You are on page 1of 2

Name: _______________________

11 Computer Roll #:
Time: 30Min; Marks: 30
ICS 1st Year: CH#01,02,06
Q1) Choose the most appropriate op on. Cu ng / overwri ng is not allowed: 30 Marks
i) System requirements are created during
A) Preliminary B) Analysis C) Design D) Development
inves ga on
ii) Who proposed a design of a stored program computer?
A) Van Neumann B) Blaise Pascal C) Babbage D) Sir Rutherford
iii) Which one is not a virus
A) Trojan Horse B) Logic bomb C) McAfee D) Redlof
iv) Laser printer is an example of ____ printer
A) Non-impact B) inkjet C) impact D) dot matrix
v) So ware that is available free for a limited period is called:
A) Freeware B) Shareware C) Groupware D) Netware
vi) Data that is shown on display unit either in the form of audio and video is called
A) Hard copy B) so copy C) Share copy D) Null copy
vii) DPI stands for
A) Dot per inch B) Decimal per inch C) Digit per inch D) data per inch
viii) Which one connects two similar network segments:
A) router B) bridge C) gateway D) node
ix) All physical media deals within:
A) Applica on layer B) Transport layer C) Presenta on layer D) Physical layer
x) The virus which deletes MS Office files and disk par on informa on is called
A) Boot sector B) Chernobal C) Logic bomb D) Trojan horse
xi) Which is a storage device:
A) Floppy B) CPU C) Clock D) BUS
xii) Which layer of OSI model does data compression.
A) Network B) Physical C) presenta on D) Data link
xiii) How many mes the storage capacity of CD-ROM is greater than floppy diske e
A) 10 mes B) 100 mes C) 1000 mes D) 10000 mes
xiv) Format C is an example of:
A) An -virus B) Logic bomb C) Trojan horse D) Red loaf
xv) The process of transferring a file from a remote computer to our local computer is:
A) Downloading B) Uploading C) Shi ing D) Sending
xvi) Window explorer is used to:
A) access the internet B) explore the system C) perform maintenance of D) naviga on files and
resource the hard disk folders on the computer
xvii) The physical layout of LAN is known as ____
A) topology B) session C) link D) connector
xviii) Which of the following is not an an virus program:
A) Redlof B) Norton C) Dr. Solmon D) McAfee
xix) Another name for an virus is:
A) Vaccine B) Worm C) Trojan Horse D) DES
xx) Which of the following is not a component of LAN
A) cables B) gateway C) Bridge D) Modem
xxi) Which is an example of De Facto standard:
A) ANSI B) ISO C) SNA D) IEEE
xxii) The example of an virus is:
A) MacAfee B) Trojan horse C) worm D) logic bomb
xxiii) Each computer on a network is called a:
A) Bus B) terminator C) node D) connec on
xxiv) Which one is hard copy output device?
A) CRT Monitor B) Plo er C) LCD monitor D) Mul media projector
xxv) Which of the following is not a network topology
A) Star B) Ring C) SNA D) Bus
xxvi) How many pairs of computers can simultaneously communica on on Ethernet LAN
A) 1 B) 2 C) 3 D) Mul ple
xxvii) Virus are transferred from one computer to another due to
A) Exchange data and B) Exchange of display C) Dust in room D) High temperature
program screen
xxviii)How many types of par ons are?
A) 2 B) 4 C) 6 D) 8
xxix) Which device connects each computer to the network
A) Network interface card B) Router C) Gateway D) Bridge
xxx) Example of numeric data is:
A) 5.2 B) 6.4 C) 3456 D) All of them

You might also like