CS101 Solved MCQs Covered All Lectures – Virtual University

233
CS101 Latest Quiz

CS101 Solved MCQs Covered All Lecture

1 Compact Disk is Consist of Material: _____Reflective

2 Digital versatile disk capacity is__________MB. 600 to 700

3 SSDs stand for___________Solid State DISCK

4 ASCII codes have ___________combinations 27

5 Unicode’s have a unique pattern of ___________bits. 21

6 MIDI stands for___________ Musical Instrument Digital Interface

7 Integer representation in 2’s complement used normally___________ BITS 23

8 When data being compressed consist of long sequence of___________ same value, the compression technique is called Run Length Encoding

9 SDHC (high capacity) can provide. ___________ GBs 32

10 Mostly computers have additional storage devices___________ is called Message storage

Sr.No MCQS QUESTIONS: ANSWER:

11 Most computers have additional memory device called___________ mass storage is DVD’s and Flash Drive

12 When you want to search Google or search a query on a particular social media ___________ you can add a symbol? “@”

13 Fact sheet of ENIAC having weight ___________ 30 Tons

14 Example of search engine is___________ Google ,yahoo and MSN

15 The rate at which data transfer to or from disk Transfer Rate

16 Computer hardware is the collection of ___________ of computer system Physical Parts

17 A machine especially one programmer by a computer are called ROBOTS

18 Computer science applications are………… 7

19 ———Database learn about will be implement educing tool like Microsoft access

20 ….. One of the ear lie computer device waste Abacus

21 I kilo byte is equal to…….. 1024 byt

22 1 tear byte is equal to……. 1024 GB

23 ……..In one bit we can represent two pattern 0 or 1

24 The bit receiver is known as the machine Main Memory

CS101 Solved MCQs



25 RAM access for —————- Random access Memory

26 The rate at which can be transferred to or from the disk Transfer Rate

27 BDs stand for……………… Blue Ray Disc

28 CAD stand for……… Computer added Design

29 Lousy techniques can often provide then………compression than looses MORE

30 A variation of dictionary encoding is Adaptive dictionary encoding

31 ——– is storage organization in which are ordered in FIFO fashion QUEUE

32 Techniques that allow the steps in the machine cycle to overlap Pipelining

solution of CS101 Mid Term past paper and Final Term Past paper.

33 MP3 do not require transfer rate more than…. 64 kbps

34 ___successfully relayed on communication paths having 40 Mbps Transfer rate. MPEG

35 CPU and main memory connected via…….. BUS

36 MP3 is short for….. MPEG layer 3

37 The best known system for compressing audio is…… MP3

38 The idea of storing a computer’s programmer in its main memory is called……. Stored program concept

39 CPU is designed to recognize institutions encoded as BIT Pattern

40 Collection of instructions along with the encoding system is called Language

41 RISC stands for Reduced Instruction Set Computer

42 A request to transfer the contents of a register to a memory cell is called…….. Store Instruction

43 The commonly used standards for encoding and compressing audio and video were developed. MPEG

44 CPU consists ……..parts: 3 or Three

45 The use of AND operation is an example of the process……..: Masking




46 8Kbps=…………: 1 Kb per Second

47 Communication between computer and other device is handling through apparatus called……: Controller

48 The ability of a controller to access main memory is called DMA

49 WAN is abbreviated of ……..: Wide wire Network

50 The best known system of compressing audio is……. MP3

51 Mp3recording generally require transfer rates of no more than ——kbps. 64

52 To compare sequence of picture in MPEG only some of the pictures called I-Frame

53 A machine CPU and main memory are connected by a collection of wires Called? BUS

54 The idea of storing a computer’s program in its main memory is called? Store Data

55 The now decode the content of its instruction register and executes its by activating the two’s complement addition circulatory with inputs being register? 5 and 6

56 The use of AND operation example of the process called ? Masking

57 The result of circular shift is called? Rotation

58 The result of circular shift is called? Hundred MBPS

59 Communication between computing device is handled over path Serial and parallel communication

60 GbPS is? Billion Bits

61 The portion of an operating system that handles this communication is often called the User Inter face

62 Most file manager allow files to be grouped into a bundle called FOLDER

63 A chain of directories within directions called …. ..path Directory




64 Components of an operating system’s kernel is the Memory Manager

65 The memory manger reserves of storage space on a magnetic disk 4 GB

66 Rom stands for Read Only Memory

solution of CS101 Mid Term past paper and Final Term Past paper.

67 Culprit that auditing systems are designed to detect in the presence sniffing software

68 A network of former type is called …….. network Open

69 Computer network is often classified as: All of these

70 The technique of holding data for output at a later but more convent time is called Spooling

71 A technique that transfer the distribution problem to internet routes…….. Multicast

72 A programmer that enter a computer system disguised as a desirable programmed ———– Trojan horse

73 Transporting audio and video across the internet in real time is known as Streaming

74 If a user is using CGI script on a UNIX server, then the script type is called…….. Server side scripting

75 XML stands for extensible markup language

76 OSI stands for Open Systems Interconnection

77 3… Is a software that infects a computer by inserting itself into programs that already reside in the machine Virus

78 ….is an autonomous program that transfers itself through a network, taking up residence in computer and forwarding copies of itself to other computer. WORM

79 Another form of malicious software is Spyware

80 Dos stands for Denial of service

81 Problem associated with an abundance of unwanted messages is the proliferation of unwanted email called. Spam

82 Prevention tool that has filtering connotation is the….. Proxy Server

83 SSL stands for Secure Sockets Layer

83 SSL stands for Secure Sockets Laye

84 Public key is used for ………messages Encrypt

85 Virus is executed in a computer Before execution of Host

86 Explosion of replicated copies that degrade the performance of legitimate application. This is property of Worm

87 Trojan can enter through games and Unity package

88 Spyware also called Shifting Software

89 Process of overloading a computer with messages. DOS

90 Software that act as a shield to protection from adverse action proxy server

91 Spam filter can distinguish between desired mail and spam TRUE

92 Which key is required to decrypt messages Private Key




93 Computer Fraud and abuse act Cover Theft of information and worms and virus

all Past CS101 Grand Quiz with 100% correct Solution

94 Repeaters passes signals between Two original Busses

95 A bridge is similar to a Repetor

96 Peer-to-peer often abbreviated as P2P

97 ________ service allow clients to rent virtual computers by the hour, without concern for where the computer hardware is actually located Amazon’s Elastic Compute cloud

98 The distinction between the tier-1 and tier-2 ISPs is often a matter of opinion TRUE

99 An access ISP is essentially an independent internet, sometimes called INTERNET

solution of CS101 Mid Term past paper and Final Term Past paper.

100 The process of using DNS to perform a translation is called DONS Lookup

101 VoIP is the abbreviation of Voice over Internet Protocol

102 An enormous portion of current internet traffic is used for transporting audio and video across the internet in real time, is known as Streaming

103 WWW is the abbreviation of World Wide Web TRUE

104 A networking technology called ___________, which enables an end user to automatically connect to the closest server out of a define group of servers helps to make CDNs practical Any cast

105 A second form of VOIP consist of Analogue , Telephone and adaptors

106 The point at which one network is linked to an internet is often called Gateway

107 Distributed system in which many in depended computer work closely together to provide computation or service comparable to a much larger machine? Cluster Computing

108 Each domain must be registered with ICANN process handled by companies called? Registrar

109 DNS mean? Domain Name system

110 Software packages that allow users to access hypertext on the internet fall into categories? Browser and webserver

111 Essentially a notational system by which a text document along with the document’s appearance can be encoded as a simple text file HTML

112 Hypertext document also contain special symbol called? TAGS

113 URL means Uniform source Locator

114 Common Internet brewers include….. Fire Fox safari

115 The distinction is that a hypertext document also contains special symbol.. TAGS

116 A traditional hypertext document is similar text file because text is HTML – encoded… Source Version

117 HTM is essentially a notional system by which text document’s… Simply Text File

118 )Music is traditionally represented does not conform the character by character.. TEXT File

119 The additional activity by either the browser or the web browser Client Side




120 Then it hands these segment known .. Packets

121 Origin prepare a packet it appends a value called .. Hop count

122 If two functions were performed ‘PROCESS LOAN’ AND ‘ REJECTAPPRECIATION’ what should be structure of problem IF-Else Method

CS101 Solved MCQs

123 What should be sequence? Problem devise plan carry plan

124 Stepwise refinement is a strategy to conquered ___ at once TASK

125 Which strategy is contrast to stepwise refinement Bottom-Up Methodology

126 Which has cause Computer science to grow so much Algorithm and problem solving

127 As a general rule the use of a loop structure produces……..off flexibility Higher Degree

128 A method of implementing repetition is the iterative structure knows as LOOP

129 Change the state in such a way that it moves towards the termination condition Modify

130 In each iteration “i” the current value of “i” will…….. With current value of “f” Multiplied

131 The control of a loop consist of how many activities Three

132 Repeat loop structure referred to as a Posttest Loop

133 If we reach the end of the list without finding the target value our search terminates as…. Failure

134 In which collection of instructions called… A body of Loop

135 Write a___ for finding maximum number from a list. Pseudo-Code

136 The loop will keep executing until____ remains smaller or equal to n I

137 Set of steps that define how a task is performed is called Algorithms

138 In Unambiguous, the information in the state of the process must be

sufficient to determine uniquely and completely the actions required by each step. TRUE

CS101 Solved MCQs

139 A single algorithm can be represent in……… Many ways

140 The sentence, ________________ could mean either that the grandchildren cause problems when they come visit or that going to see them is problematic. “Visiting grandchildren can b never racking

141 One semantic structure is the ________ of a computed value. Saving

142 Another common semantic structure is no any reparation execution of a statement or sequence of statement as long as some condition true. True

143 In……. a man in Texas received very high radiations. 1986

144 Which is not the advantage of software verification NONE

145 Computer can execute…….of instructions in a second Billions

146 A measure of the execution time necessary for an algorithm to complete work in a set of DATA

147 In general a recursive function is designed to test for the termination condition often called Base or degenerative Case

148 One method of implementing such repetition is the iterative structure known as: LOOP

149 In which execution of function the tested condition we’re true. ?? Process Loan

CS101 Solved MCQs | Fabby Web

150 select the entry in the list known as: Test Entry

151 A…………methodology progresses from the specific to the general : Bottom UP
152 The collection of instructions called?? BODY

153 the loosely defined problem solving phases presented by the mathematicians G.polya in……….?? 1945 VU




154 Test for termination is performed before the body is executed in pretest loop: TRUE

155 In insertion sort Algorithms lists are sorted out into: Alphabetical ORDER

156 IF our target value is not present in oriental list, our approach to search will proceed as: By dividing into smaller segments

CS101 Solved MCQs

157 Binary search executes each stage of a repetition as a subtask of the previous stage, known as: Recursion

158 A recursive function is designed to test for: Degenerative and base case and Termination condition (ALL)

CS101 Solved MCQs