Class 9 Computer MCQs Tests

This page contains all the online tests for Class 9 Computer Science MCQs. Students should do the practice all these tests for getting good marks in FBISE board exams. We have prepared all the possible MCQs of Class 9 Computer.


Class 9 Computer Science MCQs Tests


Full Book Grand Practice Tests

Grand Practice MCQs Test No 1
Grand Practice MCQs Test No 2
Grand Practice MCQs Test No 3

Chapter 1Fundamentals of Computer

Practice MCQs Test No 1
Practice MCQs Test No 2
Practice MCQs Test No 3
Practice MCQs Test No 4 (Exercise MCQs)

Chapter 2 – Fundamentals of Operating System

Practice MCQs Test No 1 (Exercise MCQs)
Practice MCQs Test No 2
Practice MCQs Test No 3

Chapter 3 – Office Automation

Practice MCQs Test No 1 (Exercise MCQs)

Chapter 4 – Data Communication

Practice MCQs Test No 1
Practice MCQs Test No 2

Chapter 5 – Computer Networks

Practice MCQs Test No 1 (Exercise MCQs)

Chapter 6 – Computer Security and Ethics

Practice MCQs Test No 1 (Exercise MCQs)

Special Grand Test (For Special Students)

/186
7

Class 9 Computer Science
Super Grand
Practice MCQs Test

1 / 186

1. Which of the following is open source operating system?

2 / 186

2. ‘D6’ with reference to a spreadsheet means:

3 / 186

3. _________ is difficult to use because users have to remember the commands to perform any task.

4 / 186

4. MS-DOS was replaced by:

5 / 186

5. OCR stands for:

6 / 186

6. An alternative of mouse present in laptop computers is:

7 / 186

7. It acts as an interface between the computer user and computer.

8 / 186

8. The period of the second generation computers was from:

9 / 186

9. Which of the following command is used to apply formatting to one or more cells based on the value of the cell?

10 / 186

10. What is a person who illegally breaks into others’ computer systems called?

11 / 186

11. ENIAC stands for:

12 / 186

12. Television broadcasting is an example of following transmission mode:

13 / 186

13. What is the ready state of a process?

14 / 186

14. All the input/output devices are connected to the:

15 / 186

15. Who is responsible for protecting information and information systems from unauthorized people in an organization?

16 / 186

16. A transmission impairment that refers to change in shape or frequency of digital signal is ____________.

17 / 186

17. Which one of the following refers to the setting of margins, tab positions and line spacing in MS Word?

18 / 186

18. These are the electric pathways printed on the motherboard.

19 / 186

19. Which software is distributed free of cost for a limited period as a trial version?

20 / 186

20. Which of the following topology is most expensive to implement?

21 / 186

21. Which interface is based on textual input?

22 / 186

22. These are used to transmit information between various components of the computer.

23 / 186

23. Which of the following authentication method is used for opening security gates?

24 / 186

24. Which of the following computer shares resources on a network for others to use?

25 / 186

25. Which one of the following errors will be handle by the operating system?

26 / 186

26. Security threats are transferred from one system to another due to:

27 / 186

27. Which one of the following operating system is suitable for tasks where large amount of data has to be collected and processed on regular basis:

28 / 186

28. Which of the following impairment refers to undesired signals that enter the path of the transmitted signal due to electromagnetic radiation?

29 / 186

29. Which of the following interface uses window, icon, menu, and a pointer to interact with computer?

30 / 186

30. It is a magnetic storage device used to store computer data.

31 / 186

31. Which transmission media uses light waves for transmitting information?

32 / 186

32. It is a very small amount of extremely fast memory inside the microprocessor or on the motherboard.

33 / 186

33. WI–FI uses:

34 / 186

34. Which of the following authentication method is based on features of individual such as face, fingerprint and voice?

35 / 186

35. It refers to the physical components that make up a computer system.

36 / 186

36. Which of the following is similar between Synchronous and Asynchronous transmission?

37 / 186

37. First generation computers used:

38 / 186

38. Which of the following Windows icon allows users to access the contents of computer drives and manage files and folders?

39 / 186

39. Which of the following tab contains the commands for creating charts in Excel?

40 / 186

40. The first antivirus software was developed by Bernd Fix in: 

41 / 186

41. In which generation of computer microprocessor was introduced?

42 / 186

42. A light-sensitive device that converts drawing, printed text, or other printed images into digital form is:

43 / 186

43. Rate of change of electrical signals per second is called:

44 / 186

44. Which one of the following medium transmits data using light waves?

45 / 186

45. Slide rule was replaced by electronic pocket calculator in the early: 

46 / 186

46. In which type of data transmission start/stop bits are used?

47 / 186

47. Which of the following command in Excel allows the user to view only certain data in a worksheet based on a condition?

48 / 186

48. The name of built-in anti-virus software in Windows 10 is:

49 / 186

49. Which of the following is used in airline traffic control system?

50 / 186

50. Which of the following operating system allows many users to use a computer at the same time?

51 / 186

51. Which of the following communication device is used to connect two different types of networks?

52 / 186

52. Which computer professional has the skills to edit and manipulate audio/video files?

53 / 186

53. Which of the following device is used for connecting computers together in wired local area networks?

54 / 186

54. Which of the following is used for short-distance communication?

55 / 186

55. Which of the following is designed to control the operations of a computer?

56 / 186

56. The storage capacity of a DVD is in the range of:

57 / 186

57. Which of the following authentication method is most reliable?

58 / 186

58. LAN stands for:

59 / 186

59. When were IC chips developed?

60 / 186

60. Which of the following is NOT a communication device?

61 / 186

61. __________ network device is used to connect computers in a wireless local area network.

62 / 186

62. They normally interact with the system via the user interface provided by the application software.

63 / 186

63. The period of the third generation computers was from:

64 / 186

64. Start and stop bits are not used in ______________ transmission.

65 / 186

65. In which of the following transmission, time interval between the characters is always same?

66 / 186

66. Microsoft introduced the MS-DOS in ______.

67 / 186

67. A device driver is a:

68 / 186

68. The processor which can perform all the operations and calculations is called:

69 / 186

69. Today’s modern digital computers are based on the idea of:

70 / 186

70. ______ invented the world’s first microprocessor in November 1971.

71 / 186

71. Which generation of computer used transistor?

72 / 186

72. ‘Multimodal Authentication’ means:

73 / 186

73. Flight Gear (flight simulator) is an example of:

74 / 186

74. What type of software a device driver is?

75 / 186

75. Which of the following device is used for connecting computers together in wireless local area networks?

76 / 186

76. Which of the following is not a process state?

77 / 186

77. Third generation computers used:

78 / 186

78. A term that defines the direction of flow of information between devices.

79 / 186

79. In which of the following network, every computer can act as a client, server, or both at the same time?

80 / 186

80. The software which can convert an image of text into a text file that can be edited is known as:

81 / 186

81. ‘Pairing’ of devices is done in:

82 / 186

82. Which one of the following provides high speed internet connection?

83 / 186

83. Which of the following is volatile memory?

84 / 186

84. The period of the fourth generation computers is from:

85 / 186

85. Which of the following is known as main memory or primary memory of computer?

86 / 186

86. The process of converting analog signals into digital signals is called:

87 / 186

87. The old name of International Business Machines (IBM) was:

88 / 186

88. The types of memories on the motherboard are:

89 / 186

89. A process is a program _________.

90 / 186

90. Which of the following is not an example of system software?

91 / 186

91. The communication over telephone line is an example of the following transmission mode:

92 / 186

92. Which of the following use more cable?

93 / 186

93. In which of the following network topology, a switch is required?

94 / 186

94. Cards used to connect additional devices to motherboard are attached via:

95 / 186

95. For installation of Windows 10 operating system, while booting  the computer, make sure DVD is set as the:

96 / 186

96. Which storage device has the fastest read/write access?

97 / 186

97. Which of the following authentication methodology is used to draw cash from ATM?

98 / 186

98. Which malware spreads automatically in computer networks and replicates itself

99 / 186

99. Which of the following is the fastest memory?

100 / 186

100. The operating system which processes information and produces response within a specified time is

101 / 186

101. The solution to attenuation is:

102 / 186

102. The default MS Word document window name is:

103 / 186

103. Abacus was the earliest calculating device most probably invented in:

104 / 186

104. Which of the following command in Excel restricts user from entering wrong data in cells of a worksheet?

105 / 186

105. What do you call a program in execution?

106 / 186

106. Which one of them is not a non-impact printer?

107 / 186

107. If an electrical signal has four states then it will _________ the bit transfer rate.

108 / 186

108. Which of the following tab of Word Ribbon contains Clipboard group?

109 / 186

109. Which is the correct association between a computer hardware component and a computer function?

110 / 186

110. Second generation computers used:

111 / 186

111. What feature would an author use while writing a document to add and external link to a website in MS-Word?

112 / 186

112. Who is known as the father of modern digital computers?

113 / 186

113. The operating system gives full control over a computer system to a person known as:

114 / 186

114. Which of the following network topology uses a device called terminator?

115 / 186

115. It loads programs into memory and executes them.

116 / 186

116. How many pairs of computers can communicate simultaneously on LAN?

117 / 186

117. Which of the following provides high speed Internet connection?

118 / 186

118. ____________ is the set of rules between the two communicating devices.

119 / 186

119. By operating system, the resource management can be done viav__________.

120 / 186

120. Slid Rule was developed in 1614 by:

121 / 186

121. Which of the following malware displays advertisements on the screen?

122 / 186

122. It can be viewed as a resource manager.

123 / 186

123. What represents the overall data transmission capacity of a computer network?

124 / 186

124. The purpose of twisting the cables is:

125 / 186

125. Assembler is used as a translator for:

126 / 186

126. In which of the following operating system, CPU is switched rapidly between all the programs to simultaneously execute all of them?

127 / 186

127. UNIX was developed for use on ______.

128 / 186

128. What is used for creating decorative effects in Word?

129 / 186

129. It is a single user and single task operating system.

130 / 186

130. Which of the following computer supports thousands of users at the same time?

131 / 186

131. What is making illegal copies of copyright software for use on other computers or sale called?

132 / 186

132. The purpose of using this memory is to improve the processing speed of computer.

133 / 186

133. _____________ is designed to solve a specific problem or to do a specific task.

134 / 186

134. Which of the following user interface is the easiest one to learn and use?

135 / 186

135. VLC media player is an example of:

136 / 186

136. Which of the following is not a type of computer on the basis of operation?

137 / 186

137. Fourth generation computers use:

138 / 186

138. Which of the following Windows icon allows users to access a program, file or folder quickly?

139 / 186

139. In which topology can a Node be easily added?

140 / 186

140.

___________  is a collection of system software that controls the working of a computer
system.

141 / 186

141. A set of processes is deadlock if __________

142 / 186

142. When the mouse pointer is at extreme left and changes to a right-pointing arrow, which of the following command is used in Word to select the entire document?

143 / 186

143. Which of the following operating system must process information and produce a response within a specified time?

144 / 186

144. Which software is given free of cost for an unlimited period of time.

145 / 186

145. _________ is a processing system in which jobs are collected, enters into a computer altogether and then computer executes them one by one

146 / 186

146. VLSI stands for :

147 / 186

147. An operating system is a/an:

148 / 186

148. Which of the following network provides centralized security?

149 / 186

149. Who invented logarithm?

150 / 186

150. Which of the following is not the state of a process?

151 / 186

151. Google Chrome is an example of:

152 / 186

152. Transmitting and receiving antennas must be with in the line of sight in ____________.

153 / 186

153. By default how many tabs are there in Word Ribbon?

154 / 186

154. Which of following network connects computers across cities, countries and continents?

155 / 186

155. Which one of the following is an absolute cell reference in MS Excel?

156 / 186

156. What is a person who uses special tools for breaking into computer systems called?

157 / 186

157. In which of the following transmission mode, information is transmitted in both directions but not simultaneously?

158 / 186

158. Novell’s Netware and ProDOS are the examples of:

159 / 186

159. Which of the following is NOT included in guided media?

160 / 186

160. It loads programs into memory and executes them.

161 / 186

161. It is the main chip on the motherboard that controls all the activities of the computer.

162 / 186

162. Which one of the following is a communication device?

163 / 186

163. Modulator/Demodulator refers to ________ device.

164 / 186

164. Antivirus software is an example of:

165 / 186

165. It is a pointing device with a vertical lever mounted on a base.

166 / 186

166. In which of the following impairment, the strength of signal falls off with distance?

167 / 186

167. Which folder in Windows is the default folder where the user saves files?

168 / 186

168. To create a new folder in Windows Explorer simply press the following keys:

169 / 186

169. Which of the following shortcut keys are used for pasting selected text?

170 / 186

170. Which of the following network is used to provide Cable TV and Internet services?

171 / 186

171. Which one of the following is open-source software?

172 / 186

172. The period of the first generation computers was from:

173 / 186

173. Which of the following malware gathers information about user activities on computer?

174 / 186

174. It is faster and more expensive than RAM.

175 / 186

175. If the signal to noise ratio is higher than 1:1 that means:

176 / 186

176.  It is a multi-user CLI operating system.

177 / 186

177. DVD stands for:

178 / 186

178. Rate of change of electrical signals per second is called:

179 / 186

179. Software that is used to detect and remove the viruses from the computer is called:

180 / 186

180. Components used for interconnecting dissimilar networks that use different communication protocols.

181 / 186

181. Which of the following software is used for creating professional documents?

182 / 186

182. Which of the following operating system was introduced in 1969?

183 / 186

183. Which one is a volatile memory?

184 / 186

184. The process of converting digital signals into analog signals is called:

185 / 186

185. ______________ are used for solving complex application such as Global Weather Forecasting.

186 / 186

186. Which of the following device forwards information from one network to another by selecting the best pathway available?

Your score is

0%

Please rate this quiz and give your feedback.