CS101 Lesson Wise MCQs

Welcome to your go-to resource for CS101! Here, you’ll find easy-to-follow lesson-wise MCQs, quizzes, and past exam papers to help you prepare for both midterms and finals.

We’ve covered all the key topics from your CS101 course, and each MCQ is designed to test your knowledge with clear, easy-to-understand explanations for every answer.

Here’s what you’ll find on this page:

  • Lesson-wise MCQs: Access MCQs based on each chapter, carefully selected to match your syllabus. Every question comes with detailed explanations to help you understand the concepts better.
  • Quizzes: Test your knowledge with interactive quizzes that make learning fun and easy. Perfect for quick practice or revision.
  • Past Papers: Review past midterm and final exam papers to get a feel for the exam format and improve your preparation. You’ll also get answer keys and explanations to guide you.

Whether you’re preparing for midterms or finals, these resources will help you study smart and score high in CS101. Start practicing today and boost your grades!

 

Quizes

/66

CS 101 : 20 Modules

1 / 66

What is the primary function of RAM in a computer system?

2 / 66

What technology replaced punch cards in the evolution of computers?

3 / 66

How would you search for PDF files containing the term "Computer Science"?

4 / 66

What does the term "query" refer to in the context of search engines?

5 / 66

Which search operator lets you search for pages on a specific website?

6 / 66

Which of the following is a common example of a solid-state drive (SSD)?

7 / 66

Why should you avoid clicking on ads while searching?

8 / 66

What is the function of "zoned-bit recording" in magnetic storage?

9 / 66

What happens when a query like "Flip a Coin" is entered in Google?

10 / 66

Which search engine is the primary focus of the course?

11 / 66

Why is hexadecimal notation commonly used in computing?

12 / 66

Which of the following tasks can Google perform apart from searching webpages?

13 / 66

What is a common reason to avoid certain internet searches, such as celebrity scandals?

14 / 66

**What is the primary goal of computer programming?**

15 / 66

What advantage does a flash drive offer over traditional optical storage?

16 / 66

What was a notable limitation of the ENIAC computer?

17 / 66

What Boolean operation returns true only when both operands are true?

18 / 66

What does ENIAC stand for?

19 / 66

How would you search for the definition of a term on Google?

20 / 66

**An algorithm can be defined as ________.**

21 / 66

What does the Boolean OR operation return?

22 / 66

What does "BD" stand for in optical storage?

23 / 66

How is the NOT Boolean operation best described?

24 / 66

Which Boolean operation is also known as "exclusive OR"?

25 / 66

What is the purpose of studying algorithms in this course?

26 / 66

How did punch cards contribute to early computing?

27 / 66

**In which of the following fields is Computer Science NOT significantly applied?**

28 / 66

What is the main purpose of Breadth First Learning in this course?

29 / 66

If you wanted to search for information about a stock like Apple, which query would you use?

30 / 66

Which operator restricts search results to pages where all specified terms are in the URL?

31 / 66

What distinguishes SDRAM from DRAM?

32 / 66

What does the "define:" operator do in a search query?

33 / 66

What is the main advantage of learning about Data Abstraction in Computer Science?

34 / 66

In hexadecimal, what is the decimal equivalent of the value "1A"?

35 / 66

What is the main advantage of optical storage compared to magnetic storage?

36 / 66

Which storage medium uses lasers to read and write data?

37 / 66

What query would you use to find PDF files related to Virtual University?

38 / 66

What is a major limitation of magnetic storage systems?

39 / 66

Which hexadecimal value corresponds to the binary number 1111?

40 / 66

Which search operator helps compare nutritional values of food items?

41 / 66

What is the purpose of using two dots (..) in a Google search query?

42 / 66

How do you exclude specific words from a Google search query?

43 / 66

**Which of the following is considered part of computer hardware?**

44 / 66

**Computer graphics are primarily used in ________.**

45 / 66

Which symbol is used in a Google query to search specifically within social media platforms?

46 / 66

What computing device is considered one of the earliest tools for calculation?

47 / 66

Which factor directly affects seek time in magnetic storage devices?

48 / 66

What is a potential danger of searching for random software online?

49 / 66

What should you type in Google to see the weather in Lahore?

50 / 66

Which Google search operator is used to search for an exact phrase?

51 / 66

What does hexadecimal notation use as its base?

52 / 66

**What is the main function of computer software?**

53 / 66

To find cached content of a webpage on Google, which operator should be used?

54 / 66

**What is the primary purpose of computer security controls?**

55 / 66

To find movie information, which operator should you use in Google search?

56 / 66

To see maps of Lahore, which query should you use?

57 / 66

How can you search for images on Google using an existing image?

58 / 66

Which Boolean operator would return results containing either or both terms specified in the query?

59 / 66

**What is the role of a database management system (DBMS)?**

60 / 66

What does a "bit" represent in computing?

61 / 66

What is the purpose of proximity search in Google?

62 / 66

**A network that connects computers to share resources is called a ________.**

63 / 66

How many bits are in a byte?

64 / 66

How does Google handle capitalization in search queries?

65 / 66

Why is learning the basics of Computer Science considered essential for all fields?

66 / 66

Which software tool will be used to demonstrate spreadsheet functionalities in this course?

Your score is

0%

Quizes

/80

CS 101 : 21-40 Modules

1 / 80

What numeric system is primarily used to represent values in computers?

2 / 80

What does the term "LAN" stand for in networking?

3 / 80

Which device typically connects multiple LANs and routes traffic between them?

4 / 80

Which protocol is used for resolving domain names into IP addresses?

5 / 80

What is the main disadvantage of a bus topology?

6 / 80

Which protocol is used to dynamically assign IP addresses to devices on a network?

7 / 80

How does a router differ from a switch?

8 / 80

Which protocol is primarily used for sending emails?

9 / 80

What is the primary difference between IPv4 and IPv6?

10 / 80

What does MIDI stand for in sound representation?

11 / 80

What is a subnet mask used for in networking?

12 / 80

What is the purpose of the HTTP protocol?

13 / 80

What is the primary function of a computer's operating system?

14 / 80

What is the primary purpose of a URL's query string?

15 / 80

What is the primary function of the ICMP protocol?

16 / 80

What does the acronym FAT stand for in file systems?

17 / 80

What is the purpose of virtual memory in a computer system?

18 / 80

Which method is used to scale images without losing geometric accuracy?

19 / 80

What technology underlies flash drives for data storage?

20 / 80

Which type of network uses public infrastructure to provide secure connections?

21 / 80

What is the function of the default gateway in a network?

22 / 80

What is brightness in an image determined by?

23 / 80

What is a loopback IP address commonly used for?

24 / 80

Which part of the URL "https://www.example.com/page" specifies the protocol?

25 / 80

What does UTF-8 stand for?

26 / 80

Which type of user interface involves typing commands?

27 / 80

What is the main purpose of a firewall in computer networks?

28 / 80

What layer of the OSI model is responsible for routing packets?

29 / 80

What is a drawback of using wireless networks compared to wired networks?

30 / 80

How does a multitasking operating system differ from a single-tasking one?

31 / 80

Which protocol ensures secure data communication over the internet by encrypting HTTP traffic?

32 / 80

What does the acronym VPN stand for?

33 / 80

How are fractional numbers represented in binary?

34 / 80

In sound encoding, what is a "sample interval"?

35 / 80

In which layer of the OSI model does the HTTP protocol operate?

36 / 80

What happens when a user enters a domain name in their browser?

37 / 80

Which type of IP address can change each time a device connects to the network?

38 / 80

What is the primary advantage of using NAT (Network Address Translation)?

39 / 80

What does the HTTP status code 404 indicate?

40 / 80

What is the primary function of a network switch?

41 / 80

What is the purpose of a radix point in binary fractions?

42 / 80

What is the purpose of a DNS resolver?

43 / 80

What is the purpose of the UDP protocol?

44 / 80

Which top-level domain (TLD) is commonly used for commercial websites?

45 / 80

What is the purpose of a URL (Uniform Resource Locator)?

46 / 80

What is the limitation of ASCII codes for text representation?

47 / 80

How is color typically represented in a bitmap image?

48 / 80

What is a primary characteristic of a peer-to-peer (P2P) network?

49 / 80

What is the purpose of the HTTPS protocol?

50 / 80

What is the primary advantage of binary representation in computers?

51 / 80

Which network topology connects all devices to a central hub?

52 / 80

What protocol is commonly used for secure file transfer over the internet?

53 / 80

What is a key difference between SSDs and traditional hard drives?

54 / 80

In a wireless network, which standard is commonly used for home Wi-Fi?

55 / 80

How is sound amplitude represented digitally?

56 / 80

Which component is considered the core of an operating system?

57 / 80

How does Unicode address the limitations of ASCII?

58 / 80

What is the primary purpose of an IP address in a network?

59 / 80

What is the primary goal of file management in an operating system?

60 / 80

What does the top-level domain (TLD) ".edu" signify?

61 / 80

What does FTP stand for?

62 / 80

What is the maximum number of bits in an IPv4 address?

63 / 80

What is the primary purpose of a MAC address?

64 / 80

What problem arises when using Unicode for numeric data representation?

65 / 80

What is the role of an IP address in a computer network?

66 / 80

Which type of network is specifically designed for large geographic areas, such as a city or country?

67 / 80

In a multi-tasking operating system, what does the scheduler manage?

68 / 80

What is the function of device drivers in an operating system?

69 / 80

What does DNS stand for in networking?

70 / 80

Which protocol is primarily responsible for IP address resolution to physical MAC addresses?

71 / 80

What does a repeater do in a computer network?

72 / 80

What is an alternative method for sound encoding besides amplitude sampling?

73 / 80

Which search operator converts decimal numbers into binary?

74 / 80

What is the role of an ARP (Address Resolution Protocol)?

75 / 80

What does CIDR stand for in networking?

76 / 80

What is the smallest unit of a digital image?

77 / 80

What is a primary benefit of UTF-8 encoding?

78 / 80

What does the TCP protocol provide in networking?

79 / 80

What is the primary function of a domain name in the internet infrastructure?

80 / 80

What is the purpose of a bootloader?

Your score is

0%

Quizes

/49

41 to 61 Modules

1 / 49

What type of operating system is designed for real-time applications?

2 / 49

What is the defining feature of a WAN?

3 / 49

What does the term “protocol” refer to in networking?

4 / 49

What is the function of the IP protocol in networking?

5 / 49

In the booting process, what ensures that all hardware components are functioning correctly?

6 / 49

What is the primary method for detecting a deadlock?

7 / 49

What is the difference between a binary semaphore and a counting semaphore?

8 / 49

Which component of an operating system is most likely targeted in a malware attack?

9 / 49

What is the primary purpose of a file system in an operating system?

10 / 49

In semaphore operations, what does the “signal” function do?

11 / 49

What is the result of a process attempting to access a semaphore with a value of zero?

12 / 49

What does LAN stand for in networking?

13 / 49

Which of the following is NOT a component of an operating system?

14 / 49

What role does the kernel play after the booting process is complete?

15 / 49

Which type of malicious software replicates itself to spread to other systems?

16 / 49

What is mutual exclusion in process handling?

17 / 49

What is a deadlock in operating systems?

18 / 49

Which classification of software includes compilers and debuggers?

19 / 49

What is the function of the process scheduler in an operating system?

20 / 49

Which technique can prevent deadlocks in a system?

21 / 49

What distinguishes an “inside” security attack from an “outside” attack?

22 / 49

What is the difference between cold boot and warm boot?

23 / 49

What is the difference between TCP and UDP?

24 / 49

What is the main role of device drivers in the operating system?

25 / 49

What is the first step in the booting process of a computer?

26 / 49

Which protocol is primarily used for email transmission over the Internet?

27 / 49

What is the primary purpose of process administration in an operating system?

28 / 49

Which of the following is a type of external security attack?

29 / 49

What does the term “handling competition between processes” refer to?

30 / 49

Which component of an operating system is responsible for managing files?

31 / 49

Which component of an operating system directly interacts with the hardware?

32 / 49

What is a primary purpose of process administration in an operating system?

33 / 49

What is the role of device drivers in an operating system?

34 / 49

How do semaphores prevent race conditions?

35 / 49

During the booting process, what is the primary role of the boot loader?

36 / 49

Which system software is essential for booting a computer?

37 / 49

What is the primary function of the shell in an operating system?

38 / 49

Which networking topology uses a central hub to connect devices?

39 / 49

What is the purpose of using firewalls against external security threats?

40 / 49

Which of the following is NOT a necessary condition for deadlock?

41 / 49

Which type of semaphore allows multiple processes to access a resource?

42 / 49

In software classification, what category does an operating system fall under?

43 / 49

What is a key advantage of combining networks?

44 / 49

How are computer networks classified?

45 / 49

What is a semaphore in the context of operating systems?

46 / 49

What is the primary function of the HTTP protocol?

47 / 49

What is the main goal of a Distributed Denial of Service (DDoS) attack?

48 / 49

Which problem arises when two or more processes need the same resource simultaneously?

49 / 49

Which component is loaded into memory by the boot loader?

Your score is

0%

Quizes

/70

CS 101 62 to 81

1 / 70

What does the tag’s src attribute specify?

2 / 70

What happens when a mnemonic domain name is used to send a message?

3 / 70

What is inter-process communication?

4 / 70

What is a domain in the context of Internet addressing?

5 / 70

Which attack type involves overwhelming a target with excessive messages to disrupt service?

6 / 70

Which organization is responsible for assigning blocks of IP addresses?

7 / 70

In peer-to-peer networks, what term is used to describe the collection of participating peers?

8 / 70

Which statement is correct about communication models on the same network?

9 / 70

Why is the peer-to-peer model preferred for file sharing in some cases?

10 / 70

What is the primary use of the HTML tag?

11 / 70

Which of the following is a drawback of Skype’s VoIP system?

12 / 70

Which of the following best describes client-side scripting?

13 / 70

What does the suffix “edu” in a domain name represent?

14 / 70

What type of device is used in embedded VoIP phones?

15 / 70

What does multimedia streaming typically involve?

16 / 70

What happens when a user clicks on a highlighted word linked with anchor tags?

17 / 70

Which layer of Internet software is responsible for the physical transmission of data?

18 / 70

What role does the print server play in the client/server model?

19 / 70

What is the bit size of the newer IP addressing system being implemented?

20 / 70

Which organization is responsible for assigning blocks of IP addresses?

21 / 70

Which technology uses multiple connected computers to handle tasks similar to a supercomputer?

22 / 70

What is a domain in the context of Internet addressing?

23 / 70

What is the primary communication model used in VoIP systems?

24 / 70

What does a forwarding table in the network layer do?

25 / 70

What is the main purpose of assigning port numbers to Internet applications?

26 / 70

What is the purpose of dotted decimal notation in IP addresses?

27 / 70

Which tag is used to include an image in an HTML webpage?

28 / 70

Which HTML tag is required to make a webpage interactive with clickable links?

Quizes

/70

CS 101 62 to 81

1 / 70

Why did the World Wide Web become dominant by the mid-1990s?

2 / 70

What is a domain in the context of Internet addressing?

3 / 70

Which technology uses multiple connected computers to handle tasks similar to a supercomputer?

4 / 70

What is meant by a 'hot spot' in networking terms?

5 / 70

What does the suffix “edu” in a domain name represent?

6 / 70

Which protocol is used by web browsers to transfer hypertext documents?

7 / 70

What does the transport layer in the Internet software hierarchy do?

8 / 70

What role does the print server play in the client/server model?

9 / 70

Which type of TLD is "au" in the domain name example?

10 / 70

How does the “Try it Yourself” feature on W3Schools benefit users?

11 / 70

What does VoIP stand for?

12 / 70

Which organization is responsible for assigning blocks of IP addresses?

13 / 70

What happens when a mnemonic domain name is used to send a message?

14 / 70

What is the purpose of dotted decimal notation in IP addresses?

15 / 70

What is the purpose of the href attribute in an anchor tag?

16 / 70

Where is the best place to position the tag for an image to appear at the top of the webpage?

17 / 70

Why is the peer-to-peer model preferred for file sharing in some cases?

18 / 70

Which protocol is best suited for applications requiring speed over reliability?

19 / 70

What is the primary purpose of IP addresses on the Internet?

20 / 70

What does the src attribute in the tag represent?

21 / 70

What is the primary difference between TCP and UDP?

22 / 70

What is the key difference between the client/server and peer-to-peer (P2P) models?

23 / 70

How can an image be displayed at the bottom of a webpage?

24 / 70

What is the role of the domain name system (DNS)?

25 / 70

What does multimedia streaming typically involve?

26 / 70

What does the tag’s src attribute specify?

27 / 70

Which attack type involves overwhelming a target with excessive messages to disrupt service?

28 / 70

Which of the following is true about XHTML?

29 / 70

What are anchor tags in HTML used for?

Quizes

/77

CS 101 : Quizes

1 / 77

Most _ codes used today are Huffman codes.

2 / 77

The world's first electronic digital computer:

3 / 77

Refers to distributed systems that are more loosely coupled than clusters but that still work together to accomplish large tasks.

4 / 77

If a computer could pass the Turing test, it would be able to:

5 / 77

Deep Blue, a supercomputer designed by IBM:

6 / 77

A sequence of transactions in which the user establishes initial contact with a computer’s operating system is called:

7 / 77

The loop structure referred to as a posttest loop is:

8 / 77

Capacity of one sector CD is of KB.

9 / 77

The layer responsible for providing addresses compatible with the Internet infrastructure is the Network layer.

10 / 77

Access to forbidden literature is because of:

11 / 77

In some cases, the data collection process is readily apparent; in others, it is:

12 / 77

Page group includes options:

13 / 77

A supercomputer could analyze 300 billion chess moves in three minutes:

14 / 77

Deep Blue:

15 / 77

Global variables are:

16 / 77

World's first program was written by:

17 / 77

Within a transfer category, which instruction communicates with devices outside the CPU?

18 / 77

The address of a file accessible on the Internet is referred to as a URL.

19 / 77

Electronic theft includes:

20 / 77

The 'Save As' command is used to:

21 / 77

Which of the following is a correct shortcut for copying in MS-Word?

22 / 77

The memory manager allocates:

23 / 77

A transport layer is said to establish a connection before sending a message.

24 / 77

Microsoft Office includes:

25 / 77

Ada wrote a program for computing on the Analytical Engine - the world’s first computer program:

26 / 77

A special-purpose computer that connects and translates between networks that use different communication protocols is called:

27 / 77

In black and white images, each pixel is represented as one bit—e.g., 0 for black and 1 for white. It is an example of:

28 / 77

A programming language specifically designed by the US Dept. of Defense for developing military applications:

29 / 77

_ refers to distributed systems that are more loosely coupled than clusters but that still work together to accomplish large tasks.

30 / 77

Time required for the desired data to rotate to the read/write head is called:

31 / 77

Which loop structure is referred to as a pretest loop?

32 / 77

Which instruction is used for communicating with devices outside the CPU?

33 / 77

A bit is:

34 / 77

VoIP consists of two processes on different machines transferring audio data via the model:

35 / 77

Web server:

36 / 77

What is the maximum number of characters allowed in a single cell in Excel?

37 / 77

Who introduced the idea of storing programs in main memory?

38 / 77

Which of the following is used to calculate the average of a range of numbers in Excel?

39 / 77

Which Excel function would you use to calculate the sum of a range of cells?

40 / 77

Which of the following is used to change text formatting in MS-Word?

41 / 77

Editing group has commands:

42 / 77

In an HTML document, is called the:

47 / 77

50 / 77

53 / 77

55 / 77

59 / 77

61 / 77

62 / 77

65 / 77

68 / 77

69 / 77

70 / 77

71 / 77

75 / 77

Mid Term

/37

CS 101 MID TERM

1 / 37

Shortcut key for cut is:

2 / 37

Attacks can be made to prevent access to a website by crashing:

3 / 37

Option in MS-Word to prevent others from making changes to selected text:

4 / 37

There are many types of sensors including:

5 / 37

45. Ethics and legality are essentials in many industries, including:

6 / 37

_ is not only used as a means of retrieving data from mass storage but also as a means of retrieving items from large blocks of data storage in main memory:

7 / 37

Turing predicted a machine’s chance to pass the Turing test in the year:

8 / 37

A program DOCTOR developed by Joseph Weizenbaum in the mid-1960s was named:

9 / 37

Computer security is also known as:

10 / 37

MS-Word is an example of:

11 / 37

When we use _ tag while searching, it shows only particular pages related to it:

12 / 37

Shortcut key to paste is:

13 / 37

To control access to the printer, the _ must keep track of whether the printer has been allocated:

14 / 37

By using MPEG and MP3 compression techniques, video cameras are able to record video within:

15 / 37

The amount of paper used in a year is:

16 / 37

If we are interested to see the map of some location, we can use the map operator in the following way:

17 / 37

Computer Security is also known as:

18 / 37

Reports can be received at home through email because of advancements in:

19 / 37

Researchers are trying to develop systems that exhibit intelligent behavior in:

20 / 37

In MS-Word, different types of effects on text can be applied with:

21 / 37

Termination condition is:

22 / 37

We can add charts in MS-Word from the group:

23 / 37

When we draw a table in MS-Word, the table has initial column(s):

24 / 37

Contact risks include:

25 / 37

The most famous word processor is:

26 / 37

Who introduced the idea of storing the program in main memory?

27 / 37

We can increase the size of text from the home ribbon group called:

28 / 37

In CS, we store and link data in an organized way using:

29 / 37

In the United States, the Privacy Act of 1974 was to protect citizens from abusive use of databases by:

30 / 37

The people present around the e-waste gain:

31 / 37

IPR stands for:

32 / 37

Ctrl + Z is used for:

33 / 37

Loop structures referred to as a posttest loop:

34 / 37

In the reverse engineering process, what refers to the sophistication of the design information that can be extracted from the source code?

35 / 37

The field of artificial intelligence is being pursued along _ paths:

36 / 37

Matching Geometric Characteristics technique Cannot read:

37 / 37

Pages is an option in the ribbon:

Your score is

0%

Mid Term

/84

CS 101 MID TERM 2

1 / 84

_ is a related collection of WWW files that includes a beginning file called a homepage:

2 / 84

_ is the process of analyzing large databases to identify patterns:

3 / 84

Which is the user-friendly way of presenting data?

4 / 84

The term “Identifier” in JavaScript refers to:

5 / 84

All the hardware components of the computer system are installed on:

6 / 84

A _ transport layer is used to establish a connection before sending a message:

7 / 84

In spreadsheets, cell address A12 means:

8 / 84

The bit 0 represents the value false, and bit 1 represents the value:

9 / 84

Pseudo code is language:

10 / 84

Repeated erasing slowly _ the silicon dioxide chambers:

11 / 84

Capacity of one sector of a CD is _ KB:

12 / 84

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as:

13 / 84

We need _ memory to store data permanently:

14 / 84

While ( ): here what will be written?

15 / 84

Distance learning has got a boost due to the:

16 / 84

Establishing a well-defined set of building blocks from which algorithm representations can be constructed is called a:

17 / 84

The _ in the state of the process must be sufficient to determine uniquely and completely the action required by each step:

18 / 84

In computers, GUI stands for:

19 / 84

The structure in which another list starts before the first list is finished is called:

20 / 84

How many comparisons are required to sort the elements using the insertion sort algorithm?

21 / 84

The name of the computer language used by the Defense Department of the United States is:

22 / 84

Which one of the following is the correct code syntax in JavaScript?

23 / 84

_ language cannot be executed without an interpreter:

24 / 84

In black-and-white images, each pixel is represented as one bit – e.g., 0 for black and 1 for white. It is an example of:

25 / 84

In 2's complement, the maximum positive number is represented by:

26 / 84

Distinction between a program believed to be correct and a program that is correct is:

27 / 84

_ connects computers over a large geographical area of the world:

28 / 84

A large number of networks interconnected physically is called:

29 / 84

JavaScript has _ ability to create and draw graphics:

30 / 84

When the user needs something to be done by the computer, they give instructions in the form of _ to computer hardware:

31 / 84

What is the full form of JSP?

32 / 84

When applied to a list with n entries, the binary search algorithm will interrogate an average of _ entries:

33 / 84

_ provides a network with internet connectivity:

34 / 84

_ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without a restart:

35 / 84

Language of the microprocessor is called:

36 / 84

Total number of elements in a flowchart are:

37 / 84

An algorithm is _ and distinct from its representation:

38 / 84

Breaking the tasks into a number of subtasks compatible with the number of available processors is called:

39 / 84

One of the major uses of the _ operation is to place zeros in one part of a bit pattern while not disturbing the other part:

40 / 84

If you want to search for an exact phrase on Google, then enclose it in:

41 / 84

_ is a malware that gathers data about your activities on the system and forwards it to an outside party without your consent:

42 / 84

Starting with vocabulary words and then giving students a reading passage is an example of:

43 / 84

_ technique can be used to create smooth animations or to display one of several images based on the requirement:

44 / 84

One term could be used for more than one thing. For example, the word "Jaguar" is used in two meanings such as:

45 / 84

The key feature of scientific/engineering/graphics applications is:

46 / 84

Telnet is used to _ between two systems:

47 / 84

For a network to function reliably, it is important to establish rules by which activities are conducted. Such rules are called:

48 / 84

A printer is an _ device:

49 / 84

The _ is becoming the preferred organizational structure for more and more organizations with the passage of time:

50 / 84

The group of technologies concerned with capturing, processing, and transmitting information in digital electronic form is called:

51 / 84

A single algorithm can be represented in _ way(s):

52 / 84

Which of the following is true about TCP in comparison to UDP?

53 / 84

_ retains its information when the power of the system is turned off:

54 / 84

If we use insertion sort for names Fred, Alex, Diana, Byron, Carol, one approach to sorting this list is to note that the sublist consists of:

55 / 84

Tags are always placed between the `` and `` tags of a web page:

56 / 84

Most _ codes used today are Huffman codes:

57 / 84

JavaScript function `fixed()` has equivalent HTML tag-set:

58 / 84

One of the earliest computing devices was the:

59 / 84

By default, in a web page, a hyperlink for another web page is represented as:

60 / 84

The key property of the 'Array' object in JavaScript is:

61 / 84

_ determine the number of bits to move the radix point to either left or right:

62 / 84

Command which saves the selected text before deleting it is:

63 / 84

_ contains the information needed by a browser to contact the proper server and request the desired document:

64 / 84

For drawing charts based on mathematical calculations, which of the following software is most efficient and easiest to use?

65 / 84

TCP stands for:

66 / 84

The repetitive use of instructions or sequences of instructions is an important algorithmic concept. This repetition is implemented using the iterative structure known as a:

67 / 84

Structures, in which another list starts before the first list is finished, are called:

68 / 84

A sequence of transactions in which the user establishes initial contact with a computer operating system is called:

69 / 84

Generally, how many steps does a machine cycle have?

70 / 84

Choose the correct sequence of technologies used in the evolution of computers from the start to today:

71 / 84

Which one of the following is correct for the symbolic representation of primitives?

72 / 84

Post-test loop structure refers to:

73 / 84

On social media, sometimes a particular _ is very popular:

74 / 84

The set of tasks that ensures the software correctly implements a specific function is known as:

75 / 84

Due to working at home, lack of interaction may result in _ professional growth:

76 / 84

The computers of the _ were not very flexible or efficient:

77 / 84

Google Drive is an example of:

78 / 84

A CPU designed to execute a minimal set of instructions is called a:

79 / 84

Which one of the following is true about a process?

80 / 84

_ refers to distributed systems that are more loosely coupled than clusters but still work together to accomplish large tasks:

81 / 84

The encryption of data is related to:

82 / 84

Which one is the example of spreadsheet software?

83 / 84

You might search the following or similar things and get unpleasant results which might depress you:

84 / 84

ENIAC stands for:

Your score is

0%

Mid Term

/18

CS 101 MID TERM 3

1 / 18

By today’s standards, the Mark-I was slow, requiring 3 to 5 seconds for a multiplication operation:

2 / 18

The number of steps required to execute an algorithm can be used to measure:

3 / 18

JavaScript stores all numbers as:

4 / 18

The effect of the paragraph tag (

) in a webpage is that it:

5 / 18

A set of stand-alone productivity applications designed to work together is known as:

6 / 18

Select the variable name which is invalid in JavaScript:

7 / 18

The oldest GUI-based web browser is:

8 / 18

There are NO standard rules to write Pseudocode:

9 / 18

The memory size of the Altair 8800 was:

10 / 18

Bit-mapped graphics are also known as:

11 / 18

_ are the best choice for showing data generally needed to be expressed in percentage:

12 / 18

Which one of the following is not a building block of an algorithm?

13 / 18

_ converts the source code written in a high-level language into machine language code:

14 / 18

In flowcharts, there is only one entry point in conditions, while there are _ exit points:

15 / 18

is an example of:

16 / 18

Which of the following symbols is used in JavaScript to add multiple line comments in a program?

17 / 18

_ semicolon is used to terminate all JavaScript statements:

18 / 18

To make a text bold in HTML, the tag used is:

Your score is

0%