Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 68

COMPUTER SCIENCE MCQS

Data structures & Algorithms - Multiple Choice Questions (MCQs) - Objective

Set - 1
1. Two main measures for the efficiency of an algorithm are
a. Processor and memory
b. Complexity and capacity
c. Time and space
d. Data and space

2. The time factor when determining the efficiency of algorithm is measured by


a. Counting microseconds
b. Counting the number of key operations
c. Counting the number of statements
d. Counting the kilobytes of algorithm

3. The space factor when determining the efficiency of algorithm is measured by


a. Counting the maximum memory needed by the algorithm
b. Counting the minimum memory needed by the algorithm
c. Counting the average memory needed by the algorithm
d. Counting the maximum disk space needed by the algorithm

4. Which of the following case does not exist in complexity theory


a. Best case
b. Worst case
c. Average case
d. Null case

5. The Worst case occur in linear search algorithm when


a. Item is somewhere in the middle of the array
b. Item is not in the array at all
c. Item is the last element in the array
d. Item is the last element in the array or is not there at all

6. The Average case occur in linear search algorithm


a. When Item is somewhere in the middle of the array
b. When Item is not in the array at all
c. When Item is the last element in the array
d. When Item is the last element in the array or is not there at all

7. The complexity of the average case of an algorithm is


a. Much more complicated to analyze than that of worst case
b. Much more simpler to analyze than that of worst case
c. Sometimes more complicated and some other times simpler than that of worst case
d. None or above

8. The complexity of linear search algorithm is


a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)

9. The complexity of Binary search algorithm is


a. O(n)
b. O(log )
c. O(n2)
d. O(n log n)
10. The complexity of Bubble sort algorithm is
a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)

11. The complexity of merge sort algorithm is


a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)

12. The indirect change of the values of a variable in one module by another module is called
a. internal change
b. inter-module change
c. side effect
d. side-module update

13. Which of the following data structure is not linear data structure?
a. Arrays
b. Linked lists
c. Both of above
d. None of above

14. Which of the following data structure is linear data structure?


a. Trees
b. Graphs
c. Arrays
d. None of above

15. The operation of processing each element in the list is known as


a. Sorting
b. Merging
c. Inserting
d. Traversal

16. Finding the location of the element with a given value is:
a. Traversal
b. Search
c. Sort
d. None of above

17. Arrays are best data structures


a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure are constantly changing
c. for both of above situation
d. for none of above situation

18. Linked lists are best suited


a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure are constantly changing
c. for both of above situation
d. for none of above situation

19. Each array declaration need not give, implicitly or explicitly, the information about
a. the name of array
b. the data type of array
c. the first data from the set to be stored
d. the index set of the array

20. The elements of an array are stored successively in memory cells because
a. by this way computer can keep track only the address of the first element and the addresses of other
elements can be calculated
b. the architecture of computer memory does not allow arrays to store other than serially
c. both of above
d. none of above

Answers
1. Two main measures for the efficiency of an algorithm are
c. Time and space
2. The time factor when determining the efficiency of algorithm is measured by
b. Counting the number of key operations
3. The space factor when determining the efficiency of algorithm is measured by
a. Counting the maximum memory needed by the algorithm
4. Which of the following case does not exist in complexity theory
d. Null case
5. The Worst case occur in linear search algorithm when
d. Item is the last element in the array or is not there at all
6. The Average case occur in linear search algorithm
a. When Item is somewhere in the middle of the array
7. The complexity of the average case of an algorithm is
a. Much more complicated to analyze than that of worst case
8. The complexity of linear search algorithm is
a. O(n)
9. The complexity of Binary search algorithm is
b. O(log n)
10. The complexity of Bubble sort algorithm is
c. O(n2)
11. The complexity of merge sort algorithm is
d. O(n log n)
12. The indirect change of the values of a variable in one module by another module is called
c. side effect
13. Which of the following data structure is not linear data structure?
d. None of above
14. Which of the following data structure is linear data structure?
c. Arrays
15. The operation of processing each element in the list is known as
d. Traversal
16. Finding the location of the element with a given value is:
b. Search
17. Arrays are best data structures
a. for relatively permanent collections of data
18. Linked lists are best suited
b. for the size of the structure and the data in the structure are constantly changing
19. Each array declaration need not give, implicitly or explicitly, the information about
c. the first data from the set to be stored

20. The elements of an array are stored successively in memory cells because
a. by this way computer can keep track only the address of the first element and the addresses of other
elements can be calculated
Set - 2
1. The memory address of the first element of an array is called
a. floor address
b. foundation address
c. first address
d. base address

2. The memory address of fifth element of an array can be calculated by the formula
a. LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words per memory cell for
the array
b. LOC(Array[5])=Base(Array[5])+(5-lower bound), where w is the number of words per memory cell for
the array
c. LOC(Array[5])=Base(Array[4])+(5-Upper bound), where w is the number of words per memory cell for
the array
d. None of above

3. Which of the following data structures are indexed structures?


a. linear arrays
b. linked lists
c. both of above
d. none of above

4. Which of the following is not the required condition for binary search algorithm?
a. The list must be sorted
b. there should be the direct access to the middle element in any sublist
c. There must be mechanism to delete and/or insert elements in list
d. none of above

5. Which of the following is not a limitation of binary search algorithm?


a. must use a sorted array
b. requirement of sorted array is expensive when a lot of insertion and deletions are needed
c. there must be a mechanism to access middle element directly
d. binary search algorithm is not efficient when the data elements are more than 1000.

6. Two dimensional arrays are also called


a. tables arrays
b. matrix arrays
c. both of above
d. none of above

7. A variable P is called pointer if


a. P contains the address of an element in DATA.
b. P points to the address of first element in DATA
c. P can store only memory addresses
d. P contain the DATA and the address of DATA

8. Which of the following data structure can't store the non-homogeneous data elements?
a. Arrays
b. Records
c. Pointers
d. None

9. Which of the following data structure store the homogeneous data elements?
a. Arrays
b. Records
c. Pointers
d. None

10. Each data item in a record may be a group item composed of sub-items; those items which are
indecomposable are called
a. elementary items
b. atoms
c. scalars
d. all of above

11. The difference between linear array and a record is


a. An array is suitable for homogeneous data but hte data items in a record may have different data type
b. In a record, there may not be a natural ordering in opposed to linear array.
c. A record form a hierarchical structure but a lienear array does not
d. All of above

12. Which of the following statement is false?


a. Arrays are dense lists and static data structure
b. data elements in linked list need not be stored in adjecent space in memory
c. pointers store the next data element of a list
d. linked lists are collection of the nodes that contain information part and next pointer

13. Binary search algorithm can not be applied to


a. sorted linked list
b. sorted binary trees
c. sorted linear array
d. pointer array

14. When new data are to be inserted into a data structure, but there is no available space; this situation
is usually called
a. underflow
b. overflow
c. housefull
d. saturated

15. The situation when in a linked list START=NULL is


a. underflow
b. overflow
c. housefull
d. saturated

16. Which of the following is two way list?


a. grounded header list
b. circular header list
c. linked list with header and trailer nodes
d. none of above

17. Which of the following name does not relate to stacks?


a. FIFO lists
b. LIFO list
c. Piles
d. Push-down lists

18. The term "push" and "pop" is related to the


a. array
b. lists
c. stacks
d. all of above

19. A data structure where elements can be added or removed at either end but not in the middle
a. Linked lists
b. Stacks
c. Queues
d. Deque

20. When inorder traversing a tree resulted E A C K F H D B G; the preorder traversal would return
a. FAEKCDBHG
b. FAEKCDHGB
c. EAFKHDCBG
d. FEAKDCHBG

Answers
1. The memory address of the first element of an array is called
d. base address

2. The memory address of fifth element of an array can be calculated by the formula
a. LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words per memory cell for
the array

3. Which of the following data structures are indexed structures?


a. linear arrays

4. Which of the following is not the required condition for binary search algorithm?
c. There must be mechanism to delete and/or insert elements in list

5. Which of the following is not a limitation of binary search algorithm?


d. binary search algorithm is not efficient when the data elements are more than 1000.

6. Two dimensional arrays are also called


c. both of above

7. A variable P is called pointer if


a. P contains the address of an element in DATA.

8. Which of the following data structure can't store the non-homogeneous data elements?
a. Arrays
9. Which of the following data structure store the non-homogeneous data elements?
b. Records

10. Each data item in a record may be a group item composed of sub-items; those items which are
indecomposable are called
d. all of above

11. The difference between linear array and a record is


d. All of above

12. Which of the following statement is false?


c. pointers store the next data element of a list

13. Binary search algorithm can not be applied to


a. sorted linked list

14. When new data are to be inserted into a data structure, but there is no available space; this situation
is usually called
b. overflow

15. The situation when in a linked list START=NULL is


a. underflow

16. Which of the following is two way list?


d. none of above

17. Which of the following name does not relate to stacks?


a. FIFO lists

18. The term "push" and "pop" is related to the


c. stacks

19. A data structure where elements can be added or removed at either end but not in the middle
d. Deque

20. When inorder traversing a tree resulted E A C K F H D B G; the preorder traversal would return
b. FAEKCDHGB

Set - 3
1. Which data structure allows deleting data elements from front and inserting at rear?
a. Stacks
b. Queues
c. Deques
d. Binary search tree

2. Identify the data structure which allows deletions at both ends of the list but insertion at only one
end.
a. Input-restricted deque
b. Output-restricted deque
c. Priority queues
d. None of above

3. Which of the following data structure is non-linear type?


a. Strings
b. Lists
c. Stacks
d. None of above

4. Which of the following data structure is linear type?


a. Strings
b. Lists
c. Queues
d. All of above

5. To represent hierarchical relationship between elements, which data structure is suitable?


a. Deque
b. Priority
c. Tree
d. All of above

6. A binary tree whose every node has either zero or two children is called
a. Complete binary tree
b. Binary search tree
c. Extended binary tree
d. None of above

7. The depth of a complete binary tree is given by


a. Dn = n log2n
b. Dn = n log2n+1
c. Dn = log2n
d. Dn = log2n+1

8. When representing any algebraic expression E which uses only binary operations in a 2-tree,
a. the variable in E will appear as external nodes and operations in internal nodes
b. the operations in E will appear as external nodes and variables in internal nodes
c. the variables and operations in E will appear only in internal nodes
d. the variables and operations in E will appear only in external nodes

9. A binary tree can easily be converted into q 2-tree


a. by replacing each empty sub tree by a new internal node
b. by inserting an internal nodes for non-empty node
c. by inserting an external nodes for non-empty node
d. by replacing each empty sub tree by a new external node

10. When converting binary tree into extended binary tree, all the original nodes in binary tree are
a. internal nodes on extended tree
b. external nodes on extended tree
c. vanished on extended tree
d. None of above

11. The post order traversal of a binary tree is DEBFCA. Find out the pre order traversal
a. ABFCDE
b. ADBFEC
c. ABDECF
d. ABDCEF

12. Which of the following sorting algorithm is of divide-and-conquer type?


a. Bubble sort
b. Insertion sort
c. Quick sort
d. All of above

13. An algorithm that calls itself directly or indirectly is known as


a. Sub algorithm
b. Recursion
c. Polish notation
d. Traversal algorithm

14. In a binary tree, certain null entries are replaced by special pointers which point to nodes higher in
the tree for efficiency. These special pointers are called
a. Leaf
b. branch
c. path
d. thread

15. The in order traversal of tree will yield a sorted listing of elements of tree in
a. Binary trees
b. Binary search trees
c. Heaps
d. None of above
16. In a Heap tree
a. Values in a node is greater than every value in left sub tree and smaller than right sub tree
b. Values in a node is greater than every value in children of it
c. Both of above conditions applies
d. None of above conditions applies

17. In a graph if e=[u, v], Then u and v are called


a. endpoints of e
b. adjacent nodes
c. neighbors
d. all of above

18. A connected graph T without any cycles is called


a. a tree graph
b. free tree
c. a tree
d. All of above

19. In a graph if e=(u, v) means


a. u is adjacent to v but v is not adjacent to u
b. e begins at u and ends at v
c. u is processor and v is successor
d. both b and c

20. If every node u in G is adjacent to every other node v in G, A graph is said to be


a. isolated
b. complete
c. finite
d. strongly connected

Answers:
1. Which data structure allows deleting data elements from front and inserting at rear?
b. Queues

2. Identify the data structure which allows deletions at both ends of the list but insertion at only one
end.
a. Input-restricted deque

3. Which of the following data structure is non-linear type?


d. None of above

4. Which of the following data structure is linear type?


d. All of above

5. To represent hierarchical relationship between elements, which data structure is suitable?


c. Tree

6. A binary tree whose every node has either zero or two children is called
c. Extended binary tree

7. The depth of a complete binary tree is given by


d. Dn = log2n + 1

8. When representing any algebraic expression E which uses only binary operations in a 2-tree,
a. the variable in E will appear as external nodes and operations in internal nodes

9. A binary tree can easily be converted into q 2-tree


d. by replacing each empty sub tree by a new external node

10. When converting binary tree into extended binary tree, all the original nodes in binary tree are
a. internal nodes on extended tree

11. The post order traversal of a binary tree is DEBFCA. Find out the pre order traversal
c. ABDECF
12. Which of the following sorting algorithm is of divide-and-conquer type?
c. Quick sort

13. An algorithm that calls itself directly or indirectly is known as


b. Recursion

14. In a binary tree, certain null entries are replaced by special pointers which point to nodes higher in
the tree for efficiency. These special pointers are called
d. thread

15. The in order traversal of tree will yield a sorted listing of elements of tree in
b. Binary search trees

16. In a Heap tree


b. Values in a node is greater than every value in children of it

17. In a graph if e=[u, v], Then u and v are called


d. all of above

18. A connected graph T without any cycles is called


d. All of above

19. In a graph if e=(u, v) means


d. both b and c

20. If every node u in G is adjacent to every other node v in G, A graph is said to be


b. complete

Programming Languages and Processors

SET-1

Question 1:
Electronic spreadsheets are most useful in a situation where relatively .... data must be input but ......
calculations are requied.
a. little; simple
b. large; simple
c. large; complex
d. little; complex

Question 2:
The two basic types of record access methods are
a. sequential and randon
b. direct and immediate
c. sequential and indexed
d. on-line and real-time
e. none of above

Question 3:
Which file organization is allowed by a direct access storage device?
a. direct only
b. sequential and direct only
c. indexed and direct only
d. sequential, indexed and direct
e. none of above
Question 4:
Sequential file organization is most appropriate for which of following applications?
a. Grocery store checkout
b. bank checking account
c. payroll
d. airline reservations
e. none of above

Question 5:
Which of the following file organization is most effieient for a file with a high degree of file activity?
a. sequential
b. ISAM
c. VSAM
d. B-Tree
e. All of above

Question 6:
One disadvantage of a direct access file is:
a. the delay in computiong the storage address
b. duplication of address locations
c. unsued, but available, storage locations
d. all of above

Question 7:
All computers execute
a. BASIC programs
b. COBOL programs
c. Machine language program
d. FORTRAN programs
e. PL/1 programs

Question 8:
Which of the following is most oriented to scientific programming?
a. FORTRAN
b. COBOL
c. BASIC
d. PL/1
e. RPG

Question 9:
All of the following are disadvantage of RPG except:
a. it is a very machine dependent language
b. it is very limited in scope
c. is not suited for complex problems requiring extensive programming logic
d. it has larger storage requierments
e. all of the above are disadvantages

Question 10:
Which of the following is not one of the process that a high level language program msut go through
before it is ready to be executed?
a. translation
b. controlling
c. lading
d. linking
e. all of the above are necessary process

Answers:
1. d 2. a 3. d 4. c 5. a 6. a 7. c 8. a 9. b. 10.a

SET-2
Question 1:
Which of the following is not true of FORTRAN?
a. it was developed for scientific and mathematical applications
b. it is one of the oldest high-level languages
c. it is a problem oriented language
d. it requires extensive internal documentation
e. all of above

Question 2:
All of the following are divisions of the COBOL program except:
a. input-output
b. indentification
c. procedure
d. data
e. all of above divisions

Question 3:
In a COBOL program, the input output section is within the .... division
a. identification
b. procedure
c. configuration
d. environment
e. none of above

Question 4:
Which of hte following is not characteristic of COBOL
a. it is a very standardized language
b. it is a very efficient in terms of coding and execution
c. it has limited facilities for mathematical notation
d. it is very readable language
e. all of the above are characteristics

Question 5:
Which of the following is an example of problem oriented language?
a. BASIC
b. PL/1
c. FORTRAN
d. All of above
e. none of above

Question 6:
In the evaluation of a computer language, all of the following characteristics should be considered
except?
a. application oriented features
b. efficiency
c. readability
d. softare development aids
e. hardware maintainance costs

Question 7:
A factor in the selection of a source language is
a. programmer skill
b. language availability
c. program compatibility with other software
d. all of athe above

Question 8:
A computer generated output that lets programmer follow the execution of their programs line by line is
a
a. core dump
b. trace routine
c. detail listing
d. source listing

Question 9:
In BASIC, description comments are put in the source program with the
a. PRINT statement
b. REMARK statement
c. INPUT statement
d. DATA statement

Question 10:
Which of the following generations of language will likely include the languages of the featuer?
a. first generation
b. second dgeneration or third generation
c. fourth generation
d. fifth generation

Answers:
1. b 2.a 3.d 4.b 5.d 6.e 7.d 8.b 9.b 10.c

Computer Networking MCQ

SET-1

Question 1:
In OSI network architecture, the dialogue control and token management are responsibility of
a. session layer
b. network layer
c. transport layer
d. data link layer
e. none of above

Question 2:
In OSI network architecture, the routing is performed by
a. network layer
b. data link layer
c. transport layer
d. session layer
e. none of above

Question 3:
Which of the following performs modulation and demodulation?
a. fiber optics
b. satellite
c. coaxial cable
d. modem
e. none of the above

Question 4:
The process of converting analog signals into digital signals so they can be processed by a receiving
computer is referred to as:
a. modulation
b. demodulation
c. synchronizing
d. digitising

Question 5:
How many OSI layers are covered in the X.25 standard?
a. Two
b. Three
c. Seven
d. Six
e. None of above
Question 6:
Layer one of the OSI model is
a. physical layer
b. link layer
c. transport layer
d. network layer
e. none of above

Question 7:
The x.25 standard specifies a
a. technique for start-stop data
b. technique for dial access
c. DTE/DCE interface
d. data bit rate
e. none of above

Question 8:
Which of the following communication modes support two-way traffic but in only one direction at a
time?
a. simplex
b. half duplex
c. three-quarters duplex
d. all of the above
e. none of the above

Question 9:
Which of the following might be used by a company to satisfy its growing communications needs?
a. front end processor
b. multiplexer
c. controller
d. concentrator
e. all of the above

Question 10:
What is the number of separate protocol layers at the serial interface gateway specified by the X.25
standard?
a. 4
b. 2
c. 6
d. 3
3. none of the above

Correct Answers:
1. a
2. a
3. d
4. d
5. b
6. a
7. c
8. b
9. e
10. d
SET-2

Question 1:
The interactive transmission of data within a time sharing system may be best suited to
a. simplex lines
b. half-duplex lines
c. full duplex lines
d. biflex-lines

Question 2:
Which of the following statement is incorrect?
a. The difference between synchronous and asynchronous transmission is the clocking derived from the
data in synchronous transmission.
b. Half duplex line is a communication line in which data can move in two directions, but not at the same
time.
c. Teleprocessing combines telecommunications and DP techniques in online activities
d. Batch processing is the prefered processing mode for telecommunication operation.

Question 3:
Which of hte following is considered a broad band communication channel?
a. coaxial cable
b. fiber optics cable
c. microwave circuits
d. all of above

Question 4:
Which of the following is not a transmission medium?
a. telephone lines
b. coaxial cables
c. modem
d. microwave systems

Question 5:
Which of the following does not allow multiple uses or devices to share one communication line?
a. doubleplexer
b. multiplexer
c. concentrator
d. controller

Question 6:
Which of the following signal is not standard RS-232-C signal?
a. VDR
b. RTS
c. CTS
d. DSR

Question 7:
Which of the following statement is incorrect?
a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of
data on one communication line
b. HDLC is a standard synchronous communication protocol.
c. RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates
that it is ready to accept data
d. RTS/CTS is the way the terminal indicates ringing

Question 8:
Which of the following is an advantage to using fiber optics data transmission?
a. resistance to data theft
b. fast data transmission rate
c. low noise level
d. all of above

Question 9:
Which of the following is required to communicate between two computers?
a. communications software
b. protocol
c. communication hardware
d. all of above including access to transmission medium

Question 10:
The transmission signal coding method of TI carrier is called
a. Bipolar
b. NRZ
c. Manchester
d. Binary

Answers:
1. b
2. d
3. d
4. c
5. a
6. a
7. d
8. d
9. d
10. a
SET-3
Question 1:
Which data communication method is used to transmit the data over a serial communication link?
a. simplex
b. half-duplex
c. full-duplex
d. b and c
e. None of above

Question 2:
What is the minimum number of wires needed to send data over a serial communication link layer?
a. 1
b. 2
c. 4
d. 6
e. none of above

Question 3:
Which of the following types of channels moves data relatively slowly?
a. wide band channel
b. voice band challen
c. narrow band channel

Question 4:
Most data communications involving telegraph lines use:
a. simplex lines
b. wideband channel
c. narrowband channel
d. dialed service

Question 5:
A communications device that combines transmissions from several I/O devices into one line is a
a. concentrator
b. modifier
c. multiplexer
d. full-duplex line

Question 6:
How much power (roughly) a light emitting diode can couple into an optical fiber?
a. 100 microwatts
b. 440 microwatts
c. 100 picowatts
d. 10 miliwatts

Question 7:
The synchronous modems are more costly than the asynchronous modems because
a. they produce large volume of data
b. they contain clock recovery circuits
c. they transmit the data with stop and start bits
d. they operate with a larger bandwidth
e. none of above

Question 8:
Which of the following statement is correct?
a. terminal section of a synchronous modem contains the scrambler
b. receiver section of a synchronous modem contains the scrambler
c. transmission section of a synchronous modem contains the scrambler
d. control section of a synchronous modem contains the scrambler
e. none of the above

Question 9:
In a synchronous modem, the digital-to-analog converter transmits signal to the
a. equilizer
b. modulator
c. demodulator
d. terminal
e. none of aobve

Question 10:
Which of the following communications lines is best suited to interactive processing applications?
a. narrow band channel
b. simplex lines
c. full duplex lines
d. mixed band channels

Answers
1. c
2. b
3. c
4. c
5. c
6. a
7. b
8. c
9. a
10. c
SET-4

Question:1
A remote batch-processing operation in which data is solely input to a central computer would require
a. telegraphp line
b. simplex lines
c. mixed bad channel
d. all of above

Question 2:
A band is always equivalent to
a. a byte
b. a bit
c. 100 bits
d. none of above

Question 3:
The loss in signal power as light travels down the fiber is called
a. attenuation
b. progragation
c. scattering
d. interruption

Question 4:
Avalanche photodiode receivers can detect bits of transmitted data by receiving
a. 100 photons
b. 200 photons
c. 2000 photons
d. 300 photons

Question 5:
Communiction circuits that transmit data in both directions but not at the same time are operating in
a. a simplex mode
b. a half duplex mode
c. a full duplex mode
d. an asynchronous mode

Question 6:
An example of a medium speed, switched communications service is
a. series 1000
b. data phone 50
c. DDD
d. All of the above

Question 7:
In communication satellite, multiple repeaters are known as
a. detector
b. modulator
c. stations
d. transponders

Question 8:
While transmitting odd-parity coded symbols, the number of zeros in each symbol is
a. odd
b. even
c. a and b both
d. unknown

Question 9:
Data communications monitors available on the software marked include
a. ENVIRON/1
b. TOTAL
c. BPL
d. Telnet

Question 10:
An example of an analog communication method is
a. laser beam
b. microwave
c. voice grade telephone line
d. all of the above
Answers
1. b
2. d
3. a
4. b
5. b
6. c
7. d
8. d
9. a
10. d
SET-5

Question:1
Number of bits per symbol used in Baudot code is
a. 7
b. 5
c. 8
d. 9

Question 2:
What is the main difference between DDCMP and SDLC?
a. DDCMP does not need special hardware to final the beginning of a message
b. DDCMP has a message header
c. SDLC has a IP address
d. SDLC does not use CRC

Question 3:
An example of digital, rather than analog, communication is
a. DDD
b. DDS
c. WATS
d. DDT

Question 4:
Terminals are required for
a. real-time, batch processing & time-sharing
b. real time, time-sharing & distributed message processing
c. real time, distributed processing & manager inquiry
d. real-time, time sharing & message switching

Question 5:
The receive equilizer reduces delay distortions using a
a. tapped delay lines
b. gearshift
c. descrambler
d. difference engine

Question 6:
Ina synchronous modem, the receive equilizer is known as
a. adaptive equilizer
b. impariment equilizer
c. statistical equilizer
d. compromise equilizer

Question 7:
The channel in the data communication model can be
a. postal mail services
b. telephone lines
c. radio lines
d. any of the above

Question 8:
A data terminal serves as an
a. Effector
b. sensor
c. both a and b
d. neither a nor b

Question 9:
Which of the following transmission systems provide the highest data rate to in individual device?
a. computer bus
b. telephone lines
c. voice and mode
d. lease lines

Question 10:
A protocol is a set of rules governing a time sequence of events that must take place
a. between peers
b. between an interface
c. between modems
d. across an interface

Answers
1. b
2. a
3. b
4. d
5. a
6. a
7. d
8. c
9. a
10. a
Computer Architecture and Organization MCQS

Set-1
Question 1:
Where does a computer add and compare data?
a. Hard disk
b. Floppy disk
c. CPU chip
d. Memory chip

Question 2:
Which of the following registers is used to keep track of address of the memory location where the next
instruction is located?
a. Memory Address Register
b. Memory Data Register
c. Instruction Register
d. Program Register

Question 3:
A complete microcomputer system consists of
a. microprocessor
b. memory
c. peripheral equipment
d. all of above

Question 4:
CPU does not perform the operation
a. data transfer
b. logic operation
c. arithmetic operation
d. all of above

Question 5:
Pipelining strategy is called implement
a. instruction execution
b. instruction prefetch
c. instruction decoding
d. instruction manipulation

Question 6:
A stack is
a. an 8-bit register in the microprocessor
b. a 16-bit register in the microprocessor
c. a set of memory locations in R/WM reserved for storing information temporarily during the execution
of computer
d. a 16-bit memory address stored in the program counter

Question 7:
A stack pointer is
a. a 16-bit register in the microprocessor that indicate the beginning of the stack memory.
b. a register that decodes and executes 16-bit arithmetic expression.
c. The first memory location where a subroutine address is stored.
d. a register in which flag bits are stored
Question 8:
The branch logic that provides decision making capabilities in the control unit is known as
a. controlled transfer
b. conditional transfer
c. unconditional transfer
d. none of above

Question 9:
Interrupts which are initiated by an instruction are
a. internal
b. external
c. hardware
d. software

Question 10:
A time sharing system imply
a. more than one processor in the system
b. more than one program in memory
c. more than one memory in the system
d. None of above

Answers:
1. c
2. d
3. d
4. d
5. b
6. c
7. a
8. c
9. d
10. b

====================MCQS SET 2===========

Question 1:
Processors of all computers, whether micro, mini or mainframe must have
a. ALU
b. Primary Storage
c. Control unit
d. All of above

Question 2:
What is the control unit's function in the CPU?
a. To transfer data to primary storage
b. to store program instruction
c. to perform logic operations
d. to decode program instruction

Question 3:
What is meant by a dedicated computer?
a. which is used by one person only
b. which is assigned to one and only one task
c. which does one kind of software
d. which is meant for application software only

Question 4:
The most common addressing techiniques employed by a CPU is
a. immediate
b. direct
c. indirect
d. register
e. all of the above

Question 5:
Pipeline implement
a. fetch instruction
b. decode instruction
c. fetch operand
d. calculate operand
e. execute instruction
f. all of abve

Question 6:
Which of the following code is used in present day computing was developed by IBM corporation?
a. ASCII
b. Hollerith Code
c. Baudot code
d. EBCDIC code

Question 7:
When a subroutine is called, the address of the instruction following the CALL instructions stored in/on
the
a. stack pointer
b. accumulator
c. program counter
d. stack

Question 8:
A microprogram written as string of 0's and 1's is a
a. symbolic microinstruction
b. binary microinstruction
c. symbolic microprogram
d. binary microprogram

Question 9:
Interrupts which are initiated by an instruction are
a. internal
b. external
c. hardware
d. software

Question 10:
Memory access in RISC architecture is limited to instructions
a. CALL and RET
b. PUSH and POP
c. STA and LDA
d. MOV and JMP

Answers:
1. d 2. d 3. b 4. e 5. f 6. d 7. d 8. d 9. b 10. c

====================MCQS SET 3===========

Question 1:
A collection of 8 bits is called
a. byte
b. word
c. record

Question 2:
The ascending order or a data Hierarchy is
a. bit - bytes - fields - record - file - database
b. bit - bytes - record - field - file - database
c. bytes - bit- field - record - file - database
d. bytes -bit - record - field - file - database

Question 3:
How many address lines are needed to address each memory locations in a 2048 x 4 memory chip?
a. 10
b. 11
c. 8
d. 12

Question 4:
A computer program that converts an entire program into machine language at one time is called a/an
a. interpreter
b. simulator
c. compiler
d. commander

Question 5:
In immediate addressing the operand is placed
a. in the CPU register
b. after OP code in the instruction
c. in memory
d. in stack

Question 6:
Microprocessor 8085 can address location upto
a. 32K
b. 128K
c. 64K
d. 1M

Question 7:
The ALU and control unit of most of the microcomputers are combined and manufacture on a single
silicon chip. What is it called?
a. monochip
b. microprocessor
c. ALU
d. control unit

Question 8:
When the RET instruction at the end of subroutine is executed,
a. the information where the stack is iniatialized is transferred to the stack pointer
b. the memory address of the RET instruction is transferred to the program counter
c. two data bytes stored in the top two locations of the stack are transferred to the program counter
d. two data bytes stored in the top two locations of the stack are transferred to the stack pointer

Question 9:
A microporgram is sequencer perform the operation
a. read
b. write
c. execute
d. read and write
e. read and execute

Question 10:
Interrupts which are initiated by an I/O drive are
a. internal
b. external
c. software
d. all of above
Answers:
1. a 2. a 3. b 4. c 5.b 6.c 7.b 8.c 9.e 10.b

COMPUTER SCIENCE MCQS

i) AX register is also known as:


(a) Accumulator
(b) Collector
(c) Distributor
(d) Counter
(e) None of these
(ii) In the Base + Offset addressing, Offset address is also known as:
(a) Physical Address
(b) Logical Address
(c) Actual Address
(d) Instruction Address
(e) None of these

(iii) The technique for allowing a unit to check the status of another independently function unit
is known as?
(a) Interrupt
(b) System call
(c) Polling
(d) Trape
(e) None of these

(iv) The method for storing data temporarily such that the input-output of the same job is
overlapped with its own processing, is known as:
(a) Spooling
(b) Contention
(c) I/O wait
(d) Buffering
(e) None of these

(v) The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these

(vi) _________ Scheduler deals with the decision as to whether to admit another new job to the
system.
(a) High Level
(b) Medium Level
(c) Low Level
(d) Short term
(e) None of these

(vii) When the process is in the states of Blocked Suspended or Ready Suspended, its relevant
data is
stored in:
(a) Main Memory
(b) Hard Disk
(c) Magnetic Tape
(d) Buffer
(e) None of these

(viii) Priority, P = (Time Waiting + Run Time) / Run Time is used to calculate priority in
__________ scheduling algorithm:
(a) Shortest Job First
(b) Priority Scheduling
(c) Longest Wait First
(d) Highest Response Ratio Next
(e) None of these

(ix) HDLC Protocol stands for:


(a) High-Level Data Link Control
(b) High Level Development Protocol
(c) Huge Level Data Link Control
(d) High Development Level Control
(e) None of these

(x) _________ is the generic name for a set of standards issued by the International
CommunicationsStandards Body CCITT, designed to support Message Handling Systems; i.e.
Electronic Mail.
(a) TCP/IP
(b) ISDN
(c) X.400
(d) X.25
(e) None of these

(xi) ________ layer is responsible for the transfer of a packet of data along one link in the
network. It organizes data into frames and detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these

(xii) Encryption is the conversion of data in some intelligible format into an unintelligible format
called _________ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these

(xiii) Binary search requires about ______ comparisons with an initial list of 1,000,000 elements.
(a) 10
(b) 20
(c) 35
(d) 100
(e) None of these

(xiv) A _________ header list is a header list where the last node contains the null pointer.
(a) Grounded
(b) Circular
(c) One way
(d) Rooted
(e) None of these

(xv) ________ are small applications that are accessed on an internet server, transported over the
internet, automatically installed and run as part of a web document.
(a) Applets
(b) Java Bean
(c) Sockets
(d) Java Component
(e) None of these

(xvi) AWT stands for:


(a) Abstract Window Technique
(b) Abstract Window Toolkit
(c) Actual Window Technique
(d) Added Window Toolkit
(e) None of these

(xvii) GIF images can have only upto _______ colors.


(a) 128
(b) 256
(c) 512
(d) 1024
(e) None of these

(xviii) ________ is stored on a client and contains state information of the website visited.
(a) Cookies
(b) Servelet
(c) History
(d) Resident Page
(e) None of these
(xix) In software Engineering KPA denotes.
(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these

(xx) The ________ Process Model defines a series of events that will trigger transitions from
state to state for each of software engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these

ANSWER
1. a
2. d
3. b
4. d
5d
6a
7a
8b
9a
10 a
11 b
12 c
13 d
14 d
15 a
16 b
17 b
18 b
19 b
20 a
1-object (also called_____) is a common data type that includes photograph, audio, vedio,
or a document in other applications.
(a) Number (b) BLOB (c) Integer (d) binary (e) none of these

2. in database, a(n) ____ field is a group of related fields.


(a) Table (b) Key (c) Record (d) Primery field (e) Non of these

3. In a database, a(n) ____ field is a field that uniquely identifies each record in a file.
(a) Main (b) Identifying (c) Master (d) Key (e) none of these

4. If a lowest annual fee at a discount wherehouse is Rs.2025 and the highest is Rs.5550,
a(n)______ on annual fee field ensure it is a value between Rs.2025 and Rs.5550.
(a) Range Check (b) compelteness check (c) consistency Check (d) alphabetic/numeric
check (e) none of these

5. A DBMS uses the _____ to perform validation checks.


(a) Data Server (b) data smart (c) data wherehouse (d) data dictionary (e) none of these

6. _______ is a network technology that defines how messages are routed from one end of
a network to other, ensuring the datat arrives correctly by dividing it into packets.
(a) HTML (b) XML (c) HTTP (d) TCP/IP (e) none of these

7. When a computer sends data over the internet, the data is divided into small pieces , or
_______
(a) Bundles (b) packets (c) slices (d) baskets (e) none of these

8. The amount of data, instructions and information that can travel over a communication
channel somtimes is called _______
(a) broadband (b) baseband (c) latency (d) bandwidth (e) none of these

9. fiber optic cables have all of the following advantages over cables that used wire except
_______
(a) lower costs & easier installation and modification
(b) Faster data transmission & smaller size
(c) Less susceptible to noise from other divices
(d) Better security for signals during transmission
(e) none of these

10. A_____ is a network that connects compter and divices in a limited geographical area,
such as home, school computer laboratory , or office building
(a) LAN (b) MAN (c) WAN (d) VAN (e) none of these

11. with _______ memory , the operating system allocates a portion of storage medium,
usually the hard disk , to function as additional RAM
(a) Virtual (b) performance (c) device (d) Manged (e) none of these

12. If a new a device such as printer or scanner is attached to a computer, its _________
must be installed before the divice can be used
(a) Driver (b) platform (c) manager (d) kernel (e) none of these

13. A ________ is an icon on the desktop that provides a user with immediate access to a
program or file.
(a) kernel (b) spooler (c) buffer (d) Shortcut (e) none of these

14. ________ a disk or reorgnizing it so the files are stored in contiguous sectors, speeds
up disk access and thus performance of entire computer .
(a) Formating (b) Defregmenting (c) Spooling (d) compressing (e) none of these

15. the term cmputer _______ discribes potentially damging computer program that affects
or infects a computer by altering the way the compter works without the users knowledge
or permission .
(a) Hot spot (b) File compression Utillty (c) Virus (d) File conversion Utillity (e) none of
these

16. In a diagram ( a DFD diagram was given ) _________ shows the input and output of
information into or out from a prosses .
(a) Use Case (b) Data Flow (c) entity relationship (d) Class Diagram (e) none of these

17. Although used in all types of bussiness modeling the _____ has been adopted as a
standard notation for object modeling.
(a) UML (b) CASE Tool (c) USE CASE Diagram (d) EMR (not sure) (e) none of these

18. For each input and output, a systems analyst tipicaly develops _______ which is a
sample of the input or output and contains actual data.
(a) adoption (b) prototype (c) Mockup (d) feasibility Scheme (e) none of these

19. _________ is a working modle of propesed system .


(a0 Adoption (b) feasibilty Scheme (c) Mockup (d) Prototype (e) none of these

20. A unit test ________


(a) verifies that each individule program works by itself
(b) verifies that all programs in an application work togather properly
(c) verifies that an application works with other applications
(d) is performed by end-users and verifies that the new system works with actual data
(e) none of these

(1) If the highest frequency of a signal is 2100 Hz and lowest frequency of a signal is 200 Hz,
sample rate will be:
(a) 4000 Hz
(b) 4600 Hz
(c) 4200 Hz
(d) 2300 Hz
(e) None of these

(2) A 56 K modem can download at a rate of _________ Kbps and upload at a rate of
_________ Kbps.
(a) 33.6; 33.6
(b) 33.6; 56.6
(c) 56.6; 33.6
(d) 56.6; 56.6
(e) None of these
(3) A system call provides interface between:
(a) A process and a thread
(b) A thread and a user program
(c) A process and an operating system
(d) A process and a user program
(e) None of these

(4) CPU scheduling information about a process is held by:


(a) a PC
(b) the CPU Register
(c) the Cache
(d) a PCB
(e) None of these

(5) An example of Last-In-First-Out (LIFO) data structure is a:


(a) Class
(b) List
(c) Stack
(d) Tree
(e) None of these

(6) In Object Oriented Programming, overload methods:


(a) Can have the same types and number of parameters as another method with the
same name in the same class as long as the return type is different.
(b) Cannot be used as methods that manipulate attributes
(c) Must always have different number of parameters
(d) Must have different number of parameters or if the number of parameters is the
same a different sequence of parameter type
(e) None of these

(7) If you wanted to sort many large objects or structures, it would be most efficient to:
(a) Place them in an array and sort the array
(b) Place pointers to them in an array and sort the array
(c) Place them in a linked list and sort the linked list
(d) Place references to them in an array and sort the array
(e) None of these

(8) The type of the variable a pointer points to must be part of the pointer’s definition so
that:
(a) Data types do not get mixed up when arithmetic is performed on them.
(b) Pointers can be added to one another to access structure members
(c) No one’s religious conviction will be offended
(d) The computer can perform overloading
(e) None of these

(9) If we have a tree of n nodes, its depth can be calculated as:


(a) Log2 (n+1) – 1
(b) Log2 n
(c) Log2 (n+1) – 1
(d) Log10 (n+1) – 1
(e) None of these

(10) Which one of the following methods does not change the original value of the
argument in the calling function?
(a) Call by passing reference of the argument
(b) Call by passing the address of the argument
(c) Call by passing value of the argument
(d) Call by passing pointer of the argument
(e) None of these

(1) If the highest frequency of a signal is 2100 Hz and lowest frequency of a signal is 200 Hz,
sample rate will be:
(a) 4000 Hz
(b) 4600 Hz
(c) 4200 Hz
(d) 2300 Hz
(e) None of these

(2) A 56 K modem can download at a rate of _________ Kbps and upload at a rate of
_________ Kbps.
(a) 33.6; 33.6
(b) 33.6; 56.6
(c) 56.6; 33.6
(d) 56.6; 56.6
(e) None of these

(3) A system call provides interface between:


(a) A process and a thread
(b) A thread and a user program
(c) A process and an operating system
(d) A process and a user program
(e) None of these

(4) CPU scheduling information about a process is held by:


(a) a PC
(b) the CPU Register
(c) the Cache
(d) a PCB
(e) None of these

(5) An example of Last-In-First-Out (LIFO) data structure is a:


(a) Class
(b) List
(c) Stack
(d) Tree
(e) None of these

(6) In Object Oriented Programming, overload methods:


(a) Can have the same types and number of parameters as another method with the same
name in the same class as long as the return type is different.
(b) Cannot be used as methods that manipulate attributes
(c) Must always have different number of parameters
(d) Must have different number of parameters or if the number of parameters is the same a
different sequence of parameter type
(e) None of these

(7) If you wanted to sort many large objects or structures, it would be most efficient to:
(a) Place them in an array and sort the array
(b) Place pointers to them in an array and sort the array
(c) Place them in a linked list and sort the linked list
(d) Place references to them in an array and sort the array
(e) None of these

(8) The type of the variable a pointer points to must be part of the pointer’s definition so
that:
(a) Data types do not get mixed up when arithmetic is performed on them.
(b) Pointers can be added to one another to access structure members
(c) No one’s religious conviction will be offended
(d) The computer can perform overloading
(e) None of these

(9) If we have a tree of n nodes, its depth can be calculated as:


(a) Log2 (n+1) – 1
(b) Log2 n
(c) Log2 (n+1) – 1
(d) Log10 (n+1) – 1
(e) None of these

(10) Which one of the following methods does not change the original value of the
argument in the calling function?
(a) Call by passing reference of the argument
(b) Call by passing the address of the argument
(c) Call by passing value of the argument
(d) Call by passing pointer of the argument
(e) None of these

(A) Write only True or False in the Answer Book. Do not reproduce the question. (1x10)

(1) A feature of an operating system that allows more than one program to run simultaneously is called
Multitasking.
(2) A trackball operates like a joystick on its back. It is extremely useful when there isn't enough space to
use a mouse,
(3) Digitizing Tablet is a'special Input device that is mainly used to digitize vector-oriented design or
pictures.
(4) Dedicated line is a high speed cable line that is not permanently wired into the internet.
(5) A Router is a network device that helps LANs and WANs achieve interoperability and connectivity
and thai can link LANs that have different netwoik topdldgies, such as Ethernet and Token Ring.
(6) Internet Protocol is a routable protocol in the backbone that is responsible for IP addressing, routing,
and the fragmentation and reassembly of IP packets.
(7) Telnet is an Internet connection that enables a user to terminate an active connection with a
computer at a retoete site.
(8) ESD stands for Electronic Static Distance.
(9) IRQ is Interrupt Request.
(10) Copyright computer programs made available on trial basis are called shareware.

(B) Please choose^he most appropriate answer from the given set of answers. . (.1x5)

(11) What is the long form of 'CMOS'?


(a) Complimentary Metal Oxide Semiconductor V
(b) Complex Metal Oxide Semiconductor
(c) Controller Metal Oxide Semiconductor
(d) Complimentary Metal Oxide Sets.

(12) What is a Y-Connector? '


(a) A'Y-Shaped splitter cable that divides a source input into two output signals.
(b) A Y-Shaped splitter connector that divides a source input into two output signals.
(c) A Y-Shaped splitter card that divides'a source input into two output signals.
(d) None of the above.

(13) What do you mean by IBM-Compatible'?


(a) A computer that has a processor that is compatible vvith the original IBM PC.
(b) A computer that has a processor that is similar to original IBM PC
(c) A computer that has a casing that is similar original IBM PC.
(d) None of the above

(14) What do you mean by "virtual? Select'all that apply:


(a) In general, it distinguishes something that is merely conceptual from something that has physical
reality,
(b) Real
(c) Not real.
(d) None of the above

(15) Select correct statement describing a term 'stateless'?


(a) Having all information about what occurred previously
(b) Having some information aboot what occurred previously
(c) Having no information about what occurred previously
(d) Having new information about what occurred previously

(i) When all access and processing is done in one location, a computer system is said to be
(a) networked
(b) distributed
(c) centralized
(d) linked

(ii) Tools to change PROM chips, called


(a) chip kits
(b) RAM burners
(c) PROM burners
(d) none of
these

(iii) The type of modulation that changes the height of the single is called (a) frequency
(b) phase
(c) amplitude
(d) prophase

(iv) A connection for similar network:


(a) satellite
(b) bridge
(c) gateway
(d) fax

(v) The technology whereby part of the program is stored on disk and is brought into memory for
execution as needed is called
(a) memory allocation
(b) virtual storage
(c) interrupts
(d) prioritized memory

(C) Write '"True" or "False" in your answer book about the following statements: (5)

(i) Application software may be either custom or packaged.


(ii) RISC technology uses more instructions than traditional computers.
(iii) A ring network has no central host computer.
(iv) Satellites use line-of-sight transmission.
(v) Time-sharing is both event-driven and time-driven.

MS-DOS-Objective Questions (MCQ) with Solutions and Explanations

SET-1
1. In MS-Dos 6.22, which part identifies the product uniquely
a. MS
b. DOS
c. Ms-DOS
d. 6.22

Correct Answer: d. 6.22


Explanation: MS stands for Microsoft, DOS is the name of operating system Disk Operating System, 6.22
is the version number that identifies the product.

2. In Ms-Dos what command you will use to display system date?


a. Date command
b. Ver command
c. Disk command
d. Format command

Correct Answer: a. Date command


Explanation: Ver command displays the version number of Dos. There is no command as Disk. Format
command prepares a disk to be used with DOS. Thus Date is the command that lets you to display
and/or change the system date.

3. While working with Ms-Dos which command transfers a specific file from one disk to another?
a. Copy
b. Diskcopy
c. Time
d. Rename

Correct Answer: a. Copy


For a specific file to copy from one disk to another disk, Copy command should be used. Diskcopy copies
whole disk into new disk. Time command is to display system time and Rename command just changes
the name of a file.

4. If you don’t know the current time, which command will you use to display
a. Copy
b. Ver
c. Time
d. Format

Correct Answer: c. Time


Explanation: Time command displays and allows you to change system time. TIME only displays the
system time and TIME <time> is used to set new time as system time.

5. Which command divides the surface of the blank disk into sectors and assign a unique address to
each one
a. Ver
b. Format
c. Fat
d. Chkdsk

Correct Answer: b. Format


Explanation: Ver is used to display the version number of DOS in use. Fat command does not exist and
Chkdsk is to check disk errors and fix it. Thus dividing surface into sectors is done by Format command.

6. Each time you turn on your computer, it will check on the control file
a. Command.com, io.sys
b. Command.com, date.com, dir.com
c. Command.com, io.sys, msdos.sys
d. Chkdsk.exe

Correct Answer: c. command.com, io.sys, msdos.sys


Explanation: command.com, io.sys and msdos.sys are the essential system files of MS-Dos. Loading
these files from disk into memory is known as booting. Booting is the process of preparing your
computer to work.

7. If you need to duplicate the entire disk, which command will you use?
a. Copy
b. Diskcopy
c. Chkdsk
d. Format

Correct Answer: b. Diskcopy


Explanation: Diskcopy is used to perform track-by-track copy of a disk into another. Copy command
copies selected files; chkdsk and format commands are not for copying purpose.

8. Which of the following extensions suggest that the file is a backup copy
a. Bak
b. Bas
c. Com
d. Txt

Correct Answer: a. Bak


Explanation: Bak extension is commonly used to store backup copies of files so that it can be restored
later when original file is corrupted or deleted. Bas extension indicates the file is a BASIC program source
file, com is command file and txt is plain text file.

9. Which command lists the contents of current directory of a disk


a. Copy
b. Tree
c. Cd
d. Dir

Correct Answer: Dir


Explanation: Dir command lists the directory of current location. It includes the files, subdirectories and
some other system information. Tree command is used to list the directory structure in tree diagram; CD
command to change directory and Copy command to copy a file into another.

10.Only filenames and extensions are to be displayed in wide format, which command you’ll use?
a. Dir/w
b. Dir a:
c. Dir/s
d. Dir/b

Correct Answer: Dir/w


Explanation: Dir/w only displays the file names and extensions excluding file created date/time, file size.
Second option dir a: will list the contents of A drive (floppy drive), third dir/s lists current directory and
its subdirectories too, dir/b displays bare format, that means, it just makes a list of files, no more
information.

SET-2

Objective Questions (Multiple Choice Questions) from Ms-Dos for computer operators continuying from
11
11. Which command displays all the files having the same name but different extensions?
a. Dir filename.*
b. Dir filename.ext
c. Dir *.sys
d. Dir *.ext

Correct Answer: a. Dir filename.*


Explanation: * is a wild card character that stands for all any character. When you specify filename.*, it
meant filename should be specified one but extension can be any. Second option lists only the specified
filename.exe and third and fourth commands lists all files with sys extension and specified extension.

12. Which command displays only file and directory names without size, date and time information?
a. Dir/w
b. Dir a:
c. Dir /b
d. Dir /s

Correct Answer: dir/b


Explanation: dir/b command barely lists the names of files and directories without any other information
like size, date, time etc.

13. Which command displays comma for thousand separating on file size while listing?
a. Dir/w
b. Dir/s
c. Dir/b
d. Dir/c

Correct Answer: d. Dir/c


Explanation: Using comma for separating thousand in file size is by default on. You can use dir/-c to
remove comma from the listing. /C stands for comma.
14. Which command is used to display all the files having the (.exe) extension but different filename?
a. Dir filename.*
b. Dir filename.ext
c. Dir *.sys
d. Dir *.ext

Correct Answer: d. Dir *.ext


Explanation: First two options are obviously wrong since specifying filename will list for that filename
only. Since we need to list only with .ext extension fourth option is correct. Third option displays all files
with sys extension.

15. Which command should be used to display all files within the specified subordinate directory of the
subdirectory?
a. Dir \ pathname
b. Dir \ pathname\pathname
c. Dir / ch
d. Dir \pathname\filename

Correct Answer: b. Dir \pathname\pathname


Explanation: The subordinate directory of subdirectory can be accessed through the path sequence
pathname\pathname and dir command lists the files of that location.

16. Which command displays the directory list including files in tree structure?
a. Dir/s/f
b. Tree/f
c. Tree/s/f
d. Dir/f

Correct Answer: b. Tree/f


Explanation: Tree command lists the directory structure in tree structure and /f switch of tree command
includes the filenames in the structure.

17. Which command will be used to display a file within the specified directory of pathname?
a. Dir \pathname
b. Dir \pathname\pathname
c. Dir/ch
d. Dir \pathname\filename

Correct Answer: d. Dir \pathname\filename


Explanation: Displaying a file which is inside specified directory can be done by specifying a directory
name \ and filename.

18. Which command creates a directory or subdirectory?


a. Dir
b. Mkdir
c. Md
d. Both b and c

Correct Answer: d. Both b and c


Explanation: MK command and MKDIR both commands are equivalent and can be used to create
subdirectories. Dir only lists directory but can’t create.

19. Which command displays current directory name or change from one to another?
a. Chdir
b. Cd
c. Mkdir
d. Both a and b

Correct Answer: d. Both a and b


Explanation: CD and CHDIR commands are equivalent and both used to change current working
directory to another one. MKDIR creates a new directory and can’t be used to change.

20.Which command is used to delete the directory that is empty?


a. Del *.*
b. RD
c. Erase
d. MD

Correct Answer: b. RD
Explanation: RD command or RMDIR commands can be used to remove a directory if it is empty. Del
command and Erase commands are used to delete files not directories. MD creates a new directory and
can’t remove directory.
SET-4
1. An entire path name, consisting of several sub-directory names can contain
upto
a. 13 character
b. 36 character
c. 63 character
d. 53 character
Correct Answer: c
2. In which year the first operating system was developed
a. 1910
b. 1940
c. 1950
d. 1980
Correct Answer: c
3. MS-DOS developed in
a. 1991
b. 1984
c. 1971
d. 1961
Correct Answer: b
4. Maximum length of DOS command using any optional parameter is
a. 26 characters
b. 87 characters
c. 127 characters
d. None of above
Correct Answer: c
5. In which version of DOS. CHKDSK command has been changed to SCANDISK?
a. 5.0
b. 6.2
c. 6.0
d. 6.2
Correct Answer: d
6. CHKDSK command is used to
a. Analyze the hard disk error
b. Diagnose the hard disk error
c. Report the status of files on disk
d. All of the above
Correct Answer: d
7. Which file is the batch file that is read while booting a computer?
a. Autoexec.bat
b. Auto-batch
c. Autoexecutive.bat
d. Auto.bat
Correct Answer: a
8. Which command is used to backup in DOS 6+ Version
a. BACKUP
b. MSBACKUP
c. MSBACKEDUP
d. All of the above
Correct Answer: b
9. Copy and Xcopy are same in the sense
a. Both are internal command of DOS
b. Both are external commands of DOS
c. Both can be used to copy file or group of files
d. Both a and b
Correct Answer: c
44. Which command be used to clear the screen and display the operating system prompt on the first
line of the display?
a. Cd
b. Md
c. Rename
d. cls
Correct Answer: d
10. Which command is used to clear the screen
a. Cls
b. Clear
c. Clscreen
d. All of above
Correct Answer: a
11. internal command in Dos are
a. Cls, rd label
b. Dir, ren, sys
c. Time, type, dir
d. Del, disk copy, label
Correct Answer: c
12. Which command is used to copy files?
a. Copy
b. Diskcopy
c. Type
d. All of the above
Correct Answer: a
13. To copy the hidden system files of DOS to another disk you can use the command
a. Copy
b. Ren
c. Sys
d. Diskcopy
Correct Answer: c
14. Disk copy command in DOS is used to
a. Copy a file
b. Copy contents of one floppy disk to another
c. Copy contents of CD-ROM to another
d. All of the above
Correct Answer: b
15. SYS command is used to
a. Copy DOS system files to new disk
b. Copy DOS configuration files to a new disk
c. Update the DOS system files
d. None of above
Correct Answer: a
16. The command used to copy a file named temp.doc from drive C: to drive A: is
a. Copy temp.doc to a:
b. Copy c:\temp.doc a:
c. Copy c: a:
d. Copy temp a: c:
Correct Answer: b
17. External command in DOS are
a. Copy, edit, sys, format
b. Edit, sys, chkdsk
c. Chkdsk, prompt, date
d. Sys, ver, vol
Correct Answer: b
18. Which keys can be pressed quit without saving in DOS
a. Ctrl + A
b. Ctrl + B
c. Ctrl + C
d. Ctrl + D
Correct Answer: c
19. Which command is used to get the current date only?
a. Date
b. Time
c. Second
d. All of the above
Correct Answer: a
20. Generally, the DATE is entered in the form
a. DD-YY-MM
b. YY-DD-MM
c. MM-YY-DD
d. MM-DD-YY
Correct Answer: d

SET-5
1. Which statement is valid about “TIME” command?
a. Time command is used to display and allow changes to the system time
b. Time format can be changed by changing in country setting in config.sys file
c. MS DOS displays the time in 12-hour or 24-hour format
d. All of above
Correct Answer: d
2. Which command is used to see the sub-directory structure of drive?
a. Tree
b. List
c. Subdir
d. Subtree
Correct Answer: a
3. Which command is used to display the subdirectory structure of the currently logged drive and pause
the screen display after each screen full of the information?
a. Tree
b. Deltree/f
c. Dir | more
d. Tree | more
Correct Answer: d
4. Which command is used to provide access to files located in other directories or disks?
a. Tree
b. Path
c. Dir
d. Cd
Correct Answer: b
5. you can copy command.com to your disk from hard disk
a. true
b. false
Correct Answer: a
6. Which command is used to see the contents of a file?
a. Type
b. Copy
c. Ed
d. None of above
Correct Answer: a
7. Which command is used to see the disk volume label?
a. Ver
b. Vol
c. Version
d. Volume
Correct Answer: b
8. Which command is used to see the version?
a. Version
b. Ver
c. Verson
d. None of above
Correct Answer: b
9. What is the name of the batch file that is automatically run when MSDOS is booted?
a. Run.bat
b. Config.sys
c. Config.bat
d. Autoexec.bat
Correct Answer: d
10. What is the switch that is used to make sure that the copy command copied files correctly
a. /a
b. /c
c. /s
d. /v
Correct Answer: d
11. What will be the output of the command prompt $l$p$g?
a. <c:\>
b. C:\>
c. C:\>>
d. C:<\>
Correct Answer: a
12. Which among the following are the best tools for fixing errors on disks?
a. Fdisk
b. Scandisk
c. Chkdsk
d. Fixdsk
Correct Answer: b
13. Which command can be used to create the disk’s tracks and sectors?
a. Fdisk
b. Format
c. Chkdsk
d. Attrib
Correct Answer: b
14. Which command in DOS can be used to recover accidentally deleted files?
a. UNDELETE
b. DELETE/CANCEL
c. RESTORE
d. RECOVER
Correct Answer: a
15. Which command in DOS is used to display the version of MSDOS?
a. VERSION
b. VERIFY
c. VER
d. VERSN
Correct Answer: c
16. Which command is used to copy all files from drive a with extension .txt to the currently logged drive
and directory?
a. Copy a. *.txt
b. Copy *.txt a:
c. Copy *.txt c:
d. Copy *.txt all.txt
Correct Answer: a
17. Which command is used to create root directory and FAT on disk?
a. Chkdsk
b. Command.com
c. Format
d. Fat
Correct Answer: c
18. Which command is used to delete all the files extension .txt on the current drive and directory?
a. Del .txt
b. Erase .txt
c. Del *.txt
d. Del *.*/p
Correct Answer: c
19. Which command is used to delete all the files in the root directory of drive a
a. A:\del
b. Del *.* a:
c. Del a:\
d. Erase *.*
Correct Answer: c
20. Which command is used to display a list of deleted files that DOS can undelete?
a. Undelete *.*
b. Undelete/all
c. Undelete/list
d. None of the above
Correct Answer: c
21. Which command is used to undelete delete a bunch of files with extension doc that you have just
deleted
a. Undelete
b. Undelete *.doc
c. Undelete/all
d. All of the above
Correct Answer: b

SET-6
1. Which file in MSDOS contain internal command that are loaded during booting process?
a. Io.sys
b. Msdos.sys
c. Command.com
d. Config.sys
Correct Answer: c
2. Which is the valid filename assign in MS-DOS?
a. Ram*.txt
b. Ram?.doc
c. Ram_$.txt
d. None of above
Correct Answer: c
3. Which is valid extension that user creates on operating system?
a. Exe
b. Com
c. Sys
d. Bat
Correct Answer: d
4. Which of the following file names are invalid in MSDOS?
a. MYFILE.DOS
b. CHECK$.(1)
c. Verified.###
d. Qwerty.1?3
Correct Answer: d
5. Which of the following statements in regard to directories is false?
a. Directories can exist inside directories
b. The root directory is always at the highest level
c. Directories with files can be deleted
d. Directories cannot be renamed
Correct Answer: d
6. Which of the following statements is true in regard to diskcopy?
a. Copy and discopy are same
b. Discopy is a built in command in dos
c. Diskcopy can be used on hard disks
d. Diskcopy can be used with a floppy and a hard disk
Correct Answer: c
7. Which switch should be used in the DIR command to view files in all directories?
a. /p
b. /w
c. /s
d. /l
Correct Answer: c
8. Which type of command in DOS needs additional files for their execution?
a. Internal commands
b. External commands
c. Batch commands
d. Redirectors
Correct Answer: b
9. Which was the last version of MSDOS that was released separately?
a. 5.0
b. 6.0
c. 6.11
d. 6.22
Correct Answer: d
10. While working with MS-DOS which command is used to change the extension of all filenames ending
with .txt to .doc?
a. Ren *.doc *.txt
b. Ren *.txt *.doc
c. Ren file.doc file.txt
d. Ren a: *.doc *.txt
Correct Answer: b
11. While working with MS-DOS which command is used to combine file1 plus file2 into new file named
file3?
a. Copy file3 file1+file2
b. Copy file1+file2 file3
c. Copy file1+file2+file3
d. Copy file2 file1+file3
Correct Answer: b
12. While working with MS-DOS which command is used to copy all files with extension .txt into one file
named all.txt?
a. Copy a: *.txt
b. Copy *.txt a:
c. Copy *.txt c:
d. Copy *.txt all.txt
Correct Answer: d
13. While working with MS-DOS, which command is used to more file from one directory to another?
a. Rename
b. Copy
c. Move
d. Cp
Correct Answer: c
14. While working with MS-DOS, which command is used to rename a file named file1.doc to file2.doc
from a different directory called dir1?
a. Ren2.doc \dir\file1.doc
b. Ren file1.doc file2.doc
c. Ren .doc\dir\.doc
d. Ren \dir1\file1.doc file2.doc
Correct Answer: d
15. While working with which command is used to copy all files from the currently logged drive and
directory with the extension .txt to the drive a
a. Copy a. *.txt
b. Copy *.txt a:
c. Copy *.txt c:
d. Copy *.txt all.txt
Correct Answer: b
16. Which command in DOS can be used to recover accidentally deleted files?
a. UNDELETE
b. DELETE/CANCEL
c. RESTORE
d. RECOVER
Correct Answer: a
17. Which command is used to set a name to a disk in DOS?
a. VOLUME
b. VOL
c. LABEL
d. DISKLABEL
Correct Answer: c
18. Which of the following command display the name of files in sorted order?
a. Dir/o:n
b. Dir/so
c. Dir/an
d. Dir/ah
Correct Answer: a
19. Which command displays the list of all previous commands entered by the used?
a. COMMANDS/ALL
b. KEYDOS
c. DOSKEY
d. DIR/ALL
Correct Answer: C
SET-7
1. ………. runs on computer hardware and serve as platform for other software to run on
a. Operating system
b. Application software
c. System software
d. All
Correct Answer: a
2. ….is the layer of a computer system between the hardware and the user program
a. Operating environment
b. Operating system
c. System environment
d. None
Correct Answer: b
3. The primary purpose of an operating system is…..
a. To make the most efficient use of the computer hardware
b. To allow people to use the computer
c. To keep systems programmers employed
d. To make computers easier to use
Correct Answer: a
4. …….transforms one interface into another interface
a. Program
b. Software
c. Data
d. None
Correct Answer: b
5. …..system is built directly on the hardware
a. Environment
b. System
c. Operating
d. None
Correct Answer: c
6. Multiprogramming system
a. Are easier to develop than single programming system
b. Execute each job faster
c. Execute more jobs in the same time period
d. Are used only one large mainframe computers
Correct Answer: c
7. …is the first program run on a computer when the computer boots up
a. System software
b. Operating system
c. System operations
d. None
Correct Answer: b
8. …..interface consists of things like program counter, registers, interrupts and terminals
a. Hardware
b. Software
c. Data
d. None
Correct Answer: a
9. ….share characteristics with both hardware and software
a. Operating system
b. Software
c. Data
d. None
Correct Answer: a
10. ….is used in operating system to separate mechanism from policy
a. Single level implementation
b. Two level implementation
c. Multi level implementation
d. None
Correct Answer: b
11. The operating system creates …. from the physical computer
a. Virtual space
b. Virtual computers
c. Virtual device
d. None
Correct Answer: b
12. Swapping
a. Works best with many small partitions
b. Allows many programs to use memory simultaneously
c. Allows each program in turn to use the memory
d. Does not work with overlaying
Correct Answer: c
13. Which of the following operating does not implement multitasking truly?
a. Windows 98
b. Windows NT
c. Windows XP
d. MS DOS
Correct Answer: d
14. What is the name of the latest server operating system developed by Microsoft?
a. Windows NT
b. Windows 2000
c. Windows XP
d. Windows 2003
Correct Answer: d
15. Where do you find user.dat?
a. C:\windows
b. C:\windows\system32
c. C:\windows\system
d. C:\
Correct Answer: a
16. MSD.exe does not have information on:
a. Cache
b. Video
c. Operating System
d. Com or port
Correct Answer: a
SET-8

1. The startup routine runs, when machine boots up is known as


a. POST
b. BOOT up
c. Operating Routine
d. I/O operation
2. Operating system is also known as:
a. database
b. system software
c. hardware
d. printer

3. What is the maximum length allowed for primary name of a computer file under DOS?
a. 8
b. 12
c. 3
d. None of the above

4. Which of the following could be a valid DOS file specification?


a. NOSFILE.POST
b. NOSFILE.P.OST
c. NOSFILE.DOC
d. NOST.FILEDOC

5. How many characters form a secondary name for a file?


a. 8
b. 12
c. 3
d. None of the above

6. What is the name given to something that the computer will automatically use unless you tell
it otherwise?
a. a specification
b. a wildcard
c. a default
d. a rule

7. As per symbolic notation of DOS, which of the following indicates the ROOT directory
a. *
b. >
c. /
d. None of the above

8. In wildcard specification `?' is used as replacement for


a. one character
b. two character
c. three character
d. none of the above

9. With DOS, you may use the `*' and `?':


a. when changing the default settings
b. to represent unspecified characters in a filename
c. instead of wildcard characters
d. in the extension but not in the drive name or the file name

10. DOS system file consists of


a. IBMBIO.COM, IBMDOS.COM, COMMAND.COM
b. COMMAND.COM, IBMBIO.COM, FORMAT.COM
c. SYS.COM,IBMBIO.COM,IBMDOS.COM
d. None of the above

11. The batch file uses the extension


a. .BAT
b. .DOC
c. .PRG
d. .DOS

12. To display the list of all the file of the disk you would type
a. DIR
b. COPY
c. DIR FILES
d. DIR AUTOEXEC.BAT

13. State whether the following questions are True(T) or False(F).


a. Command.Com is hidden file.
b. Primary name of a file can be of 10 characters.
c. The command MKDIR and MD performs the same task.
d. Under DOS .EXE is not an executable file.
e. DIR command is used to see the content of a specific file.

Answers:
1 b. 2 b. 3 a. 4 b. 5b 6 c. 7 d. 8 a. 9 b. 10 a.
11 a 12 a..

13 True OR False
1. False 2. False 3. True 4. False 5. False

Database Management System and Design MCQ Set 4

Questions 1:
The relational database environment has all of the following components except
a. users
b. separate files
c. database
d. query languages
e. database

Question 2:
Database management systems are intended to
a. eliminate data redundancy
b. establish relationship among records in different files
c. manage file access
d. maintain data integrity
e. all of the above

Question 3:
One approach to standardization storing of data?
a. MIS
b. structured programming
c. CODASYL specification
d. none of the above

Question 4:
The language used application programs to request data from the DBMS is
referred to as the
a. DML
b. DDL
c. query language
d. any of the above
e. none of the above

Question 5:
The highest level in the hierarchy of data organization is called
a. data bank
b. data base
c. data file
d. data record

Question 6:
Choose the RDBMS which supports full fledged client server application development
a. dBase V
b. Oracle 7.1
c. FoxPro 2.1
d. Ingress

Question 7:
Report generators are used to
a. store data input by a user
b. retrieve information from files
c. answer queries
d. both b and c

Question 8:
A form defined
a. where data is placed on the screen
b. the width of each field
c. both a and b
d. none of the above

Question 9:
A top-to-bottom relationship among the items in a database is established by a
a. hierarchical schema
b. network schema
c. relational schema
d. all of the above

Question 10:
The management information system (MIS) structure with one main computer
system is called a
a. hierarchical MIS structure
b. distributed MIS structure
c. centralized MIS structure
d. decentralized MIS structure
Answers:
1.b 2.e 3.c 4.a 5.b 6. b 7.d 8.a 9.a 10.c

Database Management System and Design MCQ Set 3


Questions
Questions 1:
Which of the following is not true of the traditional approach to information processing
a. there is common sharing of data among the various applications
b. it is file oriented
c. programs are dependent on the file
d. it is inflexible
e. all of the above are true

Question 2:
Which of the following hardware component is the most important to the operation of database
management system?
a. high resolution video display
b. printer
c. high speed, large capacity disk
d. plotter
e. mouse

Question 3:
Generalized database management system do not retrieve data to meet routine request
a. true
b. false

Question 4:
Batch processing is appropriate if
a. large computer system is available
b. only a small computer system is avilbale
c. only a few transactions are involved
d. all of the above
e. none of the above

Question 5:
Large collection of files are called
a. fields
b. records
c. database
d. sectors

Question 6:
Which of the following is not a relational database?
a. dBase IV
b. 4th Dimension
c. FoxPro
d. Reflex

Question 7:
In order to use a record management system
a. you need to understand the low level details of how information is stored
b. you need to understand the model the record management system uses
c. bother a and b
d. none of the above
Question 8:
Sort/Report generators
a. are faster than index/report generators
b. require more disk space than indexed/report generators
c. do not need to sort before generating report
d. both a and b

Question 9:
If a piece of data is stored in two places in the database, then
a. storage space is wasted
b. changing the data in one spot will cause data inconsistency
c. in can be more easily accessed
d. both and b

Question 10:
An audit trail
a. is used to make backup copies
b. is the recorded history of operations performed on a file
c. can be used to restore lost information
d. none of the aobve

Answers:
1.a 2.c 3. b 4.e 5.c 6.d 7.b 8.b 9.d 10.b

1. ISDN stands for


a. Integral Service Dynamic Network
b. International Subscriber Dialup Network
c. International Service Digital Network
d. Integrated Service Digital Network
Answer: d. Integrated Service Digital Network
2. Stack consists of
a. Register
b. RAM
c. ROM
d. CPU
Answer: RAM
3. Microprogramming is designing of
a. Controll Unit
b.ALU
c. CPU
d. None of the above
Answer: a. Controll Unit
4. Minimum number of operands with any instruction
a.0
b.1
c. 8
d. 16
Answer: a.0
5. Which of the following medical activity was made possible by computers?
a. Open Heart Surgery
b. Vaccination
c. Brain scan
d. X Ray
Answer: C. Brain Scan
6. FTP is
a. Mail tranfer potocol
b. File Transfer Protocol
c. File Transformation Program
d. Firewall Type Program
Answer: b. File Transfer Protocol
7. Stored program concept was introduced by
a. Pascal
b. Hoolerith
c.Stallman
d. Newmann
Answer is d. Newmann
8. BSS loader is
a. General
b. Absolute
c. Relocating
d. None of the above
Answer is c. Relocating
9. Noise resistance is very low in the case of
a.AM
b.FM
c. PM
d. FSK
Answer is a. AM
10. The first Indian analog computer was implemented by Indian stastical Institute of Culcutta in
a. 1947
b. 1956
c. 1953
d. 1961
Answer is C. 1953
11. Which of the following is considered to be a popular coding scheme?
a. ASCII
b. EBCDIC
c. Unicode
d. All the above
Answer is D.all the above
12. Database software may be divided into
a. four distinct categories
b. three distinct categories
c. two distinct categories
d. none of the above
Answer is B.three distinct categories
13. A link may be defined as the representation of an
a. objects
b, application
c. program
d. none of the above
Answer isc. programme
14. DPI stands fot
a. Desktop projection Ink
b.Dot per Inch
c. Dotmatricks printer ink
d. Desktop pixel Inch
Answer is b.Dot per Inch
15. A string of eight 0s and 1s is called a:
a. megabyte.
b. byte.
c. kilobyte.
d. gigabyte.
Answer:b byte.
1. Which of the following device is used only in LAN (Local Area Network)?
A. Gateway B. Modem
C. NIC D. Router
Answer: C
2. Which program can be used for email?
A. Internet Explorer B. Outlook Express
C. NetMeeting D. FrontPage
Answer: B
3. Modulator-demodulator is a device that converts:
A. Digital signal into analog signal
B. Analog signal into digital signal
C. Both A and B
D. None of the above
Answer: C
4. ………… cable carries signals in the form of fluctuating light in a glass.
A. Coaxial B. Twisted pair
C. Two wire open line D. Fiber optics
Answer: D
5. _______ is used for scanning the pictures and putting them in digitized form in the computer.
A. CD-ROM B. Plotter
C. Bar-coder D. Scanner
Answer: D
6. Animator, 3D Studio, Corel Draw and Flash are………….
A. Word processors B. Spreadsheet packages
C. Multimedia S/W D. None of the above
Answer: C
7. Which statement is valid?
A. 1 KB = 8 bytes B. 1 MB = 8 KB
C. 1 KB = 1024 bytes D. 1 MB = 1024 bytes
Answer: C
8. Which device is used to process data?
A. CPU B. RAM
C. DCU D. VDU
Answer: A
9. Who is known as the father of Computer Science?
A. Charles Babbage B. Howard Aiken
C. Dr. Herman Hollerith D. Blaise Pascal
Answer: A
10. What is the capacity of a 3.5” Floppy Disk?
A. 360KB B. 720KB
C. 1.2MB D. 1.44MB
Answer: D
11. How many keys are there in XT Keyboard?
A. 83 B. 101
C. 103 D. 107
Answer: A
12. A Personal Computer (PC) is a …………….. Computer.
A. Super B. Main Frame
C. Mini D. Micro
Answer: D
13. What type of printers are Dot Matrix Printers?
A. Laser B. Inkjet
C. Impact D. Drum
Answer: C
14. Which is required for networking?
A. NIC B. cable
C. Computer D. all
Answer: D
15. What is the full form of RAM?
A. read access memory B. random access memory
C. rapid access memory D. none
Answer: B

1. Which of the following are trueregarding system programs and system


calls?

a) System programs can be thought of as bundles of usefulsystem calls.

b) system calls provide basic functionality to users so that users do not need
to write their own programs to solve common problems.

c) system calls can be defined by the user


1) a and b
2) a,b and c
3) a,b and d
4) Only b

Correct Answer: a and b [hide] Marks: 1

2. What is the main advantage of the layered approach to system


design?

a) the system is easier to debug and modify because changes affect


only limited sections of the system rather than touching all sections
of the operating system.

b) Information is kept only where it is needed and is accessible only


within a defined and restricted area, so any bugs affecting that data
must be limited to a specific module or layer.

c) microkernel approach helps increases the degree of


multiprogramming.
1) a,b,c
2) a,b
3) Only a
4) None
Correct
Marks:
Answer:
1
a,b [hide]
3. what are the services provided by an operating system.

a. Program execution.

b. I/O handling

c. File-system manipulation.

d. commmunications

e. error detection
1) a,b,c,d
2) b,c,d,e
3) a,b,c,d,e
4) b,c,e

Correct Answer: a,b,c,d,e [hide] Marks: 1

4. What are the main advantages of the microkernel approach to system


design?
(a) adding a new service does not require modifying the kernel

(b) it is more secure as more operations are done in user mode than in kernel
mode

(c) microkernel approach helps increases the degree of multiprogramming.

(d) a simpler kernel design and functionality typically results in a more


reliable operating system.
1) a,b,d
2) b,c,d
3) a,b,c,d
4) Only a

Correct Answer: a,b,d [hide] Marks: 1

5. some systems store the operating system in firmware, and others on disk?for
PDAs,cellular telephones etc a disk with a file system may be not be
available for the device.hence they are stored in firmaware.
1) True
2) False

Correct Answer: True [hide]

6. How could a system be designed to allow a choice of operating systems to boot from?
What would the bootstrap program need to do?
1) during boot-up, a special program (which we
will call the boot manager) will determine
which operating system to boot into.
2) the boot-strap loader will load the operating
system selected at the start-up.
3) only a
4) both a and b.

Correct Answer: only a [hide] Marks: 1

7. The following are the secondary storage media.


1) Magnetic tapes
2) Magnetic disks
3) Ram
4) None
Correct
Answer: Marks:
Magnetic 1
disks [hide]
8. Which of the following are Non volatile storage devices

a) Magnetic Tapes

b) Main memory

c) Optical disk

d) Secondary Memory
1) a and b
2) a,b and c
3) a,b and d
4) Only c

Correct Answer: a,b and d [hide] Marks: 1

9. Electronic disk, Main memory, Magnetic disk and Cache are volatile.
True/False
1) True
2) False

Correct Answer: False [hide] Marks: 1

10. ______: a secondary storage device, which holds data in bulk and it, holds
data in magnetic medium of the disk
1) Hard disc
2) Compact disc
3) RAM
4) CPU Registers

Correct Answer: Hard disc [hide]

1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.


A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex


inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s
tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database
all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead
of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:


A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100
nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A

11. ____________ is the science that attempts to produce machines that display the same type of
intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D

13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual
print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B

16. Computers use the ____________ language to process data.


A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D

18. In the binary language each letter of the alphabet, each number and each special character is
made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D

19. The term bit is short for:


A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C

20. A string of eight 0s and 1s is called a:


A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B

2. Main memory is
(a) Random Access Memory (b) Read only Memory
(c) Serial Access Memory (d) None of these
Ans (a)
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer (b) Quantum Computer
(c) Param-10,000 (d) IBM chips
Ans (b)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic (b) Optical (c) Electrical (d) Electromechanical
Ans (a)
5. Which of the following is not as language for computer programming?
(a) WINDOWS (b) PASCAL (c) BASIC
(d) COBOL (e) All of these
Ans (a)
6. What are the two basic types of memory that your computer uses?(
a) RAM (b) RW/RAM (c) ROM (d) ERAM (e) POST
Ans (a)
7. The term gigabyte refers to
(a) 1024 bytes (b) 1024 kilobytes (c) 1024 megabytes
(d) 1024 gigabytes (e) None of the above
Ans (c)
8. A computer with CPU speed around 100 million instructions per second & with the word length of
around 64 bits is known as
(a) Super computer (b) Mini computer (c) Micro computer
(d) Micro computer (e) None of the above
Ans (a)
9. What digits are representative of all binary numbers?
(a) 0 (b) 1 (c) Both (a ) and (b) (d) 3 (e) None of the above
Ans (c)
10. To locate a data items for storage is
(a) Field (b) Feed (c) Database
(d) Fetch (e) None of the above
Ans (d)
11. Off-line operation is the operation of devices without the control of
(a) Memory (b) CPU (c) ALU
(d) Control unit (e) None of the above
Ans (b)
12. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer (b) Dot-matrix printer
(c) Laser printer (d) Band printer (e) None of the above
Ans (d)
13. A software used to convert source program instructions to object instruction is known as
(a) Compiler (b) Assembler (c) Interpreter
(d) Language processor (e) None of the above

14. The 'IC' chip, used in computers, is made of


(a) Chromium (b) Iron oxide (c) Silica (d) Silicon
Ans (d)
15. Name the first general purpose electronic computer
Ans : UNIVAC
16. The size of commonly used Floppy disk is
(a) 4.5” (b) 3.5” (c) 3.25” (d) 5.5”
Ans (b)
17. Which of the following statement is wrong
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
Ans (b)
18. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) None of the above
Ans (c)
19. The term ‘Operating System’ means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
Ans (a)
20. Wild card operators specifies
(a) can be used when writing into multiple files
(b) allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
Ans (c)
21.Which one of the following is not a broadband communication medium
(a) Microwave (b) Fibre optic cable
(c) Twisted pair (d) Coaxial cable
Ans (c)
22.Which of the following performs modulation and demodulation
(a) Coaxial cable (b) Satellite (c) Modem (d) Optical fibre
Ans (c)
23. Which one of the following is not an application software package
(a) Redhat Linux (b) Microsoft Office
(c) Adobe PageMaker (d) Open Office
Ans (a)
24. Who is the father of computer
Ans : Charles Babbage
25.The function of key F4 is
Ans : To repeat the last action
26.The function of key F4 is
Ans : To repeat the last action
27. The 0 and 1 in the binary numbering system are called binary digits or .......
(a) bytes (b) kilobytes (c) decimal bytes (d) bits (e) nibbles
Ans (D)
28. A monitor's ...... is the distance between the holes in the mask behind the screen. This helps
determine how sharp the dots appear.
(a) refresh rate (b) dot pitch (c) resolution
(d) colour depth (e) None of the above
Ans (B)
29. A directly accessible appointment calendar is a feature of a ....... resident package.
(a) CPU (b) memory (c) Buffer (d) ALU (e) None of the above
Ans (B)
30. Perforated paper used as input or output media is known as
(a) Paper tape (b) Magnetic tape (c) Punched paper tape
(d) Card punch (e) None of the above
Ans (A)
31. The invention of the slide rule is attributed to
(a) Babbage (b) Oughtred (c) Pascal
(d) Napier (e) None of the above
Ans (B)
32. Which of the following is not an advantage of magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
(e) None of the above
Ans (e)
33. The memory sizes in mainframe computers and advanced technology micro computer are expressed
as
(a) Bytes (b) Kilo-bytes (c) Bits
(d) Megabytes (e) None of the above
Ans (d)
34. A prefix for billion which is equal to .... is called as billi.
(a) 100 (b) 10000 (c) 1000 (d) 10 (e) None of the above
Ans (d)
35. Each model of a computer has a unique
(a) Assembly language (b) Machine language
(c) High level language (d) All of the above
(e) None of the above
Ans (b)
36. One kilobyte = ____ byte.
(a) 1250 (b) 2088 (c) 1024 (d) 1000
Ans (c)
37. Which of the following circuit is used as a 'Memory device' in computers?
(a) Rectifier (b) Flip-Flop (c) Comparator (d) Attenuator
Ans (b)
38. To move the cursor to the end of the document press
Ans : Ctrl + End
39. In Word Processing the red underline indicates
Ans : Spelling mistakes
40. The shortcut key to print documents is
Ans : Ctrl + P
41. First layer in the OSI reference model is
(a) Data link (b) Network (c) Physical (d) Application
Ans (c)
42. Viruses, Trojan horses and Worms are
(a) able to harm computer system
(b) unable to detect if affected on computer
(c) user-friendly applications
(d) harmless applications resident on computer
Ans (a)
43. Program threats are
(a) Trap doors (b) Trojan horse (c) Both (a) & (b
Ans (b)
44. Failure of passwords security due to exposure can result from
(a) Electronic monitoring (b) Visual (c) Both (a) & (b)
Ans (c)
45. Data security threats include
(a) Hardware failure (b) Privacy invasion
(c) Fraudulent manipulation of data (d) All of the above
Ans (b)
46. The bar which displays information about the current page number is
Ans : Status bar
47. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar (b) Windows (c) Desktop (d) Icons
Ans (d)
48. Who invented the super-computer?
(a) P.T Farnsworth (b) J.R Whinfield
(c) J.H. Van Tassell (d) Charles Ginsberg
Ans (c)
49. Accessing records from a file directly without searching from the beginning of the file is
(a) Time sharing (b) Random
(c) Direct access (d) Access time (e) None of the above
Ans (c)
50. Time during which a job is processed by the computer is
(a) Delay time (b) Real time (c) Execution time
(d) Down time (e) None of the above
Ans (c)
Who is credited with the creation of WWW
Answer : Tim Berners-Lee

21. A ____________ is approximately one billion bytes.


A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C

22. A ____________ is approximately a million bytes.


A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A

24. The components that process data are located in the:


A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C

25. All of the following are examples of input devices EXCEPT a:


A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D

26. Which of the following is an example of an input device?


A. scanner
B. speaker
C. CD
D. printer
Answer: A

43. The computer code for interchange of information between terminals is


(a) ASCII (b) BCD (c) BCDIC (d) Hollerith
Ans (a)
44. ROM is composed of
(a) Magnetic cores (b) Micro-processors
(c) Photoelectric cells (d) Floppy disks
Ans (b)
45. Which of the following is true?
(a) Plotters are not available for microcomputer systems
(b) Micro-computer are not programmed like conventional computers
(c) Mini-computers are task-oriented
(d) The contents of ROM are easily changed
Ans (c)
46. Magnetic disk a medium known as
(a) Serial access (b) Direct access (c) Sequential access (d) Sequential and rotational access
Ans (b)
47. A dot-matrix printer
(a) is an input-output device (b) is an output device only
(c) is an input device only (d) None of these
Ans (b)
48.An octal number 237 is equal to the binary number
(a) 010 011 111 (b) 010 111 011
(c) 011 101 101 (d) 011 000 001
Ans (c)
49. A term associated with the comparison of processing speed is
(a) FFTS (b) MPG (c) MIPS (d) CPS
Ans (c)
50. The maximum size of a memory addressed by 12 bits is
(a) 1 K bytes (b) 16 K bytes (c) 32 K bytes (d) 4 K bytes
Ans (d)
1. Compiler is the
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)

1. If a computer on the network shares resources for others to use, it is called ____
a. Server
b. Client
c. Mainframe

Answer a

2. Terminators are used in ______ topology.


a. Bus
b. Star
Answer a

3. In _____ topology, if a computer’s network cable is broken, whole network goes down.
a. Bus
b. Star
Answer a

4. For large networks, _______ topology is used.


a. Bus
b. Star
c. Ring
Answer b
5. ISO stands for
a. International Standard Organization
b. International Student Organization
c. Integrated Services Organization
Answer a

11. _____________ allows LAN users to share computer programs and data.
a. Communication server
b. Print server
c. File server
Answer c

12. Print server uses ________ which is a buffer that holds data before it is send to the printer.
a. Queue
b. Spool
c. Node
Answer b

13. A standalone program that has been modified to work on a LAN by including concurrency
controls such as file and record locking is an example of____
a. LAN intrinsic software
b. LAN aware software
c. Groupware
d. LAN ignorant software
Answer a

14. The ______ portion of LAN management software restricts access, records user activities
and audit data etc.
a. Configuration management
b. Security management
c. Performance management
Answer b

15. What is the max cable length of STP?


a. 100 ft
b. 200 ft
c. 100 m
d. 200 m
Answer d

1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.


A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex


inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s
tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database
all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead
of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:


A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100
nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A

8-1. MICR stands for


A. Magnetic Ink Character Reader
B. Magnetic Ink Code Reader
C. Magnetic Ink Case Reader
D. None of the above

8-2. Which access method is used to access cassette tape?


A. Direct
B. Sequential
C. Both of the above
D. None of the above

8-3. EEPROM stands for


A. Electrically Erasable Programmable Read Only Memory
B. Electronic Erasable Programmable Read Only Memory
C. Easily Erasable Programmable Read Only Memory
D. Easily Erasable Programmable Read Only Memory

8-4. Which of the following memories need refresh?


A. SRAM
B. DRAM
C. ROM
D. All of the above

8-5. ASCII stands for


A. American Standard Code for Information Interchange
B. American Scientific Code for International Interchange
C. American Standard Code for Intelligence Interchange
D. American Scientific Code for Information Interchange

8-6. The output quality of a printer is measured by


A. Dot per sq. inch
B. Dot per inch
C. Dots printed per unit time
D. All of the above

8-7. Main storage is also called


A. Accumulator
B. Control Unit
C. Register Unit
D. Memory

8-8. Which is valid statement


A. 1 KB = 1024 Bytes
B. 1 MB = 1024 Bytes
C. 1 KB = 1000 Bytes
D. 1 MB = 1000 Bytes

8-9. After copying the content how many times can you paste?
A. 1
B. 16
C. 32
D. Many

8-10. 1 nibble equals to


A. 1 bits
B. 2 bits
C. 4 bits
D. 8 bits

Answers
1 – A / 2 – B / 3 – A / 4 – B / 5 – A / 6 – B / 7 – D / 8 – A / 9 – D / 10 – C

7-1. The Second Generation Computer was based on ________.


A. Vacuum Tube
B. Silicon Chips
C. Transistor
D. Bio Chips

7-2. The Third Generation Computer was made with ________.


A. Vacuum Tube
B. Discrete Components
C. IC
D. Bio Chips

7-3. The BIOS is the abbreviation of ________.


A. Basic Input Output System
B. Best Input Output System
C. Basic Input Output Symbol
D. Base Input Output System

7-4. What do you call a single point on a computer screen?


A. Cell
B. Element
C. Pixel
D. Bit

7-5. RJ45 UTP cable has ________ Cables.


A. 2 pair
B. 3 pair
C. 4 pair
D. 5 pair

7-6. Basic is ________ language.


A. a procedural
B. an object oriented
C. both A and B
D. none of the above

7-7. In ________ mode, the communication channel is used in both directions at the same time?
A. Full-duplex
B. Simplex
C. Half-duplex
D. None of the above

7-8. How was the generation of computer classified?


A. by the device used in memory & processor
B. by the speed of computer
C. by the model of the computer
D. by the accuracy of computer

7-9. Who invented Analytical engine?


A. Blaise Pascal
B. George Bool
C. Charles Babbage
D. Dr. Herman Hollerith

7-10. Through which device the main components of the computer communicate with each
other?
A. Keyboard
B. System Bus
C. Monitor
D. Memory

Answers
1 – C / 2 – C / 3 – A / 4 – C / 5 – C / 6 – A / 7 – A / 8 – A / 9 – C / 10 – B

3-1. Which device is used as the standard pointing device in a Graphical User Environment?
A. Keyboard
B. Mouse
C. Joystick
D. Track ball

3-2. Which number system is usually followed in a typical 32-bit computer?


A. 2
B. 10
C. 16
D. 32

3-3. Which number system is usually followed in a typical 32-bit computer?


A. Binary
B. Decimal
C. Hexadecimal
D. Octal

3-4. Which of the following is not an output device?


A. Scanner
B. Printer
C. Flat Screen
D. Touch Screen

3-5. Which of the following devices have a limitation that we can only store information to it but
cannot erase or modify it?
A. Floppy Disk
B. Hard Disk
C. Tape Drive
D. CDROM

3-6. Which technology is used in Compact disks?


A. Mechanical
B. Electrical
C. Electro Magnetic
D. Laser

3-7. Which of the following storage devices can store maximum amount of data?
A. Floppy Disk
B. Hard Disk
C. Compact Disk
D. Magneto Optic Disk

3-8. Which of the following is the largest manufacturer of Hard Disk Drives?
A. IBM
B. Seagate
C. Microsoft
D. 3M

3-9. The programs which are as permanent as hardware and stored in ROM is known as
A. Hardware
B. Software
C. Firmware
D. ROM ware

3-10. Memory is made up of


A. Set of wires
B. Set of circuits
C. Large number of cells
D. All of these

=============================

Answers
1 – B / 2 – A / 3 – A / 4 – D / 5 – D / 6 – D / 7 – B / 8 – B / 9 – C / 10 – C

11. Computers that are used to measure quantities, which change continuously such as heat, speed and
temperature are
a. Digital Computer b. Analog Computer
c. Hybrid Computer d. Portable Computer
Ans. b
12. Results of analog computers are reliable
a. less b. more
c. equally d. maximum
Ans. a
13. The speed of analog computer is than digital computer
a. lesser b. faster
c. same d. shortening
Ans. b
14. Analog computer are to operate
a. easy b. similar
c. difficult d. comfortable
Ans. c
15. Computes are becoming very important because of
a. high speed and accuracy b. versatility and automation
c. extensive memory and reliability d. all of the above
Ans. c
16. Computers observe some limitations as they have no
a. intelligence and feeling b. flexibility and emotions
c. easy portability and ethics d. all of the above
Ans. d
17. Computers can provide
a. logical decision and latest information b. solutions of problems and quality control
c. industrial and educational development d. all of the above
Ans. a
18. Computes can provide
a. entertainment and edutainment b. games and programs
c. Communication and transmission d. all of the above
Ans. a
19. Tangible or touchable parts of the compute are called
a. software b. hardware
c. system d. application
Ans. b
20. Intangible or untouchable parts of the compute are called
a. software b. hardware
c. system d. application
Ans. a
21. Devices which facilitates us to communicate with other computer system
a. Input Devices b. Output Devices
c. Communication Devices d. Storage Devices
Ans.
22. CPU stands for
a. Central Particular Unit b. Central Performing Unit
c. Central Processing Unit d. Central Procedural Unit
Ans. c
23. the brain of the compute is
a. Motherboard b. RAM
c. ROM d. CPU
Ans. d
24. the devices used to display the results of processing
a. Motherboard b. RAM
c. ROM d. Monitor
Ans. d
25. The devices used to store permanently all types of software, data, …
a. Hard Disk b. RAM
c. ROM d. Monitor
Ans. a
26. Moving the pointer of the mouse to position over an icon or any part of the screen is known as
a. pointing b. clicking
c. dragging d. double clicking
Ans. a
27. pressing and quickly releasing the left button of the mouse is called
a. Double Click b. Right Click
c. Up Click d. Left Click
Ans. d
28. pressing and quickly releasing the left button of the mouse for two times is called
a. Double Click b. Right Click
c. Up Click d. Left Click
Ans. a
29. pressing and quickly releasing the right button of the mouse is called
a. left click b. right click
c. drag d. drop
Ans. B

11. If you want to keep track of different editions of a document which features will you use?
A) Editions
B) Versions
C) Track Change
D) All of above

12. Background color or effects applied on a document is not visible in

A) Web layout view


B) Print Layout view
C) Reading View
D) Print Preview

13. What is a portion of a document in which you set certain page formatting options?

A) Page
B) Document
C) Section
D) Page Setup

14. Borders can be applied to

A) Cells
B) Paragraph
C) Text
D) All of above

15. Which of the following is not a type of page margin?

A) Left
B) Right
C) Center
D) Top
Answers
11-B, 12-D, 13-C, 14-D, 15-C,

Question: Register is a
Set of capacitors used to register input instructions in a digital computer
Set of paper tapes and cards put in a file
Temporary storage unit within the CPU having dedicated or general purpose use
part of the auxiliary memory
Answer: 3
Question: WAN means -
Wide Area Network
Wine Area Network
Woll Area Network
Wide Allen Network
Answer: 1
Question: MAN is a -
Cost
Company
Network
Country
Answer: 3
Question: Which of the following is the universal gate?
NAND-Gate
OR-Gate
AND-Gate
NOT-Gate
Answer: 1
Question: The translator program that converts source code in high level language into machine code
line by line is called -
Assembler
Compiler
Loader
Interpreter
Answer: 4
Question: When a CD (Compact Disc used in audio and Video system) is seen in sunlight, rainbow like
colours are seen. This can be explained on the basis of phenomenon of
reflection and diffraction
reflection and transmission
diffraction and transmission
refraction, diffraction and transmission
Answer: 4
Question: Pickup wrong definition
Off line - is a system peripheral equipment not controlled by CPU
Online - is system in which peripheral equipment is in direct contact with CPU
PL/I is the acronym Peripheral Listing /Index
Program or routine is a set sequence of instructions given to computer for problem solving
Answer: 3
Question: A computer programmer
enters data into computer
writes programs
changes flow chart into instructions
does total planning and thinking for a computer
Answer: 4
Question: Terminal is a
device used to give supply to a computer
Point at which data may leave or enter the computer
point where wires are interconnected
an input/output device
Answer: 2
Question: Errors in computer results could be due to
encoding of data
transmission of data
manipulation of data
all of the above
Answer: 4

Question: Transistors are associated with which computer system?


First generation
Fifth generation
Second generation
None of these
Answer: 3
Question: First generation computer systems used
Transistors
Vacuum tubes
Magnetic cores
Silicon chips
Answer: 2
Question: Which one of the following is a stored program machine?
Micro-processor
Calculator
Analog-computer
Micro-computer
Answer: 4
Question: Computers can be classified in which of the following hierarchical orders?
PC, Large, Super Micro, Super Computer
Super Micro, PC, Large, Super Computer
PC, Super Micro, Large, Super Computer
Large, Super Micro, Super Computer, PC
Answer: 3
Question: The unit of hardware, which an operator uses to monitor computer processing, is the
Card Reader
CPU
Line Printer
Console
Answer: 4
Question: The computer device primarily used to provide hard copy is the
CRT
Line Printer
Computer Console
Card Reader
Answer: 2

Question: Charles Babbage invented


ENIAC
Difference engine
Electronic computer
Punched card
Answer: 2
Question: Transistors are associated with which computer system?
First generation
Fifth generation
Second generation
None of these
Answer: 3
Question: First generation computer systems used
Transistors
Vacuum tubes
Magnetic cores
Silicon chips
Answer: 2
Question: Which one of the following is a stored program machine?
Micro-processor
Calculator
Analog-computer
Micro-computer
Answer: 4
Question: The brain of a computer is
CPU
CD
Floppy disc
Megabyte
Answer: 1
Question: The most widely used commercial programming computer language is
BASIC
COBOL
FORTRAN
PASCAL
Answer: 2
Question: Who was the inventor of mechanical calculator for adding numbers?
Charles Babbage
Peano
Newton
Pascal
Answer: 4
Question: Who wrote the book 'Computer Liberation and Dream Machine', the first book on personal
computers?
John McCarthy
Ted Nelson
Niklaus Wirth
Karl Capek
Answer: 2
Question: Which one of the following is not a programming language of a computer?
BASIC
FORTRAN
LASER
PASCAL
Answer: 3
Question: In computer language, one kilobyte equals
1000 bytes
1024 bytes
100 bytes
8 bytes
Answer: 2
Question: 'Foxpro' is
a medicine
a disease
a computer language
an animal
Answer: 3
Question: Which of the following floppy sizes exists?
5.25 inches
4.75 inches
6 inches
8 inches
Answer: 1
Question: A characteristic of card system is
slowness in processing data
using cards as records of transactions
needing a larger data staff
All of these
Answer: 4
Question: The daily processing of corrections to customer accounts best exemplifies the processing
mode of
batch processing
real-time processing
time-sharing
off-line processing
Answer: 1
Question: Which of the following terms could be used to describe the concurrent processing of
computer programs via CRTs, on one computer system?
Time sharing
On-line processing
Interactive processing
All of these
Answer: 4

8-1. MICR stands for


A. Magnetic Ink Character Reader
B. Magnetic Ink Code Reader
C. Magnetic Ink Case Reader
D. None of the above
8-2. Which access method is used to access cassette tape?
A. Direct
B. Sequential
C. Both of the above
D. None of the above
8-3. EEPROM stands for
A. Electrically Erasable Programmable Read Only Memory
B. Electronic Erasable Programmable Read Only Memory
C. Easily Erasable Programmable Read Only Memory
D. Easily Erasable Programmable Read Only Memory
8-4. Which of the following memories need refresh?
A. SRAM
B. DRAM
C. ROM
D. All of the above
8-5. ASCII stands for
A. American Standard Code for Information Interchange
B. American Scientific Code for International Interchange
C. American Standard Code for Intelligence Interchange
D. American Scientific Code for Information Interchange
Answers
1–A/2–B/3–A/4–B/5–A

8-6. The output quality of a printer is measured by


A. Dot per sq. inch
B. Dot per inch
C. Dots printed per unit time
D. All of the above
8-7. Main storage is also called
A. Accumulator
B. Control Unit
C. Register Unit
D. Memory
8-8. Which is valid statement
A. 1 KB = 1024 Bytes
B. 1 MB = 1024 Bytes
C. 1 KB = 1000 Bytes
D. 1 MB = 1000 Bytes
8-9. After copying the content how many times can you paste?
A. 1
B. 16
C. 32
D. Many
8-10. 1 nibble equals to
A. 1 bits
B. 2 bits
C. 4 bits
D. 8 bits

________________________________________
/ 6 – B / 7 – D / 8 – A / 9 – D / 10 – C

1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.


A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex


inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s
tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database
all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead
of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:


A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100
nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A

You might also like