[go: up one dir, main page]

0% found this document useful (0 votes)
80 views8 pages

CS101 Preperation 2024 by ZB FILE F .. (Mids)

Uploaded by

Usama Akhtar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views8 pages

CS101 Preperation 2024 by ZB FILE F .. (Mids)

Uploaded by

Usama Akhtar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

MCQS CS101 midterm preparation file ZB


"In the name of God, Most Gracious, Most Merciful"

CS 101

CS 101 MIDTERM PREPERATION FILE 2024 BY ZB

1
MCQS CS101 midterm preparation file ZB

 Google Drive is an example of_______ Cloud computing


 An algorithm is ______ and distinct from its representation. Abstract
 ______ Connects computer over a large geographical area or world WAN
 GUI stands for____ Graphical user interface
 Pseudo Code is a language_______Independent
 determines the number of bits to move radix point to either left or right. Exponent field
 Capacity of one sector CD is of ________ KB. 2
 Access to the forbidden literature is because of: Computer
 Content filtering works by matching_____ of characters: String
 Microsoft office includes: Word
 In the United States the privacy act of 1974 was to protect citizens from abusive use of
databases: Government
 We can add charts in MS-word from group: Illustrations
 Most famous word processor is: MS-Word
 shortcut key to paste is: CTRL + V
 The field of artificial intelligence is being pursued along paths: 2
 ______option in MS-word prevent others from making changes to the selected text.
Block Authors
 Termination condition is________. Negation of the condition
 2. In_________ digits on right side represent the fractional part. Fraction
 Approximately how many entries a typical dictionary in a word processor can contain?
25,000 entries
 On social media, some times a particular _______ is very popular. Hash tag
 printer is an___________ device. Output
 The computers of the _________ were not very flexible or efficient. 1940`s and 1950`s
 in the machine’s ROM. BOOT loader
 Within a transfer category which instruction is used to communicating with devices
outside the CPU? I/O instruction
 ___ is a short version of binary digit, a smallest unit to store data. Bit
 JPEG is mostly used for_______? Photography industry
 The binary search algorithm uses……. Divide and conquer method
 ___ stores bits as tiny electric charge that refreshes many times a second. DRAM
 Quantity associated with each position is _______ the quantity associated with the
position to its right. Twice
 We have cleared off enough space for the cards but are not allowed to push additional
materials back to make more room. The restriction is in Computer applications
 Problem-solving phases presented by the mathematician _________ in 1945. G. Polya
 Each router maintains a _______________ that contains the router’s knowledge about the
direction in which messages should be sent. Forwarding table
 The TCP/IP protocol suite is a collection of: TCP and IP protocols only
 The loudness of sound varies directly with the vibrating: Amplitude
 To receive a bit pattern from a controller, an instruction similar to which type of
instruction is used? Load instruction
 ___________ refers to the address of a file (resource) accessible on the Internet. Uniform
Resource Locator (URL)

2
MCQS CS101 midterm preparation file ZB

 The ___________ resides on a computer containing hypertext documents to be accessed.


Browser
 User can see directories or files by using______. Window explorer 18. Internet is a type
of _______ Network
 The __________ consists of the instructions that tell the control unit to request an activity
within the arithmetic/logic unit. Arithmetic/logic group
 _________connects computer over a large geographical area or world. WAN
 Appearance of each pixel is encoded to form _______________. Bitmap
 One of the major uses of the ____ operation is for placing 0s in one part of a bit pattern
while not disturbing the other part. AND
 If the bit sequence 1001 0110 is subjected to a circular shift of one bit position to the left
would generate 0100 1011
 In which type of communication several signals are transferred at the same time, each on
a separate line? Parallel Communication
 Binary notation is a way of representing numeric values using only the ____ Digits 0 and
1
 The control of a loop consists of the __________ activities. Three
 By using 16 bits in 2’s complement notation how many maximum positive number can
be represented 32768
 Another cause might be that the signals from the different machines are blocked from
each other by objects or distance even though they can all communicate with the central
AP (a condition known as the) Hidden Terminal Problem
 The set of tasks that ensures the software is correctly implements a specific function is
known as Validation
 What does MIDI stand for? Musical instrument digital interface
 www stands for _____ World Wide Web
 Releasing space in the__________ can breaking the deadlock and allowing the remaining
processes to continue their tasks. Process table
 The computers of the __________were not very flexible or efficient. 1940s and 1950s
 After how long we should take the sample depends on how _______________ definition
sound recordings are required. Accurate and high
 A clear flag state indicates that the resource is Available
 We need ___________ memory to store data permanently. RAM
 _____ produces the output as 1 when both of the inputs are 1. AND
 What does FTP stands for _______________. File Transfer Protocol
 ___ tag contains the information related to metadata that is not usually displayed on the
webpage.
 One is that a CPU should be designed to execute a minimal set of machine instructions.
This approach is called a ______ RISC
 Three-dimensional interfaces allow human users to communicate with computers by
means of. 3D projection systems
 A negative exponent would mean to move the radix to the________. Left
 Which loop structure refers as a pretest loop? While
 USB and Firewire provide several hundred_________. Mbps
 CD (CD) stands for Compact Disc

3
MCQS CS101 midterm preparation file ZB

 In which type of communication several signals are transferred at the same time, each on
a separate line? Parallel
 Generally how many steps a machine cycle have? Three
 HTML supports ____________ levels of heading tags. SIX
 SSDs stands for: Solid State Disk
 Which of the following is true about UDP in comparison to TCP? Less reliable but
more efficient
 Main memory is also called ___________. RAM
 An algorithm is _____ and distinct from its representation. Abstract
 You can search images even by giving a query of another image using Google Image
_______________. Link
 HDTV is the abbreviation of______? High defined television
 MIME protocol is: An extension to SMTP for Multimedia messaging support
 Email is less time sensitive, so the mail servers use _______ to transfer email. TCP
 _______ tag is used to write paragraph in HTML document.
 Each router maintains a _______________ that contains the router’s knowledge about the
direction in which messages should be sent. Forwarding table
 If you want to search within the range of number, you can use: Two Dots
 The _____ in the state of the process must be sufficient to determine uniquely and
completely the actions required by each step. Information
 _________ CPU can better cope with the ever increasing complexities. More Complex
 Due to the volatility and limited size of a computer’s main memory, most computers have
additional memory devices called__________. Mass storage
 Fetch an instruction, Decode the instruction and Execute the instruction are part of
________ Machine cycle
 When applied to a list with n entries, the sequential search algorithm will interrogate an
average of ------ entries N/2
 A pseudocode must have a consistent, concise notation for representing recurring ______
structures. Semantic
 Which kind of server work as an intermediate between the client and server. Proxy
server
 The binary of 8 in 2’s complement notation will be 1000, what will be the binary of -8
 The repetitive use of an instruction or sequence of instructions is an important
algorithmic concept.
 One method of implementing such repetition is the iterative structure known as the Loop
 is called the _______ tag in HTML document. Anchor
 The ______________ divides long messages into small segments, which are transmitted
over the Internet. Transport layer
 Let a list Fred, Alex, Diana ,Byron ,Carol. After sorted first sublist our list would be
Alex, Fred, Diana ,Byron ,Carol
 ______________ is a malware which gathers data about your activities on the system and
forwards it to the outside party without your consent: Spyware
 In binary Notation 11111111 is = 255 7. FTP

4
MCQS CS101 midterm preparation file ZB

 _______________could check all incoming files for the presence of known viruses and
block all infected files. Proxy server
 ___________ is a short version of binary digit, a smallest unit to store data. Bit
 Who introduce the idea of storing the program in main memory? John Von Neumann
 One term could be used for more than one thing. For example word "Jaguar" is used in
two meanings such as: Animal and Car
 Which Excess notation is used to represent 100 as Zero? Excess
 ___ signature to a message, the sender can mark the message as being authentic Single
signature
 The binary of 8 in 2’s complement notation will be 1000, what will be the binary of -8?
1000 The bit 0 represents the value false and the bit 1 represents the value_______ True
 For +ve integers, starting from zero going upward until a single zero is reached followed
by all _____ 1
 If the bit sequence 0001 0111 is subjected to a circular shift of one bit position to the
right would generate: 1000 1011
 One of the major uses of the ____ operation is for placing 0s in one part of a bit pattern
while not disturbing the other part. AND
 _______ indicates the location of the document within the host or system file. Directory
path
 Data were stored in memory; programs were part of the ______. CPU
 The efficiency of ________ makes it the protocol of choice for DNS lookups and VoIP.
…….. UDP
 Not true about pseudo code___Pseudo code is an unambiguous representation
 While searching weather we will simply add : The location with the word “Weather””
 Avoid searching the following: Pressure cooker bomb story
 On Social media, sometimes, a particular _______is very popular. Hash tag
 You might search the followings or similar thing and might get unpleasant results which
might depress you. Skin Condition
 Email is less time sensitive, so the mail servers use _______ to transfer email TCP
 Many researchers believe that every activity of the human mind, including imagination,
creativity, and decision making, is the result of ___ execution. Algorithm
 P2P model based streaming approach is preferred over N-unicast because: It supports
more unicast streams than N-unicast
 One is that a CPU should be designed to execute a minimal set of machine instructions.
This
 approach is called a _____ RIS
 What is full form of JSP? java server Pages
 ENIAC stands for a Electronic numerical integrator and calculator
 A CPU consists of three parts_______. ALU/ control unit, register
 In JavaScript, a variable declaration is Optional
 Due to working at home, lack of interaction may result in ___________ professional
growth. Slower

5
MCQS CS101 midterm preparation file ZB

 A large number of networks interconnected physically is called ______. LAN


 Tags always placed between the and tags of a Web page: True
 An algorithm is ------and district from its representation. Abstract
 --------------- determine the number of bits to move radix point to either left to right.
Exponent field
 Language translator is a computer .  Program
 Cray-1 was first commercial computer  Super
 What is the shortcut key to open the cell format window in MS Excel? Ctrl + 1
 Previously how many bits were used to store 2`s complement notation. 8 bits b) 16 bits

ZB +92 300 5427579


WhatsApp:
https://whatsapp.com/channel/0029VaODheTDp2Q8YVcoON2p

Second WhatsApp channel


channel on WhatsApp:
https://whatsapp.com/channel/0029VafvOcy90x2tPbUaX02I

YouTube:
https://youtu.be/-AMj4iNz0UE?si=hg29pJZ1kujzg57J

6
MCQS CS101 midterm preparation file ZB

passing criteria for a course

Passing Criteria for a Course:


The passing criteria is defined in such a way that it ensures the student shall be consistent in his studies
throughout the semester.
Therefore, for passing a course/subject, student shall fulfill the following:
a) Secure minimum 20% score in Formative Assessments/Mid terms
b) Secure minimum 20% score in Final Term Examinations.
c) Secure at least 40% marks in aggregate while fulfilling the above requirements

Course Selection and Credit Hours


Q: How do I select courses when the course selection is open?
A: Follow these steps:
1. Check the credit hours allowed by your university (e.g., 21, 18, or 15 credit hours).
2. Each subject typically has 3 credit hours.
3. Divide the total allowed credit hours by 3 to determine how many subjects you can select.
Examples:
21 credit hours = 7 subjects

7
MCQS CS101 midterm preparation file ZB

18 credit hours = 6 subjects


15 credit hours = 5 subjects
Remember, the university may allow different credit hours for each student, so check your specific allowance.
By following these steps, you can make informed decisions during course selection and manage your credit hours
effectively.

……………………………….My Family…………………………

"Just Relax and focus! Exams are not difficult. Put in your 100% effort and trust in Allah.

.. …………………………..AL-Quran……………………………………
"And indeed, with hardship comes ease." (Quran 94:5)

Remember, I'm here to support you! Stay brave and strong!"

May Allah bless you

You might also like