Saturday, 21 September 2013

COMPUTER AWARENESS PRACTICE QUESTIONS

1.    The operating system does all of the following EXCEPT?
1)    provide a way for the user to interact with the computer.
2)    manage the central processing unit (CPU).
3)    manage memory and storage.
4)    enable users to perform a specific task such as document editing.
5) None of these

2.    The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called?
    1) simulation     
    2) animation
    3) robotics 
    4) computer forensics
    5) None of these

3.    Allocation of a resources in a time dependent manner to several program simultaneo-usly called?
    1) multi user     
    2) multi tasking
    3) time sharing     
    4) multi sharing
    5) None of these

4.    Which of the following is an example of a binary number?
    1) A1BCD1     
    2) 23456
    3) 005     
    4) 100101
    5) None of these

5.    _____ controls the way in which the computer system functions and provides a means by which users can interact with the computer?
    1) the operating system
    2) the motherboard
    3) the platform
    4) application software
    5) None of these

6.    All of the following statements concerning windows are true EXCEPT?
    1)    windows are an example of a command-driven environment.
    2)    windows can be resized and repositioned on the desktop.
    3)    more than one window can be open at a time.
    4)    toolbars and scrollbars are features of windows.
    5) None of these

7.    In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of?
    1) eight bytes.
    2) eight characters.
    3) eight bits.
    4) eight kilobytes.
   5) None of these

8.    Verification of a login name and password is known as?
    1) configuration     
   2) accessibility
    3) authentication 
   4) logging in
   5) None of these

9.    This type of memory is commonly called temporary or volatile storage?
    1) ROM    
    2) RAM
    3) Flash Memory
    4) Virtual Memory
    5) None of these

10.    Which of the following can be used to select the entire document?
    1) CTRL+A    
    2) ALT+F5
    3) SHIFT+A    
    4) CTRL+K
    5) CTRL+H

11.    The simultaneous processing of two or more programs by multiple processors is?
    1) Multiprogramming
    2) Multitasking 
    3) Time-sharing
    4) Multiprocessing
    5) None of these

12.    The default view in Excel is view?
    1) Work    
    2) Auto
    3) Normal    
    4) Roman
    5) None of these

13.    In Word, you can force a page break?
    1)    By positioning your cursor at the appropriate place and pressing the Fl key
    2)    By positioning your cursor at the appropriate place and pressing Ctrl+Enter
    3)    By using the Insert/ Section Break
    4)    By changing the font size of your document
    5)    None of these

14.    Help Menu is available at which button?
    1) End    
    2) Start
    3) Turn off    
    4) Restart
    5) Reboot

15.    The micro processor was introduced in?
    1) First generation computers
    2) Second generation computers
    3) Third generation computers
    4) Fourth generation computers
    5) None of these

16.    Computers use the__ language to process data?
    1) Processing     
    2) Kilobyte
    3) Binary    
    4) Representational
    5) None of these

17.    Computer process data into information by working exclusively with?
    1) Multimedia     
    2) Words
    3) Characters    
    4) Numbers
    5) None of these

18.    In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of?
    1) Eight bytes 
    2) Eight kilobytes
    3) Eight characters 
    4) Eight bits
    5) Eight terabytes

19.    The term bit is short for?
    1) Megabyte    
    2) Binary language
    3) Binary digit    
    4) Binary number
    5) None of these

20.    A string of eight 0s and 1s is called a?
    1) Megabyte    
    2) Byte
    3) Kilobyte    
    4) Gigabyte
    5) Numbers

21.    A__ is approximately one billion bytes?
    1) Kilobyte     
    2) Bit
    3) Gigabyte    
    4) Megabyte
    5) Terabyte

22.    A__ is approximately a million bytes?
    1) Gigabyte     
    2) Kilobyte
    3) Megabyte    
    4) Terabyte
    5) None of these

23.    __ is any part of the computer that you can physically touch?
    1) Hardware     
   2) Program
    3) An application 
   4) Software
    5) None of these

24.    The components that process data are located in the?
    1) Input devices
    2) Output devices 
    3) System unit
    4) Storage component
    5) None of these

25.    All of the following are exampl es of input devices EXCEPT a?
    1) Scanner     
    2) Mouse
    3) Keyboard    
    4) Printer
    5) None of these

26.    A unit of data storage which is equal to 2 to the 70th power is known as:?
    1) Yottabite    
    2) Zebibyte
    3) Yobibyte    
    4) Petabyte
    5) Terabyte

27.    Which of the following langu-ages were used in the first generation computers?
    1) Machine Language
    2) Assembly language
    3) C-language
    4) High level language
    5) None of these

28. Which of the following options are used to provide guidance to users while they use application in computer?
    1) Software    
    2) Wizard
    3) Wiki    
   4) None of these
    5) All of the above

29.    V-RAM is used for which of the following?
    1) Video and graphics
    2) Text and images
    3) Softwares    
    4) Only text
    5) None of these

30.    SQL (Structured Query Lang-uage) is used for___?
    1) Creating databases and tables
    2)    Creating, Modifying and Querying databases
    3) Modifying databases
    4) None of these
    5) All of the above

31.    __is not a payment card techn-ology?
    1) Magnetic stripe card
    2) Smart card
    3) fleet card
    4)    All of them are payment card technologies.
    5) None of these

32.    ____is also known as electronic check?
    1) Debit card    
    2) Smart card
    3) Credit card    
   4) DD
    5) None of these

33.    Which of the following printer cannot print graphics?
    1) Ink-jet    
    2) Daisy Wheel
    3) Laser    
    4) Dot-matrix
    5) None of these

34.    Best Quality graphics is produced by?  
    1) Dot Matrix    
    2) Laser Printer
    3) Inkjet Printer 
    4) Plotter
    5) All of the above

35.    A___is a bi-stable electronic circuit that has two stable states?
    1) Multivibrator 
    2) Flip-flop
    3) Logic gates    
   4) laten
    5) None of these

36.    DOS stands for?
    1) Disk Operating System
    2) Disk Operating Session
    3) Digital Operating System
    4) Digital Open system
    5) None of these

37.    Which of the following are input devices?
    1) Keyboard    
   2) Mouse
    3) Card reader    
   4) Scanner
    5) All of these

38.    Who is the chief of Miocrosoft?
    1) Babbage    
    2) Bill Gates
    3) Bill Clinton    
    4) Bush
    5) None of these

39.    Examples of output devices are?
    1) Screen    
    2) Printer
    3) Speaker    
    4) All of these
    5) None of these

40. Which of the following is also known as brain of computer?
    1) Control unit
    2) Central Processing unit
    3) Arithmetic and language unit
    4) Monitor    
    5) None of these


Answers
 1) 4        2) 4    3) 3   4) 4    5) 1   6) 1    7) 3    8) 3    9) 2    10) 1
 11) 4    12) 3    13) 2    14) 2   15) 4  16) 3    17) 4    18) 4    19) 3    20) 2
 21) 3    22) 3   23) 1    24) 3    25) 4   26) 2    27) 1    28) 2    29) 1    30) 2
 31) 4    32) 1   33) 2    34) 4    35) 2   36) 1    37) 5    38) 2   39) 4   40) 2

Tuesday, 10 September 2013

COMPUTER AWARENESS PRACTICE MCQs FOR IBPS EXAMS

1.    Random Access Memory or RAM?
 a)    Contains the electronic circuit  that cause processing to occur
 b)    Makes the information resulti-ng from processing available for use
 c)    Allows data, program, comm-ands, and user responses to be entered into a computer
 d)    Consist of electronic compon-ents that store data
 e)    None

 2.    Correcting errors in a program is referred to as?
a) Debugging    

b) Bugging
c) Rectifying    

d) Modifying
e) None of these

 3.    An assembler is used to translate a program written in?
a) A low level language
b) Machine language
c) A high level language
d) Assembly language
e) All of These

 4.    The capability of operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is?
     a) Multiprocessing
     b) Multitasking
     c) Multiprogramming
     d) Multi-execution
     e) None of these

 5.    The basic goal of computer process is to convert data into?     

a) Information    
b) Tables
c) Files    

d) Graphs  
e) None of these

 6.    A hard copy of documents is?
     a) Stored in the hard disk
     b) Stored in the floppy
     c) Stored on a CD
     d) Printed on the printer
     e) None of these

 7.    A___is a design tool that graphically shows the logic in a solution algorithm?
     a) Flow chart
     b) Hierarchy chart
     c) Structure chart
     d) Context diagram
     e) None of the above

 8.    Which key combination is used for special tasks?
a) Insert, Delete    

b) Ctrl, Shift
c) Left Arrow, Right Arrow
d) Page up, Page Down
e) None of these

 9.    Which is the part of a computer that one can touch and feel?
a) Program    

b) Software
c) Hardware    

d) Output
e) None of these

 10.    Circuits that provide a commu-nication path between two or more devices of a digital compu-ter system is?
a) Car         

b) Bus      
c) Truck    
d) All the above          
e) None
 

Saturday, 3 August 2013

COMPUTER KNOWLEDGE PRACTICE MCQs FOR IBPS PO EXAM

1. Memory, also called Random Access Memory, or RAM .......
1) contains the electronic circuit that cause processing to occur.
2) makes the information resulting from processing available for use
3) allows data, program, commands, and user responses to be entered into a computer
4) consist of electronic components that store data
5) None of these

2. Correcting errors in a program is referred to as ........
1) debugging 
2) bugging 
3) rectifying
4) modifying 
5) None of these

3. An assembler is used to translate a program written in ........
1) a low level language
2) machine language
3) a high level language
4) assembly language 
5) None of these

4. The capability of operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is ........
1) Multiprocessing 
2) Multitasking
3) Multiprogramming 
4) Multiexecution
5) None of these

5. The basic goal of computer process is to convert data into ........
1) information 
2) table 
3) files
4) graphs 
5) None of these

6. A hard copy of documents is ........
1) stored in the hard disk
2) stored in the floppy 
3) Stored on a CD
4) Printed on the printer 
5) None of these

7. Find the odd man out?
1) plotter 
2) printer 
3) scanner
4) monitor 
5) None of these

8. Which key combination is used for special tasks?
1) Insert, Delete 
2) Ctrl, Shift
3) Left Arrow, Right Arrow
4) Page up, Page Down 
5) None of these

9. Which is the part of a computer that one can touch and feel?
1) Programs 
2) Software 
3) Hardware
4) Output 
5) None of these

10. A store that combines online and physical presence is called a(n) ........ store.
1) brick-and-mortar 
2) click-and-mortar
3) combination 
4) e-commerce
5) M commerce

11. The main processing unit of computer is known as ........
1) CD-run on memory
2) Central Processing Unit
3) Call powers Up
4) Create Program User 
5) None of these

12. ...... move the cursor one space to the right or puts spaces in between words.
1) Control key 
2) space bar 
3) printer
4) mouse 
5) None of these

13. Which key has to be used to type all letters capital without using the shift key for each character ........
1) shifter 
2) upper case 
3) caps lock key
4) icon 
5) None of these

14. A device that reads the information contained on a disk and transfer it to the computer's
memory ........
1) monitor 
2) screen 
3) keyboard
4) disk drive 
5) None of these

15. Which of the following is not the major function of a computer?
1) Processing data into information
2) Storing data or information
3) Gathering data
4) Analysing data or information
5) None of these

16. A disk on which you store information ........
1) plate 
2) data disk
3) paper disk
4) TV disk 
5) None of these

17. ........ is used to print document on printer.
1) ribbon 
2) monitor
3) go now 
4) control + p 
5) None of these

18. Easy to use means ........
1) user friendly 
2) select 
3) helpful
4) ever-ready 
5) None of these

19. When your computer stops working suddenly it is referred to as a ........
1) crash 
2) die 
3) death
4) penalty 
5) None of these

20. The smallest item of useful in information a computer can handle ........
1) bite 
2) byte 
3) bit
4) belt 
5) None of these

21. Device that let the computer communicate with you ........
1) input 
2) output 
3) type 
4) print 
5) None

22. Device that allows you to put information into the computer ........
1) input 
2) output 
3) type
4) print 
5) None of these

23. The different style of lettering in a word processing program ........
1) font 
2) calligraphy 
3) writing
4) manuscript 
5) None of these

24. Any letter, number or symbol found on the keyboard that you can type into the computer ........
1) output 
2) character 
3) type
4) print 
5) None of these

25. A symbol or question on the screen that prompts you to take an action and tell the computer what to do next ........
1) scanner 
2) questionnaire
3) prompt on dialog box
4) information seeker 
5) None of these

26. Choices are referred to as ........
1) options 
2) exit 
3) boot
4) folder 
5) None of these

27. The OSI model is divided into how many Processes called layers?
1) Five 
2) Six 
3) Seven
4) Eight 
5) None of these

28. ........ lets you leave a screen or program
1) boot 
2) programs
3) exit 
4) text
5) None of these

29. A place that a user can create files ........
1) cursor 
2) test 
3) folder
4) boot 
5) None of these

30. ........ start or restart the computer.
1) exit 
2) kick 
3) boot
4) kick-start 
5) None of these

31. A blinking indicator that shows you where your next action will happen is ........
1) CPU 
2) cursor 
3) tool bar
4) boot 
5) None of these

32. Commands at the top of a screen such; FILE-EDIT-FONT-TOOLS to operate and change things within programs is ........
1) menu bar 
2) tool bar 
3) user friendly
4) word processor 
5) None of these

33. CD-ROM stands for ........
1) Central processing unit
2) CD-remote open mouse
3) CD resizer or minimize
4) CD-read only memory
5) None of these

34. To change written work already done ........
1) find 
2) edit 
3) cut
4) close 
5) None of these

35. A key that will erase information from the computer's memory and characters on the
screen ........
1) edit 
2) delete key 
3) dummy out
4) trust key 
5) None of these

36. To insert copy of the clipboard contents, whatever was last cut or copied at the
insertion point ........
1) paste 
2) stick in 
3) fit in
4) push in 
5) None of these

37. The command used to remove text or graphics from a document. 
1) chop 
2) cut 
3) clip
4) chart away 
5) None of these

38. To encourage repeat customers, e-commerce sites recommend users create a(n)?
1) profile 
2) account
3) Survey 
4) wish list
5) None of the above

39. A removable magnetic disk that holds information is .........
1) floppy disk 
2) hard drive 
3) monitor
4) portable 
5) None of these

40. A command that saves what you are working on into the hard drive, or onto a disk?
1) view 
2) hold 
3) save
4) go 
5) None of these

41. To move down a page in a document
1) jump 
2) fly 
3) wriggle
4) scroll 
5) None of these

42. A command to get a file you worked already and it was stored in memory ........
1) close 
2) delete 
3) open
4) get it 
5) None of these

43. The primary device that a computer uses to store information .......
1) TV 
2) storehouse 
3) desk
4) hard drive 
5) None of these

44. Screen that comes on when you turn on your computer that shows all the icons
1) desktop 
2) fact to face 
3) viewer
4) view space 
5) None of these

45. A program that works like a calculator for keeping track of money and making budgets?
1) calculator 
2) spreadsheet 
3) budgeter
4) financier 
5) None of these

46. The operating system is the most common type of ........ software
1) communications 
2) applications
3) system 
4) word- processing
5) None of these

47. A ........ is approximately one billion bytes
1) kilo byte 
2) bit 
3) megabyte
4) gigabyte 
5) None of these

48. A scanner scans ........
1) pictures 
2) text 
3) both pictures and text
4) neither pictures nor text
5) None of these

49. Dumb terminals have terminals and ........
1) Mouse 
2) Keyboard 
3) Speakers
4) Mouse or speakers 
5) None of these

50. The portion of the CPU that coordinates the activities of all the other computer components is the ........
1) mother board 
2) coordination board
3) control unit 
4) arithmetic logic unit
5) None of these

ANSWERS:

1–4, 2-1, 3-4, 4-2, 5-1, 6-4, 7-3, 8-2, 9-3, 10-5
11-2, 12-2, 13-3, 14-4, 15-3, 16-2, 17-4, 18-1, 19-1, 20-3
21-2, 22-1, 23-1, 24-2, 25-3, 26-1, 27-3, 28-3, 29-3, 30-3
31–2, 32-1, 33-4, 34-2, 35-2, 36-1, 37-2, 38-2, 39-1, 40-3
41–4, 42-3, 43-4, 44-1, 45-2, 46-3, 47-4, 48-3, 49-3, 50-3.

Thursday, 25 July 2013

COMPUTER KNOWLEDGE PRACTICE MCQs FOR IBPS EXAM

1. Data or information used to run the computer is called?
a) Software
b) Hardware 
c) Peripheral
d) CPU 
e) None of the above 

2. To memories the e- mail address one should use?
a) Browser 
b) Search engine 
c) Birthday list 
d) Phone book 
e) Add book 

3. A Hardware device that converts data into meaningful information
a) Protector 
b) Output device 
c) Input device 
d) Program 
e) Processor 

4. What from the following refers to the people, related to computing process?
a) Hardware 
b) Human ware 
c) Software
 d) Firmware 
e) Peripherals 

5. Which of the following is not an example of storage device? 
a) CD 
b) Floppy 
c) Hard disk
d) RAM 
e) DVD 

6. Today, the common form of RAM is built from?
a) Transistors 
b) Vacuum tubes 
c) Semiconductors IC's 
d) Super conductor IC's 
e) None 

7. Benefit of DRAM is ___ 
a) It is cheaper than SRAM 
b) It can store more than SRAM 
c) It is faster than SRAM
d) Data in it can easily be erased than in SRAM 
e) None 


8. Following all are related to spread sheet except?
a) Work sheet 
b) Sell 
c) Formula 
d) Virus detection 
e) None of these 

9. Which element is appropriate for the set of instructions, by which computer performs more than one task?
a) Hardware 
b) Software 
c) Human ware 
d) Firmware 
e) None of these 

10. Which of the following is both output and input? 
a) Printer 
b) Speaker 
c) Modem 
d) monitor 
e) Scanner 

11. A Special software that is used to create a job queue is called_____ 
a) Drive 
b) Spooler 
c) Interpreter
d) Linkage editor 
e) None 

12. Which one of the items listed below is not one of the software engineering layers?
a) Process 
b) Manufacturing 
c) Method 
d) Tools 
e) None 

13. What is the first stage in program development? 
a) Specification and design 
b) System Analysis 
c) Testing 
d) None of the above 
e) All of these 

14. By means of a data flow diagram the analyst can detect ____ 
a) Task duplication 
b) Unnecessary delays 
c) Task overlapping 
d) All of the above 
e) None of the above 

15. Virtual memory is ___ 
a) Related to virtual reality 
b) A form of ROM 
c) A form of RAM 
d) None of the above 
e) All of these 

16. What does RAM stands for? 
a) Read Access Memory 
b) Read Anywhere Memory 
c) Random Anything Memory
d) Random Access Module 
e) Random Access Memory 

17. For transferring file and exchanging messages, which utility is used?
a) Web browser
 b) WWW 
c) e - mail 
d) Hyper text 
e) Search engine 

18. The three main parts of a processor are..? 
a) ALU, control unit and register 
b) ALU, control unit and RAM 
c) Case, control unit and register
d) Control unit, Register and RAM 
e) RAM, ROM and CD- ROM 

19. Which of the following is the second largest unit of RAM? 
a) Terabyte 
b) Megabyte 
c) Byte 
d) Giga byte 
e) None of these 

20. What is present in motherboard that connects CPU with other parts on motherboard?
a) Input unit 
b) System bus 
c) ALU 
d) Primary memory 
e) None of these 

21. ___ servers stores and manage files for network users 
a) Authentication 
b) Main 
c) Web 
d) File 
e) None of these 

22. The OSI model is divided into ____ process called layers 
a) five 
b) six 
c) seven 
d) eight 
e) None of these 

23. System software is a set of programs that enables your computer's hardware devices and ____ software to work together.
a) management
b) Processing 
c) utility 
d) application
e) None of these 

24. In a ring topology, the computer in possession of the ____can transmit data 
a) packet 
b) data 
c) access method 
d) token 
e) None of these 

25. ____ viruses are often transmitted by a floppy disk left in the floppy drive 
a) Trojan horse 
b) Boot sector 
c) Script 
d) logic bomb 
e) None of the above 

26. ____ controls the way in which a computer system functions and provides name by which users can interact with the computer 
a) The platform 
b) Application software 
c) operating software 
d) The Mother board 
e) None 

27. Servers are components that provide resources to other computers connected to a.. 
a) mainframe 
b) network 
c) super computer 
d) client 
e) None of these 

Answers:
1) a; 2) e; 3) e; 4) b; 5) d; 6) c; 7) a; 8) d; 9) b; 10) d; 
11) b; 12) b; 13) d; 14) d; 15) c; 16) e; 17) c; 18) a; 19) d; 20) b; 
21) d; 22) c; 23) d; 24) d; 25) b; 26) c; 27) b. 

Sunday, 21 July 2013

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR BANK EXAMS

1. Which of the following is NOT a characteristic of E-mail?
1) Low cost
2) Record maintenance in database
3) High speed
4) Waste Reduction (writing paper)
5) None

2. What are dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information
3) A computer reserved for special task
4) Both (1) & (2)
5) None of these

3. What are non dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information only
3) A computer reserved for special task
4) Both (2) & (3)
5) None of these

4. G3 is a
1) Computer
2) Cable
3) Chip
4) Mother board
5) None of these

5. One of the oldest calculating device was?
1) Arithmometer
2) Ready reckoner
3) Abacus
4) Both (1) & (2)
5) None of these

6. The first-generation computers had?
1) Vacuum tubes and magnetic drum
2) Magnetic tape and transistors
3) Ics
4) Either (1) or (3)
5) All of these

7. Which of the following is false about change in computer from one generation to the next?
1) Computer size is decreased
2) Speed of processing increases
3) Memory / storage capacities decreases
4) Both (1) & (3) 5) None of these

8. Which of the following is NOT false about GUIs?
1) They make computers easier to use for laymen
2) Icons and menus can be selected with a mouse
3) were first introduced by MACs
4) All of these are true
5) None of these

9. To make a program safe we should take care of:
1) Strong authentication and access controls
2) Error checking controls
3) Do risk analysis
4) Either (1) or (2)
5) All of these

10. Which of them is a must for understanding the organisation's business risks associated with using router
1) Network Architecture
2) Network traffic management
3) Network security
4) Either (2) or (3)
5) All of these

11. We are shifting towards computerization because
1) Current technologies are available
2) Technologies help in meeting the business objectives
3) Hire the employees that are expert in the latest technologies are available
4) Both (1) & (2)
5) None of these

12. Who is responsible for developing the intranet strategy and monitoring its policies?
1) Intranet administrator 2) Webmaster
3) Editor 4) Both (2) & (3)
5) None of these

13. Network layers function is to
1) Select paths for data transfer
2) Break the Network in to subnet
3) Determine the IP
4) Either (2) or (3)
5) All of these

14. Which of the following makes a network insecure?
1) Encryption
2) Network Interface Card (NIC)
3) Static keys
4) Both (2) & (3)
5) None of these

15. If the network of the company is to be protected from remote access that may damage company's reputation due to misuse of information then security policy would/ should include
1) All employees
2) Only the employer
3) Contractors
4) Either (1) or (2)
5) All of these

16. Project management will be made a separate division on the basis of:
1) Interdependencies among departments
2) Sharing of resources
3) Size of the project
4) Either (2) or (3)
5) All of these

17. Various kinds of e-mail threats-mails containing racist, sexual content are example of .....
1) Spam
2) International leakage
3) International tampering
4) Offensive contents
5) None of these

18. Artificial Intelligence can be used in everysphere of life because of its....
1) Ability to work in hazardous places
2) Ability to think like human beings
3) Ability to work in artificial environments
4) All of the above
5) None of these

19. The Steering Committee is made for
1) Reviewing user requirements and ensuring that all controls are considered.
2) Strategic planning for computer installation
3) Evaluating specific project plans for systems
4) Both (1) and (2)
5) None of these

20. In an IT division specific measures were introduced to improve on quality. However effectiveness of these measures can't be ascertained by simply
1) Increased user satisfaction
2) An increase in the quality assurance budget
3) A reduction in the maintenance cost ofthe application
4) Either (1) or (2)
5) All of these

21. Efficient system requirement analysis is required for:
1) Reverse engineering
2) Joint Application Design (JAD)
3) Traditional System development life cycle
4) Either (1) or (3)
5) All of these

22. Which of the following statements is NOT correct for structured programming concepts and modularity?
1) Interaction between modules should be minimal
2) Modules should have only one entry and one exit point
3) Modularity means program segmentation
4) Both (1) and (2)
5) None of these

23. Software quality assurance is for
1) Error prevention
2) Error detection
3) Error correction 4) Either (1) or (3)
5) All of these

24. Which of the following methods is NOT required for telecommunication continuity?
1) Alternative routing
2) Diverse routing
3) Satellite routing
4) All of these
5) None of these

25. The client is called .... in 2 tier architecture.
1) Fat client
2) Thin client
3) Very thin client
4) Either (1) or (2)
5) Cannot say

ANSWERS:
1-2, 2-3, 3-1, 4-3, 5-3, 6-1, 7-3, 8-4, 9-5, 10-4
11-4, 12-2, 13-4, 14-1, 15-1, 16-5, 17-1, 18-4, 19-4, 20-3
21-5, 22-4, 23-5, 24-2, 25-1