CS101 Solved (Lec 1-108) MCQs Fall, 2021

CS101 Quiz (Lectures 1-108) MCQs

As Salam O Alaikum. I hope that you all will be fine and will be studying nice and hard. I also hope that you will find our effort amazing and will surely let us know about the things you liked and the things that are to be improved.

Dear fellows, in this post , we have prepared CS101 Solved Grand Quiz-1 file from the SPRING 2022 season just for you. All the question here have been answered by our Admins and dually verified from the books. In order to give you the best answer, we have also added the cross referenced page number of the CS101 handout.

Just in case, if you want to read and study these questions offline, you can also read our blog CS101 SOLVED QUIZ FILES FALL, 2021 to download the pdf, ppt and docx files.

A total of 240 question we have collected lectures (1-108), and we hope so that you will take advantage of our effort and will also share our work with your friends. INSHALLAH we will have a wonderful journey with you guys’. Good Luck and Be happy.

"Practice and Study, What you don't know and Review the stuff that you do know."
Anthony T. Hincks

CS101 Solved QUIZ-1 MCQs (Lectures 1-108)

      1. The sum of seek time and rotation delay is called as ____________.
        1. Rotational time
        2. Transfer time
        3. Access time        (Page-53)
        4. Delay time
      1.  ________ is a short version of binary digit, a smallest unit to store data.
        1. Bit        (Page-60)
        2. Mega byte
        3. Pattern
        4. Byte
      1. According to famous job market website in Pakistan, most of the jobs are available in ___________.
        1. Computer Science        (Page-37)
        2. Biology
        3. Economics
        4. Mathematics
      1. ENIAC Stands for.
        1. Electronic numbers and integrator and calculator
        2. Electronic numerical integer and calculations
        3. Electronic numerical integrator and calculator        (Page-57)
        4. Electronic numbers integer and calculations
      1. A company can develop ____________ for which it chooses to maintain ownership rights.
        1. Network
        2. Open system
        3. Personnel Area Network
        4. Proprietary Systems        (Page-135)
      1. If you want to search for an exact phrase on Google then enclose it in ___________.
        1. @
        2. *
        3. #
        4. “ “        (Page-42)
      1. Binary notation has ________ representations with respect to whole and fractional numbers.
        1. 4
        2. 1
        3. 3
        4. 2        (Page-42)
      1. The major responsibility of _________ software is protecting resources from unauthorize access.
        1. Operating System        (Page-133)
        2. Super User
        3. Device Driver
        4. Application
      1. While sending a message, it is the ________ layer’s responsibility to provide an address that is compatible with internet infrastructure.
        1. Application        (Page-164)
        2. Link
        3. Transport
        4. Network
      1. Which of the following is true about UDP in comparison to TCP?
        1. More reliable and more efficient
        2. Less reliable but more efficient        (Page-167)
        3. Less reliable and less efficient
        4. More reliable but less efficient
      1. Which of the following is true about TCP in comparison to UDP?
        1. More reliable and more efficient
        2. Less reliable but more efficient
        3. Less reliable and less efficient
        4. More reliable but less efficient        (Page-167)
      1. The _________ resides on a can be computer containing hypertext documents to be accessed.
        1. File
        2. Browser
        3. Web Server        (Page-152)
        4. Client
      1. Which of the following is a significant asset to a computer’s performance?
        1. Memory Bus
        2. Main Memory
        3. CPU
        4. Direct Memory Access (DMA)        (Page-110)
      1. In hexadecimal notation, ___________ bits represent as single symbol.
        1. Two
        2. Three
        3. One
        4. Four        (Page-64)
      1. Email is less time sensitive, so the mail servers use ______ to transfer email.
        1. HTTP
        2. SMTP
        3. UDP
        4. TCP        (Page-168)
      1. To identify individual cells in a computer’s main memory, each cell is assigned a unique “name” called its ________.
        1. Location
        2. Place Holder
        3. Path
        4. Address        (Page-66)
      1. Which one of the following techniques is used by adoptive dictionary system for encoding data?
        1. Run-length encoding
        2. Relative encoding
        3. LZW encoding        (Page-91)
        4. Frequency dependent encoding
      1. Which of the following is not the form of existing VoIP systems?
        1. Analogue Telephone Adopters
        2. Soft Phones
        3. Hard Phones        (Page-147)
        4. Embedded VoIP Phones
      1. Time required to move the read / write heads from one track to another is called as _______.
        1. Seek Time        (Page-68)
        2. Access Time
        3. Rotational Time
        4. Random Time
      1. In the operating system, the responsibility of memory manager is to allocate _________
        1. Main Memory        (Page-128)
        2. Register
        3. Mass Storage
        4. Cache
      1. Bit is:
        1. Secondary unit of storage
        2. Not a unit of storage
        3. Basic unit of storage         (Page-60)
        4. Basic program of storage
      1. CPU requires at least ________ to fetch the instructions from memory.
        1. One Billion Second
        2. Two nanoseconds        (Page-113)
        3. One nanosecond
        4. Three nanoseconds
      1. Which of the following protocol is not associated with the transfer of email messages?
        1. POP3
        2. MIME
        3. SMTP        (Page-146)
        4. IMAP
      1. The process involving in a __________ is like copying the data rather than moving it.
        1. Add instructions
        2. Shift instructions
        3. Transfer instructions        (Page-100)
        4. Jump instructions
      1. An instruction is fetched in the instruction register from main memory __________.
        1. By using Bus        (Page-96)
        2. By using Special Wiring
        3. By using Controller
        4. By using Modem
      1. Most computers manufactured today, used at least _______ for storing values in floating-point notation.
        1. 31 bits
        2. 30 bits
        3. 32 bits        (Page-89)
        4. 38 bits
      1. Multi-programming is a way to implement?
        1. Batch processing
        2. Real Time processing
        3. Time Sharing        (Page-116)
        4. Interactive Processing
      1. Process is a ________ activity.
        1. Botting activity
        2. Static activity
        3. Shifting activity
        4. Dynamic activity        (Page-126)
      1. To store an image in the memory, appearance of each pixel is encoded to form __________.
        1. Scaling
        2. Pixel
        3. Bitmap        (Page-73)
        4. Geometric structures
      1. Current status of the activity associated with the process is called _________.
        1. Process association
        2. Process Class
        3. Process Status
        4. Process State         (Page-126)
      1. Query is the set of words, given to the search engine for _________.
        1. Scrolling
        2. Searching        (Page-42)
        3. Extraction
        4. Manipulation
      1. User can see directories or files y using _________.
        1. Microsoft Explorer
        2. Window Explorer
        3. User Interface        (Page-122)
        4. Internet Explorer
      1. __________ is the type of malware that can replicate itself into other computers connected to a network.
        1. Spyware
        2. Warms
        3. Trojan Horses
        4. Virus
      1. We can use _________ Boolean operators specifically to find relevant pages.
        1. If else
        2. Is “it”
        3. “is” “am”
        4. “and” “or”        (Page-49)
      1. Truncation error is a problem that occurs in ________.
        1. Excess-3 Notation
        2. Excess Notation
        3. Two’s Complement Notation
        4. Floating Point Notation        (Page-88)
      1. _________ contains the information needed by a browser to contact the proper server and request the desired document.
        1. TCP
        2. SMTP
        3. URL        (Page-165)
        4. UDP
      1. N-Unicast refers to:
        1. Multiple unicast streams by a single sender        (Page-149)
        2. One unicast stream to a receiver by multiple senders
        3. Multiple unicast streams to a single receiver
        4. One unicast stream to receiver by a single sender
      1. ________ is a table used in a GIF that can hold up to 256 distinct colors from RGB color space.
        1. Record
        2. Matrix
        3. Palette        (Page-92)
        4. Block
      1. Repeated erasing method in Flash Drive Technology slowly ________ the silicon dioxide chambers.
        1. Decrease
        2. Damages        (Page-70)
        3. Increase
        4. Enhance
      1. Flood of attempted attacks can be detected by _______ software.
        1. Capturing
        2. System
        3. Snipping
        4. Audit        (Page-133)
      1. The Value of program counter is an example of _________ state.
        1. Software
        2. Kernel
        3. Operating System
        4. Process
      1. Using ________ form eliminates the possibility of multiple representations for the same value.
        1. Unnormalized
        2. Normalized        (Page-88)
        3. Orthogonal
        4. Signified
      1. The node or PC which sends requests for services is called _________.
        1. Protocol
        2. Client        (Page-140)
        3. ISP
        4. Server
      1. The TCP / IP protocol suite is a collection of:
        1. TCP / UDP and IP protocols only
        2. TCP and IP protocols only
        3. HTTP, TCP / UDP, IP and Link Layer protocols
        4. Several protocol standards used by the internet        (Page-167)
      1. Link layer will be responsible to:
        1. Determine the direction of the pocket’s next destination
        2. Reconstructs the original message according to the sequence numbers
        3. Determine which application receives an incoming message
        4. Deals with the communication details particular to the individual network in which the computer resides        (Page-165)
      1. If 15 is divided by 5 using repetitive subtraction, how many steps it involves?
        1. 0
        2. 3        (Page-108)
        3. 4
        4. 2
      1. Software packages that allows to user to access hypertext on the internet are called __________.
        1. Routers
        2. Linkers
        3. Browsers        (Page-152)
        4. Hyper soft
      1. In fractional binary numbers, digits placed on the right side of the radix point represents __________.
        1. Whole numbers
        2. Irrational numbers
        3. Integer part
        4. Fractional part        (Page-80)
      1. Which program do you use to access internet on your computer?
        1. MS Excel
        2. MS PowerPoint
        3. MS Word
        4. Web Browser
      1. The process of using DNS to perform an address translation is called ________.
        1. DNS Pattern
        2. DNS Table
        3. DNS Translation
        4. DNS Lookup        (Page-145)
      1. What does VoIP stand for?
        1. Virtually Over Internet Protocol
        2. Voice Over Internet Protocol        (Page-147)
        3. Voice of International Protocol
        4. Voice of Internet Protocol
      1. Word processor like Microsoft Word is an application that _________.
        1. Build editable word documents        (Page-40)
        2. Build editable questions
        3. Build editable programs
        4. Build editable excel files
      1. Adding 0.1 and 1.1 produces the number ________.
        1. 1
        2. 0
        3. 0        (Page-78)
        4. 1
      1. Choose the lowest heading level HTML tag from the given options.
        1. h1
        2. h4
        3. h2
        4. h6        (Page-375)
      1. The instruction code to halt machine cycle is ________.
        1. C400
        2. 35CE0
        3. C1000
        4. C000        (Page-105)
      1. In binary notation, we can represent _______ numbers, if we have n bits.
        1. 2 power (n+1)
        2. 2n
        3. 2 power (n)        (Page-73)
        4. 2(n-1)
      1. Windows uses graphics to make program easier to use, such graphics are known as _________.
        1. IR
        2. IBM
        3. GUI        (Page-126)
        4. DOS
      1. Process state include the value of the program counter as well as the contents of the _________.
        1. Registers and cache memory cells
        2. Registers and related memory cells        (Page-161)
        3. Registers
        4. Related memory cells
      1. What is the full form of PHP?
        1. Protected Home Page
        2. Personal Home Page
        3. Public Home Page
        4. Private Home Page
      1. _________ tag contains the information related to metadata that is not usually displayed on the webpage.
        1. P
        2. Head
        3. Body
        4. HTML
      1. The dispatcher is the component of the _________ that manages the execution of the scheduled processes.
        1. Operating System
        2. Kernel        (Page-126)
        3. Utility Program
        4. Memory Manager
      1. Binary number 11111111 is = __________ in decimal.
        1. 255        (Page-76)
        2. 567
        3. 127
        4. 128
      1. In 2-bit binary addition, how many possibilities are there?
        1. 9
        2. 6
        3. 4        (Page-78)
        4. 7
      1. The ________ divides long messages into small segments, which are transmitted over the internet.
        1. Transport layer        (Page-164)
        2. Network layer
        3. Link layer
        4. Application layer
      1. Hexadecimal notation uses a _________ symbol to represent a pattern of four bits.
        1. Double
        2. Quad
        3. Single         (Page-64)
        4. Triple
      1. Which of the following is intangible component?
        1. Hard Disk
        2. Software 
        3. Computer Mouse
        4. Optical Disk
      1. Which program do you use to create a spreadsheet?
        1. MS Excel        (Page-41)
        2. MS Access
        3. Word
        4. Internet Explorer
      1. Which of the following is one of the major drawbacks of Skype?
        1. Free version is not easily available
        2. It takes too much space on local drive
        3. It used computer resources without owner’s awareness        (Page-147)
        4. Call quality is not good
      1. Leibniz’s machines were achieved by observing the _________ positions.
        1. Second gear
        2. Final gear        (Page-45)
        3. First gear
        4. Third gear
      1. Pixels (Picture element) are ___________.
        1. Collection of dot-matrix        (Page-73)
        2. Collection of matrices
        3. Collection of disks
        4. Collection of data
      1. LAN stands for ________.
        1. Local Additional Network
        2. Local Area Network        (Page-135)
        3. Local Adopter Network
        4. Local Access Network
      1. The system software consists of two categories: _________ and utility software.
        1. Freeware software
        2. Operating software        (Page-118)
        3. Device Software
        4. Firmware software
      1. You can search a phrase when even you do not know word would be there at a particular __________.
        1. Document
        2. File
        3. Location        (Page-48)
        4. Hidden
      1. Which of the following is not the advantage of TCP over UDP?
        1. Connection establishment
        2. Flow control
        3. Congestion control
        4. Efficiency        (Page-168)
      1. In CS, we store and link data in an organized way using ________.
        1. MSDB
        2. SDLC
        3. DMBS
        4. DBMS        (Page-40)
      1. BOINC is abbreviated for ____________.
        1. Berkeley’s Open Infrastructure for Network Computing        (Page-142)
        2. Berkeley’s Open Internet for Network Computing
        3. Boston’s Open Internet for Network Computing
        4. Boston’s Open Infrastructure for Network Computing
      1. In black and white images, each pixel is represented as one bit – e.g. 0 for black and 1 for white. If _________.
        1. Matrix
        2. Email
        3. Facsimile        (Page-73)
        4. Searching
      1. VoIP consists of two processes on different machines transferring audio data via the ________ model.
        1. P2S
        2. P2R
        3. P2Q
        4. P2P        (Page-145)
      1. 0011 + 0010 = ___________.
        1. 0000
        2. 1010
        3. 0101        (Page-78)
        4. 1111
      1. In which type of communication several signals are transferred at the same time, each on a separate line?
        1. Parallel communication        (Page-112)
        2. Series communication
        3. Network communication
        4. Computer communication
      1. The small segments of long messages in terms of computer network are called __________.
        1. Pairs
        2. Parts
        3. Parcels
        4. Packets        (Page-164)
      1. An internet is a ____________.
        1. Collection of LANs
        2. Collection of WANs
        3. Network of Networks        (Page-135)
        4. Collection of identical LANs and WANs
      1. What does FTP stand for _______________.
        1. Formatting Transfer Protocol
        2. File Transmit Protocol
        3. File Transfer Protocol        (Page-145)
        4. Format Transfer Protocol
      1. First software for implementing the web was released in _______.
        1. December 1990        (Page-150)
        2. October 1990
        3. September 1990
        4. November 1990
      1. Robots can be guided by _________.
        1. An external control device or the control maybe embedded within        (Page-36)
        2. Application
        3. Remote
        4. An internal control device or the control device maybe embedded within
      1. World Wide Web was adopted as a standard approach for linking documents over the internet because _________.
        1. Existing alternative approaches were not very efficient
        2. No alternative existed at that time
        3. It got very popular after incorporating support for multimedia content
        4. No existing alternative approach was more widely used at that time
      1. The process of dynamically allocating tasks to the various processors so that all processors are used efficiently is known as _______.
        1. Load Balancing        (Page-117)
        2. Scaling
        3. Multitasking
        4. Load Sharing
      1. The most popular system for representing integers within today’s computers is _________’s complement notation.
        1. Two        (Page-81)
        2. Zero
        3. One
        4. Three
      1. In _________ the operating system maybe copied from a distant machine over a network.
        1. Small workstations        (Page-124)
        2. Workstations
        3. Large workstations
        4. Intranet network
      1. The extent to which air particles are displaced is called _______ of sound.
        1. Quality
        2. Pitch
        3. Intensity
        4. Amplitude        (Page-74)
      1. Which excess notation is used to represent zero as 10000?
        1. Excess 8
        2. Excess 16        (Page-74)
        3. Excess 4
        4. Excess 2
      1. SSL proto is the backbone of _________.
        1. HTTPS
        2. HTTPR
        3. HTML
        4. HTML5
      1. Which of the following is not true about XML?
        1. It is a markup language based on HTML
        2. It can used to encode sheet music        (Page-159)
        3. It is a self-descriptive language
        4. It can be used to encode non-textual material as text file.
      1. FIFO is abbreviation of?
        1. First Initiate First Out
        2. First in First Occupied
        3. First in First Out        (Page-254)
        4. For in For Out
      1. Ethernet based network for bus topology makes use of __________ for transmitting messages.
        1. CSMA / CD        (Page-136)
        2. CSMA / CA
        3. CSMA / CE
        4. CSMA / AC
      1. Cloud computing services provide reasonable guarantees of ______ and ______.
        1. Privacy, Security
        2. Scalability, Security
        3. Reliability, Privacy
        4. Reliability, Scalability        (Page-142)
      1. Cloud computing raise concerns about _____ and _____ in a world.
        1. Reliability, Privacy
        2. Privacy, Security        (Page-142)
        3. Scalability, Privacy
        4. Scalability, Security
      1. For a network to function reliably, it is important to establish rules by which activities are conducted. Such rules are called __________.
        1. Premises
        2. Properties
        3. Patterns
        4. Protocols        (Page-136)
      1. Capacity of one sector of CD is of ________ KB.
        1. 2        (Page-69)
        2. 4
        3. 3
        4. 1
      1. Which one of the following tags has no ending tag in HTML?
        1. a
        2. b
        3. br        (Page-375)
        4. p
      1. Which type of similar instruction is executed by the CPU to “store” the bit pattern in the controller?
        1. Receive instruction
        2. Store instruction        (Page-110)
        3. Load instructions
        4. Jump instruction
      1. If we are interested to see the map of same location, we can use the Map operator in the following pattern?
        1. Mph: Map
        2. Map: Location        (Page-50)
        3. Location: Map
        4. Locations
      1. HTML supports _________ levels of heading tags.
        1. Six        (Page-375)
        2. Ten
        3. Twelve
        4. Four
      1. What is the full form of CGI?
        1. Common Gateway Interface        (Page-161)
        2. Collective Gateway Interface
        3. Collaborative Gateway Interface
        4. Console Gateway Interface
      1. The search results that are generally presented in a line often referred to as _________.
        1. Category
        2. The list
        3. Search Engine Result Pages
        4. Pages
      1. The connection between networks to form an internet is handled by devices known as __________.
        1. Gateway
        2. Router        (Page-138)
        3. Bridge
        4. Hub
      1. The application layer uses the __________ to send and receive messages over the internet.
        1. Network layer
        2. Desktop layer
        3. Link layer
        4. Transport layer        (Page-164)
      1. is called the _______ tag in HTML document.
        1. Action
        2. Alter
        3. Actor
        4. Anchor        (Page-156)
      1. Which one of the following is the correct sequence of network layers for the flow of messages at the sender side?
        1. Network layer to Link layer to Transport layer to Application layer
        2. Application layer to Transport layer to Network layer to Link layer        (Page-162)
        3. Link layer to Network layer to Transport layer to Application layer
        4. Application layer to Link layer to Network layer to Transport layer
      1. ________ is not a valid IP address.
        1. 192.168.1.1
        2. 192.168.1.0
        3. 192.168.0.0
        4. 192.168.1.0.1        (Page-144)
      1. Bits can represent in chips as:
        1. Addition form
        2. A, B form
        3. 0, 1 form        (Page-60)
        4. Algebra form
      1. Each sound have a _____________.
        1. Wave
        2. Geometric Structures
        3. Pixel
        4. Scaling
      1. A sequence of transactions in which the user establishes initial contact with a computer’s operating system is called ___________.
        1. Process
        2. Boot State
        3. Logout
        4. Login        (Page-133)
      1. It is the responsibility of the application layer to:
        1. Determine the direction to which forward packets
        2. Add sequence numbers to the small segments of a message
        3. Ensure that the messages are properly formatted for transmission over the internet
        4. Use the services of the name servers to translate mnemonic addresses into IP addresses        (Page-164)
      1. FTP ________ could check all incoming files for the presence of known viruses and block all infected files.
        1. File server
        2. Shared server
        3. Web server
        4. Proxy server        (Page-171)
      1. What is the full form of JSP?
        1. Java Source Pages
        2. Java Script Pages
        3. Java Semantic Pages
        4. Java Server Pages        (Page-161)
      1. A long string of bits is often called a __________.
        1. Line
        2. Byte
        3. Stream        (Page-63)
        4. Bit
      1. Which protocol is used to connect the news servers and transfer news articles between systems?
        1. FTP
        2. SMTP
        3. NTP
        4. NNTP        (Page-145)
      1. The concurrent execution of multiple jobs in a single user system is known as ___________.
        1. Multi-programming
        2. Multiprocessing
        3. Multischeduling
        4. Multitasking        (Page-117)
      1. A process is called to be in ­­­­­­­­­_________ state if it can continue its progress.
        1. Ready        (Page-126)
        2. Running
        3. Waiting
        4. Suspend
      1. Network layer will be responsible to:
        1. Consult the forwarding table to determine where the packets should be sent        (Page-165)
        2. Determine which application receives an incoming message
        3. Reconstruct the original message according to the sequence numbers
        4. Deals with the communication details particular to the individual networks where the computer resides
      1. Which type of similar instruction is used to receive a bit pattern from a controller?
        1. Receive instruction
        2. Store instruction
        3. Load instruction        (Page-110)
        4. Jump instruction
      1. Which one of the following is not the basic Boolean operation?
        1. OR
        2. NAND        (Page-62)
        3. AND
        4. XOR
      1. To store or manipulate data in computers, the bit 0 represents the value false and the bit 1 represents the value __________.
        1. Empty
        2. Wrong
        3. True        (Page-62)
        4. True / False
      1. Most ______ codes today are Huffman codes.
        1. Relative
        2. Run-Length
        3. Frequency-Dependent        (Page-90)
        4. Differential
      1. Non-Terminating expansions may also be a source of _________.
        1. Logical error
        2. Truncation error        (Page-89)
        3. Overflow
        4. Syntax error
      1. In 2’s complement notation, the maximum positive number is represented by __________.
        1. A single “1” followed by all 0’s
        2. All 0’s
        3. All 1’s
        4. A single “0” followed by all 1’s        (Page-82)
      1. Which of the following is not true about firewall?
        1. Firewall protects the individual computer from outsider intrusion
        2. Firewall protects the individual computer from inside intrusion        (Page-303)
        3. Firewall protects the entire network from inside intrusion
        4. Firewall protects the entire network from outside intrusion
      1. Which kind of server works as an intermediate between client and server?
        1. Server computer
        2. Client server
        3. Super server
        4. Proxy server        (Page-171)
      1. WWW stands for?
        1. World While Web
        2. World Wild Web
        3. World Wide Web        (Page-150)
        4. World White Web
      1. When a packet reaches its intermediate stop, the network layer:
        1. Discard the packet considering it irrelevant
        2. Hands the packet to transport later rather than forwarding it        (Page-165)
        3. Forwards it to all the recognized networks
        4. Forward it to the link layer after determining the direction of the next hope
      1. The architecture philosophy with which a CPU is designed to execute a minimal set of machine instructions is called _________.
        1. CISC
        2. ENVIAC
        3. RISC / CISC
        4. RISC        (Page-99)
      1. TLD stands for ________.
        1. Top Low Domain
        2. Top Level Domain        (Page-144)
        3. Top Lower Domain
        4. Top Loud Domain
      1. Once an intruder (or perhaps an authorized user with malicious intent) gains access to a computer system, the next step is usually to explore, looking for information of interest or for places to _________.
        1. Acknowledged
        2. Destructive software        (Page-133)
        3. Informative software
        4. Log in software
      1. Algorithm for finding binary representation of a positive decimal number contain _______ steps.
        1. Long Process
        2. Enough
        3. Three        (Page-76)
        4. One
      1. A CPU consists of components, namely ________.
        1. Arithmetic Logic Unit, Control Unit, Registers        (Page-96)
        2. RAM, Cache, Registers
        3. RAM Cache, Control Unit
        4. Arithmetic Logic Unit, RAM, Control Unit
      1. You can search images even by giving a query using another image using google image ________.
        1. Info
        2. Tilt
        3. Link        (Page-51)
        4. Related
      1. Decentralized approach for running various operations leads to efficiency in _______ model.
        1. Client / Server
        2. Distributed Server
        3. Peer 2 Peer        (Page-140)
        4. File Server
      1. Which register contains the address of the next instruction?
        1. Address register
        2. Instruction register
        3. Program register        (Page-101)
        4. Data register
      1. Which of the following language is used for client side scripting?
        1. net
        2. JavaScript
        3. Python
        4. PHP
      1. To construct reliable operating systems, we must develop _______ that cover every possible contingency, regardless of how minuscule it may appear.
        1. Algorithm        (Page-128)
        2. Activity
        3. Program
        4. Command
      1. In main memory each cell has unique name called as _______.
        1. Address        (Page-66)
        2. Unit
        3. Slot
        4. Bit
      1. When you type a query in the search bar of google. Google finds all those pages which contains __________.
        1. All the terms given in the query        (Page-42)
        2. Random
        3. Some of the terms given in the query
        4. None of the terms given in the query
      1. An interrupt converts the CPU to privileged mode and transfers control to ______ within the operating system.
        1. Scheduler
        2. Interrupt handler        (Page-134)
        3. Memory manager
        4. Dispatcher
      1. ________ connects computer over a large geographical area of world.
        1. MAN
        2. LAN
        3. PAN
        4. WAN        (Page-134)
      1. Which of the following language is used for server-side scripting?
        1. JavaScript
        2. HTML
        3. PHP
        4. CSS
      1. Suppose we have a bit pattern 11001101, how many times right circular shift should be performed on it to obtain the same bit pattern?
        1. 8 times        (Page-107)
        2. 3 times
        3. 4 times
        4. 2 times
      1. Telnet is used to _______ between two systems.
        1. Securely share information
        2. Establishes a remote connection
        3. Establishes a secure remote connection
        4. Securely transfer files
      1. A negative exponent would mean to move the radix point _______.
        1. To left        (Page-86)
        2. To right
        3. Before sign bit
        4. After sign bit
      1. Computer hardware is the collection of ________.
        1. Physical parts of a computer systems        (Page-35)
        2. Websites
        3. Applications
        4. Programs
      1. Which tier of ISP is the backbone of internet?
        1. Tier-1 ISPs        (Page-143)
        2. Tier-4 ISPs
        3. Tier-2 ISPs
        4. Tier-3 ISPs
      1. What is the name of the ability of a controller to access main memory?
        1. Controller communication
        2. Direct Memory Access DMA        (Page-110)
        3. Computer bus access
        4. Memory bus access
      1. The efficiency of _______ makes it the protocol of choice for DNS lookups and VoIP.
        1. TCP
        2. HTTP
        3. SMTP
        4. UDP        (Page-168)
      1. Diameter of compact disk is _________.
        1. 12 centimeters        (Page-69)
        2. 16 centimeters
        3. 10 centimeters
        4. 11 centimeters
      1. RAM stands for ________.
        1. Random Archive Memory
        2. Random Approach Memory
        3. Random Access Memory        (Page-66)
        4. Random Memory
      1. ______ was the first to implement the web.
        1. Charles Babbage
        2. Tim Berners-Lee        (Page-152)
        3. Steve Jobs
        4. Alan Turing
      1. Previously how many bits were used to store in 2’s complement notation?
        1. 64 bits
        2. 128 bits
        3. 8 bits
        4. 16 bits        (Page-83)
      1. _______ refers to distributed systems that are more loosely coupled than clusters but that still work together to accomplish large tasks.
        1. Parallel computing
        2. Quantum computing
        3. Cloud computing
        4. Grid computing        (Page-142)
      1. Binary notation is a way of representing numeric values using only the _______.
        1. Digit 0 and 2
        2. Digit 0 and 0
        3. Digit 0 and 1        (Page-71)
        4. Digit 2 and 1
      1. A private key is used to _______ messages.
        1. Encrypt        (Page-74)
        2. Send
        3. Receive
        4. Decrypt
      1. ­­­­­________ is transfer data one after the other.
        1. Parallel communication
        2. Serial communication        (Page-12)
        3. Direct communication
        4. Simple communication
      1. Which data compression technique is suitable for data having long sequences of the same value?
        1. Differential encoding
        2. Run-length encoding        (Page-90)
        3. Relative encoding
        4. Frequency-dependent encoding
      1. What does HTTP stand for _________?
        1. Hexadecimal Text Transfer Protocol
        2. Hearing Text Transfer Protocol
        3. Holding Text Transfer Protocol
        4. Hyper Text Transfer Protocol        (Page-152)
      1. In the context of computer networks, WWW stands for _________.
        1. World Wild West
        2. World Wide Web        (Page-152)
        3. World Wide West
        4. Web World Wild
      1. Computer science has many ___________ in almost every field of the real world.
        1. Domains
        2. Operations
        3. Applications        (Page-37)
        4. Branches
      1. ___________ stores bits as tiny electric charge that refreshes many times a second.
        1. DRAM        (Page-66)
        2. SDRAM
        3. RAM
        4. Flip-Flop
      1. Each time a process finishes a task the operating system either allocate the resource to a waiting process or, if no process is waiting, it ________ the flag.
        1. Set
        2. Clear        (Page-129)
        3. Restore
        4. Store
      1. Which protocol is suitable for wireless start network?
        1. TCP / IP
        2. CSMA / CA        (Page-136)
        3. CSMA / CD
        4. Ethernet
      1. A clear flag state indicates that the resource is ________.
        1. Ready
        2. Available        (Page-129)
        3. Unavailable
        4. Currently allocated
      1. ¼ can be represented by __________ as a fractional binary number.
        1. 0
        2. 10
        3. 01        (Page-80)
        4. 1
      1. If binary representation of 8 is 1000, then how is -8 is written in 2’s complement notation?
        1. 1001
        2. 0000
        3. 0100
        4. 10000
      1. ________ keep track of instructions being executed.
        1. Memory address registers
        2. Special purpose registers        (Page-101)
        3. Memory buffer registers
        4. General purpose registers
      1. Avoid searching the following upon the internet:
        1. Videos
        2. Games
        3. Lectures
        4. Pressure cooker bomb story        (Page-53)
      1. ________ is a transfer instruction used to communicate with devices outside the CPU.
        1. COM instruction
        2. STORE instruction
        3. I / O instruction        (Page-100)
        4. LOAD instruction
      1. Herman Hollerith invited the ________ technology.
        1. Technology of Gear
        2. Abacus
        3. Punch Cards        (Page-56)
        4. ENIAC
      1. Before the stored program concept, data was stored in memory while programs were a part of __________.
        1. Cable
        2. Bus
        3. Cache
        4. CPU        (Page-98)
      1. An important task of a(n) __________ is the allocation of machine’s resources to the processes in the system.
        1. Dispatcher
        2. Operating System        (Page-128)
        3. Control Unit
        4. Process
      1. Using ________, we can fine the stock market trend of a company.
        1. Boolean operator
        2. Stocks operator        (Page-50)
        3. Plus, operator
        4. @ operator
      1. The material that is displayed on the screen is contained in the _______ of the HTML document.
        1. Body        (Page-375)
        2. Title
        3. Head
        4. Frame
      1. Which of the following network layer is responsible to recognize that the packet has reached its final destination?
        1. Network layer        (Page-165)
        2. Transport layer
        3. Link layer
        4. Application layer
      1. ________ is a package containing a party’s name and that party’s public key.
        1. Antivirus
        2. Certificate        (Page-155)
        3. Security
        4. Contract
      1. _________ operator will give us only those web pages in which the searched term appears in the title of the web pages.
        1. Stocks operator
        2. Upper case title
        3. Boolean operators
        4. Intitle        (Page-51)
      1. In binary system we can use only ____ or _____ at each position.
        1. 0, 0
        2. 1, 2
        3. 0, 1        (Page-76)
        4. Null, 1
      1. All bit patterns, which represents positive numbers in excess notation starts with ________.
        1. 0
        2. 11
        3. 00
        4. 1        (Page-84)
      1. Program counter is a ________.
        1. Special purpose register        (Page-101)
        2. Memory address register
        3. Memory buffer register
        4. General purpose register
      1. Which unit transfers the data from memory to general purpose registers?
        1. Shift
        2. Control Unit        (Page-96)
        3. Arithmetic Unit
        4. Logic Unit
      1. The dispatcher allocates ______.
        1. Times slices        (Page-128)
        2. Mass storage space
        3. Memory space
        4. Storage space
      1. The computers of the __________ were not very flexible and efficient.
        1. 1961s and 1970s
        2. 1950s and 1960s
        3. 1930s
        4. 1940s and 1950s        (Page-114)
      1. The originator of a message can encrypt the message using _________.
        1. Public key
        2. Double key
        3. Private key        (Page-174)
        4. Single key
      1. Each router maintains a _________ that contains the router’s knowledge about the direction in which the messages should be sent.
        1. Forwarding table        (Page-139)
        2. Logarithmic table
        3. Algorithm table
        4. Knowledge table
      1. What ability of a controller is known as Direct Memory Access (DMA)?
        1. To store instructions
        2. To access main memory        (Page-110)
        3. To access CPU
        4. To receive instructions
      1. One bit can contain only _______ value.
        1. Zero
        2. Two
        3. One        (Page-60)
        4. Three
      1. Which of the following is not malware?
        1. Trojan Horses
        2. Spyware
        3. Warms
        4. Antivirus
      1. Which of the following technology is not related to the client side working?
        1. HTML
        2. Java Applets
        3. PHP
        4. JavaScript
      1. How many steps does a machine cycle generally have?
        1. Three        (Page-101)
        2. Four
        3. Two
        4. Two or more
      1. A right circular shift of 3 bits on a string of 8 bits is equivalent to left circular shift of how many bits?
        1. 4
        2. 6
        3. 5        (Page-107)
        4. 3
      1. Which of the following is the variation of firewalls?
        1. Net filters        (Page-307)
        2. Spam filters
        3. Wall filters
        4. Proxy filters
      1. HDTV is an acronym of ________.
        1. High Demand Television Videos
        2. High Demanded Television
        3. High Definition Television        (Page-95)
        4. High Define Television
      1. The impact of truncation error can be reduced by using _________.
        1. Longer exponent field
        2. Longer mantissa filed        (Page-89)
        3. Positive exponent field
        4. Zero in sign bit
      1. While performing the process, ________ compares each memory reference to register to ensure that the reference is within the designated limits.
        1. Process manager
        2. The ALU / CU
        3. Operating system
        4. The CPU        (Page-134)
      1. Which of the following is not a significant issue in VoIP communication?
        1. Transferring audio data between communicating processes        (Page-147)
        2. Task of initiating and receiving a call
        3. Linking with traditional telephone system
        4. Incorporating emergency call services
      1. OR operator is also represented by _________.
        1. @
        2. |        (Page-223)
        3. }
        4. *
      1. Internet is a type of _________.
        1. Website
        2. Computer
        3. Network        (Page-135)
        4. Application
      1. In Computer, GUI stands for ________.
        1. Graphical Utility Icon
        2. General User Interrupt
        3. Graphical User Interface        (Page-120)
        4. Grayed User Interface
      1. Which of the following is a lossless data compression technique?
        1. Binary encoding
        2. Transform coding
        3. Discrete cosine transforms
        4. Frequency-dependent encoding        (Page-90)
      1. Scheduler maintains a block of information of all processes in main memory in ______ table.
        1. Process        (Page-126)
        2. MAC
        3. ASCII
        4. IP
      1. ______ is used for encoding consecutive frames of a motion picture.
        1. Dictionary encoding
        2. Huffman encoding
        3. Frequency-dependent encoding
        4. Relative encoding        (Page-90)
      1. Which of the following protocol helps to store the email messages on a local machine while retrieving email messages from the receiving server?
        1. POP3        (Page-147)
        2. SMTP
        3. IMAP
        4. MIME
      1. Which of the following feature was incorporated in the early versions of the World Wide Web?
        1. Storing the document in an unstructured way
        2. Tracking of various versions of a document
        3. Flexible searching with the help of metadata
        4. Transclusions
      1. What is the full form of ASP?
        1. Active Server Pages        (Page-161)
        2. Alternate Start Pages
        3. Alternate Server Pages
        4. Active Start Pages
      1. Using MPEG techniques, video presentations can be successfully relayed over communication paths that provide transfer rates of _________.
        1. 50 Mbps
        2. 40 Mbps        (Page-96)
        3. 80 Mbps
        4. 90 Mbps
      1. One of the earlier computing devices was the:
        1. Laptop
        2. Windowa
        3. IPhone
        4. ABACUS        (Page-55)
      1. JCL is abbreviation of ________.
        1. Job Control Logic
        2. Job Control Language        (Page-115)
        3. Job Communication Language
        4. Job Controller Language
      1. Internet is a collection of networks constructed by ________.
        1. Intranet Service Producer
        2. Internet Service Provider        (Page-142)
        3. Intranet Server Provider
        4. Internet Service Producer
      1. The hackers normally add many ______ to such websites as the information seeker of free music.
        1. Song
        2. Alert
        3. Viruses        (Page-54)
        4. Messages
      1. Search Engines can search _________ type of information.
        1. Only document
        2. Documents, Images, Videos        (Page-41)
        3. Programs
        4. Only word files
      1. In binary addition 1 + 0 = _________.
        1. 1        (Page-78)
        2. 8
        3. 2
        4. 4
      1. _______ is also considers as character.
        1. Numbers
        2. Space
        3. Small caps
        4. Large caps
      1. Which register act as a temporary holding place for data being manipulated by the CPU?
        1. Memory buffer register
        2. Memory address register
        3. Special purpose register
        4. General purpose register        (Page-96)
      1. ______ encoding is used to store colorful images.
        1. RGB        (Page-74)
        2. Pixel
        3. Bitmap
        4. Scaling
      1. Due to the volatility and limited size of a computer’s main memory, most computers have additional memory devices called _______.
        1. RRAM
        2. Mass Storage        (Page-67)
        3. DRAM
        4. PRAM
      1. Which of the application may not be considered a network-based application?
        1. Text editor application
        2. Remote access application
        3. Social media application
        4. NEWS reader application
      1. ________ tag is used to write paragraph in HTML document.
        1.         (Page-375)
      1. The term used for removing process from process table is called ________ the process.
        1. Removing
        2. Deleting
        3. Killing        (Page-131)
        4. Dropping
      1. A program under ______ is called process.
        1. Development
        2. Analysis
        3. Execution        (Page-126)
        4. Maintenance
      1. Breaking the task into a number of subtasks compatible with the number of available processors is called ________.
        1. Interactive processing
        2. Scaling        (Page-117)
        3. Throughout
        4. Load balancing
      1. ANSI stands for:
        1. Association National Standards Institute
        2. American National Standards Institute        (Page-71)
        3. Anglican National Standards Institute
        4. Australian National Standards Institute
      1. Google drive is an example of _______.
        1. Grid computing
        2. Cluster computing
        3. Grid and Cluster computing
        4. Cloud computing        (Page-142)
      1. ­­­­­_________ provides a network the internet connectivity.
        1. Hub
        2. Repeater
        3. Gateway        (Page-139)
        4. Node
      1. The ______ indicates the location of the document within the host file system.
        1. Mnemonic name
        2. Directory path
        3. Document name
        4. Protocol name
      1. ________ can store unique pattern of 21 bits.
        1. UTF-8
        2. Unicode        (Page-72)
        3. ASCII
        4. ANSI
      1. TIFF is an acronym of _______.
        1. Toggle Image File Format        (Page-93)
        2. Tagged Image File Format
        3. Transform Image File Format
        4. Template Image File Format
      1. In a general-purpose computer, a program called the ______ is permanently store in the machine’s ROM.
        1. Compiler
        2. Application Loader
        3. BOOT Loader        (Page-124)
        4. Interpreter
      1. After fetching instruction will be decoded and _______.
        1. Loaded
        2. Executed        (Page-104)
        3. Transfer
        4. Stored
      1. MIME protocol is:
        1. An extension to SMTP for multimedia messaging support        (Page-130)
        2. Used to replace the working of SMTP protocol
        3. Used to transfer non-ASCII data to the receiver
        4. Used to store multimedia data on server-side
      1. In SD card technology, SDHC (High Capacity) can provide ______ GBs of storage.
        1. 65
        2. 16
        3. 8
        4. 32        (Page-70)
      1. Star topology-based network cannot detect ______.
        1. Collision
        2. Transmission
        3. Packets
        4. Deadlock
      1. What will be the output of the following Boolean expression? 1010 or 1111
        1. 0101
        2. 1111        (Page-62)
        3. 0000
        4. 1010
      1. 2 raised the 0 equals to _______.
        1. 0
        2. 3
        3. 1        (Page-96) 
        4. 2

1 thought on “CS101 Solved (Lec 1-108) MCQs Fall, 2021”

  1. Pingback: CS101 Downloadable Quiz Files (Lec 1-108) Fall, 2021 – Helping Hands

Leave a Comment

Your email address will not be published.