1. The right click option of mouse is NOT used in which of the following?
1) To copy selected text into the clipboard
2) To rename file
3) To cut the selected text
4) To access properties of an object
5) None of these
2. .......... is the process of dividing the disk into tracks and sectors.
1) Tracking
2) Formatting
3) Crashing
4) Allotting
5) None of these
3. A place in the computer system where data and programs are temporarily stored is called....
1) paste
2) open
3) memory
4) pocket
5) None of these
4. Correcting errors in a program is referred to as...
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these
5. Graphical diagrams are used to represent multiple perspectives of a system which include
1) use-case, class and state diagrams
2) state, interaction and derivative diagrams
3) interaction, relationship and class diagrams
4) deployment, relationship and use-case diagrams
5) None of these
6. Which is the best view for representing your thoughts as a presentation of a computer?
1) Outline view
2) Notes page view
3) Slide sorter view
4) Slide view
5) None of these
7. What does SMPS stand for?
1) Switched Mode Power Supply
2) Single Mode Power Supply
3) Simple Mode Power Supply
4) Synchronous Mode Power Supply
5) None of these
8. RSA is........
1) Symmetric Cryptosystem
2) Digital Signature
3) Asymmetric Cryptosystem
4) Block Cypher
5) None of these
9. ......... hardware technology was used to fifth-generation computers.
1) Transistors
2) Valves
3) ICS
4) ULSI
5) VLSI
10. For each instruction in program memory the CPU goes through a ........
1) decode - fetch - execute sequence
2) fetch - decode - execute sequence
3) fetch - execute - decode sequence
4) execute - store - decode sequence
5) fetch - store - decode sequence
11. A proxy server is used for which of the following?
1) To provide security against unauthorised users
2) To process client requests for web pages
3) To process client requests for database access
4) To provide TCP / IP
5) None of these
12. A repair for a known software bug, usually available at no charge on the Internet, is called a(n).....
1) Version
2) Patch
3) Tutorial
4) FAQ
5) None of these
13. A modem performs.....
1) Modulation
2) Demodulation
3) Data compression
4) All of these
5) None of these
14. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) All of the above
5) None of these
15. A failure that occurs in an Oracle program when there is a logical failure in handling of a statement is called.........
1) Instance failure
2) Media failure
3) Process failure
4) Statement failure
5) User error
16. Which of the following represents the size of a floppy?
1) 3.5 inches
2) 5.25 inches
3) 8.0 inches
4) All the above
5) None of these
17. To format a number in date format, press..
1) Ctrl + Shift + @
2) Ctrl + Shift + #
3) Ctrl + Shift + %
4) Ctrl + Shift + $
5) Ctrl + Shift + ∗
18. ........ uses an embossed steel band to form the letters printed on the paper.
1) Laser printer
2) Dot-matrix printer
3) Daisy wheel printer
4) Band printer
5) Ink-jet printer
19. OR, XOR and AND functions can be performed by .............. of a computer in the CPU.
1) Memory
2) CU
3) Register
4) ALU
5) Processor
20. Internet provides....
1) Online communication
2) Software sharing
3) Customer support service
4) Online journals and magazines
5) All of the above
21. System software is the set of programs that enables your computer's hardware devices and ................ software to work together.
1) Management
2) Processing
3) Utility
4) Application
5) None of these
22. ............................ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these
23. SMPT, FTP and DNS are applications of the ............. layer.
1) data link
2) network
3) transport
4) application
5) None of these
24. According to which of the following, in a database, should information be organised and accessed?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these
25. WORM stands for ....
1) Wanted One Read Memory
2) Write Once Read Many
3) Write Original Read Many
4) All the above
5) None of these
26. Which of the following is separate software layer that acts as 'glue' between the client and the server parts of an application and provides a programming abstraction?
1) Freeware
2) Firmware
3) Shareware
4) User-supported software
5) Middleware
27. Which of the following is a must for a computer?
1) Chip
2) Data
3) Mouse
4) Processor
5) None of these
28. Disk can be used to store.......
1) Random files
2) Sequential files
3) Both (1) and (2)
4) Horizontal files
5) None of these
29. A derived class may also be called as.....
1) sub-class
2) super class
3) parent class
4) deprived class
5) None of these
30. The capacity of program counter is.......
1) 8 bits
2) 14 bits
3) 16 bits
4) 12 bits
5) 32 bits
31. In ........... generation computer the speed was measured in nanoseconds.
1) first
2) second
3) third
4) fourth
5) fifth
32. The process of transferring of files from your computer to the computer on the internet is called .......
1) downloading
2) uploading
3) FTP
4) JPEG
5) downsizing
33. Timing and control unit is a part of a(n)....
1) ALU
2) Processor
3) Memory
4) CMOS
5) BIOS
34. Chip is the common name for a(n)....
1) transistor
2) resistor
3) integrated circuit
4) semiconductor
5) None of these
35. ................. is developed specifically for a distinct industry.
1) Personal productivity software
2) Application software
3) Decision support system
4) Vertical market software
5) System software
36. Which of the following services is not provided by Internet service provider?
1) Internet transit
2) Domain name registration
3) Hosting
4) Dial-up access
5) None
37. A source program is written in a ............. language.
1) high-level
2) low-level
3) binary
4) All the above
5) None of these
38. The transfer rate of a standard USB 2.0 Device is .....
1) 100 M bit/s
2) 250 M bit/s
3) 480 M bit/s
4) 500 M bit/s
5) 1 G bit/s
39. The control part of a disk is known as
1) surface
2) hub
3) cylinder
4) cluster
5) None of these
40. Which of the following languages is used for process control?
1) ADA
2) COBOL
3) BASIC
4) PASCAL
5) LISP
ANSWERS:
1-5, 2-2, 3-3, 4-1, 5-1, 6-1, 7-1, 8-2, 9-4, 10-2
11-1, 12-2, 13-4, 14-2, 15-4, 16-4, 17-2, 18-4, 19-4, 20-5
21-4, 22-2, 23-4, 24-2, 25-2, 26-5, 27-4, 28-3, 29-1, 30-3
31-3, 32-2, 33-2, 34-3, 35-4, 36-5, 37-1, 38-3, 39-2, 40-1.
1) To copy selected text into the clipboard
2) To rename file
3) To cut the selected text
4) To access properties of an object
5) None of these
2. .......... is the process of dividing the disk into tracks and sectors.
1) Tracking
2) Formatting
3) Crashing
4) Allotting
5) None of these
3. A place in the computer system where data and programs are temporarily stored is called....
1) paste
2) open
3) memory
4) pocket
5) None of these
4. Correcting errors in a program is referred to as...
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these
5. Graphical diagrams are used to represent multiple perspectives of a system which include
1) use-case, class and state diagrams
2) state, interaction and derivative diagrams
3) interaction, relationship and class diagrams
4) deployment, relationship and use-case diagrams
5) None of these
6. Which is the best view for representing your thoughts as a presentation of a computer?
1) Outline view
2) Notes page view
3) Slide sorter view
4) Slide view
5) None of these
7. What does SMPS stand for?
1) Switched Mode Power Supply
2) Single Mode Power Supply
3) Simple Mode Power Supply
4) Synchronous Mode Power Supply
5) None of these
8. RSA is........
1) Symmetric Cryptosystem
2) Digital Signature
3) Asymmetric Cryptosystem
4) Block Cypher
5) None of these
9. ......... hardware technology was used to fifth-generation computers.
1) Transistors
2) Valves
3) ICS
4) ULSI
5) VLSI
10. For each instruction in program memory the CPU goes through a ........
1) decode - fetch - execute sequence
2) fetch - decode - execute sequence
3) fetch - execute - decode sequence
4) execute - store - decode sequence
5) fetch - store - decode sequence
11. A proxy server is used for which of the following?
1) To provide security against unauthorised users
2) To process client requests for web pages
3) To process client requests for database access
4) To provide TCP / IP
5) None of these
12. A repair for a known software bug, usually available at no charge on the Internet, is called a(n).....
1) Version
2) Patch
3) Tutorial
4) FAQ
5) None of these
13. A modem performs.....
1) Modulation
2) Demodulation
3) Data compression
4) All of these
5) None of these
14. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) All of the above
5) None of these
15. A failure that occurs in an Oracle program when there is a logical failure in handling of a statement is called.........
1) Instance failure
2) Media failure
3) Process failure
4) Statement failure
5) User error
16. Which of the following represents the size of a floppy?
1) 3.5 inches
2) 5.25 inches
3) 8.0 inches
4) All the above
5) None of these
17. To format a number in date format, press..
1) Ctrl + Shift + @
2) Ctrl + Shift + #
3) Ctrl + Shift + %
4) Ctrl + Shift + $
5) Ctrl + Shift + ∗
18. ........ uses an embossed steel band to form the letters printed on the paper.
1) Laser printer
2) Dot-matrix printer
3) Daisy wheel printer
4) Band printer
5) Ink-jet printer
19. OR, XOR and AND functions can be performed by .............. of a computer in the CPU.
1) Memory
2) CU
3) Register
4) ALU
5) Processor
20. Internet provides....
1) Online communication
2) Software sharing
3) Customer support service
4) Online journals and magazines
5) All of the above
21. System software is the set of programs that enables your computer's hardware devices and ................ software to work together.
1) Management
2) Processing
3) Utility
4) Application
5) None of these
22. ............................ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these
23. SMPT, FTP and DNS are applications of the ............. layer.
1) data link
2) network
3) transport
4) application
5) None of these
24. According to which of the following, in a database, should information be organised and accessed?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these
25. WORM stands for ....
1) Wanted One Read Memory
2) Write Once Read Many
3) Write Original Read Many
4) All the above
5) None of these
26. Which of the following is separate software layer that acts as 'glue' between the client and the server parts of an application and provides a programming abstraction?
1) Freeware
2) Firmware
3) Shareware
4) User-supported software
5) Middleware
27. Which of the following is a must for a computer?
1) Chip
2) Data
3) Mouse
4) Processor
5) None of these
28. Disk can be used to store.......
1) Random files
2) Sequential files
3) Both (1) and (2)
4) Horizontal files
5) None of these
29. A derived class may also be called as.....
1) sub-class
2) super class
3) parent class
4) deprived class
5) None of these
30. The capacity of program counter is.......
1) 8 bits
2) 14 bits
3) 16 bits
4) 12 bits
5) 32 bits
31. In ........... generation computer the speed was measured in nanoseconds.
1) first
2) second
3) third
4) fourth
5) fifth
32. The process of transferring of files from your computer to the computer on the internet is called .......
1) downloading
2) uploading
3) FTP
4) JPEG
5) downsizing
33. Timing and control unit is a part of a(n)....
1) ALU
2) Processor
3) Memory
4) CMOS
5) BIOS
34. Chip is the common name for a(n)....
1) transistor
2) resistor
3) integrated circuit
4) semiconductor
5) None of these
35. ................. is developed specifically for a distinct industry.
1) Personal productivity software
2) Application software
3) Decision support system
4) Vertical market software
5) System software
36. Which of the following services is not provided by Internet service provider?
1) Internet transit
2) Domain name registration
3) Hosting
4) Dial-up access
5) None
37. A source program is written in a ............. language.
1) high-level
2) low-level
3) binary
4) All the above
5) None of these
38. The transfer rate of a standard USB 2.0 Device is .....
1) 100 M bit/s
2) 250 M bit/s
3) 480 M bit/s
4) 500 M bit/s
5) 1 G bit/s
39. The control part of a disk is known as
1) surface
2) hub
3) cylinder
4) cluster
5) None of these
40. Which of the following languages is used for process control?
1) ADA
2) COBOL
3) BASIC
4) PASCAL
5) LISP
ANSWERS:
1-5, 2-2, 3-3, 4-1, 5-1, 6-1, 7-1, 8-2, 9-4, 10-2
11-1, 12-2, 13-4, 14-2, 15-4, 16-4, 17-2, 18-4, 19-4, 20-5
21-4, 22-2, 23-4, 24-2, 25-2, 26-5, 27-4, 28-3, 29-1, 30-3
31-3, 32-2, 33-2, 34-3, 35-4, 36-5, 37-1, 38-3, 39-2, 40-1.