National Testing Service of Pakistan
solved previous MCQs
To locate a data item for storage is
a. Field
b. Feed
c. Database
d. Fetch
ans.d. Fetch
2. programs designed to perform specific tasks is known as
a. system software
b. application software
c. utility programs
d. operating system
ans.b. application software
3. perforated paper used as input of output media is known as
a. paper tapes
b. magnetic tape
c. punched papers tape
d. card punch
ans.a. paper tapes
4. Time during which a job is processed by the computer is
a. Delay times
b. Real time
c. Execution time
d. Down time
ans.c. Execution time
5. a computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as
a. Super computer
b. Mini computer
c. Micro computer
d. Macro computer
ans.a. Super computer
6. An approach that permits the computer to work on several programs instead of one is
a. On-line thesaurus
b. Multiprogramming
c. Over lapped processing
d. Outline processor
ans.a. Super computer
7. A directly accessible appointment calendar is feature of a … resident package
a. CPU
b. Memory
c. Buffer
d. ALU
ans.b. Memory
8. The term gigabyte refers to
a. 1024 bytes
b. 1024 kilobytes
c. 1024 megabytes
d. 1024 gigabyte
ans.1024 megabytes
9. Which of the following processors use RISC technology?
a. 486dx
b. Power PC
c. 486sx
d. 6340
ans.b. Power PC
10. A/n …. Device is any device that provides information, which is sent to the CPU
a. Input
b. Output
c. CPU
d. Memory
ans.a. Input
11. Current SIMMs have either … or … connectors (pins)
a. 9 or 32
b. 30 or 70
c. 28 or 72
d. 30 or 72
ans.d. 30 or 72
12. The storage subsystem in a microcomputer consists mainly of … or … media with varying capacities
a. Memory or video
b. Magnetic or optical
c. Optical or memory
d. Video or magnetic
ans.b. Magnetic or optical
13. Which of the following is not an input device?
a. OCR
b. Optical scanners
c. Voice recognition device
d. COM (Computer Output to Microfilm)
ans.d. COM (Computer Output to Microfilm)
14. The central processing unit (CPU) consists of
a. Input, output and processing
b. Control unit, primary storage, and secondary storage
c. Control unit, arithmetic-logic unit and primary storage
d. Control unit, processing, and primary storage
ans.c. Control unit, arithmetic-logic unit and primary storage
15. EBCDIC can code up to how many different characters?
a. 256
b. 16
c. 32
d. 64
ans.a. 256
16. Which is considered a direct entry input device?
a. Optical scanner
b. Mouse and digitizer
c. Light pen
d. All of the above
ans.d. All of the above
17. Which is used for manufacturing chips?
a. Bus
b. Control unit
c. Semiconductors
d. A and b only
ans.c. Semiconductors
18. The computer code for the interchange of information between terminals is
a. ASCII
b. BCD
c. EBCDIC
d. All of above
ans.a. ASCII
19. A byte consists of
a. One bit
b. Four bits
c. Eight bits
d. Sixteen bits
ans.c. Eight bits
20. A hybrid computer
a. Resembles digital computer
b. Resembles analog computer
c. Resembles both a digital and analog computer
d. None of the above21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer27. The 0 and 1 in the binary numbering system are called binary digits or …….
(a) bytes (b) kilobytes (c) decimal bytes (d) bits (e) nibbles
Ans (D)
28. A monitor’s …… is the distance between the holes in the mask behind the screen. This helps determine how sharp the dots appear.
(a) refresh rate (b) dot pitch (c) resolution
(d) colour depth (e) None of the above
Ans (B)
29. A directly accessible appointment calendar is a feature of a ……. resident package.
(a) CPU (b) memory (c) Buffer (d) ALU (e) None of the above
Ans (B)
30. Perforated paper used as input or output media is known as
(a) Paper tape (b) Magnetic tape (c) Punched paper tape
(d) Card punch (e) None of the above
Ans (A)
31. The invention of the slide rule is attributed to
(a) Babbage (b) Oughtred (c) Pascal
(d) Napier (e) None of the above
Ans (B)
32. Which of the following is not an advantage of magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
(e) None of the above
Ans (e)
33. The memory sizes in mainframe computers and advanced technology micro computer are expressed as
(a) Bytes (b) Kilo-bytes (c) Bits
(d) Megabytes (e) None of the above
Ans (d)
34. A prefix for billion which is equal to …. is called as billi.
(a) 100 (b) 10000 (c) 1000 (d) 10 (e) None of the above
Ans (d)
35. Each model of a computer has a unique
(a) Assembly language (b) Machine language
(c) High level language (d) All of the above
(e) None of the above
Ans (b)
36. One kilobyte = ____ byte.
(a) 1250 (b) 2088 (c) 1024 (d) 1000
Ans (c)37-All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B38- A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A38. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B39. A(n) ____________ system is a small, wireless handheld computer that scans an item̢۪s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A40. The ability to recover and read deleted or damaged files from a criminal̢۪s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C41-. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C42-. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal̢۪s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B43-. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A44-. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A45-. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: AStatus : Offline 11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D46. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D47. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B48. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B49. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B50. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C52. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D53. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D54. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C55. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B