The document discusses various computer hardware and software terms. It provides definitions and details for terms like SSD, MIDI, SDHC, RAM, CPU, MP3, MPEG, and others. It also covers computer components, data storage, compression techniques, and networking concepts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
1K views
CS101 Grand Quiz MCQS
The document discusses various computer hardware and software terms. It provides definitions and details for terms like SSD, MIDI, SDHC, RAM, CPU, MP3, MPEG, and others. It also covers computer components, data storage, compression techniques, and networking concepts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8
1 compact disk is consist of material: Reflective
2 Digital versatile disk capacity is ......MB 600 to 700
3 SSDs stand for........ solid state disk 4 ASCII codes have ....... combinations 27 5 Unicode’s have a unique pattern of ......bits. 21 6 MIDI stands for......... musical instrument digital interface 7 Integer representation in 2's complement used normally 32 .......bits 8 When data being compressed consist of long sequence of Run length same value, the compression technique is called...... encoding 9 SDHC (high capacity) can provide. .......GBs 32 10 Mostly computers have additional storage devices Mass storage called....... 11 Most computers have additional memory device called DVD,s and flash mass storage is drive 12 When you want to search Google or search a query on a d):"@" particular social media, you can add a symbol? 13 Fact sheet of ENIAC having weight 30 tons 14 Example of search engine is ----------------- Google, Yahoo and MSN 15 The rate at which data transfer to or from disk transfer rate 16 Computer hardware is the collection of ….. of computer Physical parts system 17 A machine especially one programmer by a computer are Robots called 18 Computer science applications are………… 7 19 Data base learn about will be implemented using --------- DBMS -- tool like Microsoft access 20 One of the earlier computer device was the ----------------- Abacus -- 21 1 kilo byte is equal to ----------------------- 1024 byte 22 1 tear byte is equal to ----------- 1024 GB 23 In one bit we can represent two pattern -------- 0 or 1 24 The bit receiver is known as the machine Main memory 25 RAM access for ---------------- Random access memory 26 The rate at which can be transferred to or from the disk Transfer rate 27 BDs stand for ----------------------- Blue ray disk 28 CAD stand for ------------- Computer added design 29 Loosy techniques can often provide than -------- More compression than lossless 30 A variation of dictionary encoding is ------------------ Adaptive dictionary encoding 31 -------- is storage organization in which are ordered in Queue FIFO fashion 32 Techniques that allow the steps in the machine cycle to Pipelining overlap 33 MP3 do not require transfer rate more than.... 64 Kbps 34 ___successfully relayed on communication paths having MPEG 40 Mbps Transfer rate. 35 CPU and main memory connected via........ Bus 36 MP3 is short for..... MPEG layer 3 37 The best known system for compressing audio is...... MP3 38 The idea of storing a computer's programme in its main Stored program memory is called....... concept 39 CPU is designed to recognise institutions encoded as Bit patterns 40 Collection of instructions along with the encoding system Machine is called language 41 RISC stands for Reduced instructions set computer 42 A request to transfer the contents of a register to a STORE memory cell is called........ instructions 43 The commonly used standards for encoding and MPEG compressing audio and video were developed: 44 CPU consists ……..parts: 3 45 The use of AND operation is an example of the Masking process……..: 46 8Kbps=…………: 1KB per second 47 Communication between computer and other device is Controller handling through apparatus called……: 48 The ability of a controller to access main memory DMA called…..: 49 WAN is abbreviated of ……..: wide wire network 50 The best known system of compressing audio is....... mp3 51 Mp3recording generally require transfer rates of no more 64 than ------kbps. 52 To compare sequence of picture in MPEG only some of I – frame the pictures called 53 A machine CPU and main memory are connected by a Bus collection of wires called? 54 The idea of storing a computer’s program in its main Store data memory is called? 55 The now decode the content of its instruction register and 5 and 6 executes its by activating the two’s complement addition circulatory with inpits being register? 56 The use of AND operation example of the process called Masking ? 57 The result of circular shift is called? Rotation 58 Usb and Fire wire provide several? Hundred Mbps 59 Communication between computing device is handled Serial and over path? parallel communication 60 GbPS is? Billion Bits 61 The portion of an operating system that handles this :user interface communication is often called the 62 Most file manager allow files to be grouped into a bundle :folder called 63 A chain of directories within directions called ….. ..path Directory 64 Components of an operating system's kernel is the memory manager 65 The memory manger reserves of storage space on a 4GB magnetic disk 66 Rom stands for Read only memory 67 Culprit that auditing systems are designed to detect in the sniffing software presence 68 A network of former type is called …….. network Open 69 Computer network is often classified as: All of these 70 The technique of holding data for output at a later but Spooling more convenient time is called 71 A technique that transfer the distribution problem to Multi cast internet routes -- 72 A programme that enter a computer system disguised as Trojan horse a desirable programmed ----------- 73 Transporting audio and video across the internet in real Streaming time is known as 74 If a user is using CGI script on a UNIX server, then the server side script type is called........ scripting 75 XML stands for Extensible markup language
76 OSI stands for Open system
interconnection 77 3… Is a software that infects a computer by inserting Virus itself into programs that already reside in the machine 78 ….is an autonomous program that transfers itself through Worm a network, taking up residence in computer and forwarding copies of itself to other computer. 79 Another form of malicious software is Spyware 80 Dos stands for Denial of service 81 Problem associated with an abundance of unwanted Spam messages is the proliferation of unwanted email called. 82 Prevention tool that has filtering connotation is the….. Proxy server 83 SSL stands for Secure socket layer 84 Public key is used for ………messages Encrypt 85 Virus is executed in a computer Before execution of Host 86 Explosion of replicated copies that degrade the . Worm performance of legtimate application. This is property of 87 Trojan can enter through games and utility package 88 Spyware also called Sniffing software 89 Process of overloading a computer with messages. DoS 90 Software that act as a shield to protection from adverse proxy server actions 91 Spam filter can distinguish between desired mail and True spam 92 Which key is required to decrypt messages private key 93 Computer Fraud and abuse act Cover Theft of Information and worms and viruses 94 Repeaters passes signals between Two original buses 95 A bridge is similar to a Repeater 96 Peer-to-peer often abbreviated as P2P
97 ___________ service allow clients to rent virtual Amazon’s
computers by the Elastic Compute hour, without concern for where the computer hardware is Cloud actually located. 98 The distinction between the tier-1 and tier-2 ISPs is often True a matter of opinion. 99 An access ISP is essentially an independent internet, Intranet sometimes called 100 The process of using DNS to perform a translation is DNS Lookup called 101 VoIP is the abbreviation of Voice over Internet Protocol 102 An enormous portion of current internet traffic is used for Streaming transporting audio and video across the internet in real time, is known as 103 WWW is the abbreviation of World Wide Web True 104 A networking technology called ___________, which Anycast enables an end user to automatically connect to the closest server out of a defined group of servers helps to make CDNs practical 105 A second form of VoIP consists of Analog Telephone Adapters 106 The point at which one network is linked to an internet is Gateway offen called 107 Distributed system in which many independed computer Cluster work closely to gether to provide computation or service computing comparable to a mach larger machine? 108 Each domain must be registerd with ICANN process Registrars handled by companies called? 109 DNS mean? Domain name System 110 Softwere packages that allow users to access hypertext on Browsers and the internet fall into categories? Webserver
111 Essentially a notational system by which a text document HTML
along with the document’s appearance can be encoded as a simple text file 112 Hypertext document also contain special symbol called? Tags 113 URL means? Uniform Resource Locator 114 Common Internet brewers include..... Firefox, safari 115 The distinction is that a hypertext document also contains Tags special symbol.. 116 A traditional hypertext document is similar text file source version because text is HTML - encoded... 117 HTM is essentially a notional system by which text simple text file document's... 118 )Music is traditionaly reperseted does not conform the text file character by character.. 119 The additional activity by either the browser or the web client side browser.. 120 Then it hands these segment known .. Packets 121 OSI standard for ...... Open system interconnections 122 Origin perpare a packet it appends a value called .. hop count 123 If two functins were performed 'PROCESS LOAN' AND ' If-else method REJECT APPRECIATION' what should be structure of problem 124 What should be sequenc Problem-devise plan-carry plane 125 Stepwise refinement is a strategy to conquere ___ at once Task 126 Which strategy is contrast to stepwise refinement Bottom-up methodology 127 Which has cause Computer science to grow so much Algorithms and problem solving 128 As a general rule the use of a loop structure produces........ higher degree Of flexibility 129 A method of implementing repitition is the iterative Loop structure knows as 130 Change the state in such a way that it moves towards the Modify termination condition 131 In each iteration "i" the current value of "i" will........ Multiplied With current value of "f" 132 The control of a loop consist of how many activities Three 133 Repeat loop structure referred to as a posttest loop 134 If we reach the end of the list without finding the target Failure value our search terminates as.... 135 In which collection of instructions called... body of loop 136 Write a___ for finding maximum number from a list. pseudo-code 137 The loop will keep executing until____ remains smaller I or equal to n. 138 Set of steps that define how a task is performed is called Algorithm
139 In Unambiguous, the information in the state of the True
process must be sufficient to determine uniquely and completely the actions required by each step. 140 A single algorithm can be represented in ________ Many ways
141 The sentence, ________________ could mean either that “Visiting
the grandchildren cause problems when they come to visit grandchildren or that going to see them is problematic. can be nerve racking”
142 One semantic structure is the ________ of a computed Saving
value. 143 Another common semantic structure is no any repeation True execution of a statement or sequence of statements as long as some condition remains true. 134 In...... a man in Texas received very high radiations. 1986 135 Which is not the advantage of software verification None 136 Computer can execute.......of instructions iin a second Billions 137 A measure of the execution time necessary for an Data algorithm to complete work in a set of 138 In general a recursive function is designed to test for the Base or termination condition often called degenerative case 139 One method of implementing such repetition is the Loop iterative structure known as: 140 In which execution of function the tested condition we're process loan true. ?? 141 select the entry in the list known as: test entry 142 A............methodology progresses from the specific to the bottom up general : 143 the collection of instructions called?? Body 144 the loosely defined problem solving phases presented by 1945 the mathematicians G.polya in..........?? 145 Test for termination is performed before the body is True executed in pretest loop: 146 In insertion sort Algorithms lists are sorted out into: alphabetical order 147 IF our target value is not present in oriental list, our By dividing into approach to search will proceed as: smaller segments 148 Binary search executes each stage of a repetition as a Recursion subtask of the previous stage, known as: 149 A recursive function is designed to test for: Degenerative and base case and termination condition (All)
BEST OF LUCK AND JAZAK ALLAH FOR ALL THOSE MEMBERS WHO COPERATE WITH ME AND GROUP ADMINS