Multiple Choice Questions (MCQs)
-
Question
Which one of these is NOT an example of storage devices?CD
Floppy
Hard Disk
RAM
Answer: 4 Chapter No.
Question
Which one of these is NOT an example of storage devices?Tape
RAM
Floppy
DVD
Answer: 2 Chapter No.
Question
_________ was known as “mill” in Analytical engine.Memory
Processor
Monitor
Mouse
Answer: 2 Chapter No.
Question
The impact of a digit in a number is determined by its ____________Value
Location
Length
None of above
Answer: 2 Chapter No.
Question
_________ is also known as System Architecture.High level system design
Low level system design
Every system design
Software Requirement
Answer: 3 Chapter No.
Question
The computer working independently with no connection to any other computer is called:Standalone
Workstation
Server
None of the given choices
Answer: 1 Chapter No.
Question
Browser is a _____________ used for browsing.Component
Tool
None of these
Device
Answer: 3 Chapter No.
Question
TCP stands for :Transmission Control Practical
Transmission Control Protocol
Transfer Center Protocol
None of the given
Answer: Chapter No.
Question
Heuristics are used because theyAlways give the best results
Mostly gives good-enough results
Don’t give wrong results
Are commonly used as rule of thumb
Answer: Chapter No.
Question
A data value that appears directly in a statement is known as _______.Numeric Literals
String Literals
JavaScript Literals
None of the given
Answer: Chapter No.
Question
To iterate each element of an array, the best know structure for iteration is:While loop structure
If-else structure
Switch statements
For loop structure
Answer: Chapter No.
Question
___________ is a special purpose computer that directs the data traffic when several paths are available.Bridge
Router
Gateway
None of the given
Answer: Chapter No.
Question
VPN stands for:Virtual Public Network
Virtual Private Network
Visual Private Network
Virtual Personal Network
Answer: Chapter No.
Question
Array can be defined as:An indexed list of elements
A list of elements
A collection of elements
None of the given
Answer: Chapter No.
Question
The computer working independently with no connection to any other computer is called :Standalone
Workstation
Server
None of the given
Answer: Chapter No.
Question
Email uses _______ protocol.SMTP
HTTP
FTP
None of the given
Answer: Chapter No.
Question
In Spreadsheets, you can create relationship between two cells by using _____.Text
Formulas
Numbers
None of the given
Answer: Chapter No.
Question
Architecture design is _________ design.Dependant
Low Level
High Level
Secondary
Answer: Chapter No.
Question
World’s first program was written byCharles Babbage
Alfred Tennyson
Ada Lovelace
Bernoulli
Answer: 3 Chapter No. 1
Question
Deep Blue was the name of:Human
Computer
City
None of the given
Answer: 2 Chapter No. 1
Question
Analytical Engine was a machine of which type:non-programmable electronic machine
programmable electromechanical
programmable, mechanical, digital
programmable but non-digital
Answer: 3 Chapter No. 1
Question
Who wrote the first program for Analytical engine?Babbage
Lady Ada
Haward
Bernoulli
Answer: 2 Chapter No. 1
Question
Which language had been used by the US department of defense.Java script
Binary language
C++
Ada
Answer: 4 Chapter No. 1
Question
Spread sheet is a type of ____________.Productivity software
Engineering software
Mathematical software
Business software
Answer: 1 Chapter No. 1
Question
A _________ translates a high-level language (that is easy to understand for humans) into a language that the computer can understand.Computer
Transistor
Compiler
Device
Answer: 3 Chapter No. 2
Question
DARPA stands forDefence Advanced Research Project Agency
Direct Automatic Research Private Agency
Defence Automatic Research Project Agency
None of the given choices
Answer: 1 Chapter No. 2
Question
CERN releases WWW in:1992
1993
1994
None of the given choices
Answer: 4 Chapter No. 2
Question
Vacuum tubes were replaced by ____________Punch cards
Transistors
Micro Processors
Resistors
Answer: 2 Chapter No. 2
Question
________ invented at the Imperial University in Tokyo by Yoshiro Nakamats.Hard drive
Flash drive
Floppy disk
Optical disc
Answer: 3 Chapter No. 2
Question
Compared to vacuum tubes, Transistors offer:Much smaller size
Better reliability
Much lower cost
All of the given choices
Answer: 4 Chapter No. 2
Question
What will replace Transistors?Electro-mechanical computing
Vacuum tube computing
Quantum computing
Nothing can replace Transistors
Answer: 3 Chapter No. 2
Question
If a computer could pass the Turing test then it would be able to:win a million dollar prize
think like human beings
think but slower than humans
do the things faster
Answer: 2 Chapter No. 2
Question
The name of very first computer was _______________ABC
BCD
EDC
None of the given choices
Answer: 1 Chapter No. 2
Question
First computer designed for commercial applications wasUNIVAC 1
ENIAC
EDVAC
Atanasoff-Berry Computer
Answer: 4 Chapter No. 2
Question
Atanasoff-Berry Computer is the first computer that used:Binary number system
Octal number system
Decimal number system
Hexadecimal number system
Answer: 1 Chapter No. 2
Question
World’s first large-scale, automatic digital computer was:Atanasoff-Berry Computer
Harvard Mark 1
ENIAC
IBM-PC
Answer: 1 Chapter No. 2
Question
The Semantic Web is an idea of ______________John Von Neuman
Ada
Bill Gates
Tim Berners-Lee
Answer: 4 Chapter No. 3
Question
HTTP stands for:Hyper Text Transparent Protocol
Hyper Terminal Transfer Provider
Hyper Text Transfer Procedure
Hyper Text Transfer Protocol
Answer: 4 Chapter No. 3
Question
____________ is a client program that uses HTTP to make requests to Web servers throughout the internet on behalf of the user.Web Application
Web Browser
Internet Application
HTML
Answer: 2 Chapter No. 3
Question
The first Web browser with a GUI was generally available in:1992
1993
1994
1995
Answer: 2 Chapter No. 3
Question
_________ is a related collection of WWW files that includes a beginning file called a homepage.HTML
Website
HTTP
Web page
Answer: 2 Chapter No. 3
Question
Information available on the web is:Mostly Free of any cost
Costly
Totally free
Not accessible at all
Answer: 1 Chapter No. 3
Question
______________ is volatile memory.RAM
ROM
Hard Disk
CD ROM
Answer: 1 Chapter No. 4
Question
_________ are personal computers that are designed to be easily transported and relocated.Desktops
Portables
Servers
Workstations
Answer: 2 Chapter No. 4
Question
_________ is the best known builder for supercomputers.Sun
Cray Research
Microsoft
Apple
Answer: 2 Chapter No. 4
Question
Microphone is an input as well as output device. This statement isTrue
False
Meaningless
Answer: 2 Chapter No. 4
Question
__________ can perform at or near the currently highest operational rate for computers.Microcomputers
Supercomputers
Personal Computers
Mini Computers
Answer: 2 Chapter No. 4
Question
CD stands for:Computer Disc
Computer Data
Compact Disc
Compact Data
Answer: 3 Chapter No. 4
Question
USB stands for:Uniform System Bill
Universal System Bus
Universal Serial Bus
Unified Sequential Bus
Answer: 3 Chapter No. 4
Question
SCSI stands for:Small computer system interface
System Common Small Integration
Silicon Computer System Interface
None of the given choices
Answer: 1 Chapter No. 4
Question
Which one is correct?<HEAD> </HEAD>
<HEAD> <END>
<HEAD> </END>
<HEAD> <\HEAD>
Answer: 1 Chapter No. 6
Question
Today’s computers are based on the technology of ___________Punch cards
Vacuum tubes
Transistors
Resistors
Answer: 3 Chapter No. 7
Question
Microprocessor are made up of semiconductor material calledAluminum
Copper
Silicon dioxide
Silicon
Answer: 4 Chapter No. 7
Question
Register is a kind of _________ memory.Fast
Super fast
Slow
Very slow
Answer: 2 Chapter No. 7
Question
1 byte consists of ____________ bits.8
10
12
16
Answer: 1 Chapter No. 8
Question
Smallest unit of storage is:Bit
Byte
Mega Byte
None of the given
Answer: 1 Chapter No. 8
Question
1 byte consists of ____________ bits.10
9
8
None of the given choices
Answer: 3 Chapter No. 8
Question
Structures, in which another list starts before the first list is finished, are called:Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists
Answer: 2 Chapter No. 9
Question
ROWSPAN is used to extend the current cell to somecolumns
rows
columns & rows
None of the given
Answer: 1 Chapter No. 9
Question
tag is used to
underline text
end the line
create ordered list
create unordered list
Answer: 4 Chapter No. 9
Question
__________ is the example of Shrink-wrapped software.PIA information system
WinZip trial pack
Linux
MS Word
Answer: 4 Chapter No. 10
Question
For writing a letter we can use ________ .MS Paint
MS Word
MS Excel
Corel Draw
Answer: 2 Chapter No. 10
Question
Computer directly understand the ___________ languagehuman
high level
machine
None of the given
Answer: 3 Chapter No. 10
Question
____________ translates the High level language program, one statement at time.Interpreter
Compiler
Utility program
Anti virus software
Answer: 1 Chapter No. 10
Question
Which of the following manages the HW and SW resources of the computer system?Hardware
System Software
Operating system
Graphics Software
Answer: 3 Chapter No. 10
Question
__________ maintains index of names and location of the files.File Folder
File manager
File system
Operating system
Answer: 2 Chapter No. 11
Question
We need _____________ for memory management in computer.Software
Hardware
Operating System
Application Software
Answer: 3 Chapter No. 11
Question
Disk operating system is _______ operating systemMenu driven
Graphical user interface
Command driven
None of the given
Answer: 3 Chapter No. 11
Question
Which of the following is/are the parts of Operating system components?GUI
Device Manager
Shell
All of these
Answer: 4 Chapter No. 11
Question
In a HTML Form for file upload input element we use the following value in type attribute:Text
Radio
Hidden
File
Answer: 4 Chapter No. 12
Question
To display a radio button on the web page, we use ___ tag.INPUTBUTTON
INPUT
RADIOBUTTON
RADIO
Answer: 2 Chapter No. 12
Question
When we use <INPUT type=“password”>, what will happen?Text will not be visible
Text will be in normal format
Text will be in **** format
Text will be in #### format
Answer: 3 Chapter No. 12
Question
A group of information is calledFile
Database
Record
Field
Answer: 1 Chapter No. 13
Question
VisiCalc was the first popular __________ application on PC’s.Spreadsheet
Word processor
Presentation
Database
Answer: 1 Chapter No. 13
Question
WYSIWYG is:Software
The abbreviation of “what you see is what you get”
A Network company in Japan
The abbreviation of “word you see is what you get”
Answer: 2 Chapter No. 14
Question
_________ helps in finding synonyms as well as antonyms in Word ProcessorsTables
Thesaurus
Spelling & Grammar
Word Count
Answer: 2 Chapter No. 14
Question
You need to place University name on top of the every page of 100 pages document and Page number in the bottom of page. This can be done with the help of __________Reference initials
Bullet and Numbering
Borders and Shading
Header and Footer
Answer: 4 Chapter No. 14
Question
Using only Html we can create ______________.Dynamic web pages
Static web pages
Both Static and Dynamic pages
None of these
Answer: 2 Chapter No. 15
Question
The code in the _____________ portion is the right choice for developing larger JavaScript scripts.Body
At End
Head
Separate
Answer: 3 Chapter No. 15
Question
We can change the background color in HTML, using __________ attribute ofbackground
bgcolor
backcolor
backgroundcolor
Answer: 2 Chapter No. 15
Question
JavaScript consider every thing as:Control
Window
Object
Statement
Answer: 3 Chapter No. 15
Question
In Analysis of Algorithms ________ generally measured in terms of the number of steps required to execute an algorithmBandwidth
Time
Memory
Logic functions
Answer: 2 Chapter No. 16
Question
___________ is generally measured in terms of the number of steps required to execute an algorithm.Space
Time
Memory and time
Bandwidth
Answer: 2 Chapter No. 16
Question
Algorithm gives us:Definition of a problem
Sequence of steps to solve a problem
Proper understanding of a problem
Solution to a problem
Answer: 4 Chapter No. 16
Question
Sequence of steps that is taken to solve a problem is called _______.Algorithm
Operating System
Application software
None of the above
Answer: 1 Chapter No. 16
Question
Randomized algorithms are often ________ than deterministic algorithms for the same problem.Simpler and more slow
Simpler and more efficient
Complex and more efficient
Complex and more slow
Answer: 2 Chapter No. 16
Question
The “Ockham’s Razor,” principle states that when choosing among competing, successful solutions to a problem; choose the one which is the least ________Time Consuming
Ambiguous
Complex
Restricted
Answer: 3 Chapter No. 16
Question
Some of the things that JavaScript can do! Choose incorrect option from followingControl the appearance of the browser
Read – Modify
Control the content and appearance
Interact with the user through event handlers
Answer: 2 Chapter No. 18
Question
A named collection of properties (data, state) and methods (instructions, behaviour) is called __________.Object
Entity
Relation
Template
Answer: 1 Chapter No. 18
Question
A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks is calledSoftware
Programming language
Device driver
Interpreter
Answer: 2 Chapter No. 19
Question
Programs that are typically started from a shell (or automatically via a scheduler) are calledBatch programs
Event-driven programs
Sequential programs
Application programs
Answer: 1 Chapter No. 19
Question
_________ is a high level language.Machine
Assembly
C++
None of the given
Answer: 3 Chapter No. 19
Question
Batch programs do notPrint or store the results
Get input data
Execute programs without the interference of user
Provide event handling
Answer: 4 Chapter No. 19
Question
BASIC stands for:Basic American Standard Information Code
Beginner’s All purpose Symbolic Instruction Code
Brother and Sisters In Christ
British American Scientific International Commercial
Answer: 2 Chapter No. 19
Question
In SW Life cycle Thinking about the future phases generally results in _and .lesser delivery time ; higher quality
more delivery time ; lesser quality
risk-full scenarios ; more delivery time
lesser quality ; more cost
Answer: 1 Chapter No. 20
Question
Detailed plan of SW life cycle specifies two things that are the _________Required resources and expected cost
Expected cost and budget
Required resources and expected deliverables
Time and cost
Answer: 4 Chapter No. 20
Question
Which of the following application is collections of cells?Word
Excel
PowerPoint
Outlook Express
Answer: 2 Chapter No. 22
Question
Which of the following keyword is used to jump out of switch statement as soon as match is found?default
else
jump
break
Answer: 4 Chapter No. 23
Question
Users look for ________ solution.Optimal
First good enough
Good
Best
Answer: 2 Chapter No. 25
Question
Users __________, how things work.Analyze in detail
Muddle through
Figure out
Read in detail
Answer: 2 Chapter No. 25
Question
Which of the following device can be used to control network traffic?Cable
Connector
Hub
Repeater
Answer: 3 Chapter No. 27
Question
One can download or upload files to a remote computer using ________ protocol.HTTP
SMTP
FTP
TELNET
Answer: 3 Chapter No. 27
Question
Electrical pulses received over telephone line are converted into messages (comprehensible by the computer) by using:Modulator
Demodulator
Both Modulator and Demodulator
None of the given choices
Answer: 2 Chapter No. 27
Question
Files can be downloaded or uploaded using _______________ protocol.SMTP
FTP
TELNET
None of the given choices
Answer: 2 Chapter No. 27
Question
When the packets reach the destination computer, Who reassembles them into the original message?UDP
TCP
UCP
IP
Answer: 2 Chapter No. 28
Question
TCP stands for:Transmission Control Practical
Transmission Control Protocol
Transfer Center Protocol
None of the given choices
Answer: 2 Chapter No. 28
Question
Internet Enables:attractively-priced workers located in Pakistan to provide services to overseas clients
users to easily share information with others located all over the world
users to easily, inexpensively communicate with others remote users
All of the given
Answer: 4 Chapter No. 28
Question
____________ breaks down the message, to be sent over the internet, into packets.Protocol
TCP
IP
NIC
Answer: 2 Chapter No. 28
Question
Specifying the space in which a variable will be effective is called:Variable declaration
Variable definition
Variable Scope
Variable garbage collection
Answer: 3 Chapter No. 29
Question
Function definition enclosed in a __________pair of curly braces
Pair of parenthesis
Pair of Brackets
All of the given
Answer: 1 Chapter No. 29
Question
Identify the correct statements about function arguments
I) A comma-separated list of data
II) Define the interface b/w function and rest of code
III) They are used to identify the function
IV) They Identify function’s typeI and II Only
II and III Only
III and IV Only
I, II and III Only
Answer: 1 Chapter No. 29
Question
____________ is used to transfer files between computers on a TCP/IP network.TCP
FTP
Telnet Protocol
All of the given choices
Answer: 2 Chapter No. 30
Question
__________ addresses are difficult to recognize and remember for humans.TCP
IP
SMTP
None of these
Answer: 2 Chapter No. 30
Question
VoIP stands for ___________________________Video over Internet Protocol
Visual on Internet Protocol
Voice over Internet Protocol
None of these
Answer: 3 Chapter No. 30
Question
________ is a type of computer-to-computer messaging.TCP
Telnet
E-mail
FTP
Answer: 3 Chapter No. 30
Question
Mixed-case capitalization of event handlers (e.g. onClick) is _________ for JavaScript event handlers defined in HTML codea Defined Rule
a Requirement
a Convention
Necessary
Answer: 3 Chapter No. 32
Question
A string consisting of JavaScript statements enclosed in double or single ____________LINES
EVENTS
TAG’s
QUOTES
Answer: 4 Chapter No. 32
Question
There are __________ & __________ popular schemes to reduce the number of bytes that are required for storing graphics.Contrast & Color Control
Dithering & Color Mapping
Matching & Non-Matching
None of these
Answer: 2 Chapter No. 33
Question
Bit-map images compresses using the __________ algorithm.LZV
LZW
LZE
None of these
Answer: 2 Chapter No. 33
Question
_________ images enhanced to impart the illusion of depth.Parallel
Diagonal
Flat
None of these
Answer: 3 Chapter No. 33
Question
Color mapping scheme reducing the size of 2.25 MB graphic to_______ MB.0.90 MB
0.75 MB
1.00 MB
None of these
Answer: 2 Chapter No. 33
Question
Autonomous Web Agents are also known as _____________.Mobile Agents
Softbots
Both “Mobile Agents” & “Softbots”
None of these
Answer: 3 Chapter No. 34
Question
__________ returns a randomly selected, floating point number between 0 and 1.Math.random
random
random()
None of the given
Answer: 3 Chapter No. 35
Question
Which function returns a randomly selected floating point number between 0 and 1?floor(x)
ceil(x)
random()
round(x)
Answer: 3 Chapter No. 35
Question
Hardware malfunctions is related toData updates
Data integrity
Data security
Data accessibility
Answer: 2 Chapter No. 36
Question
__________ can be used for entering, editing or viewing data, one record at a timeForms
Reports
Queries
Tables
Answer: 1 Chapter No. 37
Question
RDBMS stands forRelative Data Base Management System
Relational Data Base Management System
Recursive Data Base Management System
Responsible Data Base Management System
Answer: 2 Chapter No. 37
Question
_______ is a field that uniquely identifies each record stored in a table.Primary Key
Foreign Key
Secondary key
Special Key
Answer: 1 Chapter No. 37
Question
_______is correct format to access a string Method.methodName.string( )
string.methodName( )
methodName().string
string ().methodName
Answer: 2 Chapter No. 38
Question
_________ returns a string containing characters copied from positions n to m-1charAT(n)
substring (m)
substring(n,m)
None of the given
Answer: 3 Chapter No. 38
Question
A virus consists of two parts:Computer and internet
Transmission mechanism and Internet
Transmission mechanism and Payload
Internet access and Payload
Answer: 3 Chapter No. 39
Question
The ________ virus may destroy or broadcast private data.Malicious
Neutral
Helpful
DoS
Answer: 1 Chapter No. 39
Question
We use __________ to stop Break-Ins.Scanners
Intrusion detectors
Firewalls
Intrusion detectors and Firewalls
Answer: 2 Chapter No. 39
Question
Yahoo Servers was recovered, from DoS attack, within12 hours
3 hours
24 hours
3 days
Answer: 2 Chapter No. 39
Question
_________ are harmless in the sense that they only make copies of themselves on the infected computerTrojan horses
Logic- or time-bombs
Worms
Viruses
Answer: 3 Chapter No. 39
Question
The internet communities are ________.Geographical based
Interest based
Country based
Religion based
Answer: 2 Chapter No. 40
Question
The __________has changed marketing forever, redirecting it from a mass focus to a single person focus.Web
Television
Mobile
Radio
Answer: 1 Chapter No. 40
Question
_______________ based communication allows business entities to coordinate the activities of their globally spread units with greater accuracy.Intranet
Internet
Home
LAN
Answer: 2 Chapter No. 40
Question
______________ is in Executive team.Project Manager
CEO
Team Lead
Developer
Answer: 2 Chapter No. 42
Question
Planning and tracking of the project is the responsibility of the_______________.Project Manager
Architect
Developer
Chief Executive Officer
Answer: 1 Chapter No. 42
Question
Web is a unique invention by humans in terms that it is:accessible to only the owners who control it
accessible from particular locations only
accessible to all humans
accessible to only the educational institutes
Answer: 3 Chapter No. 43
Question
The tasks performed to determine the existence of defects is called ____________.Debugging
Testing
Repairing
Coding
Answer: 2 Chapter No. 44
Question
There are _________ types of errors.2
3
4
5
Answer: 2 Chapter No. 44



100% Off on Your FEE Join US! Ask Me How?


