logic gates are used for which of the
following purposes?
a. Clock Synchronization
b. Filtering, modulation and demodulation
c. Engine Control d. Home Automation
71. In automotive electronics, a logic gates are used for which of the following
purposes?
a. Airbag Deployment and ABS b. Filtering and Modulation
c. Encoding and Decoding Data d. Home Automation
72. When was the term “life cycle” first used in IT to describe the stages in
developing a new computer system?
a. 1930s b. 1950s
c. 1970s d. 1990s
73. SDLC stands for:
a. Software Data Link Control b. System Design Life Cycle
c. Software Development Life Cycle d. Secure Data Life Cycle
74. Which activity is NOT part of the SDLC?
a. Planning software b. Writing software
c. Modifying software d. Hardware repair
75. Which of the following is not a type of feasibility study?
a. Economic b. Marketing
c. Financial d. Technical
9|P age
Computer Science Class-11
76. Which type of feasibility study evaluates whether the proposed system can be
developed with available technology?
a. Technical feasibility b. Economic feasibility
c. Legal feasibility d. Operational feasibility
77. Which type of feasibility study assesses whether the proposed system is
financially viable and beneficial?
a. Technical Feasibility b. Economic Feasibility
c. Legal Feasibility d. Operational Feasibility
78. Which type of feasibility study involves assessing whether the system can be
completed within a specified timeframe?
a. Economic feasibility b. Legal feasibility
c. Schedule feasibility d. Operational feasibility
79. Schedule feasibility is concerned with:
a. Financial costs and benefits b. Legal compliance
c. Project timeline d. Technological resources
80. Which type of feasibility study ensures that the proposed system complies
with all relevant laws and regulations?
a. Technical feasibility b. Economic feasibility
c. Legal feasibility d. Operational feasibility
81. ____ is the process of studying the current system and proposing an
alternative replacement system.
a. Project initiation and planning b. Analysis
c. Logical d. Physical design
82. In _____ phase, the project team determines the end-user requirements.
a. Analysis b. Design
c. Coding d. Implementation
83. What comes the design phase in SDLC?
a. Implementation b. Analysis
c. Coding d. Support
10 | P a g e
Computer Science Class-11
84. An _____ is a specific step by step procedure for carrying out the solution of a
problem.
a. Data Structure b. Abstraction
c. Algorithm d. Structure chart
85. An algorithm must terminate after _____ number of steps.
a. infinite b. five
c. two d. finite
86. The graphical representation of steps to solve a problem is known as:
a. Flowchart b. Pseudocode
c. Decision table d. Data flow diagram
87. Flowchart is a ______ representation of steps to solve a problem.
a. Graphical b. Historical
c. Numerical d. Textual
88. The symbol used at the beginning and end of a flowchart is:
a. Oval b. Rectangle
c. Diamond d. Parallelogram
89. The symbol in a flowchart that indicates input / output is:
a. Parallelogram b. Rectangle
c. Diamond d. Oval
90. ______ symbols are used to connect one symbol of flowchart to another.
a. Rectangle b. Flow lines
c. Diamond d. Oval
91. Symbol is used in flowchart for:
a. Beginning b. Ending
c. Finishing d. Beginning and Ending
92. The decision symbol in a flowchart indicates:
a. Progress b. Condition
c. Output d. Input
11 | P a g e
Computer Science Class-11
12 | P a g e
Computer Science Class-11
101. Which of the following is NOT typically evaluated in Black Box Testing
a. System outputs based on inputs b. User requirements
c. Internal code structure d. Functional requirements
102. Which type of testing focuses on testing internal structures or workings of an
application?
a. Black Box Testing b. Integration Testing
c. White Box Testing d. Regression Testing
103. The _____ phase occurs when the testing phase is completed and the new
system is ready to replace the old one.
a. Development b. Design
c. Implementation d. Maintenance
104. The process of training personnel to use the new systems is done during:
a. Systems analysis b. Systems design
c. System development d. System implementation
105. The type of conversion in which some users migrate to new system while others
continue to use old one until the new system starts working correctly is called:
a. Direct conversion b. Pilot conversion
c. Phased conversion d. Parallel conversion
106. The type of conversion in which individual components of the new system are
used one by one is called:
a. Direct conversion b. Pilot conversion
c. Phased conversion d. Parallel conversion
107. The type of conversion in which both new and old systems operate together
for a period of time is called:
a. Direct conversion b. Pilot conversion
c. Phased conversion d. Parallel conversion
13 | P a g e
Computer Science Class-11
108. In which type of system conversion, the old system is directly replaced by new
system?
a. Parallel b. Direct
c. Phased d. Pilot
109. What is the final phase in the software development life cycle?
a. Design b. Prototype
c. Implementation d. Maintenance
110. The _____ phase involves monitoring, evaluating, repairing and improving the
system throughout the lifetime of the system.
a. Development b. Investigation
c. Maintenance d. Analysis
111. Software development models define:
a. Programming languages used in development
b. Structured framework for software projects
c. Hardware requirements for the software
d. The specific features of the software
112. The waterfall model follows a:
a. Linear or sequential approach b. Flexible and iterative approach
c. User-centered design approach d. Rapid prototyping approach
113. Which model is well-suited for projects with well-defined requirements that
are unlikely to change?
a. Agile b. Waterfall
c. Prototyping d. Spiral
114. Which model is a good choice for projects with constantly evolving
requirements?
a. Waterfall Model b. Agile Model
c. Prototyping Model d. Spiral Model
14 | P a g e
Computer Science Class-11
115. Which model is known for its iterative and incremental approach to software
development?
a. Agile Model b. RAD Model
c. Spiral Model d. Waterfall Model
116. _______ is a systematic arrangement of computers and other devices in a
network?
a. Network protocol b. Network topology
c. Network address d. Network security
117. Which of the following is not a network topology?
a. Bus b. Band
c. Star d. Ring
118. Which topology is most expensive to implement?
a. Star b. Ring
c. Bus d. Mesh
119. In a network topology, what are the individual devices called?
a. Routers b. Connections
c. Nodes d. Segments
120. A network topology defines how devices are connected to:
a. Share data and resources b. Watch movies
c. Access the internet d. Browse the web
121. The rules for communication between network devices are called:
a. Firewalls b. Protocols
c. Packets d. Domains
122. Which type of network topology uses a single main cable to connect all devices?
a. Star topology b. Bus topology
c. Mesh topology d. Ring topology
15 | P a g e
Computer Science Class-11
123. The entire network goes down in ______ topology if the backbone cable falls.
a. Bus b. Star
c. Mesh d. Ring
124. CSMA / CD stands for:
a. Carrier Sense Multiple Access with Carrier Detection
b. Carrier Sense Multiple Access with Collision Detection
c. Carrier Sense Multiple Access with Collision Direction
d. Carrier Sense Multiple Access with Communication Detection
125. A protocol used in Ethernet networks to manage access to the shared
communication medium by devices is:
a. TCP b. CSMA / CD
c. HTTP d. UDP
126. In which type of network is CSMA / CD most commonly used?
a. Wireless networks b. Ethernet networks
c. Fiber optic networks d. Satellite networks
127. Which topology has a central device to which all other devices connect?
a. Bus topology b. Mesh topology
c. Star topology d. Ring topology
128. In which topology a hub or switch is used?
a. Star topology b. Ring topology
c. Bus topology d. Mesh topology
129. Which of the following is an advantage of star topology?
a. it uses the least amount of cable b. It is easy to add new devices
c. It requires no central device d. It is the least expensive
130. A hybrid topology may include:
a. Bus b. Star
c. Ring d. All of above
16 | P a g e
Computer Science Class-11
17 | P a g e
Computer Science Class-11
18 | P a g e
Computer Science Class-11
19 | P a g e
Computer Science Class-11
20 | P a g e
Computer Science Class-11
163. What type of malware encrypts files and demands a payment to decrypt
them?
a. Adware b. Ransomware
c. Shareware d. Spyware
164. Which of the following is a secret combination of characters used to protect
against unauthorized access?
a. Password b. Username
c. Firewall d. Biometric Authentication
165. Which of the following is true about strong password?
a. Short length with common words b. Using only lowercase letters
c. Word related to a job or hobby
d. Combination of letters, numbers and symbols
166. Which of the following is an example of a strong password?
a. password123 b. abc123
c. P@ssw0rd$$Secur3! b. myname123
167. Why is it important to keep software up to date in cybersecurity?
a. To ensure compatibility b. To introduce new bugs
c. To patch known vulnerabilities d. To avoid system restarts
168. What does 2FA stands for?
a. Two-Factor Authentication b. Two-Factor Authorization
c. Two-Factor Accessibility d. Two-Factor Accounting
169. What does Two-Factor Authentication (2FA) require for user access?
a. Two email addresses b. Two difference devices
c. Two forms of verification d. Two usernames
170. Which of the following is used to control and filter network traffic?
a. Firewall b. Safety wall
c. Barrier device d. Modem
21 | P a g e
Computer Science Class-11
22 | P a g e
Computer Science Class-11
179. A type of encryption in which different keys are used for encryption is called:
a. Symmetric encryption b. Asymmetric encryption
c. Public key encryption d. Private key encryption
180. What are two keys used in asymmetric encryption?
a. Primary key and secondary key b. Red key and blue key
c. Public key and private key d. Encryption key and decryption key
181. Which key is used to encrypt data in asymmetric encryption?
a. Private key b. Public key
c. Shared key d. User authentication key
182. Which key is used to decrypt data in asymmetric encryption?
a. Public key b. Private key
c. Symmetric key d. shared key
183. What type of encryption utilizes a single key for both encrypting and
decrypting data?
a. Symmetric encryption b. Asymmetric encryption
c. Public key encryption d. Hybrid encryption
184. Which characteristic distinguishes symmetric encryption from asymmetric
encryption?
a. Uses a single key b. Involves a public key
c. Slower encryption speed d. Requires two keys
23 | P a g e