Final Test Zawiya Academy Entry test 2007 Marks= 80 time 1 hr 1) A collection of raw facts and figure is called a) data b) information c) processing d) none 2) a computer’s main functions to a) convert information into storage b) convert data into information c) Display data d) create data from information 3) data processing is also known as a) calculating b) computing c) information technology d) merging 4) the piece of hardware that permanently holds data and programs is called a) primary storage b) CPU c) secondary storage d)output 5) Which of the following is not a secondary storage device? a) CD-ROM b) hard disk c) DVD-ROM d) CPU 6) Step by step instructions that run the computer are called a) Hardware b) documents c) CPU d) software 7) Another name for main memory is a) Secondary b) disk storage c) primary storage d) tape storage 8) which of the following is an example of system software a) Operating system b) utility program c) drivers d) all 9) Which software is used to solve everyday personal or business tasks? a) Custom software b) system software c)application software d) none 10) The ways of entering data in computer and presenting information generated by the system are called a) Processing b) input/output c) storage/retrieval d) data generation 11) The primary difference between a LAN and WAN is a) The no. of software programs available b) Distance c) The variety of hardware devices d) The number of hardware devices 12) What type of network is the internet? a) LAN b) MAN c) WAN d) None 13) NIC stands for a) Network internal card b) Newer industrial computer c) Networking internet connection d) Network interface card 14) Which of the following is a LAN protocol? a) Ethernet b) token ring c) ARC net d) all 15) The act of listening to the medium fro a message is called a)contention b)carrier sensing c) collision d)transparency 16) a device that is used to connect two computers via an ordinary telephone line is a) Ethernet Card b) Graphic Card c) Modem d) Sound Card 17) a network that places all nodes on a single cable is called a)star b) ring c)band d)bus 18) one or more computers connected to hub computer is called a) Ring network b) band c) bus d) star network 19) topology that is used for small no. of computers is called a) Star b) bus c) mesh d) ring 20) which data transmission type uses a clock to control the timing of bits being sent a) Synchronous b) asynchronous c) parallel d) none 21) which of the following technique uses modulation a) bandwidth b) broad band c) base band d) none 22) a communication technique that is used to transmit large volume of data over log distance is called a) Bandwidth b) broadband c) baseband d) none 23) The communication channels can be divided into a) Two types b) four types c) seven types d) none 24) Which of the transmission media is used in LAN? a) Satellite b) microwave c) coaxial cable d) none 25) An important property of fiber optic cable is a) Noise b) reflection c) interference d) attenuation 26) The time taken by a data signal to reach to moon and then back to earth was bout a) 2 minutes b) 2 seconds c) 2ms d) 2 hours 27) Microwave transmission, coaxial cable and fiber optics are examples of a) Modems b) routers c) transmission media d) ring network 28) All of the following are guided communications media except a) Twisted pair b) fiber –optic cables c) coaxial cables d) satellite base microwave 29) Which of the following is not a communication media? a) Twisted pair b) UTP c) microwave d) modem 30) Which communication medium requires line-of-sight? a)microwave b) fiber optic c) twisted pair d) coaxial 31) Protecting computers and the information they contain against unwanted access,damage,modification or destruction is called a) Computer monitoring b) electronic policing c) audit control d) compute security 32) Restricted access to the server computer room is a form of a) logical security b) enterprise security c) physical security d) user security 33) The measurement of things such as fingerprints and retinal scans used for security access is called a) Biometrics b) bio-measurement c) computer security d) smart weapon 34) Which of the following is an example of a good password? a) Name of a partner or spouse b) name of a child or pet c) word related to job or hobby d) none of the above 35) Which of the following is NOT one of the ways to protect your password? a) Use last name for password b) change password frequently c) never write down password d) never tell anyone your password 36) A program that interferes with the normal routine of the computers is called a) Virus b) antivirus c) freeware d) shareware 37) Which of the following is a computer virus a) Chernobyl b) logic bomb c) redlof d) all 38) Which of the following word processing features best helps to give an overall view of the document, showing multiple pages at once? a) Pagination b) page setup c) print preview d) document stretching 39) the name of the document is displayed a) At the top of the document b) in title bar of application window c) in the status bar d) only when you save document 40) in which of the following ways text can’t be aligned a) Top b) left c) right d) center 41) spread sheet is a grid of a) Row b) column c) row and column d) none 42) the intersection between a row and a column is called a) Intersection b) cell c) field d) address 43) in electronic spreadsheets ,alphanumeric combinations such as A5,B9,D15 are a) Row identifiers b) cell addresses c) formulas d) functions 44) a block of cells called a) Workbook b) function c) columns d) range 45) a formula begins with a) Equal to b) = c) = = d) <> 46) the position of data in a cell is called a) Direction b) alignment c) position d) placement 47) the actual working area of Microsoft excel is a) Workbook b) worksheet c) note sheet d) none 48) Who owns the internet? a) U.S Government b) Pak.telecom c) united nations d) none 49) A computer can be linked to internet through a) a phone-line modem b) DSL c) cable modem d) all 50) how many types of addressing schemes a) 3 b) 2 c) 5 d) 8 51) every host computer on the internet has a(n) a) Similar IP address b) unique 15-digit number c) unique IP address d) all 52) An IP address is a(n) a) string of four umbers separated by periods b) string of names separated by dots to specify the exact internet location c) open standard d) peer-to-peer identifier 53) a standard IP address is composed of total of a) 4 bits b) 16 bits c) 32 bits d) 256 bits 54) the system that translated an IP address into an easier name is called a) packet-switching domain system b) domain name system c) domain d) domain numbering system 55) which of the following is top level domain a) http b) .com c) HTML d)URL 56) all of the following are top level domain EXCEPT a) .mil b) .org c) .gov d) .army 57) How does internet differentiate one computer from another? a) architecture b) manufacturer c) IP address d) all 58) What is the protocol in the URL http://www.microsoft.com? a) www b) http c) Microsoft d) .com 59) ISP stands for a) international service provider b) internet service provider c) interlinked services provision d) none 60) software used to access the internet is called a) browser b) packaged c) spreadsheet d) HTTP 61) Which of the following is a specialized server found on the internet? a) Email b) file(ftp)server c) web server e) all 62) A collection of documents stored on computer permanently connected with internet around the world is called a) Telnet b) WWW c) LAN d) FTP 63) C is a a) high level language b) low level language c) assembly language d) machine language 64) turbo c++ can compile a) C++ programs only b) C and C++ programs c) turbo C programs only d) turbo C++ programs only 65) Debug is the process of a) creating bugs in program b) identifying and removing errors c) identifying errors d) removing errors 66) C was designed to write programs for a) windows operating system b) Solaris operating system c) UNIX d) OS/2 67) preprocessor directives are commands for a) microprocessor b) language processor c) C processor d) loader 68) the expression in define directives a) can only be changed at the end of the program b) can not be change a) can not be changed but can be redefine d) can not be assigned a value 69) which of the following language requires no translator to execute the program a) C b) C++ c) machine language d) assembly language 70) .exe file is produced by the a) linker b) loader c) compiler d) interpreter 71) which of the following key is used to save a file a) F2 b) F3 c) F9 d) F5 72) Void occupy how many bytes in memory a) zero b) one c) two d)four 73) variables are created in a) RAM b) ROM c) Hard Disk d) Cache 74) Which of the following is a valid character constant a) a b) “b” c) ‘6’ d) = 75) Which of the following data type offers the highest precision? a) float b) ling int c) long double d) unsigned long int 76) when the result of the computation of two very small numbers is too small to be represented, this phenomenon is called a) arithmetic overflows b) arithmetic underflow c) truncation d) round off 77) the symbol ‘=’ represents: a) comparison operator b) assignment operator c) equal-to operator d) none of these 78) Which of the following operators has lowest precedence? a) ! b) + c) = d) = = 79) relational operators are used to a) establish a relationship among variables b) compare two values c) construct compound condition d) perform arithmetic operations 80) C is strongly typed language ,this means that: a) every program must be compiled before execution b) every variable must be declared before it is being used c) the variable declaration als9 defines the variable d) sufficient data types are available to manipulate each type of data