Professional Documents
Culture Documents
Mcq Computer
Mcq Computer
Set - 1
1. Two main measures for the efficiency of an algorithm are
a. Processor and memory
b. Complexity and capacity
c. Time and space
d. Data and space
12. The indirect change of the values of a variable in one module by another module is called
a. internal change
b. inter-module change
c. side effect
d. side-module update
13. Which of the following data structure is not linear data structure?
a. Arrays
b. Linked lists
c. Both of above
d. None of above
16. Finding the location of the element with a given value is:
a. Traversal
b. Search
c. Sort
d. None of above
19. Each array declaration need not give, implicitly or explicitly, the information about
a. the name of array
b. the data type of array
c. the first data from the set to be stored
d. the index set of the array
20. The elements of an array are stored successively in memory cells because
a. by this way computer can keep track only the address of the first element and the addresses of other
elements can be calculated
b. the architecture of computer memory does not allow arrays to store other than serially
c. both of above
d. none of above
Answers
1. Two main measures for the efficiency of an algorithm are
c. Time and space
2. The time factor when determining the efficiency of algorithm is measured by
b. Counting the number of key operations
3. The space factor when determining the efficiency of algorithm is measured by
a. Counting the maximum memory needed by the algorithm
4. Which of the following case does not exist in complexity theory
d. Null case
5. The Worst case occur in linear search algorithm when
d. Item is the last element in the array or is not there at all
6. The Average case occur in linear search algorithm
a. When Item is somewhere in the middle of the array
7. The complexity of the average case of an algorithm is
a. Much more complicated to analyze than that of worst case
8. The complexity of linear search algorithm is
a. O(n)
9. The complexity of Binary search algorithm is
b. O(log n)
10. The complexity of Bubble sort algorithm is
c. O(n2)
11. The complexity of merge sort algorithm is
d. O(n log n)
12. The indirect change of the values of a variable in one module by another module is called
c. side effect
13. Which of the following data structure is not linear data structure?
d. None of above
14. Which of the following data structure is linear data structure?
c. Arrays
15. The operation of processing each element in the list is known as
d. Traversal
16. Finding the location of the element with a given value is:
b. Search
17. Arrays are best data structures
a. for relatively permanent collections of data
18. Linked lists are best suited
b. for the size of the structure and the data in the structure are constantly changing
19. Each array declaration need not give, implicitly or explicitly, the information about
c. the first data from the set to be stored
20. The elements of an array are stored successively in memory cells because
a. by this way computer can keep track only the address of the first element and the addresses of other
elements can be calculated
Set - 2
1. The memory address of the first element of an array is called
a. floor address
b. foundation address
c. first address
d. base address
2. The memory address of fifth element of an array can be calculated by the formula
a. LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words per memory cell for
the array
b. LOC(Array[5])=Base(Array[5])+(5-lower bound), where w is the number of words per memory cell for
the array
c. LOC(Array[5])=Base(Array[4])+(5-Upper bound), where w is the number of words per memory cell for
the array
d. None of above
4. Which of the following is not the required condition for binary search algorithm?
a. The list must be sorted
b. there should be the direct access to the middle element in any sublist
c. There must be mechanism to delete and/or insert elements in list
d. none of above
8. Which of the following data structure can't store the non-homogeneous data elements?
a. Arrays
b. Records
c. Pointers
d. None
9. Which of the following data structure store the homogeneous data elements?
a. Arrays
b. Records
c. Pointers
d. None
10. Each data item in a record may be a group item composed of sub-items; those items which are
indecomposable are called
a. elementary items
b. atoms
c. scalars
d. all of above
14. When new data are to be inserted into a data structure, but there is no available space; this situation
is usually called
a. underflow
b. overflow
c. housefull
d. saturated
19. A data structure where elements can be added or removed at either end but not in the middle
a. Linked lists
b. Stacks
c. Queues
d. Deque
20. When inorder traversing a tree resulted E A C K F H D B G; the preorder traversal would return
a. FAEKCDBHG
b. FAEKCDHGB
c. EAFKHDCBG
d. FEAKDCHBG
Answers
1. The memory address of the first element of an array is called
d. base address
2. The memory address of fifth element of an array can be calculated by the formula
a. LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words per memory cell for
the array
4. Which of the following is not the required condition for binary search algorithm?
c. There must be mechanism to delete and/or insert elements in list
8. Which of the following data structure can't store the non-homogeneous data elements?
a. Arrays
9. Which of the following data structure store the non-homogeneous data elements?
b. Records
10. Each data item in a record may be a group item composed of sub-items; those items which are
indecomposable are called
d. all of above
14. When new data are to be inserted into a data structure, but there is no available space; this situation
is usually called
b. overflow
19. A data structure where elements can be added or removed at either end but not in the middle
d. Deque
20. When inorder traversing a tree resulted E A C K F H D B G; the preorder traversal would return
b. FAEKCDHGB
Set - 3
1. Which data structure allows deleting data elements from front and inserting at rear?
a. Stacks
b. Queues
c. Deques
d. Binary search tree
2. Identify the data structure which allows deletions at both ends of the list but insertion at only one
end.
a. Input-restricted deque
b. Output-restricted deque
c. Priority queues
d. None of above
6. A binary tree whose every node has either zero or two children is called
a. Complete binary tree
b. Binary search tree
c. Extended binary tree
d. None of above
8. When representing any algebraic expression E which uses only binary operations in a 2-tree,
a. the variable in E will appear as external nodes and operations in internal nodes
b. the operations in E will appear as external nodes and variables in internal nodes
c. the variables and operations in E will appear only in internal nodes
d. the variables and operations in E will appear only in external nodes
10. When converting binary tree into extended binary tree, all the original nodes in binary tree are
a. internal nodes on extended tree
b. external nodes on extended tree
c. vanished on extended tree
d. None of above
11. The post order traversal of a binary tree is DEBFCA. Find out the pre order traversal
a. ABFCDE
b. ADBFEC
c. ABDECF
d. ABDCEF
14. In a binary tree, certain null entries are replaced by special pointers which point to nodes higher in
the tree for efficiency. These special pointers are called
a. Leaf
b. branch
c. path
d. thread
15. The in order traversal of tree will yield a sorted listing of elements of tree in
a. Binary trees
b. Binary search trees
c. Heaps
d. None of above
16. In a Heap tree
a. Values in a node is greater than every value in left sub tree and smaller than right sub tree
b. Values in a node is greater than every value in children of it
c. Both of above conditions applies
d. None of above conditions applies
Answers:
1. Which data structure allows deleting data elements from front and inserting at rear?
b. Queues
2. Identify the data structure which allows deletions at both ends of the list but insertion at only one
end.
a. Input-restricted deque
6. A binary tree whose every node has either zero or two children is called
c. Extended binary tree
8. When representing any algebraic expression E which uses only binary operations in a 2-tree,
a. the variable in E will appear as external nodes and operations in internal nodes
10. When converting binary tree into extended binary tree, all the original nodes in binary tree are
a. internal nodes on extended tree
11. The post order traversal of a binary tree is DEBFCA. Find out the pre order traversal
c. ABDECF
12. Which of the following sorting algorithm is of divide-and-conquer type?
c. Quick sort
14. In a binary tree, certain null entries are replaced by special pointers which point to nodes higher in
the tree for efficiency. These special pointers are called
d. thread
15. The in order traversal of tree will yield a sorted listing of elements of tree in
b. Binary search trees
SET-1
Question 1:
Electronic spreadsheets are most useful in a situation where relatively .... data must be input but ......
calculations are requied.
a. little; simple
b. large; simple
c. large; complex
d. little; complex
Question 2:
The two basic types of record access methods are
a. sequential and randon
b. direct and immediate
c. sequential and indexed
d. on-line and real-time
e. none of above
Question 3:
Which file organization is allowed by a direct access storage device?
a. direct only
b. sequential and direct only
c. indexed and direct only
d. sequential, indexed and direct
e. none of above
Question 4:
Sequential file organization is most appropriate for which of following applications?
a. Grocery store checkout
b. bank checking account
c. payroll
d. airline reservations
e. none of above
Question 5:
Which of the following file organization is most effieient for a file with a high degree of file activity?
a. sequential
b. ISAM
c. VSAM
d. B-Tree
e. All of above
Question 6:
One disadvantage of a direct access file is:
a. the delay in computiong the storage address
b. duplication of address locations
c. unsued, but available, storage locations
d. all of above
Question 7:
All computers execute
a. BASIC programs
b. COBOL programs
c. Machine language program
d. FORTRAN programs
e. PL/1 programs
Question 8:
Which of the following is most oriented to scientific programming?
a. FORTRAN
b. COBOL
c. BASIC
d. PL/1
e. RPG
Question 9:
All of the following are disadvantage of RPG except:
a. it is a very machine dependent language
b. it is very limited in scope
c. is not suited for complex problems requiring extensive programming logic
d. it has larger storage requierments
e. all of the above are disadvantages
Question 10:
Which of the following is not one of the process that a high level language program msut go through
before it is ready to be executed?
a. translation
b. controlling
c. lading
d. linking
e. all of the above are necessary process
Answers:
1. d 2. a 3. d 4. c 5. a 6. a 7. c 8. a 9. b. 10.a
SET-2
Question 1:
Which of the following is not true of FORTRAN?
a. it was developed for scientific and mathematical applications
b. it is one of the oldest high-level languages
c. it is a problem oriented language
d. it requires extensive internal documentation
e. all of above
Question 2:
All of the following are divisions of the COBOL program except:
a. input-output
b. indentification
c. procedure
d. data
e. all of above divisions
Question 3:
In a COBOL program, the input output section is within the .... division
a. identification
b. procedure
c. configuration
d. environment
e. none of above
Question 4:
Which of hte following is not characteristic of COBOL
a. it is a very standardized language
b. it is a very efficient in terms of coding and execution
c. it has limited facilities for mathematical notation
d. it is very readable language
e. all of the above are characteristics
Question 5:
Which of the following is an example of problem oriented language?
a. BASIC
b. PL/1
c. FORTRAN
d. All of above
e. none of above
Question 6:
In the evaluation of a computer language, all of the following characteristics should be considered
except?
a. application oriented features
b. efficiency
c. readability
d. softare development aids
e. hardware maintainance costs
Question 7:
A factor in the selection of a source language is
a. programmer skill
b. language availability
c. program compatibility with other software
d. all of athe above
Question 8:
A computer generated output that lets programmer follow the execution of their programs line by line is
a
a. core dump
b. trace routine
c. detail listing
d. source listing
Question 9:
In BASIC, description comments are put in the source program with the
a. PRINT statement
b. REMARK statement
c. INPUT statement
d. DATA statement
Question 10:
Which of the following generations of language will likely include the languages of the featuer?
a. first generation
b. second dgeneration or third generation
c. fourth generation
d. fifth generation
Answers:
1. b 2.a 3.d 4.b 5.d 6.e 7.d 8.b 9.b 10.c
SET-1
Question 1:
In OSI network architecture, the dialogue control and token management are responsibility of
a. session layer
b. network layer
c. transport layer
d. data link layer
e. none of above
Question 2:
In OSI network architecture, the routing is performed by
a. network layer
b. data link layer
c. transport layer
d. session layer
e. none of above
Question 3:
Which of the following performs modulation and demodulation?
a. fiber optics
b. satellite
c. coaxial cable
d. modem
e. none of the above
Question 4:
The process of converting analog signals into digital signals so they can be processed by a receiving
computer is referred to as:
a. modulation
b. demodulation
c. synchronizing
d. digitising
Question 5:
How many OSI layers are covered in the X.25 standard?
a. Two
b. Three
c. Seven
d. Six
e. None of above
Question 6:
Layer one of the OSI model is
a. physical layer
b. link layer
c. transport layer
d. network layer
e. none of above
Question 7:
The x.25 standard specifies a
a. technique for start-stop data
b. technique for dial access
c. DTE/DCE interface
d. data bit rate
e. none of above
Question 8:
Which of the following communication modes support two-way traffic but in only one direction at a
time?
a. simplex
b. half duplex
c. three-quarters duplex
d. all of the above
e. none of the above
Question 9:
Which of the following might be used by a company to satisfy its growing communications needs?
a. front end processor
b. multiplexer
c. controller
d. concentrator
e. all of the above
Question 10:
What is the number of separate protocol layers at the serial interface gateway specified by the X.25
standard?
a. 4
b. 2
c. 6
d. 3
3. none of the above
Correct Answers:
1. a
2. a
3. d
4. d
5. b
6. a
7. c
8. b
9. e
10. d
SET-2
Question 1:
The interactive transmission of data within a time sharing system may be best suited to
a. simplex lines
b. half-duplex lines
c. full duplex lines
d. biflex-lines
Question 2:
Which of the following statement is incorrect?
a. The difference between synchronous and asynchronous transmission is the clocking derived from the
data in synchronous transmission.
b. Half duplex line is a communication line in which data can move in two directions, but not at the same
time.
c. Teleprocessing combines telecommunications and DP techniques in online activities
d. Batch processing is the prefered processing mode for telecommunication operation.
Question 3:
Which of hte following is considered a broad band communication channel?
a. coaxial cable
b. fiber optics cable
c. microwave circuits
d. all of above
Question 4:
Which of the following is not a transmission medium?
a. telephone lines
b. coaxial cables
c. modem
d. microwave systems
Question 5:
Which of the following does not allow multiple uses or devices to share one communication line?
a. doubleplexer
b. multiplexer
c. concentrator
d. controller
Question 6:
Which of the following signal is not standard RS-232-C signal?
a. VDR
b. RTS
c. CTS
d. DSR
Question 7:
Which of the following statement is incorrect?
a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of
data on one communication line
b. HDLC is a standard synchronous communication protocol.
c. RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates
that it is ready to accept data
d. RTS/CTS is the way the terminal indicates ringing
Question 8:
Which of the following is an advantage to using fiber optics data transmission?
a. resistance to data theft
b. fast data transmission rate
c. low noise level
d. all of above
Question 9:
Which of the following is required to communicate between two computers?
a. communications software
b. protocol
c. communication hardware
d. all of above including access to transmission medium
Question 10:
The transmission signal coding method of TI carrier is called
a. Bipolar
b. NRZ
c. Manchester
d. Binary
Answers:
1. b
2. d
3. d
4. c
5. a
6. a
7. d
8. d
9. d
10. a
SET-3
Question 1:
Which data communication method is used to transmit the data over a serial communication link?
a. simplex
b. half-duplex
c. full-duplex
d. b and c
e. None of above
Question 2:
What is the minimum number of wires needed to send data over a serial communication link layer?
a. 1
b. 2
c. 4
d. 6
e. none of above
Question 3:
Which of the following types of channels moves data relatively slowly?
a. wide band channel
b. voice band challen
c. narrow band channel
Question 4:
Most data communications involving telegraph lines use:
a. simplex lines
b. wideband channel
c. narrowband channel
d. dialed service
Question 5:
A communications device that combines transmissions from several I/O devices into one line is a
a. concentrator
b. modifier
c. multiplexer
d. full-duplex line
Question 6:
How much power (roughly) a light emitting diode can couple into an optical fiber?
a. 100 microwatts
b. 440 microwatts
c. 100 picowatts
d. 10 miliwatts
Question 7:
The synchronous modems are more costly than the asynchronous modems because
a. they produce large volume of data
b. they contain clock recovery circuits
c. they transmit the data with stop and start bits
d. they operate with a larger bandwidth
e. none of above
Question 8:
Which of the following statement is correct?
a. terminal section of a synchronous modem contains the scrambler
b. receiver section of a synchronous modem contains the scrambler
c. transmission section of a synchronous modem contains the scrambler
d. control section of a synchronous modem contains the scrambler
e. none of the above
Question 9:
In a synchronous modem, the digital-to-analog converter transmits signal to the
a. equilizer
b. modulator
c. demodulator
d. terminal
e. none of aobve
Question 10:
Which of the following communications lines is best suited to interactive processing applications?
a. narrow band channel
b. simplex lines
c. full duplex lines
d. mixed band channels
Answers
1. c
2. b
3. c
4. c
5. c
6. a
7. b
8. c
9. a
10. c
SET-4
Question:1
A remote batch-processing operation in which data is solely input to a central computer would require
a. telegraphp line
b. simplex lines
c. mixed bad channel
d. all of above
Question 2:
A band is always equivalent to
a. a byte
b. a bit
c. 100 bits
d. none of above
Question 3:
The loss in signal power as light travels down the fiber is called
a. attenuation
b. progragation
c. scattering
d. interruption
Question 4:
Avalanche photodiode receivers can detect bits of transmitted data by receiving
a. 100 photons
b. 200 photons
c. 2000 photons
d. 300 photons
Question 5:
Communiction circuits that transmit data in both directions but not at the same time are operating in
a. a simplex mode
b. a half duplex mode
c. a full duplex mode
d. an asynchronous mode
Question 6:
An example of a medium speed, switched communications service is
a. series 1000
b. data phone 50
c. DDD
d. All of the above
Question 7:
In communication satellite, multiple repeaters are known as
a. detector
b. modulator
c. stations
d. transponders
Question 8:
While transmitting odd-parity coded symbols, the number of zeros in each symbol is
a. odd
b. even
c. a and b both
d. unknown
Question 9:
Data communications monitors available on the software marked include
a. ENVIRON/1
b. TOTAL
c. BPL
d. Telnet
Question 10:
An example of an analog communication method is
a. laser beam
b. microwave
c. voice grade telephone line
d. all of the above
Answers
1. b
2. d
3. a
4. b
5. b
6. c
7. d
8. d
9. a
10. d
SET-5
Question:1
Number of bits per symbol used in Baudot code is
a. 7
b. 5
c. 8
d. 9
Question 2:
What is the main difference between DDCMP and SDLC?
a. DDCMP does not need special hardware to final the beginning of a message
b. DDCMP has a message header
c. SDLC has a IP address
d. SDLC does not use CRC
Question 3:
An example of digital, rather than analog, communication is
a. DDD
b. DDS
c. WATS
d. DDT
Question 4:
Terminals are required for
a. real-time, batch processing & time-sharing
b. real time, time-sharing & distributed message processing
c. real time, distributed processing & manager inquiry
d. real-time, time sharing & message switching
Question 5:
The receive equilizer reduces delay distortions using a
a. tapped delay lines
b. gearshift
c. descrambler
d. difference engine
Question 6:
Ina synchronous modem, the receive equilizer is known as
a. adaptive equilizer
b. impariment equilizer
c. statistical equilizer
d. compromise equilizer
Question 7:
The channel in the data communication model can be
a. postal mail services
b. telephone lines
c. radio lines
d. any of the above
Question 8:
A data terminal serves as an
a. Effector
b. sensor
c. both a and b
d. neither a nor b
Question 9:
Which of the following transmission systems provide the highest data rate to in individual device?
a. computer bus
b. telephone lines
c. voice and mode
d. lease lines
Question 10:
A protocol is a set of rules governing a time sequence of events that must take place
a. between peers
b. between an interface
c. between modems
d. across an interface
Answers
1. b
2. a
3. b
4. d
5. a
6. a
7. d
8. c
9. a
10. a
Computer Architecture and Organization MCQS
Set-1
Question 1:
Where does a computer add and compare data?
a. Hard disk
b. Floppy disk
c. CPU chip
d. Memory chip
Question 2:
Which of the following registers is used to keep track of address of the memory location where the next
instruction is located?
a. Memory Address Register
b. Memory Data Register
c. Instruction Register
d. Program Register
Question 3:
A complete microcomputer system consists of
a. microprocessor
b. memory
c. peripheral equipment
d. all of above
Question 4:
CPU does not perform the operation
a. data transfer
b. logic operation
c. arithmetic operation
d. all of above
Question 5:
Pipelining strategy is called implement
a. instruction execution
b. instruction prefetch
c. instruction decoding
d. instruction manipulation
Question 6:
A stack is
a. an 8-bit register in the microprocessor
b. a 16-bit register in the microprocessor
c. a set of memory locations in R/WM reserved for storing information temporarily during the execution
of computer
d. a 16-bit memory address stored in the program counter
Question 7:
A stack pointer is
a. a 16-bit register in the microprocessor that indicate the beginning of the stack memory.
b. a register that decodes and executes 16-bit arithmetic expression.
c. The first memory location where a subroutine address is stored.
d. a register in which flag bits are stored
Question 8:
The branch logic that provides decision making capabilities in the control unit is known as
a. controlled transfer
b. conditional transfer
c. unconditional transfer
d. none of above
Question 9:
Interrupts which are initiated by an instruction are
a. internal
b. external
c. hardware
d. software
Question 10:
A time sharing system imply
a. more than one processor in the system
b. more than one program in memory
c. more than one memory in the system
d. None of above
Answers:
1. c
2. d
3. d
4. d
5. b
6. c
7. a
8. c
9. d
10. b
Question 1:
Processors of all computers, whether micro, mini or mainframe must have
a. ALU
b. Primary Storage
c. Control unit
d. All of above
Question 2:
What is the control unit's function in the CPU?
a. To transfer data to primary storage
b. to store program instruction
c. to perform logic operations
d. to decode program instruction
Question 3:
What is meant by a dedicated computer?
a. which is used by one person only
b. which is assigned to one and only one task
c. which does one kind of software
d. which is meant for application software only
Question 4:
The most common addressing techiniques employed by a CPU is
a. immediate
b. direct
c. indirect
d. register
e. all of the above
Question 5:
Pipeline implement
a. fetch instruction
b. decode instruction
c. fetch operand
d. calculate operand
e. execute instruction
f. all of abve
Question 6:
Which of the following code is used in present day computing was developed by IBM corporation?
a. ASCII
b. Hollerith Code
c. Baudot code
d. EBCDIC code
Question 7:
When a subroutine is called, the address of the instruction following the CALL instructions stored in/on
the
a. stack pointer
b. accumulator
c. program counter
d. stack
Question 8:
A microprogram written as string of 0's and 1's is a
a. symbolic microinstruction
b. binary microinstruction
c. symbolic microprogram
d. binary microprogram
Question 9:
Interrupts which are initiated by an instruction are
a. internal
b. external
c. hardware
d. software
Question 10:
Memory access in RISC architecture is limited to instructions
a. CALL and RET
b. PUSH and POP
c. STA and LDA
d. MOV and JMP
Answers:
1. d 2. d 3. b 4. e 5. f 6. d 7. d 8. d 9. b 10. c
Question 1:
A collection of 8 bits is called
a. byte
b. word
c. record
Question 2:
The ascending order or a data Hierarchy is
a. bit - bytes - fields - record - file - database
b. bit - bytes - record - field - file - database
c. bytes - bit- field - record - file - database
d. bytes -bit - record - field - file - database
Question 3:
How many address lines are needed to address each memory locations in a 2048 x 4 memory chip?
a. 10
b. 11
c. 8
d. 12
Question 4:
A computer program that converts an entire program into machine language at one time is called a/an
a. interpreter
b. simulator
c. compiler
d. commander
Question 5:
In immediate addressing the operand is placed
a. in the CPU register
b. after OP code in the instruction
c. in memory
d. in stack
Question 6:
Microprocessor 8085 can address location upto
a. 32K
b. 128K
c. 64K
d. 1M
Question 7:
The ALU and control unit of most of the microcomputers are combined and manufacture on a single
silicon chip. What is it called?
a. monochip
b. microprocessor
c. ALU
d. control unit
Question 8:
When the RET instruction at the end of subroutine is executed,
a. the information where the stack is iniatialized is transferred to the stack pointer
b. the memory address of the RET instruction is transferred to the program counter
c. two data bytes stored in the top two locations of the stack are transferred to the program counter
d. two data bytes stored in the top two locations of the stack are transferred to the stack pointer
Question 9:
A microporgram is sequencer perform the operation
a. read
b. write
c. execute
d. read and write
e. read and execute
Question 10:
Interrupts which are initiated by an I/O drive are
a. internal
b. external
c. software
d. all of above
Answers:
1. a 2. a 3. b 4. c 5.b 6.c 7.b 8.c 9.e 10.b
(iii) The technique for allowing a unit to check the status of another independently function unit
is known as?
(a) Interrupt
(b) System call
(c) Polling
(d) Trape
(e) None of these
(iv) The method for storing data temporarily such that the input-output of the same job is
overlapped with its own processing, is known as:
(a) Spooling
(b) Contention
(c) I/O wait
(d) Buffering
(e) None of these
(v) The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these
(vi) _________ Scheduler deals with the decision as to whether to admit another new job to the
system.
(a) High Level
(b) Medium Level
(c) Low Level
(d) Short term
(e) None of these
(vii) When the process is in the states of Blocked Suspended or Ready Suspended, its relevant
data is
stored in:
(a) Main Memory
(b) Hard Disk
(c) Magnetic Tape
(d) Buffer
(e) None of these
(viii) Priority, P = (Time Waiting + Run Time) / Run Time is used to calculate priority in
__________ scheduling algorithm:
(a) Shortest Job First
(b) Priority Scheduling
(c) Longest Wait First
(d) Highest Response Ratio Next
(e) None of these
(x) _________ is the generic name for a set of standards issued by the International
CommunicationsStandards Body CCITT, designed to support Message Handling Systems; i.e.
Electronic Mail.
(a) TCP/IP
(b) ISDN
(c) X.400
(d) X.25
(e) None of these
(xi) ________ layer is responsible for the transfer of a packet of data along one link in the
network. It organizes data into frames and detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these
(xii) Encryption is the conversion of data in some intelligible format into an unintelligible format
called _________ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these
(xiii) Binary search requires about ______ comparisons with an initial list of 1,000,000 elements.
(a) 10
(b) 20
(c) 35
(d) 100
(e) None of these
(xiv) A _________ header list is a header list where the last node contains the null pointer.
(a) Grounded
(b) Circular
(c) One way
(d) Rooted
(e) None of these
(xv) ________ are small applications that are accessed on an internet server, transported over the
internet, automatically installed and run as part of a web document.
(a) Applets
(b) Java Bean
(c) Sockets
(d) Java Component
(e) None of these
(xviii) ________ is stored on a client and contains state information of the website visited.
(a) Cookies
(b) Servelet
(c) History
(d) Resident Page
(e) None of these
(xix) In software Engineering KPA denotes.
(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these
(xx) The ________ Process Model defines a series of events that will trigger transitions from
state to state for each of software engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these
ANSWER
1. a
2. d
3. b
4. d
5d
6a
7a
8b
9a
10 a
11 b
12 c
13 d
14 d
15 a
16 b
17 b
18 b
19 b
20 a
1-object (also called_____) is a common data type that includes photograph, audio, vedio,
or a document in other applications.
(a) Number (b) BLOB (c) Integer (d) binary (e) none of these
3. In a database, a(n) ____ field is a field that uniquely identifies each record in a file.
(a) Main (b) Identifying (c) Master (d) Key (e) none of these
4. If a lowest annual fee at a discount wherehouse is Rs.2025 and the highest is Rs.5550,
a(n)______ on annual fee field ensure it is a value between Rs.2025 and Rs.5550.
(a) Range Check (b) compelteness check (c) consistency Check (d) alphabetic/numeric
check (e) none of these
6. _______ is a network technology that defines how messages are routed from one end of
a network to other, ensuring the datat arrives correctly by dividing it into packets.
(a) HTML (b) XML (c) HTTP (d) TCP/IP (e) none of these
7. When a computer sends data over the internet, the data is divided into small pieces , or
_______
(a) Bundles (b) packets (c) slices (d) baskets (e) none of these
8. The amount of data, instructions and information that can travel over a communication
channel somtimes is called _______
(a) broadband (b) baseband (c) latency (d) bandwidth (e) none of these
9. fiber optic cables have all of the following advantages over cables that used wire except
_______
(a) lower costs & easier installation and modification
(b) Faster data transmission & smaller size
(c) Less susceptible to noise from other divices
(d) Better security for signals during transmission
(e) none of these
10. A_____ is a network that connects compter and divices in a limited geographical area,
such as home, school computer laboratory , or office building
(a) LAN (b) MAN (c) WAN (d) VAN (e) none of these
11. with _______ memory , the operating system allocates a portion of storage medium,
usually the hard disk , to function as additional RAM
(a) Virtual (b) performance (c) device (d) Manged (e) none of these
12. If a new a device such as printer or scanner is attached to a computer, its _________
must be installed before the divice can be used
(a) Driver (b) platform (c) manager (d) kernel (e) none of these
13. A ________ is an icon on the desktop that provides a user with immediate access to a
program or file.
(a) kernel (b) spooler (c) buffer (d) Shortcut (e) none of these
14. ________ a disk or reorgnizing it so the files are stored in contiguous sectors, speeds
up disk access and thus performance of entire computer .
(a) Formating (b) Defregmenting (c) Spooling (d) compressing (e) none of these
15. the term cmputer _______ discribes potentially damging computer program that affects
or infects a computer by altering the way the compter works without the users knowledge
or permission .
(a) Hot spot (b) File compression Utillty (c) Virus (d) File conversion Utillity (e) none of
these
16. In a diagram ( a DFD diagram was given ) _________ shows the input and output of
information into or out from a prosses .
(a) Use Case (b) Data Flow (c) entity relationship (d) Class Diagram (e) none of these
17. Although used in all types of bussiness modeling the _____ has been adopted as a
standard notation for object modeling.
(a) UML (b) CASE Tool (c) USE CASE Diagram (d) EMR (not sure) (e) none of these
18. For each input and output, a systems analyst tipicaly develops _______ which is a
sample of the input or output and contains actual data.
(a) adoption (b) prototype (c) Mockup (d) feasibility Scheme (e) none of these
(1) If the highest frequency of a signal is 2100 Hz and lowest frequency of a signal is 200 Hz,
sample rate will be:
(a) 4000 Hz
(b) 4600 Hz
(c) 4200 Hz
(d) 2300 Hz
(e) None of these
(2) A 56 K modem can download at a rate of _________ Kbps and upload at a rate of
_________ Kbps.
(a) 33.6; 33.6
(b) 33.6; 56.6
(c) 56.6; 33.6
(d) 56.6; 56.6
(e) None of these
(3) A system call provides interface between:
(a) A process and a thread
(b) A thread and a user program
(c) A process and an operating system
(d) A process and a user program
(e) None of these
(7) If you wanted to sort many large objects or structures, it would be most efficient to:
(a) Place them in an array and sort the array
(b) Place pointers to them in an array and sort the array
(c) Place them in a linked list and sort the linked list
(d) Place references to them in an array and sort the array
(e) None of these
(8) The type of the variable a pointer points to must be part of the pointer’s definition so
that:
(a) Data types do not get mixed up when arithmetic is performed on them.
(b) Pointers can be added to one another to access structure members
(c) No one’s religious conviction will be offended
(d) The computer can perform overloading
(e) None of these
(10) Which one of the following methods does not change the original value of the
argument in the calling function?
(a) Call by passing reference of the argument
(b) Call by passing the address of the argument
(c) Call by passing value of the argument
(d) Call by passing pointer of the argument
(e) None of these
(1) If the highest frequency of a signal is 2100 Hz and lowest frequency of a signal is 200 Hz,
sample rate will be:
(a) 4000 Hz
(b) 4600 Hz
(c) 4200 Hz
(d) 2300 Hz
(e) None of these
(2) A 56 K modem can download at a rate of _________ Kbps and upload at a rate of
_________ Kbps.
(a) 33.6; 33.6
(b) 33.6; 56.6
(c) 56.6; 33.6
(d) 56.6; 56.6
(e) None of these
(7) If you wanted to sort many large objects or structures, it would be most efficient to:
(a) Place them in an array and sort the array
(b) Place pointers to them in an array and sort the array
(c) Place them in a linked list and sort the linked list
(d) Place references to them in an array and sort the array
(e) None of these
(8) The type of the variable a pointer points to must be part of the pointer’s definition so
that:
(a) Data types do not get mixed up when arithmetic is performed on them.
(b) Pointers can be added to one another to access structure members
(c) No one’s religious conviction will be offended
(d) The computer can perform overloading
(e) None of these
(10) Which one of the following methods does not change the original value of the
argument in the calling function?
(a) Call by passing reference of the argument
(b) Call by passing the address of the argument
(c) Call by passing value of the argument
(d) Call by passing pointer of the argument
(e) None of these
(A) Write only True or False in the Answer Book. Do not reproduce the question. (1x10)
(1) A feature of an operating system that allows more than one program to run simultaneously is called
Multitasking.
(2) A trackball operates like a joystick on its back. It is extremely useful when there isn't enough space to
use a mouse,
(3) Digitizing Tablet is a'special Input device that is mainly used to digitize vector-oriented design or
pictures.
(4) Dedicated line is a high speed cable line that is not permanently wired into the internet.
(5) A Router is a network device that helps LANs and WANs achieve interoperability and connectivity
and thai can link LANs that have different netwoik topdldgies, such as Ethernet and Token Ring.
(6) Internet Protocol is a routable protocol in the backbone that is responsible for IP addressing, routing,
and the fragmentation and reassembly of IP packets.
(7) Telnet is an Internet connection that enables a user to terminate an active connection with a
computer at a retoete site.
(8) ESD stands for Electronic Static Distance.
(9) IRQ is Interrupt Request.
(10) Copyright computer programs made available on trial basis are called shareware.
(B) Please choose^he most appropriate answer from the given set of answers. . (.1x5)
(i) When all access and processing is done in one location, a computer system is said to be
(a) networked
(b) distributed
(c) centralized
(d) linked
(iii) The type of modulation that changes the height of the single is called (a) frequency
(b) phase
(c) amplitude
(d) prophase
(v) The technology whereby part of the program is stored on disk and is brought into memory for
execution as needed is called
(a) memory allocation
(b) virtual storage
(c) interrupts
(d) prioritized memory
(C) Write '"True" or "False" in your answer book about the following statements: (5)
SET-1
1. In MS-Dos 6.22, which part identifies the product uniquely
a. MS
b. DOS
c. Ms-DOS
d. 6.22
3. While working with Ms-Dos which command transfers a specific file from one disk to another?
a. Copy
b. Diskcopy
c. Time
d. Rename
4. If you don’t know the current time, which command will you use to display
a. Copy
b. Ver
c. Time
d. Format
5. Which command divides the surface of the blank disk into sectors and assign a unique address to
each one
a. Ver
b. Format
c. Fat
d. Chkdsk
6. Each time you turn on your computer, it will check on the control file
a. Command.com, io.sys
b. Command.com, date.com, dir.com
c. Command.com, io.sys, msdos.sys
d. Chkdsk.exe
7. If you need to duplicate the entire disk, which command will you use?
a. Copy
b. Diskcopy
c. Chkdsk
d. Format
8. Which of the following extensions suggest that the file is a backup copy
a. Bak
b. Bas
c. Com
d. Txt
10.Only filenames and extensions are to be displayed in wide format, which command you’ll use?
a. Dir/w
b. Dir a:
c. Dir/s
d. Dir/b
SET-2
Objective Questions (Multiple Choice Questions) from Ms-Dos for computer operators continuying from
11
11. Which command displays all the files having the same name but different extensions?
a. Dir filename.*
b. Dir filename.ext
c. Dir *.sys
d. Dir *.ext
12. Which command displays only file and directory names without size, date and time information?
a. Dir/w
b. Dir a:
c. Dir /b
d. Dir /s
13. Which command displays comma for thousand separating on file size while listing?
a. Dir/w
b. Dir/s
c. Dir/b
d. Dir/c
15. Which command should be used to display all files within the specified subordinate directory of the
subdirectory?
a. Dir \ pathname
b. Dir \ pathname\pathname
c. Dir / ch
d. Dir \pathname\filename
16. Which command displays the directory list including files in tree structure?
a. Dir/s/f
b. Tree/f
c. Tree/s/f
d. Dir/f
17. Which command will be used to display a file within the specified directory of pathname?
a. Dir \pathname
b. Dir \pathname\pathname
c. Dir/ch
d. Dir \pathname\filename
19. Which command displays current directory name or change from one to another?
a. Chdir
b. Cd
c. Mkdir
d. Both a and b
Correct Answer: b. RD
Explanation: RD command or RMDIR commands can be used to remove a directory if it is empty. Del
command and Erase commands are used to delete files not directories. MD creates a new directory and
can’t remove directory.
SET-4
1. An entire path name, consisting of several sub-directory names can contain
upto
a. 13 character
b. 36 character
c. 63 character
d. 53 character
Correct Answer: c
2. In which year the first operating system was developed
a. 1910
b. 1940
c. 1950
d. 1980
Correct Answer: c
3. MS-DOS developed in
a. 1991
b. 1984
c. 1971
d. 1961
Correct Answer: b
4. Maximum length of DOS command using any optional parameter is
a. 26 characters
b. 87 characters
c. 127 characters
d. None of above
Correct Answer: c
5. In which version of DOS. CHKDSK command has been changed to SCANDISK?
a. 5.0
b. 6.2
c. 6.0
d. 6.2
Correct Answer: d
6. CHKDSK command is used to
a. Analyze the hard disk error
b. Diagnose the hard disk error
c. Report the status of files on disk
d. All of the above
Correct Answer: d
7. Which file is the batch file that is read while booting a computer?
a. Autoexec.bat
b. Auto-batch
c. Autoexecutive.bat
d. Auto.bat
Correct Answer: a
8. Which command is used to backup in DOS 6+ Version
a. BACKUP
b. MSBACKUP
c. MSBACKEDUP
d. All of the above
Correct Answer: b
9. Copy and Xcopy are same in the sense
a. Both are internal command of DOS
b. Both are external commands of DOS
c. Both can be used to copy file or group of files
d. Both a and b
Correct Answer: c
44. Which command be used to clear the screen and display the operating system prompt on the first
line of the display?
a. Cd
b. Md
c. Rename
d. cls
Correct Answer: d
10. Which command is used to clear the screen
a. Cls
b. Clear
c. Clscreen
d. All of above
Correct Answer: a
11. internal command in Dos are
a. Cls, rd label
b. Dir, ren, sys
c. Time, type, dir
d. Del, disk copy, label
Correct Answer: c
12. Which command is used to copy files?
a. Copy
b. Diskcopy
c. Type
d. All of the above
Correct Answer: a
13. To copy the hidden system files of DOS to another disk you can use the command
a. Copy
b. Ren
c. Sys
d. Diskcopy
Correct Answer: c
14. Disk copy command in DOS is used to
a. Copy a file
b. Copy contents of one floppy disk to another
c. Copy contents of CD-ROM to another
d. All of the above
Correct Answer: b
15. SYS command is used to
a. Copy DOS system files to new disk
b. Copy DOS configuration files to a new disk
c. Update the DOS system files
d. None of above
Correct Answer: a
16. The command used to copy a file named temp.doc from drive C: to drive A: is
a. Copy temp.doc to a:
b. Copy c:\temp.doc a:
c. Copy c: a:
d. Copy temp a: c:
Correct Answer: b
17. External command in DOS are
a. Copy, edit, sys, format
b. Edit, sys, chkdsk
c. Chkdsk, prompt, date
d. Sys, ver, vol
Correct Answer: b
18. Which keys can be pressed quit without saving in DOS
a. Ctrl + A
b. Ctrl + B
c. Ctrl + C
d. Ctrl + D
Correct Answer: c
19. Which command is used to get the current date only?
a. Date
b. Time
c. Second
d. All of the above
Correct Answer: a
20. Generally, the DATE is entered in the form
a. DD-YY-MM
b. YY-DD-MM
c. MM-YY-DD
d. MM-DD-YY
Correct Answer: d
SET-5
1. Which statement is valid about “TIME” command?
a. Time command is used to display and allow changes to the system time
b. Time format can be changed by changing in country setting in config.sys file
c. MS DOS displays the time in 12-hour or 24-hour format
d. All of above
Correct Answer: d
2. Which command is used to see the sub-directory structure of drive?
a. Tree
b. List
c. Subdir
d. Subtree
Correct Answer: a
3. Which command is used to display the subdirectory structure of the currently logged drive and pause
the screen display after each screen full of the information?
a. Tree
b. Deltree/f
c. Dir | more
d. Tree | more
Correct Answer: d
4. Which command is used to provide access to files located in other directories or disks?
a. Tree
b. Path
c. Dir
d. Cd
Correct Answer: b
5. you can copy command.com to your disk from hard disk
a. true
b. false
Correct Answer: a
6. Which command is used to see the contents of a file?
a. Type
b. Copy
c. Ed
d. None of above
Correct Answer: a
7. Which command is used to see the disk volume label?
a. Ver
b. Vol
c. Version
d. Volume
Correct Answer: b
8. Which command is used to see the version?
a. Version
b. Ver
c. Verson
d. None of above
Correct Answer: b
9. What is the name of the batch file that is automatically run when MSDOS is booted?
a. Run.bat
b. Config.sys
c. Config.bat
d. Autoexec.bat
Correct Answer: d
10. What is the switch that is used to make sure that the copy command copied files correctly
a. /a
b. /c
c. /s
d. /v
Correct Answer: d
11. What will be the output of the command prompt $l$p$g?
a. <c:\>
b. C:\>
c. C:\>>
d. C:<\>
Correct Answer: a
12. Which among the following are the best tools for fixing errors on disks?
a. Fdisk
b. Scandisk
c. Chkdsk
d. Fixdsk
Correct Answer: b
13. Which command can be used to create the disk’s tracks and sectors?
a. Fdisk
b. Format
c. Chkdsk
d. Attrib
Correct Answer: b
14. Which command in DOS can be used to recover accidentally deleted files?
a. UNDELETE
b. DELETE/CANCEL
c. RESTORE
d. RECOVER
Correct Answer: a
15. Which command in DOS is used to display the version of MSDOS?
a. VERSION
b. VERIFY
c. VER
d. VERSN
Correct Answer: c
16. Which command is used to copy all files from drive a with extension .txt to the currently logged drive
and directory?
a. Copy a. *.txt
b. Copy *.txt a:
c. Copy *.txt c:
d. Copy *.txt all.txt
Correct Answer: a
17. Which command is used to create root directory and FAT on disk?
a. Chkdsk
b. Command.com
c. Format
d. Fat
Correct Answer: c
18. Which command is used to delete all the files extension .txt on the current drive and directory?
a. Del .txt
b. Erase .txt
c. Del *.txt
d. Del *.*/p
Correct Answer: c
19. Which command is used to delete all the files in the root directory of drive a
a. A:\del
b. Del *.* a:
c. Del a:\
d. Erase *.*
Correct Answer: c
20. Which command is used to display a list of deleted files that DOS can undelete?
a. Undelete *.*
b. Undelete/all
c. Undelete/list
d. None of the above
Correct Answer: c
21. Which command is used to undelete delete a bunch of files with extension doc that you have just
deleted
a. Undelete
b. Undelete *.doc
c. Undelete/all
d. All of the above
Correct Answer: b
SET-6
1. Which file in MSDOS contain internal command that are loaded during booting process?
a. Io.sys
b. Msdos.sys
c. Command.com
d. Config.sys
Correct Answer: c
2. Which is the valid filename assign in MS-DOS?
a. Ram*.txt
b. Ram?.doc
c. Ram_$.txt
d. None of above
Correct Answer: c
3. Which is valid extension that user creates on operating system?
a. Exe
b. Com
c. Sys
d. Bat
Correct Answer: d
4. Which of the following file names are invalid in MSDOS?
a. MYFILE.DOS
b. CHECK$.(1)
c. Verified.###
d. Qwerty.1?3
Correct Answer: d
5. Which of the following statements in regard to directories is false?
a. Directories can exist inside directories
b. The root directory is always at the highest level
c. Directories with files can be deleted
d. Directories cannot be renamed
Correct Answer: d
6. Which of the following statements is true in regard to diskcopy?
a. Copy and discopy are same
b. Discopy is a built in command in dos
c. Diskcopy can be used on hard disks
d. Diskcopy can be used with a floppy and a hard disk
Correct Answer: c
7. Which switch should be used in the DIR command to view files in all directories?
a. /p
b. /w
c. /s
d. /l
Correct Answer: c
8. Which type of command in DOS needs additional files for their execution?
a. Internal commands
b. External commands
c. Batch commands
d. Redirectors
Correct Answer: b
9. Which was the last version of MSDOS that was released separately?
a. 5.0
b. 6.0
c. 6.11
d. 6.22
Correct Answer: d
10. While working with MS-DOS which command is used to change the extension of all filenames ending
with .txt to .doc?
a. Ren *.doc *.txt
b. Ren *.txt *.doc
c. Ren file.doc file.txt
d. Ren a: *.doc *.txt
Correct Answer: b
11. While working with MS-DOS which command is used to combine file1 plus file2 into new file named
file3?
a. Copy file3 file1+file2
b. Copy file1+file2 file3
c. Copy file1+file2+file3
d. Copy file2 file1+file3
Correct Answer: b
12. While working with MS-DOS which command is used to copy all files with extension .txt into one file
named all.txt?
a. Copy a: *.txt
b. Copy *.txt a:
c. Copy *.txt c:
d. Copy *.txt all.txt
Correct Answer: d
13. While working with MS-DOS, which command is used to more file from one directory to another?
a. Rename
b. Copy
c. Move
d. Cp
Correct Answer: c
14. While working with MS-DOS, which command is used to rename a file named file1.doc to file2.doc
from a different directory called dir1?
a. Ren2.doc \dir\file1.doc
b. Ren file1.doc file2.doc
c. Ren .doc\dir\.doc
d. Ren \dir1\file1.doc file2.doc
Correct Answer: d
15. While working with which command is used to copy all files from the currently logged drive and
directory with the extension .txt to the drive a
a. Copy a. *.txt
b. Copy *.txt a:
c. Copy *.txt c:
d. Copy *.txt all.txt
Correct Answer: b
16. Which command in DOS can be used to recover accidentally deleted files?
a. UNDELETE
b. DELETE/CANCEL
c. RESTORE
d. RECOVER
Correct Answer: a
17. Which command is used to set a name to a disk in DOS?
a. VOLUME
b. VOL
c. LABEL
d. DISKLABEL
Correct Answer: c
18. Which of the following command display the name of files in sorted order?
a. Dir/o:n
b. Dir/so
c. Dir/an
d. Dir/ah
Correct Answer: a
19. Which command displays the list of all previous commands entered by the used?
a. COMMANDS/ALL
b. KEYDOS
c. DOSKEY
d. DIR/ALL
Correct Answer: C
SET-7
1. ………. runs on computer hardware and serve as platform for other software to run on
a. Operating system
b. Application software
c. System software
d. All
Correct Answer: a
2. ….is the layer of a computer system between the hardware and the user program
a. Operating environment
b. Operating system
c. System environment
d. None
Correct Answer: b
3. The primary purpose of an operating system is…..
a. To make the most efficient use of the computer hardware
b. To allow people to use the computer
c. To keep systems programmers employed
d. To make computers easier to use
Correct Answer: a
4. …….transforms one interface into another interface
a. Program
b. Software
c. Data
d. None
Correct Answer: b
5. …..system is built directly on the hardware
a. Environment
b. System
c. Operating
d. None
Correct Answer: c
6. Multiprogramming system
a. Are easier to develop than single programming system
b. Execute each job faster
c. Execute more jobs in the same time period
d. Are used only one large mainframe computers
Correct Answer: c
7. …is the first program run on a computer when the computer boots up
a. System software
b. Operating system
c. System operations
d. None
Correct Answer: b
8. …..interface consists of things like program counter, registers, interrupts and terminals
a. Hardware
b. Software
c. Data
d. None
Correct Answer: a
9. ….share characteristics with both hardware and software
a. Operating system
b. Software
c. Data
d. None
Correct Answer: a
10. ….is used in operating system to separate mechanism from policy
a. Single level implementation
b. Two level implementation
c. Multi level implementation
d. None
Correct Answer: b
11. The operating system creates …. from the physical computer
a. Virtual space
b. Virtual computers
c. Virtual device
d. None
Correct Answer: b
12. Swapping
a. Works best with many small partitions
b. Allows many programs to use memory simultaneously
c. Allows each program in turn to use the memory
d. Does not work with overlaying
Correct Answer: c
13. Which of the following operating does not implement multitasking truly?
a. Windows 98
b. Windows NT
c. Windows XP
d. MS DOS
Correct Answer: d
14. What is the name of the latest server operating system developed by Microsoft?
a. Windows NT
b. Windows 2000
c. Windows XP
d. Windows 2003
Correct Answer: d
15. Where do you find user.dat?
a. C:\windows
b. C:\windows\system32
c. C:\windows\system
d. C:\
Correct Answer: a
16. MSD.exe does not have information on:
a. Cache
b. Video
c. Operating System
d. Com or port
Correct Answer: a
SET-8
3. What is the maximum length allowed for primary name of a computer file under DOS?
a. 8
b. 12
c. 3
d. None of the above
6. What is the name given to something that the computer will automatically use unless you tell
it otherwise?
a. a specification
b. a wildcard
c. a default
d. a rule
7. As per symbolic notation of DOS, which of the following indicates the ROOT directory
a. *
b. >
c. /
d. None of the above
12. To display the list of all the file of the disk you would type
a. DIR
b. COPY
c. DIR FILES
d. DIR AUTOEXEC.BAT
Answers:
1 b. 2 b. 3 a. 4 b. 5b 6 c. 7 d. 8 a. 9 b. 10 a.
11 a 12 a..
13 True OR False
1. False 2. False 3. True 4. False 5. False
Questions 1:
The relational database environment has all of the following components except
a. users
b. separate files
c. database
d. query languages
e. database
Question 2:
Database management systems are intended to
a. eliminate data redundancy
b. establish relationship among records in different files
c. manage file access
d. maintain data integrity
e. all of the above
Question 3:
One approach to standardization storing of data?
a. MIS
b. structured programming
c. CODASYL specification
d. none of the above
Question 4:
The language used application programs to request data from the DBMS is
referred to as the
a. DML
b. DDL
c. query language
d. any of the above
e. none of the above
Question 5:
The highest level in the hierarchy of data organization is called
a. data bank
b. data base
c. data file
d. data record
Question 6:
Choose the RDBMS which supports full fledged client server application development
a. dBase V
b. Oracle 7.1
c. FoxPro 2.1
d. Ingress
Question 7:
Report generators are used to
a. store data input by a user
b. retrieve information from files
c. answer queries
d. both b and c
Question 8:
A form defined
a. where data is placed on the screen
b. the width of each field
c. both a and b
d. none of the above
Question 9:
A top-to-bottom relationship among the items in a database is established by a
a. hierarchical schema
b. network schema
c. relational schema
d. all of the above
Question 10:
The management information system (MIS) structure with one main computer
system is called a
a. hierarchical MIS structure
b. distributed MIS structure
c. centralized MIS structure
d. decentralized MIS structure
Answers:
1.b 2.e 3.c 4.a 5.b 6. b 7.d 8.a 9.a 10.c
Question 2:
Which of the following hardware component is the most important to the operation of database
management system?
a. high resolution video display
b. printer
c. high speed, large capacity disk
d. plotter
e. mouse
Question 3:
Generalized database management system do not retrieve data to meet routine request
a. true
b. false
Question 4:
Batch processing is appropriate if
a. large computer system is available
b. only a small computer system is avilbale
c. only a few transactions are involved
d. all of the above
e. none of the above
Question 5:
Large collection of files are called
a. fields
b. records
c. database
d. sectors
Question 6:
Which of the following is not a relational database?
a. dBase IV
b. 4th Dimension
c. FoxPro
d. Reflex
Question 7:
In order to use a record management system
a. you need to understand the low level details of how information is stored
b. you need to understand the model the record management system uses
c. bother a and b
d. none of the above
Question 8:
Sort/Report generators
a. are faster than index/report generators
b. require more disk space than indexed/report generators
c. do not need to sort before generating report
d. both a and b
Question 9:
If a piece of data is stored in two places in the database, then
a. storage space is wasted
b. changing the data in one spot will cause data inconsistency
c. in can be more easily accessed
d. both and b
Question 10:
An audit trail
a. is used to make backup copies
b. is the recorded history of operations performed on a file
c. can be used to restore lost information
d. none of the aobve
Answers:
1.a 2.c 3. b 4.e 5.c 6.d 7.b 8.b 9.d 10.b
b) system calls provide basic functionality to users so that users do not need
to write their own programs to solve common problems.
a. Program execution.
b. I/O handling
c. File-system manipulation.
d. commmunications
e. error detection
1) a,b,c,d
2) b,c,d,e
3) a,b,c,d,e
4) b,c,e
(b) it is more secure as more operations are done in user mode than in kernel
mode
5. some systems store the operating system in firmware, and others on disk?for
PDAs,cellular telephones etc a disk with a file system may be not be
available for the device.hence they are stored in firmaware.
1) True
2) False
6. How could a system be designed to allow a choice of operating systems to boot from?
What would the bootstrap program need to do?
1) during boot-up, a special program (which we
will call the boot manager) will determine
which operating system to boot into.
2) the boot-strap loader will load the operating
system selected at the start-up.
3) only a
4) both a and b.
a) Magnetic Tapes
b) Main memory
c) Optical disk
d) Secondary Memory
1) a and b
2) a,b and c
3) a,b and d
4) Only c
9. Electronic disk, Main memory, Magnetic disk and Cache are volatile.
True/False
1) True
2) False
10. ______: a secondary storage device, which holds data in bulk and it, holds
data in magnetic medium of the disk
1) Hard disc
2) Compact disc
3) RAM
4) CPU Registers
1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s
tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ____________ tags, when placed on an animal, can be used to record and track in a database
all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating devices through computers instead
of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100
nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same type of
intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera and processed appropriately, the actual
print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
18. In the binary language each letter of the alphabet, each number and each special character is
made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
2. Main memory is
(a) Random Access Memory (b) Read only Memory
(c) Serial Access Memory (d) None of these
Ans (a)
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer (b) Quantum Computer
(c) Param-10,000 (d) IBM chips
Ans (b)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic (b) Optical (c) Electrical (d) Electromechanical
Ans (a)
5. Which of the following is not as language for computer programming?
(a) WINDOWS (b) PASCAL (c) BASIC
(d) COBOL (e) All of these
Ans (a)
6. What are the two basic types of memory that your computer uses?(
a) RAM (b) RW/RAM (c) ROM (d) ERAM (e) POST
Ans (a)
7. The term gigabyte refers to
(a) 1024 bytes (b) 1024 kilobytes (c) 1024 megabytes
(d) 1024 gigabytes (e) None of the above
Ans (c)
8. A computer with CPU speed around 100 million instructions per second & with the word length of
around 64 bits is known as
(a) Super computer (b) Mini computer (c) Micro computer
(d) Micro computer (e) None of the above
Ans (a)
9. What digits are representative of all binary numbers?
(a) 0 (b) 1 (c) Both (a ) and (b) (d) 3 (e) None of the above
Ans (c)
10. To locate a data items for storage is
(a) Field (b) Feed (c) Database
(d) Fetch (e) None of the above
Ans (d)
11. Off-line operation is the operation of devices without the control of
(a) Memory (b) CPU (c) ALU
(d) Control unit (e) None of the above
Ans (b)
12. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer (b) Dot-matrix printer
(c) Laser printer (d) Band printer (e) None of the above
Ans (d)
13. A software used to convert source program instructions to object instruction is known as
(a) Compiler (b) Assembler (c) Interpreter
(d) Language processor (e) None of the above
23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
1. If a computer on the network shares resources for others to use, it is called ____
a. Server
b. Client
c. Mainframe
Answer a
3. In _____ topology, if a computer’s network cable is broken, whole network goes down.
a. Bus
b. Star
Answer a
11. _____________ allows LAN users to share computer programs and data.
a. Communication server
b. Print server
c. File server
Answer c
12. Print server uses ________ which is a buffer that holds data before it is send to the printer.
a. Queue
b. Spool
c. Node
Answer b
13. A standalone program that has been modified to work on a LAN by including concurrency
controls such as file and record locking is an example of____
a. LAN intrinsic software
b. LAN aware software
c. Groupware
d. LAN ignorant software
Answer a
14. The ______ portion of LAN management software restricts access, records user activities
and audit data etc.
a. Configuration management
b. Security management
c. Performance management
Answer b
1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s
tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ____________ tags, when placed on an animal, can be used to record and track in a database
all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating devices through computers instead
of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100
nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
8-9. After copying the content how many times can you paste?
A. 1
B. 16
C. 32
D. Many
Answers
1 – A / 2 – B / 3 – A / 4 – B / 5 – A / 6 – B / 7 – D / 8 – A / 9 – D / 10 – C
7-7. In ________ mode, the communication channel is used in both directions at the same time?
A. Full-duplex
B. Simplex
C. Half-duplex
D. None of the above
7-10. Through which device the main components of the computer communicate with each
other?
A. Keyboard
B. System Bus
C. Monitor
D. Memory
Answers
1 – C / 2 – C / 3 – A / 4 – C / 5 – C / 6 – A / 7 – A / 8 – A / 9 – C / 10 – B
3-1. Which device is used as the standard pointing device in a Graphical User Environment?
A. Keyboard
B. Mouse
C. Joystick
D. Track ball
3-5. Which of the following devices have a limitation that we can only store information to it but
cannot erase or modify it?
A. Floppy Disk
B. Hard Disk
C. Tape Drive
D. CDROM
3-7. Which of the following storage devices can store maximum amount of data?
A. Floppy Disk
B. Hard Disk
C. Compact Disk
D. Magneto Optic Disk
3-8. Which of the following is the largest manufacturer of Hard Disk Drives?
A. IBM
B. Seagate
C. Microsoft
D. 3M
3-9. The programs which are as permanent as hardware and stored in ROM is known as
A. Hardware
B. Software
C. Firmware
D. ROM ware
=============================
Answers
1 – B / 2 – A / 3 – A / 4 – D / 5 – D / 6 – D / 7 – B / 8 – B / 9 – C / 10 – C
11. Computers that are used to measure quantities, which change continuously such as heat, speed and
temperature are
a. Digital Computer b. Analog Computer
c. Hybrid Computer d. Portable Computer
Ans. b
12. Results of analog computers are reliable
a. less b. more
c. equally d. maximum
Ans. a
13. The speed of analog computer is than digital computer
a. lesser b. faster
c. same d. shortening
Ans. b
14. Analog computer are to operate
a. easy b. similar
c. difficult d. comfortable
Ans. c
15. Computes are becoming very important because of
a. high speed and accuracy b. versatility and automation
c. extensive memory and reliability d. all of the above
Ans. c
16. Computers observe some limitations as they have no
a. intelligence and feeling b. flexibility and emotions
c. easy portability and ethics d. all of the above
Ans. d
17. Computers can provide
a. logical decision and latest information b. solutions of problems and quality control
c. industrial and educational development d. all of the above
Ans. a
18. Computes can provide
a. entertainment and edutainment b. games and programs
c. Communication and transmission d. all of the above
Ans. a
19. Tangible or touchable parts of the compute are called
a. software b. hardware
c. system d. application
Ans. b
20. Intangible or untouchable parts of the compute are called
a. software b. hardware
c. system d. application
Ans. a
21. Devices which facilitates us to communicate with other computer system
a. Input Devices b. Output Devices
c. Communication Devices d. Storage Devices
Ans.
22. CPU stands for
a. Central Particular Unit b. Central Performing Unit
c. Central Processing Unit d. Central Procedural Unit
Ans. c
23. the brain of the compute is
a. Motherboard b. RAM
c. ROM d. CPU
Ans. d
24. the devices used to display the results of processing
a. Motherboard b. RAM
c. ROM d. Monitor
Ans. d
25. The devices used to store permanently all types of software, data, …
a. Hard Disk b. RAM
c. ROM d. Monitor
Ans. a
26. Moving the pointer of the mouse to position over an icon or any part of the screen is known as
a. pointing b. clicking
c. dragging d. double clicking
Ans. a
27. pressing and quickly releasing the left button of the mouse is called
a. Double Click b. Right Click
c. Up Click d. Left Click
Ans. d
28. pressing and quickly releasing the left button of the mouse for two times is called
a. Double Click b. Right Click
c. Up Click d. Left Click
Ans. a
29. pressing and quickly releasing the right button of the mouse is called
a. left click b. right click
c. drag d. drop
Ans. B
11. If you want to keep track of different editions of a document which features will you use?
A) Editions
B) Versions
C) Track Change
D) All of above
13. What is a portion of a document in which you set certain page formatting options?
A) Page
B) Document
C) Section
D) Page Setup
A) Cells
B) Paragraph
C) Text
D) All of above
A) Left
B) Right
C) Center
D) Top
Answers
11-B, 12-D, 13-C, 14-D, 15-C,
Question: Register is a
Set of capacitors used to register input instructions in a digital computer
Set of paper tapes and cards put in a file
Temporary storage unit within the CPU having dedicated or general purpose use
part of the auxiliary memory
Answer: 3
Question: WAN means -
Wide Area Network
Wine Area Network
Woll Area Network
Wide Allen Network
Answer: 1
Question: MAN is a -
Cost
Company
Network
Country
Answer: 3
Question: Which of the following is the universal gate?
NAND-Gate
OR-Gate
AND-Gate
NOT-Gate
Answer: 1
Question: The translator program that converts source code in high level language into machine code
line by line is called -
Assembler
Compiler
Loader
Interpreter
Answer: 4
Question: When a CD (Compact Disc used in audio and Video system) is seen in sunlight, rainbow like
colours are seen. This can be explained on the basis of phenomenon of
reflection and diffraction
reflection and transmission
diffraction and transmission
refraction, diffraction and transmission
Answer: 4
Question: Pickup wrong definition
Off line - is a system peripheral equipment not controlled by CPU
Online - is system in which peripheral equipment is in direct contact with CPU
PL/I is the acronym Peripheral Listing /Index
Program or routine is a set sequence of instructions given to computer for problem solving
Answer: 3
Question: A computer programmer
enters data into computer
writes programs
changes flow chart into instructions
does total planning and thinking for a computer
Answer: 4
Question: Terminal is a
device used to give supply to a computer
Point at which data may leave or enter the computer
point where wires are interconnected
an input/output device
Answer: 2
Question: Errors in computer results could be due to
encoding of data
transmission of data
manipulation of data
all of the above
Answer: 4
________________________________________
/ 6 – B / 7 – D / 8 – A / 9 – D / 10 – C
1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s
tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ____________ tags, when placed on an animal, can be used to record and track in a database
all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating devices through computers instead
of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100
nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A