Computer (Shaheen Acadmy)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 54

Academic test

Laser Printer and Ink Jet Printer are examples of……


A. Impact printer
B. Line printers
C. Drums printers
D. None of these
Answer: D
What can be used to deploy apps Package?
A. C#
B. C++
C. JavaScript
D. Visual Studio
Answer: D
Name the presentation technology that can be used with JavaScript.
A. C++
B. C#
C. JavaScript
D. Visual Basic
Answer: B
Function or a method which starts running based on the programming language
is called _______.
A. Keyword
B. Entry point
C. App model
D. Windows Store Apps
Answer: B
What is the output of the following program. #include void main() { int x = 1, y = 0,
z = 5; int a = x && y || z++; printf(“%d”,z); }
A. 6
B. 5
C. 0
D. Varies
Answer: A
What is the final value of j in the below code? #include int main() { int i = 0, j = 0;
if(i && (j = 1 + 10)) //do something; }
A. 0
B. 10
C. Depends on the compiler
D. Depends on the language standard
Answer: A
What is the output of the following program. #include void main() { int x = 5; if(x <
1) printf(“hello”); if(x == 5) printf(“hi”); else printf(“no”); }
A. hi
B. hello
C. no
D. None of the mentioned
Answer: A
MICR stands for
A. Magic In Character Redo
B. Magnetic Ink Character Recorder
C. Magnetic Ink Character Reader
D. None Of These
Answer: C
CPU consists of the following parts
A. Control unit and ALU
B. CU and Main memory
C. Main memory and ALU
D. Operating system and Main memory
Answer: A
A type of reader commonly used to read UPC code is
A. Bar-code reader
B. Optical-mark reader
C. Magnetic-ink reader
D. Both A and C
Answer: A
Caps Lock is a
A. Window key
B. Modifier key
C. Toggle key
D. Cursor control key
Answer: C
Which of the following device uses the parallel transmission
A. Mouse
B. Keyboard
C. Printer
D. Light Pen
Answer: C
DPI stands for
A. Dot Per Inch
B. Decimal Per Inch
C. Digit Per Inch
D. Data Per Inch
Answer: A
A small high speed memory insides CPU is
A. RAM
B. ROM
C. Cache
D. Register
Answer: D
The birthplace of the World Wide Web was
A. NASA
B. Pentagon
C. CERN
D. Microsoft
Answer: C
Ctrl + A is for
A. To Bold
B. To Save
C. To Select Whole Area
D. None of These
Answer: C
We can detect spelling and grammar error by
A. Press F7
B. Press Shift + F7
C. Press Alt + F7
D. None of These
Answer: A
Errors in a software program are referred to as
A. Viruses
B. Computer Fault
C. Bugs
D. None of These
Answer: C
The software that is used to create text-based documents are referred to as
A. DBMS
B. Suites
C. Spreadsheets
D. Word processors
Answer: D
Which of the following refers to too much electricity and may cause a voltage
surge
A. Anomaly
B. Shock
C. Spike
D. Virus
Answer: C
Which of the following refers to the rectangular area for displaying information
and running programs
A. Desktop
B. Dialog box
C. Menu
D. Window
Answer: D
Which is the most important/powerful computer in a typical network?
A. Network client
B. Network server
C. Desktop
D. Network station
Answer: B
The CPU comprises of Control, Memory and units…..
A. Output
B. Microprocessor
C. Arithmetic/Logic
D. ROM
Answer: C
To display the contents of a folder in Windows Explorer you should
A. Collapse it
B. Click on it
C. Name it
D. Give it a password
Answer: B
Which of the following uses a handheld operating system?
A. Supercomputer
B. Personal computer
C. Laptop
D. PDA
Answer: D
C in CPU denote……..
A. Central
B. Common
C. Convenient
D. Computer
Answer: A
A process is a _______.
A. single thread of execution.
B. program in the execution
C. program in the memory
D. task
Answer: (B)
The word processing feature that catches most random typographical errors and
misspellings is known as _____.
A. Grammar checker
B. Spell checker
C. Word checker
D. None of the these
Answer: (B)
What is smallest unit of the information?
A. A bit
B. A byte
C. A block
D. A nibble
Answer: (A)
What is the decimal equivalent of the binary number 10111?
A. 21
B. 39
C. 42
D. 23
Answer: (D)
What is the term for a temporary storage area that compensates for differences in
data rate and data flow between devices?
A. Buffer
B. Bus
C. Channel
D. Modem
Answer: (A)
How many color dots make up one color pixel on a screen?
A. 265
B. 16
C. 8
D. 3
Answer: (D)
Which of the following values is the correct value of this hexadecimal code
1F.01B?
A. 0065918
B. 32.0065918
C. 31.0065918
D. 30.0065918
Answer: (D)
How is the data stored on the diskette?
A. Ink
B. Laser bubbles
C. Magnetism
D. Circuits
Answer: (C)
Which of the following is the smallest visual element on a video monitor?
A. Character
B. Pixel
C. Byte
D. Bit
Answer: (B)
Which of the following natural element is the primary element in computer chips?
A. Silicon
B. Carbon
C. Iron
D. Uranium
Answer: (A)
Which of the following programs enables you to calculate numbers related to
rows and columns?
a. Window program
b. Spreadsheet program
c. Graphics program
d. Word program
Answer: (b)
Which of the following is a structured programming technique that graphically
represents the detailed steps required to solve a program?
a. Object-oriented programming
b. Pseudocode
c. Flowchart
d. Top-down design
Answer: (c)
Which of the following values is the correct value of this hexadecimal code
ABCDEF?
a. 11259375
b. 11259379
c. 11259312
d. 11257593
Answer: (c) 11259375
Which of the following is an output device?
a. Keyboard
b. Mouse
c. Light pen
d. VDU
Answer: (d)
Which of the following is an input device?
a. Plotter
b. Printer
c. VDU
d. Mouse
Answer: (d)
Which of the following is the extension of Notepad?
a. .txt
b. .xls
c. .ppt
d. .bmp
Answer: (a)
BIOS is used?
a. By operating system
b. By compiler
c. By interpreter
d. By application software
Answer: (a)
What is the mean of the Booting in the system?
a. Restarting computer
b. Install the program
c. To scan
d. To turn off
Answer: (a)
A computer is accurate, but if the result of a computation is false, what is the
main reason for it?
a. Power failure
b. The computer circuits
c. Incorrect data entry
d. Distraction
Answer: (c)
The central processing unit is located in the _____.
a. Hard disk
b. System unit
c. Memory unit
d. Monitor
Answer: (b)
Which one of the following groups contains graphical file extensions?
a. JPG, CPX, GCM
b. GIF, TCE, WMF
c. TCP, JPG, BMP
d. JPG, GIF, BMP
Answer: (d)
Which of the following is equal to a gigabyte?
a. 1024 bytes
b. 512 GB
c. 1024 megabytes
d. 1024 bits
Answer: (c)
How many bytes does 4 kilobytes represent?
a. 512
b. 1024
c. 4096
d. 8192
Answer: (c)
Which type of program acts as an intermediary between a user of a computer and
the computer hardware?
a. Operating system
b. User thread
c. Superuser thread
d. Application program
Answer: (a)
What kind of language can computer understand?
a. Normal language
b. Computer language
c. Assembly language
d. High-level language
Answer: (a)
Which of the following values is the correct value of this binary code 1011 and
1111?
a. 11 and 14
b. 12 and 15
c. 11 and 15
d. 12 and 14
Answer: (c)
Which of the following is not one of the internal components of a CPU?
a. Control sequencer
b. M-D-R
c. M-A-R
d. Floppy disk
Answer: (d)
What is the speed of computer measured in?
a. Nanoseconds
b. Kilo-seconds
c. Gigahertz
d. Megabytes
Answer: (c)
What is the full form of RAM?
a. Remote Access Memory
b. Random Access Memory
c. Remote Access Memory
d. Random Access Memory
Answer: (b)
What is the full form of DRAM?
a. Dynamic Remote Access Memory
b. Dynamic Random-Access Memory
c. Dependent Remote Access Memory
d. Dependent Random-Access Memory
Answer: (b)
Which one of the following software applications would be the most appropriate
for performing numerical and statistical calculations?
a. Database
b. Document processor
c. Graphics package
d. Spreadsheet
Answer: (d)
Which of the following is not considered hardware?
a. Operating system
b. CPU
c. Keyboard
d. Hard disk
Answer: (a)
Which of the following is exclusively a sequential access storage device?
a. Hard disk
b. Floppy disk
c. Magnetic tape
d. DVD
Answer: (c)
Akshat has created a story of ten pages, but only wants to print the first two
pages. Which printer command should he choose?
a. Print all
b. Print from 1 to 2
c. Page setup
d. Print Preview
Answer: (b)
What is the full form of SRAM?
a. Static Random-Access Memory
b. Static Remote-Access Memory
c. Setup Random-Access Memory
d. Setup Remote-Access Memory
Answer: (a)
What is the full form of USB?
a. Unshielded System Board
b. Universal System Board
c. Unidentified System Bus
d. Universal System Bus
Answer: (d)
Which one of the following is not a form of data storage media?
a. A database
b. Magnetic tape
c. Magnetic disc
d. Optical disc
Answer: (a)
What is five main components of a computer system?
a. CPU, CD-ROM, Mouse, Keyboard, Sound card
b. Memory, Video card, Monitor, Software, Hardware
c. Modem, Keyboard, Word Processor, Printer, Screen
d. CPU, Memory, System bus, Input, Output
Answer: (d)
Which of the following numbers is a binary number?
a. 1 and 2
b. 0 and 0.1
c. 2 and 0
d. 0 and 1
Answer: (d)
Which one of the following is the best fire extinguisher for IT equipment?
a. Dry powder
b. Bromo chloride
c. CO2
d. Water
Answer: (c)
Select the correct statement from the following statements.
a. MS-Excel creates workbooks, and each workbook may contain more work
sheets.
b. A worksheet in MS-Excel 2000 package has a maximum 0f 256 columns
and 65536 rows.
c. Columns are identified by a number and rows are identified by a letter.
d. Cells are identified by the column letter and the row number.
a. a, b, c
b. b, c, d
c. c, d, a
d. a, b, d
e. None of the these
Answer: (d)
Which of the following statement is correct regarding a template prepared by a
word processing package?
a. Any document can be saved as a template.
b. Default template is used when you create a new file.
c. Many templates contain text that gives one advice on how to use the
template.
d. Default settings are reflected by the normal document template and
cannot be overwritten.
Answer: (a)
Which of the following would be the correct description for WORM virus?
a. It infects the boot sector.
b. It propagates through the internet and e-mail.
c. It has no effect in increasing the internet traffic.
d. It alters the folder structure.
Answer: (b)
A hard disk drive can be directly connected to a PC via a _____.
a. SCSI interface
b. Parallel interface
c. WAN interface
d. USB interface
Answer: (a)
The use of the IC in a computer has ______.
a. Increased the amount of heating
b. Reduced the size and cost of computers
c. Reduced the peripheral devices to be used
d. Reduced the performance capacity of the computer
Answer: (b)
Consider the following path C:\Device\Module\Module 1. What is name of the file
in this path?
a. Device
b. Module
c. Module 1
d. C
Answer: (c)
What is the full form of SCSI?
a. Standard computer systems interface
b. Small computer systems interface
c. Super computer systems interface
d. Small computer standard interface
Answer: (b)
Which one of the following is not input device?
a. Keyboard
b. Mouse
c. Speaker
d. Scanner
Answer: (c)
Which one of the following is an example of the browser software?
a. Microsoft Word
b. Notepad
c. Internet navigator
d. Internet explorer
Answer: (d)
Which one of the following commands can be used to work on a file?
a. Ctrl + XY
b. Ctrl + 2
c. Ctrl + C
d. None of the these
Answer: (c)
What is the use of the computer port?
a. Download the file via the internet
b. To connect with other devices
c. To reduce the internet speed
d. None of the these
Answer: (b)
Which of the following device is used for gaming?
a. Speaker
b. Mouse
c. Joystick
d. None of the these
Answer: (c)
Which of the following command remove the paragraph formatting?
a. Ctrl + L
b. Copy
c. Open
d. Ctrl + Q
Answer: (d)
Which of the following memory cannot be directly accessed?
a. Primary memory
b. Secondary memory
c. RAM
d. DRAM
Answer: (b)
A spreadsheet is the best application for ____________.
a. Writing an information
b. Handling simple accounts
c. Producing a grid-referenced map
d. Keeping an inventory of equipment used
Answer: (b)
Which of the following is twice the size of A4 paper?
a. A2
b. A3
c. A5
d. A8
Answer: (b)
Which one of the following printers is suitable for printing sprocket-fed carbon
copies?
a. Normal printer
b. Solid Ink printer
c. Dot-matrix printer
d. Business Inkjet printer
Answer: (c)
The speed of a modern printer is generally measured in __________.
a. LPS
b. PPM
c. PPS
d. DPI
Answer: (b)
Which of the following statements is correct about the virus?
a. The virus is a small program that infects a large program in the user
system.
b. The virus is a file of the hacker.
c. The virus is an operating system that controls the entire OS.
d. None of the these
Answer: (a)
The term A: \ refers to ____.
a. Filename
b. Root directory
c. Hard disk
d. Subdirectory
Answer: (b)
Which of the following languages computer understand?
a. JAVA language
b. C language
c. Binary Language
d. Object language
Answer: (c)
The four bits are called ________.
a. Byte
b. Nibble
c. Octet
d. Bit
Answer: (b)
What is the full form of VDU?
a. Virtual Development User
b. Virtual Detection Unit
c. Visual Detection Unit
d. Visual Display Unit
Answer: (d)
Which of the following statement is correct about the PCI?
a. PCI is a hardware device.
b. PCI is software that is used to transfer the data.
c. PCI is an interface of the OS.
d. All of the these
Answer: (a)
What is the full form of the EEPROM?
a. Electrically Erasable Process Read-Only Memory
b. Electrically Erasable Programmable Read-Only Memory
c. Electrical Erase Program Read-Only Memory
d. Electron Erase Program Read-Only Memory
Answer: (b)
Which of the following is a non-volatile memory chip?
a. EEPROM
b. RAM
c. DRAM
d. SRAM
Answer: (a)
What is the binary value for the decimal value 44?
a. 101101
b. 110100
c. 101100
d. 111100
Answer: (c)
What is the decimal value for the octal value 1?
a. 1
b. 8
c. 10
d. 100
Answer: (a)
Which of the following shortcut key shows the properties of a file?
a. Alt + Ctrl
b. Alt + P
c. Alt + F3
d. Alt + Enter
Answer: (d)
Which of the following processor has a fixed length of instructions?
a. Main processor
b. COM
c. Dual Core
d. RISC
Answer: (d)
What is the full form of HLDA?
a. High-Level Data Application
b. High-Level Definition Application
c. Hold Link Data Application
d. HOLD Acknowledge
Answer: (d)
In which of the following, the second-generation computer was based?
a. Transistor
b. Electron tube
c. Electron ray
d. Vacuum tube
Answer: (a)
In which of the following computer-generation vacuum tubes were used?
a. First-generation
b. Second-generation
c. Third-generation
d. Fourth-generation
Answer: (a)
What is a single dot on a computer screen called?
a. Desktop
b. Color dot
c. Pixel
d. Screen dot
Answer: (c)
Which of the following commands cannot be used to work on a file?
a. Ctrl + Z
b. Ctrl + Y
c. Ctrl + I
d. None of the these
Answer: (d)
Which of the following language was used in first-generation computers?
a. Java
b. Python
c. Machine language
d. All of the these
Answer: (c)
Which of the following statement is correct about the URL?
a. URL is a software that connects to the internet
b. URL is the address of the web page
c. URL is the domain name
d. All of the these
Answer: (b)
Which one of the following parts is called the brain of the computer?
a. ALU
b. Monitor
c. UPS
d. CPU
Answer: (d)
The output, which consists of images, video, and sound, is described as
________.
a. ROM
b. RAM
c. Graphics of the system
d. Multimedia
Answer: (d)
Which of the following device is not a portable device?
a. DVD
b. Mobile phone
c. Pen drive
d. None of the these
Answer: (d)
Which of the following memory is non-volatile memory?
a. Secondary memory
b. Random memory
c. RAM
d. ROM
Answer: (d)
Which of the following memory is a volatile memory?
a. Secondary memory
b. Random memory
c. RAM
d. ROM
Answer: (c)
Which of the following address is generated by CPU?
a. Logical address
b. Physical address
c. Actual address
d. Simple address
Answer: (a)
The cache memory works between _______.
a. ROM and CPU
b. RAM and ROM
c. CPU and RAM
d. Random and secondary memory
Answer: (c)
What kind of file does the “BAK” extension refer to?
a. System file
b. Backup file
c. Boot file
d. Binary file
Answer: (b)
Which device contains a cathode ray tube?
a. Speaker
b. Mouse
c. Monitor
d. Keyboard
Answer: (c)
Which of the following memory is very fast memory in a computer?
a. Random-access memory
b. Random memory
c. Cache memory
d. Read-only memory
Answer: (c)
Which of the following type of devices is a computer microphone?
a. Output device
b. Speaker device
c. Input device
d. Keyboard device
Answer: (b)
What is the “.BAT” extension?
a. System file
b. Backup file
c. Storage file
d. None of the these
Answer: (a)
Which of the following device is used for both input and output?
a. Monitor
b. Speaker
c. Scanner
d. Modem
Answer: (d)
Which of the following device is a portable device?
a. Laptop
b. Computer Monitor
c. CPU
d. None of the these
Answer: (a)
Which of the following two memory is the main memory in a computer?
a. Primary memory and Secondary memory
b. RAM and ROM
c. Random memory and Sequential memory
d. Primary memory and Sequential memory
Answer: (b)
Which of the following statement is correct about the DVD?
a. DVD is an optical disk.
b. DVD is very costly.
c. It is not a portable device, i.e., it cannot be carried anywhere easily.
d. It has very poor video and sound quality.
Answer: (a)
Which of the following is associated with fuzzy logic?
a. Crisp set logic
b. Many-valued logic
c. Two-valued logic
d. Binary set logic
Answer: b)
The truth values of traditional set theory can be defined as _________ and that of
fuzzy logic is termed as _________.
a. Either 0 or 1, either 0 or 1.
b. Between 0 & 1, either 0 or 1.
c. Either 0 or 1, between 0 & 1.
d. Between 0 & 1, between 0 & 1.
Answer: c)
A Fuzzy logic is an extension to the Crisp set, which handles the Partial Truth.
a. True
b. False
Answer: a)
How many types of random variables are there in Fuzzy logic?
a. 2
b. 4
c. 1
d. 3
Answer: d)
Which of the following represents the values of set membership?
a. Degree of truth
b. Probabilities
c. Discrete set
d. Both a & b
Answer: b)
The probability density function is represented by
a. Continuous variable
b. Discrete variable
c. Probability distributions for Continuous variables
d. Probability distributions
Answer: c)
_________is used for probability theory sentences.
a. Logic
b. Extension of propositional logic
c. Conditional logic
d. None of the above
Answer: b)
Which of the following fuzzy operators are utilized in fuzzy set theory?
a. AND
b. OR
c. NOT
d. EX-OR
Answer: a), b) and c)
What is the name of the operator in fuzzy set theory, which is found to be
linguistic in nature?
a. Lingual Variable
b. Fuzz Variable
c. Hedges
d. None of the above
Answer: c) Hedges
Where can we use the Bayes rule?
a. To increase the complexity.
b. To decrease the complexity.
c. To solve queries
d. To answer the probabilistic query
Answer: d)
Which of the following is offered by the Bayesian network?
a. Partial description of the domain
b. A complete description of the domain
c. A complete description of the problem
d. None of the above
Answer: b)
_________ represents the fuzzy logic
a. IF-THEN rules
b. IF-THEN-ELSE rules
c. Both a & b
d. None of the above
Answer: a)
Uncertainty can be represented by _________
a. Entropy
b. Fuzzy logic
c. Probability
d. All of the above
Answer: d)
Name the algorithms that acquire from complex environments to generalize,
approximate and simplify solution logic.
a. Ecorithms
b. Fuzzy set
c. Fuzzy Relational DB
d. None of the above
Answer: b)
Which of the following condition can directly influence a variable by all the
others?
a. Fully connected
b. Local connected
c. Partially connected
d. None of the above
Answer: a)
A perceptron can be defined as _________
a. A double layer auto-associative neural network
b. A neural network with feedback
c. An auto-associative neural network
d. A single layer feed-forward neural network with pre-processing
Answer: d)
What is meant by an auto-associative neural network?
a. A neural network including feedback
b. A neural network containing no loops
c. A neural network having a single loop
d. A single layer feed-forward neural network containing feedback
Answer: a)
Which of the following is correct?
i. In contrast to conventional computers, neural networks have much higher
computational rates.
ii. Neural networks learn by example.
iii. III. Neural networks mimic the same way as that of the human brain
iv. All of the above
a. (ii) and (iii) are true
b. (i), (ii) and (iii) are true
c. None of the above
Answer: a)
Which of the following is correct for the neural network?
The training time is dependent on the size of the network
i.
Neural networks can be simulated on the conventional computers
ii.
III. Artificial neurons are identical in operation to a biological one
iii.
iv.All of the above
a. (ii) is true
b. (i) and (ii) are true
c. None of the above
Answer: A)
What are the advantages of neural networks over conventional computers?
i. Neural networks learn from examples
ii. They are more fault-tolerant
iii. III. They are well suited for real-time operation due to their high
computational rates
a. (i) and (ii) are correct
b. (i) and (iii) are correct
c. Only (i)
d. All of the above
Answer: d)
Backpropagation can be defined as _________
a. It is another name given to the curvy function in the perceptron.
b. It is the transmission of errors back through the network to adjust the
inputs.
c. It is the transmission of error back through the network to allow weights to
be adjusted so that the network can learn.
d. None of the above
Answer: c)
Which of the following is not the promise of an artificial neural network?
a. It can survive the failure of some nodes
b. It can handle noise
c. It can explain the result
d. It has inherent parallelism
Answer: c)
Having multiple perceptron can solve the XOR problem satisfactorily because
each perceptron can partition off a linear part of the space itself, and they can
then combine their results.
a. True – This works always, and these multiple perceptrons learn to classify
even complex problems.
b. False – Perceptron are mathematically incapable of solving linearly
inseparable functions, no matter what you do
c. True – Perceptron can do this but are unable to learn to do it – they have
to be explicitly hand-coded
d. False – Just having a single perceptron is enough
Answer: c)
Based on _________ membership function can be used to solve empirical
problems.
a. Knowledge
b. Learning
c. Examples
d. Experience
Answer: d)
A 3-input neuron is trained to output a 0 when the input is 110 and a 1 when the
input is 111. After generalization, the output will be 0, when and only when the
input is:
a. 000 or 110 or 011 or 101
b. 000 or 010 or 110 or 100
c. 100 or 111 or 101 or 001
d. 010 or 100 or 110 or 101
Answer: b)
A 4-input neuron has weights 1, 2, 3, and 4. The transfer function is linear, with
the constant of proportionality being equal to 2. The inputs are 4, 10, 5, and 20,
respectively. The output will be:
a. 76
b. 238
c. 123
d. 119
Answer: b)
A neuro software can be defined as:
a. A powerful and easy neural network
b. A software that is used to analyze neurons
c. Software utilized by a neurosurgeon
d. A software aimed to assist experts in the real world
Answer: a)
What is the name of the network, which includes backward links from the output
to the inputs as well as the hidden layers?
a. Perceptron
b. Self-organizing maps
c. Multi-layered perceptron
d. Recurrent neural network
Answer: d)
Which of the following is true for unsupervised learning?
a. Some specific output values are disclosed
b. Some specific output values aren’t disclosed
c. No relevant inputs value is specified
d. Both inputs as well outputs are specified
e. Neither inputs nor outputs are given
Answer: b)
What is involved in inductive learning?
a. Inconsistent Hypothesis
b. Consistent Hypothesis
a. Estimated Hypothesis
b. Irregular Hypothesis
c. Regular Hypothesis
Answer: b)
Which of the following statement is correct?
a. Not all formal languages are context-free
b. All formal languages are context-free
c. All formal languages are like natural language
d. Natural languages are context-oriented free
e. Natural language is normal
Answer: a)
Which of the following is incorrect?
a. The union and intersection of two context-free languages are context-free.
b. The reverse of context-free language is context-free, but its complement
does not need to be.
c. Every regular language is context-free as it can be easily explained by
regular grammar.
d. The intersection of a context-free language and a regular language is
always context-free.
e. The intersection of two context-free languages is context-free.
Answer: e)
Automated vehicle is an application of _________
a. Unsupervised learning
b. Supervised learning
c. Reinforcement learning
d. Active learning
Answer: b)
_________ is not counted in different learning method.
a. Analogy
b. Memorization
c. Introduction
d. Deduction
Answer: c)
Which of the following models are utilized for learning?
a. Neural networks
b. Decision trees
c. Propositional and FOL rules
d. All of the above
Answer: d)
Which of the following is the correct example of active learning?
a. Dust Cleaning Machine
b. News Recommender System
c. Automated Vehicle
d. None of the above
Answer: b)
Which of the following is termed exploratory learning?
a. Active learning
b. Supervised learning
c. Reinforcement learning
d. Unsupervised learning
Answer: d)
_________ helps in modifying the performance element, assisting in making a
better decision.
a. Learning element
b. Performance element
c. Changing element
d. None of the above
Answer: a)
Which of the following is considered while determining the nature of the learning
problem?
a. Problem
b. Feedback
c. Environment
d. All of the above
Answer: b)
Which of the following is chosen among the multiple consistent hypotheses?
a. Ockham razor
b. Learning element
c. Razor
d. None of the above
Answer: a)
Which of the following takes input as an object described by a set of attributes?
a. Graph
b. Decision graph
c. Tree
d. Decision tree
Answer: d)
A neural network can answer
a. For Loop questions
b. What-if questions
c. If-The-Else Analysis questions
d. None of the above
e. Hide Answer Workspace
Answer: b)
Feature of ANN in which ANN creates its own organization of representation of
information it receives during learning time is
a. Adaptive Learning
b. What-if analysis
c. Self-Organization
d. Supervised learning
Answer: c)
In artificial neural network, interconnected processing elements are termed as
_________
a. Weights
b. Nodes or neurons
c. Axon
d. Soma
Answer: b)
Each connection link in ANN is linked with ________ that contains statics about
the input signal.
a. Neurons
b. Activation function
c. Weights
d. Bias
Answer: c)
Artificial neurons are capable enough to model original neurons networks
similarly as they are found in the human brain
a. True
b. False
Answer: a)
Name the input function received by neurons, which is also known as the
neuron’s internal state.
a. Weight
b. Bias
c. Activation or neuron’s activity level
d. None of the above
Answer: c)
What is the name of the process that represents modified elements of the DNA?
a. Selection
b. Mutation
c. Recombination
d. None of the above
Answer: b)
Which of the following is the best representation of individual genes?
a. Coding
b. Conversion
c. Encoding
d. None of the above
Answer: c)
What is the name of the operator that is functioned on the population?
a. Recombination
b. Reproduction
c. Mutation
d. None of the above
Answer: b)
Name the selection method that is found to be less noisy.
a. Boltzmann solution
b. Remainder solution
c. Stochastic remainder solution
d. None of the above
Answer: c)
In how many steps does a crossover operator proceed?
a. 2
b. 3
c. 4
d. 5
Answer: b)
Which of the following best relate to reinforcement learning?
a. Error based learning
b. Backpropagation learning
c. Output-based learning
d. None of the above
Answer: c)
________ helps in converting a given bit pattern into another bit pattern by using
logical bit-wise operation.
a. Masking
b. Segregation
c. Conversion
d. Inversion
Answer: a)
The ________ causes all the bits in the first operand to shift to the left by the
number of positions indicated by the second operand.
a. Shift right
b. Shift left
c. Shift operator
d. None of the above
Answer: b)
Which of the following is not a specified method used for selecting the parents?
a. Tournament Selection
b. Steady-state
c. Elitism
d. Boltzmann selection
Answer: b)
________ deals with uncertainty problems with its own merits and demerits
a. Neuro-fuzzy
b. Neuro-genetic
c. Fuzzy-genetic
d. None
Answer: a)
What does FAM stand for?
a. Fuzzy Association Memory
b. Fuzzy Associative Memory
c. Fuzzy Assist Memory
d. None of the above
Answer: b)
Which of the following exhibits non-linear functions to any desired degree of
accuracy?
a. Neuro-fuzzy
b. Neuro-genetic
c. Fuzzy-genetic
d. None of the above
Answer: c)
Matrix crossover is also known as _________
a. One dimensional
b. Two dimensional
c. Three dimensional
d. None of the above
Answer: b)
Basics Computer Science MCQs
1. Mostly which of the following device is used to carry user files?

A. Floppy Disk
B. Hard Disk
C. RAM
D. CDROM

2. Which device is used to backup the data?

A. Floppy Disk
B. Tape
C. Network Drive.
D. All of the above

Answer: D

3. In order to play and hear sound on a computer, one needs:

A. a sound card and speakers


B. a microphone
C. all of them required
D. none of them required

Answer: A

4. Which of the following are the cheapest memory devices in terms of Cost/Bit?

A. Semiconductor memories
B. Magnetic Disks
C. Compact Disks
D. Magnetic Tapes

Answer: C

5. Which of the following are the best units of data on an external storage device?

A. Bits
B. Bytes
C. Hertz
D. Clock cycles

Answer: B

6. Which of the following have the fastest access time?

A. Semiconductor Memories
B. Magnetic Disks
C. Magnetic Tapes
D. Compact Disks

Answer: A

7. Which of the following is a read only memory storage device?

A. Floppy Disk
B. CDROM
C. Hard Disk
D. None of these

Answer: B

8. Which of the following is a programming language?

A. Lotus
B. Pascal
C. MS-Excel
D. Netscape

Answer: B

9. What is a compiler?

A. A compiler does a conversion line by line as the program is run

B. A compiler converts the whole of a higher level program code into machine code in one step

C. A compiler is a general purpose language providing very efficient execution

D. None of the above

Answer: B

10. What is an interpreter?

A. An interpreter does the conversion line by line as the program is run

B. An interpreter is the representation of the system being designed

C. An interpreter is a general purpose language providing very efficient execution

D. None of the above

Answer: B

11. When a key is pressed on the keyboard, which standard is used for converting the keystroke
into the corresponding bits?

A. ANSI
B. ASCII
C. EBCDIC
D. ISO
Answer: A

13. A Pixel is ………

A. A computer program that draws picture

B. A picture stored in secondary memory

C. The smallest resolvable part of a picture

D. None of these

Answer: C

14. Which device is used as the standard pointing device in a Graphical User Environment?

A. Keyboard
B. Mouse
C. Joystick
D. Track ball

Answer: B

15. Which number system is usually followed in a typical 32-bit computer?

A. 2
B. 10
C. 16
D. 32

Answer: A

16. Which number system is usually followed in a typical 32-bit computer?

A. Binary B. Decimal

C. Hexadecimal D. Octal
Answer: A

17. Which of the following is not an output device?

A. Scanner B. Printer

C. Flat Screen D. Touch Screen

Answer: D

18. Which of the following devices have a limitation that we can only store information to it but cannot
erase or modify it?

A. Floppy Disk
B. Hard Disk

C. Tape Drive
D. CDROM

Answer: D

19. Which technology is used in Compact disks?

A. Mechanical B. Electrical

C. Electro Magnetic D. Laser

Answer: D

20. Which of the following storage devices can store maximum amount of data?

A. Floppy Disk
B. Hard Disk
C. Compact Disk
D. Magneto Optic Disk

Answer: B

21. Which of the following is the largest manufacturer of Hard Disk Drives?

A. IBM
B. Seagate
C. Microsoft
D. 3M

Answer: B

22. The programs which are as permanent as hardware and stored in ROM is known as

A. Hardware
B. Software
C. Firmware
D. ROM ware

Answer: C

23. Memory unit is one part of

A. Input device B. Control unit

C. Output device D. Central Processing Unit

Answer: D

24.Who built the first Mechanical Calculator

A. Joseph Marie Jacquard B. John Mauchly

C. Blaise Pascal D. Howard Aiken

Answer: C
25. The earliest calculating devices are

A. Abacus B. Clock

C. Difference Engine D. None of these

Answer: A

26. Punched cards were first introduced by

A. Powers B. Pascal

C. Jacquard D. Herman Hollerith

Answer: D

27. Word length of a Personal Computer is ___

A. 4 bits B. 8 bits

C. 16 bits D. 64 bits

Answer: B

28. Cursor is a ____

A. Pixel B. Thin blinking line

C. Pointing device D. None of these

Answer: B

29. Operating system, editors, and debuggers comes under?

A. System Software B. Application Software


C. Utilities D. None of the above

Answer: A

30. Which device is required for the Internet connection?

A. Joystick B. Modem

C. CD Drive D. NIC Card

Answer: B

31. What does DMA stand for?

A. Distinct Memory Access B. Direct Memory Access

C. Direct Module Access D. Direct Memory Allocation

Answer: B

32. When did John Napier develop logarithm?

A. 1416 B. 1614

C. 1641 D. 1804

Answer: B

33. A normal CD-ROM usually can store up to __________data?

A. 680 KB B. 680 Bytes

C. 680 MB D. 680 GB

Answer: C
34. ATM stands for?

A. Automatic Talking Machine

B. Automatic Teller Machine

C. Analog Teller Machine

D. Automatic Ticketing Machine

Answer:B

35. The Second Generation Computer was based on ………….

A. Vacuum Tube B. Silicon Chips

C. Transistor D. Bio Chips

Answer: C

36. The Third Generation Computer was made with ………….

A. Vacuum Tube B. Discrete Components

C. IC D. Bio Chips

Answer: C

37. he BIOS is the abbreviation of ………….

A. Basic Input Output System B. Best Input Output System

C. Basic Input Output Symbol D. Base Input Output System

Answer: A
38. What do you call a single point on a computer screen

A. Cell B. Element

C. Pixel D. Bit

Answer: C

39. How was the generation of computer classified?

A. by the device used in memory & processor

B. by the speed of computer

C. by the model of the computer

D. by the accuracy of computer

Answer: A

40. Through which device the main components of the computer communicate with each other?

A. Keyboard B. System Bus

C. Monitor D. Memory

Answer: B

41. Which is a valid program to access the Internet?

A. Access B. Front Page

C. Windows Explorer D. Netscape

Answer: D
42. Which one is the Low Level Language?

A. Assembly B. Visual Basic

C. Java D. C++

Answer: A

43. Which is a volatile memory?

A. ROM B. BIOS

C. PROM D. RAM

Answer: D

44. The digital signals can be represented by

A. Binary Codes B. 0 and 1

C. High and Low D. all of the above

Answer: D

45. Which program can be used for email?

A. Internet Explorer B. Outlook Express

C. NetMeeting D. FrontPage

Answer: B

46. Modulator-demodulator is a device that converts:

A. Digital signal into analog signal


B. Analog signal into digital signal

C. Both A and B

D. None of the above

Answer: C

47. _______ is used for scanning the pictures and putting them in digitized form in the computer.

A. CD-ROM B. Plotter

C. Bar-coder D. Scanner

Answer: D

48. Animator, 3D Studio, Corel Draw and Flash are………….

A. Word processors B. Spreadsheet packages

C. Multimedia S/W D. None of the above

Answer: C

49. Which statement is valid?

A. 1 KB = 8 bytes B. 1 MB = 8 KB

C. 1 KB = 1024 bytes D. 1 MB = 1024 bytes

Answer: C

50. Which device is used to process data?

A. CPU B. RAM
C. DCU D. VDU

Answer: A

51. Who is known as the father of Computer Science?

A. Charles Babbage B. Howard Aiken

C. Dr. Herman Hollerith D. Blaise Pascal

Answer: A

52. What is the capacity of a 3.5” Floppy Disk?

A. 360KB B. 720KB

C. 1.2MB D. 1.44MB

Answer: D

53. A Personal Computer (PC) is a …………….. Computer.

A. Super B. Main Frame

C. Mini D. Micro

Answer: D

54. What type of printers are Dot Matrix Printers?

A. Laser B. Inkjet

C. Impact D. Drum

Answer: C
55. What is the full form of RAM?

A. Read Access Memory B. Random Access Memory

C. Rapid access Memory D. none

Answer: B –

Fundamental Questions of Computer- 2020


1. is a category of computer hardware.
(Input, Output, Storage, Processing, all of the above)
2. is an important component of microcomputer system.
(Kilobyte, Microprocessor, Megabyte, Byte, None of the above)
3. is not found in P.U.
(ALU, Control Unit, RAM, Processing Register)
4. is a type of impact printers. (Laser, Thermal, Dot-Matrix, Inkjet)
5. program design technique shows program logic. (Flow chart,
Logical Operation, Computer, None of the above)
6. is used as counter in BASIC programs. (A = A+1, A<1, A or 1,
None of the above)
7. characteristic is applied to the third generation of computers.
(Integrated Circuit, Transistor, Vacuum Tubes, All of the above)
8. The most important characteristic of ROM is .
(It performs mathematical calculation, it is volatile, it is non – volatile, None of the
above)
9. statement is used to transfer the control of program conditionally.
(GOTO, ON GOTO, END, All of the above)
10. Disk operating system is abbreviated as . (DOS, DS, OS, None of above)
11. is an example of integer data. (HASAN, D-143, 143, all of the
above)
12. High level languages were designed in . (Laboratory, Third generation,
Computers, New York)
13. is a high level language. (BASIC, BESIK, BACIK, BESIC)
14. Binary number system has .
(Ten digits (0,9), Three digits (-1,0,1), One digit (1), Two digits (0,1))
15. LET statement is .
(Optional statement, Assigning statement, Used for expression assignment, all of the
above)
16. DATA statement is .
(Executable statement, Non-executable statement, Optional statement, None of the
above)
17. BASIC stands for .
(Basic All-purpose Symbolic Instructon Code, Beginners Assembly Symbols Instruction
Code, Basic All Standards In COBOL, Beginners All-purpose Symbolic Instruction
Code)
18. When using READ statement, it must to provide .
(PRINT statement, RESTORE statement, INPUT statement, None of above)
19. ANSI stands for .
(All New Small Integration, A National Small Institute, American National Standard
Institute, None of the above)
20. Sign of exclamation is . (!, :, I, %)
21. The example of random access storage media is . (Floppy disk
drive, Hard disk drive, Tape unit, 51/4’’ floppy disk)
22. The type of memory whose contents can not be changed is .
(ROM, RAM, Cache, EAPROM)
23. The command to see the contents of a disk is .
(DIR, CD, MD, TYPE)
24. DISKCOPY command can format the destination disk . (Before
copying, after copying, can not format, format while copying)
25. TYPE command is used to .
(To see the contents of a file, Chage the type of a file, make a sub directory, Type a
file in the computer)
26. Each statement of BASIC must have a . (Function, Statement number,
Program name, File name)
27. The command to create a sub-directory is . (DIR, CD, MD, APPEND)
28. TAB () function is used to .
(Print, Display, Print and Display, None of the above)

MS Office MCQs
Types of software programs usually includes
1. application programs
2. replicate programs
3. mathematical operations
4. both a and b
ANS D
MCQ: Set of programs with full set of documentation is considered as
1. database packages
2. file package
3. software
4. software packages
ANS D
MCQ: Specialized program that allows users to utilize in specific application is classified
as
1. relative programs
2. application programs
3. relative programs
4. replicate programs
ANS B
MCQ: Programs used to control system performance are classified as
1. experimental programs
2. system programs
3. specialized program
4. organized programs
ANS B
MCQ: System programs examples includes
1. operating system of computer
2. trace program
3. compiler
4. all of above
ANS D
Program which is readily available to computer users as part of software package is
classified as
1. library program
2. program library
3. software library
4. directory library
ANS A
MCQ: Process to exit from computer by giving correct instructions such as ‘EXIT’ is
classified as
1. log in
2. process out
3. process in
4. log out
ANS D
MCQ: Set of software authorized to specific users is considered as
1. software library
2. program library
3. directory library
4. library package
ANS B
MCQ: Function of running and loading programs and usage of peripherals is function of
1. operating system
2. enquiry system
3. dump programs
4. function system
ANS A
MCQ: If program can cope data errors, program is called
1. robust
2. reliable
3. unreliable
4. stable functioning
ANS A
MCQ: Commercial organization specializing preparation and design of software
package is classified as
1. library house
2. software houses
3. program houses
4. directory houses
ANS B
MCQ: Programs are fully tested and documented properly before including it into
1. library
2. directory
3. package
4. database
ANS A
MCQ: Program which is used to produce pictures and text and to organize it in
newspaper is classified as
1. text publishing package
2. desktop publishing package
3. experimental package
4. organizing publishing package
ANS B
MCQ: Several programs run at same time and storage is shared especially in
1. microcomputers
2. mainframe computers
3. enquiry computers
4. dump computers
ANS B
MCQ: Program which exactly perform operations that manual says is classified as
1. unreliable
2. stable functioning
3. robust
4. reliable
ANS D
Special set of characters that computer associates with specific user identification is
classified as
1. password
2. identity code
3. enquiry code
4. dump code
ANS A
MCQ: System program which performs one simple task is classified as
1. utility programs
2. function program
3. compiling program
4. enquiry program
ANS A
MCQ: Record of programs recorded as they run is classified as
1. producing a log
2. producing enquiry
3. producing dump programs
1. producing system functions
ANS A
MCQ: Program provides users with grid of rows and columns is classified as
1. spreadsheet
2. column grid
3. rows grid
4. reliability grid
ANS A
MCQ: Program packages that allows program users to design data files and select
information are called
1. file management
2. file enquiry
3. database package
4. all of above
ANS D
Collection of useful working routines and programs and is only available to users with
authorization is classified as
1. directory library
2. library package
3. program library
4. software library
ANS C
MCQ: Programs written by programmer to help computer users are considered as
1. software
2. software packages
3. database packages
4. file package
ANS A
MCQ: Set of software is held central by
1. computer installation
2. computer software
3. library files
4. directory files
ANS A
MCQ: Program used to transfer contents onto a printer from VDU screen is classified as
1. utility dump
2. screen dump
3. function dump
4. enquiry dump
ANS B
MCQ: In microcomputers, operating system is usually stored on
1. random access memory
2. read only memory
3. permanent memory
4. temporary memory
ANS B
System software’s are supplied by the
1. text slots
2. payroll programmers
3. manufacturer
4. enquiry programmers
ANS C
MCQ: Slots in spreadsheet that can be copied to other slots are classified as
1. relative slots
2. replicate slots
3. complicate slots
4. column slots
ANS B
MCQ: Process of gaining access to a computer by giving correct user identification is
classified as
1. process in
2. log out
3. log in
4. process out
ANS C
MCQ: Typing of words on keyboard to drive program with help of
1. menu
2. command
3. function words
4. editor
ANS B
MCQ: Library program may comes from
1. computer manufacturer
2. within computer installation
3. software houses
4. all of above
ANS D
Program produces experimental results for biologist research is classified as
1. specialized program
2. systematic programs
3. organized programs
4. experimental programs
ANS A
MCQ: Number and name system uses to identify user is called
1. user identification
2. operating identification
3. system identification
4. temporary identification
ANS A
MCQ: Slots in spreadsheet whose formula is not exactly copied are classified as
1. complicate slots
2. column slots
3. relative slots
4. replicate slots
ANS C
MCQ: Application program example includes
1. payroll program
2. desktop program
3. publishing program
4. editing program
ANS A
MCQ: Process of checking software suitability for any particular application is classified
as
1. evaluation of software
2. checking of software
3. directory of software
4. database of software
ANS A
Software which controls general operations of computer system is classified as
1. dump programs
2. function system
3. operating system
4. enquiry system
ANS C
MCQ: Application program used with all documentation is considered
1. applications package
2. replicate programs
3. application programs
4. systems programs
ANS A
1. System software is classified into

1. Operating system
2. Language processor
3. Both (a) and (b)
4. None of these
ANS C
2. Which one of the following is not a type of a language processor?

1. Compiler
2. Interpreter
3. Application software
4. Assembler
ANS C
3. Which one of the following utilities is used to store duplicate or multiple copies of
important files?

1. Antivirus
2. Disk defragmenter
3. Compression utility
4. Backup utility
ANS D
4. Which one of the following software is developed according to the user
requirement?

1. Operating system
2. System software
3. Customized software
4. Language processor
ANS C
5. Which of the following language uses only numbers such as 0s and 1s?

1. First generation language


2. Second generation language
3. Third generation language
4. Fourth generation language
ANS A
6. The assembly language uses symbols instead of numbers which are known as

1. Compiler
2. Mnemonics
3. Interpreter
4. All of these
ANS B
1. The central processing unit (CPU) is often referred to as the “__________”
of a computer.
 Answer: brain
2. In programming, a ____________ is a named storage location that can
hold data.
Answer: variable

3. HTML stands for HyperText Markup ____________.
 Answer: Language
4. The process of finding and fixing errors in a program is known as
____________.
 Answer: debugging
5. The ____________ programming paradigm emphasizes the use of
objects and classes.
 Answer: object-oriented
6. RAM, or Random Access Memory, is a type of ____________ memory in
a computer.
 Answer: volatile
7. A network protocol used for secure communication over a computer
network is ____________.
 Answer: HTTPS
8. The acronym SQL stands for Structured Query ____________.
 Answer: Language
9. The process of converting a high-level programming language into
machine code is called ____________.
 Answer: compilation
10. JavaScript is commonly used for adding ____________ functionality to
web pages.
 Answer: interactive
11. An algorithm is a step-by-step procedure or ____________ for solving a
problem.
 Answer: formula
12. IP address is short for Internet ____________ address.
 Answer: Protocol
13. The process of keeping multiple copies of data synchronized is known as
data ____________.
 Answer: replication
14. A loop that continues to execute as long as a specified condition is true is
called a ____________ loop.
 Answer: while
15. The file extension for a Python source code file is ____________.
 Answer: .py
16. HTTP, the protocol used for transferring hypertext, stands for HyperText
Transfer ____________.
 Answer: Protocol
17. The process of hiding the implementation details of an object is known as
____________.
 Answer: encapsulation
18. A programming language known for its readability and simplicity is
____________.
 Answer: Python
19. The binary system uses ____________ digits, 0 and 1, to represent
information.
 Answer: two
20. HTML tags are enclosed in ____________ brackets.
 Answer: angle
21. The process of converting a source code file into machine code at runtime
is called ____________ compilation.
 Answer: just-in-time
22. In object-oriented programming, a blueprint for creating objects is called a
____________.
 Answer: class
23. A device that connects multiple computer networks together is called a
____________.
 Answer: router
24. The process of converting a string into its equivalent numeric value is
called ____________.
 Answer: parsing
25. CSS stands for Cascading Style ____________.
 Answer: Sheet
26. An if-else statement allows a program to make ____________ decisions based
on conditions.
 Answer: conditional
27. The primary function of an operating system is to manage ____________
resources.
 Answer: hardware
28. The process of transforming data into a secure format to prevent unauthorized
access is called ____________.
 Answer: encryption
29. In database management, a collection of related information is called a
____________.
 Answer: database
30. The process of verifying the identity of a user or system is known as
____________.
 Answer: authentication
31. In networking, IP stands for Internet ____________.
 Answer: Protocol
32. An array is a data structure that stores elements of the same ____________.
 Answer: type
33. The acronym URL stands for Uniform Resource ____________.
 Answer: Locator
34. A programming language commonly used for data analysis and machine learning
is ____________.
 Answer: R
35. The ____________ is responsible for executing instructions stored in a
computer’s memory.
 Answer: CPU
36. CSS3 introduces ____________ animations, allowing for smoother visual effects
on web pages.
 Answer: transition
37. In cybersecurity, a program designed to detect and prevent unauthorized access
is called an ____________.
 Answer: firewall
38. The process of converting a domain name into an IP address is known as
____________ resolution.
 Answer: DNS
39. Python is known for its emphasis on code ____________, making it easy to read
and write.
 Answer: readability
40. A programming language developed by Microsoft often used for web
development is ____________.
 Answer: C#
41. The process of arranging data in a specific order, such as ascending or
descending, is called ____________.
 Answer: sorting
42. The acronym API stands for Application Programming ____________.
 Answer: Interface
43. A programming language commonly used for building dynamic and interactive
web pages is ____________.
 Answer: JavaScript
44. In computer graphics, pixels are the smallest ____________ elements on a
display.
 Answer: graphical
45. A type of cyber attack where malicious software encrypts a user’s data and
demands a ransom is called ____________.
 Answer: ransomware
46. A programming language known for its versatility and use in system
programming is ____________.
 Answer: C
47. The process of copying files from a local computer to a remote server is known
as ____________.
 Answer: uploading
48. The concept of allowing different types of data to be used interchangeably is
known as ____________.
 Answer: polymorphism
49. A data structure that follows the Last In, First Out (LIFO) principle is a
____________.
 Answer: stack
50. The practice of concealing the complexity of a system by dividing it into smaller,
more manageable components is called ____________.
 Answer: abstraction

You might also like