Solved MCQs
1. 1. Expression (A+B).(A+C) is equal to:
**Answer:** B) A.B + A.C
2. 2. Petabyte is equal to:
**Answer:** C) (1024)^5 Bytes
3. 3. …… is used to assemble more than one proposition into one proposition:
**Answer:** C) Compound preposition
4. 4. A truth table is used to determine whether a statement is:
**Answer:** C) Both a and b (True and False)
5. 5. 'It is cold outside' is:
**Answer:** B) Moral preposition
6. 6. Number '17' is equal to ………. In binary numbers:
**Answer:** C) 10001
7. 7. In primary and secondary storage, data is stored in the form of:
**Answer:** C) Both a and b (Bits and Bytes)
8. 8. According to …….. law, there is no change in results if the priority of expression is
changed:
**Answer:** A) Associative law
9. 9. The order of application of two separate terms is not important in ……………
**Answer:** B) Commutative law
10. 10. Hexadecimal system has total …… numbers:
**Answer:** A) 16
11. 11. Data is provided for processing through ………..
**Answer:** A) RAM
12. 12. At least …… bytes/byte is required to store any piece of information in a computer's
memory:
**Answer:** A) 1
13. 13. The IPv4 address is made up of …… binary bits:
**Answer:** D) 31
14. 14. Routing is the process of taking data from one device and sending it to another
device in a different:
**Answer:** B) Network
15. 15. Web browsers and web servers function together as a ………. System:
**Answer:** D) Server
16. 16. Email stands for:
**Answer:** B) Electronic Mail
17. 17. A ______ accesses a service made available by a server:
**Answer:** B) Client
18. 18. The receiver must be capable of accepting the:
**Answer:** C) Message
19. 19. Routers connect multiple _______ together:
**Answer:** B) Networks
20. 20. _________ allow users to communicate using email, newsgroups, etc.:
**Answer:** B) Internet
21. 21. Which software is used for storing data?
**Answer:** D) Both a and b (Google Drive and Dropbox)
22. 22. Every data packet has an _______ address:
**Answer:** A) IP
23. 23. In a computer network, devices are connected through communication _______.
**Answer:** B) Channels
24. 24. Communication protocol covers:
**Answer:** D) All of the above (Authentication, Error detection, Correction)
25. 25. _______ is the process of encoding data:
**Answer:** B) Encryption
26. 26. Making illegal copies of software is called:
**Answer:** B) Hacking
27. 27. When a key has fewer characters than the text to encrypt, then repeating letters of
the key is called:
**Answer:** C) Interim Cipher text
28. 28. Which of the following doesn’t include types of software piracy?
**Answer:** B) Liability
29. 29. Which of the following is not a characteristic of a good password?
**Answer:** D) Password is your name only
30. 30. _______ is a cyber-crime attack to make a machine or network resource unavailable
for a user:
**Answer:** A) DOS
31. 31. Which of the following is not a cyber-crime?
**Answer:** D) Decryption
32. 32. Which of the following is not a characteristic of a phishing website?
**Answer:** A) Actual link to web content
33. 33. Which of the following is not a characteristic of phishing emails?
**Answer:** B) IT reminder
34. 34. _______ is a general term for any type of information processing that can be
represented mathematically:
**Answer:** A) Computation
35. 35. Using a computer for unauthorized activities is called:
**Answer:** A) Misuse
36. 36. The cipher text of 'Computer' is:
**Answer:** A) Dpnqvufs
37. 37. A hyperlink can be applied to:
**Answer:** C) Both A and B (Image and Text)
38. 38. The _______ element is a container for metadata:
**Answer:** B) <head>
39. 39. An individual list item can contain another entire list called:
**Answer:** B) Nested list
40. 40. _______ Tag makes the enclosed text bold:
**Answer:** D) <b>
41. 41. In 'body' tag, _______ is used to make a picture the background image of a webpage:
**Answer:** B) Background
42. 42. HTML is a computer language used to:
**Answer:** A) Create a webpage
43. 43. An HTML element usually consists of:
**Answer:** C) Start and End tags
44. 44. _______ is used to display data in tabular form:
**Answer:** B) <table>
45. 45. To save the HTML page, you can use:
**Answer:** D) Both A and B (.htm and .html)
46. 46. HTML is not a:
**Answer:** A) Programming language
47. 47. There are _______ types of headings in an HTML document:
**Answer:** D) 6
48. 48. A webpage can be created and modified using:
**Answer:** D) All of the above (Notepad++, TextEdit, Notepad)
49. 49. Checking if a solution exists is called:
**Answer:** C) Validation
50. 50. Due to which type of error does an algorithm work but gives incorrect answers?
**Answer:** B) Logical error
51. 51. Before solving a problem, it's ……. should be done:
**Answer:** C) Both A and B (Analysis and Planning)
52. 52. Which solution cannot be written with proper algorithm planning?
**Answer:** B) Candid solution
53. 53. ……. is used to test the solution:
**Answer:** C) Verification
54. 54. The image expression of the algorithm is:
**Answer:** C) Flowchart
55. 55. In a flowchart, the ……. symbol shows:
**Answer:** C) Process
56. 56. ……. Symbol indicates the stopping point of an algorithm:
**Answer:** A) Stop
57. 57. Which symbol is used for the beginning and end of the flowchart?
**Answer:** A) Terminal
58. 58. The word 'Algorithm' is derived from the name of which famous Arab scientist?
**Answer:** C) Muhammad Ibn Musa Al-Khwarizmi
59. 59. Flowchart uses different ……. to check the sequence of steps:
**Answer:** B) Symbols