Sr.No | MCQS QUESTIONS: | ANSWER: |
1 | compact disk is consist of material: | Reflective |
2 | Digital versatile disk capacity is__________MB. | 600 to 700 |
3 | SSDs stand for…….. | Solid State DISCK |
4 | ASCII codes have ……. combinations | 27 |
5 | Unicode’s have a unique pattern of ……bits. | 21 |
6 | MIDI stands for……… | Musical Instrument Digital Interface |
7 | Integer representation in 2’s complement used normally…………..BITS | 23 |
8 | When data being compressed consist of long sequence of________same value, the compression technique is called |  Run Length Encoding |
9 | SDHC (high capacity) can provide. …….GBs | 32 |
10 | Mostly computers have additional storage devices……….is called | Message storage |
11 | Most computers have additional memory device called………. mass storage is | DVD’s and Flash Drive |
12 | When you want to search Google or search a query on a particular social media , you can add a symbol? |  “@†|
13 | Fact sheet of ENIAC having weight | 30 Tons |
14 | Example of search engine is —————– | Google ,yahoo and MSN |
15 | The rate at which data transfer to or from disk | Transfer Rate |
16 | Computer hardware is the collection of …… of computer system | Physical Parts |
17 | Â A machine especially one programmer by a computer are called | ROBOTS |
18 | Computer science applications are………… | 7 |
19 | ———Database learn about will be implement educing tool like Microsoft access | DBMS |
20 | ….. One of the ear lie computer device waste | Abacus |
21 | I kilo byte is equal to…….. | 1024 byt |
22 | 1 tear byte is equal to……. | 1024 GB |
23 | ……..In one bit we can represent two pattern | 0 or 1 |
24 | The bit receiver is known as the machine | Main Memory |
25 | RAM access for —————- | Random access Memory |
26 | The rate at which can be transferred to or from the disk | Transfer Rate |
27 | BDs stand for……………… | Blue Ray Disc |
28 | CAD stand for……… | Computer added Design |
29 | Lousy techniques can often provide then………compression than looses  | MORE |
30 | A variation of dictionary encoding is | Adaptive dictionary encoding |
31 | ——– is storage organization in which are ordered in FIFO fashion | QUEUE |
32 | Techniques that allow the steps in the machine cycle to overlap | Pipelining |
33 | MP3 do not require transfer rate more than…. | 64 kbps |
34 | ___successfully relayed on communication paths having 40 Mbps Transfer rate. | MPEG |
35 | CPU and main memory connected via…….. | BUS |
36 | MP3 is short for….. | MPEG layer 3 |
37 | The best known system for compressing audio is…… | MP3 |
38 | The idea of storing a computer’s programmer in its main memory is called……. | Stored program concept |
39 | CPU is designed to recognize institutions encoded as | BIT Pattern |
40 | Collection of instructions along with the encoding system is called | Language |
41 | RISC stands for | Reduced Instruction Set Computer |
42 | A request to transfer the contents of a register to a memory cell is called…….. | Store Instruction |
43 | The commonly used standards for encoding and compressing audio and video were developed. | MPEG |
44 | CPU consists ……..parts: | 3 or Three |
45 | The use of AND operation is an example of the process……..: | Masking |
46 | 8Kbps=…………: | 1 Kb per Second |
47 | Communication between computer and other device is handling through apparatus  called……: | Controller |
48 | The ability of a controller to access main memory is called | DMA |
49 | WAN is abbreviated of ……..: | Wide wire Network |
50 | The best known system of compressing audio is……. | MP3 |
51 | Mp3recording generally require transfer rates of no more than ——kbps. | 64 |
52 | To compare sequence of picture in MPEG only some of the pictures called | I-Frame |
53 | A machine CPU and main memory are connected by a collection of wires Called? | BUS |
54 | The idea of storing a computer’s program in its main memory is called? | Store Data |
55 | The now decode the content of its instruction register and executes its by activating the two’s complement addition circulatory with inputs being register? | 5 and 6 |
56 | The use of AND operation example of the process called ? | Masking |
57 | The result of circular shift is called? | Rotation |
58 | The result of circular shift is called? | Hundred MBPS |
59 | Communication between computing device is handled over path | Serial and parallel communication |
60 | GbPS is? | Billion Bits |
61 | The portion of an operating system that handles this communication is often called the | User Inter face |
62 | Most file manager allow files to be grouped into a bundle called | FOLDER |
63 | A chain of directories within directions called …. ..path | Directory |
64 | Components of an operating system’s kernel is the | Memory Manager |
65 | The memory manger reserves of storage space on a magnetic disk | 4 GB |
66 | Rom stands for | Read Only Memory |
67 | Culprit that auditing systems are designed to detect in the presence | sniffing software |
68 | A network of former type is called …….. network | Open |
69 | Computer network is often classified as: | All of these |
70 | The technique of holding data for output at a later but more convent time is called | Spooling |
71 | A technique that transfer the distribution problem to internet routes…….. | Multicast |
72 | A programmer that enter a computer system disguised as a desirable programmed ———– | Trojan horse |
73 | Transporting audio and video across the internet in real time is known as | Streaming |
74 | If a user is using CGI script on a UNIX server, then the script type is called…….. | Server side scripting |
75 | XML stands for | extensible markup language |
76 | OSI stands for | Open Systems Interconnection |
77 | 3… Is a software that infects a computer by inserting itself into programs that already reside in the machine | Virus |
78 | ….is an autonomous program that transfers itself through a network, taking up residence in computer and forwarding copies of itself to other computer. | WORM |
79 | Another form of malicious software is | Spyware |
80 | Dos stands for | Denial of service |
81 | Problem associated with an abundance of unwanted messages is the proliferation of unwanted email called. | Spam |
82 | Prevention tool that has filtering connotation is the….. | Proxy Server |
83 | SSL stands for | Secure Sockets Layer |
83 | SSL stands for | Secure Sockets Laye |
84 | Public key is used for ………messages | Encrypt |
85 | Virus is executed in a computer | Before execution of Host |
86 | Explosion of replicated copies that degrade the performance of legitimate application. This is property of | Worm |
87 | Trojan can enter | through games and Unity package |
88 | Spyware also called | Shifting Software |
89 | Process of overloading a computer with messages. | DOS |
90 | Software that act as a shield to protection from adverse action | proxy server |
91 | Spam filter can distinguish between desired mail and spam | Â TRUE |
92 | Which key is required to decrypt messages | Private Key |
93 | Computer Fraud and abuse act Cover | Theft of information and worms and virus |
94 | Repeaters passes signals between | Two original Busses |
95 | A bridge is similar to a | Repetor |
96 | Peer-to-peer often abbreviated as | P2P |
97 | ________ service allow clients to rent virtual computers by the hour, without concern for where the computer hardware is actually located | Amazon’s Elastic Compute cloud |
98 | Â The distinction between the tier-1 and tier-2 ISPs is often a matter of opinion | TRUE |
99 | An access ISP is essentially an independent internet, sometimes called | INTERNET |
100 | The process of using DNS to perform a translation is called | DONS Lookup |
101 | VoIP is the abbreviation of | Voice over Internet Protocol |
102 | An enormous portion of current internet traffic is used for transporting audio and video across the internet in real time, is known as | Streaming |
103 | WWW is the abbreviation of World Wide Web | TRUE |
104 | A networking technology called ___________, which enables an end user to automatically connect to the closest server out of a define group of servers helps to make CDNs practical | Any cast |
105 | Â A second form of VOIP consist of | Analogue , Telephone and adaptors |
106 | The point at which one network is linked to an internet is often called | Gateway |
107 | Distributed system in which many in depended computer work closely together to provide computation or service comparable to a much larger machine? | Cluster Computing |
108 | Each domain must be registered with ICANN process handled by companies called? | Â Registrar |
109 | DNS mean? | Domain Name system |
110 | Software packages that allow users to access hypertext on the internet fall into categories? | Browser and webserver |
111 | Essentially a notational system by which a text document along with the document’s appearance can be encoded as a simple text file | HTML |
112 | Hypertext document also contain special symbol called? | TAGS |
113 | URL means | Uniform source Locator |
114 | Common Internet brewers include….. | Fire Fox safari |
115 | The distinction is that a hypertext document also contains special symbol.. | TAGS |
116 | A traditional hypertext document is similar text file because text is HTML – encoded… | Source Version |
117 | HTM is essentially a notional system by which text document’s… | Simply Text File |
118 | )Music is traditionally represented does not conform the character by character.. | TEXT File |
119 | The additional activity by either the browser or the web browser | Client Side |
120 | Then it hands these segment known .. | Packets |
121 | Origin prepare a packet it appends a value called .. | Hop count |
122 | If two functions were performed ‘PROCESS LOAN’ AND ‘ REJECT APPRECIATION’ what should be structure of problem | IF-Else Method |
123 | What should be sequence? | Problem devise plan carry plan |
124 | Stepwise refinement is a strategy to conquered ___ at once | TASK |
125 | Which strategy is contrast to stepwise refinement | Bottom-Up Methodology |
126 | Which has cause Computer science to grow so much | Algorithm and problem solving |
127 | As a general rule the use of a loop structure produces……..off flexibility | Higher Degree |
128 | A method of implementing repetition is the iterative structure knows as | LOOP |
129 | Change the state in such a way that it moves towards the termination condition | Modify |
130 | In each iteration “i†the current value of “i†will…….. With current value of “f†| Multiplied |
131 | The control of a loop consist of how many activities | Three |
132 | Repeat loop structure referred to as a | Posttest Loop |
133 | If we reach the end of the list without finding the target value our search terminates as…. | Failure |
134 | In which collection of instructions called… | A body of Loop |
135 | Write a___ for finding maximum number from a list. | Pseudo-Code |
136 | The loop will keep executing until____ remains smaller or equal to n | I |
137 | Set of steps that define how a task is performed is called | Algorithms |
138 | In Unambiguous, the information in the state of the process must be sufficient to determine uniquely and completely the actions required by each step. | TRUE |
139 | A single algorithm can be represent in……… | Many ways |
140 | The sentence, ________________ could mean either that the grandchildren cause problems when they come visit or that going to see them is problematic. | “Visiting grandchildren can b never racking |
141 | One semantic structure is the ________ of a computed value. | Saving |
142 | Another common semantic structure is no any reparation execution of a statement or sequence of statement as long as some condition true. | True |
143 | In……. a man in Texas received very high radiations. | 1986 |
144 | Which is not the advantage of software verification | NONE |
145 | Computer can execute…….of instructions in a second | Billions |
146 | A measure of the execution time necessary for an algorithm to complete work in a set of | DATA |
147 | In general a recursive function is designed to test for the termination condition often called | Base or degenerative Case |
148 | One method of implementing such repetition is the iterative structure known as: | LOOP |
149 | In which execution of function the tested condition we’re true. ?? | Process Loan |
150 | select the entry in the list known as: | Test Entry |
151 | A…………methodology progresses from the specific to the general : | Bottom UP |
152 | The collection of instructions called?? | BODY |
153 | the loosely defined problem solving phases presented by the mathematicians G.polya in……….?? | 1945 |
154 | Test for termination is performed before the body is executed in pretest loop: | TRUE |
155 | In insertion sort Algorithms lists are sorted out into: | Alphabetical ORDER |
156 | IF our target value is not present in oriental list, our approach to search will proceed as: | By dividing into smaller segments |
157 | Binary search executes each stage of a repetition as a subtask of the previous stage, known as: | Recursion |
158 | A recursive function is designed to test for: | Degenerative and base case and Termination condition (ALL) |
Leave a comment