Computer Science MCQS

COMPUTER MCQS

11. During the program execution, temporary/intermediate values are stored in _____________.
a. Registers
b. Peripherals
c. LAN
d. None of these

12. The objects can be inherited by _____________.
a. A single object only
b. Multiple objects
c. Both (a) and (b)
d. Either (a) or (a)

13. The operating system may perform _____________ operation to manage the memory while running a large program.
a. Sorting
b. Scheduling
c. Paging
d. None of these

14. When the LAN is arranged in such a way that each computer is connected directly to the HUB the configuration can be termed as _____________ network.
a. Bus
b. Star
c. Ring
d. None of these

15. To communicate with other computers over a telephone line the computer must have _____________ installed.
a. Telephone set
b. Modem
c. LAN Card
d. None of these

16. When each item of data in a database is directly linked with every other item of data, the database is called _____________.
a. Relational
b. Hierarchical
c. Network
d. None of these

17. _____________ is the most efficient method to reduce the duplication of data.
a. Duplication
c. Normalization
c. Empty fields
d. None of these

18. The _____________ operation changes the coordinate values of objects being displayed.
a. Transformation
b. Windowing
c. Both (a) and (b)
d. None of these

19. A linear sequential software development model is also referred to as ____________ .
a. Prototype Model
b. RAD Model
c. Spiral Model
d. None of these

20. State Transition Diagram gives information of ___________.
a. Data Flow
b. Entry Relationship
c. Control Flow
d. None of these
2002
(1) The terms “type cast” and “type conversion” have different semantics i.e. they have different effects on the program execution.TRUE

(2) Alignment restrictions of modern RISC-architectures forces compilers to occasionally introduce “holes” and “padding” for record structures to ensure efficient access of record elements.

(3) In a language with garbage collection, the programmer need not worry about heap memory management.True

(4) In order to execute a program by interpretive execution, the interpreter needs to execute on the system on which the program is to be run.

(5) A GUI is a Graphical Utility Interface. False

(6) The study of algorithms began in the 1900s when electronic computers began to be used.

(7) A bus is a part of the computer that decides if a value should be stored as an integer or floating point.False
(8) Peripheral devices handle the coordination of a computer’s activities.True
(9) Get method in HTML forms is used for debugging.False
(10) “Pine” is an example of e-mail utility. TRue

(B) Please choose the most appropriate answer from the given set of answers.

(11) State Transition Diagram gives information of
(a) Prototype Model
(b) RAD Model
(c) Spiral Model
(d) None of these

(12) The concept of meaning represented by an algorithm is known as its:
(a) Control Structure
(b) Sequence
(c) Semr5cyantics
(d) Syntax

(13) Each cell of memory is numbered and that number is referred to as the cell’s
(a) Block
(b) Identity
(c) Address
(d) Size

(14) Main memory is called RAM because
(a) It is volatile, like a ram’s temper.
(b) The computer starts at address 0 and reads every byte until it reaches the correct address.
(c) It can Read all memory
(d) The memory is accessible randomly

(15) To use internet, the computer must have
(a) Telephone
(b) Modem
(c) ISP Connection
(d) All of the above
2003
(1) A feature of an operating system that allows more than one program to run simultaneously is called Multitasking. Flase
(2) A trackball operates like a joystick on its back. It is extremely useful when there isn't enough space to use a mouse,False
(3) Digitizing Tablet is a'special Input device that is mainly used to digitize vector-oriented design or pictures. True not completely sure

(4) Dedicated line is a high speed cable line that is not permanently wired into the internet.
(5) A Router is a network device that helps LANs and WANs achieve interoperability and connectivity and thai can link LANs that have different netwoiktopdldgies, such as Ethernet and Token Ring. true
(6) Internet Protocol is a routable protocol in the backbone that is responsible for IP addressing, routing, and the fragmentation and reassembly of IP packets. True
(7) Telnet is an Internet connection that enables a user to terminate an active connection with a computer at a retoete site.
(8) ESD stands for Electronic Static Distance.False
(9) IRQ is Interrupt Request. TRue
(10) Copyright computer programs made available on trial basis are called shareware. True

(B) Please choose^he most appropriate answer from the given set of answers. . (.1x5)

(11) What is the long form of 'CMOS'?
(a) Complimentary Metal Oxide Semiconductor
(b) Complex Metal Oxide Semiconductor
(c) Controller Metal Oxide Semiconductor
(d) Complimentary Metal Oxide Sets.

(12) What is a Y-Connector? '
(a) A'Y-Shaped splitter cable that divides a source input into two output signals.
(b) A Y-Shaped splitter connector that divides a source input into two output signals.
(c) A Y-Shaped splitter card that divides'a source input into two output signals.
(d) None of the above.

(13) What do you mean by IBM-Compatible'?
(a) A computer that has a processor that is compatible vvith the original IBM PC.
(b) A computer that has a processor that is similar to original IBM PC
(c) A computer that has a casing that is similar original IBM PC.
(d) None of the above

(14) What do you mean by "virtual? Select'all that apply:
(a) In general, it distinguishes something that is merely conceptual from something that has physical reality,
(b) Real
(c) Not real.
(d) None of the above

(15) Select correct statement describing a term 'stateless'?
(a) Having all information about what occurred previously
(b) Having some information aboot what occurred previously
(c) Having no information about what occurred previously
(d) Having new information about what occurred previously
2004
i) When all access and processing is done in one location, a computer system is said to be
(a) networked
(b) distributed
(c) centralized
(d) linked

(ii) Tools to change PROM chips, called
(a) chip kits
(b) RAM burners
(c) PROM burners
(d) none of these

(iii) The type of modulation that changes the height of the single is called (a) frequency
(b) phase
(c) amplitude
(d) prophase

(iv) A connection for similar network:
(a) satellite
(b) bridge
(c) gateway
(d) fax

(v) The technology whereby part of the program is stored on disk and is brought into memory for execution as needed is called
(a) memory allocation
(b) virtual storage
(c) interrupts
(d) prioritized memory

(C) Write '"True" or "False" in your answer book about the following statements: (5)

(i) Application software may be either custom or packaged. True
(ii) RISC technology uses more instructions than traditional computers.True
(iii) A ring network has no central host computer.True
(iv) Satellites use line-of-sight transmission.False
(v) Time-sharing is both event-driven and time-drive
2005
8. (A) For whom the following abbreviations stand for
(i) DNS : Domain Name System
(ii) CMOS : Complementary metal–oxide–semiconductor
(iii) OSI : Open Systems Interconnection
(iv) CASE : Computer Aided Software engineering
(v) DDE Dynamic Data Exchange

(B) Fill in the blanks with the most suitable options for the following statements:
(i) A data path to transfer data is called…………………Physical medium (not sure)
(ii) What is combination of I-time and E-time called.............................Machine Cycle
(iii) The process of applying a formula to a key is called……………….
(iv) Distortion in the received signals is called………………………
(v) DMA is a technique to transfer data between memory and ……………..IO devices

(C) Write “TRUE” or “FALSE”
(i) RISC technology used fewer instructions then traditional computers.True
(ii) Direct file organization is combination of sequential and indexed file organization.True
(iii) Fax is a connection of similar networks. True not sure
(iv) Let G=(V,E) be an undirected graph when G is a free tree.True
(v) An entity instance is a single occurrence of an entity True
2006
Q.8 (A) Write the terms on your answer book for whom the following abbreviations stand for:

1) BIOS : Basic Input and output system
2) DOS Disk operating system
3) SIMM : single inline memory module
4) SCSI : Small Computer System Interface
5) DASD Direct Access storage device

(B) Choose the most appropriate answer from the given set of options:

6) The processor’s components are synchronized by:
a. Instructions
b. Data
c. Information
d. Clock pulses
7) External devices are linked to a small computer system through:
a. Channels
b. Control units
c. Plugs
d. interfaces
8) Data on disk are recorded on a series of concentric circle called:
a. Sectors
b. Cylinders
c. Blocks
d. Tracks

9) The simplest data structure is a:
a. File
b. List
c. Record
d. Array

10) Several computers linked by communication lines for a:
a. Network
b. Distributed system
c. Time share system
d. Ring


(C) write true (T) or false (F) in your answer book about following statements:

11) programs are loaded into main memory by the operating system’s memory manager
12) with sequential access, records can be accessed in any order False
13) the process of removing errors from a program is called compilationFalse
14) data flow over a bus is parallel
15) one instruction is fetched and executed by computer during a single machine cycle True
.
1. PCB STANDs for
(b) Program Control Block   2. Process of managing multiple - processes in a uni processor is (b) MULTI PrOCESSING

3. (c) Every Row and every Column in PRODUCT    4. (b) ROLL BACK

5. a) 0.0 and 1.0    6. Uniform Cost - not sure though


7 (c). STructure and architectural design       8. (d) All

9. (a) - not sure    10. (c)    11. (a)   12. (b)    13. (b) Star     14. (c)   15. (d)   16. (e) 17. (c)18. (c)19. (a)20. (d)
2013
1.Which of the following best describes "virtual memory"?

a. A portion of the hard disk considered as RAM.
b. Extended memory on the secondary storage that is used whenever physical memory is full .
c. The abstraction of separating logical memory - memory as seen by the process - from physical memory - memory as seen ny the processor.
d. It is the page file in Windows folder.
e. None of these.

2.The 'cmp' instruction modifies the:

a. Instruction register.
b. Flags register.
c. Segment register.
d. None of these.

3.Consider the following page reference string:
1,2,3,4,2,1,5,6,2,1,2,3,7,6,3,2,1,. Assuming there are 4 page framess available and that all frames are initially empty, what is the total number of page faults that would occur for the page reference string above if the least-recently-used (LRU) replacement policy is used?

a. 6
b. 9
c. 10
d. 11
e. None of these

4.The Banker's algorithm is used to _________

a. Rectify deadlock
b. Detect deadlock
c. Prevent deadlock
d. Avoid deadlock
e. None of these

5.The necessary conditions needed before deadlock can occur are ________.

a. No Mutual Exclusion, Hold and wait, Preemption, Circular Wait.
b. Mutual Exclusion, No Hold and wait, Preemption, Circular Wait.
c. Mutual Exclusion, Hold and wait, No Preemption, Circular Wait.
d. Mutual Exclusion, Hold and wait, Preemption, No Circular Wait.

6.Differences between data lick layer and transport layer error detection is that:

a. Data link detects transmission errors while transport layer detects segmentation faults.
b. Data link detects node-to-node errors while transport layer detects end-to-end errors.
c. Data link detects end-to-end errors while transport layer detects node-to-node errors
d. Data link detects segmentation errors while transport layer detects bit error.
e. None of theses

7.Phase Shift Keying (PSK) method is used to modulate digital signals at 9600bps using 16 levels. The line signals speed (i.e. modulation rate) will be:

a. 1200 bands
b. 2400 bands
c. 4800 bands
d. 9600 bands
e. None of these

8.Exception handling is a powerful tenchnique that separates error-handling code from ______ code

a. Buggy
b. Faulty
c. Normal
d. Exceptional
e. None of these

9.When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the:

a. Stack pointer
b. Accumulator
c. Programs counter
d. Stack
e. None of these

10.Binary tree "preorder" traversal is defined recursively as follows:

a. Traverse left subtree, visit the root, traverse right subtree
b. Traverse right subtree, visit the root, traverse left subtree
c. Visit the root, traverse left subtree, traverse right subtree
d. traverse left subtree, traverse right subtree, visit the root
e. None of these

11. What value will return to the operating system upon the successful completion of a program?

a. -1
b. 1
c. 0
d. None of these

12. Which of the following is TRUE about given UML diagram?





a. Checking Accound is a generalization of Saving Account
b. Bank Account is composition of Checking Account and Saving Account
c. Saving Account can process Check
d. Checking Account has a balance?
e. None of theses

13. The advantages of creating a prototype are:

a. It allows developers to experiment with number of different design options.
b. It can serve as means of communication between developers and customers.
c. It is better than water fall model
d. Both a and b
e. None of these

14. Choose the correct statement:

a. Testing can show the presence of bugs but never their absence
b. Testing can always find all the bugs
c. Testing can always be exhaustive
d. If we test enough then we can find all of the bugs
e. None of these

15. Which of the following operations need the participating relations to be union compatible?

a. UNION
b. INTERSECTION
c. DIFFERENCE
d. All of these
e.None of these

16. The language used in application programs to request data from the DBMA is reffered to as the:

a. DML
b. DDL
c. VDL
d. SDL
e. None of these

17. What is the correct XHTML for a paragraph?

a. <P></p>
b. <P></P>
c. <p></p>
d. </p><p>
e.None of these

18. Which of the follwoing HTML form method is suitable when you need to send larger form submission?

a. Get
b. Post
c. Both Get and Post
d. Ajax
e.None of these

19. (2,4) is a point on a circle that has senter at the origion. Which of the follwoing points are also on circle?

a. (2,-4)
b. (-2,4)
c. (4,-2)
d. All of the above
e.None of these

20. In Bresenham's algorithm, while generating a circle, it is easy to generate?

a. One octant first and other by successive reflection
b. One octant first and other by successive rotation
c.One octant first and other by successive translation
d.All octants
e.None of these.























i) c .Management
ii) I dont understand the question but my guess is 8. though it is an intel's product line specific....
iii) b. DMA (Direct memory access)
iv) a. bit, byte, field, record, file, database
v) b. External
vi) b. Specification, Design and code generation
vii) b. Smoke testing
viii) a . 42
ix) a. inheritance
x) a. five user jobs
xi) b. atomic, consistency, isolation and durability
xii) b. rollback
xiii) c. has an ip address
xiv) a. adaptive
xv) d. 10Mbps
xvi) a. bridge
xvii) c. link state
xviii) c. encapsulation
xix) d. distance vector
xx) a. Distributed OS
2010
(1).object (also called_____) is a common data type that includes photograph, audio, vedio, or a document in other applications.
(a) Number (b) BLOB (c) Integer (d) binary (e) none of these

2. in database, a(n) ____ field is a group of related fields.
(a) Table (b) Key (c) Record (d) Primery field (e) Non of these

3. In a database, a(n) ____ field is a field that uniquely identifies each record in a file.
(a) Main (b) Identifying (c) Master (d) Key (e) none of these

4. If a lowest annual fee at a discount wherehouse is Rs.2025 and the highest is Rs.5550, a(n)______ on annual fee field ensure it is a value between Rs.2025 and Rs.5550.
(a) Range Check (b) compelteness check (c) consistency Check (d) alphabetic/numeric check (e) none of these

5. A DBMS uses the _____ to perform validation checks.
(a) Data Server (b) data smart (c) data where house (d) data dictionary (e) none of these

6. _______ is a network technology that defines how messages are routed from one end of a network to other, ensuring the datat arrives correctly by dividing it into packets.
(a) HTML (b) XML (c) HTTP (d) TCP/IP (e) none of these

7. When a computer sends data over the internet, the data is divided into small pieces , or _______
(a) Bundles (b) packets (c) slices (d) baskets (e) none of these

8. The amount of data, instructions and information that can travel over a communication channel sometimes is called _______
(a) broadband (b) baseband (c) latency (d) bandwidth (e) none of these

9. fiber optic cables have all of the following advantages over cables that used wire except _______
(a) lower costs & easier installation and modification
(b) Faster data transmission & smaller size
(c) Less susceptible to noise from other divices
(d) Better security for signals during transmission
(e) none of these

10. A_____ is a network that connects compter and divices in a limited geographical area, such as home, school computer laboratory , or office building
(a) LAN (b) MAN (c) WAN (d) VAN (e) none of these

11. with _______ memory , the operating system allocates a portion of storage medium, usually the hard disk , to function as additional RAM
(a) Virtual (b) performance (c) device (d) Manged (e) none of these

12. If a new a device such as printer or scanner is attached to a computer, its _________ must be installed before the divice can be used
(a) Driver          (b) platform (c) manager (d) kernel (e) none of these

13. A ________ is an icon on the desktop that provides a user with immediate access to a program or file.
(a) kernel (b) spooler (c) buffer         (d) Shortcut         (e) none of these

14. ________ a disk or reorgnizing it so the files are stored in contiguous sectors, speeds up disk access and thus performance of entire computer .
(a) Formating (b) Defregmenting (c) Spooling        (d) compressing (e) none of these

15.the term cmputer _______ discribes potentially damging computer program that affects or infects a computer by altering the way the compter works without the users knowledge or permission .
(a) Hot spot (b) File compression Utillty(c) Virus (d) File conversion Utillity (e) none of these

16. In a diagram ( a DFD diagram was given ) _________ shows the input and output of information into or out from a prosses .
(a) Use Case (b) Data Flow (c) entity relationship (d) Class Diagram (e) none of these

17. Although used in all types of bussiness modeling the _____ has been adopted as a standard notation for object modeling.
(a) UML (b) CASE Tool (c) USE CASE Diagram (d) EMR (not sure) (e) none of these

18. For each input and output, a systems analyst tipicaly develops _______ which is a sample of the input or output and contains actual data.
(a) adoption(b) prototype (c) Mockup (d) feasibility Scheme (e) none of these

19. _________ is a working modle of propesedsystem .
(a0 Adoption (b) feasibilty Scheme (c) Mockup (d) Prototype (e) none of these

20. A unit test ________
(a) verifies that each individule program works by itself
(b) verifies that all programs in an application work togather properly
(c) verifies that an application works with other applications
(d) is performed by end-users and verifies that the new system works with actual data
(e) none of these
2009












1. PCB STANDs for
(b) Program Control Block


2. Process of managing multiple - processes in a uni processor is (b) MULTI PrOCESSING

3. (c) Every Row and every Column in PRODUCT

4. (b) ROLL BACK

5. a) 0.0 and 1.0

6. Uniform Cost - not sure though


7 (c). STructure and architectural design

8. (d) All

9. (a) - not sure

10. (c)

11. (a)


12. (b)

13. (b) Star

14. (c)

15. (d)

16. (e)

17. (c)

18. (c)

19. (a)

20. (d)

2007

8. Write only the correct answer in the Answer Book. Do not reproduce the questions.

(1) If the highest frequency of a signal is 2100 Hz and lowest frequency of a signal is 200 Hz, sample rate will be:
(a) 4000 Hz
(b) 4600 Hz
(c) 4200 Hz
(d) 2300 Hz
(e) None of these

(2) A 56 K modem can download at a rate of _________ Kbps and upload at a rate of _________ Kbps.
(a) 33.6; 33.6
(b) 33.6; 56.6
(c) 56.6; 33.6
(d) 56.6; 56.6
(e) None of these

(3) A system call provides interface between:
(a) A process and a thread
(b) A thread and a user program
(c) A process and an operating system
(d) A process and a user program
(e) None of these

(4) CPU scheduling information about a process is held by:
(a) a PC
(b) the CPU Register
(c) the Cache
(d) a PCB
(e) None of these

(5) An example of Last-In-First-Out (LIFO) data structure is a:
(a) Class
(b) List
(c) Stack
(d) Tree
(e) None of these

(6) In Object Oriented Programming, overload methods:
(a) Can have the same types and number of parameters as another method with the same name in the same class as long as the return type is different.
(b) Cannot be used as methods that manipulate attributes
(c) Must always have different number of parameters
(d) Must have different number of parameters or if the number of parameters is the same a different sequence of parameter type
(e) None of these

(7) If you wanted to sort many large objects or structures, it would be most efficient to:
(a) Place them in an array and sort the array
(b) Place pointers to them in an array and sort the array
(c) Place them in a linked list and sort the linked list
(d) Place references to them in an array and sort the array
(e) None of these

(8) The type of the variable a pointer points to must be part of the pointer’s definition so that:
(a) Data types do not get mixed up when arithmetic is performed on them.
(b) Pointers can be added to one another to access structure members
(c) No one’s religious conviction will be offended
(d) The computer can perform overloading
(e) None of these

(9) If we have a tree of n nodes, its depth can be calculated as:
(a) Log2 (n+1) – 1
(b) Log2 n
(c) Log2 (n+1) – 1
(d) Log10 (n+1) – 1
(e) None of these

(10) Which one of the following methods does not change the original value of the argument in the calling function?
(a) Call by passing reference of the argument
(b) Call by passing the address of the argument
(c) Call by passing value of the argument
(d) Call by passing pointer of the argument
LECTURER COMPUTER SCIENCE MCQS PAPER 2011

Q.1. Select the best option/answer and fill in the appropriate box on the Answer Sheet. (20)

(i) AX register is also known as:
(a) Accumulator
(b) Collector
(c) Distributor
(d) Counter
(e) None of these

(ii) In the Base + Offset addressing, Offset address is also known as:
(a) Physical Address
(b) Logical Address
(c) Actual Address
(d) Instruction Address
(e) None of these

(iii) The technique for allowing a unit to check the status of another independently function unit is known as?
(a) Interrupt
(b) System call
(c) Polling
(d) Trape
(e) None of these

(iv) The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is known as:
(a) Spooling
(b) Contention
(c) I/O wait
(d) Buffering
(e) None of these

(v) The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these

(vi) _________ Scheduler deals with the decision as to whether to admit another new job to the system.
(a) High Level
(b) Medium Level
(c) Low Level
(d) Short term
(e) None of these

(vii) When the process is in the states of Blocked Suspended or Ready Suspended, its relevant data is
stored in:
(a) Main Memory
(b) Hard Disk
(c) Magnetic Tape
(d) Buffer
(e) None of these

(viii) Priority, P = (Time Waiting + Run Time) / Run Time is used to calculate priority in __________ scheduling algorithm:
(a) Shortest Job First
(b) Priority Scheduling
(c) Longest Wait First
(d) Highest Response Ratio Next
(e) None of these

(ix) HDLC Protocol stands for:
(a) High-Level Data Link Control
(b) High Level Development Protocol
(c) Huge Level Data Link Control
(d) High Development Level Control
(e) None of these

(x) _________ is the generic name for a set of standards issued by the International CommunicationsStandards Body CCITT, designed to support Message Handling Systems; i.e. Electronic Mail.
(a) TCP/IP
(b) ISDN
(c) X.400
(d) X.25
(e) None of these

(xi) ________ layer is responsible for the transfer of a packet of data along one link in the network. It organizes data into frames and detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these

(xii) Encryption is the conversion of data in some intelligible format into an unintelligible format called _________ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these

(xiii) Binary search requires about ______ comparisons with an initial list of 1,000,000 elements.
(a) 10
(b) 20
(c) 35
(d) 100
(e) None of these

(xiv) A _________ header list is a header list where the last node contains the null pointer.
(a) Grounded
(b) Circular
(c) One way
(d) Rooted
(e) None of these

(xv) ________ are small applications that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.
(a) Applets
(b) Java Bean
(c) Sockets
(d) Java Component
(e) None of these

(xvi) AWT stands for:
(a) Abstract Window Technique
(b) Abstract Window Toolkit
(c) Actual Window Technique
(d) Added Window Toolkit
(e) None of these

(xvii) GIF images can have only upto _______ colors.
(a) 128
(b) 256
(c) 512
(d) 1024
(e) None of these

(xviii) ________ is stored on a client and contains state information of the website visited.
(a) Cookies
(b) Servlet
(c) History
(d) Resident Page
(e) None of these

(xix) In software Engineering KPA denotes.
(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these

(xx) The ________ Process Model defines a series of events that will trigger transitions from state to state for each of software engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these

Important Computer Question For Competitive Examination

  • The primary job of the operating system of a computer is to- Manage resources.
  • Portable program means- Independent of a platform.
  • Which language is more suited to a structured program- PASCAL.
  • Bridge works in which layer of the OSI model- Datalink layer.
  • Mechanical devices in the computer are called- Hardware.
  • The storage device in the computer – DVD.
  • The largest unit of storage in computers- Terabyte.
  • Which software is more useful in preparing a report with statistical & accounting analysis?- MS Excel.
  • The ipv4 address is- 32 bit.
  • The last address of IP address represents- Broadcast address.
  • CSS in an acronym for- Cascading System Style.
  • The machine readable form a program is called as- Object code.
  • The use of form in HTML is- to collect user input.
  • A computer port is used to- communicate with other computer peripherals.
  • SQL stands for- Structured Query Language.
  • CD stands for- Compact Disc.
  • The protocol is used for the Internet access- TCP/IP.
  • Color monitor consist of three colors- Red, Green, Blue.
  • When a disc is formatted – everything will be lost.
  • Bluetooth operations use- Radio Technology.
  • The difference between LAN & WAN- Distance covered.
  • Open source operating system- Redhat Linux.
  • The storage capacity of 500 GB- 500 * 2^30 bytes.
  • When a computer start then which component works first- Bios.
  • A CD- Rom drive is labeled with 52*. Here 52* is a measurement of- Revolution per minute.
  • A maximum number of rows in an excel sheet- 65536.
  • McAfee is an- Utility Software.
  • A hard disk is divided into tracks which are subdivided into- sectors.
  • Commands is given to reboot the computer- Ctrl+Alt+Del.
  • MPEG extension refers to- Video file.
  • VOIP extension refers to- Voice Over Internet Protocol.
  • CTRL+C will result in- Saving the document.
  • BAK extension refers to- Backup file.
  • MPG extension refers to- Animation/ movie file.
  • INI extension usually refers to- System file.
  • Who developed Yahoo- David Filo & Jerry Yang.
  • DB refers to- Data Base.
  • OS refers to- Operating System.
  • DOCSIS refers to- Data Over Cable Service Interface Specification.
  • Which of the following are you probably using if you are viewing windows & Icons- Graphical User Interface.
  • CTRL+ E will result in- Centre Alignment.
  • BMP & GIF refers to- Graphics file.
  • CD-Rom is an- Optical Memory.
  • Terabyte consists of- 1024 Gigabyte.
  • Windows media player in an- application software.
  • RAM is located in- Motherboard.
  • Linux is a- Operating System.
  • The base of 16 number system is – Hexadecimal. 49.
  • The icon is a- Pictorial representation of an operation.
  • The scanner used in the banking industry- MICR.
  • Access time is- made up of data transfer time.
  • Laser printers are known as- page printers.
  • F7 refers to- spell checking.
  • The terms refer to the sharpness of image- resolution.
  • The computer which is called midrange computer- Mini computer.
  • If a computer on the network share resources for others to use, is called- Server.
  • CTRL+ end key- to move to the bottom of the document.
  • MICR stands for- Magnetic Inc Character Reader/ Recognition.
  • ASCII stands for- American Standard Code for Information Interchange.
  • One megabyte is equal to- 1024 kilobyte.
  • The output quality of a printer is measured by- Dot per inch.
  • JPG extension refers to- Image file.
  • Another word for the CPU- Microprocessor.
  • ORACLE is a- Database Software.
  • Secondary Storage device- ROM.
  • VSAT stands for- Very Small Aperture Terminal.
  • Common keyboard arrangement is called- QWERTY.
  • Which types of interface allow connecting, control musical instrument to computer-
  • MIDI (Musical Instrument Digital Interface).
  • Every web page has a unique address called- Uniform Resource Locator.
  • LOTUS is an- Application package.
  • In data communication which device converts digital data to analog signal- Modem.
  • Which type of ROM is used in Pen Drive- EEP-ROM.
  • IP is a- Layer 3 Protocol.
  • F1 stands for- Help. 75. Elaboration of VIRUS- Vital Information Resource Under Seize.
  • In a flowchart, a diamond generally stands for- Decision.
  • EXE generally refers to- Executable file.
  • The type of internet connection might be compared to a regular telephone call in terms of its duration-dial up.
  • SCSI stands for- Small Computer System Interface.
  • Which must do the return compressed files to their original state- Extract?
  • The function of Gateway is- to connect two dissimilar networks.
  • The ASCII Code of A is- 65.
  • URL means- Uniform Resources Locator.
  • RAM is-Volatile.
  • OSI model has- 7 Layer.
  • A record is a- collection of bytes.
  • OMR means- Optical Mark Reader.
  • Firmware is built using- ROM.
  • Control unit- directs the movement of electrical signals.
  • Flash memory is- nonvolatile.
  • The most frequently used instructions are kept in the- Cache Memory.
  • PCMCIA represents a standard for- Notebook.
  • Which is an essential component of a LAN- NIC.
  • In simplex transmission- data travel is only one direction at all times.
  • Bandwidth means- Bit per inch.
  • Bluetooth is the popular name for the- Wireless networking standard.
  • CPU is combination of- Arithmetic logic & control unit.
  • MSI stands for- Medium Scale Integrated Circuits.
  • The name of the first Computer- ENIAC.
  • A computer connected to the server is called- workstation.
  • INTI extension refers to- System file.
  • 1 nibble is equal to- 4 bites.
  • LED stands for- Light Emitting Diode.
  • DOS is a-Disk Operating System.
  • BIOS is stored in a computer in its- ROM.
  • BIOS is a- Software/ firmware.
  • PDF stands for- Portable Document format.
  • A cookie is a- Internet Information file.
  • An electrical pathway within a computer is called- Bus.
  • To open a new window- Ctrl+N.
  • For launching slide Show- F5.
  • Which number is used to store data in computer- Binary?
  • Ctrl+C indicates- Copy.
  • Predecessor of modern internet- ARPANET.
  • Fastest data transmission media- Fiber optic cable.
  • Full form of RAID- Redundant Array of Independent Disks.
  • Which is most commonly used in HTTP methods- GET & POST?
  • The Internet is an example of- Packet-switched network.
  • Which memory application policy allocate the largest hole to the process- Worst fit.
  • Which disk format can access by MS Dos 6.0?- FAT.
  • Which memory needs a refresh- DRAM.
  • The most commonly used encoding standard of Unicode- UTF 8.
  • What is the full form of AT in the IBM PC AT- Advance Technology.
  • In which mode windows start with only the core drivers & services- Safe mode.
  • The physical connection between microprocessor memory & other parts is called- Address bus.
  • Which language that computer can understand & execute- Machine language.
  • Chips are made up of millions of tiny parts known as- Transistors.
  • What is the unit of measurement for drive access time- milliseconds.
  • Which word in a web page when clicked, opens another document on the site- Hyperlink.
  • Which key is to be pressed in a computer for moving to the beginning of a text-Home.
  • The local antenna for satellite connection is called- VSAT.
  • F12 indicates- Save as.
  • ISP stands for- Internet Service Provider.
  • What does a computer stand for storing programs & data for access by the user- Hard Drive.
  • The term dot per inch refers to- Resolution.
  • The printer is an- offline device.
  • Computer terminals usually have- keyboard only.
  • A unit of unit code comprise-16 bits.
  • Disk storage is a special type of- memory.
  • The small circuit board on which the main memory DRAM is physically packaged is called- DIMM.
  • A destination for data going outside the system is called- Sink.
  • The task of the debugging program is to look into all programs to- locate & correct errors.
  • What does the computer process into information- data.
  • Which is the most common type of storage device- Magnetic.
  • What is the name of the structure where data move through a network- packets.
  • The place value in a string of decimal digits is expressed by- powers of 10.
  • The logic gate NOT has- one input & one output
  • LCD stands for- Liquid Crystal Display. 149.
  • The topology connects all computers in a network by a single cable with a terminal at each is called- ring.
  • PROM chips- Permanently stores information without a program.
  • The wheel of the mouse can make it easier to do what ?- Scroll through documents.
  • Which of the following measures the speed of a dot matrix printer- CPS.
  • The floppy disk is a- storage device.
  • The hexadecimal number 9 is equal to- decimal 9.
  • A complete microcomputer system consists of- Microprocessor.
  • The computer stores its program & data in its- Memory.
  • What kind of secondary storage is provided by magnetic disks- Slow speed high capacity.
  • The brain of a computer within the CPU is- ALU.
  • Which menu includes the command find- Format.
  • Permanent memory of a computer- ROM.
  • CRT stands for- Cathode Ray Tube.
  • Magnetized bits on a disk surface are arranged along concentric rings known as- Tracks.
  • 1-kilo byte is equal to-2^10 byte.
  • Encryption of data means- Data is encoded so it cannot be read without decoding software.
  • When a computer first turned on or restarted, a special type of absolute loader is executed, called- bootstrap loader.
  • Each IP packets contain- Source & destination address.
  • What does router do in a network- Determines on which outgoing link packet is to be forwarded.
  • In a client/ server model, a client program- asks for information.
  • Which is used to transfer file- FTP.
  • Which organization defines the web standards- World Wide Web consortium.
  • The computer that has no hard disk storage but sends input & receives output from the server is known as- Thin client.
  • The main circuit board in a PC is called- Motherboard.
  • A network used for sharing data, software & hardware among the several users owning microcomputers is called-SAN.
  • WWW stands for- World Wide Web.
  • If electrical power is disrupted, data & programs are lost in RAM.
  • UNIX is an- Operating System.
  • WAN stands for- Wide Area Network.
  • Windows is an- Operating system.
  • MS Access is a- database software.
  • Generally D drive is considerd for- hard disk drive.
  • USB stands for- Universal Serial Bus.
  • The computer use in operation what kind of mathematics-Boolean.
  • GSM stands for- Global system for mobile.
  • The utility program could improve the speed of disk- Defragmentation.
  • One millisecond is equal to- 1000th of a second.
  • Properly arranged data is called- Information.
  • A byte has- 8 bits.
  • The process of starting computer is- Boot.
  • EBCDIC stands for-Extended Binary Coded Decimal Interchange Code.
  • What is the brain of a computer- CPU.
  • What is the another name of Floppy Disk- Diskette?
  • Which American computer company is called big blue- IBM.
  • An integrated circuit is- Fabricated on a tiny silicon chip.
  • What is the most important advantage of an integrated circuit Extremely high reliability
  • What are two main components of a CPU- Control unit & ALU.
  • Ctrl+I – Applies Italic.
  • The intersections of a row & column are called- a cell.
  • Ctrl+B- Bold.
  • ATM stands for- Automated Teller machine.
  • RAM stands for- Random Access Memory.
  • Supercomputers are those which- can perform billions of calculations per second.
  • The decimal equivalent of (101.110)2 is- 5.75.

 



1 comment:

  1. The best way to calculate the RAM allocation is as follows. To find that the user needs to find all the programs that is running simultaneously. After listing those running programs the needed amount of RAM can be found by adding them all together.
    The processing of the ongoing programs in a system takes place simultaneously.
    So, each and every program in the system is taking up a certain space in the RAM.
    This is how the storage space or operating space of a RAM is utilized.
    If you want to know that Select the Best Way to Determine Your Ram allocation then click this link for more information:
    Select the Best Way to Determine Your Ram allocation

    ReplyDelete