CS101 Midterm MCQs by Talha Sajid
CS101 Midterm MCQs by Talha Sajid
1.. While writing Pseudo code of an algorithm, there are rules to follow.
a) Standard
b) No standard
c) Strict
d) Pre-defined
4. The man power, technical resources and duration required to develop a purposed system
areestimated inphase.
a) Testing
b) Feasibility
c) Planning
d) Designing
8. Trinoo is a software.
a) DoS
b) Scanning
c) Utility
d) None of the given options
10. Writing a response, multiple statements are separated from each other with the help of
a) Period ( . )
b) Comma ( , )
c) Colon ( : )
d) Semicolon ( ; )
13. Select the best option in the context of HTML and JavaScript.
a) Both are case sensitive
b) Both are not case sensitive
c) JavaScript is case sensitive but HTML is not
d) HTML is case sensitive but JavaScript is not
19. If you have to draw some charts on the basis of mathematical calculations then which
one ofthe software from the following list will be your preference?
a) Spreadsheet
b) Word Processor
c) Database Management System
d) Dreamweaver
21. Computers loses accuracy for a task after doing that task for:
a) One millions of times
b) One billions of times
c) One trillions of times
d) Computer never loses accuracy
22. N a truth table, we have all the for all the related for
afunction.
a) Input – Outputs
b) Outputs – Inputs
c) Process – Inputs
d) Inputs – Processes
24. Punched Cards were invented first time for the purpose of .
a) Calculation
26. Which one of the following devices acts as the main controller of a computer system?
a) CPU
b) RAM
c) ROM
d) Hard drive
27. To allow a user for multiple selection from a list on a webpage, the web developer makes
use of ______________.
a) Check box
b) Text box
c) Radio button
d) Text area
29. Which one of the following is not a valid value for the “type” attribute of <INPUT> tag?
a) Password
b) Reset
c) Width
d) Submit
a) Efficiency
b) Accuracy
c) Pattern recognition
d) None of the given choices
36. If a computer could pass the Turing test then it would be able to:
a) think like human beings
b) do the things faster
c) win a million dollar prize
d) store more information
38. My friend claims to have a better algorithm than the existing one. We can say his
algorithm isbetter than the existing algorithms if it is .
a) Easier to analyze and easier to implement
b) Easier to analyze but difficult to implement
c) Difficult to analyze and difficult to implement
d) Difficult to analyze but easier to implement.
41. a user is using CGI script on a UNIX server, then the script type is called
a) Client side scripting
b) Server side scripting
c) Stand-alone scripting
d) GUI scripting
42. When we run a program in a computer, the actual execution of the program takes place
in .
a) RAM
b) ROM
c) Microprocessor
d) Hard Disk
45. Select the voltage combination, not supported by PC’s power supply.
a) +3.3 and +5 V DC
b) -12 and +12 V DC
c) -10 and +10 V DC
d) -5 and + 5 V D C
46. What is the shortcut key to open the cell format window in MS Excel?
a) Ctrl + 1
b) Ctrl + F
c) Ctrl + 4
d) Ctrl + Shift + Enter
48. Which of the following software is the best suited to tie together all important activities
andmajor systems of an organization into a single software system?
a) DSS
b) OS
c) ERP
d) MMS
51. The world first computer program was written to compute: bernoulli’s sequence
a) Simple sequence
b) Multiple sequence
c) Bernoulli’s sequence
d) Increasing sequence
c) _sum
d) cs_101
54. Which of the following symbol is used in JavaScript to add multiple line comments in a
program?
a) /
b) //
c) /*
d) //*
55. The number of steps required to execute an algorithm can be used to measure .
a) Space
b) Time
c) Memory
d) Bandwidth
56. The name of computer language used by the Defense Department of the United States
is.
a) Smalltalk
b) C
c) C++
d) Ada
a) Copy
b) Delete
c) Cut
d) Undo
60. One term could be used for more than one thing For example word “Jaguar” is used in
two meaning such as:
a) Car and cat
b) car and bus
c) Animal and car
d) Car and helicopter
64. A lot of information is available over the internet, we can access that information by
using an application called .
a) URL
b) Browser
c) HTML
d) Compiler
65. How many comparisons are required to sort the elements using intersection sort
algorithm? 13, 10, 9, 6, 33, 100
a) 3
b) 9
c) 7
d) 5
d) PAN
68. You might search the following or similar thing and might get unpleasant results which
might depress you.
a) Stomach Condition
b) Study
c) Teaching
d) Skin condition
72. one term can be used for more than one thing. For example, word “jaguar” is used in
two meanings such as:
73. Determines the number of bits to move radix point to either left or right.
a) Exponent field
b) Significant bit
c) Sign bit
d) Mantissa field
74. Breaking the tasks into a number of subtasks compatible with the number of available
processors is called
a) Interactive processing
b) Scaling
c) Throughput
d) Load balancing
76. Starting with vocabulary words and them giving students a reading passage is an
example of:
a) A top-down approach
b) A cron-up approach
c) A bottom-up approach
d) A Pop-up approach
77. A sequence of transaction in which the user establishes initial contact with a computer’s
operating system is called ?
a) Logout
b) Process
c) Boot state
d) Login
78. contains the information needed by a browser the proper server and request the desired
document.
a) TCP
b) UDP
c) SMTP
d) URL
79. In black and whites, each pixel is represented as one bit- e.g., 0 for black and 1 for white.
It is an example of____.
a) Matrix
b) Email
c) Facsimile
d) Searching
b) Music
c) Artistic work
d) All of these
83. In some cases, the data collection process is readily apparent; in others it is:
a) Outward
b) Subtle
c) Specious
d) Obvious
a) Paragraph
b) Font
c) Clipboard
d) All of these
90. In the United States the privacy act of 1974 was to protect citizens from abusive use of
databases:
a) Government
b) Public
c) Agencies
d) Companies
97. A program DOCTOR developed by joseph Weizenbaum in the mid-1960’s named as:
a) Alexa
b) Smart Doctor
c) Eliza
d) Joseph
98. Turing gave a percentage of a machine that will have a chance to pass Turing test in
year:
a) 2000
b) 2008
c) 2012
d) 2002
102. We can increase the size of text from home ribbon group called:
a) Paragraph
b) Font
c) Clipboard
d) Styles
104. When we draw a table in MS-word the table have initial column(s):
a) Zero
b) One
c) Two
d) Multiple
106. Researchers are trying to develop systems that exhibits intelligent behavior in
track:
a) Theoretical
b) Intelligent
c) Artificial
d) Engineering
108. Reports can be received at home through email because of advancement in:
a) Computer science
b) Artificial Intelligence
c) Medical databases
d) Hospitals
c) Teachers
d) All of these
112. In MS-Word different type of effects on the text can be applied with:
a) Text box
b) Word art
c) Quick parts
d) All of the given
114. By using MPEG and MP3 compression techniques, videos cameras are able to record
video within .
a) 128 GB storage
b) 28 MB storage
c) 128 MB storage
d) 8 GB storage
115. Who introduce the idea of storing the program in main memory?
a) Jhon W. Mauchly
b) Jhon Von Neumann
c) J. Presper Eckert
d) Konrad Zuse
116. In the reverse engineering process, what refers to the sophistication of the design
information that can be extracted from the source code?
a) Interactive
b) Completeness
c) Abstraction level
d) Direction level
118. If we are interested to see the map of some location, we can use map operator in the
following way:
a) Location: map
b) Map: Location
c) Mph: Map
d) Locations
120. Which of the following technology is not related to the client side working?
a) Java applets
b) Java script
c) PHP
d) HTML
123. which kind of server work as an intermediate between the client and server.
a) Client server
b) Server computer
c) Super server
d) Proxy server
125. Software units that communicate with controller or sometimes directly to peripheral
devices called
a) Utility program
b) System software
c) Device drivers
d) Operating system
126. Approximately how many entries a typical dictionary in a word processor can contain?
a) 25,000 entries
b) 250,000 entries
c) Less than 25,000 entries
d) More than 250,000 entries
127. Previously how many bits were used to store 2`s complement notation.
a) 8 bits
b) 16 bits
c) 64 bits
d) 128 bits
129. The set of tasks that ensures the software is correctly implements a specific function is
known as
a) Modularity
b) Verification
c) Validation
d) Requirement gathering
130. Distinction between program believed to the correct and the program that is correct is
a) Software Modularity
b) Software requirements gathering
c) Software verification
d) Software validation
131. One is that a CPU should be designed to execute a minimal set of instructions. This
approach is called a
a) CISI
b) RISC
c) ENVIAC
d) RISC/CISI
132. For a network to function reliably, it is important to establish rules by which activities
are conducted. Such rules are called .
a) Properties
b) Patterns
c) Premises
d) Protocols
137. If we have to insertion sort names Fred, Alex, Diana, Byron, Carol One approach to
sorting this list is to note that the sublist consisting of
a) Both Fred and Alex
b) Only carol
c) Only top name
d) Sub list having 3 names
139. By using 16 bits in 2`s complement notation how many maximum positive number can
be represented
a) 32768
b) 32678
c) 32867
d) 32868
140. Current status of the activity associated with the process is called the
a) Process Status
b) Process state
c) Process association
d) Process class
150. A collection of data organized in such a way that the computer can quickly search for
a desired data item is known as:
a) Retrieving
b) Database
c) Information
d) DBMS
d) Data accessibility
Best of Luck
For Free help, more Mid/Final term Files and for Exam Preparation :You Can
Join: