Computer Science Past Papers MCQS Solved

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

Computer Subject Specialist 2017.

1. The network layer concerns with


a) bits b) frames c) packets d) none of the mentioned
Answer:c
2. Which one of the following is not a function of network layer?
a) routing b) inter-networking c) congestion control d) none of the
mentioned
Answere (d)
3. The 4 byte IP address consists of
a) network address b) host address c) both (a) and (b) d) none of the
mentioned
Answer:c
4. In virtual circuit network each packet contains
a) full source and destination address b) a short VC number c) both (a) and
(b) d) none of the mentioned
Answer:b
5. Which one of the following routing algorithm can be used for network
layer design?
a) shortest path algorithm b) distance vector routing c) link state routing d)
all of the mentioned

Answer:d

6. Two devices are in network if


a) a process in one device is able to exchange information with a process in
another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) none of the mentioned

Answer:a

7. In computer network nodes are


a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned

Answer:d

8. Communication channel is shared by all the machines on the network in


a) broadcast network
b) unicast network
c) multicast network
d) none of the mentioned

Answer:a

9. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) none of the mentioned

Answer:a

10. A ___ is a device that forwards packets between networks by processing


the routing information included in the packet.
a) bridge
b) firewall
c) router
d) all of the mentioned

Answer:c

11. A list of protocols used by a system, one protocol per layer, is called
a) protocol architecture
b) protocol stack
c) protocol suit
d) none of the mentioned
Answer:b
12. Network congestion occurs
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) none of the mentioned
Answer:a
13. Which one of the following extends a private network across public
networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer
Answer:b
14. Which module gives control of the CPU to the process selected by the
short-term scheduler?
a) dispatcher
b) interrupt
c) scheduler
d) none of the mentioned
View Answer
Answer:a
15. The processes that are residing in main memory and are ready and
waiting to execute are kept on a list called
a) job queue
b) ready queue
c) execution queue
d) process queue
Answer:b
16. The interval from the time of submission of a process to the time of
completion is termed as
a) waiting time
b) turnaround time
c) response time
d) throughput
Answer:b
17. Which scheduling algorithm allocates the CPU first to the process that
requests the CPU first?
a) first-come, first-served scheduling
b) shortest job scheduling
c) priority scheduling
d) none of the mentioned
Answer:a
18. In priority scheduling algorithm
a) CPU is allocated to the process with highest priority
b) CPU is allocated to the process with lowest priority
c) equal priority processes can not be scheduled
d) none of the mentioned
Answer:a
19. In priority scheduling algorithm, when a process arrives at the ready
queue, its priority is compared with the priority of
a) all process
b) currently running process
c) parent process
d) init process
Answer:b
20. Time quantum is defined in
a) shortest job scheduling algorithm
b) round robin scheduling algorithm
c) priority scheduling algorithm
d) multilevel queue scheduling algorithm
Answer:b
21. Process are classified into different groups in
a) shortest job scheduling algorithm
b) round robin scheduling algorithm
c) priority scheduling algorithm
d) multilevel queue scheduling algorithm
Answer:d
22. In multilevel feedback scheduling algorithm
a) a process can move to a different classified ready queue
b) classification of ready queue is permanent
c) processes are not classified into groups
d) none of the mentioned
Answer:a
23. Which one of the following can not be scheduled by the kernel?
a) kernel level thread
b) user level thread
c) process
d) none of the mentioned
Answer:b
1) What was originally called the “imitation game” by its creator?
[A] The Turing Test
[B] LISP
[C] The Logic Theorist
[D] Cybernet ics
Ans: A
2) In analyzing the compilation of PL/I program, the term “Lexical analysis” is
associated with
A.recognition of basic syntactic constructs through reductions.
B.recognition of basic elements and creation of uniform symbols
C.creation of more optional matrix.
D.use of macro processor to produce more optimal assembly code
Answer: B
3) Which is a permanent database in the general model of compiler?
A. Literal Table
B. Identifier Table
C. Terminal Table
D. Source code
E. None of the above
Answer: C
4) MSI stands for
[A] Medium Scale Integrated Circuits
[B] Medium System Integrated Circuits
[C] Medium Scale Intelligent Circuit
Ans: A
5) The main difference between JK and RS flip-flop is that?
[A] JK flip-flop does not need a clock pulse
[B] there is feedback in JK flip-flop
[C] JK flip-flop accepts both inputs as 1
[D] JK flip-flop is acronym of junction cathode multivibrator
Ans: C
6) Where does the DNS reply go to in a single HTTP redirect?
a. Browser
b. Client
c. Server
d. DNS Server
Ans: A
7) In MS-Access to Refresh the contents of a Lookup field (Lookup field: A field,
used on a form or
report in an Access database, that either displays a list of values retrieved from a
table or query, or
stores a static set of values.) list box or combo box
[A] F4 or ALT+DOWN ARROW [B] DOWN ARROW [C] PAGE DOWN [D] F9
Ans: D
8) Which of the following derivation a top-down parser use while parsing an
input string? The input is
assumed to be scanned in left to right order ?
[A] Leftmost derivation
[B] Leftmost derivation traced out in reverse [C] Rightmost derivation
[D] Rightmost derivation traced out in reverse
Ans: A
9) Routine is not loaded until it is called. All routines are kept on disk in a
relocatable load format. The
main program is loaded into memory & is executed. This type of loading is
called… ?
[A] Static loading [B] Dynamic loading [C] Dynamic linking [D] Overlays
Ans:C
10) Which logic family dissipates the minimum power?
A.DTL
B.TTL
C.ECL
D.CMOS
E.None of the above
Ans:D
11) If y ou will be displaying or printing y our document on another c omputer, y
ou’ll want to make sure
and selec t the _____________ option under the ‘Save’ tab.
A) Embed Fonts
B) Embed True Type Fonts
C) Save True Type Fonts
D) Save Fonts
Ans: B
12) The technology whereby part of the program is stored on disk and is brought
into memory for
execution as needed is called
(a) memory allocation
(b) virtual storage
(c) interrupts
(d) prioritized memory
Ans:B
13) Which one is a valid declaration of a boolean?
a) boolean b1 = 1;
b) boolean b2 = ‘false’;
c) boolean b3 = false;
d) boolean b4 = ‘true’
Answer: C
14) Weak AI is
a) the embodiment of human intellectual capabilities within a computer
b) a set of computer programs that produce output that would be considered to
reflect intelligence if it
were generated by humans
c) the study of mental faculties using mental models implemented on a
computer.
d) All of the mentioned
Answer: C
15) For each attribute of a relation, there is a set of permitted values, called the
________ of that
attribute.
a) Domain
b) Relation
c) Set
d) Schema
Answer: A
16) Which approach to speech recognition avoids the problem caused by the
differences in the way words
are pronounced according to context?
a) continuous speech recognition
b) connected word recognition
c) isolated word recognition
d) speaker-dependent recognition
Answer: C
17) What is a Y -Connector? ‘
(a) A’Y -Shaped splitter cable that divides a source input into two output signals.
(b) A Y -Shaped splitter connector that divides a source input into two output
signals.
(c) A Y -Shaped splitter card that divides’a source input into two output signal s.
(d) None of the above
Answer: B
18) To avoid the race condition, the number of processes that may be
simultaneously inside their critical
section is
[A] 8 [B] 1 [C] 16 [D] 0
Ans: B.
19) What will be the output of the following PHP code ?
1.<?php
2.if (!print“hi”)
3. if (print“hello”)
4.print“hi”;
5.?>
a) hi
b) hihellohi
c) hihi
d) no output
Ans: A
20) In a synchronous modem, the receive equalizer is known as
a. adaptive equalizer.
b. impairment equalizer.
c. statistical equalizer.
d. compromise equalizer.
Answer: A
21) Which table is a permanent database that has an entry for each terminal
symbol.
A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
E. None of the above
Answer: A
22) A datum that indicates some important state in the content of input or
output is
A)Sequence
B)Sentinel
C)SIO
D)Sibling
E)None of the above
Answer: B
23) The first digital computer built with IC chips was known as
e. IBM 8080
f. Apple – 1
g. IBM System / 360
h. VAX-10
Answer: g
24) After 3 calls of the c function bug() below, the values of i and j will be:
int j = 1;
bug()
{ Static int i = 0; int j = 0;
i++; j++;
return (i) ; }
(A) i=0, j=0 (B) i=3, j=3
(C) i=3, j=0 (D) i=3, j=1
Answer: D
25) The total number of comparisons in a bubble sort is ….
a) O(n logn)
b) O(2n)
c) O(n2)
d) O(n)
Ans: C
26) For a function of two variable, how many test cases will be generated by
robustness testing?
A)9
B)13
C)25
D)42
Ans: B
27) The term gigabyte refers to
a. 1024 bytes
b. 1024 kilobytes
c. 1024 megabytes
d. 1024 gigabyte
Answer: c
28) A monitor’s …… is the distanc e between the holes in the mask behind the sc
reen. This helps
determine how sharp the dots appear.
a) Refresh rate
b) Dot pitch
c) Resolution
d) Color depth
Answer: b
29) Time during which a job is processed by the computer is
a) Delay time
b) Real time
c) Execution time
d) Down time
Answer: Execution time
30) How can you access the font size tool on formatting toolbar?
A) Ctrl + S
B) Ctrl + Shift + S
C) Ctrl + P
D) Ctrl + Shift + P
Answer: D
31) If h is any hashing function and is used to hash n keys in to a table of size
m, where n<=m, the
expected number of collisions involving a particular key x is :
a) Less than 1
b) Less than n
c) Less than m
d) Less than n/2
Answer: A
32) Processors of all computers, whether micro, mini or mainframe must have
a. ALU
b. Primary Storage
c. Control unit
d. All of above
Answer: D
33) The concept of logarithm is defined indirectly by the definition of ……………
A .Exponential
B. Floor Function
C. Ceiling function
D. Monotonically increasing function
Answer: A
34) Which of the following statements is wrong ?
A. memory allocation is the time required for a gate to change its state
B. Noise immunity is the amount of noise which can be applied to the input of a
gate without causing
the gate to change state
C. Fan-in of a gate is always equal to fan-out of the same gate
D. Operating speed is the maximum frequency at which digital data can be appli
ed to a gat
Answer: C
35) To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch
Answer: D
36) A default catch block catches
A. all thrown objects
B. no thrown objects
C. any thrown object that has not been caught by an earlier catch blo ck
D. all thrown objects that have been caught by an earlier catch block
Answer: C
37) Batch processing is appropriate if
a. large computer system is available
b. only a small computer system is available
c. only a few transactions are involved
d. none of the above
Answer: D
38) What is auto negotiation?
a) a procedure by which two connected devices choose common transmission
parameters
b) a security algorithm
c) a routing algorithm
d) none of the mentioned
Answer: A
39) The famous Moore’s Law predicts __________
a. Exponential Decrease in number of Transistors in Integrated Circuit.
b. Exponential Decrease of Transistor Size in Integrated Circuit
c. Exponential Increase in Transistor Switching in Integrated Circuit
d. Exponential Increase in number of Transistors in Integrated Circuit.
Answer: D
40) The c ommand “gdb sanfoundy”
a) will start debugging for the file “sanfoundry” if the file is c ompiled with -g
option with GCC
b) will create executable for debugging
c ) will prov ide all errors present in the file “sanfoundry”
d) none of the mentioned
Answer: A
41) In which addressing mode, the effective address of the operand is generated
by adding a constant
value to the contents of register?
a)absolute mode
b)indirect mode
c)immediate mode
d)index mode
Answer: d
42) Number of possible post ordered trees with 3 nodes A,B,C is
A.16
B.12
C.6
D.14
Answer: C
43) What are the different types of real data type in C ?
A.float, double
B.short int, double, long int
C.float, double, long double
D.double, long int, float
Answer: C
44) Find the power dissipation in a circuit to whom voltage applied is 24 and
current passing is .25 ohm
a)3
b)6
c)8
d) 4
Answer: B
45) Which of the following has the least technichal knowledge
a) User
b)Programmer
c)consol operator
d)system analyst
Answer: a
46) Which command will be used to display file and directory names only,
without size, date, and time
information?
A: DIR/W
B. DIR A:
C. DIR/B
D. DIR/S
Answer : C
47) A standalone program that has been modified to work on a LAN by including
concurrency controls
such as file and record locking is an example of____ ?
a. Groupware
b. LAN ignorant software
c. LAN aware software
d. LAN intrinsic software
Answer: d
48) Default reasoning is another type of
a) Monotonic reasoning
b) Analogical reasoning
c) Bitonic reasoning
d) Non-monotonic reasoning
Answer: D
49) Each of data files has a _____ that describe the way the data is stored in the
file.
A.File structure
B.Records
C.Fields
D.Database…
E.None of the above
Ans:A
50) The processing, which normally consists of a small computer with o ne or
more peripheral devices,
connected via a high-speed line to the large control computer is known as
a)On-line processing
b)Remote-terminal processing
c)Batch mode processing
d)Intelligent terminal Processing…
e)None of the above
Ans:D
51) Speech recognition:
a)will never be used in industrial controls
b)is already widely used in industrial controls
c)will be used in more applications as the technology matures. …
d)All of the above
e)None of the above
Ans:c
52) Which technique enables the designer to mold and shape, rather than
construct on object using a
series of lines?
a)Solid modeling
b)Wire-frame modeling
c)Surface modeling…
d)FEM (Finite Element Modeling)
e)None of the above
Ans:a
53) How can you recreate the PTR record in your Windows 2000 DNS server fr
om you Windows 2000
client?
a)Run ipconfig /registerdns from the client
b)Run ipconfig all /registerdns from the DNS server
C)Start the DNS Dynamic service on your client computer …
d)Create a host file with the #DYNAMIC command on the client computer
E)none of above
Ans:A
54) A _____ is an outline of a process that keeps develop successful information
systems
A.System Development Life Cycle
B.CASE tool
C.Phased Conversion
D.Success Factors…
E.none of the above
Ans:A
55) The primary tool used in structured design is a:
A.structure chart
B.data-flow diagram
C.program flowchart
D.module…
E.None of the above
Ans:A
56) To arrive at a form which is suitable for implementation in some
programming language is the
purpose of
a) Structured Analysis (SA)
b) Structured Design (SD)
c) Detailed Design (DD)
d) None of the mentioned…
Ans: B
57) Which of the following actions an operator precedence parser may take to
recover from an error ?
A)Insert symbols onto the stack
B)Delete symbols from the stack
C)Insert or delete symbols from the input
D)All of the above…
Ans:D
58) The step-by-step instructions that solve a problem are called _____.
A.An algorithm
B.A list
C.A plan…
D.A sequential structure
E.None of the above
Ans:A
59) A self-relocating program is one whichcannot be made to execute in any
area of storage other than the
one designated for it at the time of its coding or translation.
B. consists of a program and relevant information for its relocation.
C. can itself performs the relocation of its address-sensitive portions….
D. All of the above
E. None of the above
Ans:C
60) Programming a robot by physically moving it through the trajectory you want
it to follow is called:
A.contact sensing control
B. continuous-path control
C. robot vision control…
D. pick-and-place control
E. None of the above
Ans:B
61) The probability that a single bit will be in error on a typical public telephone
line using 4800 bps
modem is 10 to the power -3. If no error detection mechanism is used, the
residual error rate for a
communication line using 9-bit frames is approximately equal to
A.0.003
B.0.009
C.0.991
D.0.999…
E.None of the above
Ans: B
62) Which of the following protocol is used for transferring electronic mail
messages from one machine to
another?
A. FTP
B. SNMP
C. SMTP
D. RPC…
Ans: C
63) An anticipated result from multiprogramming operations is:
A.reduced computer idle time
B.the handling of more jobs
C.better scheduling of work
D.All of the above…
E.None of the above
Ans:D
64) A table on the many side of a one to many or many to many relationship
must:
a) Be in Second Normal Form (2NF)
b) Be in Third Normal Form (3NF)
c) Have a single attribute key
d) Have a composite key …
Answer:d
65) Critical path of the PERT chart is:
a)path which takes the longest time to complete the project
b)the shortest path
c)both of the above
d)path which takes the shortest time to complete the project…
e)None of the above
Ans:A
66) Surgeons can perform delicate operations by manipulating devices through
computers instead of
manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting….
Ans: A

1) AX register is also known as:


(a) Accumulator
(b) Collector
(c) Distributor
(d) Counter
(e) None of these
(2) In the Base + Offset addressing, Offset address is also known as:
(a) Physical Address
(b) Logical Address
(c) Actual Address
(d) Instruction Address
(e) None of these
(3) The technique for allowing a unit to check the status of another independently function unit
is known as?
(a) Interrupt
(b) System call
(c) Polling
(d) Trape
(e) None of these
(4) The method for storing data temporarily such that the input-output of the same job is
overlapped with its own processing, is known as:
(a) Spooling
(b) Contention
(c) I/O wait
(d) Buffering
(e) None of these
(5) The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these
(6) _________ Scheduler deals with the decision as to whether to admit another new job to the
system.
(a) High Level
(b) Medium Level
(c) Low Level
(d) Short term
(e) None of these
7) When the process is in the states of Blocked Suspended or Ready Suspended, its relevant data
is
stored in:
(a) Main Memory
(b) Hard Disk
(c) Magnetic Tape
(d) Buffer
(e) None of these
(8) Priority, P = (Time Waiting + Run Time) / Run Time is used to calculate priority in __________
scheduling algorithm:
(a) Shortest Job First
(b) Priority Scheduling
(c) Longest Wait First
(d) Highest Response Ratio Next
(e) None of these
(9) HDLC Protocol stands for:
(a) High-Level Data Link Control
(b) High Level Development Protocol
(c) Huge Level Data Link Control
(d) High Development Level Control
(e) None of these
(10) _________ is the generic name for a set of standards issued by the International
CommunicationsStandards Body CCITT, designed to support Message Handling Systems; i.e.
Electronic Mail.
(a) TCP/IP
(b) ISDN
(c) X.400
(d) X.25
(e) None of these
(11) ________ layer is responsible for the transfer of a packet of data along one link in the
network. It organizes data into frames and detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these
(12) Encryption is the conversion of data in some intelligible format into an unintelligible format
called _________ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these
(13) Binary search requires about ______ comparisons with an initial list of 1,000,000 elements.
(a) 10
(b) 20
(c) 35
(d) 100
(e) None of these
(14) A _________ header list is a header list where the last node contains the null pointer.
(a) Grounded
(b) Circular
(c) One way
(d) Rooted
(e) None of these
(15) ________ are small applications that are accessed on an internet server, transported over
the internet, automatically installed and run as part of a web document.
(a) Applets
(b) Java Bean
(c) Sockets
(d) Java Component
(e) None of these
(16) AWT stands for:
(a) Abstract Window Technique
(b) Abstract Window Toolkit
(c) Actual Window Technique
(d) Added Window Toolkit
(e) None of these
17) GIF images can have only upto _______ colors.
(a) 128
(b) 256
(c) 512
(d) 1024
(e) None of these
(18) ________ is stored on a client and contains state information of the website visited.
(a) Cookies
(b) Servelet
(c) History
(d) Resident Page
(e) None of these
(19) In software Engineering KPA denotes.
(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these
(20) The ________ Process Model defines a series of events that will trigger transitions from
state to state for each of software engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these
21. Which of the following best describes “virtual memory?”
(a)A portion of the hard disk considered as RAM
(b)Extended memory on the secondary storage thatis used whenever physical memory is full
(c)The abstraction of separating logical memory–memory as seen by the process–from physical
memory–memory as seen by the processor
(d)It is the page file in Windows folder (e)None of these
22. The ‘cmp’ instruction modifies the:
(a)Instruction register (b)Flags register (c)Segment register (d)None of these
23. Consider the following page reference string: 1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2, 1
Assuming there
are 4 page frames available and that all frames are initially empty, what is the total number of
page
faults that would occur for the page reference string above if the least-recently-used (LRU)
replacement
policy is used?
(a)6 (b)9 (c)10 (d)11 (e)None of these
24. The Banker’s algorithm is used to ____________.
(a)Rectify deadlock (b)Detect deadlock (c)Prevent deadlock
(d)Avoid deadlock (e)None of these
25. The necessary conditions needed before deadlock can occur are ______.
(a) No Mutual Exclusion, Hold and wait, Preemption, Circular Wait
(b) Mutual Exclusion, No Hold and wait, Preemption, Circular Wait
(c) Mutual Exclusion, Hold and wait, No Preemption, Circular Wait
(d) Mutual Exclusion, Hold and wait, Preemption, No Circular Wait (e)None of these
26. Difference between data link layer and transport layer error detection is that:
(a)Data link detects transmission errors while transport layer detects segmentation faults
(b)Data link detects node‐to‐node errors while transport layer detects end‐to‐end errors
(c)Data link detects end‐to‐end errors while transport layer detects node‐to‐node errors
(d)Data link detects segmentation errors while transport layer detects bit error (e)None of
these
27. Phase shift keying (PSK.) method is used to modulate digital signals at 9600 bps using 16 lev
els. The
line signals speed (i.e. modulation rate) will be:
(a) 1200 bands (b) 2400 bands (c) 4800 bands (d) 9600 bands (e)None of these
28. Exception handling is a powerful technique that separates error-handling code from ______
code.
(a)Buggy (b)Faulty (c)Normal (d)Exceptional (e)None of these
29. When a subroutine is called, the address of the instruction following the CALL instructions
stored in/on
the:
(a)Stack pointer (b)Accumulator (c)Program counter (d)Stack (e)None of these
30. Binary tree “preorder” traversal isdefined recursively as follows:
(a)Traverse left subtree, visit th
e root, traverse right subtree
(b)Traverse right subtree, visit the root, traverse left subtree
(c)Visit the root, traverse leftsubtree, traverse right subtree
(d)Traverse left subtree, traverse right subtree , visit the root (e)None of these
31. The advantages of creating a prototype are:
(a) It allows developers to experiment with number of different design options
(b) It can serve as means of communication between developers and customers
(c) It is better than water fall model (d) Both (a) and (b) (e)None of these
32. Choose the correct statement.
(a) Testing can show the presence of bugs but never their absence
(b) Testing can always find all the bugs
(c) Testing can always be exhaustive
(d) If we test enough then we can find all of the bugs (e)None of these
33. Which of the following operations need the participating relations to be union compatible?
(a) UNION (b)INTERSECTION (c)DIFFERENCE (d)All of these (e)None of these
34. The language used in application programs to requestdata from the DBMS isreferred to as
the:
(a)DML (b)DDL (c)VDL (d)SDL (e)None of these
35. What is the correct XHTML for a paragraph?
(a)
(b)
(c) (d)
(e)None of these
36. Which of the following HTML form method is suitable when you need to send larger form
submissions?
(a) Get (b) Post (c) Both Get and Post (d) Ajax (e)None of these
37. (2,4) is a point on a circle that has center at the origin. Which of the following points are
also on circle?
(a) (2,-4) (b) (-2,4) (c) (4,-2) (d) All of above (e)None of these
38. In Bresenham’s algorithm, while generating a circle , it is easy to generate?
(a) One octant first and other by successive reflection
(b) One octant first and other by successive rotation
(c) One octant first and other by successive translation
(d) All octants (e)None of these
(39) Object (also called ____) is a common data type that includes photograph, audio, video, or
a
document created in other applications.
(a) Number (b) BLOB (c) Integer (d) Binary (e) None of these
(40) In a database, a(n) ____ is a group of related fields.
(a) Table (b) Key (c) Record (d) Primary Field (e) None of these
(41) In a database, a(n) ____ field is a field that uniquely identifies each record in a file.
(a) Main (b) Identifying (c) Master (d) Key (e) None of these
(42) If the lowest annual fee at a discount warehouse is Rs.2025 and the highest is Rs. 5550, a(n)
____
on the Annual Fee field ensures it is a value between Rs. 2025 and Rs. 5550.
(a) Range Check (b) Completeness Check (c) consistency check
(d) alphabetic/numeric check (e) None of these
(43) A DBMS uses the ____ to perform validation checks.
(a) Data Server (b) data mart (c) data warehouse (d) data dictionary
(e) None of these
(44) _______ is a network technology that defines how messages are routed from one end of a
network to the other, ensuring the data arrives correctly by dividing it into packets.
(a) HTML (b) XML (c) HTTP (d) TCP/IP (e) None of these
(45) When a computer sends data over the Internet, the data is divided into small pieces, or
____.
(a) Bundles (b) Packets (c) Slices (d) Baskets (e) None of these
47) The amount of data, instructions, and information that can travel over a communications
channel
sometimes is called the ____.
(a) Broadband (b) Baseband (c) Latency (d) Bandwidth (e) None of these
(48) Fiber-optic cables have all of the following advantages over cables that use wire
except____.
(a) lower costs and easier installation and modification
(b) faster data transmission and smaller size
(c) less susceptible to noise from other devices
(d) better security for signals during transmission
(e) None of these
(49) A _________ is a network that connects computers and devices in a limited geographical
area,
such as a home, school computer laboratory, or office building.
(a) local area network (LAN) (b) metropolitan area network (MAN)
(c) wide area network (WAN) (d) variable area network (VAN) (e) None of these
(50) With ____ memory, the operating system allocates a portion of a storage medium, usually
the
hard disk, to function as additional RAM.
(a) Virtual (b) Performance (c) Device (d) Managed (e) None of these

Bit means Binary Digit


• 1 byte = 8 bits
• 1 mega byte = 1048576 bytes
• 1 kilo byte = 1024 bytes
• A combination of 16 bits are called word.
• A terabyte = 1 trillion bytes
• Our PC belongs to 4th generation
• Fred Cohen coined the word computer virus
• First computer virus was created in 1970 at Bell laboratories
• WORM means Write Once Read Many
• Power of a super computer is measured in FLOPS (Floating Point Operations per Second)
• WWW/http: (hypertext transfer protocol) was created by Tim Burner Lee in 1992
• Intel means Integrated Electronics
• 1 worksheet contains 256 columns
• G.W.Basic G.W stands for Gate Way
• Super Computer was created by J.H.Van Tassel
• CORBA is Common Object Request Broker Architecture
• URL is Uniform or Universal Resource Locator
• Intel invented RAM chip
• Information stored on disk as series of bumps on its shiny side.
• DVDs hold more information than CDs. They use smaller bumps and have two reflective layers
• Recordable CDs do not have bumps. There are patches of color on disk to change the reflected
laser light
• In 1951 Univac – 1, the world’s first commercial computer was designed by John Mauchly and J.
Presper Eckert. They built ENIAC, the first electronic computer in 1946
• In 1968 mainframe was built.
• In 1976 first supercomputer the Cray-1 was developed
• In 1981 IBM produce the IBM PC.
• In 1998 IBM made quantum computer
• Super computers uses parallel processing
• In 1974, computer games were introduced.
• PROM is the abbreviation of programmable read only memory

• What was the world’s first high level programming language 1957: IBM FORTRAN
• A JPEG is a picture file format – what does JPEG stand for: Joint Photographic Experts Group
• During World War II, IBM built the computers the Nazis used to manage their death/concentration
camps
• Registers are temporary storage areas within the CPU.
• First apple computer was built in garage.
• The language of small talk is object oriented.
• Shell is an operating environment.
• Virtual memory is also known as virtual page.
• NOS refer to operating systems for a network.
• In EBCDIC each character is denoted by 8 bits.
• Diodes are used in analog computer circuits as limiter.
• Wetware stands for any organic intelligence.
• GIGO stands for garbage in garbage out.
• Application of flip-flap are counters, shift register and transfer register.
• Bootstrap is associated with computer.
• FORTRAN stands for formula translator.
• A group of character that is termed as a single entity is called word.
• Clip art is a computer prepared art.
• Mark sensing is another term for OMR.
• Authorization to make multiple software copies is called site licensing.
• Antivirus is also known as vaccines.
• Free software is also known as public domain software.
• In computer DFD stands for Data Flow Diagram.
• Cyber Space is called to Virtual world of the computer.
• What does the sun in SUN Microsystems stand for Stanford University Network
• What does Intel stand for- Integrated Electronics
• All PCs have a BIOS what does bios stand for-Basic Input Output System
• What is the common name for an integrated circuit A Chip
• In WWW terms what does i.e. mean on a domain name-Ireland
• What company introduced the first commercial minicomputer 65 DEC
• Name the first web browser publicly available NCSA Mosaic
• The world’s most powerful super computer is called ASCI white.
• World Wide Web was invented in 1993 by Tim Bareness Lee.
• The B-programming language was developed by Ken Thompson.
• The 1st commercially produced and sold computer (1951) was UNIVAC.
• The transformation from heavy computers to PCs was made possible using microprocessors.
• The first microprocessor was developed in 1971 by Intel.
• A pentium 4 (P-4) employs roughly 40 million transistors.
• Mark-1, Apple-1, and collossus were initial desktop computers.
• Binary digits are briefed as bit.
• A collection of bits is called byte.
• The first home computer (1977), which was sold in millions of units was Apple II.
• ‘PARAM’ is a supercomputer.
• Father of the Computer.. Charles Babbage
• What does CMOS stand for in a computer- Complementary metal Oxide semi-conductor

You might also like