You are on page 1of 59

PROF.

HAFIZ ZAIN AKRAM


(M. Phil, Computer Science) 03216514893
Chapter - 01

1. Devices used for communicating the results of processing such as printer, monitor etc. are
known as:
(a) CPU (b)Input (c)Output device (d)Software
2. A set of instructions of statements to be carried out by the computer’s CPU so solve a particular
problem is known as a/an:
(a)Processor (b)Computer architecture
(c)ALU (d)computer program
3. Which of the following keys is used to cancel an operation?
(a)Arrow (b)Caps lock (c)Num lock (d)Esc
4. Which of the following is the first phase of SDLC?
(a)Design (b)coding (c)Analysis (d)Preliminary investigation
5. A graphic table is commonly activated by:
(a) finger (b)joystick (c)stylus (d)Trackball
6. Laser printer is an example of:
(a) non-impact (b)impact (c)inkjet (d)dot matrix
7. Collection of raw facts and figures, which are collected for specific purpose is called:
(a)information (b)data (c)object (d)input
8. The processed and refined data is referred to as:
(a) information (b)data (c)object (d)input
9. Data processing is also called:
(a) information system (b)information technology
(c)computing (d)calculating
10. An electronic device that accepts, processes data and controls other activities during
processing is called:
(a) device (b)output devices (c)computer (d)operating system
11. The data and program are stored permanently on the:
(a) RAM (b)Secondary storage (c)CPU (d)Primary Storage
12. The electronic circuits that are the part of the computer are called:
(a) Software (b)Firmware (c)Hard ware (d)Shareware
13. Which of the following is not a hardware component?
(a) Input device (b)Operating system (c)Processor (d)Secondary storage
14. Which of the following is not an input device?
(a) keyboard (b)speaker (c)mouse (d)microphone
15. Which of the following is an output device?

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
(a) keyboard (b)speaker (c)mouse (d)microphone
16. Which of the following is not an output device?
(a) monitor (b)printer (c)RAM (d)speaker
17. Which of the following is a secondary storage device?
(a) RAM (b)ROM (c)CPU (d)CD
18. Which of the following is not an input device?
(a) monitor (b)mouse (c)touchpad (d)keyboard
19. is a merge of different technologies and enterprises:
(a) digital convergence (b)IT (c)computing
(d)telecommunication
20. Which of the following is toggle key?
(a) arrow (b)caps lock (c)Num-lock (d)Esc
21. is not input device?
(a) OCR (b)printer (c)keyboard (d)scanner
22. Which of the following is used for screen clarity?
(a) resolution (b)discrete (c)LCD (d)dot pitch
23. Line printer is an example of:
(a) non-impact (b)laser (c)impact (d)inkjet
24. Softcopy is also known as:
(a) OCR (b)printer output (c)screen output (d)plotter output
25. Smallest unit of the memory is:
(a) byte (b)bit (c)character (d)word
26. Which of the following is not an output device?
(a) scanner (b)printer (c)monitor (d)speaker
27. Which of the following output devices have high quality output?
(a) CRT (b)gas plasma (c)LCD (d)all of these
28. The computer device primarily used to provide hardcopy is:
(a) CRT (b)line printer (c)card reader (d)computer
console
29. Which one of the following can produce the final product of machine processing in a form
usable by human?
(a) storage (b)output device (c)control (d)input device
30. Which device can draw continuous lines:
(a) daisy wheel (b)plotter (c)chain printer (d)impact printer
31. Which of the following is used for soft copy output?

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
(a)memory (b)printer (c)speaker (d)both a & c
32. is example of line printer:
(a) daisy wheel (b)plotter (c)chain printer (d)impact printer
33. Which of the following is impact printer?
(a) daisy wheel (b)electrostatic (c)laser printer (d)laser
34. Hardcopy is also known as:
(a) OCR (b)printed output (c)screen output (d)plotter output
35. Types of printers are:
(a)2 (b)3 (c)4 (d)5
36. is source data entry device:
(a) OCR (b)Printer (c)keyboard (d)mouse
37. is indirect data entry device:
(a) OCR (b)printer (c)keyboard (d)mouse
38. is direct data entry device:
(a) barcode reader (b)printer (c)keyboard (d)mouse
39. is used to read special characters:
(a) OCR (b)MCIR (c)OMR (d)printer
40. Two types of display devices are displays.
(a)Inkjet and dot matrix (b)Flat panel and OCR
(c)Impact and non-impact (d)none of these
41. The circuit board that connects the monitor to computer is called:
(a) video adapter card (b)monitor link (c)monitor adapter (d)none of these
42. Printers and monitors are common example of:
(a) input unit (b)output unit (c)storage unit (d)processing unit
43. Which of the following is the largest unit of data?
(a) bit (b)byte (c)word (d)nibble
44. The smallest unit of information in the computer is:
(a) nibble (b)word (c)bit (d)byte
45. How many types of graphic cards normally exist in market?
(a)2 (b)4 (c)3 (d)7
46. 1MB is equal to
(a) 1024KB (b)1024Kbit (c)2024B (d)none of these
47. SDLC stand for:
(a)System Development life cycle (b)System life Cycle
(c)Software development life cycle (d)a & c both

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
48. Which of the key used to delete a character of the left side of the curser?
(a) backspace (b)shift +delete (c)delete (d)none of these
49. Which of the following device is used for reading vertical lines?
(a) MICR (b)Barcode Reader (c)MAR (d)All of these
50. MICR is used for reading:
(a) Vertical Line (b)Magnetic Ink (c)Prices (d)All of these
51. How many keys is standard keyboard?
(a)101-105 (b)110-114 (c)91-94 (d)101-104
52. BIT stand for:
(a) Binary Integer (b)Binary digit (c)Binary interval (d)None of these
53. Which of the key used to delete a character of the right side of the curser?
(a) delete (b)shift + delete (c)backspace (d)none of these
54. An input device, which is used for playing computer games:
(a) light pen (b)joy stick (c)scanner (d)mouse
55. The microphone converts the sound into:
(a)mechanical signals (b)electrical signals
(c)computer file (d)software
56. The printer which can print one complete line at a time is:
(a)daisy wheel printer (b)dot matrix printer
(c)laser printer (d)line printer
57. The name for screen clarity:
(a) Resolution (b)Pixel (c)Discrete (d)LCD
58. Another word for printer:
(a) monochrome (b)pixel (c)cursor (d)none of these
59. A device used for optical character recognition is a:
(a) MICR reader (b)cursor (c)pen (d)wand reader
60. Imaging uses what device to input data:
(a) scanner (b)barcode reader (c)icon (d)tablet
61. An inkjet printer is an example of:
(a) COM printer (b)laser printer (c)non-impact printer (d)impact

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter - 02

1. When ARPANET evolved into several other networks, it was used for:
(a)Business (b)Scientific (c)Education (d)Military
2. In which year internet was grown rapidly:
(a)1980 (b)1960 (c)1990 (d)1989
3. In which of the following device was used to connect similar networks:
(a)Gateway (b)Bridge (c)Router (d)Switch
4. Which protocol was used Token Passing Mechanism:
(a)Ethernet (b)ARC Net (c)TCP/IP (d)Ring
5. One or more computers connected to a hub called:
(a) system (b)node (c)Token (d)none of these
6. In which network topology if one cable break all network can destroy.
(a) Ring (b)Star (c)Bus (d)Tree
7. Which larger of OSI model does data compression:
(a) Network (b)Presentation (c)Data Link (d)both a & b
8. In a network a data receiving computer usually called:
(a)Receiver (b)Sink (c)Accepter (d)Both a & b
9. Which of the following is LAN protocol?

(a)FTP (b)ARC Net (c)TCP/IP (d)All

10. A computer in a network called:


(a) systems (b)node (c)token (d)none of these
11. Thin net is inches in diameter.
(a)0.2 (b)0.4 (c)0.5 (d)0.6
12. In which protocol the data transmission rate was increased up to 100 MB/S:
(a)Ethernet (b)TCP/IP (c)Token Ring (d)ARC Net
13. When we connect some LAN networks inside the city it becomes:
(a) short LAN (b)WAN (c)MAN (d)None of these
14. In which network model all computer have equal status:
(a) Client/Server (b)Hybrid (c)Peer-to-Peer (d)Dedicated Server
15. In which of the following is not a De Jure Standard:
(a)CCITT (b)IEEE (c)Telcorida (d)None of these
16. In which topology allows multiple device to talk at once:
(a)Star (b)Bus (c)Ring (d)Mesh
17. Which topology allows multiple devices to talk at once:
(a) CMSA/CS (b)CSMA/CD (c)CSMA/CR (d)None of these

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
18. One or more computer networks connected to a bus is called topology
(a)Ring Network (b)Tree (c)Bus (d)Star
19. Identify tee lan’s protocol:
(a) TCP/IP (b)UDP (c)Ethernet (d)FTP
20. Information technology is the combination of:
(a)Computing and Mechatronics technology
(b)Computing and communication technology
(c)Computing and mechanical technology
(d)Computing and electrical technology
21. The process of converting the digital signal into analog signal is called:
(a) Modulation (b)Demodulation (c)Digitization (d)Conversion
22. De jure means:
(a) According to Law (b)Existing facts (c)Historical event (d)By nature
23. topology uses hub as a central device:
(a) Bust (b)Star (c)Ring (d)Mash
24. Two dissimilar networks can be connected by using:
(a)Bridges (b)Repeater (c)Hub (d)Gateway
25. FDDI is a:
(a) Ring network (b)Star network (c)Mesh network (d)Bus network
26. Which is an example of De Facto Standard?
(a) ANSI (b)ISO (c)SNA (d)IEEE
27. The layer that is responsible for establishing maintaining and terminating a user connection is:
(a)Presentation (b)Application (c)Transport (d)Session
28. A connection for similar network user:
(a) Bridge (b)Gateway (c)Router (d)All of these
29. Software is perusing the internet is called:
(a) Gateway (b)EFT (c)Browser (d)Teleconferencing
30. Which is not a LAN topology?
(a)star (b)ring (c)bus (d)band
31. Internet is an example of?
(a) LAN (b)MAN (c)WAN (d)None of these
32. OSI model has _ layers?
(a)4 (b)5 (c)6 (d)7
33. Which of the following is not a LAN Protocol?
(a)Ethernet (b)Token Ring (c)ARC Net (d)TCP/IP

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
34. Which of the following layer does data encryption?
(a) transport (b)session (c)presentation (d)application
35. Which of the following is not a component of LAN?
(a) modem (b)cable (c)Gateway (d)Bridge
36. Which is not a communication device?
(a)hub (b)NIC (c)Router (d)LAN
37. Which of the following is communication device?
(a) Computer (b)NIC (c)WWW (d)LAN
38. Which of the following is smallest network?
(a)WAN (b)MAN (c)Peer to Peer (d)LAN
39. Which of the following is network interface card?

(a) HUB (b)NIC (c)Router (d)LAN

40. When we want to take some kind of data from computer through internet is called:
(a)Uploading (b)Downloading (c)Transferring (d)None of these
41. Protocol 802 defines standard for which:
(a)Application & Presentation (b)Physical & Data Link
(c)Transport & Network (d)Network & Data Link
42. Which technique is used by Ethernet:
(a) CSMA/CD (b)CASM (c)CMSD (d)CMMD/CA
43. Lab network is example of:
(a) LAN (b)WAN (c)CAN (d)MAN
44. The process of transferring a file from local computer to host computer is called:

(a) Uploading (b)Transferring (c)Downloading (d)None of these

45. How many pairs of computers can simultaneously communicate on Ethernet LAN?
(a)1 (b)2 (c)3 (d)Multiple
46. How many types of network standard are there?
(a) 2 (b)3 (c)4 (d)None of these
47. In Bus Topology a device which is used at the end of cable is called:
(a) Jumper (b)Terminator (c)Stopper (d)None of these
48. Which of the following layer comes after application layer?
(a)Network (b)Application (c)Data Link (d)None of these
49. Which of the following layer comes after transport layer?
(a) Network (b)Application (c)Data Link (d)None of these
50. Which of the following layer comes after network layer?

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
(a) Network (b)Application (c)Data Link (d)None of these
51. Computer network is the combination layer?
(a)Computing and mechatronics technology
(b)Computing and telecommunication
(c)Computing and mechanical technology
(d)Computing and electrical technology
52. A LAN is combination of:
(a) Network adapter cards (b)LAN cables
(c)LAN application software (d)all of above
53. Cabling on a linear bus topology can be extend using which of the following?
(a)Terminator (b)Barrel Connector (c)Network Card (d)Medium
Attached
54. The media access control sub layer resides in which layer?
(a) Physical (b)Data Link (c)Network (d)Transport
55. Terminal is a:
(a) Device to give power to supply to computer
(b)Point at which data enters or leaves the computer
(c)The last instruction in the program
(d)Any input/output device
56. Software to peruse the internet:
(a) Gateway (b)EFT (c)Browser (d)Teleconferencing

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter - 03

1. Which of the following is not a category of network?


(a)LAN (b)WAN (c)MAN (d)NAN
2. Analog signals are measured in:
(a) Volt (b)Hertz (c)Watts (d)digital
3. An important property of fiber optic cable is:
(a) reflection (b)refraction (c)interference (d)attenuation
4. BCD stand for:
(a) Binary coded decimal (b)Base coded decimal
(c)Byte coded decimal (d)Bidirectional coded decimal
5. The music and speed represent:
(a)image (b)text (c)numeric (d)audio
6. BCD code is a bit code:
(a)4 (b)8 (c)15 (d)32
7. Components of network are:
(a)2 (b)4 (c)5 (d)8
8. Which of the following is not a communication media?
(a)twisted pair (b)UTP (c)Microwave (d)Modem
9. Which is the correct measurement of modem’s data transfer rate?
(a) Kbps (b)Gbps (c)bps (d)Mbps
10. Which of the following single is travel in discontinuous form?
(a) microwave (b)analog (c)digital (d)satellite
11. How many types of data transmission modes:
(a)4 (b)2 (c)1 (d)3
12. How many types of serial transmission of data:
(a)1 (b)2 (c)3 (d)4
13. Controlled media is also called media:
(a) wireless (b)guided (c)unguided (d)all of them
14. How many types of modems are:
(a)1 (b)3 (c)4 (d)2
15. How many bits can send with serial hardware?
(a) 1 (b)2 (c)4 (d)many
16. Grouped data can be send by Hardware:
(a) parallel (b)serial (c)port (d)none of these
17. Technique to convert analog signal into digital is called:

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
(a) Modulation (b)De-Modulation (c)both (d)none
18. Which of the following requires line of sight:
(a) microwave (b)fiber optic (c)twisted pair (d)coaxial
19. Microware transmission, coaxial cable, fiber optic cable are example of:
(a)modems (b)communication link
(c)gateways (d)ring-network
20. Data communication requires only a:
(a) sender (b)receiver
(c)transmission medium (d)all of above
21. Sender is also called:
(a) sink (b)receiver (c)source (d)all of above
22. The is the physical path over:
(a) protocol (b)medium (c)full duplex (d)automatic
23. bps stands for?
(a) bytes per second (b)bits per second (c)binary per second (d)baud per second
24. The data transfer speed of modem is?
(a) 96 bps (b)9600 bps (c)960 bps (d)56 bps
25. External modem is connected with port?
(a) serial (b)parallel (c)both a & b (d)wire port
26. Modem stands for:
(a)modulation/mod (b)modulation/demodulation
(c)modification/de-modification (d)demodulation/modulation
27. Which of the following uses light to transfer data?
(a) twisted pair (b)coaxial (c)fiber optic (d)wire pair
28. Which of the following is commonly used in LAN?
(a) satellite (b)coaxial (c)fiber optic (d)microwave
29. Which technique does not use modulation?
(a) baseband (b)broadband (c)bandwidth (d)none of
these
30. Satellites are approximately miles above earth?
(a)23,300 (b)22,000 (c)23,2200 (d)22,300
31. Which of the following affects the quality of satellite transmission?
(a)mountains (b)light rays (c)bad weather (d)moon
32. A modem’s rating of 56K refers to its:
(a) transmission speed (b)memory size (c)modem size (d)none of these

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
33. ASCII is bit code:
(a)4 (b)8 (c)7 (d)both b & c
34. EBCDIC is bit code:
(a)4 (b)8 (c)7 (d)16
35. Unicode is bit code:
(a)4 (b)8 (c)7 (d)16
36. Which of the following coding scheme is used by IBM?
(a) Unicode (b)EBCDIC (c)BCD (d)ASCII
37. Communication between keyboard and computer involves:
(a) half duplex mode (b)full duplex mode (c)simple mode (d)simple mode
38. One lane bridge is an example of:
(a) half duplex mode (b)full duplex mode (c)simple mode (d)simple mode
39. Which of the following is an example of unbounded media?
(a) Microwave (b)fiber-optic cable (c)twisted pair (d)coaxial cable
40. Satellite transmission stations that can both send and receive messages are known as:
(a)Tran-receivers (b)receivers (c)Earth stations (d)Transmission
41. Which of the following modems does not require any cable as transmission channel to transmit
signals?
(a) external modem (b)wireless modem (c)internal modem (d)none of these
42. Bandwidth of coaxial cable wire is how many times more than twisted pair wire?
(a)2 (b)0 (c)40 (d)80
43. Digital signals is travels in the form of:
(a)on/off (b)0/1 (c)binary (d)all of them
44. Broad band technique is used in protocol
(a) FTP (b)token (c)ARC Net (d)all of them
45. Which of the following technique uses modulation?
(a) broadband (b)baseband (c)bandwidth (d)none of these
46. Which of the following transmission types uses synchronized clock?
(a) parallel (b)serial (c)synchronous (d)asynchronous
47. Which of the following transmission types does not follow synchronized clock?
(a)parallel (b)serial (c)synchronous (d) asynchronous
48. Digital signals also called?
(a) broadband (b)baseband (c)bandwidth (d)none ofthese

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
49. BIT stand for:
(a) binary integer (b)binary digit (c)binary interval (d)none of these

Chapter - 04

1. Typically, an ATM can be used to:


(a) keeping record (b)making budgets
(c)watching movies (d)none of these
2. CAT stand for:

(a) computerized axial topography (b)computer axial topology

(c)computer aided topography (d)none of these

3. Computer based weather forecasting depends on accurate collection of data form:


(a)television (b)weather stations (c)radar (d)antenna
4. Which of the following is relevant to office automation?
(a)documents management system (b)message-handing system
(c)office supports system (d)all of them
5. Which of the following is related to business?
(a)marketing (b)stock exchanges (c)banks (d)all of them
6. MICR stand for:
(a) magic in character redo (b)magic in ink character record
(c)magnetic ink character reader (d)none of these
7. Computer at homes can be used:
(a)keeping record (b)making budgets (c)watching (d)all of the above
8. CAL stand for:
(a) computer aided learning (b)computer assist learning
(c)computer added learning (d)none of the above
9. The benefit of CAD may be summed up as:
(a) accuracy (b)repeatability
(c)speed and flexibility of production (d)all of them
10. CBT stand for:
(a)computer based trade (b)computer based training
(c)certificate based training (d)none of these
11. ATM stand for:
(a)automatic trade machine (b)automated teller machine
(c)axial teller machine (d)automation teller machine

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
12. The fly by wire is used in:
(a) medical field (b)airline (c)both (d)none
13. Scanner used in bank to read check:
(a)OCR (b)OMR (c)Both (d)MICR
14. Weather forecasting system collects data from:
(a) atmosphere (b)weather stations (c)radar (d)antenna
15. Benefits of computer:
(a)accuracy (b)repeatability (c)speed (d)all of them
16. An automatic programmable machine is:
(a) robot (b)CAB (c)computer (d)none
17. Which of the following is not benefit of computer:
(a) accuracy (b)repeatability (c)expensive (d)all of them
18. In which of the following field computer is used:

(a)medical (b)education (c)designing (d)all of them

19. is a weather forecast department:


(a) SPARCO (b)PARCO (c)ACCU (d)none
20. Modern computer can perform calculation or process at high speed.
(a) per second (b)per minute (c)Nano second (d)none of these
21. Electronic banking comprises:
(a)electronic money transfer (b)processing of Cheques
(c)credit card transactions (d)all of them
22. E-Commerce involves:
(a) electronic funds transfer (b)orders management
(c)online marketing (d)all of above
23. E-Commerce involves:
(a) online transaction processing
(b)electronic data exchange
(c) inventory management and data collection system
(d) all of above
24. Robots are used perform:
(a)tasks dangerous for human beings (b)repetitive tasks
(c)task requiring high level of accuracy (d)all of above
25. Remarks RX 32 three-axis servo robot fits machine up to:
(a) 100 tons (b)200 tons (c)300 tons (d)400 tons
26. M-16iB20T robot can carry 20 kilograms and is suited to injection machines up to about:

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
(a)500 tons (b)600 tons (c)700 tons (d)800 tons
27. Which of the following is a benefit of computer?
(a)great speed and accuracy (b)reliability and consistency
(c)storage and networking (d)all of above
28. Computer aided manufacturing:
(a)brings quality improvement (b)makes manufacturing without human interaction
(c)provides easy changes in designs (d)all of above
29. Which of the following is a benefit of computer simulation?
(a)it is safer to run a simulation (b)it is economical and time controlled
(c)systems can be seen on the screen (d)all of them
30. Computers are extensively used I the hospitals to:
(a)monitor critically ill patients (b)keeps records in databases
(c)scan bodies of patients (d)all of above
31. Now a day’s computers are being used in education for:
(a)computer aided education (b)tutorials and drill and practice
(c)testing understanding of students (d)all of above
32. Microprocessor technology is used in manufacturing of:
(a) air-conditioners (b)washing machines
(c)sewing machines (d)all of above
33. The reasons for using computers are that they:
(a)work much faster (b)never get tired
(c)can do the dangerous jobs (d)all of above
34. Which of the following is not involved in E-Commerce?
(a) e-mail (b)video-conferencing
(c)electronic banking (d)none of the above
35. E-Commerce stand for:
(a) electronic commerce (b)easy commerce
(c)electricity commerce (d)none of these
36. Robots are mostly used in the field of:
(a) science (b)manufacturing (c)farming (d)education
37. The scanner used in the hospital:

(a) CAT scanner (b)image scanner (c)bar-code reader (d)OCR

38. Which of the following is a programmable machine having non mechanical movement:
(a)PC (b)Robot (c)Laptop (d)a & c

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
39. Machine that passes rays over the patient.
(a) CAT (b)CAD (c)CAM (d)All
40. A word processor can be used to:
(a)write text (b)edit text (c)print text (d)all of above

Chapter - 05

1. Which is storage device:


(a)CPU (b)Clock (c)Floppy Disk (d)Bus
2. Which one is faster:
(a)RAM (b)Cache (c)Register (d)Hard
3. CPU is an example of
(a)Software (b)A program (c)Hardware (d)Output
4. Which component is responsible for comparing the contents of two pieces of data:
(a) ALU (b)Control Unit (c)Memory (d)None
5. Data and program is not being used by computer are stored in
(a) secondary storage (b)cache (c)primary storage (d)printer
6. The set of parallel electrical lines is called?
(a)CPU (b)memory (c)I/O unit (d)Bus
7. How many categories the system buys is divided?
(a)2 (b)3 (c)4 (d)5
8. Which of the following commands is used to write data into memory?
(a)I/O Write (b)transfer ask (c)memory write (d)I/O Read
9. How many types of RAM?
(a)1 (b)2 (c)3 (d)4
10. How many types of ROM?
(a)1 (b)2 (c)3 (d)4
11. Which of the following is the smallest memory?
(a)RAM (b)CD (c)Hard Disk (d)Cache
12. What is the second name of SRAM?
(a)SRAM 2 (b)DRAM (c)Cache Memory (d)None of these
13. Which of the following command is activated when the CPU is sent the result in to the memory?
(a)Input (b)Write (c)Read (d)none of these
14. Who made the Architecture of computer?
(a)Charles Babbage (b)John Leibniz
(c)John Von Neumann (d)Pascal

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
15. Which of the following is read only memory?
(a)RAM (b)ROM (c)SRAM (d)Cache Memory
16. The step that translates instruction into individual commands is called?
(a)Fetch (b)Translate (c)Decode (d)Execute
17. The step that obtains the next instruction from memory is called:
(a)Read (b)Fetch (c)Get (d)Decode
18. The step that performs the actions given in the instructions is called:
(a)Fetch (b)Calculate (c)Decode (d)Execute
19. The temporary storage area within CPU is called:
(a) Registers (b)ROMs (c)RAM (d)HDD
20. Which register is used for arithmetic and data operations?
(a) AX (b)BX (c)CX (d)DX
21. Which register has special role in division and multiplication?
(a)AX (b)BX (c)CX (d)DX
22. When register holds the address of next instruction to be fetched for execution?
(a)MAR (b)MBR (c)IR (d)PC
23. There are types of general purpose register:
(a)Two (b)Three (c)Four (d)Eight
24. The order of stack is:
(a)FIFO (b)LIFO (c)GIGO (d)FIGO
25. The size of EAX register can be up to:
(a)4 bit (b)4kb (c)4 bytes (d)4MB
26. The size of DI, SI SP and BP stack control register is:
(a) 2 bytes (b)6 bytes (c)4 bytes (d)8 bytes
27. Which of the following is not a type of register?
(a)flag (b)segment (c)accumulator (d)math coprocessor
28. CPU places address in if memory location is to be read:
(a) MAR (b)MBR (c)Accumulator (d)PC
29. A set of instruction that run the computer are:
(a)Hardware (b)Document (c)CPUS (d)Software
30. The program that contain instruction to operate a device is called:
(a) Device Driver (b)Device Operator (c)Device lining (d)Device system
31. The address of instruction under the processor execution is contained within:
(a)Program counter (b)current instruction register
(c)memory address register (d)memory buffer register

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
32. A computer derive its basic strength form:
(a)speed (b)memory (c)accuracy (d)all of these
33. The set of all instruction provided by CPU is commonly known as:
(a)control instructions (b)instruction set
(c)instruction (d)all of them
34. When the instruction is fetched it is stored in the where the instruction is decoded:
(a)IR (b)MAR (c)PC (d)MBR
35. Register use to store data coming from the memory or going to the memory:
(a)IR (b)MAR (c)MBR (d)None of these
36. Program written in high level languages called:
(a)source program (b)object program
(c)source code (d)both a & c
37. Cells are logically organized into group of bits:
(a)8 (b)7 (c)6 (d)5
38. Program written in machine language called:
(a)source program (b)object program
(c)source code (d)both a & c
39. is used to convert assembly language to machine language.
(a)interpreter (b)compiler (c)de assembler (d)assembler
40. Which of the following is used to convert source code into object code?
(a)interpreter (b)compiler (c)assembler (d)both a & b
41. Which of the following is used to convert source code into object code as a whole?
(a)interpreter (b)compiler (c)assembler (d)both a & b
42. Which of the following is used to convert source code line by line?
(a) interpreter (b)compiler (c)assembler (d)both a & b
43. The arithmetic/logic unit perform the following actions:
(a)Control computer operations
(b) Perform arithmetic functions such as addition and subtraction etc.
(c)Perform logical comparisons such as equal, greater than, less than
(d)both b & c
Chapter - 06

1. Most computer crimes are committed by:


(a) Hackers
(b) International Spices
(c) Highly trained computer consultants
(d) company insiders who have no extraordinary technical ingenuity
PIASS College Kasur
PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
2. Types of software that can be freely distributed without violating copyright laws are called:
(a)shareware (b)Public domain (c)copy protected (d)a & b
3. A virus that replicated itself is called a:
(a) bug (b)worm (c)Vaccine (d)Bomb
4. Another name for anti-virus is:
(a) Vaccine (b)Worm (c) Trojan Horse (d) DES
5. Security protection for personal computers include:
(a)Internal components (b)Locks and cable
(b)software (d)all of above
6. Security is a system of protection that protects a computer system form:
(a)international damage (b)accidental damage
(c)unauthorized access (d)all of above
7. How many methods have been made to prevent unauthorized access?
(a)6 (b)5 (c)4 (d)3
8. The method in which unauthorized access is protected by giving a key, badge, or a plastic card
to authorized users is called:
(a) what you have (b)what you know (c)what you do (d)what you are
9. The method in which authorized persons are provided a proper user-id and a password is
called:
(a) what you have (b)what you know (c)what you do (d)what you are
10. The method in which authorized users have to sign a document before getting access to a
computer system is called:
(a) what you have (b)what you know (c)what you do (d)what you are
11. The method in which biological means as fingerprinting or voice recognition is used to identify
a user is called:
(a)what you have (b)what you know (c)what you do (d)what you are
12. Biometric method include:
(a) fingerprinting (b)voice recognition
(c)eye retinal recognition (d)all of above

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
13. The measurement of fingerprints and retinal scans used for security access is called:
(a) biometrics (b)biochemistry
(c)computer security (d)smart weapon machinery
14. Following is not biometric method:
(a) Badge (b) Retina (c) Face (d) Fingerprint
15. The most serious loss is:
(a) Loss of hardware (b) Loss of data (c) Loss of software (d) Loss of network
16. An arrangement of instructions given to a computer is called:
(a) Processing (b) Program (c) Manipulating data (d) Inputting data
17. Computer Vitus is simply a:

(a) Kind of Disease (b) Set of computer instructions

(b) Type of bacteria (c) Hardware component

18. A secret code consisting of words, numbers or combination of both is called:


(a) Biometrics (b) Signature (c) Password (d) Security
19. Which one is harmful for computer:
(a) Antivirus (b) Virus (c) Freeware (d) Shareware

20. An Additional or spare copy of data store on storage media is called:

(a) Backup of data (b) Copying of data (c) Moving of data (d) Additional data

21. The right to use the software on the computing is called:

(a) Software copyright (b) Site license (c) Software piracy (d) Intellectual property right

22. The right of a person to keep his personal information away from others is called:

(a) Privacy (b) Private (c) Secrecy (d) Right


23. A set of illegal instructions inserted into a legitimate computer program is called:

(a) Trapdoor (b) Trojan horse (c) Worm (d) Bomb

24. A person who gain illegal access to a computer system is called:

(a) Hacker (b) Network controller(c) Computer operator (d)Authorized person

25. Another name for free software is:

(a) Encrypted software (b) Copy protected software (c) Public domain software (d) Shareware

26. A virus program is usually hidden in:

(a) The operating system only

(b) An application program

(c) The disk drives

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
(d) The operating system or application programs

27. Types of software that can be freely distributed:

(a) Shareware (b) Public domain (c) Copy protected (d) a and b

28. McAfee is an example of:

(a) Virus (b) Antivirus (c) Hacker (d) Worm

29. Trojan horse is type of:

(a) Antivirus (b) Virus (c) Software (d) Horse

30. Which of the following is not a cause of virus?

(a) Email (b) Network (c) Pirated software (d) Logic bomb

31. How is virus reaches from one computer to another?

(a) Data is exchanged between computers (b) Exchange of display screen

(c) Exchange of keyboard (d) Exchange of printer

32. Which of the following is harmful to computers?

(a) Antivirus (b) Virus (c) Shareware (d) Freeware

33. Which of the following is not a virus?

(a) Trojan horse (b) Logic bomb (c) MacAfee (d) Red loaf

34. Which of the following is not an antivirus?

(a) Red loaf (b) Norton (c) Dr. Solmon (d) McAfee

35. Which of the following is computer virus?

(a) Chernobyl (b) Logic bomb (c) Red loaf (d) All

36. The virus which delete MS office files and disk partition information is called:

(a) Boot sector (b) Chernobyl (c) Logic bomb (d)Trojan horse

37. Which of the following virus executes when starting the computer?

(a) Macro (b) File infector (c) Boot sector (d) Salami shaving

38. The extension of an executable file is:

(a) .xls (b) .doc (c) .ext (d) .exe

39. Which malicious program is activated when a specific set of condition are met?

(a) Trojan horse (b) Virus (c) Worm (d) Logic bomb

40. Format C is an example of:

(a) Trojan horse (b) Chernobyl (c) Boot sector (d) Logic bomb

41. Making illegal copies of copyrighted software is called:

(a) Software piracy (b) Software distribution (c) Software browsing (d) Software hacking

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
42. Software that is available free for a limited period is called:

(a) Freeware (b) Groupware (c) Shareware (d) Vertical

43. Information is:

(a) A marketable commodity (b) Can be stolen while leaving original behind

(c) Should be free, according to the original hacker ethic (d) All of above

44. Which is most common computer crime of these listed below:

(a) Extortion of bank funds (b) IRS database sabotage

(c) Putting people on junk mailing lists (d) Software piracy

Chapter - 07

1. Which of the following event of mouse is normally used to select on object:

(a) Left click (b) Right click (c) Double click (d) Drag

2. Which of the following mouse events is used to move items from one location to another:

(a) Left click (b) Right click (c) Double click (d) Drag

3. An operation system is a

(a) System utility (b) Application software (c) System software (d) None

4. As compared to command line OS a GUI operating system is:

(a) More efficient (b) Easier to use (c) More reliable (d) All

5. Keyboard events are the action that can performed by

(a) Mouse (b) Keyboard (c) Trackball (d) None

6. When we delete some file of folder in a window it comes into:

(a) My document (b) Window explorer (c) Recycle bin (d) None

7. Which of the following acts as a directory browser and file manager for windows:

(a) Recycle bin (b) Desktop (c) My document (d) Window explorer

8. is a set of program running in the background on a computer system and providing

an environment in which other programs can be executed.

(a) Application software (b) Operating system (c) Utility program (d) None

9. The ability of an operating system to control the activities of multiple programs at the

Same time is called:

(a) Multitasking (b) Multi-processing (c) Multi-operating (d) Multi-paging

10. Microsoft windows version 3.X is a:

(a) Fully functioning operating system (b) Icon (c) Menn (d) GUI on top of DOS

11. The “NT” in windows NT stands for:

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
(a) Not tested (b) Network terminal (c) Network technology (d) New technology

12. Interface used by windows is called:

(a) Menu driven interface (b) Command driven interface

(c) Graphical user interface (d) Prompt interface

13. Which of the following services provided by the operating system?

(a) File system management (b) Hardware management (c) User interface (d) All of these

14. A small image that represents a program, instruction or file etc. is called:

(a) Menu (b) GUI (c) Command language (d) Icon

15. Windows is operating system used to:

(a) Coordinates computer activities

(b) Access files on a computer

(c) Open and close programs on a computer

(d) All of these are correct

16. “Drag & Drop” means to select the item, hold down the mouse and:

(a) Move files from one window to another

(b) Move files from one folder to another

(c) Move text between documents

(d) All

17. Pressing and releasing the left mouse button quickly is called:

(a) Clicking (b) Dragging (c) Pointing (d) Dropping

18. The process of touching an object with mouse pointer is called:

(a) Pausing (b) Dropping (c) Pointing (d) Hovering

19. The work area on which windows, icons, menu and dialog box appear is called:

(a) Screen (b) Desktop (c) Working area (d) None

20. Software can be removed/installed through:

(a) Control panel (b) Installer (c) Debugger (d) Settings

21. Add new hardware option exists in:

(a) Main menu (b) Status bar (c) Task bar (d) Control panel

22. Devices which are automatically detected by windows are called:

(a) Plug and play devices (b) Automatic devices (c) Serial devices (d) Installed devices

23. List of documents waiting to be printed on printer is called:

(a) Print list (b) Print stack (c) Print queue (d) Print line

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
24. Files can exist in folders but folders cannot exist in:

(a) Paths (b) Files (c) Folders (d) Documents

25. Which of the following is used to manage files and folders?

(a) Control panel (b) Window accessories (c) Window explorer (d) Internet explorer

26. Which of the following is entering point in windows?

(a) My computer (b) Desktop (c) My document (d) Window explorer

27. Which of the following contains the administrative tools?

(a) Control panel (b) Start button (c) Internet explorer (d) Recycle bin

28. Which of the following is used to surf internet?

(a) Window explorer (b) Internet explorer (c) Start button (d) Control panel

29. Which of the following is used to access program installed on computer?

(a) Start button (b) Window explorer (c) Internet explorer (d) None

30. Which of the following is based on NT technology?

(a) Windows 2000 (b) Windows 98 (c) Windows 3.1 (d) Windows 95

31. Which of the following is a mouse event?

(a) Left click (b) Right click (c) Drag (d) All

32. Which of the following is a keyboard event?

(a) Key up (b) Key down (c) Both a & b (d) Neither a nor b

33. The maximum number of primary partitions that can be created on a basic disk is:

(a) 2 (b) 4 (c) 6 (d) 8

34. How many types of partitions?

(a) 2 (b) 4 (c) 6 (d) 8

35. Ctrl + Alt + Del is:

(a) An invalid key combination

(b) Recognized by windows only

(c) Used to close the active window

(d) Both a & c

36. Windows 2000 is a:

(a) Multi-user operating system

(b) Multiprocessing operating system

(c) Multitasking operating system

(d) All

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter - 08

1. Which one is an editor?

(a) MS-Word (b) Word pad (c) Note pad (d) All

2. In case of mode the newly entered text is written over the existing text:

(a) Over write (b) Cut (c) Copy (d) Paste

3. The bar that contains the group of commands is called?

(a) Toolbar (b) Status bar (c) Title bar (d) None of these

4. The change of writing style to text is called ?

(a) Font size (b) Font style (c) Font color (d) None of these

5. The bar which contains the name of active application is known as?

(a) Menu bar (b) Standard bar (c) Formatting bar (d) Title bar

6. Which of the following is word processor?

(a) Adobe acrobat (b) Photo express (c) MS Excel (d) MS Word

7. How many click to select a paragraph?

(a) 1 (b) 3 (c) 4 (d) 2

8. Which of the following feature enable you to reverse the changes you have made to the document?

(a) WYSIWYG (b) Redo (c) Undo (d) GUI

9. The ruler is used to set the?

(a) Alignment of paragraph (b) Margins of paragraph

(c) Indent of paragraph (d) Paragraph spacing

10. Which of the following menu contains the “Page Setup” command?

(a) File (b) Format (c) View (d) Edit

11. Which of the following toolbar can be used to launch the Word Art?

(a) Status bar (b) Ruler (c) Standard toolbar (d) Drawing toolbar

12. Which of the following menu contain the ‘Print’ command used to print the document on printer?

(a) File (b) Format (c) Insert (d) View

13. Clipboard stores:

(a) Entered text (b) Copied text (c) Deleted text (d)
Repeated text

14. Pressing the Ins key will:

(a) Insert a character into the document

(b) Toggle between undo and redo

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
(c) Toggle between insertion and overtype method

(d) To insert image in document

15. A set of buttons that invoke commands in a word processing document is called:

(a) Menu (b) Button list (c) Dialog (d) Toolbar

16. The term that defines the size and style of a typeface is:

(a) Point (b) Font (c) Character (d) Size

17. A font that is embellished with fine lines at the end of each character is called:

(a) Decorated (b) French (c) Serif (d) Sans-serif

18. A font that is not embellished with fine lines at the end of each character is called:

(a) American (b) European (c) Serif (d) Sans-serif

19. A special part of memory to temporarily hold information for later use is called:

(a) ROM (b) Clipboard (c) Desktop (d) CRAMS

20. The command can be used to move text from one document to another:

(a) Replace (b) Edit (c) Format (d) Cut and paste

21. The general term that refers to the setting of margins, tab positions, text justification, vertical and

Horizontal centering and line spacing is:

(a) Tool (b) Layout (c) Format (d) Setup

22. Times New Roman is an example of:

(a) Serif font (b) Sans serif font (c) Three dimensional font (d) Boldface font

23. The ability to show the particular page number of each page in a word processing document is called:

(a) Pagination (b) Numeric analysis (c) Page setup (d) page breaking

24. The sizes of character to be printed are measured by:

(a) Inches (b) Points (c) Weight (d) Degrees

25. Paragraph formats include:

(a) Tab (b) Alignment (c) Indentations (d) All

26. Which of the following is an example of a font style?

(a) Bold (b) 12 pt (c) Helvetica (d) All

27. Font effects include:

(a) Strike through (b) Shadow (c) Outline (d) All

28. Which of the following keyboard shortcut is used to change the case?

(a) CTRL + F3 (b) Shift + F3 (c) ALT + F3 (d) CTRL + Shift + F3

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
29. Which of the following is popular full-featured word processor?

(a) MS-Word (b) Word pad (c) Note pad (d) All

30. A word processor can:

(a) Copy text (b) Insert text (c) Find and replace text (d) All

31. Word processing programs are used to create:

(a) Reports (b) Memos and letters (c) Envelops and labels (d) All

32. Word processing includes the process of:

(a) Entering text (b) Editing text (c) Formatting text (d) All

33. Most modern word processors allow users to control the formats of:

(a) Individual characters (b) Paragraphs (c) Complete document (d) All

34. The tool used to find a similar or alternative word in a document is called:

(a) Finder (b) Thesaurus (c) Dictionary (d) Style checker

35. The symbol that shows where the next character will be typed is called:

(a) Mouse symbol (b) Character typing locator (c) Insertion point (d) Scroll

36. The shape of the insertion point symbol is:

(a) Arrow (b) Vertical line (c) Horizontal line (d) Large circle

37. When starting word, the default document window name is:

(a) Document 1 (b) File 1 (c) WPD 1 (d) Word 1

38. To edit text in a document, you may use the:

(a) Delete key (b) Backspace key (c) Cut and paste feature (d) All

39. The extension of MS-Word file is:

(a) .wrd (b) .xls (c) .jpg (d) .doc

40. The process of moving up or down in a word processing document is called:

(a) Line movement (b) Word wrap (c) Pull down (d) Scrolling

41. In MS Word, the data that is being copied or moved is:

(a) Temporary stored in recycle bin

(b) Permanently stored in recycle bin

(c) Temporary stored in clipboard

(d) Permanently stored in clipboard

42. How many scroll bars present in MS-Word?

(a) 2 (b) 3 (c) 4 (d) 5

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter - 09

1. Which of the following is not spreadsheet software?

(a) Lotus 123 (b) MS-Excel (c) MS-Word (d) None of these

2. Which of the following is a spreadsheet?

(a) MS Word (b) MS Excel (c) Lotus 123 (d) Both b & c

3. Which of the following cell addresses is correct?

(a) Z2 (b) AZ3 (c) 2Z (d) Both (a) & (b)

4. In excel a formula begins with:

(a) ! (b) ? (c) = (d) Capital letter

5. The vertical dimension of spreadsheet is called:

(a) Field (b) Record (c) Row (d) Column

6. The horizontal dimension of spreadsheet is called:

(a) Field (b) Record (c) Row (d) Column

7. Which of the following is an absolute address:

(a) A1 (b) A1$ (c) A$1$ (d) none of these

8. In Excel which is correct cell address:

(a) AA (b) 25 (c) 3B (d) C5

9. Formula can only be applied on:

(a) Values (b) Labels (c) Unmerged cells (d) Title

10. Which function is used to find square root of 25:

(a) =squareroot(25) (b) =square(25) (c) sqrt(25) (d) None of them

11. Intersection point of row and column is called:

(a) Row (b) Workbook (c) Cell (d) None of them

12. Collection of worksheets called:

(a) Workbook (b) Worksheet (c) Spreadsheet (d) Note sheet

13. Which of the following represents valid range in excel?

(a) C1:C3 (b) C1,C2,C3 (c) =C1+C2+C3 (d) C1 to C3

14. Which of the following is an absolute cell reference?

(a) B$3 (b) $B3 (c) B3 (d) $B$3

15. Which one of the following is a formula that equates to 6?

(a) 9-2*3+4 (b) 1+2*3-8/2 (c) 8-2*3+8/2 (d) 2+2*3-4/2

16. Which of the following function used to display current date:

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
(a) Date() (b) Day() (c) Time() (d) Today()

17. A cell at second column and 15 rows has a cell address?

(a) A15 (b) B15 (c) C15 (d) D15

18. The current selected cell where data can be entered or edited is called?

(a) Present cell (b) Active cell (c) Passive cell (d) Idle cell

19. In a worksheet, a bold rectangle border indicates (n)?

(a) Present cell (b) Active cell (c) Passive cell (d) Idle cell

20. Which of the following is not a feature of spreadsheet program?

(a) Rows and column (b) Formula (c) WordArt (d) None of these

21. A cell of worksheet which is not active is called?

(a) Active cell (b) Idle cell (c) Passive cell (d) Present cell

22. Each number format consists of part?

(a) 2 (b) 3 (c) 4 (d) 5

23. The actual working area in excel:

(a) Workbook (b) Worksheet (c) Spreadsheet (d) Note sheet

24. The default number format assigned to a cell is the?

(a) Currency (b) Number (c) Text (d) General

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter - 10

1. IP address consists of bits:

(a) 8 (b) 16 (c) 32 (d) 64

2. World wide web was established in:

(a) 1958 (b) 1989 (c) 1985 (d) 1998

3. How many groups are present in IP address?

(a) 2 (b) 3 (c) 4 (d) 5

4. Which of the following represents URL?

(a) Ali123@gmail.com (b) Google (c) http://www.google.com (d) All

5. Which of the following is used to find information worldwide web?

(a) Web browser (b) Search engine (c) Server (d) Web site

6. A computer can be linked to the internet through:

(a) Phone line modem (b) DSL (c) Cable modem (d) All

7. HTML stands for:

(a) Hyper text million language

(b) Hyper text markup language

(c) Higher text markup language

(d) None

8. URL stands for?

(a) Universal resource locator (b) Uniform resource locator

(c) Uniform research locator (d) Uniform resource link

9. Which of the following is an e-mail client?

(a) Outlook express (b) Internet explorer (c) Google (d) None of these

10. The human readable names of server internet are called:

(a) Domain name (b) IP names (c) www identities (d) Server identities

11. NNTP stands for:

(a) Network new transfer protocol

(b) Network news transfer protocol

(c) Network news technology protocol

(d) News network transfer protocol

12. Protocol used for E-Mail attachment is:

(a) DHCP (b) HTTP (c) FTP (d) MIME

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
13. A collection of millions of computers interlink to one another is called:

(a) Internet (b) Extranet (c) Intranet (d) Group

14. Search information on the world wide web is called:

(a) Finding (b) Exploring (c) Browsing (d) Searching

15. A web page is written in:

(a) SQL (b) HTML (c) TCP/IPS (d) HTTP

16. Which is the top level name:

(a) com (b) http (c) URL (d) HTML

17. Discussion group to exchange information like science and technology is called:

(a) Chatting (b) News group (c) E-Commerce (d) Web group

18. Who owns the internet?

(a) USA government (b) ISO (c) Google (d) None of these

19. Which of the following specifies the correct format of IP address:

(a) 216.200.1.43 (b) 191.162.123.1234 (c) 261.17 (d) 67234

20. Domain for state web sites

(a) .edu (b) .org (c) .gov (d) .bus

21. A collection of related web pages is called:

(a) website (b) web link (c) web publishing (d) web hosting

22. Who is responsible for security of online data:

(a) Internet service provider (b) Lan Administrator

(c) User (d) Organization obtaining the data

23. Which is the top level name:

(a) com (b) http (c) URL (d) HTML

24. Web pages are connected to each other using:

(a) Hyperlinks (b) http (c) Interlink (d) Multimedia

25. Which of the following service provided by internet:

(a) E-Mail (b) FTP (c) WWW (d) All

26. How many types of addressing schemes?

(a) 2 (b) 4 (c) 6 (d) 8

27. Which of the following is not a leading search engine:

(a) Google (b) Netscape navigator (c) Yahoo (d) Excite

28. Which of the following is an email client:

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
(a) Google (b) Internet explorer (c) Outlook express (d) None

29. Which of the following protocol is used to access web pages on world wide web:

(a) TCP/IP (b) Gopher (c) HTTP (d) HTML

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer
SHORT Science)
QUESTIONS 03216514893
& ANSWERS

Chapter#01 ( Basics of Information Technology)


1: Differentiate between data and information?
Data is raw facts and figures, while information is processed data. Data cannot be used for making
decisions, while information can be used for making decision. Data is used as input in computer,
while information is the output of the computer.
2: Define feasibility study?
We have to see the financial, political and time frame viabilities to go ahead for system. Some
social and technical constraint are also considered.
3: What is data processing?
The process of converting data into information is called data processing. Data is the input and
information is the output. It is also known as computing.
4: Defined Global Village?
Global Village means the world seen as a community in people are connected by computer.
5: Define digital convergence?
the electronic merging of different organizations, industries, and institutions to exchange
information between them is called digital convergence.
6: What is Computer Animation?
it is a process to create moving images using computers. Like this to create cartoon movies and
3d movies by using computer.
7: Define multimedia and hypermedia?
Hypermedia is a process of creating links to files that contain audio, video and text. Multimedia is
the use of several different media to convey information in the form of text, audio, video.
8: Define computer?
A computer is an electronic machine that takes data as an input from user, perform different
operation on it and convert it into useful information.
9: Differentiate between hardware and software?
Hardware are physical parts of a computer, while the software is the set of instruction given to
computer to solve a problem. We can touch hardware but we cannot touch software.
10: Define application software?
a program or asset of program that are specially designed to perform a specific task or to solve a
specific problem is called application software. It is also called software package.
11: Defined Package Software?
Package software is type of application software that is developed for sale to the general public. It
facilitates the people to perform day to day activities. Word and Excel are example of it.
12: What is meant by direct and indirect input?
In direct input, data is entered directly into the computer from the source. For example,
information printed on the computer is directly enter to the computer through the scanner. In
indirect input, data is entered into the computer after intermediate handling. The data entered into
the computer through keyboard and mouse are indirect input.
13: What are input devices?
That devices which is used to insert data into computer is called input devices. There are many
devices are used to insert data. Mouse, Keboard, Camera, Scanner are example of input devices.
14. What is the QWERTY?
The standard keyboard is also called QWERTY keyboard. This is because the first six leftmost
keys on the top row of the alphabets are Q,W,E,R,T, and Y.

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
15: What is pointing devices and name its types?
pointing devices are input devices which are used to control the movement of a cursor on a
computer screen, pointing devices can select anything on the using devices such as a mouse
trackball, touchpad. These pointing devices also called input devices.
16: How does the mouse work?
The mouse is moved over a flat surface to control the movement of pointer on the screen. As the
user moves the moves, the pointer on the screen also moves. A mouse contains one wheel and 2
or 3 buttons. These buttons can be clicked or double-clicked to performs the different task. For
example, aprogram or folder is opened by double-clicked the left button of the mouse.
17. Explain Track Ball?
Track Ball is an input devices that is mostly used in notebook instead of a mouse. By moving
figures on ball, pointer can be moved. Whole devices is not moved. Track ball requires less space.
18: What is pointing stick?
the pointing stick is the pressure sensitive pointing device. It looks like a pencil eraser. It exists
between the keys of keyboard It is used to control the movement of pointer on the screen. The
pointer in the screen moves in the direction in which the pointing stick is pushed. A pointing stick
is used normally in the laptop or notebook computers.
19: What is touch screen?
A touch screen is a video display screen that is sensitized to receive input from simply touching
our fingers onto it. It is covered with a plastic layer, behind which are invisible beam of infrared
light.
20: How does barcode reader reads barcodes?
A barcode reader is an optical scanning device. It is also called bar code scanner. It is used to
reading or decoding barcode printed on the products. It uses laser beams to read the barcode and
translates it into digital signals. These signals are then sent to the computer for further processing.
21: What is the use of MICR device?
MICR is the special scanner. It reads the characters printed with magnetic ink and converts them
into digital signals. These signals are then entered into the computer for further processing. MICR
devices are normally used in banks for processing Cheques.
22: Define OMR.
Optical Mark recognition is the process of reading information that people mark on serveys, tests
and other paper documents. OMR is used to read multiple choice examination papers in the form
of shaded areas.
23: Define OCR?
OCR is an input devices used to read a printed text. OCR scans text optically character by
character, converts them into readable code.
24: What is magnetic strip card?
A magnetic strip card has a strip of magnetically encoded data on its back. They are used for
personal identification during driving, in the store, at public place etc.
25: Write a note on smart card?
Smart card is a magnetic stripe card. It is similar to credit card. It contains microprocessor chip.
Card is inserted into card reader. Then card reader reads information. SIM and ATM are example
of smart card.
26: List two types of video capture card.
Films and videos images from VCR or camcorder are converted to digital form with the help of
special digitizing card (called video-capture card). It has two types:
1. Frame grabber video card 2. Full motion video card
27: What is video adapter?
To display graphics, a display screen must have a video display adapter attached with the
computer. It is known as a video graphics card and is a circuit board that determines the

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
resolution, number of colors, and speed with which image appear on the display screen.
28: What is digital camera?
A digital camera is an input device that takes Pictures from environment and store the images as
data on a memory card instead of printing it to film. Many digital cameras are capable of
recording video in addition to taking photos.
29: Write two differences between soft copy and hard copy?
Soft Copy: It refers to data that is shown on display screen or is in audio or voice form. This kind
of output is not tangible; it cannot be touched.
Hard Copy: It refers to printed out. The principal examples are printouts, whether text or graphics
from printers, plotters etc.
Q30: What is display screen?
Display screen is an output device that display tec, graphics and video. It is used to display
softcopy. There are different types of display screens.
31: Define pixel?
A pixel is represented by a dot on a computer monitor display screen. The term “pixel’ is actually
short for “picture element”.
32: What is resolution?
Resolution is the number of pixels used to make up an image. High resolution will make your
content look sharper and more detailed.
33: Define SVGA?
Super video graphics array, support 256 colors at higher resolution than VGA. It has two graphics
mode: 800*600 pixels and 1024*768 pixels.
34: What is the printer?
The printer is most commonly used output device. It is used tom print the output on the paper the
output printed on the paper is called hardcopy. The hardcopy is also called the printout. The
printout resolution is measured in dots per inch (dpi).
35: How is printer resolution measure?
Printer resolution is measure in DPI (dot per inch). Typically, DPI is the measure of the numberof
dots and that can be placed in a line across one w inch, or 2.54 centimeters.
36: List different types of printer?
Impact Printer: Dot matrix printer, daisy wheel printer, line printer
Non Impact printer: Laser printer, inject printer, thermal printer.
37: How daisy wheel printer does work?
Daisy wheel printer works similar to the typewriter. It has printer wheel with a series of petals.
This wheel is called daisy wheel. Each petal of daisy wheel contains a character at its end.
38: What is plotter?
A plotter is an output device. It is used to produce high quality graphics in many colors and used
for specialized applications i.e. architectural drawing, maps, graphs and charts. Plotters are of two
basic kinds: 1. Flatbed plotter 2. Drum plotter.
39: What is Microphone?
Microphone is an input devices. It sends information to the computer. For example, when it is
used record music or sound the information is stored on the computer.
40: Differentiate between bit and byte?
The binary digit 1 or 0 called a bit. One bit takes one storage location in the memory. A byte is a
collection of 8-bits. One byte takes 8 storage location in memory.
41: Convert 128 bits into bytes?
Given Bits = 128
Find bytes = ?We know that,1 byte = 8 bits
Then, Bytes = 128/8 =16
43: Define system. Enlist different components of system.

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
It is a combination of some related components that interact with each other to perform a specific
task.
1. Hardware 2. Software 3. User 4. Data 5. Communication setup
44: Define feasibility study?
We have to see the financial, political and time frame viabilities to go ahead for system. Some
social and technical constraint are also considered.
45: Enlist data gathering techniques of SDLC?
The data gathering techniques are written documents, interviews, questionnaires, observation, and
sampling.
46: Why is it important to test the system before use?
The complete testing of the system is very important before use. The system must be tested to
detect and removes errors in it. The system is tested by using the sample data.
47: Compare unit testing and system testing?
Unit Testing System Testing
It is also called modular unit testing where In this testing, parts or modules are linked to test
individual modules, programs can be tested using their workability as a one system.
test (sample) data.
48: Why user training is important in SDLC?
Training of a user is very important to run the new system. It allows the user to use the new
system properly and effectively.
49: define feasibility Study?
The feasibility study is conduct to find out whether the proposed system is possible to develop
and acceptable for the organization.
50: what is preliminary plan?
A preliminary plan consist of all the finding that are prepared in the form of a written document.
it is also known as a feasibility report.

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893

IMPORTANT LONG QUESTIONS

1.What is software and discuss its different types?


2.What are pointing devices and write a note on mouse, trackball, touch pad and pointing stick?
3.What is display screen and describe the characteristics/ feature of the display screen?
4.What is printer and discuss its all types?
5.What is SDLC? Briefly describe its different phases.?

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter#02 ( Information Network)
Q1: What is Computer Network?
A Computer network is a system in which multiple computers are connected to each other to share
information and resources. Resources may be hard disk printer and software. These computers may be
connected by using wire or wireless.
Q2: what is a Workgroup? Or Collaborative computing?
A workgroup is a group of people working together on a particular task connected through a computer
network. They can share information and communicate to one another.
Q3: What is a Groupware?
Groupware is a program used for workgroup computing. It is used on a computer network. Person can use
it to share information.
Q4: Write any two Benefits of Computer Networks.
Networks are used to access shared data.
Networks are used to share different devices.
Q5: Differentiate between client and server?
Client Server
The clients are all the others computers on the A server, which is a computer that controls the
network except the server. It is a computer that network. It has the hard disks holding shared files
connects to the server to perform actions. It / databases and often shared quality printer,
provides a user interface that allows users to carry which can be used by all nodes.
out
actions.
Q6: What is terminal?
A terminal is a computer that can send and receive data from server. It may include display screen,
Keyboard, and mouse.
Q7: How de jure standard is differ from de facto standard? Ans:
De-Facto Standard De-Jure Standard
De-facto means “by tradition” or “by facts”. De-jure means “according to law or
These standard are most commonly used by regulation”. The network governing body have
organizations worldwide. properly approved those standards.
E.g. ANSI, IEEE, ISO etc.
Q8:Define the term Network Topology?
A network topology is the physical layout in which nodes are connected to a network over a
communication media so that they can share data and resources among each other.
Q9: What is the Bus Topology?
The bus topology is also called line topology. It is a network setup in which each computer and network
devices is connected to a single cable that is called the backbone or bus. It is the simplest of topologies
but suitable only for small networks.
Q10: Name basic type of network topologies.
Bus Star, Tree, Ring and Mesh Topologies.
Q11: Define ring topology?
In ring topology, computers are connected in a ring shape. In this network, every device has exactly two
neighbors for communication purposes. All messages travel through a ring in the same direction
effectively either “clockwise” or “counter clock wise”
Q12 What is a Bridge? Where is it used?
A bridge is a network devices that connects multiple LANS. A bridge connects the different components

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
so that they appear as parts of a single network.
Q13:What are gateways?
Gateways is a device that connects two or more networks with different protocols.
Q14: What is a bridge? Where is it used?
A bridge is a network devices that connects multiple LANs. A bridge connects the different components
so that they appear as parts of a single network.
Q15: Distinguish between LAN and WAN?Ans:
LAN WAN
LAN (local area network) is a computer network WAN (wide area network) a computer network
covering a smallgeographic area. cover a broadarea.
High speed (1000 mbps). Less speed (150 mbps).
Very few errors occur in LAN. Lots of errors occur in WAN.
A LAN is very cheap, because its transmission A WAN is very costly because its transmission
media is very cheap. media is very costly.

Q16: What is network protocol?


Network protocols are the rules to exchange data between two devices. Protocol define how computer
receives and transmit data over the network. These protocols are defined in network software’s.
Q17: What is meant by Ethernet?
Ethernet is the most commonly used LAN Protocol. It uses a high speed network cable and bus topology.
It is inexpensive and easy to use. All computer in Ethernet use same cable to send and receive data.
Q18: Define the term token in topology?
It is closely associated with IBM, works on the concept of a ring network topology and a token (a kind of
electronic signal). The method of controlling access to the shared network cable is called token passing.
Q19: What is ARCnet?
(Attached Resources Computer Network)
The ARCnet has both a topology and networking technology all its own. It uses either twisted pair wire or
coaxial cable, and the star topology is informed with hubs attached to the network. The original ARCnet
protocol was very slow, but it became popular because it was inexpensive, reliable and easy to setup and
to expand.
Q20:Dscribe ISDN.
ISDN or integrated Services Digital Network is a circuit-switched telephone network system that
transmits both data and voice over a digital line.
Q21: Describe DSL?
DSL stands for “Digital Subscriber Line”. It allows telephones lines to transmite data at high speed.
Q22 :What is CSMA/CD?
it stands for “Carrier Sense Multiple Access/ Collision Detect”. It is an Ethernet LAN protocol that is
used to detect collision on the network.
Q23: Define CSMA/CR?
CSMA/CR stands for Carrier Sense Multiple Access / Collision Resolution. This method allows multiple
nodes to talk at the same time. A protocol is used to determinethe priority of a node.
Q24: Describe the OSI model. List seven layers of the OSI model?
OSI model stands for open system interconnection is a reference model that describes how information
from a software application in one computer moves through a physical medium to the software
application in another computer. OSI consists of seven layers.
Application layer

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Presentation layer
Session layer
Transport layer
Nework layer
Data link layer
Physical layer
Q25: Write the purpose of application layer?
It provides network services to user applications. It is responsible for exchanging information between
programs running on machine, such as an e-mail.
Q26: What is the function of Presentation layer of the OSI model?
The Presentation layer of the OSI model performs data transformations to provide common interface for
user applications. It means that data is translated between the formats the network requires and the format
the computers of the end-users expect.
Q27: What is FTP?
FTP means "File Transfer Protocol" and refers to a group of rules that govern how computers transfer files
from one system to another over the internet.
Q28: Write two functions of session layer?
The session layer of OSI model is responsible for controlling the connections between computer mainly. It
also establishes the connection and terminates. Theconnection between local and remote applications.
Q29: How does TCP/IP transmit data?
TCP/IP stands for transmission control protocol / internet protocol. It is the protocol used by every
computer on the internet. It defines a mechanism through which every computer on the internet is
identified separately and send and receive the data onthe internet.
Q30: What is function of physical layer?
It specifies how data is processed into bits and physically transferred over medium, such as cables. It is
responsible for maintaining and activating the physicallink between systems.

IMPORTANT LONG QUESTIONS

1.Discuss different networks models?


2.What is network topology? And discuss its all types?
3.Write a note on LAN, WAN and MAN with details?
4.Explain different components of a network?
5.What is OSI model explain its all layers?

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter#03 ( Data Communication)
Q1: Define data communication?
The process of transferring data from one location to another location electrically is called data
communication. In this process, data is transmitted from one location to another by using transmission
media and communication devices.
Q2: Differentiate between sender and receiver?
A device that is used for sending messages and data over a network is called sender. It is also called
transmitter or source. The send can be a computer, mobile phone, fax machine, etc.
A device that is used for receiving messages from a sending device on the network is called receiver. It is
also called sink. The receiver can be a computer, a mobile phone, aprinter, a fax machine, etc.
Q3: What is encoder?
The encoder is the electronic device that receive data from the sender in the form of digital signals . It
covert the digital signals into a form that can be transmitted throughthe transmission medium.
Q4: What is decoder?
The decoder is an electronic device that receive data from a transmission medium. It converts encoded
signals into digital form, which is understandable by a receiver.
Q5: What is signals?
The data is transmitted from one device to another in the form of electromagnetic or light waves through a
communication medium. The electromagnetic or light waves representing data are called signals
Q6: Differentiate between analog and digital signals?Ans:
Analog Signals Digital Signals
The analog data signals are continuous electrical A digital signal use on-off electrical pulses
signal in the form of wave. This wave is called carrier in discontinuous, or discrete form. Most
wave. Two characteristics of analog carrier waves computers are digital in nature, represents
that can be altered are frequency and data as patterns of binary numbers.
amplitude.

Q7: List out types of data?


Text, Numerical data, image, audio and video are types of data.
Q8: How data is represented by the computer?
Inside if the computer data is represented in binary form. Binary mean two, binary number consists of
only two digits. These are (0) and (1). Each binary digit is represented by an electrical plus inside the
computer. The digit 1 is represented by an electrical plus. The digit 0 is represented by the absence of an
electrical plus.
Q9: What is BCD?
BCD (Binary coded decimal) is 4 bits’ code. A few early computers processed BCD numbers but were
slower and more complicated than a modern computer, whichare able to process alphanumeric data.
Q10: Define EBCDIC?
EBCDIC is stands for (extended binary coded decimal interchange code). It is an 8bit code. In this coding
system, 256 (2 `s power of 8) different characters can be represented inside of the computer. It is used by
IBM (international business machine) mainframe computers.
Q11: Define ASCII code?
ASCII (American standard code for information interchange) is a 7-bit code and makes 128 character
combinations, whereas an 8-bit can make 256 combinations. It was developed by American National
Standard Institute (ANSI) and can handle alphanumeric data.
Q12: What is universal code?
Unicode stands for Universal code. It is a 16bit code. It can represent 65536 ( 2 power of 16=65536)
characters or symbols. It is developed by following the ASCII coding scheme. The first 256 codes is

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Unicode are identical to the 256 codes used by the ASCII system.
Q13: Difference between simplex and half duplex mode? Ans:
Simplex Half duplex
Simplex is a mode in which data flows inone direction In half duplex transmission data can be sent
only. and received in both directions, but not at the
same time.
Q14: Define Full Duplex Mode with example?
Full-duplex is a type of communication in which data can flow two ways at the same time. It is faster than
other. Telephones are common example of full-duplex devices.
Q15: Differentiate between serial and parallel transmission?
In serial transmission, one bit of data is transmitted at a time. In parallel transmission, a group of bits of
data is transmitted at the same time. Parallel transmission is faster than serial transmission. Parallel
transmission is usually used inside the computer, while the serial transmission is used in computer
networks.
Q16: What is bandwidth?
In a communication medium, data is transmitted in the form of signals. The amount of data that can be
transmitted through the communication medium in a unit of time is called bandwidth. The bandwidth of
analog signals is measured in cycle per second or hertz (Hz). The bandwidth of digital signals is measured
in bits per second (bps).
Q17: Write a short note in baseband.
Baseband is a communication technique in which digital signals are placed on the transmission line
without change in modulation. Digital signals are commonly called baseband signals.
Q18: What is broadband?
Broadband is a technique to transmit lare amount of data over long distance. It can send data by
modulating each signal onto a different frequency.
Q19: Differentiate between guided and unguided medium?
Guided media: The type of communication media in which communication devices are directly
connected with each other via cable or physical media is called guided media. The data signals are
bounded to a cabling media is also called bounded media.
Unguided media: The type of communication media in which devices send and receive data signals
through air or space is called unguided media. It is also called wireless transmission media. The data
signals are not bounded to a cabling media. Therefore, unguided media is also called unbounded media.
Q20: What is Twisted Pair Cable?
The “Twisted Pair” is a special types of cable consisting four pairs of independently insulated wire. The
wires of each pair are twisted around one another, giving it the title of twisted pair.
Q21:what is coaxial cable?
Coaxial cable consists of copper wire core covered by insulating material. The insulated copper wire is
covered by copper mesh. It protects the cable from electromagnetic waves.
Q22:Briefly Describe Fiber Optic Cable?
Fiber optic cable transmits data as pulses of light through tiny tubes of glass. Data transfer rate of fiber
optic is very fast. Fiber optic cables provide higher bandwidth and can transmit large data.
Q23: How does microwaves system work?
Microwave uses light-of-sight transmission through the space. Data is transmitted and receive through the
microwave station. Microwave station are placed within the distance of 20 to 30 miles of each other. Data
is transmitted from one microwave to another. Each microwave station receive data signals from the
previous microwave station, amplifies these signals and retransmits to the next station. In this way, data is
transmitted over a large distance.
Q24: Defined communication satellite in your own words?
Communication satellite is a space station. It receives microwave signals from earther station. It amplifies

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
the signals and retransmits them back to earth.
Q25: Define Mobile Communications?
Mobile Communication is radio-based network. It transmits data to and from mobile computer. It is also
called cellular network.
Q26: Define Modem?
A modulator-demodulator or modem is a computer hardware devices that converts data from a digital
format into a format suitable for an analog transmission medium such as telephone or radio.
Q27: Defined Modulation.
The process of converting digital signal to analog signal is called modulation.
Q28: Defined Demodulation?
The process of converting analog signal to digital signal is called Demodulation.
Q29: What is external Modem?
The external modem is a unit box that can be attached to the computer system or laptop though serial or
USB port. It is usually more expensive than the internal modem.
Q30: What is an internal modem?
the internal modem is installed inside the computer as a card. In Laptops systems. The modems are
prebuilt inside the main circuit board.
.

IMPORTANT LONG QUESTIONS

1.What is data communication and explain its different components?


2.What is data transmission mode? Explain its type with example?
3.What is guided media and discuss its different types?
4.Defined unguided media? Explain its types?
5.Also write a note on its different types?

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter#04 ( Application and Uses of Computer )
Q1: How a computer can useful in marketing?
In business organizations, the computer is very useful for marketing their products. Many
marketing applications are available that can be used to provide information about the products to
the customer.
Q2: Write Down the use of Computer in stocks Exchange?
The stock brokers can do all trading activities electronically with computers. They can submit and
receive bids using computer. It reduces the cost as no paper or special building is required to
conduct these activities.
Q3: What is e-banking?
A service that allows account holder to obtain account information and manage certain banking
transactions through a computer network is called electronic banking. It is also known as online
banking.
Q4: How computer is useful in departmental store?
The computers are used in departmental stores to perform different operations quickly and
accurately. For example, the record of product for sale is maintained through the computer.
Similarly, the bills of customers are prepared through the computer.
Q5: Write the uses of computer in offices?
Some of the many uses of computers in offices work are wrting letters, sending emails, scheduling
meeting. This has extended to mobile devices, which professional now use to read and respond to
email, access business files, update social media and more.
Q6: Define document management system?
The documents management system consists of different applications that are used to prepare and
manage document. These applications are world processing, desktop publishing, reprographics,
image processing, and archival storage applications.
Q7: Define desktop publishing?
Desktop publishing is an application of document management systems (DMS). It is used to make
documents attractive with photos, graphics, and art work. It is used in publish document.
Q8: Defined reprographics?
Reprographics is a process of duplicating and reproducing multiple of documents. An example of
reprographics is book printing using high-speed printing presses.
Q9: What is the use of message handling system?
Message handling system enables to send messages or document from one locationto other location
through facsimile (fax), electronic mail (email) and voice mail etc.
Q10: What is e-commerce?
E-commerce stands for Electronic commerce . E-commerce means buying, selling and exchanging
of products, services and information by the internet.
Q11: What are the uses of Computer in industry?
Computer are used to perform several tasks in industries like managing inventory, designing
purpose, creating virtual sample products, interior designing.
Q12: What is robot?
A robot is automatic programmable machine that can move and perform mechanical tasks. It means
that a robot acts like a human being. Robots can work in an environment that is dangerous for
human beings such as opening chemical packages.
Q13: Write some applications of robot?
Ans: Robots are used in hundreds of applications from assembling and spray-painting cars, carrying
out maintenance on overhead power cables, to testing blood samples, out space experimental
programs, in artificial satellites, and radioactiveenvironments etc.
Q14: Differentiate between CAD and CAM?

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
CAD is used to design modals of the products, new car, aircraft, bridge, building and many other
things. CAM is used to control the machine tools and related machinery in the manufacturing
process of product.
Q15: What is computer simulation?
A computer simulation is a special type of computer model or program. It is used to represent the
real-world system. In other words, computer simulation is an artificial system, which represents the
working of an actual system.
Q16: How computer can be used in airline system?
Ans: Computer have become crucial to the airline industry. They are used to bok tickets, plan
flights, schedule aircraft and crew. Oversee maintenance and set fares. A computer has helped
airline operations become more efficient and flexible.
Q17:How computer can be useful in weather forecasting?
A Computerized weather forecasting system gets the data from different weather stations and
satellites etc. the system generates a forecast about the weather.
Q18: What you meant by Online Education?
Online education is a form of education where students use their home computer through the
internet. They can download educational material, books and tutorials. Some Universities provide
online lecturers.
Q19: Defined Computer Aided Learning (CAL)?
Computer aided learning is the process of using information technology to help teaching and
enhance learning process.
Q20: Define Computer Based Training or CBT?
Ans: CBT is a low cost solution for educating people. CBT programs are supplied on CD-ROM.
These programs include text, graphics and sound.
Q21: Write two uses of computers at home?
Ans: Following are the uses of computer at home:
Playing computer games.
Q22: Define the term video conferencing?
Video conferencing is meeting between two and more people located in different places. It
conducted to a computer network sing video camera and microphones. It provides an environment
for a normal meeting. It enables participants to see and hear each other at the same time as if they
are in the same room.
Q23: what is office automation?
The process of automating offices tasks with the help of computer technology is called office
automation.
Q24: what is meant by electronic banking or electronic banking?
A service that allows an account holder to obtain account information and manage certain banking
transaction through a computer network is called electronic banking or electronic banking.
Q25: write four reasons for using computer?
 Computer can work much faster than human beings.
 Computer can store a large amount of information.
 Computer can retrieve information very quickly.

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter#05 ( Computer Architecture )
Q1. What is van Neumann Computer Model?
The Von Neumann architecture was first proposed by a computer scientist John von Neumann
Program and data are stored in computer memory according to this design. The computer reads
instructions one by one and executes them.
Q2. What is computer architecture?
The way in which various components of the computer system are connected with one another is
called is called computer architecture.
Q3. What is CPU?
CPU Stands for Central Processing Unit. It is the brain of the computer. It is the most important
element of a computer system. CPU performs all operations on data according to the given
instructions.
Q4. Write down the purpose of ALU?
ALU stands for Arithmetic and Logic Unit. It can perform different arithmetic an operation on the
data. it is used to perform the basic arithmetic and logical operations such as addition, division
subtraction, multiplication and logical functions.
Q5. What is motherboard?
A motherboard is the main printed circuit board found in personal computer. It holds and allows
communication between many of the crucial electronic components of a system.
Q6. What is cache memory?
Cache memory is a very small but very fast memory than RAM. It is used to improve the
performance of a processor. CPU stores frequently used instructions and data in cache memory.
When CPU needs a specific data or program instruction, it quickly obtains from cache memory.
Q7. What is the function of control unit?
The control unit is the most important part of the CPU. It acts as a supervisor of the computer. It
controls all parts of the computer and coordinates all activities of the computer.
Q8. Why RAM is used in Computer?
The most common type of memory is called "Random Access Memory" or RAM. It holds data and
program instructions while the CPU works on them. It is also called working area of computer.
Q9. What is DRAM?
DRAM stands for Dynamic Random Access Memory. This type of RAM is used in most of the
computers. In order to maintain data in DRAM, it is refreshed with electric charge again and again;
otherwise, data stored into it can be lost. During the refreshing process, CPU has to wait for writing
and reading data to and from the DRAM. Therefore, it is a slow memory
Q10. What is SRAM?
SRAM stands for Static Random Access Memory. It does not have to be refreshed with electric
charge again and again. It is faster than DRAM because the CPU does not have to wait to access
data from SRAM. SRAM chip is more expensive than the DRAM chip.
11. Define ROM?
ROM stands for Read Only Memory. Data can be only read but cannot write on it. This type of
memory is non-volatile. The information is stored permanently in such memories during
manufacture. A ROM stores such instructions that are required to start a computer.
Q12. Why ROM called non-volatile?
ROM that is read only memory is non-volatile because all the data in it does not get erased after
shutting down the computer and restarting it.
13. Define PROM?
PROM Stands for Programmable Read-Only Memory. It is a computer memory chip that can be
programmed once after it is created. Once the PROM is programmed, the information written is
permanent and cannot be erased or deleted.
14. Write any two differences between ROM and RAM?
RAM ROM
Stasnds for Random access memory ROM stands for read Only Memory
RAM is volatile Memory ROM is non-volatile memory
PIASS College Kasur
PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
RAM stores data temporarily ROM stores Data Permanently
Q15. Define EPROM?
It stands for Erasable Programmable Read Only Memory. User can write his own instructions once.
If there is any error in writing the instructions, the error cannot be removed from the PROM.
Q16. Write activities performed by control unit?
Three activities are performed by CU:
• It fetches instructions from main memory.
• It interprets Decode the instructions.
• It controls the execution of instructions.
Q17. Define Logic unit of CPU?
Logic unit of ALU performs logical operations like comparing two is greater than, equal to, or less
than the other.
18. What is main memory?
Main memory is a very important component of computer system. It is used to store program and
data that are being executed. It is also known as area of a computer system.
Q19. What is volatile memory?
Volatile Memory means that all instructions or contents are lost when the power is turned off. RAM
is a Volatile Memory. CPU can read data from RAM and Write data to RAM.
Q20. Describe the use of control bus?
Control bus is used to send and receive special control commands from one component of computer
to another to establish coordination between them.
Q21. Define system bus?
System bus is used to connect the main components of a computer such as CPU and Main memory.
System buses are part of motherboard. Computers normally have system bus of 70-100 lines.
Q22. What is expansion bus?
Expansion bus is used to connect CPU with peripheral Devices such as mouse, keyboard printer, and
scanner, expansion buses are 16 to 64 lines wide and are mounted on motherboard.
Q23. Define data bus?
Data bus is used to transfer data between different components of the con outer. A data bus with
more lines can carry more data. A computer with 32 line data bus can transfer 32 bits of data.
Q24. What is bus interconnection.
A computer system consists of CPU, main memory and I/0 units. These components have to b
connected to transfer data from one component to another. The use of buses to connect different
components is known as bus interconnection.
Q25. What is DMA?
DMA stands for Direct Memory Access. DMA scheme uses a special hardware
component, called the DMA controller. In this scheme, data transfer between input/output devices
and main memory takes place without the involvement of theCPU.
Q26. What is interrupt?
An interrupt is a signal sent by CPU to the I/O device (or sent by I/O device to CPU). Inthis scheme,
the CPU (processor) issues a command to the I/O device for input or output operation (I/O
operation). When the device gets ready, it generates an interrupt signal to the processor. On receiving
the interrupt signal, the processor suspends allother processing and performs the I/O operation.
Q27. State the purpose of CPU register?
Register is a small high-speed memory inside CPU. It is used to store data temporary. Data is stored
in registers from main memory for execution. CPU Contains a number of registers.
Q28. What is stack pointer register?
A stack pointer is a small register that stores the address of the last program request in a stack. A
stack is specialized buffer which stores data from the top down.
Q 29. List name of four segment address registers?
Following: Data segment, Extra segment, stack segment,
Q30. What is program counter?
This register holds the address of the next instructions to be fetched for execution. As soon as this
instruction is fetched, its value is incremented so that it still has the address of next instruction.
Q31. List four general purpose registers?
PIASS College Kasur
PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Following Accumulator register, Base Register, Counter register, Data Register
Q32. Define an operating system?
A set of programs running in the background on a computer system and providing an environment in
which other programs can be executed and computer system can be used efficiently.
Q33. List any four functions of operating system?
Disk management.
Memory management
Providing security
Print controlling
Q34: What is language processor?
Language processor is a translator. It is used to converts source code into machine code. Source code
is also called high level language. And machine code is also known object code. Every computer
system must have a language processor.
Q35: What is compiler?
A compiler is a program which converts the instruction of highlevel language into machine language
as a whole. The complete converts the source program into machine code.
Q36: Define assembler?
An assembler translating program that translates the instruction of assembly language into machine
language. It is mainly used to translate assembly language into machine code.
Q37: What is interpreter?
An interpreter is the software that converts high level code into machine code line by line. It
translates and executes each line into the machine code one by one.
Q38. Describe high level language?
A type of language that is close to the human understanding is called high level language. It is easy
to understand for the human. The English like words and sentences are used in a high level language
to instruct the computer. For example, input, print.
Q39. What you know about low level language.
The low level languages are close to the machine and far from human. Computer hardware can
easily understand a low level language than the human beings can.
Q40. Define source code and object code?
source code
Source code is written in high level language.
Source code is easy to understand
Hardware cannot directly understand
Providing security
Q41. What are ports?
A port is an interface or connection point through which peripheral devices connect to the computer.
A computer has different types of ports to connect different deices. Some commonly
used ports are USB port, HDMI port and audio port.
Q42. What is serial port and parallel port?
Serial Port is used to connect devices to the system unit. It transmits one bit at a time. VGA Cable is
example of Serial port. Parallel Port is used to connect devices that transfer many bits at a time.
Printer is example of Parallel port.
Q43. What is USB port?
USB stand for universal serial Bus. It is the most popular standard port used in PCs. The USB allows
up to 127 peripheral devices to be connected with a single connector.
Q44. What is the role of the operating system as memory management?
Memory management is an important function of an operating system. The data and program must
be loaded into the main memory for execution. Different programs and data can be loaded into the
main memory at the same time. The operating system manages and allocate memory to these
programs.
Q45. Differentiate between linker?
The linker generates the executable file of a program by linking different library files. The loader
loads the executable file into memory for executions.

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893

IMPORTANT LONG QUESTIONS

1.Discuss its different types.


2.What is RAM? Discuss its different types.
3.Explain three types of system bus in details?
4.Explain its any 4 types in details?
5.Explain any 7 functions of operating system.
6.Describe various instruction formats.
7.Explain the Fetch-Decode-Execute Cycle of CPU.
8.Explain different types of Ports.
9.Define Computer Language and discuss its types?
10.Describe Langue processors or translator. Discuss different types of language processors.

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter#06 ( Security, Copyright, and the Law )
Q1. How virus damage computer?
A computer virus can damage data or software on the computer. It can delete some or all files on the
computer system it can destroy all data by formatting hard dive. It may display a political or false message
every few times.
Q2. What is biometrics?
Biometrics is the use of fingerprints, retina, facial feature scans or other measurements, of body
characteristics.
Q3. Give three causes of virus?
Following are the causes to spread virus in computer:
• Emails
• Networks
Pirated software's
Q4. List some types of virus?
Following are List types of virus:
Chernobal virus, boot sector virus, Trajon horse virus, Redlof virus and logic bomb.
Q5. Define Pirated Software?
Pirated software is software which has been duplicated and distributed without authorization. The
unauthorized copying of software is called pirated software.
Q6. What is logic Bomb?
Logic bomb differs from other viruses. It is activated when a certain conditions are met such as when a
certain date and time occurs. Michelangelo is an important logic bomb. It destroys data on the hard
disk on March 06.
Q7. What is Redlof?
Redlof is a polymorphic virus. It is written in visual Basic Script. It relies on the Microsoft Activex
Component to execute itself. It locates Folders.htt and infects that file.
Q8. Define Chernobal Virus?
The famous Chernobal virus deletes all the Microsoft office files and also the partition information form
from disk hence causing a major loss of data.
Q9. What is backup? And list some storage devices name?
An additional copy of data or information stored on secondary storage media is called the backup Hard
drive, USB, SSD and other storage devices can be used for backup.
Q10. State the purpose of password?
The purpose of password is to protect data stored on a computer. It protects data from being lost misused
or deleted. Password can be changed only by authorized person.
Q11. Explain Data Security?
The protection of data is called data security. The data is more valuable and important than the computer
itself it should be saved in such a way that it may not be lost or damaged.
Q12. What is privacy Issue?
Privacy issues mean that an individual has the right to see the data collected about him. He also has right to
submit an application to view that data at any time.
Q13. What is Trajon horse?
Trojan horse disguises itself as useful program. It contains hidden instructions and may erase data or cause
other damage. It executes illegal, destructive instructions in the middle of a legitimate program
such as computer game.
Q14. What is intellectual property?
PIASS College Kasur
PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Intellectual property is creative work such as software, designs and artistic work intellectual property has
the right to sell it in the market.
Q15. What is meant by Encryption?
The process of converting information or data into a code
prevent unauthorized access is kwon as encryption. It is the method by which information is converted into
secret codes to protect sensitive information.
Q16. Who is hacker?
A person who gets access to a computer system illegally is called hacker. Hacker is computer experts and
uses their knowledge for negative purpose.
Q17: What is boot sector?
The first sector of a disk is called boot sector. A disk contain the operating system has special program in
its first sector.
Q18: Define Software Piracy?
The illegal duplication of copyright software is called software piracy. The software remain the property of
company that designed the software.
Q19: what is meant by Copyright?
Copyright is the branch of law. It protect the creative work from illegal use. Copyright laws ensure that
copyright materials cannot be used without getting permission from that creators.
Q20: what is Data Protection ?
A process of hiding personal data from unauthorized person is called data protection.
Q21. What is antivirus? Give Some Examples?
A type of software used to detect and remove viruses is called antivirus software. Contains information
about different viruses. It can detect viruses and remove them. Norton, Kaspersky, AVG,
360 Security are example of antivirus.
Q22. List some types of antivirus?
Norton, Kaspersky, AVG, 360 Security are example of antivirus.
Q23. What is Intellectual Property?
A creation or creative ideas of a human mind have commercial value is called intellectual property.
Q24. Define Backup?
A duplicate copy of the data taken on secondary storage is called backup of data.
Q25. Differentiate between complete and incremental backup?
Backup of all data stored on the hard disk is called complete backup. Backup of only new files and those
file that are changed since the last backup is called incremental backup.

IMPORTANT LONG QUESTIONS

1.What is Virus? Discuss types of viruses?


2.What is computer viruses and discuss causes of computer virus?
3.What is antiviruses and also give different names of antiviruses?
4.What is data security? Discuss any six ways in which security of data is violated?

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter#07 ( Windows Operating System )
Q1. What is Operating System?
A set of programs running in the background on a computer system and providing an environment in
which other programs can be executed and computer system can be used efficiently.
Q2. Describe GUI operating system? Also give two examples?
A type of user interface in which the user communicates with the operating system by using a visual
environment is called graphical user interface. It consists of windows, menus, icons and pointers.
Q3. Define Command Line Operating System?
commands with keyboard is called command line interface. The command line interface is difficult. A type
of user interface in which the user communicates with the operating system by typing because the user has
to remember commands.
Q4. Difference between Single User and Multi User Operating System?
Single User operating system allows only one user to work at a time. The multi user operating system
allows multiple uses to use the same computer at a time. The multi-user operating system requires more
power than single user operating system.
Q5. What is purpose of Recycle Bin?
Recycle Bin is a temporary storage area to keep the deleted files the files remain in recycle bin unit the user
recovers them or delete them permanently.
Q6. Define Desktop?
The on-screen work area that contains windows, icons, menus and dialog box is called desktop. It is the
entering point in windows. It is the first object that appear when windows is stared
Q7. Explain the use of windows explorer?
Windows explorer acts as a file manager in windows operating system. It is used to manage files and
folders on computer. It is an efficient way to locate and manage files on computer. It can be used to cut,
coy, paste, rename or delete a file or folder.
Q8. What is multi-processing?
Multi-processing means that it is capable of supporting and utilizing two or more microprocessors in a
computer. A big task is divided into a number of smell components, and each processor is assigned
a different component.
Q9. What is file management?
File management is a process of maintaining and organizing files in the computer. Files are the recognized
by their extension in windows. Window checks the file extension when the user opens a file. File extension
is checked to determine what action should be taken.
Q10. Define Print queue?
Print queue is a collection of all documents that are waiting for printing task. Windows maintains a Print
queue for all print jobs. Print queue can be used to restart or cancel and printing task.
Q11. Describe Control Panel?
Control panel is the place to perform system management tasks. It includes installing/uninstalling new
hardware devices. It is also used to manage system recourses through administrative tools. It can also be
used to share printers and setup date and time.
Q13. What is my documents folder?
My document is a folder that is automatically created by windows during installation. It is used for saving
documents. Many application programs like MS Word use this folder as default location for storing files.
Q14. What is multitasking?
The capability of an operating system to load multiple programs into memory at one time and to perform
two or more processes concurrently, such as printing a document while editing another is
PIASS College Kasur
PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
knows as multitasking.
Q15. What do you mean by plug and play?
Plug and play is the capability to detect and configure a device and install its device driver. Windows 200
contains a large number of device drivers. When new hardware device is attached to computer,
it detects it automatically and installs its driver if it is available.
Q16. What is the use of My Computer Folder?
My computer folder is used to provide access to the system's disk drives and other hardware. The user can
double click it to see its contents.
Q17. State the use of Partition?
A partition is a portion of physical disk that functions as though it were a physically spate disk windows
usually create two basic types of partitions, these primary partition and extended partition.
Q18. Define Extended Partition?
Extended partition is a type of partition that can be further divided into sub-partitions. The sub partitions
are known as logical partitions. It is done to use multiple operating systems. A hard disk can have only one
extended partition.
Q19. What is meant by primary Partition?
Primary partition is a type of partition that can be used a system partition. it can be crated to occupy the
entire hard disk or a portion of it.
Q20. What is the use of Disk Management Utility?
the disk management utility provide a graphical interface to view the status of different disk drives and
perform maintenance on these drives. The user can also divide the disk inro multiple partition.
Q21. What is the use of Clipboard?
The clipboard is a temporary space in the computer memory used for data holding that is being copied or
moved. The clipboard is used for storing text, graphics, or other data.
Q22. What are GUI and CLI operating system? Explain it in details?
A type of operating system that provides commands in graphical form to communicate with the computer
is called graphical user interface operating system. A type of operating system that provide a command
prompt on the computer screen for the user to communicate with the computer is called command line
interface operating system.
Q23. What is print queue?
When multiple document are sent to the printer for printing, they are added in a queue in an order in which
they are sent to the printer. The list of document that are waiting for printing on the printer is called print
queue.
Q24. Define file management?
A process of maintain and organizing files and folders in the computer is called file management.
Q25. What is internet explorer?
Internet explorer is a web browser. It is a part of the Microsoft windows operating system. It is used to
access information on the internet.

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter#08 ( Word Processing )
Q1. Define Word process?
A type of software that is used to create text documents is called word processor. It provides useful tools
for creating all kinds of text documents such as reports, letters and notes.
Q2. What is text editor?
A text editor is a simple computer program that allows users to create, change, or edit plain text files. It can
be used for creating computer programs for different purpose. Notepad and WordPad are
example of text editor.
Q3. Write shortcut key for cut and copy?
Ctrl+X is used to cut text and Ctrl+C is used to copy text.
Q4. What is different between cut and copy?
Cut command moves text from one place to another. The selected text is removed from its position and is
coped to clipboard. Copy command copies the text from one pace to another. The selected text is not
removed from its position and is also coped to clipboard.
Q5. Define page margins in word processor?
Margins define the boundaries of the text. The text cannot cross these boundaries. In every document all
the four margins like top, bottom, left and right can be same or different.
Q6. Define Macros?
A macros is a character or word that represents a series of keystrokes. The keystrokes can represent texts or
commands. The ability to define macros allows you to save yourself a lot of time by replacing document
which contains fixed text.
Q7. State the purpose of mail merge?
Mail merge is a process to create personalized letters and pre-addresses envelops or mailing labels for mass
mailing from a form letter. The feature is used in word processing documents which
contains fixed text.
Q8. What is WYSIWYG?
The Letter WYSIWYG stands for "What you see is what you get".
Q9. What is insert mode?
An "insertion Point" is the location within a text document where the next character will be inserted. In
most text editors and word processing programs.
Q10. State use of clipboard in MS word?
Clipboard is used to temporarily store the information that has been cut or copied. The options of cut and
copy are available in edit men or standard tool bar.
Q11. Describe undo and redo commands?
Ctrl+2 command is used to remove the effect of the last actions. Ctrl+ Y command is used to remove the
effect of undo command.
Q12. Define header and footer?
Header is used to display text or image on the top of each page. Footer is used to display text or Image on
the bottom of each page.
Q13. What is paragraph formatting?
Formatting applied to a complete paragraph is called paragraph formatting. Some paragraph formatting
includes text alignment, indentation, line spacing, tab stops and bullets.
Q14. Differentiate between delete and backspace key?
The delete key erases the character on the right side of the cursor. The backspace key erases the character
on the left side of the cursor.
Q15. What is character formatting?

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
The formatting that is applied to an individual character is called character formatting important character
formatting is typeface, font size, font style and character spacing.
Q16. What is page formatting?
Page formatting is the layout of the page when it is printed on printer. It is defined in page setup dialog
box.
Q17. What is word art option in MS-word?
Word art is used to create stylish text in variety of shapes. It proves the facility of stretching, coloring and
shading text.
Q18. What is meant by page orientation?
The direction in which document is printed on the paper is called page orientation. The document can be
printed on the paper in two ways. Page orientation of document is defined in page setup dialog box. The
two page orientations are:
Portrait
Landscape
Q19. What is mail marge?
The mail merge feature of word processor provides a shortcut method to create form, letters, mailing
labels, envelopes etc.
Q20. What is difference insert Mode of overtype Mode.
The insertion mode is used to insert new text in the existing document. When the text is typed at the cursor
position, existing text at the right of the cursor moves forward to make the space for the new text. In
overtyped mode, existing text at the right of the cursor is overwritten when new text is typed.
Q21. Define Insertion Point?
An insertion point is small blinking vertical bar in the document windows. It is know as a cursor.
Q22. Difference B/W SAVE and SAVE AS Commend.
The save command is used to save or update an existing document on the disk. The save As command is
used to make another copy of the opened document with a different name. when Save As command is
applied. Save As dialog box appears for getting the new name of the document.
Q23. What is the use of table in MS-Word?
A table is used to organize information in rows and columns. It is combination of rows and columns. The
insertion of row and column is called cell. The data is written into cells. Tables are also useful for
arranging images and text on a page.
Q24. Difference between line spacing and line spacing.
The white space between two adjusts lines of a paragraph is called line spacing. The white space before
and after the paragraph is called paragraph spacing.
Q25. What is meant by margins?
The white space around the top, left, right and bottom of a document page is called margins.

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Chapter#09 ( Spreadsheet Software )
Q1. What is spreadsheet?
Spreadsheet program is used for calculations. It provides worksheets to enter data. A worksheet is a
collection of rows and columns. It allows you to make different calculations using formulas.
Q2. List two benefits of spreadsheet?
Spreadsheet increases the speed of calculations. It is easy to modify data and recalculate automatically.
Q3. What is cell?
A cell is the intersection of a row and a column.
Q4. What is cell address?
Cell address identifies the location of a cell or group of cells in a worksheet. It consists of column letter
and row number. For example, c3 is the third cell in third column.
Q5. Differentiate between worksheet and workbook?
Worksheet is a place where the user enters all data. It consists of columns and rows. There are 256 columns
and 65536 rows in a worksheet. A workbook is a group of worksheets which are saved as
one file. Each workbook in excel contains 3 worksheet by default.
Q6. What is active cell?
The active cell is the selected cell in which data is entered when you begin typing. Only one cell is active at
a time. The active cell is the cell surrounded by a black border. Data can only be entered into the active
cell.
Q7. What is passive cell?
The cell that is not currently selected is called passive cell or passive state of a cell.
Q8. What are functions in MS-Excel?
A function is a built in formula. Excel provides different types of functions for different calculations. A
function provides more efficient and quick way of performing calculations
Q9. What is relative cell reference?
Referencing cells by their column and row labels such as "A1" is called relative referencing. Relative
references change when a formula is copied to another cell. Excel automatically changes cell address.
Q10. List any four functions of MS-Excel?
MAX, MIN, SUM, AVERAGE, IF, COUNT, COUNTIF are functions of MS-Excel.
Q11. Write a formula for calculating average of three numbers?
=AVERAGE (A1:C1)
Q12. What is chart?
Chart is the graphical representation of data entered in a worksheet. Charts are used to display a large
amount of data in a simple manner.
Q13. what is column header?
A horizontal bar that has heading of columns with labels A, B,C and so on is called column header.
Q14. what is Row header?
A vertical bar that has heading of rows with labels 1, 2, 3 ad so on is called row header.
Q15. What is a Formula?
A formula is a mathematical expression that is a combination of numbers, constant, cell addresses,
arithmetic operators. A formula is used to perform calculations on the numeric data. A formula always
begins with an equal sign (=).
Q16. What is meant by cell reference?
Referencing cells by their column and row labels such as "A1" is called relative referencing.
Q17. Define absolute reference?
The cell reference used in a formula that do not change when we copy the formula to another cell in the
worksheet are called absolute reference.
PIASS College Kasur
PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Q18. What is a chart?
The graphical representation of numerical data is called chart.
Q19. Write the procedure to compute the sum of 10 values or number in the column of MS-Excel
worksheet?
=SUM(A1:A10)
Q20. Write the procedure to calculate the average of cells from A2 and F2?
=AVERAGE(A2:F2)

Chapter#10 ( Fundamentals of the Internet )

PIASS College Kasur


PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
Q1. What are internet /Define Network of Network?
The Internet is a vast network that connects computers all over the world. Through the Internet, people can
share information and communicate from anywhere with an Internet connection.
Q2. What is ISP? And Name Some ISP's In Pakistan?
Internet Service Provider (ISP) is a company which provides internet connection to end user. Following is
the list of ISP: PTCL, Wi-tribe, Fiber link, World call, Wateen, telecom, Qubee.
Q3. Define IP Address?
An IP address is a unique address that identifies a device on the internet or a local network. IP stands for
"Internet Protocol," which is the set of rules governing the format of data sent via the internet or local
network. Example of IP address is: 45.65.12.115
Q4. What is domain name?
A domain name consists of text instead of number. It corresponds to an IP address of a server that hosts a
website. The domain name is easier to remember than IP address. Google.com is an example of domain
name.
Q5. What is DNS?
The domain name system is the method to store domain names and their corresponding IP addresses. When
the user enters a domain name such as google.com in a browser, a DNS server translates the domain name
to tis associated IP address,
Q6. List out four domains with their type of institutions?
com-commercial business
org-organizations (typically, nonprofit)
● gov-government agencies.
● edu-educational institutions.
● net-network organizations.
mil-military.
Q7. What is website?
A website is a collection of web pages and related content that is identified by a common domain name and
published on at least one web server. Examples are google.com, and amazon.com.
Q8. What is web server? / what is web hosting?
A web server is a computer that stores web server software and a website's component files.
Q9. Define WWW?
www is a way of accessing information over the internet. it organizes the information in such a way that
users can easily search and access the required information.
Q10What is Email?
Email stands for Electronic Mail which is used to exchange message between sender and recover. Message
can be text, documents, images, videos and audio.
Q11. Define Email Address. Give an Example?
An email address is a unique identifier for an email account. It is used to both send and receive email
messages over the Internet. tarigjaved605@gmail.com is an example of email address.
Q12. Describe the term web browsing?
A web browser is used to view web pages. It acts as an interface between the user and the internet. A
browser is often included in the operating system of a computer.
Q13. List any five web browser?
Five web browsers include are Mozilla Firefox, Google chrome, internet explorer, opera and safari.
Q14. Explain URL?
URL stands for Uniform Resource Locator. A URL is nothing more than the address of a given unique
resource on the Web.
Q15. Define Search Engine? List name of five search engines?
PIASS College Kasur
PROF. HAFIZ ZAIN AKRAM
(M. Phil, Computer Science) 03216514893
A search engine is a software program that helps people finds the information. Search engines are able to
return results quickly even with millions of websites online by scanning the Internet continuously and
indexing every page they find.
Q16. Write a short note on ARPANET?
During cold war America developed a network named ARPANET. It was developed for The Advanced
Research Projects Agency Network. It was used to send information to armed forces at long distance.
Q17. What you know about DARPA?
DARPA stands for Defense Advanced Research Projects Agency. DARPA worked to share data not only
on single network but also among different network.
Q18. What is uploading & Downloading?
The process of transferring a file from a server to a local computer is called downloading. Similarly, the
process of transferring a file from a local computer to the server on the internet is called uploading.
Q19. What is Addressing Scheme?
Every computer connected to the internet has a unique address. A computer is accessed by its address. The
address are assigned to the computer according to a set of rules. These rules are called addressing scheme.
Q20. Difference between FTP and HTTP.
FTP is a protocol, which is used to exchange files between users, while HTTP is used for accessing
webpages or documents to and from the web servers. HTTP works on top of the TCP/IP.
Q21.Difference between Gopher & telnet?
Gopher is an internet service. It organizes resources into multilevel menus to make finding information
easier on the internet. telnet is an abbreviation for Terminal network. It is a software that is used to login
and to run command on a remote computer on the internet.
Q22. What are Newsgroup?
A newsgroup is a discussion group or forum on the internet. It provide the services to exchange messages
on the internet about a particular subject.
Q23. What is the intranet?
An internal private network of an organization that can be accessed only by the authorized users of the
organization is called intranet.
Q24. What is Extranet?
A network of an organization that can be accessed by authorized outside users is called extranet.
Q25. What is Telnet?
telnet is an abbreviation for terminal network. It is a software that is used to login and to run commands on
a remote computer on the internet. Through this service a user can also access information on the internet.

PIASS College Kasur

You might also like