© 2026 Ace MCQs. All rights reserved.

  • About
  • Contact
  • Privacy Policy
  • Terms of Service
Ace MCQs Logo
HomeContributors
Menu
HomeContributors
Sign In

Latest Questions

Explore recent questions from the community

NewestOldestMost PopularLeast PopularMost DiscussedMost Bookmarked
Computer ScienceClear all
F
Farhan Raja1 year ago
Computer Science

FM stands for ________?

0
R
Rameen Sheikh1 year ago
Computer Science
←Prev
12345

Note book, laptop,palm,hand-held computers are coming under the category of__________computer?

0
P
Parisa Akhtar1 year ago
Computer Science

What is the purpose of inserting wallpaper in Microsoft Word?

0
B
Babar Bukhari1 year ago
Computer Science

In banks, data check on the cheques is read by the following device:

0
T
Tariq Gardezi1 year ago
Computer Science

A fault in a computer program which prevents it from working correctly is known as___________?

0
M
Mudassir Mirza1 year ago
Computer Science

Which of the following is a storage device?

0
E
Erum Qureshi1 year ago
Computer Science

In analogue computer_____________?

0
V
Vaneeza Jamali1 year ago
Computer Science

Who invented the high level language “C”?

0
S
Sahar Chaudhry1 year ago
Computer Science

To minimize the all windows in desktop shortcut key is _________?

0
N
Nadeem Dar1 year ago
Computer Science

Which of the following is not anti- viruses software?

0
J
Jannat Tariq1 year ago
Computer Science

Loading of Operating System in Personal Computer is called?

0
R
Rehan Hussain1 year ago
Computer Science

The thing that eventually terminates a worm virus is a lack of:

0
H
Haris Tariq1 year ago
Computer Science

_______________is the ability of a device to “jump” directly to the requested data?

0
A
Aamir Awan1 year ago
Computer Science

Abacus was the first __________________.

0
A
Adeel Khan1 year ago
Computer Science

In 1997, which technological design was named after a Viking king?

0
S
Shahid Jamali1 year ago
Computer Science

The first electronic computer was developed by____________?

0
T
Tahira Farooq1 year ago
Computer Science

What is the most common tool used to restrict access to a computer system?

0
A
Adnan Siddiqui1 year ago
Computer Science

Which programming languages are classified as low level languages?

0
D
Danish Mughal1 year ago
Computer Science

A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a____________?

0
S
Sohail Abbasi1 year ago
Computer Science

When was the first IBM microcomputer called IBM with 16-bit microprocessor introduced?

0
6
...
36
Page 4 of 36
Next→