Thursday 17 May 2012

COMPUTER KNOWLEDGE MODEL PRACTICE QUESTIONS


1. Which of the following is NOT a computer programming language?
(1) C
(2) C++
(3) Java
(4) COBOL
(5) Microsoft

2. A computer virus normally attaches itself to another computer program known as-
(1) Trojan horse 
(3) Host program
(3) Boot program
(4) Spyware
(5) Malware

3. A terminal that cannot process any information is called-
(1) Direct access terminal
(2) Intelligent terminal
(3) Dumb terminal 
(4) Smart terminal
(5) Blind terminal

4. ____ is a high speed memory that can be used in between CPU and main memory.
(1) CPU
(2) Buffer
(3) Spooling
(4) Cache 
(5) None of these

5. A ____ port is primarily used to connect printers to a computer.
(1) Serial port
(2) USB port
(3) Parallel port 
(4) Address bus
(5) None of these

6. ____ is responsible for overall control and co-ordination of instruction execution.
(1) CPU
(2) ALU
(3) RAM 
(4) Control Unit
(5) None of these

7. When you start your computer from the off position then it is known as-
(1) Hard booting 
(2) Processing
(3) Storage
(4) Soft booting
(5) None of these

8. The component is required to process data into information and consists of integrated circuit.
(1) RAM
(2) Control Unit
(3) Processor 
(4) Motherboard
(5) None of these

9. ____ is known as network virus.
(1) Trojan horse
(2) Brain Virus
(3) Worm 
(4) All of these
(5) None of these

10. ____ is a technique of temporarily removing inactive programs from the memory of computer system.
(1) Swapping
(2) Spooling 
(3) Semaphore
(4) Scheduler
(5) None of these

11. A computer program that translates one program instructions at a time into machine language is called-
(1) Interpreter 
(2) CPU
(3) Compiler
(4) Simulator
(5) None of these

12. ____ are device used to transmit data over telecommunication lines.
(1) Drives
(2) Drive bays
(3) Modems 
(4) Platforms
(5) None of these

13. Who introduced Internet E-mail?
(1) Jerry Yang
(2) David Filo
(3) Ray Tomlinson
(4) Sergey Brinn
(5) None of these

14. Granting an outside organization access to internet web pages is often implemented using a(n)-
(1) extranet 
(2) intranet
(3) internet
(4) hacker
(5) None of these

15. BCC stands for-
(1) Bold Carbon Copy
(2) Blue Carbon Copy
(3) Bandwidth Carbon Copy
(4) Blind Carbon Copy 
(5) None of these

16. Which of the following contains information about a single ‘entity’ in the database like a person, place, event or thing?
(1) Query
(2) Field
(3) record 
(4) table
(5) None of these

17. Outlook Express is known as-
(1) E-mal client 
(2) Word processor
(3) Spreadsheet
(4) Database
(5) None of these

18. Which is not closed source software package?
(1) VLC
(2) LINUX
(3) Open Office
(4) MS Word 
(5) None of these

19. Minimum Zoom percentage supported by MS Word is-
(1) 10% 
(2) 15%
(3) 25%
(4) 4%
(5) None of these

20. HTML was introduced by-
(1) Vinton Cerf
(2) Bob Willies
(3) Steve Jobs
(4) Tim Burner Lee 
(5) None of these

21. A message with replies on a newsgroup is often, called a-
(1) post
(2) list
(3) thread 
(4) comment
(5) None of these

22. To send e-mail to a large group at one time, a ____ can be used.
(1) group
(2) alias
(3) mail server
(4) list serv 
(5) None of these

23. The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as-
(1) Business to business
(2) Consumer to business 
(3) Client to business
(4) Business to consumer
(5) None of these

24. A repair for a known software bug, usually available at no change on the internet is called-
(1) Version
(2) Patch 
(3) Tutorial
(4) FAQ
(5) None of these

25. When sending the e-mail, the ____ line describes the contents of the message.
(1) CC
(2) Contents
(3) To
(4) Subject 
(5) BCC

26. A port is a connector located on the –
(1) RAM
(2) CPU
(3) ROM
(4) Memory
 (5) Motherboard

27. Format command is used to create-
(1) Sector
(2) memory
(3) tracks
(4) tracks & sectors 
(5) None of these

28. Disk access time is-
(1) seek time
(2) Latency time
(3) Seek time + Latency time 
(4) Disk time
(5) None of these

29. ____ technology is used by banks for faster processing of large volume of cheques.
(1) OCR
(2) IFSC Code
(3) OMR
(4) MICR 
(5) Bar Code

30. The Operating System is also called the ____ between the user and the computer.
(1) server
(2) interface 
(3) network
(4) intermediate
(5) None of these

31. A human being who writes programs, operate and maintain computer is known as-
(1) Liveware 
(2) Freeware
(3) Spyware
(4) Shareware
(5) None of these

32. A Public Switched-Telephone Network (PSTN) uses ____ switching technique.
(1) Packet
(2) Message
(3) Circuit 
(4) Transport
(5) None of these

33. The PC and the Apple Macintosh are example of two different –
(1) applications
(2) programs
(3) platforms 
(4) storage device
(5) Operating system

34. PROM is a ____ memory that store information even if power is switched off.
(1) Volatile
(2) Buffer
(3) spooling
(4) non-volatile 
(5) None of these

35. When installing a peripheral device you also need to install a –
(1) port
(2) server
(3) driver 
(4) connection
(5) utility software

36. The ____ specifies the operation to be performed and the operands provide the data on which the operation is to be performed.
(1) source code
(2) op code 
(3) object code
(4) program code
(5) None of these

37. Which of the following can hold maximum amount of data?
(1) Optical disk
(2) Floppy disk
(3) Magnetic disk inside computer
(4) Magnetic tape 
(5) None of these

38. A ____ is not a form of Biometrics.
(1) fingerprint
(2) password 
(3) retina scan
(4) breath scan
(5) None of these

39. Full form of OSI is-
(1) Open System Interconnection 
(2) Open Software for Internet
(3) Operational System for Interconnect
(4) Operational Software for Internet
(5) None of these

40. A pixel is-
(1) a computer program that draws picture
(2) a picture stored in the secondary memory
(3) the smallest resolvable part of a picture 
(4) a virus
(5) None of these

Wednesday 16 May 2012

COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1.         A Passive threat to computer security is-
       (1) Malicious Intent              
(2) Sabotage
(3) Accidental Errors             
(4) Espionage Agents
(5) None of these
2.          ____ allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
(1) TCP/IP                                  
(2) Ethernet
(3) WAP                                     
(4) Token ring
(5) None of these

3.          ‘DOS’ floppy disk does not have____.
(1) A Boot Record                  
(2) A File Allocation Table
(3) A Root Directory              
(4) Virtual Memory
(5) BIOS
4.          ‘MICR’ technology used for clearance of cheques by banks refers to ____.
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
(5) None of these
5.          All the information collected during database development is stored in a ____.
(1) repository                          
(2) data warehouse
(3) RAD                                      
 (4) CASE
(5) None of these
6.          The ____ component is used by the data analyst to create the queries that access the database.
(1) data extraction                 
(2) end-user query tool
(3) end-user presentation tool
(4) data store                           
(5) None of these
7.          The altering of data so that it is not usable unless the changes are undone is ____.
(1) Biometrics                         
 (2) Compression
(3) Encryption                          
(4) Ergonomics
(5) None of these
8.          The word FTP stands for-
(1) File Transfer Protocol   
 (2) File Transit Protocol
(3) File Typing Protocol        
(4) File Transfer Protocol
(5) None of these
9.          This ____ tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
(1) Client                   
(2) Applications/Web server
(3) Enterprise server            
(4) DBA
(5) None of these
10.      A DVD-RAM is similar to a ____, except it has storage capacities up to 5.2 GB.
(1) CD-R                                     
(2) Floppy disk
(3) CD-RW                                 
(4) Hard disk
(5) None of these
11.      All of the following are basic principles of networks, except-
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these
12.      ____ are used to identify a user who returns to a Website.
(1) Cookies                               
(2) Plug-ins
(3) Scripts                                  
(4) ASPs
(5) None of these
13.      If you wanted to locate the hardware address of a local device, which protocol would you use?
(1) ARP                                       
(2) RARP
(3) ICMP                                    
(4) PING
(5) PONG
14.      The term, ‘hypertext’ means-
(1) Non-sequential writing 
(2) Hypermedia
(3) Blinking text     
(4) Text with heavy formatting
(5) None of these
15.      Which kind of lock includes a keypad that can be used to control access into areas?
(1) Cipher                                  
(2) Warded
(3) Device                                  
(4) Tumbler
(5) Type lock
16.      What is the name of protocol used in eliminate loops?
(1) Switching                            
(2) ISL
(3) Frame tagging                  
 (4) Spanning Tree Protocol
(5) None of these
17.      In networking terminology UTP means –
(1) Unshielded Twisted Pair
(2) Ubiquitous Teflon Port
(3) Uniformly Terminating Port
(4) Unshielded T-Connector
(5) None of these
18.      In OSI network architecture, the dialogue control and token management are responsibility of-
(1) Session layer                     
(2) Network layer
(3) Transport layer                 
(4) Data link layer
(5) None of the above
19.      A ‘C’ data structure called a structure is a group of items in which each item is identified by its own identifier, each of which is known as a member of a structure. Member is also known as-
(1) Information                       
(2) Field
(3) Record                                 
(4) Data type
(5) None of these
20.      Multithread means-
(1) Program do more than one thing at a time
(2) More than one program do one thing at a time
(3) Both are correct               
(4) Both are incorrect
(5) None of these
21.      A page fault occurs?
(1) when the page is not in the memory
(2) when the page is in  the memory
(3) when the process enters the blocked state
(4) when the process is in the ready state
(5) None of these
22.      “Each packet contains the full source and destination address.” This statement indicates which of the following?
(1) Virtual Circuit                    
(2) Datagram
(3) Data link                              
(4) FDDI
(5) None of these 
23.      Data bus is-
(1) Unidirectional                   
(2) Bidirectional
(3) Both (1) & (2)                   
 (4) Multidirectional
(5) None of these
24.      Which of the following is a type of ISDN (Integrated Service Digital Network)?
(1) Narrow bank                     
(2) Broad band
(3) Both (1) & (2)                    
(4) Virtual Circuit
(5) None of these 
25.      Which of the following is a browser to view a web page?
(1) Mosaic                                 
(2) Netscape
(3) Internet Explorer           
(4) All of the above
(5) None of these
26.      A graph is a collection of-
(1) Row and columns            
(2) Vertices and edges
(3) Equations                           
(4) Identity
(5) None of these
27.      CDMA is used in-
(1) Wireless and local loop
(2) Allocating a wireless channel
(3) Both (1) & (2)                    
(4) Local loop
(5) None of these
28.      Number of arcs incident to a node is called its-
(1) Level                                     
(2) Predecessor
(3) Degree                                                
(4) Successor
(5) None of these
29.      OSPF means-
(1) Open shortest path finite protocol
(2) Open shortest path finite protocol
(3) Open slotted path finite protocol
(4) Open slotted path first protocol
(5) None of these
30.      Binding the same name to multiple operations whose signatures differ in number or types of arguments?
(1) Overloading                       
(2) Origin class
(3) Object model                    
(4) Package
(5) None of these
31.      What is the name of the chip which has more than one processor on it?
(1) Parallel chip                       
(2) Multi-processor chip
(3) Transputer                         
(4) Parallel processor
(5) None of these
32.      In windows-
(1) Docking views may be docked
(2) Docking views may be float
(3) Docking views may be docked or float
(4) All of the above                               
(5) None of these
33.      ____ performs relocations function?
(1) Absolute loader               
(2) Direct linking loader
(3) Relocating loader            
(4) Linkage editor
(5) None of these
34.      A central computer surrounded by one or more satellite computers is called a-
(1) Bus network                      
(2) Ring network
(3) Star network                     
(4) All of the above
(5) None of these
35.      Segmentation –
(1) is a memory management scheme that supports user view of memory
(2) logical address space is collection of segments
(3) logical address consists of two tuple < segment-number, offset>.
(4) All of the above                               
(5) None of these 
36.      Which of the following is a major component of the telephone system?
(1) Local loop                           
(2) Trunks
(3) Switching office                               
(4) All of these
(5) None of these 
37.      Function is invoked by-
(1) Function                             
(2) Declaration
(3) Definition                           
(4) Prototype
(5) None of these
38.      The ACCEPT command in SQL?
(1) Creates a customized prompt when accepting user input
(2) Explicitly defines a NUMBER or DATE data type variable
(3) Hides user input for security reasons
(4) All of the above
(5) None of these
39.      How many fields are required to represent a header node of a graph?
(1) 3                                             
(2) 2
(3) 4                                             
(4) 5
(5) None of these
40.      Which of the following is not used as a data structure?
(1) Array                                    
(2) Linked list
(3) Graph                                   
(4) Directory
(5) None of these 
41.      Which of the following is an operating system call?
(1) CREATE                                                
(2) LINK
(3) SYSTEM                               
(4) All of these
(5) None of these
42.      In C++, by default, the members of a class are-
(1) Public                                   
(2) Private
(3) Both public and private 
(4) Only Public
(5) None of these
43.      In core banking systems:
(1) Store and forward of transaction is done
(2) Branch server is not required
(3) Local database is not required
(4) Transaction cannot happen from a non-home branch
(5) None of these 
44.      MV command in Unix changes-
(1) Only the directory
(2) Only the directory entry and i-node
(3) Only the i-node number
(4) All of the above                               
(5) None of these
45.      E-Commerce refers to-
(1) Electrical commerce       
(2) Electronic commerce
(3) Evolutionary commerce              
(4) Effective commerce       
(5) None of these
46.      Graphs can be implemented using-
(i) Arrays    (ii) Linked list      (iii) Stack              (iv) Queue
(1) (i), (ii) and (iv)                   
(2) (i), (ii) and (iii)
(3) (ii) and (iii)                          
(4) (i) and (iv)
(5) None of these
47.      Thrashing-
(1) Always occur on large computers
(2) is a natural consequence of virtual memory systems
(3) Can always be avoided by swapping
(4) Can be caused by poor paging algorithm
(5) None of these
48.      The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred as-
(1) modulation                        
(2) demodulation
(3) synchronizing                    
(4) digitizing
(5) None of these
49.      The relational database environment has all of the following components except-
(1) Users                                    
(2) Separate files
(3) Database                            
(4) Database administrator
(5) None of these
50.      Primary key-
(1) Denote a candidate key that is chosen by the database designer as the principal means of identifying entities with in an entity set
(2) Attributes names of all primary key are unique
(3) Primary key specification is optional and good idea to specify primary key for each relation
(4) All of the above                              
 (5) None of these
Answers:


1
1
11
4
21
1
31
3
41
4
2
3
12
1
22
2
32
2
42
2
3
5
13
1
23
2
33
3
43
1
4
1
14
2
24
3
34
3
44
1
5
1
15
1
25
4
35
4
45
2
6
2
16
4
26
2
36
4
46
4
7
3
17
3
27
3
37
1
47
4
8
4
18
1
28
3
38
4
48
4
9
2
19
2
29
1
39
1
49
2
10
3
20
1
30
1
40
4
50
4