

As Salam O Alaikum. I hope that you all will be fine and will be studying nice and hard. I also hope that you will find our effort amazing and will surely let us know about the things you liked and the things that are to be improved.
Dear fellows, in this post , we have prepared CS101 Solved Grand Quiz-1 file from the SPRING 2022 season just for you. All the question here have been answered by our Admins and dually verified from the books. In order to give you the best answer, we have also added the cross referenced page number of the CS101 handout.
Just in case, if you want to read and study these questions offline, you can also read our blog CS101 SOLVED QUIZ FILES FALL, 2021 to download the pdf, ppt and docx files.
A total of 240 question we have collected lectures (1-108), and we hope so that you will take advantage of our effort and will also share our work with your friends. INSHALLAH we will have a wonderful journey with you guys’. Good Luck and Be happy.
CS101 Solved QUIZ-1 MCQs (Lectures 1-108)
-
-
- The sum of seek time and rotation delay is called as ____________.
- Rotational time
- Transfer time
- Access time (Page-53)
- Delay time
- The sum of seek time and rotation delay is called as ____________.
-
-
-
- ________ is a short version of binary digit, a smallest unit to store data.
- Bit (Page-60)
- Mega byte
- Pattern
- Byte
- ________ is a short version of binary digit, a smallest unit to store data.
-
-
-
- According to famous job market website in Pakistan, most of the jobs are available in ___________.
- Computer Science (Page-37)
- Biology
- Economics
- Mathematics
- According to famous job market website in Pakistan, most of the jobs are available in ___________.
-
-
-
- ENIAC Stands for.
- Electronic numbers and integrator and calculator
- Electronic numerical integer and calculations
- Electronic numerical integrator and calculator (Page-57)
- Electronic numbers integer and calculations
- ENIAC Stands for.
-
-
-
- A company can develop ____________ for which it chooses to maintain ownership rights.
- Network
- Open system
- Personnel Area Network
- Proprietary Systems (Page-135)
- A company can develop ____________ for which it chooses to maintain ownership rights.
-
-
-
- If you want to search for an exact phrase on Google then enclose it in ___________.
- @
- *
- #
- “ “ (Page-42)
- If you want to search for an exact phrase on Google then enclose it in ___________.
-
-
-
- Binary notation has ________ representations with respect to whole and fractional numbers.
- 4
- 1
- 3
- 2 (Page-42)
- Binary notation has ________ representations with respect to whole and fractional numbers.
-
-
-
- The major responsibility of _________ software is protecting resources from unauthorize access.
- Operating System (Page-133)
- Super User
- Device Driver
- Application
- The major responsibility of _________ software is protecting resources from unauthorize access.
-
-
-
- While sending a message, it is the ________ layer’s responsibility to provide an address that is compatible with internet infrastructure.
- Application (Page-164)
- Link
- Transport
- Network
- While sending a message, it is the ________ layer’s responsibility to provide an address that is compatible with internet infrastructure.
-
-
-
- Which of the following is true about UDP in comparison to TCP?
- More reliable and more efficient
- Less reliable but more efficient (Page-167)
- Less reliable and less efficient
- More reliable but less efficient
- Which of the following is true about UDP in comparison to TCP?
-
-
-
- Which of the following is true about TCP in comparison to UDP?
- More reliable and more efficient
- Less reliable but more efficient
- Less reliable and less efficient
- More reliable but less efficient (Page-167)
- Which of the following is true about TCP in comparison to UDP?
-
-
-
- The _________ resides on a can be computer containing hypertext documents to be accessed.
- File
- Browser
- Web Server (Page-152)
- Client
- The _________ resides on a can be computer containing hypertext documents to be accessed.
-
-
-
- Which of the following is a significant asset to a computer’s performance?
- Memory Bus
- Main Memory
- CPU
- Direct Memory Access (DMA) (Page-110)
- Which of the following is a significant asset to a computer’s performance?
-
-
-
- In hexadecimal notation, ___________ bits represent as single symbol.
- Two
- Three
- One
- Four (Page-64)
- In hexadecimal notation, ___________ bits represent as single symbol.
-
-
-
- Email is less time sensitive, so the mail servers use ______ to transfer email.
- HTTP
- SMTP
- UDP
- TCP (Page-168)
- Email is less time sensitive, so the mail servers use ______ to transfer email.
-
-
-
- To identify individual cells in a computer’s main memory, each cell is assigned a unique “name” called its ________.
- Location
- Place Holder
- Path
- Address (Page-66)
- To identify individual cells in a computer’s main memory, each cell is assigned a unique “name” called its ________.
-
-
-
- Which one of the following techniques is used by adoptive dictionary system for encoding data?
- Run-length encoding
- Relative encoding
- LZW encoding (Page-91)
- Frequency dependent encoding
- Which one of the following techniques is used by adoptive dictionary system for encoding data?
-
-
-
- Which of the following is not the form of existing VoIP systems?
- Analogue Telephone Adopters
- Soft Phones
- Hard Phones (Page-147)
- Embedded VoIP Phones
- Which of the following is not the form of existing VoIP systems?
-
-
-
- Time required to move the read / write heads from one track to another is called as _______.
- Seek Time (Page-68)
- Access Time
- Rotational Time
- Random Time
- Time required to move the read / write heads from one track to another is called as _______.
-
-
-
- In the operating system, the responsibility of memory manager is to allocate _________
- Main Memory (Page-128)
- Register
- Mass Storage
- Cache
- In the operating system, the responsibility of memory manager is to allocate _________
-
-
-
- Bit is:
- Secondary unit of storage
- Not a unit of storage
- Basic unit of storage (Page-60)
- Basic program of storage
- Bit is:
-
-
-
- CPU requires at least ________ to fetch the instructions from memory.
- One Billion Second
- Two nanoseconds (Page-113)
- One nanosecond
- Three nanoseconds
- CPU requires at least ________ to fetch the instructions from memory.
-
-
-
- Which of the following protocol is not associated with the transfer of email messages?
- POP3
- MIME
- SMTP (Page-146)
- IMAP
- Which of the following protocol is not associated with the transfer of email messages?
-
-
-
- The process involving in a __________ is like copying the data rather than moving it.
- Add instructions
- Shift instructions
- Transfer instructions (Page-100)
- Jump instructions
- The process involving in a __________ is like copying the data rather than moving it.
-
-
-
- An instruction is fetched in the instruction register from main memory __________.
- By using Bus (Page-96)
- By using Special Wiring
- By using Controller
- By using Modem
- An instruction is fetched in the instruction register from main memory __________.
-
-
-
- Most computers manufactured today, used at least _______ for storing values in floating-point notation.
- 31 bits
- 30 bits
- 32 bits (Page-89)
- 38 bits
- Most computers manufactured today, used at least _______ for storing values in floating-point notation.
-
-
-
- Multi-programming is a way to implement?
- Batch processing
- Real Time processing
- Time Sharing (Page-116)
- Interactive Processing
- Multi-programming is a way to implement?
-
-
-
- Process is a ________ activity.
- Botting activity
- Static activity
- Shifting activity
- Dynamic activity (Page-126)
- Process is a ________ activity.
-
-
-
- To store an image in the memory, appearance of each pixel is encoded to form __________.
- Scaling
- Pixel
- Bitmap (Page-73)
- Geometric structures
- To store an image in the memory, appearance of each pixel is encoded to form __________.
-
-
-
- Current status of the activity associated with the process is called _________.
- Process association
- Process Class
- Process Status
- Process State (Page-126)
- Current status of the activity associated with the process is called _________.
-
-
-
- Query is the set of words, given to the search engine for _________.
- Scrolling
- Searching (Page-42)
- Extraction
- Manipulation
- Query is the set of words, given to the search engine for _________.
-
-
-
- User can see directories or files y using _________.
- Microsoft Explorer
- Window Explorer
- User Interface (Page-122)
- Internet Explorer
- User can see directories or files y using _________.
-
-
-
- __________ is the type of malware that can replicate itself into other computers connected to a network.
- Spyware
- Warms
- Trojan Horses
- Virus
- __________ is the type of malware that can replicate itself into other computers connected to a network.
-
-
-
- We can use _________ Boolean operators specifically to find relevant pages.
- If else
- Is “it”
- “is” “am”
- “and” “or” (Page-49)
- We can use _________ Boolean operators specifically to find relevant pages.
-
-
-
- Truncation error is a problem that occurs in ________.
- Excess-3 Notation
- Excess Notation
- Two’s Complement Notation
- Floating Point Notation (Page-88)
- Truncation error is a problem that occurs in ________.
-
-
-
- _________ contains the information needed by a browser to contact the proper server and request the desired document.
- TCP
- SMTP
- URL (Page-165)
- UDP
- _________ contains the information needed by a browser to contact the proper server and request the desired document.
-
-
-
- N-Unicast refers to:
- Multiple unicast streams by a single sender (Page-149)
- One unicast stream to a receiver by multiple senders
- Multiple unicast streams to a single receiver
- One unicast stream to receiver by a single sender
- N-Unicast refers to:
-
-
-
- ________ is a table used in a GIF that can hold up to 256 distinct colors from RGB color space.
- Record
- Matrix
- Palette (Page-92)
- Block
- ________ is a table used in a GIF that can hold up to 256 distinct colors from RGB color space.
-
-
-
- Repeated erasing method in Flash Drive Technology slowly ________ the silicon dioxide chambers.
- Decrease
- Damages (Page-70)
- Increase
- Enhance
- Repeated erasing method in Flash Drive Technology slowly ________ the silicon dioxide chambers.
-
-
-
- Flood of attempted attacks can be detected by _______ software.
- Capturing
- System
- Snipping
- Audit (Page-133)
- Flood of attempted attacks can be detected by _______ software.
-
-
-
- The Value of program counter is an example of _________ state.
- Software
- Kernel
- Operating System
- Process
- The Value of program counter is an example of _________ state.
-
-
-
- Using ________ form eliminates the possibility of multiple representations for the same value.
- Unnormalized
- Normalized (Page-88)
- Orthogonal
- Signified
- Using ________ form eliminates the possibility of multiple representations for the same value.
-
-
-
- The node or PC which sends requests for services is called _________.
- Protocol
- Client (Page-140)
- ISP
- Server
- The node or PC which sends requests for services is called _________.
-
-
-
- The TCP / IP protocol suite is a collection of:
- TCP / UDP and IP protocols only
- TCP and IP protocols only
- HTTP, TCP / UDP, IP and Link Layer protocols
- Several protocol standards used by the internet (Page-167)
- The TCP / IP protocol suite is a collection of:
-
-
-
- Link layer will be responsible to:
- Determine the direction of the pocket’s next destination
- Reconstructs the original message according to the sequence numbers
- Determine which application receives an incoming message
- Deals with the communication details particular to the individual network in which the computer resides (Page-165)
- Link layer will be responsible to:
-
-
-
- If 15 is divided by 5 using repetitive subtraction, how many steps it involves?
- 0
- 3 (Page-108)
- 4
- 2
- If 15 is divided by 5 using repetitive subtraction, how many steps it involves?
-
-
-
- Software packages that allows to user to access hypertext on the internet are called __________.
- Routers
- Linkers
- Browsers (Page-152)
- Hyper soft
- Software packages that allows to user to access hypertext on the internet are called __________.
-
-
-
- In fractional binary numbers, digits placed on the right side of the radix point represents __________.
- Whole numbers
- Irrational numbers
- Integer part
- Fractional part (Page-80)
- In fractional binary numbers, digits placed on the right side of the radix point represents __________.
-
-
-
- Which program do you use to access internet on your computer?
- MS Excel
- MS PowerPoint
- MS Word
- Web Browser
- Which program do you use to access internet on your computer?
-
-
-
- The process of using DNS to perform an address translation is called ________.
- DNS Pattern
- DNS Table
- DNS Translation
- DNS Lookup (Page-145)
- The process of using DNS to perform an address translation is called ________.
-
-
-
- What does VoIP stand for?
- Virtually Over Internet Protocol
- Voice Over Internet Protocol (Page-147)
- Voice of International Protocol
- Voice of Internet Protocol
- What does VoIP stand for?
-
-
-
- Word processor like Microsoft Word is an application that _________.
- Build editable word documents (Page-40)
- Build editable questions
- Build editable programs
- Build editable excel files
- Word processor like Microsoft Word is an application that _________.
-
-
-
- Adding 0.1 and 1.1 produces the number ________.
- 1
- 0
- 0 (Page-78)
- 1
- Adding 0.1 and 1.1 produces the number ________.
-
-
-
- Choose the lowest heading level HTML tag from the given options.
- h1
- h4
- h2
- h6 (Page-375)
- Choose the lowest heading level HTML tag from the given options.
-
-
-
- The instruction code to halt machine cycle is ________.
- C400
- 35CE0
- C1000
- C000 (Page-105)
- The instruction code to halt machine cycle is ________.
-
-
-
- In binary notation, we can represent _______ numbers, if we have n bits.
- 2 power (n+1)
- 2n
- 2 power (n) (Page-73)
- 2(n-1)
- In binary notation, we can represent _______ numbers, if we have n bits.
-
-
-
- Windows uses graphics to make program easier to use, such graphics are known as _________.
- IR
- IBM
- GUI (Page-126)
- DOS
- Windows uses graphics to make program easier to use, such graphics are known as _________.
-
-
-
- Process state include the value of the program counter as well as the contents of the _________.
- Registers and cache memory cells
- Registers and related memory cells (Page-161)
- Registers
- Related memory cells
- Process state include the value of the program counter as well as the contents of the _________.
-
-
-
- What is the full form of PHP?
- Protected Home Page
- Personal Home Page
- Public Home Page
- Private Home Page
- What is the full form of PHP?
-
-
-
- _________ tag contains the information related to metadata that is not usually displayed on the webpage.
- P
- Head
- Body
- HTML
- _________ tag contains the information related to metadata that is not usually displayed on the webpage.
-
-
-
- The dispatcher is the component of the _________ that manages the execution of the scheduled processes.
- Operating System
- Kernel (Page-126)
- Utility Program
- Memory Manager
- The dispatcher is the component of the _________ that manages the execution of the scheduled processes.
-
-
-
- Binary number 11111111 is = __________ in decimal.
- 255 (Page-76)
- 567
- 127
- 128
- Binary number 11111111 is = __________ in decimal.
-
-
-
- In 2-bit binary addition, how many possibilities are there?
- 9
- 6
- 4 (Page-78)
- 7
- In 2-bit binary addition, how many possibilities are there?
-
-
-
- The ________ divides long messages into small segments, which are transmitted over the internet.
- Transport layer (Page-164)
- Network layer
- Link layer
- Application layer
- The ________ divides long messages into small segments, which are transmitted over the internet.
-
-
-
- Hexadecimal notation uses a _________ symbol to represent a pattern of four bits.
- Double
- Quad
- Single (Page-64)
- Triple
- Hexadecimal notation uses a _________ symbol to represent a pattern of four bits.
-
-
-
- Which of the following is intangible component?
- Hard Disk
- Software
- Computer Mouse
- Optical Disk
- Which of the following is intangible component?
-
-
-
- Which program do you use to create a spreadsheet?
- MS Excel (Page-41)
- MS Access
- Word
- Internet Explorer
- Which program do you use to create a spreadsheet?
-
-
-
- Which of the following is one of the major drawbacks of Skype?
- Free version is not easily available
- It takes too much space on local drive
- It used computer resources without owner’s awareness (Page-147)
- Call quality is not good
- Which of the following is one of the major drawbacks of Skype?
-
-
-
- Leibniz’s machines were achieved by observing the _________ positions.
- Second gear
- Final gear (Page-45)
- First gear
- Third gear
- Leibniz’s machines were achieved by observing the _________ positions.
-
-
-
- Pixels (Picture element) are ___________.
- Collection of dot-matrix (Page-73)
- Collection of matrices
- Collection of disks
- Collection of data
- Pixels (Picture element) are ___________.
-
-
-
- LAN stands for ________.
- Local Additional Network
- Local Area Network (Page-135)
- Local Adopter Network
- Local Access Network
- LAN stands for ________.
-
-
-
- The system software consists of two categories: _________ and utility software.
- Freeware software
- Operating software (Page-118)
- Device Software
- Firmware software
- The system software consists of two categories: _________ and utility software.
-
-
-
- You can search a phrase when even you do not know word would be there at a particular __________.
- Document
- File
- Location (Page-48)
- Hidden
- You can search a phrase when even you do not know word would be there at a particular __________.
-
-
-
- Which of the following is not the advantage of TCP over UDP?
- Connection establishment
- Flow control
- Congestion control
- Efficiency (Page-168)
- Which of the following is not the advantage of TCP over UDP?
-
-
-
- In CS, we store and link data in an organized way using ________.
- MSDB
- SDLC
- DMBS
- DBMS (Page-40)
- In CS, we store and link data in an organized way using ________.
-
-
-
- BOINC is abbreviated for ____________.
- Berkeley’s Open Infrastructure for Network Computing (Page-142)
- Berkeley’s Open Internet for Network Computing
- Boston’s Open Internet for Network Computing
- Boston’s Open Infrastructure for Network Computing
- BOINC is abbreviated for ____________.
-
-
-
- In black and white images, each pixel is represented as one bit – e.g. 0 for black and 1 for white. If _________.
- Matrix
- Facsimile (Page-73)
- Searching
- In black and white images, each pixel is represented as one bit – e.g. 0 for black and 1 for white. If _________.
-
-
-
- VoIP consists of two processes on different machines transferring audio data via the ________ model.
- P2S
- P2R
- P2Q
- P2P (Page-145)
- VoIP consists of two processes on different machines transferring audio data via the ________ model.
-
-
-
- 0011 + 0010 = ___________.
- 0000
- 1010
- 0101 (Page-78)
- 1111
- 0011 + 0010 = ___________.
-
-
-
- In which type of communication several signals are transferred at the same time, each on a separate line?
- Parallel communication (Page-112)
- Series communication
- Network communication
- Computer communication
- In which type of communication several signals are transferred at the same time, each on a separate line?
-
-
-
- The small segments of long messages in terms of computer network are called __________.
- Pairs
- Parts
- Parcels
- Packets (Page-164)
- The small segments of long messages in terms of computer network are called __________.
-
-
-
- An internet is a ____________.
- Collection of LANs
- Collection of WANs
- Network of Networks (Page-135)
- Collection of identical LANs and WANs
- An internet is a ____________.
-
-
-
- What does FTP stand for _______________.
- Formatting Transfer Protocol
- File Transmit Protocol
- File Transfer Protocol (Page-145)
- Format Transfer Protocol
- What does FTP stand for _______________.
-
-
-
- First software for implementing the web was released in _______.
- December 1990 (Page-150)
- October 1990
- September 1990
- November 1990
- First software for implementing the web was released in _______.
-
-
-
- Robots can be guided by _________.
- An external control device or the control maybe embedded within (Page-36)
- Application
- Remote
- An internal control device or the control device maybe embedded within
- Robots can be guided by _________.
-
-
-
- World Wide Web was adopted as a standard approach for linking documents over the internet because _________.
- Existing alternative approaches were not very efficient
- No alternative existed at that time
- It got very popular after incorporating support for multimedia content
- No existing alternative approach was more widely used at that time
- World Wide Web was adopted as a standard approach for linking documents over the internet because _________.
-
-
-
- The process of dynamically allocating tasks to the various processors so that all processors are used efficiently is known as _______.
- Load Balancing (Page-117)
- Scaling
- Multitasking
- Load Sharing
- The process of dynamically allocating tasks to the various processors so that all processors are used efficiently is known as _______.
-
-
-
- The most popular system for representing integers within today’s computers is _________’s complement notation.
- Two (Page-81)
- Zero
- One
- Three
- The most popular system for representing integers within today’s computers is _________’s complement notation.
-
-
-
- In _________ the operating system maybe copied from a distant machine over a network.
- Small workstations (Page-124)
- Workstations
- Large workstations
- Intranet network
- In _________ the operating system maybe copied from a distant machine over a network.
-
-
-
- The extent to which air particles are displaced is called _______ of sound.
- Quality
- Pitch
- Intensity
- Amplitude (Page-74)
- The extent to which air particles are displaced is called _______ of sound.
-
-
-
- Which excess notation is used to represent zero as 10000?
- Excess 8
- Excess 16 (Page-74)
- Excess 4
- Excess 2
- Which excess notation is used to represent zero as 10000?
-
-
-
- SSL proto is the backbone of _________.
- HTTPS
- HTTPR
- HTML
- HTML5
- SSL proto is the backbone of _________.
-
-
-
- Which of the following is not true about XML?
- It is a markup language based on HTML
- It can used to encode sheet music (Page-159)
- It is a self-descriptive language
- It can be used to encode non-textual material as text file.
- Which of the following is not true about XML?
-
-
-
- FIFO is abbreviation of?
- First Initiate First Out
- First in First Occupied
- First in First Out (Page-254)
- For in For Out
- FIFO is abbreviation of?
-
-
-
- Ethernet based network for bus topology makes use of __________ for transmitting messages.
- CSMA / CD (Page-136)
- CSMA / CA
- CSMA / CE
- CSMA / AC
- Ethernet based network for bus topology makes use of __________ for transmitting messages.
-
-
-
- Cloud computing services provide reasonable guarantees of ______ and ______.
- Privacy, Security
- Scalability, Security
- Reliability, Privacy
- Reliability, Scalability (Page-142)
- Cloud computing services provide reasonable guarantees of ______ and ______.
-
-
-
- Cloud computing raise concerns about _____ and _____ in a world.
- Reliability, Privacy
- Privacy, Security (Page-142)
- Scalability, Privacy
- Scalability, Security
- Cloud computing raise concerns about _____ and _____ in a world.
-
-
-
- For a network to function reliably, it is important to establish rules by which activities are conducted. Such rules are called __________.
- Premises
- Properties
- Patterns
- Protocols (Page-136)
- For a network to function reliably, it is important to establish rules by which activities are conducted. Such rules are called __________.
-
-
-
- Capacity of one sector of CD is of ________ KB.
- 2 (Page-69)
- 4
- 3
- 1
- Capacity of one sector of CD is of ________ KB.
-
-
-
- Which one of the following tags has no ending tag in HTML?
- a
- b
- br (Page-375)
- p
- Which one of the following tags has no ending tag in HTML?
-
-
-
- Which type of similar instruction is executed by the CPU to “store” the bit pattern in the controller?
- Receive instruction
- Store instruction (Page-110)
- Load instructions
- Jump instruction
- Which type of similar instruction is executed by the CPU to “store” the bit pattern in the controller?
-
-
-
- If we are interested to see the map of same location, we can use the Map operator in the following pattern?
- Mph: Map
- Map: Location (Page-50)
- Location: Map
- Locations
- If we are interested to see the map of same location, we can use the Map operator in the following pattern?
-
-
-
- HTML supports _________ levels of heading tags.
- Six (Page-375)
- Ten
- Twelve
- Four
- HTML supports _________ levels of heading tags.
-
-
-
- What is the full form of CGI?
- Common Gateway Interface (Page-161)
- Collective Gateway Interface
- Collaborative Gateway Interface
- Console Gateway Interface
- What is the full form of CGI?
-
-
-
- The search results that are generally presented in a line often referred to as _________.
- Category
- The list
- Search Engine Result Pages
- Pages
- The search results that are generally presented in a line often referred to as _________.
-
-
-
- The connection between networks to form an internet is handled by devices known as __________.
- Gateway
- Router (Page-138)
- Bridge
- Hub
- The connection between networks to form an internet is handled by devices known as __________.
-
-
-
- The application layer uses the __________ to send and receive messages over the internet.
- Network layer
- Desktop layer
- Link layer
- Transport layer (Page-164)
- The application layer uses the __________ to send and receive messages over the internet.
-
-
-
- is called the _______ tag in HTML document.
- Action
- Alter
- Actor
- Anchor (Page-156)
- is called the _______ tag in HTML document.
-
-
-
- Which one of the following is the correct sequence of network layers for the flow of messages at the sender side?
- Network layer to Link layer to Transport layer to Application layer
- Application layer to Transport layer to Network layer to Link layer (Page-162)
- Link layer to Network layer to Transport layer to Application layer
- Application layer to Link layer to Network layer to Transport layer
- Which one of the following is the correct sequence of network layers for the flow of messages at the sender side?
-
-
-
- ________ is not a valid IP address.
- 192.168.1.1
- 192.168.1.0
- 192.168.0.0
- 192.168.1.0.1 (Page-144)
- ________ is not a valid IP address.
-
-
-
- Bits can represent in chips as:
- Addition form
- A, B form
- 0, 1 form (Page-60)
- Algebra form
- Bits can represent in chips as:
-
-
-
- Each sound have a _____________.
- Wave
- Geometric Structures
- Pixel
- Scaling
- Each sound have a _____________.
-
-
-
- A sequence of transactions in which the user establishes initial contact with a computer’s operating system is called ___________.
- Process
- Boot State
- Logout
- Login (Page-133)
- A sequence of transactions in which the user establishes initial contact with a computer’s operating system is called ___________.
-
-
-
- It is the responsibility of the application layer to:
- Determine the direction to which forward packets
- Add sequence numbers to the small segments of a message
- Ensure that the messages are properly formatted for transmission over the internet
- Use the services of the name servers to translate mnemonic addresses into IP addresses (Page-164)
- It is the responsibility of the application layer to:
-
-
-
- FTP ________ could check all incoming files for the presence of known viruses and block all infected files.
- File server
- Shared server
- Web server
- Proxy server (Page-171)
- FTP ________ could check all incoming files for the presence of known viruses and block all infected files.
-
-
-
- What is the full form of JSP?
- Java Source Pages
- Java Script Pages
- Java Semantic Pages
- Java Server Pages (Page-161)
- What is the full form of JSP?
-
-
-
- A long string of bits is often called a __________.
- Line
- Byte
- Stream (Page-63)
- Bit
- A long string of bits is often called a __________.
-
-
-
- Which protocol is used to connect the news servers and transfer news articles between systems?
- FTP
- SMTP
- NTP
- NNTP (Page-145)
- Which protocol is used to connect the news servers and transfer news articles between systems?
-
-
-
- The concurrent execution of multiple jobs in a single user system is known as ___________.
- Multi-programming
- Multiprocessing
- Multischeduling
- Multitasking (Page-117)
- The concurrent execution of multiple jobs in a single user system is known as ___________.
-
-
-
- A process is called to be in _________ state if it can continue its progress.
- Ready (Page-126)
- Running
- Waiting
- Suspend
- A process is called to be in _________ state if it can continue its progress.
-
-
-
- Network layer will be responsible to:
- Consult the forwarding table to determine where the packets should be sent (Page-165)
- Determine which application receives an incoming message
- Reconstruct the original message according to the sequence numbers
- Deals with the communication details particular to the individual networks where the computer resides
- Network layer will be responsible to:
-
-
-
- Which type of similar instruction is used to receive a bit pattern from a controller?
- Receive instruction
- Store instruction
- Load instruction (Page-110)
- Jump instruction
- Which type of similar instruction is used to receive a bit pattern from a controller?
-
-
-
- Which one of the following is not the basic Boolean operation?
- OR
- NAND (Page-62)
- AND
- XOR
- Which one of the following is not the basic Boolean operation?
-
-
-
- To store or manipulate data in computers, the bit 0 represents the value false and the bit 1 represents the value __________.
- Empty
- Wrong
- True (Page-62)
- True / False
- To store or manipulate data in computers, the bit 0 represents the value false and the bit 1 represents the value __________.
-
-
-
- Most ______ codes today are Huffman codes.
- Relative
- Run-Length
- Frequency-Dependent (Page-90)
- Differential
- Most ______ codes today are Huffman codes.
-
-
-
- Non-Terminating expansions may also be a source of _________.
- Logical error
- Truncation error (Page-89)
- Overflow
- Syntax error
- Non-Terminating expansions may also be a source of _________.
-
-
-
- In 2’s complement notation, the maximum positive number is represented by __________.
- A single “1” followed by all 0’s
- All 0’s
- All 1’s
- A single “0” followed by all 1’s (Page-82)
- In 2’s complement notation, the maximum positive number is represented by __________.
-
-
-
- Which of the following is not true about firewall?
- Firewall protects the individual computer from outsider intrusion
- Firewall protects the individual computer from inside intrusion (Page-303)
- Firewall protects the entire network from inside intrusion
- Firewall protects the entire network from outside intrusion
- Which of the following is not true about firewall?
-
-
-
- Which kind of server works as an intermediate between client and server?
- Server computer
- Client server
- Super server
- Proxy server (Page-171)
- Which kind of server works as an intermediate between client and server?
-
-
-
- WWW stands for?
- World While Web
- World Wild Web
- World Wide Web (Page-150)
- World White Web
- WWW stands for?
-
-
-
- When a packet reaches its intermediate stop, the network layer:
- Discard the packet considering it irrelevant
- Hands the packet to transport later rather than forwarding it (Page-165)
- Forwards it to all the recognized networks
- Forward it to the link layer after determining the direction of the next hope
- When a packet reaches its intermediate stop, the network layer:
-
-
-
- The architecture philosophy with which a CPU is designed to execute a minimal set of machine instructions is called _________.
- CISC
- ENVIAC
- RISC / CISC
- RISC (Page-99)
- The architecture philosophy with which a CPU is designed to execute a minimal set of machine instructions is called _________.
-
-
-
- TLD stands for ________.
- Top Low Domain
- Top Level Domain (Page-144)
- Top Lower Domain
- Top Loud Domain
- TLD stands for ________.
-
-
-
- Once an intruder (or perhaps an authorized user with malicious intent) gains access to a computer system, the next step is usually to explore, looking for information of interest or for places to _________.
- Acknowledged
- Destructive software (Page-133)
- Informative software
- Log in software
- Once an intruder (or perhaps an authorized user with malicious intent) gains access to a computer system, the next step is usually to explore, looking for information of interest or for places to _________.
-
-
-
- Algorithm for finding binary representation of a positive decimal number contain _______ steps.
- Long Process
- Enough
- Three (Page-76)
- One
- Algorithm for finding binary representation of a positive decimal number contain _______ steps.
-
-
-
- A CPU consists of components, namely ________.
- Arithmetic Logic Unit, Control Unit, Registers (Page-96)
- RAM, Cache, Registers
- RAM Cache, Control Unit
- Arithmetic Logic Unit, RAM, Control Unit
- A CPU consists of components, namely ________.
-
-
-
- You can search images even by giving a query using another image using google image ________.
- Info
- Tilt
- Link (Page-51)
- Related
- You can search images even by giving a query using another image using google image ________.
-
-
-
- Decentralized approach for running various operations leads to efficiency in _______ model.
- Client / Server
- Distributed Server
- Peer 2 Peer (Page-140)
- File Server
- Decentralized approach for running various operations leads to efficiency in _______ model.
-
-
-
- Which register contains the address of the next instruction?
- Address register
- Instruction register
- Program register (Page-101)
- Data register
- Which register contains the address of the next instruction?
-
-
-
- Which of the following language is used for client side scripting?
- net
- JavaScript
- Python
- PHP
- Which of the following language is used for client side scripting?
-
-
-
- To construct reliable operating systems, we must develop _______ that cover every possible contingency, regardless of how minuscule it may appear.
- Algorithm (Page-128)
- Activity
- Program
- Command
- To construct reliable operating systems, we must develop _______ that cover every possible contingency, regardless of how minuscule it may appear.
-
-
-
- In main memory each cell has unique name called as _______.
- Address (Page-66)
- Unit
- Slot
- Bit
- In main memory each cell has unique name called as _______.
-
-
-
- When you type a query in the search bar of google. Google finds all those pages which contains __________.
- All the terms given in the query (Page-42)
- Random
- Some of the terms given in the query
- None of the terms given in the query
- When you type a query in the search bar of google. Google finds all those pages which contains __________.
-
-
-
- An interrupt converts the CPU to privileged mode and transfers control to ______ within the operating system.
- Scheduler
- Interrupt handler (Page-134)
- Memory manager
- Dispatcher
- An interrupt converts the CPU to privileged mode and transfers control to ______ within the operating system.
-
-
-
- ________ connects computer over a large geographical area of world.
- MAN
- LAN
- PAN
- WAN (Page-134)
- ________ connects computer over a large geographical area of world.
-
-
-
- Which of the following language is used for server-side scripting?
- JavaScript
- HTML
- PHP
- CSS
- Which of the following language is used for server-side scripting?
-
-
-
- Suppose we have a bit pattern 11001101, how many times right circular shift should be performed on it to obtain the same bit pattern?
- 8 times (Page-107)
- 3 times
- 4 times
- 2 times
- Suppose we have a bit pattern 11001101, how many times right circular shift should be performed on it to obtain the same bit pattern?
-
-
-
- Telnet is used to _______ between two systems.
- Securely share information
- Establishes a remote connection
- Establishes a secure remote connection
- Securely transfer files
- Telnet is used to _______ between two systems.
-
-
-
- A negative exponent would mean to move the radix point _______.
- To left (Page-86)
- To right
- Before sign bit
- After sign bit
- A negative exponent would mean to move the radix point _______.
-
-
-
- Computer hardware is the collection of ________.
- Physical parts of a computer systems (Page-35)
- Websites
- Applications
- Programs
- Computer hardware is the collection of ________.
-
-
-
- Which tier of ISP is the backbone of internet?
- Tier-1 ISPs (Page-143)
- Tier-4 ISPs
- Tier-2 ISPs
- Tier-3 ISPs
- Which tier of ISP is the backbone of internet?
-
-
-
- What is the name of the ability of a controller to access main memory?
- Controller communication
- Direct Memory Access DMA (Page-110)
- Computer bus access
- Memory bus access
- What is the name of the ability of a controller to access main memory?
-
-
-
- The efficiency of _______ makes it the protocol of choice for DNS lookups and VoIP.
- TCP
- HTTP
- SMTP
- UDP (Page-168)
- The efficiency of _______ makes it the protocol of choice for DNS lookups and VoIP.
-
-
-
- Diameter of compact disk is _________.
- 12 centimeters (Page-69)
- 16 centimeters
- 10 centimeters
- 11 centimeters
- Diameter of compact disk is _________.
-
-
-
- RAM stands for ________.
- Random Archive Memory
- Random Approach Memory
- Random Access Memory (Page-66)
- Random Memory
- RAM stands for ________.
-
-
-
- ______ was the first to implement the web.
- Charles Babbage
- Tim Berners-Lee (Page-152)
- Steve Jobs
- Alan Turing
- ______ was the first to implement the web.
-
-
-
- Previously how many bits were used to store in 2’s complement notation?
- 64 bits
- 128 bits
- 8 bits
- 16 bits (Page-83)
- Previously how many bits were used to store in 2’s complement notation?
-
-
-
- _______ refers to distributed systems that are more loosely coupled than clusters but that still work together to accomplish large tasks.
- Parallel computing
- Quantum computing
- Cloud computing
- Grid computing (Page-142)
- _______ refers to distributed systems that are more loosely coupled than clusters but that still work together to accomplish large tasks.
-
-
-
- Binary notation is a way of representing numeric values using only the _______.
- Digit 0 and 2
- Digit 0 and 0
- Digit 0 and 1 (Page-71)
- Digit 2 and 1
- Binary notation is a way of representing numeric values using only the _______.
-
-
-
- A private key is used to _______ messages.
- Encrypt (Page-74)
- Send
- Receive
- Decrypt
- A private key is used to _______ messages.
-
-
-
- ________ is transfer data one after the other.
- Parallel communication
- Serial communication (Page-12)
- Direct communication
- Simple communication
- ________ is transfer data one after the other.
-
-
-
- Which data compression technique is suitable for data having long sequences of the same value?
- Differential encoding
- Run-length encoding (Page-90)
- Relative encoding
- Frequency-dependent encoding
- Which data compression technique is suitable for data having long sequences of the same value?
-
-
-
- What does HTTP stand for _________?
- Hexadecimal Text Transfer Protocol
- Hearing Text Transfer Protocol
- Holding Text Transfer Protocol
- Hyper Text Transfer Protocol (Page-152)
- What does HTTP stand for _________?
-
-
-
- In the context of computer networks, WWW stands for _________.
- World Wild West
- World Wide Web (Page-152)
- World Wide West
- Web World Wild
- In the context of computer networks, WWW stands for _________.
-
-
-
- Computer science has many ___________ in almost every field of the real world.
- Domains
- Operations
- Applications (Page-37)
- Branches
- Computer science has many ___________ in almost every field of the real world.
-
-
-
- ___________ stores bits as tiny electric charge that refreshes many times a second.
- DRAM (Page-66)
- SDRAM
- RAM
- Flip-Flop
- ___________ stores bits as tiny electric charge that refreshes many times a second.
-
-
-
- Each time a process finishes a task the operating system either allocate the resource to a waiting process or, if no process is waiting, it ________ the flag.
- Set
- Clear (Page-129)
- Restore
- Store
- Each time a process finishes a task the operating system either allocate the resource to a waiting process or, if no process is waiting, it ________ the flag.
-
-
-
- Which protocol is suitable for wireless start network?
- TCP / IP
- CSMA / CA (Page-136)
- CSMA / CD
- Ethernet
- Which protocol is suitable for wireless start network?
-
-
-
- A clear flag state indicates that the resource is ________.
- Ready
- Available (Page-129)
- Unavailable
- Currently allocated
- A clear flag state indicates that the resource is ________.
-
-
-
- ¼ can be represented by __________ as a fractional binary number.
- 0
- 10
- 01 (Page-80)
- 1
- ¼ can be represented by __________ as a fractional binary number.
-
-
-
- If binary representation of 8 is 1000, then how is -8 is written in 2’s complement notation?
- 1001
- 0000
- 0100
- 10000
- If binary representation of 8 is 1000, then how is -8 is written in 2’s complement notation?
-
-
-
- ________ keep track of instructions being executed.
- Memory address registers
- Special purpose registers (Page-101)
- Memory buffer registers
- General purpose registers
- ________ keep track of instructions being executed.
-
-
-
- Avoid searching the following upon the internet:
- Videos
- Games
- Lectures
- Pressure cooker bomb story (Page-53)
- Avoid searching the following upon the internet:
-
-
-
- ________ is a transfer instruction used to communicate with devices outside the CPU.
- COM instruction
- STORE instruction
- I / O instruction (Page-100)
- LOAD instruction
- ________ is a transfer instruction used to communicate with devices outside the CPU.
-
-
-
- Herman Hollerith invited the ________ technology.
- Technology of Gear
- Abacus
- Punch Cards (Page-56)
- ENIAC
- Herman Hollerith invited the ________ technology.
-
-
-
- Before the stored program concept, data was stored in memory while programs were a part of __________.
- Cable
- Bus
- Cache
- CPU (Page-98)
- Before the stored program concept, data was stored in memory while programs were a part of __________.
-
-
-
- An important task of a(n) __________ is the allocation of machine’s resources to the processes in the system.
- Dispatcher
- Operating System (Page-128)
- Control Unit
- Process
- An important task of a(n) __________ is the allocation of machine’s resources to the processes in the system.
-
-
-
- Using ________, we can fine the stock market trend of a company.
- Boolean operator
- Stocks operator (Page-50)
- Plus, operator
- @ operator
- Using ________, we can fine the stock market trend of a company.
-
-
-
- The material that is displayed on the screen is contained in the _______ of the HTML document.
- Body (Page-375)
- Title
- Head
- Frame
- The material that is displayed on the screen is contained in the _______ of the HTML document.
-
-
-
- Which of the following network layer is responsible to recognize that the packet has reached its final destination?
- Network layer (Page-165)
- Transport layer
- Link layer
- Application layer
- Which of the following network layer is responsible to recognize that the packet has reached its final destination?
-
-
-
- ________ is a package containing a party’s name and that party’s public key.
- Antivirus
- Certificate (Page-155)
- Security
- Contract
- ________ is a package containing a party’s name and that party’s public key.
-
-
-
- _________ operator will give us only those web pages in which the searched term appears in the title of the web pages.
- Stocks operator
- Upper case title
- Boolean operators
- Intitle (Page-51)
- _________ operator will give us only those web pages in which the searched term appears in the title of the web pages.
-
-
-
- In binary system we can use only ____ or _____ at each position.
- 0, 0
- 1, 2
- 0, 1 (Page-76)
- Null, 1
- In binary system we can use only ____ or _____ at each position.
-
-
-
- All bit patterns, which represents positive numbers in excess notation starts with ________.
- 0
- 11
- 00
- 1 (Page-84)
- All bit patterns, which represents positive numbers in excess notation starts with ________.
-
-
-
- Program counter is a ________.
- Special purpose register (Page-101)
- Memory address register
- Memory buffer register
- General purpose register
- Program counter is a ________.
-
-
-
- Which unit transfers the data from memory to general purpose registers?
- Shift
- Control Unit (Page-96)
- Arithmetic Unit
- Logic Unit
- Which unit transfers the data from memory to general purpose registers?
-
-
-
- The dispatcher allocates ______.
- Times slices (Page-128)
- Mass storage space
- Memory space
- Storage space
- The dispatcher allocates ______.
-
-
-
- The computers of the __________ were not very flexible and efficient.
- 1961s and 1970s
- 1950s and 1960s
- 1930s
- 1940s and 1950s (Page-114)
- The computers of the __________ were not very flexible and efficient.
-
-
-
- The originator of a message can encrypt the message using _________.
- Public key
- Double key
- Private key (Page-174)
- Single key
- The originator of a message can encrypt the message using _________.
-
-
-
- Each router maintains a _________ that contains the router’s knowledge about the direction in which the messages should be sent.
- Forwarding table (Page-139)
- Logarithmic table
- Algorithm table
- Knowledge table
- Each router maintains a _________ that contains the router’s knowledge about the direction in which the messages should be sent.
-
-
-
- What ability of a controller is known as Direct Memory Access (DMA)?
- To store instructions
- To access main memory (Page-110)
- To access CPU
- To receive instructions
- What ability of a controller is known as Direct Memory Access (DMA)?
-
-
-
- One bit can contain only _______ value.
- Zero
- Two
- One (Page-60)
- Three
- One bit can contain only _______ value.
-
-
-
- Which of the following is not malware?
- Trojan Horses
- Spyware
- Warms
- Antivirus
- Which of the following is not malware?
-
-
-
- Which of the following technology is not related to the client side working?
- HTML
- Java Applets
- PHP
- JavaScript
- Which of the following technology is not related to the client side working?
-
-
-
- How many steps does a machine cycle generally have?
- Three (Page-101)
- Four
- Two
- Two or more
- How many steps does a machine cycle generally have?
-
-
-
- A right circular shift of 3 bits on a string of 8 bits is equivalent to left circular shift of how many bits?
- 4
- 6
- 5 (Page-107)
- 3
- A right circular shift of 3 bits on a string of 8 bits is equivalent to left circular shift of how many bits?
-
-
-
- Which of the following is the variation of firewalls?
- Net filters (Page-307)
- Spam filters
- Wall filters
- Proxy filters
- Which of the following is the variation of firewalls?
-
-
-
- HDTV is an acronym of ________.
- High Demand Television Videos
- High Demanded Television
- High Definition Television (Page-95)
- High Define Television
- HDTV is an acronym of ________.
-
-
-
- The impact of truncation error can be reduced by using _________.
- Longer exponent field
- Longer mantissa filed (Page-89)
- Positive exponent field
- Zero in sign bit
- The impact of truncation error can be reduced by using _________.
-
-
-
- While performing the process, ________ compares each memory reference to register to ensure that the reference is within the designated limits.
- Process manager
- The ALU / CU
- Operating system
- The CPU (Page-134)
- While performing the process, ________ compares each memory reference to register to ensure that the reference is within the designated limits.
-
-
-
- Which of the following is not a significant issue in VoIP communication?
- Transferring audio data between communicating processes (Page-147)
- Task of initiating and receiving a call
- Linking with traditional telephone system
- Incorporating emergency call services
- Which of the following is not a significant issue in VoIP communication?
-
-
-
- OR operator is also represented by _________.
- @
- | (Page-223)
- }
- *
- OR operator is also represented by _________.
-
-
-
- Internet is a type of _________.
- Website
- Computer
- Network (Page-135)
- Application
- Internet is a type of _________.
-
-
-
- In Computer, GUI stands for ________.
- Graphical Utility Icon
- General User Interrupt
- Graphical User Interface (Page-120)
- Grayed User Interface
- In Computer, GUI stands for ________.
-
-
-
- Which of the following is a lossless data compression technique?
- Binary encoding
- Transform coding
- Discrete cosine transforms
- Frequency-dependent encoding (Page-90)
- Which of the following is a lossless data compression technique?
-
-
-
- Scheduler maintains a block of information of all processes in main memory in ______ table.
- Process (Page-126)
- MAC
- ASCII
- IP
- Scheduler maintains a block of information of all processes in main memory in ______ table.
-
-
-
- ______ is used for encoding consecutive frames of a motion picture.
- Dictionary encoding
- Huffman encoding
- Frequency-dependent encoding
- Relative encoding (Page-90)
- ______ is used for encoding consecutive frames of a motion picture.
-
-
-
- Which of the following protocol helps to store the email messages on a local machine while retrieving email messages from the receiving server?
- POP3 (Page-147)
- SMTP
- IMAP
- MIME
- Which of the following protocol helps to store the email messages on a local machine while retrieving email messages from the receiving server?
-
-
-
- Which of the following feature was incorporated in the early versions of the World Wide Web?
- Storing the document in an unstructured way
- Tracking of various versions of a document
- Flexible searching with the help of metadata
- Transclusions
- Which of the following feature was incorporated in the early versions of the World Wide Web?
-
-
-
- What is the full form of ASP?
- Active Server Pages (Page-161)
- Alternate Start Pages
- Alternate Server Pages
- Active Start Pages
- What is the full form of ASP?
-
-
-
- Using MPEG techniques, video presentations can be successfully relayed over communication paths that provide transfer rates of _________.
- 50 Mbps
- 40 Mbps (Page-96)
- 80 Mbps
- 90 Mbps
- Using MPEG techniques, video presentations can be successfully relayed over communication paths that provide transfer rates of _________.
-
-
-
- One of the earlier computing devices was the:
- Laptop
- Windowa
- IPhone
- ABACUS (Page-55)
- One of the earlier computing devices was the:
-
-
-
- JCL is abbreviation of ________.
- Job Control Logic
- Job Control Language (Page-115)
- Job Communication Language
- Job Controller Language
- JCL is abbreviation of ________.
-
-
-
- Internet is a collection of networks constructed by ________.
- Intranet Service Producer
- Internet Service Provider (Page-142)
- Intranet Server Provider
- Internet Service Producer
- Internet is a collection of networks constructed by ________.
-
-
-
- The hackers normally add many ______ to such websites as the information seeker of free music.
- Song
- Alert
- Viruses (Page-54)
- Messages
- The hackers normally add many ______ to such websites as the information seeker of free music.
-
-
-
- Search Engines can search _________ type of information.
- Only document
- Documents, Images, Videos (Page-41)
- Programs
- Only word files
- Search Engines can search _________ type of information.
-
-
-
- In binary addition 1 + 0 = _________.
- 1 (Page-78)
- 8
- 2
- 4
- In binary addition 1 + 0 = _________.
-
-
-
- _______ is also considers as character.
- Numbers
- Space
- Small caps
- Large caps
- _______ is also considers as character.
-
-
-
- Which register act as a temporary holding place for data being manipulated by the CPU?
- Memory buffer register
- Memory address register
- Special purpose register
- General purpose register (Page-96)
- Which register act as a temporary holding place for data being manipulated by the CPU?
-
-
-
- ______ encoding is used to store colorful images.
- RGB (Page-74)
- Pixel
- Bitmap
- Scaling
- ______ encoding is used to store colorful images.
-
-
-
- Due to the volatility and limited size of a computer’s main memory, most computers have additional memory devices called _______.
- RRAM
- Mass Storage (Page-67)
- DRAM
- PRAM
- Due to the volatility and limited size of a computer’s main memory, most computers have additional memory devices called _______.
-
-
-
- Which of the application may not be considered a network-based application?
- Text editor application
- Remote access application
- Social media application
- NEWS reader application
- Which of the application may not be considered a network-based application?
-
-
-
- ________ tag is used to write paragraph in HTML document.
- (Page-375)
- ________ tag is used to write paragraph in HTML document.
-
-
-
- The term used for removing process from process table is called ________ the process.
- Removing
- Deleting
- Killing (Page-131)
- Dropping
- The term used for removing process from process table is called ________ the process.
-
-
-
- A program under ______ is called process.
- Development
- Analysis
- Execution (Page-126)
- Maintenance
- A program under ______ is called process.
-
-
-
- Breaking the task into a number of subtasks compatible with the number of available processors is called ________.
- Interactive processing
- Scaling (Page-117)
- Throughout
- Load balancing
- Breaking the task into a number of subtasks compatible with the number of available processors is called ________.
-
-
-
- ANSI stands for:
- Association National Standards Institute
- American National Standards Institute (Page-71)
- Anglican National Standards Institute
- Australian National Standards Institute
- ANSI stands for:
-
-
-
- Google drive is an example of _______.
- Grid computing
- Cluster computing
- Grid and Cluster computing
- Cloud computing (Page-142)
- Google drive is an example of _______.
-
-
-
- _________ provides a network the internet connectivity.
- Hub
- Repeater
- Gateway (Page-139)
- Node
- _________ provides a network the internet connectivity.
-
-
-
- The ______ indicates the location of the document within the host file system.
- Mnemonic name
- Directory path
- Document name
- Protocol name
- The ______ indicates the location of the document within the host file system.
-
-
-
- ________ can store unique pattern of 21 bits.
- UTF-8
- Unicode (Page-72)
- ASCII
- ANSI
- ________ can store unique pattern of 21 bits.
-
-
-
- TIFF is an acronym of _______.
- Toggle Image File Format (Page-93)
- Tagged Image File Format
- Transform Image File Format
- Template Image File Format
- TIFF is an acronym of _______.
-
-
-
- In a general-purpose computer, a program called the ______ is permanently store in the machine’s ROM.
- Compiler
- Application Loader
- BOOT Loader (Page-124)
- Interpreter
- In a general-purpose computer, a program called the ______ is permanently store in the machine’s ROM.
-
-
-
- After fetching instruction will be decoded and _______.
- Loaded
- Executed (Page-104)
- Transfer
- Stored
- After fetching instruction will be decoded and _______.
-
-
-
- MIME protocol is:
- An extension to SMTP for multimedia messaging support (Page-130)
- Used to replace the working of SMTP protocol
- Used to transfer non-ASCII data to the receiver
- Used to store multimedia data on server-side
- MIME protocol is:
-
-
-
- In SD card technology, SDHC (High Capacity) can provide ______ GBs of storage.
- 65
- 16
- 8
- 32 (Page-70)
- In SD card technology, SDHC (High Capacity) can provide ______ GBs of storage.
-
-
-
- Star topology-based network cannot detect ______.
- Collision
- Transmission
- Packets
- Deadlock
- Star topology-based network cannot detect ______.
-
-
-
- What will be the output of the following Boolean expression? 1010 or 1111
-
-
-
-
- 0101
- 1111 (Page-62)
- 0000
- 1010
-
-
-
-
- 2 raised the 0 equals to _______.
- 0
- 3
- 1 (Page-96)
- 2
- 2 raised the 0 equals to _______.
-
Pingback: CS101 Downloadable Quiz Files (Lec 1-108) Fall, 2021 – Helping Hands