Saturday, January 2, 2021

CS101 Midterm MCQs Preparation

 

CS101 GRAND QUIZ SOLUTION FALL 2020-21

Prepared By VU Learning(Maria Parveen)

(CS101 100+ MCQs)

======================================

NOTE: (These MCQs really helpful for Midterm/Grand Quiz & It is according to CS101 updated Course. So, MUST Prepare it Guys.)

Quiz 1 Solution:

1. In a general-purpose computer, a program called the _____ is permanently stored in the machine’s ROM. BOOT loader

2. Within a transfer category which instruction is used to communicating with devices outside the CPU? I/O instruction

3. ___ is a short version of binary digit, a smallest unit to store data.  Bit

4. JPEG is mostly used for_______? Photography industry

5. The binary search algorithm uses……. Divide and conquer method

6. ___ stores bits as tiny electric charge that refreshes many times a second. DRAM

7. Quantity associated with each position is _______ the quantity associated with the position to its right.     Twice

8. If you want to search for an exact phrase on Google then enclose it in?  “ ”

9. We have cleared off enough space for the cards but are not allowed to push additional materials back to make more room. The restriction is in Computer applications

10. Problem-solving phases presented by the mathematician _________ in 1945. G. Polya

11. Each router maintains a _______________ that contains the router’s knowledge about the direction in which messages should be sent. Forwarding table

12. The TCP/IP protocol suite is a collection of: TCP and IP protocols only

13. The loudness of sound varies directly with the vibrating:  Amplitude

14. To receive a bit pattern from a controller, an instruction similar to which type of instruction is used? Load instruction

15. ___________ refers to the address of a file (resource) accessible on the Internet. Uniform Resource Locator (URL)

16. The ___________ resides on a computer containing hypertext documents to be accessed. Browser

17. User can see directories or files by using______. Window explorer

18. Internet is a type of _______ Network

19. The __________ consists of the instructions that tell the control unit to request an activity within the arithmetic/logic unit.  Arithmetic/logic group

20. _________connects computer over a large geographical area or world.   WAN

21. Appearance of each pixel is encoded to form _______________.  Bitmap

22. One of the major uses of the ____ operation is for placing 0s in one part of a bit pattern while not disturbing the other part.  AND

23. If the bit sequence 1001 0110 is subjected to a circular shift of one bit position to the left would generate  0100 1011

24. In which type of communication several signals are transferred at the same time, each on a separate line? Parallel Communication

25. Binary notation is a way of representing numeric values using only the ____ Digits 0 and 1   

 

Quiz 2 Solution:

1. The control of a loop consists of the __________ activities. Three

2. By using 16 bits in 2’s complement notation how many maximum positive number can be represented 32768

3. Another cause might be that the signals from the different machines are blocked from each other by objects or distance even though they can all communicate with the central AP (a condition known as the)   Hidden Terminal Problem

4. The set of tasks that ensures the software is correctly implements a specific function is known as  Validation 

5. What does MIDI stand for?  Musical instrument digital interface

6. www stands for _____ World Wide Web

7. Releasing space in the__________ can breaking the deadlock and allowing the remaining processes to continue their tasks.  Process table

8. The computers of the __________were not very flexible or efficient. 1940s and 1950s

9. After how long we should take the sample depends on how _______________  definition sound recordings are required. Accurate and high

10. A clear flag state indicates that the resource is Available

11. We need ___________ memory to store data permanently.  RAM

12. _____ produces the output as 1 when both of the inputs are 1.  AND

13. What does FTP stands for _______________. File Transfer Protocol

14. ___ tag contains the information related to metadata that is not usually displayed on the webpage.  <head> </head>

15. One is that a CPU should be designed to execute a minimal set of machine instructions. This approach is called a ______  RISC

16. Three-dimensional interfaces allow human users to communicate with computers by means of.  3D projection systems

17. A negative exponent would mean to move the radix to the________. Left

18. Which loop structure refers as a pretest loop?  While

19. USB and Firewire provide several hundred_________.  Mbps 

20. CD (CD) stands for Compact Disc

 

Quiz 3 Solution:

1. In which type of communication several signals are transferred at the same time, each on a separate line? Parallel

2. Generally how many steps a machine cycle have? Three

3. HTML supports ____________ levels of heading tags.  SIX

4. SSDs stands for: Solid State Disk

5. Which of the following is true about UDP in comparison to TCP?  Less reliable but more efficient

6. Main memory is also called ___________. RAM

7. An algorithm is _____ and distinct from its representation. Abstract

8. You can search images even by giving a query of another image using Google Image _______________. Link

9. HDTV is the abbreviation of______? High defined television

10. MIME protocol is:  An extension to SMTP for Multimedia messaging support

11. Email is less time sensitive, so the mail servers use _______ to transfer email.  TCP

12. _______ tag is used to write paragraph in HTML document.  <p>

13. Each router maintains a _______________ that contains the router’s knowledge about the direction in which messages should be sent.  Forwarding table

14. If you want to search within the range of number, you can use:     Two Dots

15. The _____ in the state of the process must be sufficient to determine uniquely and completely the actions required by each step. Information

16. _________ CPU can better cope with the ever increasing complexities.  More Complex

17. Due to the volatility and limited size of a computer’s main memory, most computers have additional memory devices called__________.             Mass storage

18. Fetch an instruction, Decode the instruction and  Execute the instruction are part of ________  Machine cycle

19. When applied to a list with n entries, the sequential search algorithm will interrogate an average of ------ entries   N/2

20. A pseudocode must have a consistent, concise notation for representing recurring ______ structures.  Semantic

21. Which kind of server work as an intermediate between the client and server. Proxy server The binary of 8 in 2’s complement notation will be 1000, what will be the binary of -8? 1000

 

Quiz 4 Solution:

1. The repetitive use of an instruction or sequence of instructions is an important algorithmic concept. One method of implementing such repetition is the iterative structure known as the Loop

2. <a> is called the _______ tag in HTML document. Anchor

3. The ______________ divides long messages into small segments, which are transmitted over the Internet. Transport layer

4. Let a list Fred, Alex, Diana ,Byron ,Carol. After sorted  first sublist our list would be  Alex, Fred, Diana ,Byron ,Carol

5. ______________ is a malware which gathers data about your activities on the system and forwards it to the outside party without your consent: Spyware

6. In binary Notation 11111111 is =                255

7. FTP _______________could check all incoming files for the presence of known viruses and block all infected files. Proxy server

8. ___________ is a short version of binary digit, a smallest unit to store data. Bit

9. Who introduce the idea of storing the program in main memory? John Von Neumann

10. One term could be used for more than one thing. For example word "Jaguar" is used in two meanings such as: Animal and Car

11. Which Excess notation is used to represent 100 as Zero? Excess 4

12. By attaching ___ signature to a message, the sender can mark the message as being authentic  Single signature 

13. The binary of 8 in 2’s complement notation will be 1000, what will be the binary of -8? 1000

14. The bit 0 represents the value false and the bit 1 represents the value_______ True

15. For +ve integers, starting from zero going upward until a single zero is reached followed by all _____ 1’s

16. If the bit sequence 0001 0111 is subjected to a circular shift of one bit position to the right would generate:  1000 1011

17. One of the major uses of the ____ operation is for placing 0s in one part of a bit pattern while not disturbing the other part. AND

18. _______  indicates the location of the document within the host or system file.  Directory path

19. Data were stored in memory; programs were part of the ______. CPU

20. The efficiency of ________ makes it the protocol of choice for DNS lookups and VoIP. …….. UDP

21. Not true about pseudo code___Pseudo code is an unambiguous representation

22. While searching weather we will simply add : The location with the word “Weather””

23. Avoid searching the following: Pressure cooker bomb story

24. On Social media, sometimes, a particular _______is very popular. Hash tag

25. You might search the followings or similar thing and might get unpleasant results which might depress you.             Skin Condition

26. Email is less time sensitive, so the mail servers use _______ to transfer email TCP

27. Many researchers believe that every activity of the human mind, including imagination, creativity, and decision making, is the result of ___ execution. Algorithm

28. P2P model based streaming approach is preferred over N-unicast because: It supports more unicast streams than N-unicast

29. One is that a CPU should be designed to execute a minimal set of machine instructions. This approach is called a _____ RISC

30. When applied to a list with n entries, the sequential search algorithm will interrogate an average of ------ entries   N/2

 

 

 

Remember me in your prayers & Keep Supporting me

Thanks And Regards,

VU Learning (MARA PARVEEN)

 

 

No comments:

Post a Comment