250+ TOP MCQs on ASCII and Answers

Computer Fundamentals Multiple Choice Questions on “ASCII”.

1. What does ASCII stand for?
a) American Standard Code for Information Interchange
b) American Scientific Code for Information Interchange
c) American Scientific Code for Interchanging Information
d) American Standard Code for Interchanging Information

Answer: a
Clarification: The ASCII codes are used to represent the bits into symbols and vice versa. ASCII is the American Standard Code which is used to exchange information.

2. The decimal representation for the character ‘!’ in ASCII is ____________
a) 31
b) 32
c) 33
d) 34

Answer: c
Clarification: The decimal representation of a few basic characters are:
33 : !
34 : ”
35: #
36 :$.

3. The two types of ASCII are _____________ and ____________
a) ASCII-4 and ASCII-8
b) ASCII-8 and ASCII-16
c) ASCII-7 and ASCII-8
d) ASCII-4 and ASCII-16

Answer: c
Clarification: The two types of ASCII are ASCII-7 and ASCII-8. ASCII-7 uses 7 bits for the representation of numbers and ASCII-8 uses 8-bits.

4. Any set of digits or alphabets are generally referred as ______________
a) Characters
b) Symbols
c) Bits
d) Bytes

Answer: a
Clarification: We refer to the digits and alphabets generally as characters. A character is generally a unit of information in computers.

5. The first 128 characters are the same in both the types of ASCII i.e. ASCII-7 and ASCII-8.
a) True
b) False

Answer: a
Clarification: There are two types of ASCII codes: ASCII-7 and ASCII-8. ASCII-7 uses 7 bits to represent a number whereas ASCII-8 uses 8-bits to represent a number.

6. The number of characters that can be represented in ASCII-8 are ______________
a) 128
b) 256
c) 32
d) 64

Answer: b
Clarification: ASCII-8 can represent 256 different characters. ASCII-8 uses 8-bits for the representation of numbers i.e. it can represent 28 = 256 different characters.

7. The zone of alphabetic characters from A to O in ASCII is _____________
a) 1000
b) 0100
c) 0010
d) 0001

Answer: b
Clarification: The zone used by ASCII for alphabets is 0100. For e.g. A is represented as 0100(zone)0001(digit). The hex equivalent is 41 for A. The zone used by numbers is 0011.

8. The representation of the number 8 in binary in ASCII-8 format _________
a) 00111000
b) 01001000
c) 1000
d) 00011000

Answer: a
Clarification: The ASCII-8 format will have 8 bits. The zone for the character 8 is 0011 and the digit is 1000. Therefore, its representation is 00111000.

9. Binary Coding for the letter X is ______________
a) 01011000
b) 00111000
c) 10001000
d) 00010100

Answer: a
Clarification: The binary coding for the letter X is 01011000. Here, 0101 is the zone whereas 1000 is the digit. The alphabets from P to Z have the zone 0101.

10. Express the ASCII equivalent of the signed binary number (00110010)2.
a) 2
b) 1
c) A
d) ,

Answer: a
Clarification: The ASCII characters for the remaining options are:
1 : 00110001
A : 01000001
, : 00101100.

250+ TOP MCQs on Main Memory Organisation and Answers

Computer Fundamentals Multiple Choice Questions on “Main Memory Organisation”.

1. Any electronic holding place where data can be stored and retrieved later whenever required is ____________
a) memory
b) drive
c) disk
d) circuit

Answer: a
Clarification: Memory is the place where data can be stored and later retrieved. Memory can be of classified into register, cache, main memory, etc.

2. Cache memory is the onboard storage.
a) True
b) False

Answer: a
Clarification: Cache Memory is the memory closest to the CPU. Registers, Cache and the main memory are the means of onboard storage in the computer system.

3. Which of the following is the fastest means of memory access for CPU?
a) Registers
b) Cache
c) Main memory
d) Virtual Memory

Answer: a
Clarification: Registers are the fastest means of access for CPU. Registers are the small memory locations which are present closest to the CPU.

4. The memory implemented using the semiconductor chips is _________
a) Cache
b) Main
c) Secondary
d) Registers

Answer: b
Clarification: The main memory is implemented using semiconductor chips. Main memory is located on the motherboard. It mainly consists of RAM and small amount of ROM.

5. Size of the ________ memory mainly depends on the size of the address bus.
a) Main
b) Virtual
c) Secondary
d) Cache

Answer: a
Clarification: The size of the main memory depends on the size of the address bus of the CPU. The main memory mainly consists of RAM and ROM, where RAM contains the current data and programs and ROM contains permanent programs like BIOS.

6. Which of the following is independent of the address bus?
a) Secondary memory
b) Main memory
c) Onboard memory
d) Cache memory

Answer: a
Clarification: The secondary memory is independent of the address bus. It increases the storage space. It is implemented in the form of magnetic storage devices.

7. ____________ storage is a system where a robotic arm will connect or disconnect off-line mass storage media according to the computer operating system demands.
a) Secondary
b) Virtual
c) Tertiary
d) Magnetic

Answer: c
Clarification: The tertiary storage is the correct option. It is used in the realms of enterprise storage and scientific computing on large computer systems and business computer networks and is something a typical personal computer never sees firsthand.

8. What is the location of the internal registers of CPU?
a) Internal
b) On-chip
c) External
d) Motherboard

Answer: b
Clarification: The internal registers are present on-chip. They are therefore present inside the CPU. L1 cache is also present on-chip inside the CPU.

9. MAR stands for ___________
a) Memory address register
b) Main address register
c) Main accessible register
d) Memory accessible register

Answer: a
Clarification: The MAR stands for memory address register. It holds the address of the active memory location.

10. If M denotes the number of memory locations and N denotes the word size, then an expression that denotes the storage capacity is ______________
a) M*N
b) M+N
c) 2M+N
d) 2M-N

Answer: a
Clarification: Storage capacity is the product of a number of memory locations that is the number of words and the word size or the number of bits stored per location. Storage capacity should be as large as possible.

250+ TOP MCQs on Flowcharting Rules and Answers

Tricky Computer Fundamentals Questions and Answers on “Flowcharting Rules”.

1. A ______________ is diagram that depicts the flow of a program.
a) Algorithm
b) Hash Table
c) Graph
d) Flowchart

Answer: d
Clarification: A flowchart is a diagram that helps us determine the flow of the program. Other options are irrelevant.

2. Terminals are represented by diagonals in a flowchart.
a) True
b) False

Answer: b
Clarification: The statement is false. Terminals are represented by rounded rectangles. They indicate the starting or ending point in a flowchart.

3. The operation represented by parallelograms.
a) Input/Output
b) Assignment
c) Comparison
d) Conditions

Answer: a
Clarification: The input/output operations are represented by parallelograms. They generally are used to display messages during input and output part of a program.

4. Which of the following is not a flowchart structure?
a) Process
b) Sequence
c) Repetition
d) Case

Answer: a
Clarification: There are basically four flowcharting structures:
• Decision
• Repetition
• Case
• Sequence.

5. The action performed by a ___________ structure must eventually cause the loop to terminate.
a) sequence
b) case
c) repetition
d) process

Answer: c
Clarification: The action performed by a repetition structure must eventually cause the loop to terminate. Otherwise, an infinite loop is created.

6. A _______ is a connector showing the relationship between the representative shapes.
a) line
b) arrow
c) Process
d) box

Answer: b
Clarification: Arrows are the connectors that show the relationship between different shapes. They also show the flow of the program.

250+ TOP MCQs on Virtual Memory and Answers

Computer Fundamentals Multiple Choice Questions on “Virtual Memory”.

1. Separation of user logical memory and physical memory is ___________
a) Memory control
b) Memory management
c) Memory sharing
d) Virtual memory

Answer: d
Clarification: The separation of user logical memory and physical memory is called virtual memory. Only part of the program needs to be in memory for execution.

2. Logical Address space can be larger than physical address space.
a) True
b) False

Answer: a
Clarification: The statement is true. Since, a part of the program needs to be in memory for the process of execution, the logical space can therefore be much larger than the physical address space.

3. Virtual Memory can be implemented via __________
a) Demand Paging
b) Logical paging
c) Structural way
d) Simple division

Answer: a
Clarification: Demand paging can implement virtual memory. Another way is demand segmentation.

4. COW stands for?
a) Copy over write
b) Convert over write
c) Count over write
d) Copy over write

Answer: d
Clarification: COW stands for Copy over write. COW allows both parent and child processes to share the same pages initially.

5. LRU stands for?
a) Least Recently used
b) Less Recently used
c) Least Recurrently used
d) Least Randomly used

Answer: a
Clarification: LRU stands for Least Recently used. LRU is least recently used. It replaces page with the smallest count.

6. An allocation that uses a proportional allocation scheme using priorities rather than size.
a) Priority allocation
b) File allocation
c) Preference allocation
d) Simple allocation

Answer: a
Clarification: Priority allocation uses a proportional allocation scheme using priorities rather than size.

7. A process selects a replacement frame from the set of all frames.
a) Local replacement
b) Global replacement
c) Block replacement
d) Module replacement

Answer: b
Clarification: Global replacement process selects a replacement frame from the set of all frames; one process can take a frame from another.

8. Any program, no matter how small, occupies an entire partition. This is called _____________
a) fragmentation
b) prior fragmentation
c) internal fragmentation
d) external fragmentation

Answer: c
Clarification: It is called as internal fragmentation. Main memory use is inefficient. Any program, no matter how small, occupies an entire partition. This is called internal fragmentation.

9. A process is busy swapping pages in and out.
a) Thrashing
b) Compaction
c) External Fragmentation
d) Division

Answer: a
Clarification: Thrashing is the term used whenever a process is busy swapping pages in and put.

10. ____________ is one or more physically contiguous pages.
a) Slab
b) Cache
c) Object
d) Allocator

Answer: a
Clarification: Slab is one or more physically contiguous pages. Cache consists of one or more slabs.

250+ TOP MCQs on WWW and Answers

Computer Fundamentals Multiple Choice Questions on “WWW”.

1. The web works on this model.
a) Intranet
b) Internet
c) Client-Server
d) Server

Answer: c
Clarification: Web works on the client server model. Client and server operate on machines which are able to communicate through a network.

2. In the Client-server model, the client receives a request from the server.
a) True
b) False

Answer: b
Clarification: The statement is false. The server receives a request from the client. It then performs the requested work.

3. Which of the following is not a type of server?
a) File
b) Web
c) Name
d) Browsers

Answer: d
Clarification: Browser is the answer. Browser is a type of client and it is not a server. File, web and name are the types of servers.

4. Allows the user to create and maintain a personal list of favorite URL addresses.
a) Software
b) Web Servers
c) Web Browsers
d) WWW

Answer: c
Clarification: Web Browsers help the user to maintain a personal favorite list of URLs. Also, allows the user to download information on various formats.

5. SGML stands for?
a) Standard Granted Markup Language
b) System Generalized Markup Language
c) Standard Generalized Markup Language
d) System Granted Markup Language

Answer: c
Clarification: HTML(Hypertext Markup language) is based on SGML. SGML stands for Standard Generalized Markup Language.

6. Apache is a type of ________
a) Transmission control program
b) Web Server
c) Web Browser
d) DBMS

Answer: b
Clarification: Apache is a type of web server. It is an application which waits for client requests, fetches requested documents from disk and transmits them to the client.

7. A small data file in the browser.
a) Cookie
b) Web Server
c) FTP
d) Database

Answer: a
Clarification: Cookie is a small data file in the browser. Most browsers nowadays allow the user to decide if they want the cookies or not.

8. Any computer that can access the server is called?
a) Web Server
b) Web Browser
c) User
d) Web Client

Answer: d
Clarification: Any computer that has access to the web server is called the web client. Web server is any computer that uses the HTTP protocol.

250+ TOP MCQs on Encryption and Viruses and Answers

Computer Fundamentals Multiple Choice Questions on “Encryption and Viruses”.

1. A cipher in which the order is not preserved.
a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Public key based

Answer: b
Clarification: In transposition-based cipher, the order of the plain text is not preserved. They can be very simple to identify.

2. Plain text is the data after encryption is performed.
a) True
b) False

Answer: b
Clarification: The statement is false. Cipher is the algorithm used in encryption. Ciphertext is the data after encryption is performed.

3. A unique piece of information that is used in encryption.
a) Cipher
b) Plain Text
c) Key
d) Cipher

Answer: c
Clarification: The key is the unique piece of information. It is used to create the cipher text and decrypt it back.

4. Study of creating a d using encryption and decryption techniques.
a) Cipher
b) Cryptography
c) Encryption
d) Decryption

Answer: b
Clarification: It is called as cryptography. It is the study of creating and using the encryption techniques.

5. Creating a computer or paper audit that can help detect wrong doings.
a) Auditing
b) Validation
c) RSN
d) Verification

Answer: a
Clarification: The answer is auditing. It is done to keep an eye on wrong doings. Auditing can be used as a deterrent.

6. An indirect form of surveillance.
a) Honey pot
b) Logical
c) Security
d) Intrusion

Answer: a
Clarification: Honey pot is an indirect form of surveillance. Network personnel create a trap, watching for unscrupulous acts.

7. A malicious code hidden inside a seemingly harmless piece of code.
a) Worm
b) Bomb
c) Trojan Horse
d) Virus

Answer: c
Clarification: The answer is Trojan horse. Trojan horse is a code that is present in a program that appears harmless.

8. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing

Answer: d
Clarification: The attack is a spoofing attack. It is when a user creates a packet that appears to be something else or from someone else.

9. A technique in which a program attacks a network by exploiting IP broadcast addressing operations.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm

Answer: a
Clarification: Smurfing is a technique in which a program attacks a network by exploiting IP broadcast addressing operations.

10. An attack in which the user receives unwanted amount of e-mails.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm

Answer: c
Clarification: In the case of denial of e-mail bombing, a user sends an excessive amount of unwanted e-mail to someone.