Computer Science MCQs for NTS , PTS , PPSC , FPSC , ,SPSC , BPSC , AJKPSC , KPKPSC , Educators Computer Science Tests , Information Technology MCQs, Solved old Papers of Computer Science , Old NTS papers, Old PTS papers, IT MCQs, NTS old Papers of Ed in islamabad

Whom we are looking for

Experience Requirements

Computer Science MCQs for NTS , PTS , PPSC , FPSC , ,SPSC , BPSC , AJKPSC , KPKPSC , Educators Computer Science Tests , Information Technology MCQs, Solved old Papers of Computer Science , Old NTS papers, Old PTS papers, IT MCQs, NTS old Papers of Educators Computer Science , Data Entry Operator MCQs, Computer Operator MCQs ,200 MCQs of Computer Science .

1. A computer basically constitutes of _____________integral components
(A) Two
(B) Four
(C) Three
(D) Eight

2. Computers have secondary storage devices known as___________
(A) ALU
(B) Auxiliary storage
(C) CPU
(D) None of the above

3. The ___________is responsible for transferring data and instructions from the external
environment into the computer system
(A) Output unit
(B) Program control register
(C) Input unit
(D) Memory address register

4. The process of recording data and information so that it can be retrieved for use
whenever required.
(A) Inputting
(B) Processing
(C) Storing
(D) None of the above

5. The ________________is responsible for controlling various computer operations
(A) Memory
(B) Accumulator (AC)
(C) Control Unit
(D) Memory Address Register (MAR)

6. The main PCB (Printed Circuit Board) is sometimes alternatively known as
(A) Main Board
(B) Logical Board
(C) Both (A) and (B)
(D) None of the above

7. The _____________ processes the set of instructions along with any calculations and
comparisons to complete the task.
(A) Keyboard
(B) Motherboard
(C) CPU
(D) Either (A) or (C)

8. Storage and retrieval of instructions and data in a computer system is the responsibility of
the __________________.
(A) Memory
(B) Secondary Memory
(C) Primary Memory
(D) Both (B) and (C)

9. A small set of high-speed registers placed inside a processor and used for storing
temporary data while processing.
(A) Internal Processor Memory
(B) Secondary Storage Memory
(C) Primary Storage Memory
(D) None of the above

10. Popular microprocessors include
(A) Intel
(B) Cache memory
(C) AMD
(D) None of the above

11. The speed at which the CPU performs basic operations, measured in
(A) Hz
(B) MHz
(C) GHz
(D) All of the above

12. These types of computers are primarily involved in data processing and problem solving
for specific programs.
(A) Compact Computers
(B) Digital computers
(C) Hybrid Computers
(D) Analog Computers

13. It mediates communication between CPU and other components of system.
(A) CPU
(B) RAM
(C) Chipset
(D) Buses

14. It helps in the proper functioning of computer hardware.
(A) Application Software
(B) Users
(C) Hardware System
(D) System Software

15. Software that resides on a single computer and does not interact with any other software
installed in a different computer.
(A) Stand- Alone Software
(B) Embedded Software
(C) Real- Time Software
(D) Network Software

16. This kind of software is functional in the domain of management and finance
(A) Engineering Software
(B) Business Software
(C) Artificial Intelligence Software
(D) None of the above

17. _____________ was one of the most widely used systems software for IBM compatible
microcomputers.
(A) API
(B) OS
(C) MS DOS
(D) None of the above

18. A ____________is the main control program for handling all other programs in a
computer.
(A) MS DOS
(B) API
(C) OS
(D) DDR4

19. A type of OS that permits multiple programs to be run simultaneously by the same
computer.
(A) Multithreading
(B) Multiuser
(C) Multitasking
(D) All of the above

20. ____________________ is a presentation tool that helps create eye-catching and
effective presentations in a matter of minutes.
(A) Spreadsheet
(B) Word Processing
(C) Bits
(D) PowerPoint

21. ____________________ was the first high -level language developed by John Backus at
IBM in 1956.
(A) FORTRAN
(B) COBOL
(C) BASIC
(D) None of the above

22. This language was developed by Dennis Ritchie of Bell Laboratories in order to
implement the operating system UNIX.
(A) C
(B) C++
(C) Java
(D) LISP

23. _________________ are a series of black and white parallel and adjacent bars with
spaces which represent a string of characters.
(A) Instruction register
(B) Program control register
(C) Barcode Readers
(D) Memory Address register

24. It is an electronic medium for storing contact information inside the mobile phone.
(A) SMS
(B) Address Book
(C) Send and Receive Mails
(D) None of the above

25. It is also known as the ‘blue screen’ process_______________.
(A) Analog Compositing
(B) Digital Compositing
(C) Time Slicing
(D) CGI

26. The professionals involved in the study and prediction of weather are called
____________.
(A) Seer
(B) Doomsayer
(C) Meteorologists
(D) None of the above

27. The storage and rapid access to electronic medical records and its instant transmission
over the Internet in large amounts is called ____________________
(A) Teleconsulting
(B) Accumulator (AC)
(C) Instruction Register (IR)
(D) Program Counter (PC)

28. Early computers like ENIAC, EDVAC, and UNIVAC I all can be classified as
_____________.
(A) Third Generation Computers
(B) Second Generation Computers
(C) First Generation Computers
(D) None of the above

29. The first mechanical adding machine was invented by Blaise Pascal in ____________.
(A) 1652
(B) 1642
(C) 1659
(D) 1643

30. The primary storage also temporarily stores any intermediate result generated by the
___________.
(A) The CPU
(B) The motherboard
(C) The hard disk drive
(D) The ALU

31. The socket that supplies the power from the computer system to the computer monitor
(A) Monitor Power Socket
(B) Main Power Socket
(C) PS/2 Mouse Port
(D) None of the above

32. The various types of computers are:
(A) Personal computers
(B) Workstations
(C) Tablet PC
(D) All of the above

33. The categories of software on functional base are:
(A) System software
(B) Programming software
(C) Application software
(D) All of the above

34. The full form of COTS is ___________________ .
(A) Commercial off-the Shelf
(B) Commercial off-the Shell
(C) Commercial on-the Shelf
(D) Commercial on-the Shell

35. ________________ means that their source code is not available.
(A) Fireware
(B) Freeware
(C) Freefall
(D) None of the Above

36. ________________ is ideal for a task that needs a number of lists, tables, financial
calculations, analysis and graphs.
(A) PowerPoint
(B) Word
(C) VB
(D) Excel

37. Excel also allows you to create documents for the ______________________.
(A) Word
(B) Google
(C) WWW
(D) All of the above

38. A presentation comprises of _______________ slides arranged in a sequential manner.
(A) Group
(B) Two
(C) Three
(D) Individual

39. This class of OS permits multiple users to use the computer and run programs at the same
time
(A) Multiuser
(B) Multitasking
(C) Multithreading
(D) Multiprocessing

40. Most of the application software available in the market needs a __________ for use.
(A) People
(B) Money
(C) Software License
(D) All of the above

41. The computer system is a dumb and a useless machine if it is not capable of
communicating with the________________.
(A) Outside World
(B) Inside World
(C) Specific Locations
(D) None of the above

42. It is very important for a computer system to have the ability to communicate with the
outside world, _________________.
(A) Receive Data
(B) Send Data
(C) Information
(D) All of the above

43. Programs and data must be entered into the computer memory for _____________.
(A) Processing
(B) Results
(C) Calculations
(D) Feedback

44. The I/O devices that provide a means of communication between the computer and the
outside world are known as________________.
(A) Printers
(B) Peripheral Devices
(C) Coaxial Cables
(D) None of the above

45. _____________ are used to transfer user data and instructions to the computer
(A) Output
(B) Processors
(C) Input
(D) Either (A) or (C)

46. ________________ devices allow input into the computer system by pressing a set of
keys mounted on a board, connected to the computer system
(A) Mouse
(B) Keyboard
(C) Pen
(D) Screen

47. Keyboard devices are typically classified as _________________ keyboards and specialpurpose
keyboards.
(A) Secondary
(B) Primary
(C) User-Defined
(D) General-Purpose

48. The most familiar means of entering information into a computer is through a typewriterlike
keyboard that allows a person to enter __________________ information directly.
(A) Alphabets
(B) Symbols
(C) Alphanumeric
(D) Numeric

49. The most popular keyboard used today is the ______ key with a traditional QWERTY
layout.
(A) 101
(B) 102
(C) 103
(D) 104

50. Another popular _______________ arrangement, called Dvorak system, was designed
for easy learning and use.
(A) Key
(B) Line
(C) Group
(D) Numeric

51. The _____________ pen is a small input device used to select and display objects on a
screen.
(A) Ink
(B) Magnetic
(C) Light
(D) None of the above

52. The joystick is a ____________ stick that moves the graphic cursor in the direction the
stick is moved.
(A) Parallel
(B) Horizontal
(C) Straight
(D) Vertical

53. ___________________ consists of a spherical ball, which moves within a socket and has
a stick mounted on it.
(A) Joystick
(B) Trackball
(C) Web Camera
(D) All of the above

54. The user moves the ball with the help of the stick that can be moved
_________________________, to move and position the cursor in the desired location.
(A) Left
(B) Right
(C) Forward or Backward
(D) All of the above

55. Joysticks typically have a button on __________that is used to select the option pointed
by the cursor.
(A) Bottom
(B) Left
(C) Right
(D) Top

56. The ____________ is a pointing device that is much like an inverted mouse.
(A) Joystick
(B) Trackball
(C) USB
(D) Scanning Device

57. A web camera is a video capturing device attached to the computer system, mostly using
a _________________.
(A) Socket
(B) USB Port
(C) Cable
(D) None of the above

58. Web camera is used for video _____________.
(A) Conferencing
(B) Security
(C) Control Input Device
(D) All the above

59. Scanning devices are input devices used for direct data entry from the source document
into the ______________________ .
(A) Keyboard
(B) Screen
(C) Computer System
(D) None of the above

60. With the help of the _______________ you can capture your images and documents and
convert it into digital formats for easy storage
(A) Scanner
(B) Web Camera
(C) Camera Phone
(D) Videography

61. There are two types of scanners_______________ .
(A) Contact
(B) Laser
(C) Digital
(D) Both (A) and (B)

62. _______________ contact scanners make contact as they are brushed over the printed
matter to be read.
(A) Laser
(B) Digital
(C) Hand-held
(D) None of the above

63. _____________ scanners are more versatile and can read data passed near the scanning.
(A) Laser-based
(B) Hand-held
(C) Contact
(D) Either (A) or (B)

64. Source data automation is the _________________ development for data input
technologies.
(A) Last
(B) Second
(C) Fifth
(D) Recent

65. The ______________ devices can scan marks from a computer-readable paper.
(A) CRT
(B) OMR
(C) LCD
(D) All of the above’

66. A___________ film transistor is comprised of a semiconductor layer.
(A) Thin
(B) Broad
(C) Long
(D) Straight

67. The role of semiconductor layer is to add polysilicon layer whose electron mobility
is_____________times higher than that of an amorphous silicon layer.
(A) One-Third
(B) 100
(C) 110
(D) One-Fourth

68. _________________ are based on the use of a series of nozzles for propelling droplets
of printing ink directly on almost any size of paper.
(A) Dot-matrix
(B) Laser Printers
(C) All-in-One Printers
(D) Inkjet Printers

69. Daisy-wheel printer comes in the category of output device and quite similar to
______________ .
(A) Keyboards
(B) Typewriters
(C) Lasers
(D) None of the above

70. Another type of impact printer somewhat similar to the daisy-wheel is the _________
printer.
(A) Line
(B) Dot-matrix
(C) Inkjet
(D) Either (A) or (B)

71. The page printers are _______________ speed non-impact printers.
(A) Slow
(B) High
(C) Medium
(D) Fixed

72. The printing speed of page printer is very high and the output is __________ at a time.
(A) Three
(B) Multiple
(C) Ten
(D) A page

73. _________________ are formed by heated elements being placed in contact with special
heat sensitive paper forming darkened dots when the elements reach a critical
temperature.
(A) Numerical
(B) Words
(C) Characters
(D) None of the above

74. ___________________ printers are the oldest print technologies still in active
production.
(A) Impact
(B) Ink
(C) Laser
(D) Dot-matrix

75. These are the devices used for getting out information from the computer
(A) Input
(B) Keyboard
(C) Output
(D) None of the above

76. An __________ printer would be non-impact as they work through spraying ink or toner
and fusing it to the paper.
(A) Inkjet
(B) Wax
(C) Laser or LED
(D) All of the above

77. The term __________________ is important primarily in that it distinguishes quiet
printers from noisy and impact types of printers.
(A) Impact
(B) Non Impact
(C) Force
(D) None of the above

78. Computers have an _______________ subsystem,
(A) Input
(B) Output
(C) Proper
(D) Both (A) and (B)

79. The CRT monitor creates a picture out of many rows or lines of tiny__________ dots.
(A) Black
(B) White
(C) Plain
(D) Colored

80. In plasma type of displays_____________ gas is used.
(A) Ionized
(B) Oxygen
(C) Carbon dioxide
(D) All the above


81. Nibble is a set of _______ bits.
(E) Two
(F) Four
(G) Six
(H) Eight

82. _________ stores the immediate data during the execution of instructions.
(E) ALU
(F) The register set
(G) CU
(H) None of the above

83. Register that holds the current instruction that is to be executed is called
(E) Instruction register
(F) Program control register
(G) Data register
(H) Memory address register

84. The size of the register is called
(E) Register size
(F) Data size
(G) Word size
(H) None of the above

85. The memory location’s address where data is to be stored is specified by ___________.
(E) Memory Buffer Register (MBR)
(F) Accumulator (AC)
(G) Instruction Register (IR)
(H) Memory Address Register (MAR)

86. The speed at which the processor executes command is called
(E) Processor speed
(F) Clock speed
(G) Both (A) and (B)
(H) None of the above

87. The clock speed is usually measured in
(E) Megahertz
(F) Kilohertz
(G) Gigahertz
(H) Either (A) or (C)

88. The logical position of the ____________memory is between the main memory and the
internal memory (registers).
(E) Cache
(F) Secondary
(G) Primary Storage
(H) Internal Processor

89. A computer system having a memory of 256 MB is capable of storing
(E) 1,07,37,41,824 bytes or characters
(F) 26,84,35,456 bytes or characters
(G) 10,48,576 bytes or characters
(H) 26,85,30,456 bytes or characters

90. Devices that provide backup storage are called
(E) Main memory
(F) Cache memory
(G) Auxiliary memory
(H) None of the above

91. Random Access Memory (RAM) is an example of
(A) Primary storage memory
(B) Secondary storage memory
(C) Cache memory
(D) None of the above

92. ___________ is a volatile memory.
(E) ROM
(F) RAM
(G) Secondary memory
(H) None of the above

93. CD can store up to ___________ MB of data.
(E) 550
(F) 1000
(G) 750
(H) 1500

94. A Digital Versatile Disk (DVD) can store______ Gigabyte of information.
(E) 4.6
(F) 5.6
(G) 6.6
(H) 7.6

95. Write operations can be edited in
(E) PROM
(F) EPROM
(G) ROM
(H) All of the above

96. If a computer has two 64 MB memory modules installed, it has a total of __________of
physical memory.
(E) 64 MB
(F) 128 MB
(G) 148 MB
(H) 150 MB

97. __________ is performed to increase the amount of physical memory as well as virtual
memory available on the computer.
(E) Swapping
(F) Sharing
(G) Both (A) and (B)
(H) None of the above

98. Single Inline Memory Module (SIMM) holds
(E) Two to four memory chips
(F) Four to eight memory chips
(G) Six to nine memory chips
(H) Eight to Twelve memory chips

99. The next-generation evolution of DDR memory is
(E) DDR1
(F) DDR2
(G) DDR3
(H) DDR4

100. DDR requires ________ volts to operate.
(E) 1.8
(F) 1.5
(G) 2.5
(H) 2.8

101. A set of two nibble is called
(E) Bytes
(F) Word
(G) Bits
(H) None of the above

102. BCD can represent only __________distinct character.
(E) 24
(F) 54
(G) 34
(H) 64

103. The three major components of CPU are ALU, CU and ____.
(E) The register set
(F) The primary memory
(G) The secondary memory
(H) The cache memory

104. The register that holds the next instruction that is to be executed is called
(E) Instruction register
(F) Program control register
(G) Data register
(H) Memory Address register

105. Arithmetic and logical operations are provided by
(E) CU
(F) The register set
(G) ALU
(H) None of the above

106. CPU executes every instruction by means of small operations known as
(E) Mini- operations
(F) Macro-operations
(G) Nano-operations
(H) Micro-operations

107. Data is received from the memory in case of read operations and it is held in the memory
in case of write operations by
(E) Memory Buffer Register (MBR)
(F) Accumulator (AC)
(G) Instruction Register (IR)
(H) Memory Address Register (MAR)

108. The next instruction to be executed subsequent to the current instruction being executed
is kept track of by
(E) Memory Buffer Register (MBR)
(F) Accumulator (AC)
(G) Instruction Register (IR)
(H) Program Counter (PC)

109. The processor in a personal computer that is embedded in small devices is often called a
(E) Microprocessor
(F) Macro processor
(G) Multiprocessor
(H) None of the above

110. 1 gigabytes is equal to
(E) 1024 bytes
(F) 1024 kilobytes
(G) 1024 megabytes
(H) 1024 bits

111. The heart and the brain of a computer is
(E) The CPU
(F) The motherboard
(G) The hard disk drive
(H) The monitor

112. The backbone of a computer is
(A) The CPU
(B) The motherboard
(C) The hard disk drive
(D) The monitor

113. The speed of hard disk drive is measured in
(A) Rotation per minute
(B) Rotation per second
(C) Rotation per hour
(D) Rotation per day

114. Pen drive is a
(A) Primary memory
(B) Secondary memory
(C) Cache memory
(D) Internal memory

115. ROM is a
(A) Read write memory
(B) Volatile memory
(C) Read only memory
(D) All of the above

116. A read only memory which can be written only once using special electronic equipment
is
(A) EPROM
(B) PROM
(C) SRAM
(D) ROM

117. _____________ is an illusion that the operating system provides to simplify the
application’s view of memory.
(A) Auxiliary memory
(B) Primary memory
(C) Secondary memory
(D) Virtual memory

118. Memory speed is measured with the help of __________.
(A) CPU speed
(B) Block read speed
(C) Memory access speed
(D) None of the above

119. The memory access speed is measured in
(A) Megahertz
(B) Kilohertz
(C) Gigahertz
(D) Hertz

120. The size of a floppy disks varies from
(A) 250KB to 360 KB
(B) 360 KB to 1 GB
(C) 360 KB to 2 GB
(D) 360 KB to 2.88 MB



121. The time required to locate and retrieve the data from the storage unit is
(A) Access time
(B) Access mode
(C) Storage capacity
(D) Storage cost

122. _________stores binary information using clocked sequential circuits.
(A) RAM
(B) SRAM
(C) DRAM
(D) ROM

123. _________ stores binary information in the form of electric charges that are applied to
capacitors inside the chip.
(A) RAM
(B) SRAM
(C) DRAM
(D) ROM

124. The data recording density is measured in
(A) Bits per inch
(B) Bytes per inch
(C) Kilobytes per inch
(D) Megabytes per inch

125. Storage capacity of a tape is equal to the product of data recording density and ________.
(A) Area of tape
(B) Breadth of tape
(C) Height of tape
(D) Length of tape

126. Inter-track gaps are used to separate the adjacent tracks so that the interference of
magnetic fields is ________.
(A) Minimized
(B) Maximized
(C) Expanded
(D) None of the above

127. Tracks are commonly divided into sections called _________.
(A) Cells
(B) Sectors
(C) Both (A) and (B)
(D) None of the above

128. If there are 100 tracks on each disk surface, there are ________ cylinders in the disk
pack.
(A) 99
(B) 101
(C) 100
(D) 1000

129. If a disk pack consists of 4 plates each having 2655 tracks having 125 sectors per track.
Also, each sector can store 512 bytes, then, storage capacity is approximately.
(A) 1 MB
(B) 1GB
(C) 1 X 1010 bytes
(D) 10 GB

130. The average seek time in most systems is
(A) 10-100 milliseconds
(B) 10-100 seconds
(C) 10-100 minutes
(D) 10-100 hours

131. The time taken for positioning the head on a specific track is called
(A) Average time
(B) Latency time
(C) Seek time
(D) None of the above

132. The rotational speed of a disk is measured in
(A) Rotation per minute
(B) Rotation per second
(C) Rotation per hour
(D) None of the above

133. Which of the following is used as wildcards
(A) /
(B) =
(C) *
(D) All of the above

134. For a 3.5 disk high density disk which has 80 tracks, 18 sectors/tracks, 512bytes/sector,
the disk storage capacity is approximately
(A) 1.4 MB
(B) 1.4 GB
(C) 1.4 KB
(D) None of the above

135. The size for the disk platters range between _________ in diameter.
(A) 1 to 10 inches
(B) 1 to 15 inches
(C) 1 to 20 inches
(D) 1 to 14 inches

136. A zip disk has a capacity of about
(A) 1 MB
(B) 70 MB
(C) 150 MB
(D) 100 MB

137. A CD is ________ in diameter and made up of polycarbonate plastic disk.
(A) 4.75 inch
(B) 5.75 inch
(C) 6.75 inch
(D) 3.75 inch

138. The average latency depends on _______ of the disk.
(A) Rotation per sec
(B) Rotation per minute
(C) Rotation per hour
(D) None of the above

139. The current maximum capacity of a CD-ROM is
(A) 700MB
(B) 750 MB
(C) 900 MB
(D) 1200 MB

140. The storage capacity of a dual layer blu-ray disc is
(A) 20 GB
(B) 30 GB
(C) 40 GB
(D) 50 GB

141. _______ is used to get the features of data accuracy, disk drive storage.
(A) Control mode
(B) Interrupt mode
(C) Isochronous mode
(D) Bulk mode

142. Which of the following mode guarantees the timing of data delivery?
(A) Control mode
(B) Interrupt mode
(C) Isochronous mode
(D) Bulk mode

143. The USB 2.0 allows the maximum data speed at the rate of
(A) 480 MB/s
(B) 520 MB/s
(C) 250 MB/s
(D) 350 MB/s

144. Bootable pen drives are also known as
(A) Heavy drives
(B) Light drives
(C) Live drives
(D) Hard drives

145. Memory stick is launched by
(A) Sony
(B) Microsoft
(C) Motorola
(D) IBM

146. The function of _______ is to get the computer software operating when the power is
turned on.
(A) Bootstrap Loader
(B) Cache memory
(C) RAM
(D) ROM

147. In ___________stored information is erased by exposing the chip for a while to
ultraviolet light.
(A) EPROM
(B) ROM
(C) PROM
(D) UVEROM

148. ________ memory is faster than the main memory.
(A) Secondary
(B) Internal processor memory
(C) Cache memory
(D) All of the above

149. _______ refers to the mode in which memory location can be accessed in any order in the
same amount of time.
(A) Sequential access
(B) Direct access
(C) Random Access Memory (RAM)
(D) None of the above

150. Memories that can be accessed only in a pre-defined sequence are
(A) Sequential access memories
(B) Direct access memories
(C) Random Access Memories (RAM)
(D) None of the above

151. If the storage unit can retain the data even after the power is turned off or interrupted, it is
termed as
(A) Volatile storage
(B) Non-volatile storage
(C) Temporary storage
(D) None of the above

152. The amount of data that can be stored or the number of bytes that can be stored per liner
inch of tape is
(A) The data recording capacity
(B) The data recording storage
(C) The data recording density
(D) None of the above

153. ________ devices are also called random-access devices because information is literally
available at random or in any order.
(A) Direct- access
(B) Sequential-access
(C) Permanent-access
(D) All of the above

154. For faster access of data from disk packs ______ are used.
(A) Disks
(B) Tapes
(C) Cartridge
(D) Cylinders

155. ISYS was originally developed for _______ in the year 1988.
(A) Microsoft Windows Operating System
(B) Microsoft Disk Operating System
(C) Linux Operating System
(D) None of the above

156. The disks in which both the surfaces are used for recording are called
(A) Double-Sided (DS) disks
(B) Double Density(DD) disks
(C) High Density (HD)
(D) All of the above

157. The Compact Disk (CD) was invented by
(A) Yoshiro Nakamatsu
(B) James Russell
(C) Jean Bartik
(D) Robert Dennard

158. Digital Versatile Disc-Rewritable (DVD-RW)are rewritable up to
(A) 100 times
(B) 1000 times
(C) 500 times
(D) 2000 times

159. _______ is a communication transfer mode in which data is transferred in both directions
to send and transfer the small amount of data.
(A) Interrupt mode
(B) Isochronous mode
(C) Control mode
(D) Interrupt mode

160. DVD-RW can hold ______ times more data than a full size CD-R.
(A) Two
(B) Five
(C) Seven
(D) Ten

161. __________ is a process of executing programs one after the other using a batch file
program.
(A) Multitasking
(B) Multiprogramming
(C) Time sharing
(D) Batch processing

162. Which of the following refers to loading two or more programs in the computer main
memory and executing them concurrently?
(A) Multitasking
(B) Multiprogramming
(C) Time sharing
(D) Batch processing

163. Three states in time-sharing system are
(A) Ready, running and dead
(B) Ready, begin and running
(C) Ready, running and blocked
(D) Ready, running and interrupt

164. The ability of the computer to handle several application programs concurrently so that
the idle time of the processor is reduced is called
(A) Multitasking
(B) Multiprogramming
(C) Batch processing
(D) Time sharing

165. UNIX was originally developed in 1969 by employees of
(A) Microsoft
(B) AT&T
(C) Sun
(D) Apple

166. Which of the following device is used in a real-time processing?
(A) ATM
(B) Keyboard
(C) Voice-recognition device
(D) All of the above

167. Examples of popular Linux distributions are
(A) Red Hat
(B) Mandrake
(C) SCSE
(D) All of the above

168. The ability of the CPU to serve many users connected to it through network is called
(A) Timesharing
(B) Networking
(C) Multitasking
(D) Multiprogramming

169. C is known as
(A) Low level programming language
(B) High level programming language
(C) Machine language
(D) None of the above

170. Which of the following is language processor?
(A) Assembler
(B) Interpreter
(C) Compiler
(D) All of the above

171. _______ converts an assembly language program into machine language.
(A) Assembler
(B) Interpreter
(C) Compiler
(D) All of the above

172. MS-DOS is a ________ operating system offered by Microsoft.
(A) Single-user, single tasking
(B) Single user, multitasking
(C) Multiuser, multitasking
(D) Multiuser, single tasking

173. A computer connected to a network is called a ________.
(A) Hub
(B) Bridge
(C) Router
(D) Node

174. In ________ topology, each device connects to a central point through cables in a
network.
(A) Bus topology
(B) Star topology
(C) Ring topology
(D) Hybrid topology

175. Which of the following is an example of Star topology?
(A) ARCnet
(C) Neither (A) nor (B)
(D) Both (A) and (B)

176. FDDI is an example of _______.
(A) Bus topology
(B) Star topology
(C) Ring topology
(D) Hybrid topology

177. ________ refers to a network used to connect different equipments from remote areas.
(A) LAN
(B) WAN
(C) MAN
(D) None of the above

178. _______refer to the LANs connected through high-speed, seamless inter-connection
within a ‘metropolitan’ area.
(A) Remote LAN
(B) WAN
(C) MAN
(D) None of the above

179. _________ is the lower part of TCP/IP whose function is to handle the address part of
each packet to enable it to be delivered to the right destination.
(A) IP
(B) TCP
(C) FTP
(D) Telnet

180. ________is the simplest and most commonly used protocol for downloading/uploading a
file from/to a server.
(A) IP
(B) TCP
(C) FTP
(D) Telnet

181. _________ is a unique number associated with each computer making it uniquely
identifiable amongst all the computers connected to the Internet.
(A) IP address
(B) MAC address
(C) Inode
(D) None of the above

182. ________is the language for publishing hypertext pages on WWW.
(A) HTTP
(B) High level language
(C) Machine language
(D) HTML

183. Examples of meta-search engines are
(A) MetaCrawler
(B) Mamma
(C) DogPile
(D) All of the above

184. The Internet Relay Chat was developed by
(A) Jarkko Oikarinen
(B) Tim Berners-Lee
(C) Robert Cailliau
(D) None of the above

185. Which of the following is not an example of search engine?
(A) Google
(B) Gmail
(C) Yahoo
(D) Altavista

186. Inserting spurious data or information into an organization’s system to disrupt or
overload services is called
(A) Interruption
(B) Interception
(C) Modification
(D) Fabrication

187. Human speech can be effectively reproduces at a rate of
(A) 2.5 kHz
(B) 5.5 kHz
(C) 10 kHz
(D) 11kHz

188. Which of the following language processors converts a high-level language program line
by line into a machine language?
(A) Assembler
(B) Interpreter
(C) Compiler
(D) None of the above

189. The first Linux kernel was released to the public in
(A) 1990
(B) 1991
(C) 1992
(D) 1993

190. Microsoft released Windows NT in
(A) 1990
(B) 1991
(C) 1992
(D) 1993

191. When multiple topologies are put into one large topology, it is called
(A) Star topology
(B) Ring topology
(C) Hybrid topology
(D) Bus topology

192. A dial-up connection enables to connect to ISP using a
(A) Modem
(B) Router
(C) Gateways
(D) Bridge

193. Which of the following is an example of Web browser?
(A) Yahoo
(B) Google
(C) Mozilla Fire box
(D) Gmail

194. The process of altering the data for the purpose of disruption is called
(A) Interruption
(B) Interception
(C) Modification
(D) Fabrication

195. ________ is a function in router that allows dumping of invalid packet for a specific
network instead of forwarding.
(A) Forwarding
(B) Filtering
(C) Selecting
(D) None of the above

196. ___________ forms the highest layer of TCP/IP and divides a message over file into
smaller packets which are transmitted over the Internet.
(A) TCP
(B) IP
(C) Telnet
(D) FTP

197. A ________ is typically a database containing information about domain names and their
correspondence IP address.
(A) Telnet
(B) FTP
(C) TCP
(D) DNS

198. DNS is an Internet service that translates domain names to or from __________.
(A) MAC address
(B) IP address
(C) Both (A) and (B)
(D) None of the above

199. _________ is software to compress a file.
(A) WinZip
(B) Xine
(C) Miro 5
(D) All of the above

200. An example of ring topology is
(A) ARCnet
(B) 10Base-T
(C) 100Base-TX
(D) IBM token ring