More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
9th Class Computer English Medium KPK Boards Online Mcqs MCQs With Answers
Question # 1
Which of the following is not the characteristics of phishing emails ?
Choose an answer
Official data breach notification
Email account update
IT remainder
Similar domain of actual website
Previous
Skip
Next
Question # 2
All the characters on your keyboard has an associated code in binary. This code is called:
Choose an answer
BCD
Unicode
ASCII
EBCDIC
Previous
Skip
Next
Question # 3
Which is a protocol used by Word Wide Web (WWW) to transfer web pages between a client and a web server?
Choose an answer
HTP
HTTP
HTML
ALP
Previous
Skip
Next
Question # 4
An ________ list is created inside the <ul> </ul> tags. Each list item is added with <li>
:
Choose an answer
Unoredred
Oredered
List
Table
Previous
Skip
Next
Question # 5
Which are the properties associated with tags
:
Choose an answer
Link
Attributes
Linkage
Body
Previous
Skip
Next
Question # 6
The technique 'Divide and conquer' is used to solve:
Choose an answer
Simple problems
Complex problems
Runtime error
Complex and large problems
Previous
Skip
Next
Question # 7
Vigenere Cipher is another substitution cipher, which uses a table known as:
Choose an answer
Vigenere Cipher table
Simple table
Complex table
Round table
Previous
Skip
Next
Question # 8
1 KB = _________ bytes:
Choose an answer
1,024
200
300
400
Previous
Skip
Next
Question # 9
A device which holds the data as long as it has power supply connected to it is called:
Choose an answer
HDD
Storage
Volatile Memory
Non Volatile
Previous
Skip
Next
Question # 10
_______ is the physical path connects sender and receiver:
Choose an answer
Sender
Center
Network
Medium
Previous
Skip
Next
Question # 11
Illegally accessing someone else's computer is called:
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 12
What is the purpose of an oval shape symbol in flowcharting ?
Choose an answer
Decision
Connector
Process
Start or End
Previous
Skip
Next
Question # 13
Which of the following tasks are performed by most of the algorithm ?
Choose an answer
Input
Output
Processing
All of these
Previous
Skip
Next
Question # 14
Which is essential to point out the defects and errors made during finding a solution to some problem ?
Choose an answer
Testing
Program
Writer
Demand
Previous
Skip
Next
Question # 15
Promises made by a software developer is known as warranty or:
Choose an answer
Confidentiality
Service
Liability
Loading
Previous
Skip
Next
Question # 16
Which is installing more copies of the software than you have license for ?
Choose an answer
Internet cyber text
Cyber
Client server oversue
Online piracy
Previous
Skip
Next
Back