Search This Blog

Showing posts with label PRACTICE QUESTIONS. Show all posts
Showing posts with label PRACTICE QUESTIONS. Show all posts

Wednesday, September 19, 2012

COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1. Which of the following is most essential for effective multimedia presentations incorporates user participation or ....
1) Links
2) Buttons
3) Interactivity
4) Integration
5) None

2. Most of the websites have moving graphics, which are called as:
1) animations
2) vectors
3) links
4) morphs
5) None

3. Which of the following is the term used to enlarge a window to its maximum area so that it fills the entire desktop?
1) Maximize
2) Zoom
3) Enlarge
4) Extend
5) None of these

4. Microsoft Windows and Apple Mac are widely used Operating systems in today's world. Which of the following feature makes them so popular?
1) Multitasking Capacity
2) Calligraphy
3) User-friendly GUI
4) Being Inexpensive
5) None of these

5. Physical components of a computer are called:
1) Hardware
2) Software
3) Viruses
4) Internet
5) None of these

6. Which of the following is an object oriented feature:
1) Structured Programming
2) Multi-Tasking
3) Linking
4) Inheritance
5) None of these

7. In Windows XP, which of the following views is the best to see the file size and modified dates of all files in a folder.
1) List
2) Icon
3) Thumbnails
4) Details
5) None of these

8. Which of the following keys is used to remove a character on the right of the cursor
in a word document?
1) Home
2) End
3) Delete
4) Backspace
5) None of these




9. During the boot process, which of the following looks for the system files?
1) CD
2) BIOS
3) CPU
4) DVD
5) None of these

10. DNS is the abbreviation of:
1) Domain Name Service
2) Domain Name System
3) Direct Network Service
4) Direct Network System
5) None of these

11. File transfer protocol is used for:
1) Transferring email
2) Uploading files
3) Downloading files
4) Both 1 and 2
5) Both 2 and 3

12. Which of the following keys is used in combination with another key to perform a specific task?
1) Function
2) Space Bar
3) Del
4) Alt
5) Arrow

13. Which of the following command is used to start MS Word from the Run command
in the Start Menu?
1) Msword
2) Winword
3) Winms
4) Worddoc
5) None of these

14. Windows Explorer is a .........
1) Personal Computer
2) Drive
3) Browser
4) Network
5) File manager

15. Which of the following shows all the websites and pages that are already visited
over a period of time?
1) Status Bar
2) Task Bar
3) History List
4) Tool Bar
5) None

16. A Web browser is an example of:
1) Open Source Software
2) Horizontal Market Software
3) Vertical Market Software
4) Firmware
5) None of these

17. Hyperlink in a web document usually appears:
1) Bold and Coloured
2) Bold and Italicized
3) Underlined and coloured
4) Bold and underlined
5) Italicized and underlined

18. Which of the following allows users to upload files to an online site so that they can be viewed and edited from another location?
1) Office Live
2) Microsoft Outlook
3) Common-Purpose applications
4) Web-hosted Technology
5) None of these

19. The letter and the number of the intersecting column and row is the ........
1) Cell location
2) Cell position
3) Cell address
4) Cell coordinates
5) Cell contents

20. In Power-point, the Footer and Header button can be found on the Insert tab in which of the following groups?
1) Illustrations Group
2) Object Group
3) Text Group
4) Tables Group
5) None of these

21. In the basic computer processing cycle which of the following are present?
1) Input processing and output
2) System and application
3) Data information and application
4) Hardware, software and storage
5) None of these

22. Which of the following defines a Firmware?
1) The physical Component used in a computer system.
2) A set of instructions through which a computer does one or more work.
3) People involved in the computing process.
4) A set of programs that are pre-installed in read-only memory of computer during manufacturing.
5) None of these

23. Which of the following can be used instead of remembering e-mail addresses?
1) Phone book
2) Address Book
3) Search Engine
4) Browser software
5) None of these

24. Which of the following is considered as both input and output device?
1) Printer
2) Scanner
3) Monitor
4) Speaker
5) Modem

25. '.exe', '.html', '.mp3', '.doc' etc, are examples of which of the following?
1) Databases
2) Extensions
3) Domains
4) Protocols
5) Websites

26. Computers that are portable and convenient for users who travel are known as:
1) Super Computers
2) Laptops
3) Mini Computers
4) Mainframe Computers
5) None of these

27. Which of the following menu is selected to go to print preview?
1) Edit
2) File
3) Insert
4) View
5) None of these

28. Which of the following is a popular programming language for developing multimedia web pages, websites and web-based applications?
1) COBOL
2) Java
3) BASIC
4) FORTRAN
5) None of these

29. Which of the following will be the common file extension for an installation file?
1) .mpeg
2) .doc
3) .ppt
4) .pdf
5) .exe

30. Windows XP, Mac, Linux are examples of:
1) Processors
2) Domain names
3) Modems
4) Operating systems
5) None of these

31. Any letter, number or symbol found on the keyboard that you can type into the computer is called:
1) Output
2) Character
3) Type
4) Print
5) None of these

32. A technology for using the Internet or another intermediate network to connect computers to isolated remote computer networks that would otherwise be inaccessible is known as:
1) Local Area Network (LAN)
2) File Transfer Protocol (FTP)
3) Campus Area Network (CAN)
4) Virtual Private Network (VPN)
5) None of these

33. Pick the odd one out.
1) Mouse
2) Keyboard
3) Printer
4) Windows
5) Speaker

34. When sending an e-mail, the ..... line describes the contents of the message.
1) To
2) Subject
3) Contents
4) CC
5) None of these

35. Which of the following is not a graphic file format that allows animation to be viewed on a computer?
1) GIF
2) MNG
3) MP8
4) SVG
5) SWF


ANSWERS:
1-3; 2-1; 3-1; 4-3; 5-1; 6-4; 7-4; 8-3; 9-2; 10-2; 11-5; 12-4; 13-2; 14-5; 15-3;
16-2; 17-3; 18-4; 19-3; 20-3; 21-1; 22-4; 23-2; 24-5; 25-2; 26-2; 27-2; 28-2; 29-5;
30-4; 31-2; 32-4; 33-4; 34-2; 35-3;

Wednesday, September 5, 2012

COMPUTER KNOELEDGE MCQ CAPSULES FOR ALL BANK EXAMS


1. Which of the following powerpoint view displays each slide of the presentation as a thumbnail and is useful for rearranging slides?
1) Slide show
2) Slide master
3) Slide sorter
4) Notes Page
5) Design Slide

2. A set of rules for telling the computer what operations to perform is / are called:
1) Structures
2) Procedural Language
3) Command Language
4) Natural Language
5) Programming Language

3. Devices that enter information and let you communicate with the computer are called:
1) Software
2) Hardware
3) Output Devices
4) Input / Output devices
5) Input Devices

4. The speed of which of the following memory chips is faster?
1) Not Fixed
2) DRAM
3) SRAM
4) For smaller chips SRAM is faster
5) For larger chips DRAM is faster

5. Mahesh Babu has his cute childhood photos in an album which might fade out in a couple of years, which he wants to show it to his fans by uploading it in his twitter account. Which of the following devices can he use to do that?
1) Keyboard
2) Mouse
3) Printer
4) Scanner
5) None of these

6. Which of the following is not a social networking site?
1) WAYN
2) Hi 5
3) Orkut
4) Yahoo
5) Facebook

7. In the URL https://twitter.com, what does 's' represent in 'https'?
1) Safe
2) System
3) Start-up
4) Semantic
5) Secured


8. Which among the following is the file extension for Word Documents?
1) .xls
2) .ppt
3) .docx
4) .worddoc
5) None

9. Linux Operating system is an example of which of the following?
1) Freeware
2) Open Source Software
3) Shareware
4) Complimentary
5) None of these

10. A device that connects to a network without the use of a cable is said to be:
1) Distributed
2) Non-Wired
3) Centralised
4) Open source
5) Wireless

11. Which of the following software applications would be most appropriate for performing Statistical and Numerical calculations:
1) Document Processor
2) Graphics Package II
3) Power Point
4) SpreadSheet
5) Meta Processor

12. Removing and replacing devices without turning off the computer is referred to as:
1) Search Engines
2) Operating System
3) Software
4) Resource Locators
5) Plug-n-Play

13. Mr. Prashanth has a song sung by him on the desktop, in the C drive, and also in the D drive. This scenario in computer language is generally referred to as:
1) Data Redundancy
2) Multiple Data Places
3) Various File Places
4) Data Inconsistency
5) Data Independent

14. What is a Firewall?
1) A wall to protect against Fire
2) A software to protect from computer hacker intrusions
3) A software to destroy computer
4) A wall to make partitions in computer
5) None of these

15. Chiranjeevi sent a mail to Pavan Kalyan by putting his email address in 'Cc' and to Nagababu by putting his email address in 'Bcc'. Which of the following is true based on the given scenario?
1) Pavan Kalyan can view the email address of Chiranjeevi and Nagababu
2) Nagababu can view the email address of Pavan Kalyan & Chiranjeevi
3) Pavan Kalyan can view the email address of Nagababu only
4) Both 1 and 2
5) None of them is true

16. When data changes in multiple lists and all lists are not updated, this causes:
1) Data Population Problem
2) Data Reduction
3) Data Induction
4) Data Overload
5) Data Inconsistency

17. The legal right to use software based on specific restrictions is granted via a:
1) Software privacy policy
2) Software License
3) Software password manager
4) Software log
5) None of these

18. Which of the following is not an operating system?
1) Windows 2000
2) DOS
3) Windows 7
4) Mac Os X Lion
5) Google

19. Find the Mis-Matched pair.
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Communications
5) None of these

20. What is the full form of RISC?
1) Reduced Instruction Set Computing
2) Reformed Instruction System Computing
3) Reduced Information System Computing
4) Restoration of Information in System Computing
5) Reduced Instruction Sect Code

21. The common name for Modulator and Demodulator is:
1) Modem
2) Joiner
3) Networker
4) Connecter
5) Mom-dom

22. In order to delete a sentence from a document you would use .......
1) Highlight and copy
2) Cut and Paste
3) Copy and Paste
4) Highlight and Delete
5) Select and Paste

23. What is the keyboard shortcut for Slide Show in Powerpoint ? :
1) F4
2) F8
3) F9
4) F5
5) F12

24. A ...... is a design tool that graphically shows the logic in a solution algorithm.
1) Flow chart
2) Hierarchy Chart
3) Structure Chart
4) Context Diagram
5) None

25. The justification that aligns text on both margins of a document in Word is ......
1) Justify
2) Bold
3) Centre
4) Right
5) Balanced

26. The Open, Print and Save Buttons are all located on the ......
1) Status Bar
2) Formatting Toolbar
3) Standard Toolbar
4) Titlebar
5) Status and Title bars

27. SMPS in a computer stands for?
1) Switched-Mode Power Supply
2) Simple-Mode Power Supply
3) Simple-Mode Power System
4) Switched-Menu Power Supply
5) None of these

28. The process of transforming information using an algorithm to make it unreadable by anyone is usually referred to as:
1) Decryption
2) Encryption
3) Alphabet Coding
4) Encrography
5) Deptography

29. ..... is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
2) PRAM
3) NRAM
4) NORAM
5) None

30. A computer network that uses Internet protocol technology to share information, Operational system, within an organization is usually referred to as ......
1) Internet
2) MAN
3) PAN
4) NPN
5) Intranet

31. What is the symbol for attachments in yahoo mail?
1) Envelope
2) Letter A
3) Paper Clip
4) Pen
5) None

32. Which of the following computers is used in Scientific researches?
1) Super Computers
2) Main Frame
3) Laptop
4) Micro Computers
5) None of these

33. Winzip is an example of :
1) Free ware
2) Shareware
3) Open Source
4) Vertical Market Software
5) None

34. ........... is the science that attempts to produce machines that display the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None

35. COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these

36. The human readable version of a software program is called:
1) cache
2) instruction set
3) source code
4) word size
5) None of these

37. Which of the following is not a programming language with Object Oriented Features?
1) COBRA
2) ABAP
3) C++
4) C#
5) C

38. Which of the following programming language is favoured for Artificial Intelligence?
1) ABAP
2) COBOL
3) LISP
4) JAVA
5) C#

39. The quickest and easiest way in Word, to locate a particular word or phrase in a document
1) Replace
2) Find
3) Lookup
4) Search
5) None of these

40. What symbol is present on the number key '2' on the keyboard?
1) !
2) %
3) ^
4) ∗
5) @

ANSWERS:

1-3; 2-5; 3-5; 4-3; 5-4; 6-4; 7-5; 8-3; 9-2; 10-5;
11-4; 12-5; 13-1; 14-2; 15-2; 16-5; 17-2; 18-5; 19-4; 20-1;
21-1; 22-4; 23-4; 24-1; 25-1; 26-3; 27-1; 28-2; 29-1; 30-5;
31-3; 32-1; 33-1; 34-4; 35-1; 36-3; 37-5; 38-3; 39-2; 40-5

Wednesday, August 29, 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS MCQs


1. Which type of memory gets lost when you switch off?
1) ROM
2) RAM
3) CACHE
4) Dynamic
5) Static

2. Which type of network would use phone lines?
1) WAN
2) LAN
3) WWAN
4) Wireless
5) None of these

3. Speakers / Headphones are ____ devices.
1) Input
2) Input/ Output
3) Software
4) Storage
5) Output

4. A program for viewing web pages is called:
1) hardware
2) software
3) storage
4) browser
5) None of these

5. A computer cannot perform which of the following functions?
1) Addition
2) Subtraction
3) Bake a cake
4) Division
5) None of these

6. CD's or DVD's are ____ type of devices.
1) Input
2) Output
3) Software
4) Storage
5) Input/output

7. In the URL 'www.dbsdynamic.blogspot.in' what does the domain name extension '.in' represent?
1) International
2) internet
3) intra net
4) India
5) None of these

8. Free of cost repair of the software bug available in internet is called:
1) Version
2) Ad-on
3) Tutorial
4) FAR
5) Patch

9. Which of the following is READ only disc?
1) DVD-R
2) DVD-ROM
3) DVD-RW
4) CD-R
5) None of these

10. Which of the following is an/ are advantages of LAN?
1) Sharing peripherals
2) Backing up your data
3) Saving all your data
4) Accessing the web
5) Automatic printing of data




11. Four of the following are alike in a certain way and so form a group. Which is the one that does not belong to the group?
1) Applications
2) Peripherals
3) Programs
4) Software
5) Operating system

12. Digital camera is a ____device.
1) Input
2) Output
3) Software
4) Storage device
5) Input/ output

13. The example of standard file format is:
1) JPEG (.jpg)
2) Bitmap (.bmp)
3) Word (.doc)
4) Text (.txt)
5) Excel (.xls)

14. Which of the following is the fastest Memory?
1) Hard disk
2) DVD ROMs
3) Cache Memory
4) Static RAM
5) None of these

15. Which of the following is NOT a common feature of software application?
1) Menus
2) Windows
3) Help
4) Search
5) None of these

16. The ability of an Operating system to run more than one application at a time is called:
1) Multitasking
2) Multi user computing
3) Time sharing
4) Programming language
5) None of these

17. While filling up an application form which of the following keys is used to move the
cursor to the next box?
1) Esc
2) Shift
3) Control
4) Tab
5) Alt

18. The Softwares which are used in Banks generally are:
1) Character Driven
2) Folder Driven
3) Menu Driven
4) Touch screens
5) None of these

19. Which of the following is a measurement of speed of internet?
1) MB
2) Kbps
3) KB
4) TB
5) QPSI

20. When a computer is attacked by a virus it cannot lead to:
1) Disk Crash
2) Motherboard Crash
3) Corruption of a program
4) Deletion of files
5) None of these

21. In page preview mode-
1) You can see all pages of your document
2) You can only see the page you are currently working
3) You can only see pages that do not contain graphics
4) You can only see the title page of your document
5) None of these

22. What is the full form of EDI?
1) Electronic Data Information
2) Electronic Disk Information
3) Electric Data information
4) Electronic Data Interchange
5) None of these

23. How many different documents can be opened at one time?
1) Not more than Three
2) Only One
3) As many as your computer memory will hold
4) No more than your taskbar can display
5) None of these

24. Files are organized by storing them in:
1) Archives
2) Folders
3) Indexes
4) Lists
5) None of these

25. What kind of resource is most likely to be a shared common resource in a computer network?
1) Printers
2) Speakers
3) Floppy drives
4) Keyboards
5) None of these

26. Saving is a process to:
1) Copy the document from memory to storage medium
2) Bring change in the present status of the document
3) Change the face or entire form
4) Develop the document by recording the text with the use of keyboard
5) None of these

27. In word you can force a page break by:
1) Positioning your cursor at the appropriate place and pressing the F1 key
2) Using the Insert / section Break
3) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
4) By changing the font size of your document
5) None of these

28. A computer cannot 'boot' if it does not have:
1) Compiler
2) Loader
3) Operating System
4) Assembler
5) None of these

29. The among of vertical space between lines
of text in a document is called :
1) Double-space
2) Line spacing
3) Single space
4) Vertical spacing
5) None of these

30. Which of the following shortcut keys is used to underline a word / line in a word document
1) Ctrl + L
2) Ctrl + U
3) Ctrl + K
4) Alt + U
5) Tab + L

31. A software which has a capability of replicating itself and can be harmful to the computer is:
1) MS-Office
2) Win Zip
3) Virus
4) Windows Media Player
5) Notepad

32. What is the full form of Wi-Fi?
1) Wireless Front
2) Wired Front
3) Wireless Fidelity
4) Wired Fidelity
5) None of these

33. The process of transferring files from a computer on the Internet to your computer is called:
1) Downloading
2) Uploading
3) FTP
4) JPEG
5) Downsizing

34. What is the full form of EPROM?
1) Erasable Programmable Read-Only Memory
2) Electronic Programmable Read-Only Memory
3) Enterprise Programmable Read-Only Memory
4) Extended Programmable Read-Only Memory
5) Electrical Programmable Read-Only Memory

35. CISC the abbreviation of:
1) Complex Instruction Set Code
2) Communication Instruction Set Computing
3) Complex Instruction Signal Computing
4) Communication Instruction Signal Code
5) Complex Instruction Set Computing


ANSWERS:
1-2; 2-1; 3-5; 4-4; 5-3; 6-4; 7-4; 8-5; 9-2; 10-1;
11-2; 12-5; 13-4; 14-3; 15-2; 16-1;17-4; 18-3; 19-2; 20-2;
21-1; 22-4; 23-3; 24-2; 25-1; 26-1; 27-3; 28-3; 29-2; 30-2;
31-3; 32-3; 33-2; 34-1; 35-5

Monday, July 30, 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS PRACTICE QUESTIONS



1. What is e-commerce?
1) Buying and selling of international goods
2) Buying and selling of products and services over the internet
3) Buying and selling of products having to do with computers
4) Buying and selling of products and services not found in stores
5) Buying and selling of electronic goods

2. The term user Interface refers to :
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to the user commands
3) The means by which the user interacts with the peripheral devices on the  computer
4) All of these
5) None of these

3. Which of the following is not an input device?
1) Keyboard
2) Joystick
3) Monitor
4) Microphone

5) None of these

4. An error is also known as :
1) Debug
2) Bug
 3) Cursor
4) Icon
5) None of these

5. Archive is :
1) Back-up Storage
2) Forward Operation
3) Primary Storage
4) Name of famous processor
5) None of these

6. Which media has the ability to have data/information written on them by users more than once
1) CD-R disks
2) CD-RW disks
3) Zip disks
4) Opti disks
5) Both CD-RW and Zip disks

7. BCC in regard to emails, stands for :
1) Best Client Copy
2) Better Communication Copy
3) Best Computer Copy
4) Better Client Copy
5) None of these



8. A(n) .................. contains text as well as information about the text
1) browser language
2) machine language
3) protocol language
4) markup language
5) annotated language

9. A pictorial representation that uses predefined symbols to describe either the logic of the computer program or the data flow and processing steps of a system is referred as :
1) Flow chart
2) Algorithm
3) Program
4) Protocol
5) None of these

10. A ........ is the term used when a search engine returns a web page that matches the search criteria
1) Blog
2) Hit
3) Link
4) View
 5) None of these

11. URL stands for ........
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator
5) None of these

12. The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these

13. What is a backup?
1) Restoring the information backup
2) An exact copy of a system's information
3) The ability to get a system up and running in the event of a system crash or failure
4) All of these
5) None of these

14. Which of the following statements is FALSE concerning file names?
1) Files may share the same name or the same extension but not both
2) Every file in the same folder must have a unique name
3) File extension is another name for file type
4) The file extension comes before the dot (.) followed by the file name
5) None of these

15. Verification of a login name and password is known as:
1) authorization  
2) accessibility
3) authentication
4) logging in  
5) None


16. Every computer has a(n) ........; many also have .........
1) Operating System; a client system
2) Operating system; instruction sets
3) Application programs; an operating  system
4) Application programs; a client system
5) Operating system; application programs

17. Which term identifies a specific computer on the web and the main page of the entire site
1) URL
2) Website Address
3) Hyperlink
4) Domain name
5) None of these

18. The altering of data so that it is not usable unless the changes are undone is ......
1) Bio metrics
2) Compression
3) Encryption
4) Ergonomics
5) None of these

19. ......... means that the data contained in a database is accurate and reliable.
1) Data redundancy
2) Data Integrity
3) Data Reliability
4) Data consistency
5) None

20. Device that take a picture of an object and convert it into a computerized image :
1) Hard drive
2) Scanner
3) Printer
4) Modem
5) Cable

21. Which of the following is not a search engine?
1) Bing
2) Baidu  
 3) Yahoo
4)  Safari
5) Ask

22. Which of the following window allows  entering values and formulas in the Excel ?
1) Title bar
2) Menu Bar
3) Formula Bar
4) Standard Tool Bar
5) None of these

23. Which of the following helps to store information in the computer?
1) Disk Drive
 2) Keyboard
3) Monitor
4) Printer
5) None of these

24. A computer virus normally attaches itself to another computer program known as :
1) Target program
2) Host program
3) Bluetooth
4) Front door program      
5) Trojan horse

25. A DVD is an example of a(n)
1) Hard disk
2) Optical disk
3) Output device
4) Solid-state storage device
5) None of these

26. Computer programs are written in a highlevel programming language; however, the human readable version of a program is called........
1) cache
2) instruction set
3) source code
4) word size
5) None of these

27. The software tools that enable a user to interact with a computer for specific  purposes are known as

1) Hardware
2) Networked Software
3) Shareware        
4) Applications    
5) None of these

28. A ......... is a set of rules.
1) resource locator
2) domain
3) hypertext
4) URL
5) protocol

29. The ......... file format is a method of encoding pictures on a computer.
1) HTML
2) JPEG
3) FTP
4) URL
5) DOC

30. The shortcut key for finding a word or a part of the word in MS word is :
1) Ctrl + M
2) Ctrl + S
3) Alt + M
4) Alt + K
5) Ctrl + F

31. Storage that retains its data after the power is turned off is referred to as
1) Volatile storage
2) Non-volatile storage
3) Sequential Storage
4) Direct storage
5) None of these

32. HTML stands for:
1) Hyper Text Mark-Up language
2) High Technology Mobile Language
3) Hyper Text Mobile Language
4) High Technology Mark-up Language
5) None of these

33. Which ports connect special types of  musical instruments to sound cards ?
1) BUS
2) CPU
3) USB
4) MIDI
5) MINI

34. Antivirus is an example of which of the  following?
1) An operating system
2) A business software
3) A security utility
4) An office suite
5) None


35. A computer checks the ......... of user names and passwords for a match before granting access.
1) Website
2) Network
3) Backup file
4) Database
5) None of these

36. Restarting a computer that is already on is referred to as:
1) shutting down
2) cold booting
3) warm booting
4) logging off
5) None of these

ANSWERS:


1-2; 2-1; 3-3; 4-2;  5-1;  6-2;  7-5;  8-4; 9-1;  10-2; 11-3;  12-2;  13-4;  14-4; 15-3;
16-5; 17-1; 18-3; 19-2;  20-2;  21-4;  22-3; 23-1;  24-5;  25-2;  26-3;  27-4;  28-5;  29-2;
30-5;  31-2;  32-1;  33-4;  34-3;  35-4;  36-3





Tuesday, July 17, 2012

COMPUTER AWARENESS PRACTICE QUESTIONS

1. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
Answer: break into other peoples computers

2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
Answer: software piracy

3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
Answer: spam

4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
Answer: Overhead Projections

5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
Answer: A Sound Format

6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
Answer: PCs

7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
Answer: Microphone



8. The life-span of a CD-ROM is………………
(A) approximately one year
(B) approximately two years
(C) approximately five years
(D) approximately twenty-five years
Answer: approximately five years

9. The ……………… settings are automatic and standard.
(A) default
(B) CPU
(C) peripheral
(D) user frien9ly
Answer: default

10. What are the two parts of an E-mail address ?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
Answer: User name and domain name

11. Participants can see and hear each other in a/an ………………
(A) electronic mail system
(B) message system
(C) tele-conference
(D) bulletin board
Answer: tele-conference

12. Magnetic tape is not practical for applications where data must be quickly recalled because tape is ………………
(A) a random-access medium
(B) expensive
(C) a read-only medium
(D) a sequential-access medium
Answer: a sequential-access medium

13. Why should you delete unknown e-mail attachments ?
(A) You could go to jail
(B) The person could track you down and hurt you
(C) It is bad manners
(D) It might contain a virus that could hurt your computer
Answer: It might contain a virus that could hurt your computer

14. How is it possible that both programs and data can be stored on the same floppy disk ?
(A) A floppy disk has two sides, one for data and one for programs
(B) A floppy disk has to be formatted for one or for the other
(C) Programs and data are both software, and both can be stored on any memory device
(D) Floppy disks can only store data, not programs
Answer: Programs and data are both software, and both can be stored on any memory device

15. What is an embedded system ?
(A) A program that comes wrapped in a box
(B) A program that is permanently part of a computer
(C) A computer that is part of a larger computer
(D) A computer and software system that controls a machine or appliance
Answer: A computer and software system that controls a machine or appliance

16. Which of the following will you require to hear music on your computer ?
(A) Video Card
(B) Tape Recorder
(C) Mouse
(D) Sound Card
Answer: Sound Card

17. The signal that a computer is waiting for a command from the user is ………………
(A) prompt
(B) event
(C) time slice
(D) interrupt
Answer: prompt

18. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page ………………
(A) Web browser
(B) Web search engine
(C) Web homepage
(D) Web service
Answer: Web browser

19. For viewing video CDs, you would use………………
(A) CD Player
(B) Windows Media Player
(C) Windows Video Player
(D) Windows Movie Player
Answer: Windows Media Player

20. Executing more than one program concurrently by one user on one computer is known as ………………
(A) multi-programming
(B) multi-processing
(C) time-sharing
(D) multi-tasking
Answer: multi-tasking

21. Which of the following controls the manner of interaction between the user and the operating system ?
(A) language translator
(B) platform
(C) user interface
(D) icon
Answer: user interface

22. You can keep your personal flies / folders in ………………
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
Answer: My Documents

23. Three types of compact disks include CD-ROM, CD-R, and ………………
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
Answer: CD-RW

24. All computers must have ………………
(A) Word processing software
(B) An operating system
(C) A printer attached
(D) A virus checking program
Answer: An operating system

25. Collecting personal information and effectively posing as another individual is known as the crime of ………………
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
Answer: identity theft

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. If you wish to extend the length of the network without having the signal degrade, you would use a ………………
(A) resonance
(B) router
(C) gateway
(D) repeater
Answer: repeater

2. A repair for a known software bug, usually available at no charge on the Internet, is called a ………………
(A) version
(B) patch
(C) tutorial
(D) FAQ
Answer: patch

3. URL stands for ………………
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
Answer: Uniform Resource Locator

4. When data changes in multiple lists and all lists are not updated, this causes ………………
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
Answer: data inconsistency

5. What is a backup ?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
Answer: An exact copy of a systems information

6. The Internet is ………………
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) a communication system for some states of India
Answer: a large network of networks

7. Computers that are portable and convenient for users who travel are known as ………………
(A) supercomputers
(B) planners
(C) minicomputers
(D) laptops
Answer: laptops



8. What is the storage area for e-mail messages called ?
(A) A folder
(B) A mailbox
(C) A directory
(D) The hard disk
Answer: A mailbox

9. One advantage of dial-up Internet access is
(A) it utilises broadband technology
(B) it is Indian
(C) it uses a router for security
(D) it utilises existing telephone service
Answer: it utilises existing telephone service

10. What is the process of copying software programs from secondary storage media to the hard disk called ?
(A) configuration
(B) download
(C) storage
(D) installation
Answer: installation

11. Which process checks to ensure that the components of the computer are operating and connected properly ?
(A) Booting
(B) Processing
(C) Saving
(D) Editing
Answer: Booting

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is………………
(A) Modem
(B) Software
(C) Scanner
(D) Keyboard
Answer: Scanner

13. An error in a computer program………………
(A) Crash
(B) Power Failure
(C) Bug
(D) Virus
Answer: Bug

14. Access-control based on a person's fingerprints is .an example of………………
(A) biometric identification
(B) characteristic identification
(C) characteristic security
(D) fingerprint security
Answer: biometric identification

15. The patterns of printed lines on most products are called………………
(A) prices
(B) striping
(C) scanners
(D) barcodes
Answer: barcodes

16. Most mail programs automatically complete the following two parts in an e-mail ………………
(A) From: and Body :
(B) From: and Date :
(C) From: and To :
(D) From: and Subject :
Answer: From: and Date :

17. The computer's capability of distinguishing spoken words is called ………………
(A) voice analysis
(B) speech acknowledgement
(C) voice recognition
(D) speech interpretation
Answer: voice recognition

18. Which of the following is an advantage of mounting an application on the Web ?
(A) The possibility of 24-houraccess for users
(B) Creating a system that can extend globally
(C) Standardising the design of the interface
(D) All of these
Answer: All of these

19. The first page of a Website is called the ………………
(A) Homepage
(B) Index
(C) Java Script
(D) Bookmark
Answer: Homepage

20. ERP is an acronym for ………………
(A) Enterprise Retirement Planning
(B) Enterprise Relationship Planning
(C) Enterprise Resource' Planning
(D) Enterprise Reorder Planning
Answer: Enterprise Resource Planning

21. The software that allows users to surf the Internet is called a/an ………………
(A) Search Engine
(B) Internet Service Provider (ISP)
(C) Multimedia Application
(D) Browser
Answer: Browser

22. The issues that deal with the collection and use of data about individuals is ………………
(A) access
(B) publicity
(C) accuracy
(D) privacy
Answer: privacy

23. A term related to sending data to a satellite is ………………
(A) downlink
(B) modulate
(C) demodulate
(D) uplink
Answer: uplink

24. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called ………………
(A) hypermedia
(B) hypertext
(C) HTML
(D) URL
Answer: hypertext

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and ………………security is concerned with protecting software from unauthorized tampering or damage.
(A) data
(B) cyber
(C) Internet
(D) metaphysical
Answer: data

Saturday, June 9, 2012

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
Answer: break into other peoples computers

2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
Answer: software piracy

3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
Answer: spam

4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
Answer: Overhead Projections

5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
Answer: A Sound Format

6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
Answer: PCs

7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
Answer: Microphone

8. The life-span of a CD-ROM is………………
(A) approximately one year
(B) approximately two years
(C) approximately five years
(D) approximately twenty-five years
Answer: approximately five years

9. The ……………… settings are automatic and standard.
(A) default
(B) CPU
(C) peripheral
(D) user frien9ly
Answer: default

10. What are the two parts of an E-mail address ?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
Answer: User name and domain name

11. Participants can see and hear each other in a/an ………………
(A) electronic mail system
(B) message system
(C) tele-conference
(D) bulletin board
Answer: tele-conference

12. Magnetic tape is not practical for applications where data must be quickly recalled because tape is ………………
(A) a random-access medium
(B) expensive
(C) a read-only medium
(D) a sequential-access medium
Answer: a sequential-access medium

13. Why should you delete unknown e-mail attachments ?
(A) You could go to jail
(B) The person could track you down and hurt you
(C) It is bad manners
(D) It might contain a virus that could hurt your computer
Answer: It might contain a virus that could hurt your computer

14. How is it possible that both programs and data can be stored on the same floppy disk ?
(A) A floppy disk has two sides, one for data and one for programs
(B) A floppy disk has to be formatted for one or for the other
(C) Programs and data are both software, and both can be stored on any memory device
(D) Floppy disks can only store data, not programs
Answer: Programs and data are both software, and both can be stored on any memory device

15. What is an embedded system ?
(A) A program that comes wrapped in a box
(B) A program that is permanently part of a computer
(C) A computer that is part of a larger computer
(D) A computer and software system that controls a machine or appliance
Answer: A computer and software system that controls a machine or appliance

16. Which of the following will you require to hear music on your computer ?
(A) Video Card
(B) Tape Recorder
(C) Mouse
(D) Sound Card
Answer: Sound Card

17. The signal that a computer is waiting for a command from the user is ………………
(A) prompt
(B) event
(C) time slice
(D) interrupt
Answer: prompt

18. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page ………………
(A) Web browser
(B) Web search engine
(C) Web homepage
(D) Web service
Answer: Web browser

19. For viewing video CDs, you would use………………
(A) CD Player
(B) Windows Media Player
(C) Windows Video Player
(D) Windows Movie Player
Answer: Windows Media Player

20. Executing more than one program concurrently by one user on one computer is known as ………………
(A) multi-programming
(B) multi-processing
(C) time-sharing
(D) multi-tasking
Answer: multi-tasking

21. Which of the following controls the manner of interaction between the user and the operating system ?
(A) language translator
(B) platform
(C) user interface
(D) icon
Answer: user interface

22. You can keep your personal flies / folders in ………………
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
Answer: My Documents

23. Three types of compact disks include CD-ROM, CD-R, and ………………
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
Answer: CD-RW

24. All computers must have ………………
(A) Word processing software
(B) An operating system
(C) A printer attached
(D) A virus checking program
Answer: An operating system

25. Collecting personal information and effectively posing as another individual is known as the crime of ………………
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
Answer: identity theft

Thursday, May 17, 2012

COMPUTER KNOWLEDGE MODEL PRACTICE QUESTIONS


1. Which of the following is NOT a computer programming language?
(1) C
(2) C++
(3) Java
(4) COBOL
(5) Microsoft

2. A computer virus normally attaches itself to another computer program known as-
(1) Trojan horse 
(3) Host program
(3) Boot program
(4) Spyware
(5) Malware

3. A terminal that cannot process any information is called-
(1) Direct access terminal
(2) Intelligent terminal
(3) Dumb terminal 
(4) Smart terminal
(5) Blind terminal

4. ____ is a high speed memory that can be used in between CPU and main memory.
(1) CPU
(2) Buffer
(3) Spooling
(4) Cache 
(5) None of these

5. A ____ port is primarily used to connect printers to a computer.
(1) Serial port
(2) USB port
(3) Parallel port 
(4) Address bus
(5) None of these

6. ____ is responsible for overall control and co-ordination of instruction execution.
(1) CPU
(2) ALU
(3) RAM 
(4) Control Unit
(5) None of these

7. When you start your computer from the off position then it is known as-
(1) Hard booting 
(2) Processing
(3) Storage
(4) Soft booting
(5) None of these

8. The component is required to process data into information and consists of integrated circuit.
(1) RAM
(2) Control Unit
(3) Processor 
(4) Motherboard
(5) None of these

9. ____ is known as network virus.
(1) Trojan horse
(2) Brain Virus
(3) Worm 
(4) All of these
(5) None of these

10. ____ is a technique of temporarily removing inactive programs from the memory of computer system.
(1) Swapping
(2) Spooling 
(3) Semaphore
(4) Scheduler
(5) None of these

11. A computer program that translates one program instructions at a time into machine language is called-
(1) Interpreter 
(2) CPU
(3) Compiler
(4) Simulator
(5) None of these

12. ____ are device used to transmit data over telecommunication lines.
(1) Drives
(2) Drive bays
(3) Modems 
(4) Platforms
(5) None of these

13. Who introduced Internet E-mail?
(1) Jerry Yang
(2) David Filo
(3) Ray Tomlinson
(4) Sergey Brinn
(5) None of these

14. Granting an outside organization access to internet web pages is often implemented using a(n)-
(1) extranet 
(2) intranet
(3) internet
(4) hacker
(5) None of these

15. BCC stands for-
(1) Bold Carbon Copy
(2) Blue Carbon Copy
(3) Bandwidth Carbon Copy
(4) Blind Carbon Copy 
(5) None of these

16. Which of the following contains information about a single ‘entity’ in the database like a person, place, event or thing?
(1) Query
(2) Field
(3) record 
(4) table
(5) None of these

17. Outlook Express is known as-
(1) E-mal client 
(2) Word processor
(3) Spreadsheet
(4) Database
(5) None of these

18. Which is not closed source software package?
(1) VLC
(2) LINUX
(3) Open Office
(4) MS Word 
(5) None of these

19. Minimum Zoom percentage supported by MS Word is-
(1) 10% 
(2) 15%
(3) 25%
(4) 4%
(5) None of these

20. HTML was introduced by-
(1) Vinton Cerf
(2) Bob Willies
(3) Steve Jobs
(4) Tim Burner Lee 
(5) None of these

21. A message with replies on a newsgroup is often, called a-
(1) post
(2) list
(3) thread 
(4) comment
(5) None of these

22. To send e-mail to a large group at one time, a ____ can be used.
(1) group
(2) alias
(3) mail server
(4) list serv 
(5) None of these

23. The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as-
(1) Business to business
(2) Consumer to business 
(3) Client to business
(4) Business to consumer
(5) None of these

24. A repair for a known software bug, usually available at no change on the internet is called-
(1) Version
(2) Patch 
(3) Tutorial
(4) FAQ
(5) None of these

25. When sending the e-mail, the ____ line describes the contents of the message.
(1) CC
(2) Contents
(3) To
(4) Subject 
(5) BCC

26. A port is a connector located on the –
(1) RAM
(2) CPU
(3) ROM
(4) Memory
 (5) Motherboard

27. Format command is used to create-
(1) Sector
(2) memory
(3) tracks
(4) tracks & sectors 
(5) None of these

28. Disk access time is-
(1) seek time
(2) Latency time
(3) Seek time + Latency time 
(4) Disk time
(5) None of these

29. ____ technology is used by banks for faster processing of large volume of cheques.
(1) OCR
(2) IFSC Code
(3) OMR
(4) MICR 
(5) Bar Code

30. The Operating System is also called the ____ between the user and the computer.
(1) server
(2) interface 
(3) network
(4) intermediate
(5) None of these

31. A human being who writes programs, operate and maintain computer is known as-
(1) Liveware 
(2) Freeware
(3) Spyware
(4) Shareware
(5) None of these

32. A Public Switched-Telephone Network (PSTN) uses ____ switching technique.
(1) Packet
(2) Message
(3) Circuit 
(4) Transport
(5) None of these

33. The PC and the Apple Macintosh are example of two different –
(1) applications
(2) programs
(3) platforms 
(4) storage device
(5) Operating system

34. PROM is a ____ memory that store information even if power is switched off.
(1) Volatile
(2) Buffer
(3) spooling
(4) non-volatile 
(5) None of these

35. When installing a peripheral device you also need to install a –
(1) port
(2) server
(3) driver 
(4) connection
(5) utility software

36. The ____ specifies the operation to be performed and the operands provide the data on which the operation is to be performed.
(1) source code
(2) op code 
(3) object code
(4) program code
(5) None of these

37. Which of the following can hold maximum amount of data?
(1) Optical disk
(2) Floppy disk
(3) Magnetic disk inside computer
(4) Magnetic tape 
(5) None of these

38. A ____ is not a form of Biometrics.
(1) fingerprint
(2) password 
(3) retina scan
(4) breath scan
(5) None of these

39. Full form of OSI is-
(1) Open System Interconnection 
(2) Open Software for Internet
(3) Operational System for Interconnect
(4) Operational Software for Internet
(5) None of these

40. A pixel is-
(1) a computer program that draws picture
(2) a picture stored in the secondary memory
(3) the smallest resolvable part of a picture 
(4) a virus
(5) None of these

Tuesday, May 15, 2012

COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1.         A Passive threat to computer security is-
       (1) Malicious Intent              
(2) Sabotage
(3) Accidental Errors             
(4) Espionage Agents
(5) None of these
2.          ____ allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
(1) TCP/IP                                  
(2) Ethernet
(3) WAP                                     
(4) Token ring
(5) None of these

3.          ‘DOS’ floppy disk does not have____.
(1) A Boot Record                  
(2) A File Allocation Table
(3) A Root Directory              
(4) Virtual Memory
(5) BIOS
4.          ‘MICR’ technology used for clearance of cheques by banks refers to ____.
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
(5) None of these
5.          All the information collected during database development is stored in a ____.
(1) repository                          
(2) data warehouse
(3) RAD                                      
 (4) CASE
(5) None of these
6.          The ____ component is used by the data analyst to create the queries that access the database.
(1) data extraction                 
(2) end-user query tool
(3) end-user presentation tool
(4) data store                           
(5) None of these
7.          The altering of data so that it is not usable unless the changes are undone is ____.
(1) Biometrics                         
 (2) Compression
(3) Encryption                          
(4) Ergonomics
(5) None of these
8.          The word FTP stands for-
(1) File Transfer Protocol   
 (2) File Transit Protocol
(3) File Typing Protocol        
(4) File Transfer Protocol
(5) None of these
9.          This ____ tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
(1) Client                   
(2) Applications/Web server
(3) Enterprise server            
(4) DBA
(5) None of these
10.      A DVD-RAM is similar to a ____, except it has storage capacities up to 5.2 GB.
(1) CD-R                                     
(2) Floppy disk
(3) CD-RW                                 
(4) Hard disk
(5) None of these
11.      All of the following are basic principles of networks, except-
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these
12.      ____ are used to identify a user who returns to a Website.
(1) Cookies                               
(2) Plug-ins
(3) Scripts                                  
(4) ASPs
(5) None of these
13.      If you wanted to locate the hardware address of a local device, which protocol would you use?
(1) ARP                                       
(2) RARP
(3) ICMP                                    
(4) PING
(5) PONG
14.      The term, ‘hypertext’ means-
(1) Non-sequential writing 
(2) Hypermedia
(3) Blinking text     
(4) Text with heavy formatting
(5) None of these
15.      Which kind of lock includes a keypad that can be used to control access into areas?
(1) Cipher                                  
(2) Warded
(3) Device                                  
(4) Tumbler
(5) Type lock
16.      What is the name of protocol used in eliminate loops?
(1) Switching                            
(2) ISL
(3) Frame tagging                  
 (4) Spanning Tree Protocol
(5) None of these
17.      In networking terminology UTP means –
(1) Unshielded Twisted Pair
(2) Ubiquitous Teflon Port
(3) Uniformly Terminating Port
(4) Unshielded T-Connector
(5) None of these
18.      In OSI network architecture, the dialogue control and token management are responsibility of-
(1) Session layer                     
(2) Network layer
(3) Transport layer                 
(4) Data link layer
(5) None of the above
19.      A ‘C’ data structure called a structure is a group of items in which each item is identified by its own identifier, each of which is known as a member of a structure. Member is also known as-
(1) Information                       
(2) Field
(3) Record                                 
(4) Data type
(5) None of these
20.      Multithread means-
(1) Program do more than one thing at a time
(2) More than one program do one thing at a time
(3) Both are correct               
(4) Both are incorrect
(5) None of these
21.      A page fault occurs?
(1) when the page is not in the memory
(2) when the page is in  the memory
(3) when the process enters the blocked state
(4) when the process is in the ready state
(5) None of these
22.      “Each packet contains the full source and destination address.” This statement indicates which of the following?
(1) Virtual Circuit                    
(2) Datagram
(3) Data link                              
(4) FDDI
(5) None of these 
23.      Data bus is-
(1) Unidirectional                   
(2) Bidirectional
(3) Both (1) & (2)                   
 (4) Multidirectional
(5) None of these
24.      Which of the following is a type of ISDN (Integrated Service Digital Network)?
(1) Narrow bank                     
(2) Broad band
(3) Both (1) & (2)                    
(4) Virtual Circuit
(5) None of these 
25.      Which of the following is a browser to view a web page?
(1) Mosaic                                 
(2) Netscape
(3) Internet Explorer           
(4) All of the above
(5) None of these
26.      A graph is a collection of-
(1) Row and columns            
(2) Vertices and edges
(3) Equations                           
(4) Identity
(5) None of these
27.      CDMA is used in-
(1) Wireless and local loop
(2) Allocating a wireless channel
(3) Both (1) & (2)                    
(4) Local loop
(5) None of these
28.      Number of arcs incident to a node is called its-
(1) Level                                     
(2) Predecessor
(3) Degree                                                
(4) Successor
(5) None of these
29.      OSPF means-
(1) Open shortest path finite protocol
(2) Open shortest path finite protocol
(3) Open slotted path finite protocol
(4) Open slotted path first protocol
(5) None of these
30.      Binding the same name to multiple operations whose signatures differ in number or types of arguments?
(1) Overloading                       
(2) Origin class
(3) Object model                    
(4) Package
(5) None of these
31.      What is the name of the chip which has more than one processor on it?
(1) Parallel chip                       
(2) Multi-processor chip
(3) Transputer                         
(4) Parallel processor
(5) None of these
32.      In windows-
(1) Docking views may be docked
(2) Docking views may be float
(3) Docking views may be docked or float
(4) All of the above                               
(5) None of these
33.      ____ performs relocations function?
(1) Absolute loader               
(2) Direct linking loader
(3) Relocating loader            
(4) Linkage editor
(5) None of these
34.      A central computer surrounded by one or more satellite computers is called a-
(1) Bus network                      
(2) Ring network
(3) Star network                     
(4) All of the above
(5) None of these
35.      Segmentation –
(1) is a memory management scheme that supports user view of memory
(2) logical address space is collection of segments
(3) logical address consists of two tuple < segment-number, offset>.
(4) All of the above                               
(5) None of these 
36.      Which of the following is a major component of the telephone system?
(1) Local loop                           
(2) Trunks
(3) Switching office                               
(4) All of these
(5) None of these 
37.      Function is invoked by-
(1) Function                             
(2) Declaration
(3) Definition                           
(4) Prototype
(5) None of these
38.      The ACCEPT command in SQL?
(1) Creates a customized prompt when accepting user input
(2) Explicitly defines a NUMBER or DATE data type variable
(3) Hides user input for security reasons
(4) All of the above
(5) None of these
39.      How many fields are required to represent a header node of a graph?
(1) 3                                             
(2) 2
(3) 4                                             
(4) 5
(5) None of these
40.      Which of the following is not used as a data structure?
(1) Array                                    
(2) Linked list
(3) Graph                                   
(4) Directory
(5) None of these 
41.      Which of the following is an operating system call?
(1) CREATE                                                
(2) LINK
(3) SYSTEM                               
(4) All of these
(5) None of these
42.      In C++, by default, the members of a class are-
(1) Public                                   
(2) Private
(3) Both public and private 
(4) Only Public
(5) None of these
43.      In core banking systems:
(1) Store and forward of transaction is done
(2) Branch server is not required
(3) Local database is not required
(4) Transaction cannot happen from a non-home branch
(5) None of these 
44.      MV command in Unix changes-
(1) Only the directory
(2) Only the directory entry and i-node
(3) Only the i-node number
(4) All of the above                               
(5) None of these
45.      E-Commerce refers to-
(1) Electrical commerce       
(2) Electronic commerce
(3) Evolutionary commerce              
(4) Effective commerce       
(5) None of these
46.      Graphs can be implemented using-
(i) Arrays    (ii) Linked list      (iii) Stack              (iv) Queue
(1) (i), (ii) and (iv)                   
(2) (i), (ii) and (iii)
(3) (ii) and (iii)                          
(4) (i) and (iv)
(5) None of these
47.      Thrashing-
(1) Always occur on large computers
(2) is a natural consequence of virtual memory systems
(3) Can always be avoided by swapping
(4) Can be caused by poor paging algorithm
(5) None of these
48.      The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred as-
(1) modulation                        
(2) demodulation
(3) synchronizing                    
(4) digitizing
(5) None of these
49.      The relational database environment has all of the following components except-
(1) Users                                    
(2) Separate files
(3) Database                            
(4) Database administrator
(5) None of these
50.      Primary key-
(1) Denote a candidate key that is chosen by the database designer as the principal means of identifying entities with in an entity set
(2) Attributes names of all primary key are unique
(3) Primary key specification is optional and good idea to specify primary key for each relation
(4) All of the above                              
 (5) None of these
Answers:


1
1
11
4
21
1
31
3
41
4
2
3
12
1
22
2
32
2
42
2
3
5
13
1
23
2
33
3
43
1
4
1
14
2
24
3
34
3
44
1
5
1
15
1
25
4
35
4
45
2
6
2
16
4
26
2
36
4
46
4
7
3
17
3
27
3
37
1
47
4
8
4
18
1
28
3
38
4
48
4
9
2
19
2
29
1
39
1
49
2
10
3
20
1
30
1
40
4
50
4