0% found this document useful (0 votes)
1K views

CS101 Grand Quiz MCQS

The document discusses various computer hardware and software terms. It provides definitions and details for terms like SSD, MIDI, SDHC, RAM, CPU, MP3, MPEG, and others. It also covers computer components, data storage, compression techniques, and networking concepts.

Uploaded by

Hani Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

CS101 Grand Quiz MCQS

The document discusses various computer hardware and software terms. It provides definitions and details for terms like SSD, MIDI, SDHC, RAM, CPU, MP3, MPEG, and others. It also covers computer components, data storage, compression techniques, and networking concepts.

Uploaded by

Hani Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

1 compact disk is consist of material: Reflective

2 Digital versatile disk capacity is ......MB 600 to 700


3 SSDs stand for........ solid state disk
4 ASCII codes have ....... combinations 27
5 Unicode’s have a unique pattern of ......bits. 21
6 MIDI stands for......... musical
instrument
digital interface
7 Integer representation in 2's complement used normally 32
.......bits
8 When data being compressed consist of long sequence of Run length
same value, the compression technique is called...... encoding
9 SDHC (high capacity) can provide. .......GBs 32
10 Mostly computers have additional storage devices Mass storage
called.......
11 Most computers have additional memory device called DVD,s and flash
mass storage is drive
12 When you want to search Google or search a query on a d):"@"
particular social media, you can add a symbol?
13 Fact sheet of ENIAC having weight 30 tons
14 Example of search engine is ----------------- Google, Yahoo
and MSN
15 The rate at which data transfer to or from disk transfer rate
16 Computer hardware is the collection of ….. of computer Physical parts
system
17 A machine especially one programmer by a computer are Robots
called
18 Computer science applications are………… 7
19 Data base learn about will be implemented using --------- DBMS
-- tool like Microsoft access
20 One of the earlier computer device was the ----------------- Abacus
--
21 1 kilo byte is equal to ----------------------- 1024 byte
22 1 tear byte is equal to ----------- 1024 GB
23 In one bit we can represent two pattern -------- 0 or 1
24 The bit receiver is known as the machine Main memory
25 RAM access for ---------------- Random access
memory
26 The rate at which can be transferred to or from the disk Transfer rate
27 BDs stand for ----------------------- Blue ray disk
28 CAD stand for ------------- Computer added
design
29 Loosy techniques can often provide than -------- More
compression than lossless
30 A variation of dictionary encoding is ------------------ Adaptive
dictionary
encoding
31 -------- is storage organization in which are ordered in Queue
FIFO fashion
32 Techniques that allow the steps in the machine cycle to Pipelining
overlap
33 MP3 do not require transfer rate more than.... 64 Kbps
34 ___successfully relayed on communication paths having MPEG
40 Mbps
Transfer rate.
35 CPU and main memory connected via........ Bus
36 MP3 is short for..... MPEG layer 3
37 The best known system for compressing audio is...... MP3
38 The idea of storing a computer's programme in its main Stored program
memory is called....... concept
39 CPU is designed to recognise institutions encoded as Bit patterns
40 Collection of instructions along with the encoding system Machine
is called language
41 RISC stands for Reduced
instructions set
computer
42 A request to transfer the contents of a register to a STORE
memory cell is called........ instructions
43 The commonly used standards for encoding and MPEG
compressing audio and video were developed:
44 CPU consists ……..parts: 3
45 The use of AND operation is an example of the Masking
process……..:
46 8Kbps=…………: 1KB per second
47 Communication between computer and other device is Controller
handling through apparatus called……:
48 The ability of a controller to access main memory DMA
called…..:
49 WAN is abbreviated of ……..: wide wire
network
50 The best known system of compressing audio is....... mp3
51 Mp3recording generally require transfer rates of no more 64
than ------kbps.
52 To compare sequence of picture in MPEG only some of I – frame
the pictures called
53 A machine CPU and main memory are connected by a Bus
collection of wires called?
54 The idea of storing a computer’s program in its main Store data
memory is called?
55 The now decode the content of its instruction register and 5 and 6
executes its by activating the two’s complement addition
circulatory with inpits being register?
56 The use of AND operation example of the process called Masking
?
57 The result of circular shift is called? Rotation
58 Usb and Fire wire provide several? Hundred Mbps
59 Communication between computing device is handled Serial and
over path? parallel
communication
60 GbPS is? Billion Bits
61 The portion of an operating system that handles this :user interface
communication is often called the
62 Most file manager allow files to be grouped into a bundle :folder
called
63 A chain of directories within directions called ….. ..path Directory
64 Components of an operating system's kernel is the memory
manager
65 The memory manger reserves of storage space on a 4GB
magnetic disk
66 Rom stands for Read only
memory
67 Culprit that auditing systems are designed to detect in the sniffing software
presence
68 A network of former type is called …….. network Open
69 Computer network is often classified as: All of these
70 The technique of holding data for output at a later but Spooling
more convenient time is called
71 A technique that transfer the distribution problem to Multi cast
internet routes --
72 A programme that enter a computer system disguised as Trojan horse
a desirable programmed -----------
73 Transporting audio and video across the internet in real Streaming
time is known as
74 If a user is using CGI script on a UNIX server, then the server side
script type is called........ scripting
75 XML stands for Extensible
markup language

76 OSI stands for Open system


interconnection
77 3… Is a software that infects a computer by inserting Virus
itself into programs that already reside in the machine
78 ….is an autonomous program that transfers itself through Worm
a network, taking up residence in computer and
forwarding copies of itself to other computer.
79 Another form of malicious software is Spyware
80 Dos stands for Denial of service
81 Problem associated with an abundance of unwanted Spam
messages is the proliferation of unwanted email called.
82 Prevention tool that has filtering connotation is the….. Proxy server
83 SSL stands for Secure socket
layer
84 Public key is used for ………messages Encrypt
85 Virus is executed in a computer Before execution
of Host
86 Explosion of replicated copies that degrade the . Worm
performance of legtimate application. This is property of
87 Trojan can enter through games
and utility
package
88 Spyware also called Sniffing software
89 Process of overloading a computer with messages. DoS
90 Software that act as a shield to protection from adverse proxy server
actions
91 Spam filter can distinguish between desired mail and True
spam
92 Which key is required to decrypt messages private key
93 Computer Fraud and abuse act Cover Theft of
Information and
worms and
viruses
94 Repeaters passes signals between Two original
buses
95 A bridge is similar to a Repeater
96 Peer-to-peer often abbreviated as P2P

97 ___________ service allow clients to rent virtual Amazon’s


computers by the Elastic Compute
hour, without concern for where the computer hardware is Cloud
actually located.
98 The distinction between the tier-1 and tier-2 ISPs is often True
a matter of opinion.
99 An access ISP is essentially an independent internet, Intranet
sometimes called
100 The process of using DNS to perform a translation is DNS Lookup
called
101 VoIP is the abbreviation of Voice over
Internet Protocol
102 An enormous portion of current internet traffic is used for Streaming
transporting audio and video across the internet in real
time, is known as
103 WWW is the abbreviation of World Wide Web True
104 A networking technology called ___________, which Anycast
enables an end user to automatically connect to the closest
server out of a defined group of servers helps to make
CDNs practical
105 A second form of VoIP consists of Analog
Telephone
Adapters
106 The point at which one network is linked to an internet is Gateway
offen called
107 Distributed system in which many independed computer Cluster
work closely to gether to provide computation or service computing
comparable to a mach larger machine?
108 Each domain must be registerd with ICANN process Registrars
handled by companies called?
109 DNS mean? Domain name
System
110 Softwere packages that allow users to access hypertext on Browsers and
the internet fall into categories? Webserver

111 Essentially a notational system by which a text document HTML


along with the document’s appearance can be encoded as
a simple text file
112 Hypertext document also contain special symbol called? Tags
113 URL means? Uniform
Resource
Locator
114 Common Internet brewers include..... Firefox, safari
115 The distinction is that a hypertext document also contains Tags
special symbol..
116 A traditional hypertext document is similar text file source version
because text is HTML - encoded...
117 HTM is essentially a notional system by which text simple text file
document's...
118 )Music is traditionaly reperseted does not conform the text file
character by character..
119 The additional activity by either the browser or the web client side
browser..
120 Then it hands these segment known .. Packets
121 OSI standard for ...... Open system
interconnections
122 Origin perpare a packet it appends a value called .. hop count
123 If two functins were performed 'PROCESS LOAN' AND ' If-else method
REJECT APPRECIATION' what should be structure of
problem
124 What should be sequenc Problem-devise
plan-carry plane
125 Stepwise refinement is a strategy to conquere ___ at once Task
126 Which strategy is contrast to stepwise refinement Bottom-up
methodology
127 Which has cause Computer science to grow so much Algorithms and
problem solving
128 As a general rule the use of a loop structure produces........ higher degree
Of flexibility
129 A method of implementing repitition is the iterative Loop
structure knows as
130 Change the state in such a way that it moves towards the Modify
termination condition
131 In each iteration "i" the current value of "i" will........ Multiplied
With current value of "f"
132 The control of a loop consist of how many activities Three
133 Repeat loop structure referred to as a posttest loop
134 If we reach the end of the list without finding the target Failure
value our search terminates as....
135 In which collection of instructions called... body of loop
136 Write a___ for finding maximum number from a list. pseudo-code
137 The loop will keep executing until____ remains smaller I
or equal to n.
138 Set of steps that define how a task is performed is called Algorithm

139 In Unambiguous, the information in the state of the True


process must be sufficient to determine uniquely and
completely the actions required by each step.
140 A single algorithm can be represented in ________ Many ways

141 The sentence, ________________ could mean either that “Visiting


the grandchildren cause problems when they come to visit grandchildren
or that going to see them is problematic. can be nerve
racking”

142 One semantic structure is the ________ of a computed Saving


value.
143 Another common semantic structure is no any repeation True
execution of a statement or sequence of statements as
long as some condition remains true.
134 In...... a man in Texas received very high radiations. 1986
135 Which is not the advantage of software verification None
136 Computer can execute.......of instructions iin a second Billions
137 A measure of the execution time necessary for an Data
algorithm to complete work in a set of
138 In general a recursive function is designed to test for the Base or
termination condition often called degenerative
case
139 One method of implementing such repetition is the Loop
iterative structure known as:
140 In which execution of function the tested condition we're process loan
true. ??
141 select the entry in the list known as: test entry
142 A............methodology progresses from the specific to the bottom up
general :
143 the collection of instructions called?? Body
144 the loosely defined problem solving phases presented by 1945
the mathematicians G.polya in..........??
145 Test for termination is performed before the body is True
executed in pretest loop:
146 In insertion sort Algorithms lists are sorted out into: alphabetical
order
147 IF our target value is not present in oriental list, our By dividing into
approach to search will proceed as: smaller segments
148 Binary search executes each stage of a repetition as a Recursion
subtask of the previous stage, known as:
149 A recursive function is designed to test for: Degenerative
and base case
and termination
condition (All)

BEST OF LUCK AND JAZAK ALLAH FOR ALL THOSE MEMBERS WHO
COPERATE WITH ME AND GROUP ADMINS

You might also like