0% found this document useful (0 votes)
136 views34 pages

CS101 Midterm MCQs by Talha Sajid

Uploaded by

Talha Sajid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views34 pages

CS101 Midterm MCQs by Talha Sajid

Uploaded by

Talha Sajid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Mid-Term(Obj) CS101(Introduction to Computing) Page 1 of 34

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 2 of 34

1.. While writing Pseudo code of an algorithm, there are rules to follow.
a) Standard
b) No standard
c) Strict
d) Pre-defined

2. If we use <INPUT type= “password” > in HTML, what will happen?


a) Text will not be visible
b) Text will be in normal format
c) Text will be in **** format
d) Text will be in #### format

3. What will be the value of str ?


a) HelloWorld
b) Hello World
c) Hello + World
d) It will result in error

4. The man power, technical resources and duration required to develop a purposed system
areestimated inphase.
a) Testing
b) Feasibility
c) Planning
d) Designing

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 3 of 34

5. The text written in between is only displayed on the webpage.


a) <BODY/></BODY>
b) <BODY></HEAD>
c) <HEAD></HEAD>
d) <BODY></BODY>

6. Which one of the following is NOT a component of Rule Based System?


a) Rule Compiler
b) Rule Interpreter
c) Rules Base
d) Working Memory

7. The political process is also influenced by the use of .


a) Discussion forums
b) Newsgroups
c) Mailing lists
d) All of the given options

8. Trinoo is a software.
a) DoS
b) Scanning
c) Utility
d) None of the given options

9. Ada is a programming language specifically designed for


a) Analytical Engine
b) Difference Engine
c) Harvard Mark 1
d) Mechanical engine

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 4 of 34

10. Writing a response, multiple statements are separated from each other with the help of
a) Period ( . )
b) Comma ( , )
c) Colon ( : )
d) Semicolon ( ; )

11. JavaScript, first element of an array has the index:


a) 1
b) -1
c) 2
d) None of the given choices

12. Please choose one Ada is a ---------------------


a) programming language
b) Programmer
c) mother of Computing
d) All of the given

13. Select the best option in the context of HTML and JavaScript.
a) Both are case sensitive
b) Both are not case sensitive
c) JavaScript is case sensitive but HTML is not
d) HTML is case sensitive but JavaScript is not

14. Anchor tag is used to create:


a) Address
b) Hyperlink
c) Paragraph
d) Title

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 5 of 34

15. -------------operator is used to assign values to JavaScript variables.


a) Comparison
b) Binary
c) Assignment
d) Logical

16. specifically designed to developbusiness applications.


a) BASIC
b) FORTRAN
c) COBOL
d) Perl

17. A tool that helps you to find the synonyms is called .


a) Language
b) Paragraph
c) Thesaurus
d) Symbol

18. The “page title tag” is written inside the tag.


a) Body
b) Head
c) Meta
d) Script

19. If you have to draw some charts on the basis of mathematical calculations then which
one ofthe software from the following list will be your preference?
a) Spreadsheet
b) Word Processor
c) Database Management System

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 6 of 34

d) Dreamweaver

20. There are tags in html.


a) Only Single
b) Only Paired
c) Single and Paired
d) Multiple

21. Computers loses accuracy for a task after doing that task for:
a) One millions of times
b) One billions of times
c) One trillions of times
d) Computer never loses accuracy

22. N a truth table, we have all the for all the related for
afunction.
a) Input – Outputs
b) Outputs – Inputs
c) Process – Inputs
d) Inputs – Processes

23. Bringing subsystems together to form the system is called ► Merging


a) Integration
b) Merging
c) Splitting
d) Operation & Maintenance

24. Punched Cards were invented first time for the purpose of .
a) Calculation

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 7 of 34

b) Entering Patterns in Textile Looms


c) Storing Data
d) Playing Cards

25. Which of the following computer can be considered as a portable computer?


a) PC PG
b) Mainframe
c) PDA
d) Supercomputer

26. Which one of the following devices acts as the main controller of a computer system?
a) CPU
b) RAM
c) ROM
d) Hard drive

27. To allow a user for multiple selection from a list on a webpage, the web developer makes
use of ______________.
a) Check box
b) Text box
c) Radio button
d) Text area

28. Which of the following is a single tag in HTML?


a) TH
b) TD
c) HR
d) TR

29. Which one of the following is not a valid value for the “type” attribute of <INPUT> tag?

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 8 of 34

a) Password
b) Reset
c) Width
d) Submit

30. Anti Virus software is a kind of .


a) Utility Program
b) System Software
c) Device Driver
d) Freeware

31. Which computer category is widely used in our daily life?


a) Super Computer
b) Main Frame
c) Personal Computer
d) Laptop

32. Which of the following is not a type of page margin in MS Word?


a) Left
b) Right
c) Centre
d) Top

33. Base of the octal number system is .


a) 2
b) 16
c) 7
d) 8

34. Human are better than computers at:

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 9 of 34

a) Efficiency
b) Accuracy
c) Pattern recognition
d) None of the given choices

35. Notepad is an example of ___________


a) System Software
b) Application Software
c) Device Driver
d) Kernal

36. If a computer could pass the Turing test then it would be able to:
a) think like human beings
b) do the things faster
c) win a million dollar prize
d) store more information

37. Which one of the following is not an Application Software?


a) Word Processor
b) Web Browser
c) Microsoft Windows
d) MS Excel

38. My friend claims to have a better algorithm than the existing one. We can say his
algorithm isbetter than the existing algorithms if it is .
a) Easier to analyze and easier to implement
b) Easier to analyze but difficult to implement
c) Difficult to analyze and difficult to implement
d) Difficult to analyze but easier to implement.

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 10 of 34

39. Which of the following is Not a type of RAM?


a) SIMM
b) ROM
c) DIMM
d) DDR

40. Which of the following is Not a type of RAM?


a) BIOS
b) SIMM
c) DIMM
d) DDR

41. a user is using CGI script on a UNIX server, then the script type is called
a) Client side scripting
b) Server side scripting
c) Stand-alone scripting
d) GUI scripting

42. When we run a program in a computer, the actual execution of the program takes place
in .
a) RAM
b) ROM
c) Microprocessor
d) Hard Disk

43. In this URL http://www.msn.com , identifies the domain name


a) http
b) www
c) msn
d) com

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 11 of 34

44. Java script interact with user through Event handlers


a) Special control
b) Internet explorer
c) Event handlers
d) Java script does not interact with user

45. Select the voltage combination, not supported by PC’s power supply.
a) +3.3 and +5 V DC
b) -12 and +12 V DC
c) -10 and +10 V DC
d) -5 and + 5 V D C

46. What is the shortcut key to open the cell format window in MS Excel?
a) Ctrl + 1
b) Ctrl + F
c) Ctrl + 4
d) Ctrl + Shift + Enter

47. Graphics creation in JavaScript is .


a) Easy
b) Difficult
c) Simple
d) Not Possible

48. Which of the following software is the best suited to tie together all important activities
andmajor systems of an organization into a single software system?
a) DSS
b) OS
c) ERP

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 12 of 34

d) MMS

49. Relationship among the cells of MS Excel sheet can be created by .


a) Relationship diagram
b) Formatting
c) Formula
d) Test

50. Language translator is a computer ______.


a) Program
b) Hardware
c) Internet Browser
d) Mobile device

51. The world first computer program was written to compute: bernoulli’s sequence
a) Simple sequence
b) Multiple sequence
c) Bernoulli’s sequence
d) Increasing sequence

52. Which of the following is/are Word Processing software?


a) Word Perfect
b) StarOffice
c) MS Word
d) All of the Above

53. Select the variable name which is invalid in JavaScript:


a) While
b) sum

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 13 of 34

c) _sum
d) cs_101

54. Which of the following symbol is used in JavaScript to add multiple line comments in a
program?
a) /
b) //
c) /*
d) //*

55. The number of steps required to execute an algorithm can be used to measure .
a) Space
b) Time
c) Memory
d) Bandwidth

56. The name of computer language used by the Defense Department of the United States
is.
a) Smalltalk
b) C
c) C++
d) Ada

57. Language of the microprocessor is called


a) HTML
b) COBOL
c) FORTRAN
d) INSTRUCTION SET

58. Command which saves the selected text before deleting is

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 14 of 34

a) Copy
b) Delete
c) Cut
d) Undo

59. Post test loop structure refer to?


a) Test for termination is performed before the body is executed.
b) Test for termination is performed as well as the body is executed.
c) Test for termination is performed after the body is executed.
d) Test for termination is performed with the body is executed.

60. One term could be used for more than one thing For example word “Jaguar” is used in
two meaning such as:
a) Car and cat
b) car and bus
c) Animal and car
d) Car and helicopter

61. Pseudo code is language:


a) Algorithm
b) independent
c) dependent
d) Sequence

62. Which of the following is not an Operating System?


a) DOS
b) Windows XP
c) Linux
d) MS Access

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 15 of 34

63. In html, the text area tag (<textarea>) defines:


a) A multi-line text input control
b) An input control
c) Html form for the user input
d) A group of related options in a selected list

64. A lot of information is available over the internet, we can access that information by
using an application called .
a) URL
b) Browser
c) HTML
d) Compiler

65. How many comparisons are required to sort the elements using intersection sort
algorithm? 13, 10, 9, 6, 33, 100
a) 3
b) 9
c) 7
d) 5

66. An algorithm is and distinct from its representation.


a) Abstract
b) Vision
c) Visual
d) Clear

67. Connects computer over a large geographical area or world


a) LAN
b) MAN
c) WAN

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 16 of 34

d) PAN

68. You might search the following or similar thing and might get unpleasant results which
might depress you.
a) Stomach Condition
b) Study
c) Teaching
d) Skin condition

69. Which one of the following is true about process?


a) Activity of executing an algorithm
b) Activity of executing a Program
c) Abstract Representation of machine
d) Activity of representing pseudo code

70. Which of the following is true about TCP in comparison to UDP?


a) Less reliable but more efficient
b) More reliable and more efficient
c) More reliable and less efficient
d) Less reliable and less efficient

71. provides a network the internet connectivity


a) Hub
b) Node
c) Gateway
d) Repeater

72. one term can be used for more than one thing. For example, word “jaguar” is used in
two meanings such as:

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 17 of 34

a) Car and Cat


b) Car and Bus
c) Animal and Car
d) Car and helicopter

73. Determines the number of bits to move radix point to either left or right.
a) Exponent field
b) Significant bit
c) Sign bit
d) Mantissa field

74. Breaking the tasks into a number of subtasks compatible with the number of available
processors is called
a) Interactive processing
b) Scaling
c) Throughput
d) Load balancing

75. Posttest loop structures refer to?


a) Test for termination is performed before the body is executed
b) Test for termination is performed as well as the body is executed
c) Test for termination is performed after the body is executed
d) Test for termination is performed with the body is executed

76. Starting with vocabulary words and them giving students a reading passage is an
example of:
a) A top-down approach
b) A cron-up approach
c) A bottom-up approach
d) A Pop-up approach

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 18 of 34

77. A sequence of transaction in which the user establishes initial contact with a computer’s
operating system is called ?
a) Logout
b) Process
c) Boot state
d) Login

78. contains the information needed by a browser the proper server and request the desired
document.
a) TCP
b) UDP
c) SMTP
d) URL

79. In black and whites, each pixel is represented as one bit- e.g., 0 for black and 1 for white.
It is an example of____.
a) Matrix
b) Email
c) Facsimile
d) Searching

80. In context of environment, computer science have impacts:


a) Positive
b) Negative
c) Dangerous
d) Both positive and negative

81. Copyrights can be applied on:


a) Dramatic works

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 19 of 34

b) Music
c) Artistic work
d) All of these

82. Major components of syntactic analysis is:


a) Context
b) Identifying
c) Parsing
d) Understanding syntax

83. In some cases, the data collection process is readily apparent; in others it is:
a) Outward
b) Subtle
c) Specious
d) Obvious

84. Attacks can be made to prevent access to websites by crashing:


a) Websites
b) Servers
c) Network
d) Database

85. Page group includes options:


a) Cover page
b) Page margins
c) Page color
d) All of these

86. Home ribbon contains groups:

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 20 of 34

a) Paragraph
b) Font
c) Clipboard
d) All of these

87. Easy access to online health centers is because of:


a) Computer science
b) Artificial Intelligence
c) Database
d) Intelligent agents

88. Electronic Theft include:


a) Online scam
b) Harmful advice
c) Cyber bullying
d) Unsuitable products

89. Microsoft office includes:


a) Word
b) Pdf reader
c) WordPad
d) All of these

90. In the United States the privacy act of 1974 was to protect citizens from abusive use of
databases:
a) Government
b) Public
c) Agencies
d) Companies

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 21 of 34

91. Matching Geometric Characteristics technique Cannot read:


a) Images
b) Pictures
c) Optical characters
d) Handwritten Material

92. Access to the forbidden literature is because of:


a) Computer
b) Cyber building
c) Identity theft
d) Lacking privacy

93. Editing Group have commands:


a) 2
b) 3
c) 4
d) 5

94. Software licenses are:


a) Proprietary
b) Free
c) Open source
d) All of these

95. The amount of paper use in a year is:


a) 83 million users
b) 85 million users
c) 90 million users
d) 95 million users

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 22 of 34

96. ctrl + Z is used for


a) Redo
b) Undo
c) Save
d) Load

97. A program DOCTOR developed by joseph Weizenbaum in the mid-1960’s named as:
a) Alexa
b) Smart Doctor
c) Eliza
d) Joseph

98. Turing gave a percentage of a machine that will have a chance to pass Turing test in
year:
a) 2000
b) 2008
c) 2012
d) 2002

99. We can add charts in MS-word from group:


a) Illustrations
b) Table
c) Symbols
d) Apps

100. Computer Security is also Known as:


a) System-Security
b) Cyber-Security
c) Password
d) Copyright

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 23 of 34

101. The people present around the e-waste gain:


a) Benefits
b) Diseases
c) Substances
d) Electronic waste

102. We can increase the size of text from home ribbon group called:
a) Paragraph
b) Font
c) Clipboard
d) Styles

103. Most famous word processor is:


a) MS- Excel
b) MS-Word
c) WordPad
d) Notepad

104. When we draw a table in MS-word the table have initial column(s):
a) Zero
b) One
c) Two
d) Multiple

105. shortcut key to paste is:


a) CTRL + P
b) ALT + P
c) CTRL + V
d) ALT + V

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 24 of 34

106. Researchers are trying to develop systems that exhibits intelligent behavior in
track:
a) Theoretical
b) Intelligent
c) Artificial
d) Engineering

107. Pages is an option in the ribbon:


a) Home
b) Insert
c) Review
d) View

108. Reports can be received at home through email because of advancement in:
a) Computer science
b) Artificial Intelligence
c) Medical databases
d) Hospitals

109. MS-word is an example of:


a) Digital software
b) System software
c) Word processors
d) Utility Programs

110. Ethics and legality are essentials in many industries including:


a) Government Officers
b) Doctors

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 25 of 34

c) Teachers
d) All of these

111. Computer is known is also known as:


a) System- Security
b) Cyber-security
c) Password
d) Copyright

112. In MS-Word different type of effects on the text can be applied with:
a) Text box
b) Word art
c) Quick parts
d) All of the given

113. IPR stands for:


a) Intellectual property restate
b) Intellectual property rights
c) Intellectual property resources
d) Intellectual property release

114. By using MPEG and MP3 compression techniques, videos cameras are able to record
video within .
a) 128 GB storage
b) 28 MB storage
c) 128 MB storage
d) 8 GB storage

115. Who introduce the idea of storing the program in main memory?

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 26 of 34

a) Jhon W. Mauchly
b) Jhon Von Neumann
c) J. Presper Eckert
d) Konrad Zuse

116. In the reverse engineering process, what refers to the sophistication of the design
information that can be extracted from the source code?
a) Interactive
b) Completeness
c) Abstraction level
d) Direction level

117. In CS, we Store and link data in an organized Way using


a) SDLC
b) MSDB
c) DMBS
d) DBMS

118. If we are interested to see the map of some location, we can use map operator in the
following way:
a) Location: map
b) Map: Location
c) Mph: Map
d) Locations

119. The node or PC which sends requests for services is called


a) Server
b) Client
c) Protocol
d) ISP

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 27 of 34

120. Which of the following technology is not related to the client side working?
a) Java applets
b) Java script
c) PHP
d) HTML

121. Computer does not stand any language except


a) Machine Language
b) Assembly Language
c) Binary Language
d) Programming Language

122. Which of the following is a disadvantage of a linear search?


a) Requires more space
b) Greater time Complexities compared to the other searching algorithms
c) Not easy to understand
d) Not easy to Implement

123. which kind of server work as an intermediate between the client and server.
a) Client server
b) Server computer
c) Super server
d) Proxy server

124. The impact of truncation error can be reduced by using


a) Longer exponents field
b) Positive exponent field
c) Floating point Notation
d) Longer Mantissa field

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 28 of 34

125. Software units that communicate with controller or sometimes directly to peripheral
devices called
a) Utility program
b) System software
c) Device drivers
d) Operating system

126. Approximately how many entries a typical dictionary in a word processor can contain?
a) 25,000 entries
b) 250,000 entries
c) Less than 25,000 entries
d) More than 250,000 entries

127. Previously how many bits were used to store 2`s complement notation.
a) 8 bits
b) 16 bits
c) 64 bits
d) 128 bits

128. Which of the following language is used for client-side scripting?


a) Phyton
b) JavaScript
c) PHp
d) ASP.net

129. The set of tasks that ensures the software is correctly implements a specific function is
known as
a) Modularity
b) Verification

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 29 of 34

c) Validation
d) Requirement gathering

130. Distinction between program believed to the correct and the program that is correct is
a) Software Modularity
b) Software requirements gathering
c) Software verification
d) Software validation

131. One is that a CPU should be designed to execute a minimal set of instructions. This
approach is called a
a) CISI
b) RISC
c) ENVIAC
d) RISC/CISI

132. For a network to function reliably, it is important to establish rules by which activities
are conducted. Such rules are called .
a) Properties
b) Patterns
c) Premises
d) Protocols

133. What is full form of JSP?


a) Java server Pages
b) Java Script pages
c) Java semantic pages
d) Java Source pages

134. ENIAC stands for

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 30 of 34

a) Electronic numerical integrator and calculator


b) Electronic numbers and integrator and calculator
c) Electronic numerical integer and calculations
d) Electronic numbers integer and calculations

135. Generally how many steps a machine cycle have?


a) Two
b) Three
c) Four
d) Two or more

136. One of the earlier computing devices was the.


a) Laptop
b) ABACUS
c) iPhone
d) Windows

137. If we have to insertion sort names Fred, Alex, Diana, Byron, Carol One approach to
sorting this list is to note that the sublist consisting of
a) Both Fred and Alex
b) Only carol
c) Only top name
d) Sub list having 3 names

138. A directories can contain other directories called subdirectories constructed a .


a) Directory system
b) Network organization
c) Tree organization
d) Hierarchical organization

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 31 of 34

139. By using 16 bits in 2`s complement notation how many maximum positive number can
be represented
a) 32768
b) 32678
c) 32867
d) 32868

140. Current status of the activity associated with the process is called the
a) Process Status
b) Process state
c) Process association
d) Process class

141. which one of the following is not a property of a good algorithm?


a) Consistency
b) Unambiguousness
c) Efficiency
d) Time Taking

142. What is NOT a key factor while designing a website?


a) Usability
b) User-friendly
c) Consistency
d) Complexity

143. In JavaScript, a variable declaration is


a) Optional
b) Mandatory
c) Not allowed
d) None of the given

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 32 of 34

144. A protocol used for receiving email messages is called .


a) URL
b) Telnet
c) POP3
d) SMTP

145. Which is correct?


a) onUnload
b) onUnLoad
c) onUNLOAD
d) All of the above

146. Variables allow us to manipulate data through the .


a) Actual Value
b) Reference
c) Length
d) Name

147. Word Processor is a


a) System Software
b) Application Software
c) Device
d) Utility

148. In tabular storage, fields placed in a particular row are strongly .


a) Independent
b) Dependent
c) Interrelated
d) Inconsistent

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 33 of 34

149. A large number of networks interconnected physically is called .


a) LAN
b) MAN
c) Internet
d) Network collection

150. A collection of data organized in such a way that the computer can quickly search for
a desired data item is known as:
a) Retrieving
b) Database
c) Information
d) DBMS

151. The key property of the ‘Array’ object in JavaScript is:


a) Value
b) Length
c) Name
d) All of the given choices

152. Which one is the example of spreadsheet software?


a) MS Word
b) MS PowerPoint
c) MS Excel
d) MS Access

153. The Encryption of data is related to:


a) Data updates
b) Data security
c) Data integrity

Contact us on WhatsApp 0328-4090195


Mid-Term(Obj) CS101(Introduction to Computing) Page 34 of 34

d) Data accessibility

154. In a good presentation each slide should contain .


a) Heading
b) Phrases not sentences
c) Sentences not phrases
d) Heading, sentences not phrases

Best of Luck

For Free help, more Mid/Final term Files and for Exam Preparation :You Can
Join:

Contact us on WhatsApp 0328-4090195

You might also like