) A collection of raw facts and figure is called

advertisement
Final Test
Zawiya Academy
Entry test 2007
Marks= 80
time 1 hr
1) A collection of raw facts and figure is called
a) data b) information c) processing d) none
2) a computer’s main functions to
a) convert information into storage b) convert data into information
c) Display data
d) create data from information
3) data processing is also known as
a) calculating
b) computing c) information technology d) merging
4) the piece of hardware that permanently holds data and programs is called
a) primary storage b) CPU c) secondary storage d)output
5) Which of the following is not a secondary storage device?
a) CD-ROM
b) hard disk c) DVD-ROM d) CPU
6) Step by step instructions that run the computer are called
a) Hardware b) documents c) CPU d) software
7) Another name for main memory is
a) Secondary b) disk storage c) primary storage d) tape storage
8) which of the following is an example of system software
a) Operating system b) utility program c) drivers d) all
9) Which software is used to solve everyday personal or business tasks?
a) Custom software b) system software c)application software d) none
10) The ways of entering data in computer and presenting information generated by the system
are called
a) Processing b) input/output c) storage/retrieval d) data generation
11) The primary difference between a LAN and WAN is
a) The no. of software programs available b) Distance
c) The variety of hardware devices
d) The number of hardware devices
12) What type of network is the internet?
a) LAN
b) MAN
c) WAN
d) None
13) NIC stands for
a) Network internal card
b) Newer industrial computer
c) Networking internet connection d) Network interface card
14) Which of the following is a LAN protocol?
a) Ethernet b) token ring c) ARC net d) all
15) The act of listening to the medium fro a message is called
a)contention b)carrier sensing c) collision d)transparency
16) a device that is used to connect two computers via an ordinary telephone line is
a) Ethernet Card b) Graphic Card c) Modem d) Sound Card
17) a network that places all nodes on a single cable is called
a)star b) ring c)band d)bus
18) one or more computers connected to hub computer is called
a) Ring network b) band c) bus d) star network
19) topology that is used for small no. of computers is called
a) Star b) bus c) mesh d) ring
20) which data transmission type uses a clock to control the timing of bits being sent
a) Synchronous b) asynchronous c) parallel d) none
21) which of the following technique uses modulation
a) bandwidth b) broad band c) base band d) none
22) a communication technique that is used to transmit large volume of data over log distance is
called
a) Bandwidth b) broadband c) baseband d) none
23) The communication channels can be divided into
a) Two types b) four types c) seven types d) none
24) Which of the transmission media is used in LAN?
a) Satellite b) microwave c) coaxial cable d) none
25) An important property of fiber optic cable is
a) Noise b) reflection c) interference d) attenuation
26) The time taken by a data signal to reach to moon and then back to earth was bout
a) 2 minutes b) 2 seconds c) 2ms d) 2 hours
27) Microwave transmission, coaxial cable and fiber optics are examples of
a) Modems b) routers c) transmission media d) ring network
28) All of the following are guided communications media except
a) Twisted pair b) fiber –optic cables c) coaxial cables d) satellite base microwave
29) Which of the following is not a communication media?
a) Twisted pair b) UTP c) microwave d) modem
30) Which communication medium requires line-of-sight?
a)microwave b) fiber optic c) twisted pair d) coaxial
31) Protecting computers and the information they contain against unwanted
access,damage,modification or destruction is called
a) Computer monitoring b) electronic policing c) audit control d) compute security
32) Restricted access to the server computer room is a form of
a) logical security b) enterprise security c) physical security d) user security
33) The measurement of things such as fingerprints and retinal scans used for security access is
called
a) Biometrics b) bio-measurement c) computer security d) smart weapon
34) Which of the following is an example of a good password?
a) Name of a partner or spouse b) name of a child or pet c) word related to job or hobby
d) none of the above
35) Which of the following is NOT one of the ways to protect your password?
a) Use last name for password b) change password frequently c) never write down
password d) never tell anyone your password
36) A program that interferes with the normal routine of the computers is called
a) Virus b) antivirus c) freeware d) shareware
37) Which of the following is a computer virus
a) Chernobyl b) logic bomb c) redlof d) all
38) Which of the following word processing features best helps to give an overall view of the
document, showing multiple pages at once?
a) Pagination b) page setup c) print preview d) document stretching
39) the name of the document is displayed
a) At the top of the document b) in title bar of application window c) in the status bar d)
only when you save document
40) in which of the following ways text can’t be aligned
a) Top b) left c) right d) center
41) spread sheet is a grid of
a) Row b) column c) row and column d) none
42) the intersection between a row and a column is called
a) Intersection b) cell c) field d) address
43) in electronic spreadsheets ,alphanumeric combinations such as A5,B9,D15 are
a) Row identifiers b) cell addresses c) formulas d) functions
44) a block of cells called
a) Workbook b) function c) columns d) range
45) a formula begins with
a) Equal to b) = c) = = d) <>
46) the position of data in a cell is called
a) Direction b) alignment c) position d) placement
47) the actual working area of Microsoft excel is
a) Workbook b) worksheet c) note sheet d) none
48) Who owns the internet?
a) U.S Government b) Pak.telecom c) united nations d) none
49) A computer can be linked to internet through
a) a phone-line modem b) DSL c) cable modem d) all
50) how many types of addressing schemes
a) 3 b) 2 c) 5 d) 8
51) every host computer on the internet has a(n)
a) Similar IP address b) unique 15-digit number c) unique IP address d) all
52) An IP address is a(n)
a) string of four umbers separated by periods b) string of names separated by dots to
specify the exact internet location c) open standard d) peer-to-peer identifier
53) a standard IP address is composed of total of
a) 4 bits b) 16 bits c) 32 bits d) 256 bits
54) the system that translated an IP address into an easier name is called
a) packet-switching domain system b) domain name system c) domain
d) domain
numbering system
55) which of the following is top level domain
a) http b) .com c) HTML d)URL
56) all of the following are top level domain EXCEPT
a) .mil b) .org c) .gov d) .army
57) How does internet differentiate one computer from another?
a) architecture b) manufacturer c) IP address d) all
58) What is the protocol in the URL
http://www.microsoft.com?
a) www b) http c) Microsoft d) .com
59) ISP stands for
a) international service provider b) internet service provider c) interlinked services
provision d) none
60) software used to access the internet is called
a) browser b) packaged c) spreadsheet d) HTTP
61) Which of the following is a specialized server found on the internet?
a) Email b) file(ftp)server c) web server e) all
62) A collection of documents stored on computer permanently connected with internet around
the world is called
a) Telnet b) WWW c) LAN d) FTP
63) C is a
a) high level language b) low level language c) assembly language d) machine language
64) turbo c++ can compile
a) C++ programs only b) C and C++ programs c) turbo C programs only d) turbo C++
programs only
65) Debug is the process of
a) creating bugs in program b) identifying and removing errors c) identifying errors d)
removing errors
66) C was designed to write programs for
a) windows operating system b) Solaris operating system c) UNIX d) OS/2
67) preprocessor directives are commands for
a) microprocessor b) language processor c) C processor d) loader
68) the expression in define directives
a) can only be changed at the end of the program b) can not be change
a) can not be changed but can be redefine d) can not be assigned a value
69) which of the following language requires no translator to execute the program
a) C b) C++ c) machine language d) assembly language
70) .exe file is produced by the
a) linker b) loader c) compiler d) interpreter
71) which of the following key is used to save a file
a) F2 b) F3 c) F9 d) F5
72) Void occupy how many bytes in memory
a) zero b) one c) two d)four
73) variables are created in
a) RAM b) ROM c) Hard Disk d) Cache
74) Which of the following is a valid character constant
a) a b) “b” c) ‘6’ d) =
75) Which of the following data type offers the highest precision?
a) float b) ling int c) long double d) unsigned long int
76) when the result of the computation of two very small numbers is too small to be represented,
this phenomenon is called
a) arithmetic overflows b) arithmetic underflow c) truncation d) round off
77) the symbol ‘=’ represents:
a) comparison operator b) assignment operator c) equal-to operator d) none of these
78) Which of the following operators has lowest precedence?
a) ! b) + c) = d) = =
79) relational operators are used to
a) establish a relationship among variables b) compare two values c) construct
compound condition d) perform arithmetic operations
80) C is strongly typed language ,this means that:
a) every program must be compiled before execution b) every variable must be declared
before it is being used c) the variable declaration als9 defines the variable d) sufficient
data types are available to manipulate each type of data
Download