Introduction to Computing MCQs Test 2

Computer Most important MCQs for test and quiz online with solved mcqs. Here all of the MCQs are very important and revised in the past papers and entry tests of computers.


 Which of the following is incorrect for making design elements legible?

Select correct option:

Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus

 Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices

E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices

_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input or Output
Decision
Connector

 If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster

Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices

The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS

The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices

The internet communities are ___________.

Select correct option:
Geographical based
Interest based
Country based
Religion based

which one is correct?

► onUnload
► onUnLoad
► onUNLOAD
► All of the above

Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 

► Loop
► Sequence
► Condition
► Array 

Variables allow us to manipulate data through the ___________. 

► 
Actual Value
► Reference
► Length
► Name

Fuzzy logic is based on ____________. 

► Ground facts
► Experience
► Practice
► Approximation

Word Processor is a _________________

► System Software
► Application Software
► Device
► Utility

In the old days, databases did NOT support ____________. 

► Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________. 

► 
Independent
► Dependent
► Interrelated
► Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth. 

► Slower
► Faster
► Higher
► Improved

Distance learning has got a boost due to the ___________.
► 
Easy communication
► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 

► 
Image downloading
► Image preloading
► Image uploading
► Image postloading

The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.

► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called_____________. 

► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______ 

► 
LAN
► MAN
► Internet
► Network collection

TCP stands for ________.

► 
Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
► 
Retrieving
► Database
► Information
► DBMS

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 
► Freeware
► Shareware
► Firewire
► Firmware

Structures, in which another list starts before the first list is finished, are called: 

► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is 

► 
Value
► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ? 

► MS Word
► MS PowerPoint
► MS Excel
► MS Access
 
_____ is the process of analyzing large databases to identify patterns. 

► Data normalization
► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ? 

► 
Query
► Form
► Report
► All of the given options

JavaScript function fixed() has equivalent HTML tag-set ____ 

► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 

► True
► False 

Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all

Internet is an example of ______________ network. 

Private
Public
Both Private and Public
None of the given choices

The name of first commercially available PC was: 

UNIVAC 1
ENIAC
EDVAC
Altair 8800

Algorithm is a ____________________ 

Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem

A group of information is called __________________ 

File
Database
Record
Field
___________________ is a branch of computer science concerned with manipulating and enhancing computer graphics. 

Image Handling
Image Processing
Image Engineering
None of these

__________has changed our way of life like no other technology. 

Computational technology
Computer technology
Computing technology
None of the Above

Sophisticated event handling is not possible with _______________ event handling 

Off-Line
In-Line
Out-Line
Non of the given choices

Babbage’s Analytical Engine could store information permanently in: 

Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

There are __________ popular schemes to reduce the number of bytes that are required for storing graphics. 

4
2 
None of these 

The internet-society is considered under Surveillance because: 

While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given

URL is a/an ________
 ► Device
 ► Component
 ► Address
 ► Tool

To improve the time for scanning a web page, text should be ___________.
 ► Centered
 ► Left Aligned
 ► Right Aligned

 ► Staggered

Communications on the internet is controlled by a set of two protocols which are ____________.

► IMAP and SMTP
► FTP and HTTP
► TCP and IP
► TCP and HTTP

FTP stands for __________.
► File transmission protocol
► File transmission path
► File transfer protocol
► Fine transfer path

A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.
► Array
► Function
► Variable
► Object

Anchor tag denoted by <A> is used to create 
► Address
► Hyperlink
► Paragraph
► Title

<UL> tag is used to
 ► underline text
 ► end the line
 ► create ordered list
 ► create unordered list

A user may access any item on the web through __________.

► URL
► Telnet
► POP
► SMTP


The browser breaks down the URL into ________ parts.

► 2
► 3
► 4
► 5

Which one of the following is NOT a primary color?
► Red
► Green
► Yellow
► Blue

According to a popular heuristic, success is defined by ___________.

► The user
► The builder
► Both user and builder
► None of the given options

The idea of Neural Networks field is based upon ______________.
► Human nature
► Human brain
► Human culture
► Human actions

ERP is a type of __________________ .
 ► Entertainment software
 ► Productivity software
 ► Business software
 ► Scientific software

__________ are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs.

► Event called programs
► Event processed programs
► Event driven programs
► Event declared programs

Automatic machines performing various tasks that were previously done by humans, are called ____________.

► Robotics
► Computers
► Decision Making Systems
► Autonomous Web Agents

country=”Hello Pakistan”;
document.write(country.charAt(6));


The out put of the above statement is _____________.
► o
► P
► a
► k

The distance among families is ___________ because of spending more time on internet.

► Increased
► Expanded
► Contracted
► Decreased

The software used for the scanning of internet severs, is called __________.

► Wscan
► Mscan
► Sscan
► Vscan

Adding images to html page, we use___________ tag.

► <IMG>
► <IMAGE>
► <PICTURE>
► <PIC>

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________.

► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

The responsibilities of the Team Lead includes_____________.

► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options

When the packets reach at destination, __________ reassembles them into original message.

► Protocol
► TCP
► IP
► NIC

Many developers write the _________ first and then incrementally convert each line into _________.

► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options

Machine language is also called

► Assembly Language
► Binary Language
► High Level Language
► HTML Language

In JavaScript, second element of an array has the index:

► 2
► 0
► 1
► 3


Each element in an array is given an index, which is an integer value between 0 and one less than the length of the array. The first element has an index of 0, the second element has an index of 1, and so on.

One can download or upload files to a remote computer using ________ protocol.

► HTTP
► SMTP
► FTP
► TELNET


JavaScript ________ support drawing of graphics

► Does
► Does not
► Always
► At times

 Which of the following is NOT true about modern computers?

► More powerful
► Smaller in size
► Consume less energy
► Costly

Ada written a computer programme for ?

► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine

A set of stand alone productivity applications designed to work together known as ______________ .

► Productivity software suites
► Compiled software
► Secure software
► Intelligent software


Because of spending more time on the internet, the distances among the families have been _____.

Increased
Expanded
Contracted
Shortened

Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices

Autonomous Web Agents are also known as _________________

Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"

None of these


A communication protocol is a __________that governs the flow of information over a network.

Set of Methods
Set of Protocols
Set of rules
None of the given choices

By default in a web page Hyper Link for another web page is represented as:

Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given

Monitor is an example of __________devices
Output
Input
Processing
None of the given choices

The code in the ________ portion is the right choice for developing larger JavaScript scripts

Body
At End
Head
eparate

____________________ based on the principles of the logical reasoning ability of humans.

Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these

The key benefit of VPNs over conventional PNs is:

Security
Efficiency
Lower Cost

None of the given choices