Solve mcqs online within time limit.It will help students to prepare objective in a better way.
Computer science (exercise MCQs of all chapters)
Quiz
- Which solution are not reached through proper algorithms or work planning
- Prepared solution
- Candid solution
- Strategized solution
- Best solution
- _________is the graphical representation of an algorithm.
- Matrix
- Graph
- Flowchart
- Solution
- Which symbol in the flowchart is used to either start or end the flowchart?
- Terminal
- Connector
- Process
- Decision
- _________means to test if the requires solution is there.
- Verification
- Algorithm
- Validation
- Flowchart
- In a ______error, the solution is working but not giving required results
- Random error
- Logical error
- syntax error
- Runtime error
- Expression (A+B).(A+C) is equal to
- A+(B.C)
- A.B+A.C
- A.(B.C)
- A+(B+C)
- The order of application of two separate terms is not important in ________
- Associative Law
- Commutative Law
- Distributive Law
- Identity Law
- "Is it cold outside" is ______________
- Boolean proposition
- Categorial Proposition
- Moral Propositions
- None of these
- Number "17" is equal to________in binary system
- 10000
- 10110
- 10001
- 10100
- Petabyte is equal to _________
- (1024)4 bytes
- (1024)6 bytes
- (1024)5 bytes
- (1024)7 bytes
- Hexadecimal system has total___________numbers
- 17
- 16
- 18
- 15
- The IPv4 address is made up of ___________ binary bits
- 31
- 29
- 32
- 30
- Routing is process of taking data from one device and sending it to another device in different _________________
- Channel
- Network
- Path
- Area
- DHCP stands for
- Data Hosting Computer Protocol
- Dynamic Host Computer Protocol
- Dynamic Host Configuration Protocol
- None of these
- The receiver must be capable of accepting the
- Protocol
- Message
- Address
- Information
- Which of the following doesn't includes the types of software piracy?
- Softlifting
- Liability
- Client server overuse
- Online Piracy
- Which of the following is not a cybercrime?
- Hacking
- Phishing Crime
- Identity theft
- Decryption
- Which of the following is not the characteristics of phishing emails?
- Official data breach notification
- Email account update
- IT reminder
- Similar domain of actual website
- Which of the following is not characteristics of phishing website?
- Similar domain of actual website
- Using forms to collect visitors
- Actual link to web content
- Email account updates
- Which of the following is not a characteristics of good password?
- Is eight characters long
- Doesn't contains username
- Contain uppercase letters
- Password is your name only
- An individual list item can contain another entire list called _________.
- Ordered list
- Unordered list
- Nested list
- Definition list
- HTML is not a ____________ language.
- Programming
- Markup
- Both i and ii
- None of above
- Webpages can be created and modified by using __________?
- Notepad++
- Notepad
- Textedit
- All of above
- An HTML element usually consist of a __________tags.
- Start
- End
- Start and End
- None of above
- The _______________ element is a container for metadata (data about data)
- To save the HTML page, you can use _____________as file extension.
- htm
- html
- xhtml
- Both i and ii
- There are ___________ of headings in HTML document.
- 4
- 5
- 6
- 1
- _____________ tag is used to display data in tabular form.
- td
- table
- tr
- th
- A hyperlink can be applied to __________.
- image
- text
- both i and ii
- In "body" tag _________ is used to make a picture of a background image of a webpage?
- bg
- background
- bgiamge
- both i and ii

0 Comments