Friday, September 7, 2018

CSS Paper Past Computer Sciecne MCQs [2010]


Part-1 MCQs 2010

(1).object (also called_____) is a common data type that includes photograph, audio, video, or a document in other applications.
(a) Number (b) BLOB (c) Integer (d) binary (e) none of these

2. in database, a(n) ____ field is a group of related fields.
(a) Table (b) Key (c) Record (d) Primary field (e) Non of these

3. In a database, a(n) ____ field is a field that uniquely identifies each record in a file.
(a) Main (b) Identifying (c) Master (d) Key (e) none of these

4. If a lowest annual fee at a discount warehouse is Rs.2025 and the highest is Rs.5550, a(n)______ on annual fee field ensure it is a value between Rs.2025 and Rs.5550.
(a) Range Check (b) completeness check (c) consistency Check (d) alphabetic/numeric check (e) none of these

5. A DBMS uses the _____ to perform validation checks.
(a) Data Server (b) data smart (c) data warehouse (d) data dictionary (e) none of these

6. _______ is a network technology that defines how messages are routed from one end of a network to other, ensuring the data arrives correctly by dividing it into packets.
(a) HTML (b) XML (c) HTTP (d) TCP/IP (e) none of these

7. When a computer sends data over the Internet, the data is divided into small pieces , or _______
(a) Bundles (b) packets (c) slices (d) baskets (e) none of these

8. The amount of data, instructions and information that can travel over a communication channel sometimes is called _______
(a) broadband (b) base band (c) latency (d) bandwidth (e) none of these

9. fiber optic cables have all of the following advantages over cables that used wire except _______
(a) lower costs & easier installation and modification
(b) Faster data transmission & smaller size
(c) Less susceptible to noise from other device's
(d) Better security for signals during transmission
(e) none of these

10. A_____ is a network that connects computer and devices in a limited geographical area, such as home, school computer laboratory , or office building
(a) LAN (b) MAN (c) WAN (d) VAN (e) none of these

11. with _______ memory , the operating system allocates a portion of storage medium, usually the hard disk , to function as additional RAM
(a) Virtual (b) performance (c) device (d) Manged (e) none of these

12. If a new a device such as printer or scanner is attached to a computer, its _________ must be installed before the device can be used
(a) Driver (b) platform (c) manager (d) kernel (e) none of these

13. A ________ is an icon on the desktop that provides a user with immediate access to a program or file.
(a) kernel (b) spoiler (c) buffer (d) Shortcut (e) none of these

14. ________ a disk or reorganizing it so the files are stored in contiguous sectors, speeds up disk access and thus performance of entire computer .
(a) Formatting (b) Defregmenting (c) Spooling (d) compressing (e) none of these

15. the term computer _______ describes potentially damaging computer program that affects or infects a computer by altering the way the computer works without the users knowledge or permission .
(a) Hot spot (b) File compression Utility (c) Virus (d) File conversion Utility (e) none of these

16. In a diagram ( a DFD diagram was given ) _________ shows the input and output of information into or out from a proses .
(a) Use Case (b) Data Flow (c) entity relationship (d) Class Diagram (e) none of these

17. Although used in all types of business modeling the _____ has been adopted as a standard notation for object modeling.
(a) UML (b) CASE Tool (c) USE CASE Diagram (d) EMR (e) none of these

18. For each input and output, a systems analyst typically develops _______ which is a sample of the input or output and contains actual data.
(a) adoption (b) prototype (c) Mock up (d) feasibility Scheme (e) none of these

19. _________ is a working model of proposed system .
(a0 Adoption (b) feasibility Scheme (c) Mockup (d) Prototype (e) none of these

20. A unit test ________
(a) verifies that each individual program works by itself
(b) verifies that all programs in an application work together properly
(c) verifies that an application works with other applications
(d) is performed by end-users and verifies that the new system works with actual data
(e) none of these

No comments:

Post a Comment

Worth Reading...for Parents

Add caption