CS101 Solved Grand Quiz Spring 2021
![](https://vuexamguide.com/wp-content/uploads/2023/08/Yellow-And-Black-Time-Management-YouTube-Thumbnail-37.png)
Welcome to CS101 Grand Quizzes at Virtual University Exam Guide (VUExamGuide.com) – your ultimate destination for 100% Correct Answers! If you are a CS101 student at Virtual University (VU), seeking a reliable study resource to excel in your quizzes and exams, you’ve come to the right place.
Our CS101 Grand Quizzes cover a wide range of topics, meticulously prepared by our expert team to ensure accuracy and clarity. With a focus on the fundamentals of computer science and programming concepts, these quizzes will deepen your understanding and enhance your problem-solving skills.
No more struggling with complex programming challenges or uncertain solutions! VUExamGuide.com empowers you to excel in CS101. Embrace the knowledge and skills you need to write code, design algorithms, and comprehend the world of computer science.
Join us now and embark on a journey of academic excellence with CS101 Grand Quizzes. Prepare to shine and propel yourself towards a brighter future – start exploring VUExamGuide.com today!
![](https://vu.asifali.space/wp-content/uploads/2023/08/Yellow-And-Black-Time-Management-YouTube-Thumbnail-37-1024x576.png)
CS101 Solved MCQs
Sr.No | MCQS QUESTIONS: | ANSWER: |
1 | compact disk is consist of material: | Reflective |
2 | Digital versatile disk capacity is__________MB. | 600 to 700 |
3 | SSDs stand for…….. | Solid State DISCK |
4 | ASCII codes have ……. combinations | 27 |
5 | Unicode’s have a unique pattern of ……bits. | 21 |
6 | MIDI stands for……… | Musical Instrument Digital Interface |
7 | Integer representation in 2’s complement used normally…………..BITS | 23 |
8 | When data being compressed consist of long sequence of________same value, the compression technique is called | Run Length Encoding |
9 | SDHC (high capacity) can provide. …….GBs | 32 |
10 | Mostly computers have additional storage devices……….is called | Message storage |
11 | Most computers have additional memory device called………. mass storage is | DVD’s and Flash Drive |
12 | When you want to search Google or search a query on a particular social media , you can add a symbol? | “@” |
13 | Fact sheet of ENIAC having weight | 30 Tons |
14 | Example of search engine is —————– | Google ,yahoo and MSN |
15 | The rate at which data transfer to or from disk | Transfer Rate |
16 | Computer hardware is the collection of …… of computer system | Physical Parts |
17 | A machine especially one programmer by a computer are called | ROBOTS |
18 | Computer science applications are………… | 7 |
19 | ———Database learn about will be implement educing tool like Microsoft access | DBMS |
20 | ….. One of the ear lie computer device waste | Abacus |
21 | I kilo byte is equal to…….. | 1024 byt |
22 | 1 tear byte is equal to……. | 1024 GB |
23 | ……..In one bit we can represent two pattern | 0 or 1 |
24 | The bit receiver is known as the machine | Main Memory |
25 | RAM access for —————- | Random access Memory |
26 | The rate at which can be transferred to or from the disk | Transfer Rate |
27 | BDs stand for……………… | Blue Ray Disc |
28 | CAD stand for……… | Computer added Design |
29 | Lousy techniques can often provide then………compression than looses | MORE |
30 | A variation of dictionary encoding is | Adaptive dictionary encoding |
31 | ——– is storage organization in which are ordered in FIFO fashion | QUEUE |
32 | Techniques that allow the steps in the machine cycle to overlap | Pipelining |
33 | MP3 do not require transfer rate more than…. | 64 kbps |
34 | ___successfully relayed on communication paths having 40 Mbps Transfer rate. | MPEG |
35 | CPU and main memory connected via…….. | BUS |
36 | MP3 is short for….. | MPEG layer 3 |
37 | The best known system for compressing audio is…… | MP3 |
38 | The idea of storing a computer’s programmer in its main memory is called……. | Stored program concept |
39 | CPU is designed to recognize institutions encoded as | BIT Pattern |
40 | Collection of instructions along with the encoding system is called | Language |
41 | RISC stands for | Reduced Instruction Set Computer |
42 | A request to transfer the contents of a register to a memory cell is called…….. | Store Instruction |
43 | The commonly used standards for encoding and compressing audio and video were developed. | MPEG |
44 | CPU consists ……..parts: | 3 or Three |
45 | The use of AND operation is an example of the process……..: | Masking |
46 | 8Kbps=…………: | 1 Kb per Second |
47 | Communication between computer and other device is handling through apparatus called……: | Controller |
48 | The ability of a controller to access main memory is called | DMA |
49 | WAN is abbreviated of ……..: | Wide wire Network |
50 | The best known system of compressing audio is……. | MP3 |
51 | Mp3recording generally require transfer rates of no more than ——kbps. | 64 |
52 | To compare sequence of picture in MPEG only some of the pictures called | I-Frame |
53 | A machine CPU and main memory are connected by a collection of wires Called? | BUS |
54 | The idea of storing a computer’s program in its main memory is called? | Store Data |
55 | The now decode the content of its instruction register and executes its by activating the two’s complement addition circulatory with inputs being register? | 5 and 6 |
56 | The use of AND operation example of the process called ? | Masking |
57 | The result of circular shift is called? | Rotation |
58 | The result of circular shift is called? | Hundred MBPS |
59 | Communication between computing device is handled over path | Serial and parallel communication |
60 | GbPS is? | Billion Bits |
61 | The portion of an operating system that handles this communication is often called the | User Inter face |
62 | Most file manager allow files to be grouped into a bundle called | FOLDER |
63 | A chain of directories within directions called …. ..path | Directory |
64 | Components of an operating system’s kernel is the | Memory Manager |
65 | The memory manger reserves of storage space on a magnetic disk | 4 GB |
66 | Rom stands for | Read Only Memory |
67 | Culprit that auditing systems are designed to detect in the presence | sniffing software |
68 | A network of former type is called …….. network | Open |
69 | Computer network is often classified as: | All of these |
70 | The technique of holding data for output at a later but more convent time is called | Spooling |
71 | A technique that transfer the distribution problem to internet routes…….. | Multicast |
72 | A programmer that enter a computer system disguised as a desirable programmed ———– | Trojan horse |
73 | Transporting audio and video across the internet in real time is known as | Streaming |
74 | If a user is using CGI script on a UNIX server, then the script type is called…….. | Server side scripting |
75 | XML stands for | extensible markup language |
76 | OSI stands for | Open Systems Interconnection |
77 | 3… Is a software that infects a computer by inserting itself into programs that already reside in the machine | Virus |
78 | ….is an autonomous program that transfers itself through a network, taking up residence in computer and forwarding copies of itself to other computer. | WORM |
79 | Another form of malicious software is | Spyware |
80 | Dos stands for | Denial of service |
81 | Problem associated with an abundance of unwanted messages is the proliferation of unwanted email called. | Spam |
82 | Prevention tool that has filtering connotation is the….. | Proxy Server |
83 | SSL stands for | Secure Sockets Layer |
83 | SSL stands for | Secure Sockets Laye |
84 | Public key is used for ………messages | Encrypt |
85 | Virus is executed in a computer | Before execution of Host |
86 | Explosion of replicated copies that degrade the performance of legitimate application. This is property of | Worm |
87 | Trojan can enter | through games and Unity package |
88 | Spyware also called | Shifting Software |
89 | Process of overloading a computer with messages. | DOS |
90 | Software that act as a shield to protection from adverse action | proxy server |
91 | Spam filter can distinguish between desired mail and spam | TRUE |
92 | Which key is required to decrypt messages | Private Key |
93 | Computer Fraud and abuse act Cover | Theft of information and worms and virus |
94 | Repeaters passes signals between | Two original Busses |
95 | A bridge is similar to a | Repetor |
96 | Peer-to-peer often abbreviated as | P2P |
97 | ________ service allow clients to rent virtual computers by the hour, without concern for where the computer hardware is actually located | Amazon’s Elastic Compute cloud |
98 | The distinction between the tier-1 and tier-2 ISPs is often a matter of opinion | TRUE |
99 | An access ISP is essentially an independent internet, sometimes called | INTERNET |
100 | The process of using DNS to perform a translation is called | DONS Lookup |
101 | VoIP is the abbreviation of | Voice over Internet Protocol |
102 | An enormous portion of current internet traffic is used for transporting audio and video across the internet in real time, is known as | Streaming |
103 | WWW is the abbreviation of World Wide Web | TRUE |
104 | A networking technology called ___________, which enables an end user to automatically connect to the closest server out of a define group of servers helps to make CDNs practical | Any cast |
105 | A second form of VOIP consist of | Analogue , Telephone and adaptors |
106 | The point at which one network is linked to an internet is often called | Gateway |
107 | Distributed system in which many in depended computer work closely together to provide computation or service comparable to a much larger machine? | Cluster Computing |
108 | Each domain must be registered with ICANN process handled by companies called? | Registrar |
109 | DNS mean? | Domain Name system |
110 | Software packages that allow users to access hypertext on the internet fall into categories? | Browser and webserver |
111 | Essentially a notational system by which a text document along with the document’s appearance can be encoded as a simple text file | HTML |
112 | Hypertext document also contain special symbol called? | TAGS |
113 | URL means | Uniform source Locator |
114 | Common Internet brewers include….. | Fire Fox safari |
115 | The distinction is that a hypertext document also contains special symbol.. | TAGS |
116 | A traditional hypertext document is similar text file because text is HTML – encoded… | Source Version |
117 | HTM is essentially a notional system by which text document’s… | Simply Text File |
118 | )Music is traditionally represented does not conform the character by character.. | TEXT File |
119 | The additional activity by either the browser or the web browser | Client Side |
120 | Then it hands these segment known .. | Packets |
121 | Origin prepare a packet it appends a value called .. | Hop count |
122 | If two functions were performed ‘PROCESS LOAN’ AND ‘ REJECT APPRECIATION’ what should be structure of problem | IF-Else Method |
123 | What should be sequence? | Problem devise plan carry plan |
124 | Stepwise refinement is a strategy to conquered ___ at once | TASK |
125 | Which strategy is contrast to stepwise refinement | Bottom-Up Methodology |
126 | Which has cause Computer science to grow so much | Algorithm and problem solving |
127 | As a general rule the use of a loop structure produces……..off flexibility | Higher Degree |
128 | A method of implementing repetition is the iterative structure knows as | LOOP |
129 | Change the state in such a way that it moves towards the termination condition | Modify |
130 | In each iteration “i” the current value of “i” will…….. With current value of “f” | Multiplied |
131 | The control of a loop consist of how many activities | Three |
132 | Repeat loop structure referred to as a | Posttest Loop |
133 | If we reach the end of the list without finding the target value our search terminates as…. | Failure |
134 | In which collection of instructions called… | A body of Loop |
135 | Write a___ for finding maximum number from a list. | Pseudo-Code |
136 | The loop will keep executing until____ remains smaller or equal to n | I |
137 | Set of steps that define how a task is performed is called | Algorithms |
138 | In Unambiguous, the information in the state of the process must be sufficient to determine uniquely and completely the actions required by each step. | TRUE |
139 | A single algorithm can be represent in……… | Many ways |
140 | The sentence, ________________ could mean either that the grandchildren cause problems when they come visit or that going to see them is problematic. | “Visiting grandchildren can b never racking |
141 | One semantic structure is the ________ of a computed value. | Saving |
142 | Another common semantic structure is no any reparation execution of a statement or sequence of statement as long as some condition true. | True |
143 | In……. a man in Texas received very high radiations. | 1986 |
144 | Which is not the advantage of software verification | NONE |
145 | Computer can execute…….of instructions in a second | Billions |
146 | A measure of the execution time necessary for an algorithm to complete work in a set of | DATA |
147 | In general a recursive function is designed to test for the termination condition often called | Base or degenerative Case |
148 | One method of implementing such repetition is the iterative structure known as: | LOOP |
149 | In which execution of function the tested condition we’re true. ?? | Process Loan |
150 | select the entry in the list known as: | Test Entry |
151 | A…………methodology progresses from the specific to the general : | Bottom UP |
152 | The collection of instructions called?? | BODY |
153 | the loosely defined problem solving phases presented by the mathematicians G.polya in……….?? | 1945 |
154 | Test for termination is performed before the body is executed in pretest loop: | TRUE |
155 | In insertion sort Algorithms lists are sorted out into: | Alphabetical ORDER |
156 | IF our target value is not present in oriental list, our approach to search will proceed as: | By dividing into smaller segments |
157 | Binary search executes each stage of a repetition as a subtask of the previous stage, known as: | Recursion |
158 | A recursive function is designed to test for: | Degenerative and base case and Termination condition (ALL) |