Professional Documents
Culture Documents
CSC 111 MCQ AND ANSWERS
CSC 111 MCQ AND ANSWERS
Answer: c. Printer
Answer: c. Python
12. What is the purpose of a network interface card (NIC) in a computer system?
a) To store data
b) To process data
c) To connect to the internet
d) To connect to a network
Answer: d. To connect to a network
20. What is the purpose of a database management system (DBMS) in a computer system?
a) To store data
b) To process data
c) To manage and organize data in a database
d) To connect to the internet
Answer: c. To manage and organize data in a database
23. What is the purpose of a power supply unit (PSU) in a computer system?
a) To store data
b) To process data
c) To provide power to the computer
d) To connect to the internet
Answer: c. To provide power to the computer
36. Which of the following is not a component of the Von Neumann architecture?
a) Control unit
b) Arithmetic logic unit (ALU)
c) Memory unit
d) Input/output unit (IOU)
Answer: d. Input/output unit (IOU)
39. What is the purpose of a network interface card (NIC) in a computer system?
a) To store data
b) To process data
c) To connect to the internet
d) To connect to a network
Answer: d. To connect to a network
47. What is the purpose of a database management system (DBMS) in a computer system?
a) To store data
b) To process data
c) To manage and organize data in a database
d) To connect to the internet
Answer: c. To manage and organize data in a database
50. What is the purpose of a power supply unit (PSU) in a computer system?
a) To store data
b) To process data
c) To provide power to the computer
d) To connect to the internet
Answer: c. To provide power to the computer
63. Which of the following is not a component of the Von Neumann architecture?
a) Control unit
b) Arithmetic logic unit (ALU)
c) Memory unit
d) Input/output unit (IOU)
Answer: d. Input/output unit (IOU)
75. Which of the following is a type of software that is designed to harm a computer
system?
a) Antivirus software
b) Malware
c) Firewall
d) System software
Answer: b) Malware
76. Which of the following data types can be represented using a Boolean data type?
a) Integer
b) Floating-point
c) Character
d) True/False
Answer: d. True/False
80. Which of the following sorting algorithms has the worst-case time complexity of O(n^2)?
a) Merge Sort
b) Quick Sort
c) Bubble Sort
d) Insertion Sort
Answer: c. Bubble Sort
85. Which of the following operators has the highest precedence in a mathematical
expression?
a) Addition
b) Division
c) Exponentiation
d) Multiplication
Answer: c. Exponentiation
87. Which layer of the OSI model is responsible for establishing, maintaining, and
terminating connections between devices?
a) Transport
b) Data Link
c) Network
d) Session
Answer: D. Session
90. Which protocol is used for sending email messages over the Internet?
a) SMTP
b) FTP
c) HTTP
d) TCP
Answer: A. SMTP
92. Which layer of the OSI model is responsible for ensuring that data is delivered error-
free, in sequence, and with no losses or duplications?
a) Transport
b) Data Link
c) Network
d) Physical
Answer: A. Transport
94. Which protocol is used for transferring files over the Internet?
a) FTP
b) SMTP
c) HTTP
d) TCP
Answer: A. FTP