Professional Documents
Culture Documents
Emailing CS 101 Grand Quiz-1
Emailing CS 101 Grand Quiz-1
1. The “inurl” operator finds web pages which contains the mentioned query in the
URL of the web pages.
a) All
b) Many
c) Some
d) None
2. Which type of instruction an Instruction Register Holding?
a) Being executed now
b) Being loaded now
c) Being stored now
d) Being transfer now
3. 10.011 added to 100.11 produces
a) 111.088
b) 111.007
c) 111.001
d) 111.099
4. Dynamic ram – Stores bits as tiny electric Charge,
a) Refreshes no times a second
b) Refreshes many times a second
c) Refreshes one times a second
d) Refreshes two times a second
5. George Boole , who was a pioneer in the field of mathematics called
a) Subtraction
b) Algebra
c) Logic
d) Progression
6. Computer does not understand any language except:
a) Machine language
b) Assembly language
c) Binary language
d) Programming language
7. Diameter of COMPACT disk is
a) 10 centimeter
b) 11 centimeter
c) 12 centimeter
d) 16 centimeter
8. Which registers act as temporary holding places for data being manipulated by the CPU?
a) Memory address register
b) Special purpose
c) General Purpose
d) Memory buffer
9. Within a transfer category which instruction is used to communicating with
devices outside the CPU?
a) STORE instruction
b) COM instruction
c) I/O instruction
d) LOAD instruction
10. One of the major uses of the operation is for placing 0s in one part of a bit pattern
while not disturbing the other part.
a) AND
b) OR
c) XOR
d) NOR
11. Truncation Errors is a problem occur in
a) Tows complement notation
b) Excess-3 Notation
c) Excess Notation
d) Floating Point Notation
12. If we are interested to search anywhere in the body of the document, we can
use operator.
a) Intitle
b) Intext
c) Subtitle
d) Align title
13. Pixel to Bitmap is often used in
a) Facsimile
b) Email
c) Searching
d) Matrix
14. In digits on right side represents the fractional part.
a) Fraction
b) Decimal
c) Hexadecimal
d) Binary
15. Approximately how many entries a typical dictionary in a word processor can contain?
a) 25,000 entries
b) 250,000 entries
c) 250.000 entries
d) More than 250,000 entries
16. is a shift operation technique is to place the bit that fell off the right end
in the hole at the left end?
a) Arithmetic shift
b) Dimensional shift
c) Logical shift
d) Circular/Rotation shift
17. The instruction code to the halt machine cycle is
a) C400
b) C100
c) C000
d) 35CE0
18. In hexadecimal notation, 1111 is represented by .
a) A
b) C
c) F
d) E
a) 129
b) 190
c) 128
d) 1000
23. JCL is abbreviation of .
a) Job controller language
b) Job communication language
c) Job control logic
d) Job control language
24. Computer hardware is the collection of
a) Partials
b) Physical parts of a computer system
c) Software
d) Program
25. Which Excess notation is used to represent 10000 as Zero
a) Excess 2
b) Excess 8
c) Excess 4
d) Excess 16
26. The loudness of sound varies directly with the vibrating
a) Intensity
b) Amplitude
c) Pitch
d) Quality
27. By using 16 bits in 2’s complement notation, how many maximum positive
number represented
a) 32786
b) 32678
c) 32867
d) 32868
28. Using form eliminates the possibility of multiple representations for the same
value.
a) Abnormal
b) Normal
c) Normalized
d) Unnormalized
29. One is that a CPU should be designed to execute a minimal set of machine instructions.
This approach is called _
a) CISC
b) RISC
c) ENVIAC
d) PRISC/CISC
30. When you search in the Google by typing Google finds all those pages which contains
a) All the terms given in the query
b) None of the terms given in the query
c) Some of the terms given in the query
d) None
31. Program counter is a
a) General purpose register
b) Memory address register
c) Special purpose register
d) Common purpose register
32. Most computers manufactured today use at least for storing values in
floating-point notation instead of the 8 bits we have used here.
a) 38 bits
b) 32 bits
c) 31 bits
d) 30 bits
33. To receive a bit pattern from a controller, an instruction similar to which type of
instruction is used?
a) Store Instruction
b) jump instruction
c) Receive instruction
d) Load instruction
34. Using MPEG and MP3 compression techniques, video cameras are able to record
video within
a) 128 GB storage
b) 28 MB storage
c) 128 MB of storage
d) 8 GB storage
35. is the most demanded job in United State
a) System Agent
b) IT Administrator
c) Software Developer
d) Graphic Designer
36. consists of the instructions that tell the control unit to request an
activity within the arithmetic/logic unit.
a) Arithmetic/logic group
b) Control unit group
c) RISC group
d) RISC/CISC group
37. Average amount of time required for the desired data to rotate around to the read/write
head once the head has been positioned over the desired track
a) Random TIME
b) Access time
c) Seek time
d) Rotational delay
38. A CPU consists of three parts
a) ALU/ control unit, register
b) ALU/MJPEJ/CU
c) CIRCUIT /Mp3 /CU
d) Ram/cache/ dram
39. Subtraction can be simulated by and negation.
a) Division
b) Addition
c) Multiplication
d) Two's complement
40. Hexadecimal notation uses a symbol to represent a pattern of four bits
a) Quad
b) SINGLE
c) Double
d) Triple
41. Another lossless data compression technique is
a) Binary encoding
b) Run-length encoding
c) UTF-8
d) Frequency- dependent encoding
42. HTTP stands for
a) Hyper title transfer protocol
b) Hyper track transfer protocol
c) Hyper texture transfer protocol
d) Hyper text transfer protocol
43. Which Excess notation is used to represent 100 as Zero?
a) Excess 4
b) Excess 8
c) Excess 2
d) Excess 16
44. The bit 0 represents the value false and the bit 1 represents the value
a) Wrong
b) True/false
c) True
d) Empty
45. If you want to search for an exact phrase on Google then enclose it in
a) @
b) " "
c) '
d) #
46. Sds (Secure Digital Memory Cards) provide up to
a) 10 gbs of storage
b) 100 gbs of storage
c) Few gbs of storage
d) 1000 gbs of storage
47. If we are interested to see the map of some location, we can use map operator in
the following way
a) Location: map
b) Map: Location
c) Mph map
d) Locations
48. Basic arithmetic operations are a)
(( ),^,*,/)
b) (+,/,*,/)
c) (+,-,*,/)
d) (=,-,-,/)
49. SSDs stands for
a) Semantic state disk
b) Solid state disk
c) Software state disk
d) Simple state disk
51. Time required to move the read/write heads from one track to another.
a) Random time
b) Access time
c) Seek time
d) Rotational time
52. Main memory is also called
a) ROM
b) RAM
c) Bits
d) Cache
53. Google does not distinguish the capital letters or small letters.
a) Lower case
b) Upper case
c) case-insensitive
d) case-sensitive
54. If you want to search within the range of number, you can use
a) 3 dots
b) 1 dot
c) 2 dots
d) Comma
55. In excess notation of bits are used to represent each value.
a) Simple number
b) Fixed number
c) Variable number
d) Constant number
59. Previously how many bits were used to store 2’s complement notation.
a) 8 bits
b) 16 bits
c) 64 bits
d) 128 bits
60. CPU and RAM are connected with to communicate with each other.
a) Controller
b) BUS
c) Cables
d) Ports
61. Which register contains the address of the next instruction?
a) Instruction register
b) Data register
c) Address register
d) Program register
62. We need memory to store data permanently
a) Volatile
b) RAM
c) Non-volatile
d) Address
63. The search results are generally presented in a line of results often referred to as
a) Category
b) The list
c) Pages
d) Search engine results pages
a) Microsoft explorer
b) Internet explorer
c) Window explorer
d) User interface
70. Which of the following is not the advantage of TCP over UDP?
a) Congestion control
b) Flow control
c) Connection establishment
d) Efficiency
a) No operating system
b) No software
c) Without drivers
a) Application
b) Computer
c) Network
d) Website
74. Scheduler maintains a block of information of all processes in main memory in ______
table
a) Mac
b) IP
c) Process
d) ASCII
75. ____________ not a valid IP address
a) 192.168.0.0
b) 192.168.1.0
c) 192.168.1.1
d) 192.168.1.0.1
76. The connection between networks to form an internet is handled by devices known as
a) Router
b) Hub
c) Gateway
d) Bridge
a) 80 Mbps
b) 40 Mbps
c) 90 Mbps
d) 50 Mbps
a) Four
b) Six
c) Ten
d) Twelve
Def findmax():
Max = first number in the list
Current = second number in the list
While (elements in the list exist)
a) Current = next value in the list
b) Max=current
c) Max=value
d) If (max<current)
80. A program under _________ is called process.
a) Execution
b) Development
c) Analysis
d) Maintenance
82. Starting with vocabulary words and then giving students a reading passage in an example
of:
a) A bottom-up approach
b) A top-down approach
c) A Pop-up approach
d) A cron-up approach
a) Hexadecimal
b) ASCII
c) ANSI
d) ANSI
84. The system software consists of two categories ____________ and Utility software.
a) Firmware software
b) Device drivers
c) Operating system
d) Freeware software
a) 128
b) 255
c) 567
d) 127
86. The computers of the _________ were not very flexible or efficient.
c) 1930s
88. Which of the following network layer is responsible to recognize that the packet
has reached its final destination?
a) Application Layer
b) Network layer
c) Transport layer
d) Link layer
89. Each time a process finishes task the operating system either allocates the recourse to a
waiting process or, if no process is waiting, _______________the flag.
a) Clear
b) Set
c) Restore
d) Store
90. In floating point notation if value of sign bit is zeros its mean that the value is __________
a) Negative
b) Positive
c) Numeric
d) Fractional
91. ______________ tag contains the information related to metadata that is not
usually displayed on the webpage.
a) <html> </html>
b) <head> </head>
c) <body> </body>
d) <p> </p>
a) Two
b) Three
c) Four
93. World Wide Web was adopted as a standard approach for linking documents over the
Internet because:
a) Volatile Memory
b) Non-Volatile Memory
c) Virtual Memory
b) Program
c) Only document
a) Head
b) Body
c) Title
d) Frame
a) Gateway
b) Hub
c) Node
d) Repeater
a) Spam filters
b) Net filters
c) Proxy filters
d) Wall filters
99. Email is less time sensitive, so the mail servers use ___________ to transfer email.
a) TCP
b) UDP
c) HTTP
d) SMTP
a) Client
b) Web server
c) Browser
d) File
b) Patterns
c) Premises
d) Protocols
102. Which of the following technology is not related to the client side working?
a) Java applets
b) JavaScript
c) PHP
d) HTML
While (i<n)?
a) F=f+n
b) F=f*n
c) F=f2n
d) F=f-n
a) Collectively
b) Individual
c) Groups
d) Algorithm
a) Time interval
106. Data were stored in memory, programs were part of the __________.
a) CPU
b) Cable
c) BUS
d) CACHE
107. Which of the following feature was incorporated in the early version of Word Wide
Web?
c) Transclusions
108. When applied to a list with n entries, the sequential search algorithm will interrogate
an average of ________ entries
a) N
b) N/2
c) 2n
d) N*n
109. __________ CPU can better cope with the ever increasing complexities.
a) More complex
b) More compatible
c) More accurate
d) Complex
110. The ______ in the state of the process must be sufficient to determine uniquely and
completely the actions required by each step.
a) Program
b) Information
c) Data
d) Instructions
a) Bit
b) Logical
c) Byte
d) Boolean