CS101
532
CS201
225
CS301
232
CS302
174
CS304
192
CS401
224
CS402
258
CS403
228
CS408
113
CS411
121
CS502
249
CS504
268
CS601
679
CS604
381
CS605
261
CS607
184
CS609
230
CS610
300
CS614
100
CS703
65
Code | Question | Option A | Option B | Option C | Option D | Answer | |
---|---|---|---|---|---|---|---|
CS101 | The Weakest Link In Any Computer System Is The | People In It | Harware | Password | Software | A | |
CS101 | The Weaknesses Of The Computer Are: | Pattern Recognition & Storage | Speed & Innovative Ideas | Pattern Recognition & Innovative Ideas | Speed & Storage | C | |
CS101 | The Widely Used Code In Data Communication Is | A Bit Ascii | 7 Bit Ascii | Ebcdic | None Of These | B | |
CS101 | There Are __________ Popular Schemes To Reduce The Number Of Bytes That Are Required For Storing Graphics. | 4 | 3 | 2 | None Of The Given Choices | C | |
CS101 | Time-Sharing Of Resources By User Is Usually | Based On Time Slices | Based On Input | Event Driven | Operated By Spooling | A | |
CS101 | To Active An Object Send | A Message | An Instance | A Method | An Attribute | A | |
CS101 | To Be Computer Literate It Is Not Necessary For You To Know | How To Program A Computer | How To Use A Computer | What Computers Can And Cant Do | How To Repair A Computer | D | |
CS101 | To Display A Checkbox On The Web Page We Use __________ Tag | Checkbox | Check | Input | Inputbox | C | |
CS101 | To Improve The Time For Scanning A Web Page Text Should Be __________ | Centered | Left Aligned | Right Aligned | Staggered | B | |
CS101 | To Store Rounded Number Of 8.6 In A Variable Called "R_Number" We Write | R_Numbers=Maths.Rounds(8.6) | R_Number=Math.Rounds(8.6) | R_Number=Math.Round(8.6) | R_Number=Maths.Round(8.6) | C | |
CS101 | Tool To Change Prom Chips Are Called | Chip Kits | Ram Burners | Prom Burner | None Of These | D | |
CS101 | Trinoo Is A __________ Software. | Dos | Scanning | Utility | None Of The Given Options | A | |
CS101 | Turning An Entire Project Over To An Outside Firm For Development Is Called | Auditing | Outsourcing | Preliminary Investigation | Protptype | B | |
CS101 | Two Major Types Of Software Are | Application Software System Software | Application Software Database Software | System Software Database Software | Database Software Embedded Software | A | |
CS101 | Ul Tag Is Used To | Underline Text | End The Line | Create Ordered List | Create Unordered List | D | |
CS101 | Unix Is An Example Of An | Memory Management | Generic Operating Sysdtem | Nos | Utility Program | B | |
CS101 | Url Is A/An __________ | Device | Component | Address | Tool | C | |
CS101 | Use To Ensure That No Altermative Is Overlooked During Data Analysis | Data Flow Diagram | Organization Chart | Gantt Chart | Decicion Table | D | |
CS101 | Users __________ How Things Work. | Analyze In Detail | Muddle Through | Figure Out | Read In Detail | B | |
CS101 | Using Colspan Number Of Rows Of The Current Cell Should Extend Itself | Upward | Downward | Both Upward And Downward | None Of The Given Choices | D |