You are on page 1of 1

MS Academy

Sharqi Colony VEHARI


Name: ___________________College: ____________________________ Date: _______________
1. The top most layer of OSI is:
(a) Session
(b) Physical
(c) Application
(d) Transport
2. MICR stands for:
(a) Magic In Character Redo
(b) Magnetic Ink Character Recorder
(c)Magnetic Ink Character Recognition
(d) Magnetic Inn Computer Reader
3. Which of the following is software?
(a) Telnet
(b) Gopher
(c) HTP
(d) Browser
4. Expansion cards are inserted into:
(a) Slots
(b) Peripheral Device (c) Motherboard
(d) System Bus
5. There are how many types of partition?
(a) 2
(b) 4
(c) 8
(d) 6
6. CPU provides enabling signal through:
(a) Control Unit
(b) Data Bus
(c) Address Bus
(d) Ordinary Bus
7. This would replace the existing text:
(a) Over type
(b) Replace
(c) Insert
(d) Change
8. Copying data from internet to computer is called:
(a) Downsizing
(b) Downloading
(c) Uploading
(d) Transferring
9. Which of the following is the first phase of SDLC?
(a) Design
(b) Coding
(c) Preliminary Investigation (d) Analysis
10. How many types of network standards are there?
(a) 2
(b) 4
(c) 6
(d) 8
11. Checking a computer program from error is called:
(a) Correcting
(b) Running
(c) Bugging
(d) Debugging
12. Trojan horse is a:
(a) Antivirus
(b) Virus
(c) Freeware
(d) Shareware
13. Which one is faster?
(a) RAM
(b) Cache
(c) Register
(d) Hard Disk
14. A block of cell is called:
(a) Workbook
(b) Function
(c) Column
(d) Range
15. Select unguided media:
(a) Twisted pair
(b) Co-axial
(c) Satellite
(d) Fiber Optics
16. A Kilobyte is exactly:
(a) 1 byte
(b) 100 bytes
(c) 256 bytes
(d) 1024 bytes
17. The bottom layer of OSI model is:
(a) Presentation
(b) Physical
(c) Transport
(d) Application
18. Order of stack is:
(a) FIFO
(b) LIFO
(c) GIGO
(d) FIGO
19. _________ is not an output device:
(a) Scanner
(b) Printer
(c) Monitor
(d) Speaker
20. A bit can represent how many different values:
(a) 0
(b) 1
(c) 2
(d) 3
21. Type of language translators are:
(a) 1
(b) 2
(c) 3
(d) 4
22. OSI reference model has layers:
(a) 6
(b) 7
(c) 3
(d) 11
23. Which of the following key is used to cancel an operation?
(a) Arrow
(b) Caps lock
(c) Num lock
(d) ESC
24. An important characteristic of RAM is that is:
(a) Read Only
(b) Write Only
(c) Non Volatile
(d) Volatile
25. World Wide Web introduced in:
(a) 1960s
(b) Mid 1970s
(c) 1989
(d) 2000
26. Computer cannot boot if it does not have:
(a) Compiler
(b) Linker
(c) Interpreter
(d) Operating System
27. Right of person to keep his information away from others is called:
(a) Privacy
(b) Private
(c) Secrecy
(d) Right
28. The process of storing the data in memory is called:
(a) CPU
(b) Data Processing
(c) Stored Memory Concept
(d) Register
29. Computer based training software used in:
(a) Education
(b) Cooking
(c) Manufacturing
(d) Weather Forecasting
30. Which of the following is not component of LAN?
(a) Bridge
(b) Modem
(c) Communication Media
(d) Gateway
31. Circuit board that connects monitor to computer is called
(a) Video Adapter
(b) Monitor Link
(c) Digital cable
(d) Monitor Adapter
Paper composed by Abdul Sattar Joiya
20140205