) A collection of raw facts and figure is called



Final Test Zawiya Academy Marks= 80

Entry test 2007 time 1 hr

1) A collection of raw facts and figure is called

a) data b) information c) processing d) none

2) a computer’s main functions to

a) convert information into storage b) convert data into information

c) Display data d) create data from information

3) data processing is also known as

a) calculating b) computing c) information technology d) merging

4) the piece of hardware that permanently holds data and programs is called

a) primary storage b) CPU c) secondary storage d)output

5) Which of the following is not a secondary storage device?

a) CD-ROM b) hard disk c) DVD-ROM d) CPU

6) Step by step instructions that run the computer are called

a) Hardware b) documents c) CPU d) software

7) Another name for main memory is

a) Secondary b) disk storage c) primary storage d) tape storage

8) which of the following is an example of system software

a) Operating system b) utility program c) drivers d) all

9) Which software is used to solve everyday personal or business tasks?

a) Custom software b) system software c)application software d) none

10) The ways of entering data in computer and presenting information generated by the system are called

a) Processing b) input/output c) storage/retrieval d) data generation

11) The primary difference between a LAN and WAN is

a) The no. of software programs available b) Distance

c) The variety of hardware devices d) The number of hardware devices

12) What type of network is the internet?

a) LAN b) MAN c) WAN d) None

13) NIC stands for

a) Network internal card b) Newer industrial computer

c) Networking internet connection d) Network interface card

14) Which of the following is a LAN protocol?

a) Ethernet b) token ring c) ARC net d) all

15) The act of listening to the medium fro a message is called

a)contention b)carrier sensing c) collision d)transparency

16) a device that is used to connect two computers via an ordinary telephone line is

a) Ethernet Card b) Graphic Card c) Modem d) Sound Card

17) a network that places all nodes on a single cable is called

a)star b) ring c)band d)bus

18) one or more computers connected to hub computer is called

a) Ring network b) band c) bus d) star network

19) topology that is used for small no. of computers is called

a) Star b) bus c) mesh d) ring

20) which data transmission type uses a clock to control the timing of bits being sent

a) Synchronous b) asynchronous c) parallel d) none

21) which of the following technique uses modulation

a) bandwidth b) broad band c) base band d) none

22) a communication technique that is used to transmit large volume of data over log distance is called

a) Bandwidth b) broadband c) baseband d) none

23) The communication channels can be divided into

a) Two types b) four types c) seven types d) none

24) Which of the transmission media is used in LAN?

a) Satellite b) microwave c) coaxial cable d) none

25) An important property of fiber optic cable is

a) Noise b) reflection c) interference d) attenuation

26) The time taken by a data signal to reach to moon and then back to earth was bout

a) 2 minutes b) 2 seconds c) 2ms d) 2 hours

27) Microwave transmission, coaxial cable and fiber optics are examples of

a) Modems b) routers c) transmission media d) ring network

28) All of the following are guided communications media except

a) Twisted pair b) fiber –optic cables c) coaxial cables d) satellite base microwave

29) Which of the following is not a communication media?

a) Twisted pair b) UTP c) microwave d) modem

30) Which communication medium requires line-of-sight?

a)microwave b) fiber optic c) twisted pair d) coaxial

31) Protecting computers and the information they contain against unwanted access,damage,modification or destruction is called

a) Computer monitoring b) electronic policing c) audit control d) compute security

32) Restricted access to the server computer room is a form of

a) logical security b) enterprise security c) physical security d) user security

33) The measurement of things such as fingerprints and retinal scans used for security access is called

a) Biometrics b) bio-measurement c) computer security d) smart weapon

34) Which of the following is an example of a good password?

a) Name of a partner or spouse b) name of a child or pet c) word related to job or hobby d) none of the above

35) Which of the following is NOT one of the ways to protect your password?

a) Use last name for password b) change password frequently c) never write down password d) never tell anyone your password

36) A program that interferes with the normal routine of the computers is called

a) Virus b) antivirus c) freeware d) shareware

37) Which of the following is a computer virus

a) Chernobyl b) logic bomb c) redlof d) all

38) Which of the following word processing features best helps to give an overall view of the document, showing multiple pages at once?

a) Pagination b) page setup c) print preview d) document stretching

39) the name of the document is displayed

a) At the top of the document b) in title bar of application window c) in the status bar d) only when you save document

40) in which of the following ways text can’t be aligned

a) Top b) left c) right d) center

41) spread sheet is a grid of

a) Row b) column c) row and column d) none

42) the intersection between a row and a column is called

a) Intersection b) cell c) field d) address

43) in electronic spreadsheets ,alphanumeric combinations such as A5,B9,D15 are

a) Row identifiers b) cell addresses c) formulas d) functions

44) a block of cells called

a) Workbook b) function c) columns d) range

45) a formula begins with

a) Equal to b) = c) = = d)

46) the position of data in a cell is called

a) Direction b) alignment c) position d) placement

47) the actual working area of Microsoft excel is

a) Workbook b) worksheet c) note sheet d) none

48) Who owns the internet?

a) U.S Government b) Pak.telecom c) united nations d) none

49) A computer can be linked to internet through

a) a phone-line modem b) DSL c) cable modem d) all

50) how many types of addressing schemes

a) 3 b) 2 c) 5 d) 8

51) every host computer on the internet has a(n)

a) Similar IP address b) unique 15-digit number c) unique IP address d) all

52) An IP address is a(n)

a) string of four umbers separated by periods b) string of names separated by dots to specify the exact internet location c) open standard d) peer-to-peer identifier

53) a standard IP address is composed of total of

a) 4 bits b) 16 bits c) 32 bits d) 256 bits

54) the system that translated an IP address into an easier name is called

a) packet-switching domain system b) domain name system c) domain d) domain numbering system

55) which of the following is top level domain

a) http b) .com c) HTML d)URL

56) all of the following are top level domain EXCEPT

a) .mil b) .org c) .gov d) .army

57) How does internet differentiate one computer from another?

a) architecture b) manufacturer c) IP address d) all

58) What is the protocol in the URL ?

a) www b) http c) Microsoft d) .com

59) ISP stands for

a) international service provider b) internet service provider c) interlinked services provision d) none

60) software used to access the internet is called

a) browser b) packaged c) spreadsheet d) HTTP

61) Which of the following is a specialized server found on the internet?

a) Email b) file(ftp)server c) web server e) all

62) A collection of documents stored on computer permanently connected with internet around the world is called

a) Telnet b) WWW c) LAN d) FTP

63) C is a

a) high level language b) low level language c) assembly language d) machine language

64) turbo c++ can compile

a) C++ programs only b) C and C++ programs c) turbo C programs only d) turbo C++ programs only

65) Debug is the process of

a) creating bugs in program b) identifying and removing errors c) identifying errors d) removing errors

66) C was designed to write programs for

a) windows operating system b) Solaris operating system c) UNIX d) OS/2

67) preprocessor directives are commands for

a) microprocessor b) language processor c) C processor d) loader

68) the expression in define directives

a) can only be changed at the end of the program b) can not be change

a) can not be changed but can be redefine d) can not be assigned a value

69) which of the following language requires no translator to execute the program

a) C b) C++ c) machine language d) assembly language

70) .exe file is produced by the

a) linker b) loader c) compiler d) interpreter

71) which of the following key is used to save a file

a) F2 b) F3 c) F9 d) F5

72) Void occupy how many bytes in memory

a) zero b) one c) two d)four

73) variables are created in

a) RAM b) ROM c) Hard Disk d) Cache

74) Which of the following is a valid character constant

a) a b) “b” c) ‘6’ d) =

75) Which of the following data type offers the highest precision?

a) float b) ling int c) long double d) unsigned long int

76) when the result of the computation of two very small numbers is too small to be represented, this phenomenon is called

a) arithmetic overflows b) arithmetic underflow c) truncation d) round off

77) the symbol ‘=’ represents:

a) comparison operator b) assignment operator c) equal-to operator d) none of these

78) Which of the following operators has lowest precedence?

a) ! b) + c) = d) = =

79) relational operators are used to

a) establish a relationship among variables b) compare two values c) construct compound condition d) perform arithmetic operations

80) C is strongly typed language ,this means that:

a) every program must be compiled before execution b) every variable must be declared before it is being used c) the variable declaration als9 defines the variable d) sufficient data types are available to manipulate each type of data

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download