Computer Fundamentals Questions and Answers
Computer Fundamentals Questions and Answers
1
1. Which unit is responsible for converting the data received from the user into a computer understandable format?
a) Memory Unit
c) Input Unit
d) Output Unit
View Answer
Answer: c
a) Assembly Language
b) Binary Language
c) BASIC
d) C Language
View Answer
Answer: b
a) Byte
b) Nibble
c) Bit
d) KB
View Answer
Answer: c
a) 2
b) 4
c) 8
2
d) 1
View Answer
Answer: b
a) IN 82
b) INPUT 82
c) INP 82
d) 82 INP
View Answer
Answer: a
6. The input machine which originated in the United States around 1880s is a ___________
a) Mouse
b) Joystick
c) Keyboard
View Answer
Answer: c
View Answer
Answer: a
8. 1 yottabyte = ______________
3
a) 1024 TB
b) 1024 EB
c) 1024 ZB
d) 1024 PB
View Answer
Answer: c
d) It supplies the data and instructions to the computer for further processing
View Answer
Answer: c
computer-fundamentals-questions-answers-input-unit-q10
a) 1.ALU 2. MU
c) 1.MU 2. ALU
View Answer
Answer: d
11. The process of producing useful information for the user is called ___________
a) Controlling
b) Outputting
c) Inputting
4
d) Processing
View Answer
Answer: b
12. The output unit converts the data entered by the user into computer understandable form.
a) True
b) False
View Answer
Answer: b
View Answer
Answer: b
View Answer
Answer: d
15. The devices that used to give single or multiple colored images and drawings are ____________
a) Monitors
b) Printers
5
c) Plotters
d) VDUs
View Answer
Answer: c
16. A special request originated from some device to the CPU to acquire some of its time is called ___________
a) Disturbance
b) Attenuation
c) Interrupt
d) Noise
View Answer
Answer: c
17. Line Printers that print one line at a time are _________
a) Laser Printers
b) Inkjet Printers
c) Drum Printers
d) Chain Printers
View Answer
Answer: c
18. A ___________________ monitor looks like a television and are normally used with non-portable computer
systems.
a) CRT
b) LCD
c) LED
View Answer
Answer: a
6
19. Which of the following is not a function of the Output Unit?
d) It supplies the data and instructions to the computer for further processing
View Answer
Answer: d
View Answer
Answer: a
21. Components that provide internal storage to the CPU are ______
a) Registers
b) Program Counters
c) Controllers
d) Internal chips
View Answer
Answer: a
22. Saving data and instructions to make them readily available is the job of __________
a) Storage Unit
b) Cache Unit
c) Input Unit
7
d) Output Unit
View Answer
Answer: a
computer-fundamentals-questions-answers-arithmetic-logic-unit-q3
View Answer
Answer: b
a) Primary Storage
b) Virtual Storage
c) Internal Storage
d) Minor Devices
View Answer
Answer: a
a) Backup
b) Secondary
c) Primary
d) Cache
View Answer
Answer: b
8
26. Which of the following is used in main memory?
a) SRAM
b) DRAM
c) PRAM
d) DDR
View Answer
Answer: b
View Answer
Answer: a
a) CD
b) CD-ROM
c) DVD-R
d) DVD-RW
View Answer
Answer: a
29. The first practical form of Random Access Memory was the __________
a) SSEM
c) William’s Tube
9
d) Thomas’s Tube
View Answer
Answer: c
30. The ‘heart’ of the processor which performs many different operations _____________
b) Motherboard
c) Control Unit
d) Memory
View Answer
Answer: a
31. ALU is the place where the actual executions of instructions take place during the processing operation.
a) True
b) False
View Answer
Answer: a
a) |
b) ^
c) .
d) <<
View Answer
Answer: c
a) 0001
b) 1110
10
c) 1000
d) 1001
View Answer
Answer: d
View Answer
Answer: d
35. The ALU gives the output of the operations and the output is stored in the ________
a) Memory Devices
b) Registers
c) Flags
d) Output Unit
View Answer
Answer: b
a) Paging
b) Segmentation
c) Bifurcation
d) Dynamic Division
View Answer
Answer: b
11
37. Number of bits in ALU is _________
a) 4
b) 8
c) 16
d) 2
View Answer
Answer: c
38. Which flag indicates the number of 1 bit that results from an operation?
a) Zero
b) Parity
c) Auxiliary
d) Carry
View Answer
Answer: b
a) 00000001
b) 10000000
c) 11111111
d) 11111110
View Answer
Answer: c
40. ____________ is the raw material used as input and __________ is the processed data obtained as output of data
processing.
a) Data, Instructions
b) Instructions, Program
c) Data, Program
12
d) Program, Code
View Answer
Answer: a
a) Diligence
b) I.Q.
c) Accuracy
d) Versatility
View Answer
Answer: b
a) Input Unit
b) Memory Unit
c) Control Unit
d) I/O Unit
View Answer
Answer: c
43. The part of a processor which contains hardware necessary to perform all the operations required by a computer:
a) Data path
b) Controller
c) Registers
d) Cache
View Answer
Answer: a
13
a) Main Address Register
View Answer
Answer: d
45. If the control signals are generated by combinational logic, then they are generated by a type of
_______________ controlled unit.
a) Micro programmed
b) Software
c) Logic
d) Hardwired
View Answer
Answer: d
d) Using Circuits
View Answer
Answer: a
a) Program
b) Command
c) Micro program
d) Micro command
14
View Answer
Answer: c
48. Micro-program consists of a set of microinstructions which are strings of 0s and 1s.
a) True
b) False
View Answer
Answer: a
a) Vertical Microinstruction
b) Horizontal Microinstruction
c) Multilevel Microinstruction
View Answer
Answer: a
a) Positional
b) Non-Positional
c) Octal
d) Fractional
View Answer
Answer: d
a) IIIII
b) 5
c) V
15
d) v
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
53. The LSB and MSB of 1243247 are ____ and ____
a) 1, 7
b) 4, 7
c) 7, 1
d) 4, 1
View Answer
Answer: c
a) Abacus
b) Calculator
c) Pascaline
d) Computer
View Answer
Answer: a
a) 1011
b) 0101
16
c) 1010
d) 0011
View Answer
Answer: a
View Answer
Answer: b
a) 1024 TB
b) 1024 EB
c) 1024 ZB
d) 1024 PB
View Answer
Answer: b
a) 0010
b) 0011
c) 0101
d) 1010
View Answer
Answer: c
17
59. ASCII stands for _____________________
View Answer
Answer: a
a) 8
b) 2
c) 10
d) 16
View Answer
Answer: c
a) 4
b) 5
c) 6
d) 9
View Answer
Answer: c
a) 0000
b) 0001
c) 0010
18
d) 0100
View Answer
Answer: b
a) root
b) radix
c) entity
d) median
View Answer
Answer: b
a) 0.5
b) 0.625
c) 0.25
d) 0.875
View Answer
Answer: b
a) 00000011
b) 10000011
c) 11111101
d) 11111100
View Answer
Answer: b
66. A number with both integer and a fractional part has digits raised to both positive and negative powers of 2 in a
decimal number system.
19
a) True
b) False
View Answer
Answer: b
a) A
b) F
c) D
d) E
View Answer
Answer: d
a) 114
b) 43.47
c) 99.9A
d) 10101
View Answer
Answer: c
a) (101)10 = (1100101)2
c) C represents 12
View Answer
Answer: b
20
70. Which of the following is not a positional number system?
View Answer
Answer: a
a) 2
b) 8
c) 10
d) 1
View Answer
Answer: a
a) 0010
b) 10
c) 1010
d) 010
View Answer
Answer: c
a) machine language
b) C
c) C#
21
d) pascal
View Answer
Answer: a
a) 624.12
b) 145.12
c) 154.12
d) 145.21
View Answer
Answer: b
a) 0111
b) E
c) 15
d) 14
View Answer
Answer: b
a) True
b) False
View Answer
Answer: a
a) 21
b) 12
22
c) 22
d) 31
View Answer
Answer: a
a) 1111
b) 101
c) 11E
d) 000
View Answer
Answer: c
a) (124)2
b) 1110
c) (110)2
d) (000)2
View Answer
Answer: d
80. What could be the maximum value of a single digit in an octal number system?
a) 8
b) 7
c) 6
d) 5
View Answer
Answer: b
23
81. In a number system, each position of a digit represents a specific power of the base.
a) True
b) False
View Answer
Answer: a
82. The maximum number of bits sufficient to represent an octal number in binary is _______
a) 4
b) 3
c) 7
d) 8
View Answer
Answer: b
a) 6
b) 7
c) 8
d) 5
View Answer
Answer: b
a) 28
b) 18
c) 81
d) 82
View Answer
24
Answer: b
a) 422
b) 242
c) 224
d) 226
View Answer
Answer: c
a) 165
b) 185
c) 815
d) 516
View Answer
Answer: a
a) 1.010
b) 0.010
c) 0.101
d) 1.101
View Answer
Answer: a
a) A01
b) A02
25
c) B01
d) C01
View Answer
Answer: c
89. Express the decimal format of the signed binary number (10010)2 .
a) 2
b) 12
c) -12
d) -2
View Answer
Answer: d
a) 8
b) 16
c) 13
d) 14
View Answer
Answer: c
a) True
b) False
View Answer
Answer: a
92. The maximum number of bits sufficient to represent a hexadecimal number in binary:
a) 4
26
b) 3
c) 7
d) 8
View Answer
Answer: a
a) 6
b) E
c) 14
d) 15
View Answer
Answer: b
a) 28
b) 83
c) 80
d) 82
View Answer
Answer: d
a) 0B4
b) 0A4
c) 224
d) 0114
View Answer
27
Answer: c
a) 165
b) 185
c) 815
d) 516
View Answer
Answer: a
a) 10
b) 0.010
c) 01.01
d) 10.01
View Answer
Answer: a
a) A01
b) A02
c) B01
d) C01
View Answer
Answer: c
99. What do we call the point(decimal) in any hexadecimal number of the form 111.A3?
a) radix
b) hexadecimal point
28
c) decimal
d) octal point
View Answer
Answer: b
a) Symbolic Data
b) Alphanumeric Data
c) Numeric Data
d) Alphabetic Data
View Answer
Answer: a
a) Symbolic
b) Alphanumeric
c) Alphabetic
d) Numeric
View Answer
Answer: b
a) 8-bit
b) 24-bit
c) 32-bit
d) 64-bit
View Answer
Answer: b
29
103. What are the entities whose values can be changed called?
a) Constants
b) Variables
c) Modules
d) Tokens
View Answer
Answer: b
a) float
b) int
c) real
d) char
View Answer
Answer: c
105. BOOLEAN is a type of data type which basically gives a tautology or fallacy.
a) True
b) False
View Answer
Answer: a
a) Formula Transfer
b) Formula Transformation
c) Formula Translation
d) Format Transformation
View Answer
30
Answer: c
107. The program written by the programmer in high level language is called _____________
a) Object Program
b) Source Program
c) Assembled Program
d) Compiled Program
View Answer
Answer: b
a) C
b) Java
c) COBOL
d) FORTRAN
View Answer
Answer: c
a) Data types
b) Attributes
c) Links
d) Data Objects
View Answer
Answer: b
a) byte
b) memory
31
c) nibble
d) code
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
a) EBCDIC
b) BCD
c) ASCII
d) EDIC
View Answer
Answer: d
a) 6
b) 7
c) 8
d) 5
View Answer
Answer: b
a) 00110100
32
b) 01000011
c) 10011
d) 11100
View Answer
Answer: b
a) 4,2,1
b) 8,4,2,1
c) 6,4,2,1
d) 2,1
View Answer
Answer: b
a) 31
b) 13
c) C1
d) 1C
View Answer
Answer: a
a) 45
b) 54
c) 64
d) 46
View Answer
33
Answer: b
a) 543
b) 544
c) 545
d) 546
View Answer
Answer: c
a) 0110
b) 1110
c) 0111
d) 1100
View Answer
Answer: c
View Answer
Answer: b
a) True
b) False
34
View Answer
Answer: b
View Answer
Answer: a
a) C6
b) C5
c) D6
d) D1
View Answer
Answer: a
a) J
b) N
c) O
d) K
View Answer
Answer: b
a) S
35
b) Z
c) O
d) X
View Answer
Answer: c
a) E9
b) F9
c) G9
d) H9
View Answer
Answer: b
a) 1111
b) 0000
c) 0001
d) 1000
View Answer
Answer: a
a) Programming
b) Machine Codes
c) Mainframes
d) Super Computers
View Answer
36
Answer: c
219. Which of the following character is available in EBCDIC but not in ASCII?
a) cent sign
b) dollar sign
c) comma
d) punctuation
View Answer
Answer: a
View Answer
Answer: a
221. The decimal representation for the character ‘!’ in ASCII is ____________
a) 31
b) 32
c) 33
d) 34
View Answer
Answer: c
37
c) ASCII-7 and ASCII-8
View Answer
Answer: c
a) Characters
b) Symbols
c) Bits
d) Bytes
View Answer
Answer: a
224. The first 128 characters are the same in both the types of ASCII i.e. ASCII-7 and ASCII-8.
a) True
b) False
View Answer
Answer: a
225. The number of characters that can be represented in ASCII-8 are ______________
a) 128
b) 256
c) 32
d) 64
View Answer
Answer: b
a) 1000
38
b) 0100
c) 0010
d) 0001
View Answer
Answer: b
a) 00111000
b) 01001000
c) 1000
d) 00011000
View Answer
Answer: a
a) 01011000
b) 00111000
c) 10001000
d) 00010100
View Answer
Answer: a
229. Express the ASCII equivalent of the signed binary number (00110010)2.
a) 2
b) 1
c) A
d) ,
View Answer
39
Answer: a
a) True
b) False
View Answer
Answer: a
231. Which of the following is not a type of numeric value in zoned format?
a) Positive
b) Negative
c) Double
d) Unsigned
View Answer
Answer: c
a) C
b) D
c) F
d) X
View Answer
Answer: c
233. The EBCDIC value of the number 345 in zoned format is __________
a) F3F4F5
b) E3E4E5
c) F3F4C5
d) F3F4D5
40
View Answer
Answer: a
a) UTF-1
b) UTF-8
c) UTF-A
d) UTF-4
View Answer
Answer: b
235. _________________ defines the assigned ordering among the characters used by the computer.
a) Unicode
b) Collating Sequence
c) Accumulation
d) Sorting
View Answer
Answer: b
a) 23 > A1 > 1A
b) 23 < 1A > A1
c) A1 > 1A > 23
d) A1 < 1A < 23
View Answer
Answer: d
a) UTF-8
41
b) UTF-16
c) UTF-4
d) UTF-32
View Answer
Answer: a
238. Numbers used in packed decimal format can be used for _____________ operations.
a) logical
b) relational
c) arithmetic
d) bitwise
View Answer
Answer: c
a) Radix
b) Complement
c) Sign Magnitude
d) Encode
View Answer
Answer: c
240. The additive inverse of a number is the number which when added to the original number gives 1 as a result.
a) True
b) False
View Answer
Answer: b
42
a) 0001
b) 0
c) 1001
d) 1110
View Answer
Answer: d
242. The binary number 111 in its 2’s complement form is ____________
a) 010
b) 001
c) 000
d) 111
View Answer
Answer: b
a) 00001001
b) 11111001
c) 10001001
d) 11001
View Answer
Answer: c
244. If you are given a word of size n bits, the range of 2’s complement of binary numbers is ________
a) -2n+1 to +2n+1
b) -2n-1 to +2n-1
c) -2n-1 to +2n+1
d) -2n-1 to +2n-1-1
43
View Answer
Answer: d
245. In both signed magnitude and 2’s complement , positive and negative numbers are separated using
______________
a) LSB
b) MSB
c) 0
d) 1
View Answer
Answer: b
a) 4
b) 8
c) 16
d) 32
View Answer
Answer: d
247. If m is the 2’s complement and n is the binary number, then ______________
a) m=n’
b) m=n’+1
c) m=n’-1
d) m=n
View Answer
Answer: b
a) 128
44
b) 8
c) 24
d) 256
View Answer
Answer: d
a) Restoring Multiplication
b) Booth’s Algorithm
c) Pascal’s Rule
d) Digit-by-digit multiplication
View Answer
Answer: b
250. One extra bit is added on the left of a binary number, in case of Binary Multiplication using Booth’s Algorithm.
a) True
b) False
View Answer
Answer: a
251. The binary number obtained after applying RSC on 11010 will be ___________
a) 11101
b) 10100
c) 01101
d) 01000
View Answer
Answer: c
45
a) 01000
b) 01111
c) 00011
d) 11111
View Answer
Answer: a
a) decimal numbers
b) binary numbers
c) hexadecimal numbers
d) octal Numbers
View Answer
Answer: b
254. If Booth’s Multiplication is performed on the numbers 22*3, then what is 3 referred to as __________
a) accumulator
b) multiplicand
c) quotient
d) multiplier
View Answer
Answer: d
255. What is the default value of accumulator in booth’s multiplication of two 4-bit binary numbers?
a) 0
b) 1
c) 0000
d) 00000
46
View Answer
Answer: d
a) 2
b) 3
c) 4
d) 0
View Answer
Answer: a
257. What will be the value obtained after multiplication of (-2) * (-3) using Booth’s Algorithm?
a) 6
b) -6
c) -2
d) -3
View Answer
Answer: a
258. What does the data transfer instruction STA stand for?
a) Store Accumulator
b) Send Accumulator
c) Send Action
d) Store Action
View Answer
Answer: a
a) 11010
47
b) 11011
c) 00110
d) 00101
View Answer
Answer: d
a) True
b) False
View Answer
Answer: a
a) 4
b) 3
c) 7
d) 8
View Answer
Answer: b
a) 1234
b) 3421
c) 3124
d) 3420
View Answer
Answer: b
48
a) left shift
b) right shift
c) greater than
d) less than
View Answer
Answer: b
264. The subtraction using 1’s complement of 110 – 100 will give the result ___________
a) -011
b) 011
c) 010
d) -010
View Answer
Answer: c
265. The result obtained on subtraction using 2’s complement of 1111-0010 will be _________
a) 11101
b) 11011
c) 1101
d) 1011
View Answer
Answer: c
a) 1.010
b) 0000000000.010
c) 1111111110.101
d) 1.101
49
View Answer
Answer: a
a) 432
b) 543
c) 345
d) 777
View Answer
Answer: c
a) 8B2
b) F8B2
c) 2B8
d) 8C2
View Answer
Answer: b
a) 0
b) 1
c) 2
d) 10
View Answer
Answer: a
a) True
50
b) False
View Answer
Answer: b
a) 0
b) 1
c) 11
d) 10
View Answer
Answer: b
272. The complement of any number can be given by a general term _______________
a) Bn – 1 – N
b) Bn -1 + N
c) Bn +1 – N
d) Bn +1 + N
View Answer
Answer: a
273. The IEEE standard followed by almost all the computers for floating point arithmetic _____
a) IEEE 260
b) IEEE 488
c) IEEE 754
d) IEEE 610
View Answer
Answer: c
274. Which of the following is often called the double precision format?
51
a) 64-bit
b) 8-bit
c) 32-bit
d) 128-bit
View Answer
Answer: a
a) Not arithmetic
b) Not a negation
c) Not a number
d) Not a Node
View Answer
Answer: c
276. The result that is smaller than the smallest number obtained is referred to as ___________
a) NaN
b) Underflow
c) Smallest
d) Mantissa
View Answer
Answer: b
a) 1
b) 11
c) 9
d) 23
52
View Answer
Answer: a
278. Express the decimal format of the signed binary number (101010)2 .
a) 10
b) 12
c) -12
d) -10
View Answer
Answer: d
a) 1110
b) 1111
c) 0111
d) 1,1101
View Answer
Answer: b
a) True
b) False
View Answer
Answer: a
a) 0
b) 1
c) invalid
53
d) 10
View Answer
Answer: a
282. The multiplication of 110 * 111 is performed. What is a general term used for 111?
a) Dividend
b) Quotient
c) Multiplicand
d) Multiplier
View Answer
Answer: d
a) 0001111
b) 0011111
c) 1111100
d) 1111000
View Answer
Answer: d
284. Which of the following is often called the double precision format?
a) 64-bit
b) 8-bit
c) 32-bit
d) 128-bit
View Answer
Answer: a
54
a) Multipliers
b) Mid terms
c) Partial Products
d) Multiplicands
View Answer
Answer: c
286. The result that is smaller than the smallest number obtained is referred to as ___________
a) NaN
b) Underflow
c) Smallest
d) Mantissa
View Answer
Answer: b
a) 1
b) 11
c) 9
d) 23
View Answer
Answer: a
288. Express the decimal format of the signed binary number (101010)2 .
a) 10
b) 12
c) -12
d) -10
55
View Answer
Answer: d
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: b
a) True
b) False
View Answer
Answer: b
a) AND
b) OR
c) ADD
d) SUMMATION
View Answer
Answer: b
a) +
b) .
c) !
56
d) *
View Answer
Answer: c
a) ‘
b) +
c) .
d) ,
View Answer
Answer: a
a) x+y=y+x
b) x.y=y.x
c) x.x’=1
d) x+x’=1
View Answer
Answer: c
a) 0
b) 1
c) X
d) 2X
View Answer
Answer: c
57
a) x+y=y+x
b) x+1=1
c) (x’)’=x
d) x.x=x
View Answer
Answer: c
297. Who proposed the use of Boolean algebra in the design of relay switching circuits?
a) George Boole
b) Claude E. Shannon
c) Claude E. Boole
d) George Shannon
View Answer
Answer: b
a) functions
b) algebra
c) operators
d) addition
View Answer
Answer: a
a) Truth values
b) K=f(X,Y,X)
c) Algebraic Expression
d) Truth Table
58
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
301. In the boolean function w=f(X,Y,Z), what is the RHS referred to as ________
b) expression
c) literals
d) boolean
View Answer
Answer: b
302. The general form for calculating the number of rows in a truth table is ________
a) 2n
b) 2n+1
c) 2n
d) 2n+1
View Answer
Answer: c
a) 4
b) 3
c) 2
59
d) 1
View Answer
Answer: b
a) XYZ’+X’Y’
b) (X+Y+Z’)(X’+Y’)
c) (X+Y+Z’)(X’+Y)
d) (X+Y+Z’)(X’+Y)
View Answer
Answer: b
a) X+YZ
b) X’+Y+’Z’
c) X+Y+Z’
d) XYZ’
View Answer
Answer: c
a) Mt
b) m
c) M
d) min
View Answer
Answer: b
60
a) x’+y’+z’
b) xyz
c) x’y’z’
d) x+y+z
View Answer
Answer: c
a) x’+y’+z’
b) xyz
c) x’y’z’
d) x+y+z
View Answer
Answer: a
a) max terms
b) min terms
c) mid terms
d) sum terms
View Answer
Answer: b
310. A sum of products expression is a product term (min term) or several min terms ANDed together.
a) True
b) False
View Answer
Answer: b
61
311. Which of the following is an incorrect SOP expression?
a) x+x.y
b) (x+y)(x+z)
c) x
d) x+y
View Answer
Answer: b
312. The corresponding min term when x=0, y=0 and z=1.
a) x.y.z’
b) X’+Y’+Z
c) X+Y+Z’
d) x’.y’.z
View Answer
Answer: d
View Answer
Answer: a
a) NOR
b) ExOR
c) SOP
62
d) POS
View Answer
Answer: c
a) 8
b) 3
c) 0
d) 1
View Answer
Answer: a
a) 2n
b) n2
c) 2n
d) n
View Answer
Answer: c
317. The output of AND gates in the SOP expression is connected using the ________ gate.
a) XOR
b) NOR
c) AND
d) OR
View Answer
Answer: d
63
a) AB+BC
b) (A+B)(A+C)
c) (A+C)B
d) (A+B)C
View Answer
Answer: b
319. Electronic circuits that operate on one or more input signals to produce standard output _______
a) Series circuits
b) Parallel Circuits
c) Logic Signals
d) Logic Gates
View Answer
Answer: d
320. Logic Gates are the building blocks of all circuits in a computer.
a) True
b) False
View Answer
Answer: a
321. A __________ gate gives the output as 1 only if all the inputs signals are 1.
a) AND
b) OR
c) EXOR
d) NOR
View Answer
Answer: a
64
322. The boolean expression of an OR gate is _______
a) A.B
b) A’B+AB’
c) A+B
d) A’B’
View Answer
Answer: c
323. The gate which is used to reverse the output obtained is _____
a) NOR
b) NAND
c) EXOR
d) NOT
View Answer
Answer: d
324. Which of the following gate will give a 0 when both of its inputs are 1?
a) AND
b) OR
c) NAND
d) EXOR
View Answer
Answer: c
325. When logic gates are connected to form a gating/logic network it is called as a ______________ logic circuit.
a) combinational
b) sequential
c) systematic
65
d) hardwired
View Answer
Answer: a
a) NOR
b) NAND
c) EXOR
d) NOT
View Answer
Answer: d
a) A’B+AB’
b) AB+A’B’
c) A+A.B
d) A’+B’
View Answer
Answer: a
328. A ____________ is a circuit with only one output but can have multiple inputs.
a) Logic gate
b) Truth table
c) Binary circuit
d) Boolean circuit
View Answer
Answer: a
66
a) True
b) False
View Answer
Answer: b
330. The Output is LOW if any one of the inputs is HIGH in case of a _________ gate.
a) NOR
b) NAND
c) OR
d) AND
View Answer
Answer: b
a) NOR
b) NAND
c) EXOR
d) OR
View Answer
Answer: a
a) NOR
b) AND+NOR
c) NOT
d) EX-OR
View Answer
Answer: c
67
333. How many AND gates are required to realize the following expression Y=AB+BC?
a) 4
b) 8
c) 1
d) 2
View Answer
Answer: d
a) 1
b) 2
c) 3
d) 0
View Answer
Answer: b
a) NAND
b) EXOR
c) NOR
d) EXNOR
View Answer
Answer: c
a) A.B
b) A’B+AB’
c) (A.B)’
68
d) (A+B)’
View Answer
Answer: c
a)( A+B)(C+D)=AB+CD
b) (A+B).C=AC+BC
c) (AB)(A+B)=AB
d) (A.B)C=AC.AB
View Answer
Answer: b
a) Control unit
d) Memory
View Answer
Answer: c
339. Control Unit acts as the central nervous system of the computer.
a) True
b) False
View Answer
Answer: a
69
c) Main Buffer Routine
View Answer
Answer: d
a) B
b) A
c) Buffer
d) C
View Answer
Answer: b
a) Program Changer
b) Program Counter
c) Performance Counter
d) Performance Changer
View Answer
Answer: b
a) PC
b) MAR
c) MBR
d) IR
View Answer
Answer: d
70
344. The portion of the processor which contains the hardware required to fetch the operations is _______
a) Datapath
b) Processor
c) Control
d) Output unit
View Answer
Answer: a
345. Causing the CPU to step through a series of micro operations is called _________
a) Execution
b) Runtime
c) Sequencing
d) Pipelining
View Answer
Answer: c
346. The functions of execution and sequencing are performed by using ______________
a) Input Signals
b) Output Signals
c) Control Signals
d) CPU
View Answer
Answer: c
a) Digital
b) Direct
c) Delay
71
d) Durable
View Answer
Answer: c
348. CPU has built-in ability to execute a particular set of machine instructions, called as __________
a) Instruction Set
b) Registers
c) Sequence Set
d) User instructions
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
a) word limit
b) word size
c) register limit
d) register size
View Answer
Answer: b
351. The _________ holds the contents of the accessed memory word.
a) MAR
b) MBR
72
c) PC
d) IR
View Answer
Answer: b
b) Address Register
c) Status Register
d) MAR
View Answer
Answer: d
b) ADD A, B
c) MUL C, D
d) RET
View Answer
Answer: a
354. What is correct instruction if you want the control to go to the location 2000h?
a) MOV 2000h
b) MOV A, 2000h
c) JMP 2000h
d) RET 2000h
View Answer
Answer: c
73
355. What kind of a flag is the sign flag?
a) General Purpose
b) Status
c) Address
d) Instruction
View Answer
Answer: b
a) 1
b) 11
c) 9
d) 23
View Answer
Answer: a
357. New CPU whose instruction set includes the instruction set of its predecessor CPU is said to be ___________
with its predecessor.
a) fully compatible
b) forward compatible
c) compatible
d) backward compatible
View Answer
Answer: d
358. What is the high speed memory between the main memory and the CPU called?
a) Register Memory
b) Cache Memory
c) Storage Memory
74
d) Virtual Memory
View Answer
Answer: b
a) True
b) False
View Answer
Answer: b
360. Whenever the data is found in the cache memory it is called as _________
a) HIT
b) MISS
c) FOUND
d) ERROR
View Answer
Answer: a
View Answer
Answer: c
362. When the data at a location in cache is different from the data located in the main memory, the cache is called
_____________
a) Unique
b) Inconsistent
75
c) Variable
d) Fault
View Answer
Answer: b
363. Which of the following is not a write policy to avoid Cache Coherence?
a) Write through
b) Write within
c) Write back
d) Buffered write
View Answer
Answer: b
a) Snoopy writes
b) Write through
c) Write within
d) Buffered write
View Answer
Answer: a
365. In ____________ mapping, the data can be mapped anywhere in the Cache Memory.
a) Associative
b) Direct
c) Set Associative
d) Indirect
View Answer
Answer: a
76
366. The number of sign bits in a 32-bit IEEE format is ____
a) 1
b) 11
c) 9
d) 23
View Answer
Answer: a
a) Block transfer
b) Word transfer
c) Set transfer
d) Associative transfer
View Answer
Answer: b
368. Computer has a built-in system clock that emits millions of regularly spaced electric pulses per _____ called clock
cycles.
a) second
b) millisecond
c) microsecond
d) minute
View Answer
Answer: a
a) True
b) False
View Answer
77
Answer: a
370. The operation that does not involves clock cycles is _________
a) Installation of a device
b) Execute
c) Fetch
d) Decode
View Answer
Answer: a
a) Clock speed
b) Clock frequency
c) Clock rate
d) Clock timing
View Answer
Answer: a
View Answer
Answer: b
a) CISC
b) RISC
78
c) EPIC
d) Multi-core
View Answer
Answer: b
a) RISC
b) EPIC
c) CISC
d) Multi-core
View Answer
Answer: c
375. The architecture that uses a tighter coupling between the compiler and the processor is ____________
a) EPIC
b) Multi-core
c) RISC
d) CISC
View Answer
Answer: a
View Answer
Answer: a
79
377 .A circuitry that processes that responds to and processes the basic instructions that are required to drive a
computer system is ________
a) Memory
b) ALU
c) CU
d) Processor
View Answer
Answer: d
378. Any electronic holding place where data can be stored and retrieved later whenever required is ____________
a) memory
b) drive
c) disk
d) circuit
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
380. Which of the following is the fastest means of memory access for CPU?
a) Registers
b) Cache
c) Main memory
d) Virtual Memory
View Answer
80
Answer: a
a) Cache
b) Main
c) Secondary
d) Registers
View Answer
Answer: b
382. Size of the ________ memory mainly depends on the size of the address bus.
a) Main
b) Virtual
c) Secondary
d) Cache
View Answer
Answer: a
a) Secondary memory
b) Main memory
c) Onboard memory
d) Cache memory
View Answer
Answer: a
384. ____________ storage is a system where a robotic arm will connect or disconnect off-line mass storage media
according to the computer operating system demands.
a) Secondary
b) Virtual
81
c) Tertiary
d) Magnetic
View Answer
Answer: c
a) Internal
b) On-chip
c) External
d) Motherboard
View Answer
Answer: b
View Answer
Answer: a
387. If M denotes the number of memory locations and N denotes the word size, then an expression that denotes the
storage capacity is ______________
a) M*N
b) M+N
c) 2M+N
d) 2M-N
View Answer
Answer: a
82
388. Computer has a built-in system clock that emits millions of regularly spaced electric pulses per _____ called clock
cycles.
a) second
b) millisecond
c) microsecond
d) minute
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
390. The operation that does not involves clock cycles is ____________
a) Installation of a device
b) Execute
c) Fetch
d) Decode
View Answer
Answer: a
a) Clock speed
b) Clock frequency
c) Clock rate
d) Clock timing
View Answer
83
Answer: a
View Answer
Answer: b
a) CISC
b) RISC
c) EPIC
d) Multi-core
View Answer
Answer: b
a) RISC
b) EPIC
c) CISC
d) multi-core
View Answer
Answer: c
395. The architecture that uses a tighter coupling between the compiler and the processor.
a) EPIC
b) Multi-core
84
c) RISC
d) CISC
View Answer
Answer: a
c) Hold Acknowledgement
d) Hold Data
View Answer
Answer: c
a) 64bits
b) 16 bits
c) 8 bits
d) 32 bits
View Answer
Answer: c
a) secondary memory
b) tertiary memory
c) primary memory
d) cache memory
View Answer
Answer: a
85
399. Secondary storage virtually has an unlimited capacity because the cost per bit is very low.
a) True
b) False
View Answer
Answer: a
a) Sequential
b) Direct access
c) Step
d) Indirect
View Answer
Answer: a
401. The magnetic tape is generally a plastic ribbon coated with ______
a) Magnesium oxide
b) Chromium dioxide
c) Zinc oxide
d) Copper oxide
View Answer
Answer: b
a) Binary digits
b) Decimal digits
c) Hex digits
d) Oct digits
View Answer
86
Answer: a
403. Which of the following is the correct representation for a storage capacity of a tape?
View Answer
Answer: c
404. The number of characters/second that can be transmitted to the memory from the tape is denoted by the term.
b) Transmission mode
c) Transmission rate
d) Data mode
View Answer
Answer: a
a) 7.7 MB/s
b) 6.6 MB/s
c) 5.5 MB/s
d) 10 MB/s
View Answer
Answer: a
a) Interpreter
b) Tape controller
87
c) CPU
d) Processor
View Answer
Answer: b
a) Magnetic disk
b) Magnetic tape
c) Magnetic frames
d) Magnetic Ribbon
View Answer
Answer: b
a) True
b) False
View Answer
Answer: b
409. The disk’s surface is divided into a number of invisible concentric circles called:
a) Drives
b) Tracks
c) Slits
d) References
View Answer
Answer: b
a) less than 5
88
b) 10 or more
c) 8 or more
d) less than 7
View Answer
Answer: c
a) 64
b) 128
c) 256
d) 512
View Answer
Answer: d
a) Sector size
b) Sector number
c) Track number
d) Surface number
View Answer
Answer: a
a) Cylinder-high-sector
b) Concentric-head-sector
c) Cylinder-head-sector
d) Concentric-high-sector
View Answer
89
Answer: c
414. The interval between the instant a computer makes a request for the transfer of data from a disk system to the
primary storage and the instance this operation is completed is called _________
View Answer
Answer: b
415. Disk access time does not depends on which of the following factors __________
a) Seek time
b) Latency
c) Transfer rate
d) Arrival rate
View Answer
Answer: d
416. The time required to spin the desired sector under the read/write head, once the read/write head is positioned
on the desired track.
a) Seek time
b) Arrival rate
c) Latency
d) Transfer rate
View Answer
Answer: c
417. A ____________ disk consists of a circular disk, which is coated with a thin metal or some other material that is
highly reflective.
a) magnetic
90
b) optical
c) compact
d) hard
View Answer
Answer: b
418. Optical disks are proved to be a promising random access medium for high capacity secondary storage.
a) True
b) False
View Answer
Answer: a
a) Reflective
b) Refractive
c) Laser Beam
d) Diffraction
View Answer
Answer: c
View Answer
Answer: a
421. Rotation of the disk must vary __________ with the radius of the disk.
91
a) directly
b) inversely
c) concurrently
d) accordingly
View Answer
Answer: b
422. Which of the following correctly represents the track pattern of an optical disk ?
a) computer-fundamentals-questions-answers-optical-disks-q6a
b) computer-fundamentals-questions-answers-optical-disks-q6b
c) computer-fundamentals-questions-answers-optical-disks-q6c
d) computer-fundamentals-questions-answers-optical-disks-q6d
View Answer
Answer: a
423. The tracks are divided into sectors whose size _______
b) keeps increasing
c) keeps decreasing
d) remains uneven
View Answer
Answer: a
424. CLV stands for, in terms of rotation of the optical disk ___
92
View Answer
Answer: a
b) 10 to 30 milliseconds
d) 20 to 40 milliseconds
View Answer
Answer: a
a) DVD
b) CD
c) WORM
d) Winchester
View Answer
Answer: d
a) optical disks
b) magnetic disks
c) compact disks
d) magnetic drives
View Answer
Answer: b
a) True
93
b) False
View Answer
Answer: b
429. A plug and play storage device that simply plugs in the port of a computer is __________
a) Flash drive
b) Compact disk
c) Hard disk
d) CD
View Answer
Answer: a
View Answer
Answer: c
a) Memory card
b) Compact drive
c) Compact disk
d) Memory disk
View Answer
Answer: a
94
a) Redundant array of independent disks
View Answer
Answer: b
433. A set of hard disk drives with a controller mounted in a single box, forming a single large storage unit is
____________
a) Disk array
b) Drives
c) Compact drives
d) Multi-cores
View Answer
Answer: a
434. The process in which a file is partitioned into smaller parts and different parts are stored in different disks is
____________
a) RAID
b) Mirroring
c) Stripping
d) RAID classification
View Answer
Answer: c
435. Which of the following uses multiple hard disk platters mounted on a single central shift?
a) Disk drives
b) Hard disks
c) Disk packs
95
d) Compact disks
View Answer
Answer: c
a) Floppy
b) Winchester
c) Zip
d) FLASH
View Answer
Answer: d
437. These devices provide a means of communication between a computer and outer world.
a) I/O
b) Storage
c) Compact
d) Drivers
View Answer
Answer: a
438. The I/O devices are sometimes called the peripheral devices because they surround the CPU and memory of the
computer system.
a) True
b) False
View Answer
Answer: a
a) Processor
b) Memory
96
c) CPU
d) Storage
View Answer
Answer: c
View Answer
Answer: d
a) Keypad
b) Trackball
c) Touch screen
d) Mouse
View Answer
Answer: a
442. A device used for video games, flight simulators, training simulators and for controlling industrial robots.
a) Mouse
b) Light pen
c) Joystick
d) Keyboard
View Answer
Answer: c
97
443. The unattended interactive information systems such as automatic teller machine or ATM is called as _________
a) Kiosks
b) Sioks
c) Cianto
d) Kiaks
View Answer
Answer: a
444. Which are the input devices that enable direct data entry into a computer system from source documents?
View Answer
Answer: a
a) Flat-held
b) Hand-led
c) Flat-bed
d) Compact
View Answer
Answer: c
446. Which of the following is capable of recognizing a pre-specified type of mark by pencil or pen?
a) OMR
b) Winchester
98
d) Image Scanner
View Answer
Answer: a
447. Input Devices that use a special ink that contains magnetizable particles of iron oxide are ____
a) Optical disks
b) Magnetic disks
c) MICR
d) Magnetic drives
View Answer
Answer: c
a) True
b) False
View Answer
Answer: b
449. A printer that prints one line at a time and has a predefined set of characters is called _______
a) Laser
b) Drum
c) Inkjet
d) Impact
View Answer
Answer: b
a) Flatbed
b) Laser
99
c) Drum
d) Impact
View Answer
Answer: c
451. Name the device that converts text information into spoken sentences.
a) Speech Sensors
b) Compact convertors
c) Speech Synthesizers
d) Voice systems
View Answer
Answer: c
a) Digitizing tablet
b) Cursor
c) Stick
d) Stylus
View Answer
Answer: c
453. Which is the device used for converting maps, pictures and drawings into digital form for storage in computers?
a) Digitizer
b) Scanner
c) Image Scanner
d) MICR
View Answer
Answer: a
100
454. The process in which a file is partitioned into smaller parts and different parts are stored in different disks is
called _________
a) RAID
b) Mirroring
c) Stripping
d) RAID classification
View Answer
Answer: c
455. Which of the following Printers have a speed in the range of 40-300 characters per second?
a) Inkjet
b) Laser
c) Dot matrix
d) Drum
View Answer
Answer: a
a) Hard copy
b) Soft copy
c) Duplicate copy
d) On paper
View Answer
Answer: b
457. Input Devices that use a special ink that is used for converting pictures, maps and drawings into digital format.
a) Digitizers
b) Digital pens
c) Light Pens
101
d) MICR
View Answer
Answer: a
a) True
b) False
View Answer
Answer: b
a) Laser
b) Digital
c) Analog
d) Complex
View Answer
Answer: c
460. Which of the following term is used when different forms of information like text, sound is converted to a binary
code?
a) Digitalization
b) Digitization
c) Binarization
d) Digization
View Answer
Answer: b
a) Discretization
b) Quantization
102
c) Discretization + Quantization
d) Analog conversion
View Answer
Answer: d
a) Digitizing tablet
b) Cursor
c) Stick
d) Stylus
View Answer
Answer: c
463. The process of making digital information work for you is called ___________
a) Digitization
b) Digital Transformation
c) Digitalization
d) Analogization
View Answer
Answer: c
View Answer
Answer: a
103
465. Which of the following Techniques are used to optimize field services?
a) AI
b) ML
c) CC
d) Reality tools
View Answer
Answer: a
466. Obtaining services from a rapidly evolving group of internet users __________
a) Outsourcing
b) Crowd Sourcing
c) Human collaboration
d) Human Computation
View Answer
Answer: b
c) Text to Speech
d) Typography to speech
View Answer
Answer: c
468. Text analysis is all about converting the input text into a ‘speakable’ form.
a) True
b) False
View Answer
104
Answer: a
469. A concept that contains rhythm of speech, stress patterns and intonation is ________
a) Text synthesis
b) Prosody
c) Speech Synthesis
d) Formant Synthesis
View Answer
Answer: b
470. Which of the following does not come under text analysis?
b) Speech Synthesis
c) Prosonic Analysis
d) Prosodic Analysis
View Answer
Answer: c
471. What is the medium to convert text information into spoken sentences?
a) Speech Sensors
b) Compact convertors
c) Speech Synthesizers
d) Voice systems
View Answer
Answer: c
a) Prosody
b) Phonetic Analysis
105
c) Speech Synthesis
d) Text Analysis
View Answer
Answer: a
a) Formant
b) Summative
c) Articulator
d) Concatenative
View Answer
Answer: b
474. Speech Synthesis method based on the generation of periodic and non-periodic signals is ____________
a) Formant
b) Summative
c) Conactenative
d) Articulative
View Answer
Answer: a
View Answer
Answer: a
106
476. A speech synthesis model which tries to model the human speech production mechanisms is _________
a) Articulatory Synthesis
b) Formant Synthesis
c) Summative Synthesis
d) Concatenative Synthesis
View Answer
Answer: a
a) Software
b) Package
c) Hardware
d) System Software
View Answer
Answer: c
a) True
b) False
View Answer
Answer: b
479. ____________ refer to renewing or changing components like increasing the main memory, or hard disk
capacities, or adding speakers, or modems, etc.
a) Grades
b) Prosody
c) Synthesis
d) Upgrades
View Answer
107
Answer: d
a) Application Software
b) System Software
c) Utility Software
d) User
View Answer
Answer: b
a) Language Translator
b) Utility Software
c) Communication Software
d) Word Processors
View Answer
Answer: d
a) User
b) Software Manager
c) System Developer
d) System Programmer
View Answer
Answer: d
a) Application Software
b) System Software
108
c) Utility Software
d) User
View Answer
Answer: a
c) COBOL
d) C
View Answer
Answer: a
a) Command
b) Process
c) Task
d) Instruction
View Answer
Answer: b
a) Terminated
b) Running
c) Blocked
d) Execution
View Answer
Answer: c
109
487. The software designed to perform a specific task:
a) Synchronous Software
b) Package Software
c) Application Software
d) System Software
View Answer
Answer: c
a) True
b) False
View Answer
Answer: a
489. Developing software __________ means a major commitment of time, money and resources.
a) In-house
b) In-sync
c) On-date
d) On-duration
View Answer
Answer: a
View Answer
110
Answer: d
View Answer
Answer: b
a) System supported
b) Source supported
c) Community supported
d) Programmer supported
View Answer
Answer: c
a) Software Package
b) System Software
c) Utility Software
d) File package
View Answer
Answer: a
111
c) COBOL
d) C
View Answer
Answer: b
a) Command
b) Process
c) Task
d) Instruction
View Answer
Answer: a
496. They normally interact with the system via user interface provided by the application software.
a) Programmers
b) Developers
c) Users
d) Testers
View Answer
Answer: c
a) Synchronous Software
b) Package Software
c) Firmware
d) Middleware
View Answer
Answer: c
112
498. Middleware has enabled the production of various types of smart machines having microprocessor chips with
embedded software.
a) True
b) False
View Answer
Answer: b
a) Middleware
b) Firmware
c) Package
d) System Software
View Answer
Answer: a
c) Middleware of messages
View Answer
Answer: a
a) Cache Memory
b) RAM
c) External
d) ROM
View Answer
113
Answer: d
View Answer
Answer: a
503. A software that lies between the OS and the applications running on it.
a) Firmware
b) Middleware
c) Utility Software
d) Application Software
View Answer
Answer: b
504. A type of middleware that allows for between the built-in applications and the real-time OS?
a) Firmware
b) Database middleware
c) Portals
d) Embedded Middleware
View Answer
Answer: d
114
c) Object Request broker
View Answer
Answer: c
506. The _______ calls certain procedures on remote systems and is used to perform synchronous or asynchronous
interactions between systems.
a) Procedure
b) RPC
c) Message Oriented
d) DB
View Answer
Answer: b
a) Synchronous Software
b) Package Software
c) OSS
d) Middleware
View Answer
Answer: c
a) True
b) False
View Answer
Answer: a
a) image format
115
b) file format
c) internet format
d) html format
View Answer
Answer: a
View Answer
Answer: c
a) LibreOffice
b) Microsoft Office
d) MySQL
View Answer
Answer: b
512. The users must agree to the _______ terms and agreements when they use an open source software.
a) System
b) License
c) Community
d) Programmer
View Answer
116
Answer: b
b) Restricted choice
c) No warranty
d) Multiple choices
View Answer
Answer: d
a) Nvu
b) KOffice
c) AbiWorld
d) Open Office
View Answer
Answer: a
a) Nvu
b) Open Office
c) Bluefish
d) GIMPshop
View Answer
Answer: d
a) Virtue Mart
b) Drupal
117
c) Pidgin
d) ZenCart
View Answer
Answer: c
517. A guideline for the OSS licenses other than the GPL.
a) OSI
b) OSD
c) OSE
d) OSL
View Answer
Answer: b
518. GPL of GNU says that every copy of a program governed by GPL license, even if modified, must be subject to GPL
again.
a) True
b) False
View Answer
Answer: a
519. Richard Stallman from MIT, established a special license, the ________ license.
a) GNU
b) Free
c) Package
d) Commercial
View Answer
Answer: a
520. In 1969 AT&T laboratories developed ______ which supported and worked on different hardware platforms.
a) Linux
118
b) Unix
c) Windows
d) Ubuntu
View Answer
Answer: b
View Answer
Answer: b
a) System supported
b) Source supported
c) Community supported
d) Programmer supported
View Answer
Answer: c
a) Software Package
b) System Software
c) Utility Software
d) File package
View Answer
119
Answer: a
c) COBOL
d) C
View Answer
Answer: b
a) Command
b) Process
c) Task
d) Instruction
View Answer
Answer: a
526. They normally interact with the system via user interface provided by the application software.
a) Programmers
b) Developers
c) Users
d) Testers
View Answer
Answer: c
527. The word ____________comes from the name of a Persian mathematician Abu Ja’far Mohammed ibn-i Musa al
Khowarizmi.
a) Flowchart
b) Flow
120
c) Algorithm
d) Syntax
View Answer
Answer: c
528. In computer science, algorithm refers to a special method usable by a computer for the solution to a problem.
a) True
b) False
View Answer
Answer: a
529. This characteristic often draws the line between what is feasible and what is impossible.
a) Performance
b) System Evaluation
c) Modularity
d) Reliability
View Answer
Answer: a
530. The time that depends on the input: an already sorted sequence that is easier to sort.
a) Process
b) Evaluation
c) Running
d) Input
View Answer
Answer: c
121
a) as pseudo codes
b) as syntax
c) as programs
d) as flowcharts
View Answer
Answer: b
532. When an algorithm is written in the form of a programming language, it becomes a _________
a) Flowchart
b) Program
c) Pseudo code
d) Syntax
View Answer
Answer: b
a) True
b) False
View Answer
Answer: b
534. A system wherein items are added from one and removed from the other end.
a) Stack
b) Queue
c) Linked List
d) Array
View Answer
Answer: b
122
535. Another name for 1-D arrays.
a) Linear arrays
b) Lists
c) Horizontal array
d) Vertical array
View Answer
Answer: a
a) Queue
b) LL
c) Stack
d) Union
View Answer
Answer: c
a) I/O
b) Flow
c) Terminal
d) Decision
View Answer
Answer: c
a) True
b) False
View Answer
123
Answer: b
a) Performance
b) Evaluation
c) Algorithmic Representation
d) Flowcharting
View Answer
Answer: d
a) Circles
b) Boxes
c) Arrows
d) Lines
View Answer
Answer: b
a) Decision
b) Initiation
c) Initialization
d) I/O
View Answer
Answer: a
a) Rectangle
b) Diamond
124
c) Circle
d) Parallelogram
View Answer
Answer: b
543. There should be certain set standards on the amount of details that should be provided in a flowchart.
a) True
b) False
View Answer
Answer: b
a) Stack
b) Macro
c) Micro
d) Union
View Answer
Answer: c
a) Better communication
b) Efficient coding
c) Systematic testing
d) Improper documentation
View Answer
Answer: d
a) Queue
125
b) Macro
c) Micro
d) Union
View Answer
Answer: b
a) Algorithm
b) Hash Table
c) Graph
d) Flowchart
View Answer
Answer: d
a) True
b) False
View Answer
Answer: b
a) Input/Output
b) Assignment
c) Comparison
d) Conditions
View Answer
Answer: a
126
a) Process
b) Sequence
c) Repetition
d) Case
View Answer
Answer: a
551. The action performed by a ___________ structure must eventually cause the loop to terminate.
a) sequence
b) case
c) repetition
d) process
View Answer
Answer: c
a) Module
b) Terminal
c) Process
d) i/o operation
View Answer
Answer: a
a) sequence
b) case
c) repetition
d) process
127
View Answer
Answer: c
a) sequence
b) case
c) repetition
d) process
View Answer
Answer: b
555. A _______ is a connector showing the relationship between the representative shapes.
a) line
b) arrow
c) Process
d) box
View Answer
Answer: b
a) Decision
b) Input/Output
c) Process
d) Module
View Answer
Answer: a
557. Keep the statement language ______________ while writing a pseudo code.
a) Dependent
128
b) Independent
c) Case sensitive
d) Capitalized
View Answer
Answer: b
558. Capitalize initial keyword – This is a rule while writing a pseudo code.
a) True
b) False
View Answer
Answer: a
a) Read
b) Write
c) start
d) endif
View Answer
Answer: c
a) Indentation
b) Curly Braces
c) Round Brackets
d) Semicolon
View Answer
Answer: a
561. The statement that tells the computer to get a value from an input device and store it in a memory location.
129
a) read
b) write
c) READ
d) WRITE
View Answer
Answer: c
562. _____________ are identified by their addresses, we give them names (field names / variable names) using
words.
a) Memory variables
b) Memory Locations
c) Memory Addresses
d) Data variables
View Answer
Answer: b
a) Keywords
b) Variables
c) Tokens
d) Functions
View Answer
Answer: b
a) *
b) **
c) ***
d) *^
130
View Answer
Answer: b
a) ()
b) {}
c) [].
d) ” ”
View Answer
Answer: a
a) ELSE
b) ELSEIF
c) END
d) ENDIF
View Answer
Answer: d
a) Structural
b) C programming
c) Procedural
d) Fine
View Answer
Answer: a
a) True
131
b) False
View Answer
Answer: a
569. A ________ is a directed graph that describes the flow of execution control of the program.
a) Flowchart
b) Flow graph
c) Complexity curve
d) Algorithm
View Answer
Answer: a
a) Secure
b) Sequential
c) Ordered
d) Simple
View Answer
Answer: b
a) Else
b) Elif
c) If
d) Switch
View Answer
Answer: c
132
a) IF
b) ELSE
c) WHILE
d) DO
View Answer
Answer: c
a) for(initialization;condition;update)
b) for(initialization,condition,update)
c) for(condition;initialization;update)
d) for(initialization;condition;)
View Answer
Answer: a
a) Function definition
b) Function call
c) for loop
d) while loop
View Answer
Answer: b
a) 1
b) 0
c) 2
d) more than 2
133
View Answer
Answer: a
a) for
b) elif
c) while
d) do-while
View Answer
Answer: b
a) Machine
b) C
c) BASIC
d) High level
View Answer
Answer: a
a) True
b) False
View Answer
Answer: b
579. The ___________ contains the address of the next instruction to be executed.
a) IR
b) PC
c) Accumulator
134
d) System counter
View Answer
Answer: b
a) 256
b) 124
c) 4096
d) 3096
View Answer
Answer: c
581. A document that specifies how many times and with what data the program must be run in order to thoroughly
test it.
a) addressing plan
b) test plan
c) validation plan
d) verification plan
View Answer
Answer: b
582. An approach that designs test cases by looking at the allowable data values.
a) Maintenance
b) Evaluation
c) Data coverage
d) Validation
View Answer
Answer: c
583. The formal grammar rules governing the construction of valid instruction.
135
a) test case
b) syntax
c) program
d) semantics
View Answer
Answer: b
584. A program that reads each of the instructions in mnemonic form and translates it into the machine-language
equivalent.
a) Machine language
b) Assembler
c) Interpreter
d) C program
View Answer
Answer: b
585. An approach that designs test cases by looking at the allowable data values.
a) Data coverage
b) Code Coverage
c) Debugging
d) Validation
View Answer
Answer: a
a) Semantics
b) Syntax
c) Code
d) Cases
136
View Answer
Answer: a
587. Each personal computer has a _________ that manages the computer’s arithmetical, logical and control
activities.
a) Microprocessor
b) Assembler
c) Microcontroller
d) Interpreter
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
a) 2-byte
b) 4-byte
c) 8-byte
d)16-byte
View Answer
Answer: a
a) Segment Address
b) Absolute Address
c) Offset
137
d) Memory Address
View Answer
Answer: b
a) nasm
b) tasm
c) gas
d) asm
View Answer
Answer: b
a) Executable instructions
b) Pseudo-ops
c) Logical instructions
d) Macros
View Answer
Answer: a
593. The segment containing data values passed to functions and procedures within the program.
a) Code
b) Data
c) Stack
d) System
View Answer
Answer: c
594. To speed up the processor operations, the processor includes some internal memory storage locations, called
___________
138
a) Drives
b) Memory
c) Units
d) Registers
View Answer
Answer: d
595. To locate the exact location of data in memory, we need the starting address of the segment, which is found in
the DS register and an offset value. This offset value is also called?
a) Effective Address
c) Memory address
d) General Address
View Answer
Answer: a
a) Hexadecimal
b) Binary
c) Octal
d) Decimal
View Answer
Answer: a
a) Logic Programming
b) Procedural Programming
c) OOP
d) Functional
139
View Answer
Answer: a
a) True
b) False
View Answer
Answer: b
a) Compiler
b) Interpreter
c) Sensor
d) Circuitry
View Answer
Answer: b
a) native code
b) executable code
c) complex code
d) machine code
View Answer
Answer: a
a) Byte Code
b) Smart code
c) Executable code
140
d) Machine code
View Answer
Answer: a
a) Byte code
b) Machine code
c) Native code
d) Executable code
View Answer
Answer: a
a) Just in time
b) Jump in time
c) Jump in text
d) Jump in terms
View Answer
Answer: a
View Answer
Answer: a
141
a) C
b) C++
c) java
d) C#
View Answer
Answer: d
a) machine code
b) platform independent
c) interactive execution
d) user-friendly
View Answer
Answer: a
a) C++
b) C
c) MATLAB
d) Fortran
View Answer
Answer: c
a) True
b) False
View Answer
Answer: b
142
609. The first widely-used high level language developed in 1957.
a) C
b) Java
c) Fortran
d) Cobol
View Answer
Answer: c
a) Exe file
b) Doc file
c) Obj file
d) Source file
View Answer
Answer: d
a) include statement
b) import statement
c) program statement
d) @data statement
View Answer
Answer: c
a) System supported
b) Source supported
c) Case Sensitive
143
d) Programmer supported
View Answer
Answer: c
a) Semicolon
b) Blank space
c) Colon
d) Comma
View Answer
Answer: b
614. A program that reads the source code and converts it to a form usable by the computer.
a) Interpreter
b) Compiler
c) Linker
d) Assembler
View Answer
Answer: b
a) real :: Celsius
b) real Celsius;
c) Celsius real;
d) real : Celsius
View Answer
Answer: a
616. In FORTRAN, the declarations of variables can be modified using the _____ parameter.
144
a) kind
b) make
c) select
d) change
View Answer
Answer: a
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
619. Which of the following is not a part of the program division in COBOL?
a) Identification
b) Environment
c) Procedure
d) Compilation
View Answer
Answer: d
145
620. Which of the following is not a part of the Identification division?
a) Paragraphs
b) Entries
c) Phrases
d) Clauses
View Answer
Answer: c
a) Data
b) Draft
c) Debugger
d) Debugging lines
View Answer
Answer: d
a) *
b) /
c) //
d) ;
View Answer
Answer: a
a) Declare program id
b) Declare variables
c) File control
146
d) Input-Output section
View Answer
Answer: b
a) numeric
b) alphanumeric
c) alphabetic
d) float
View Answer
Answer: d
a) A symbol
b) A character
c) A sign
d) Alphanumeric sign
View Answer
Answer: b
a) kind
b) attach
c) select
d) usage
View Answer
Answer: d
147
a) Control testing
b) Graybox
c) Glassbox
d) Black box
View Answer
Answer: c
628. Test cases ensure that all the statements are executed atleast once.
a) True
b) False
View Answer
Answer: a
629. Which of the following divides the input domain into classes containing data?
a) Equivalent partitioning
b) Environment partitioning
c) Procedure division
d) Compilation division
View Answer
Answer: a
a) Unit testing
b) Entry testing
c) Phrase testing
d) Code testing
View Answer
Answer: a
148
631. SDLC stands for ________
View Answer
Answer: a
View Answer
Answer: b
a) Audit
b) Inspection
c) Control
d) Monitoring
View Answer
Answer: a
a) Audit
b) Testing
c) Inspection
149
d) Unit testing
View Answer
Answer: c
a) Identifying
b) Isolating
c) Test
d) Fixing
View Answer
Answer: c
a) IEEE 1008
b) IEEE 1005
c) IEEE 1009
d) IEEE 1000
View Answer
a) Controlling
b) Tracing
c) Stepping
d) Testing
View Answer
Answer: c
a) True
150
b) False
View Answer
Answer: b
a) GDB
b) GNB
c) FDB
d) FNB
View Answer
Answer: a
a) he
b) h
c) assist
d) assistant
View Answer
Answer: b
View Answer
Answer: c
151
a) run
b) exit
c) execute
d) e
View Answer
Answer: a
643. Which of the following does not affects the execution of the program?
a) Arguments
b) Environment
c) Control
d) I/o
View Answer
Answer: c
c) no change
View Answer
Answer: b
a) Identifying
b) Isolating
c) Test
d) Fixing
152
View Answer
Answer: c
View Answer
Answer: a
View Answer
Answer: a
648. The SRS describes what the system should do with words and figures.
a) True
b) False
View Answer
Answer: a
a) Class diagram
b) Use case
c) Code comment
153
d) Installation guide
View Answer
Answer: d
a) Process documentation
b) Product documentation
c) User documentation
d) System documentation
View Answer
Answer: a
651. This describes the objectives of a product and set out the constraints.
a) SDP
b) SRS
c) SDD
d) STD
View Answer
Answer: a
a) System models
b) Appendices
c) Index
d) Glossary
View Answer
Answer: b
653. Which of the following should describe the technical terms used in the document?
154
a) glossary
b) index
c) user requirements
d) system architecture
View Answer
Answer: a
654. The services provided for the user are described in which section?
a) System requirements
b) User requirements
c) System models
d) Appendices
View Answer
Answer: b
655. ______________ architecture provides a high-level overview of the anticipated system architecture.
a) System
b) User
c) Test
d) Software
View Answer
Answer: a
656. The graphical models showing the relationships between the system and its environment.
a) System models
b) Software models
c) Class models
d) User models
155
View Answer
Answer: a
657. Maintenance and review add to the useful life of the system but can consume large amounts of __________
a) Documents
b) Soft wares
c) Devices
d) Resources
View Answer
Answer: d
a) True
b) False
View Answer
Answer: b
a) Identification
b) Verification
c) Execution
d) Authorization
View Answer
Answer: c
660. A __________ is a noted set of activities that are executed on the software in order to confirm its behavior to
certain set of inputs.
a) Process
b) Document
c) Use case
156
d) Test case
View Answer
Answer: d
a) gray box
b) black box
c) red box
d) white box
View Answer
Answer: b
a) System flow
b) Flow graph
c) Flow program
d) System program
View Answer
Answer: b
a) V(G) = E – N + 2
b) V(G) = E + N + 2
c) V(G) = E – N – 2
d) V(G) = E + N – 2
View Answer
Answer: a
664. The probability of failure-free operation of a software application in a specified environment for a specified
time.
157
a) Software Reliability
b) Software Quality
c) Software availability
d) Software Safety
View Answer
Answer: a
View Answer
Answer: a
a) Deployment
b) Debugging
c) Verification
d) Validation
View Answer
Answer: b
a) True
b) False
View Answer
Answer: b
158
668. Process of evaluating a system to verify whether or not it is meeting its objectives.
a) System Maintenance
b) System Evaluation
c) System validation
d) System authorization
View Answer
Answer: b
a) Process control
b) Performance evaluation
c) User Satisfaction
d) Failure Rate
View Answer
Answer: a
a) gray box
b) black box
c) red box
d) white box
View Answer
Answer: b
671. Incorporating changes in an existing system to enhance, update, or upgrade its features.
a) Maintenance
b) Evaluation
c) Deployment
159
d) Validation
View Answer
Answer: a
a) Alpha Testing
b) Beta Testing
c) Unit testing
d) System testing
View Answer
Answer: a
a) Alpha Testing
b) Beta Testing
c) Unit testing
d) System testing
View Answer
Answer: b
674. The probability of failure-free operation of a software application in a specified environment for a specified
time.
a) Software Reliability
b) Software Quality
c) Software availability
d) Software Safety
View Answer
Answer: a
675. The probability that a software application is operating according to requirements at a given point in time.
160
a) Software Reliability
b) Software Quality
c) Software availability
d) Software Safety
View Answer
Answer: c
676. A __________is a set of instructions which is prepared to perform a specific assignment if executed by a
computer.
a) Browser
b) Internet
c) Program
d) Code
View Answer
Answer: c
a) True
b) False
View Answer
Answer: b
a) OS
b) Web
c) Internet
d) Firewall
View Answer
Answer: a
161
679. This cycle, of going through __________ states of running and input/output, may be repeated over and over
until the job is completed.
a) evaluation
b) process
c) program
d) data
View Answer
Answer: b
a) w
b) #
c) Q
d) &
View Answer
Answer: a
a) w=b/e+b
b) w=b/e-b
c) #=b/e-b
d) #=b/e+b
View Answer
Answer: b
a) input ratio
b) output ratio
c) average time
162
d) average I/O time
View Answer
Answer: d
683. A technique that allows more than one program to be ready for execution and provides the ability to switch
from one process to another.
a) multitasking
b) multiprocessing
c) multitasking
d) multiprogramming
View Answer
Answer: d
a) os
b) software
c) hardware
d) program
View Answer
Answer: a
a) multiprogramming
b) multitasking
c) multiprocessing
d) single-programming
View Answer
Answer: a
163
a) Concurrency
b) Simultaneity
c) Crosscurrent
d) Recurrent
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
a) Process
b) Task
c) Thread
d) Structure
View Answer
Answer: c
689. Both client and server release _________ connection after a page has been transferred.
a) IP
b) TCP
c) Hyperlink
d) Network
View Answer
Answer: b
164
690. Java extension used in threads?
a) java.lang.Thread
b) java.language.Thread
c) java.lang.Threads
d) java.Thread
View Answer
Answer: a
a) run()
b) start()
c) stop()
d) paint()
View Answer
Answer: a
a) java.lang.Run
b) java.lang.Runnable
c) java.lang.Thread
d) java.lang.Threads
View Answer
Answer: b
165
d) Its init method is invoked
View Answer
Answer: b
a) yield()
b) set()
c) release()
d) start()
View Answer
Answer: a
695. A method used to force one thread to wait for another thread to finish.
a) join()
b) connect()
c) combine()
d) concat()
View Answer
Answer: a
696. A task carried out by the OS and hardware to accommodate multiple processes in main memory.
a) Memory control
b) Memory management
c) Memory sharing
d) Memory usage
View Answer
Answer: b
166
a) True
b) False
View Answer
Answer: a
698. Secondary memory is the long term store for programs and data while main memory holds program and data
currently in use. What kind of an organization is this?
a) Physical
b) Logical
c) Structural
d) Simple
View Answer
Answer: a
699. Memory organization in which users write programs in modules with different characteristics.
a) Physical
b) Logical
c) Structural
d) Simple
View Answer
Answer: b
700. An executing process must be loaded entirely in main memory. What kind of a memory organization is this?
a) Physical
b) Logical
c) Structural
d) Simple
View Answer
Answer: d
167
701. FTP stands for?
View Answer
Answer: b
702. A set of overlapping divisions in the main memory are called _______
a) Partitions
b) Divisions
c) Blocks
d) Modules
View Answer
Answer: a
703. Any program, no matter how small, occupies an entire partition. This is called ____________
a) fragmentation
b) prior fragmentation
c) internal fragmentation
d) external fragmentation
View Answer
Answer: c
704. __________ is used to shift processes so they are contiguous and all free memory is in one block.
a) Fragmentation
b) Compaction
c) External Fragmentation
168
d) Division
View Answer
Answer: b
705. _______ searches for smallest block. The fragment left behind is small as possible.
a) best fit
b) first fit
c) next fit
d) last fit
View Answer
Answer: a
a) Memory control
b) Memory management
c) Memory sharing
d) Virtual memory
View Answer
Answer: d
707. Logical Address space can be larger than physical address space.
a) True
b) False
View Answer
Answer: a
a) Demand Paging
b) Logical paging
169
c) Structural way
d) Simple division
View Answer
Answer: a
View Answer
Answer: d
View Answer
Answer: a
711. An allocation that uses a proportional allocation scheme using priorities rather than size.
a) Priority allocation
b) File allocation
c) Preference allocation
d) Simple allocation
View Answer
Answer: a
170
712. A process selects a replacement frame from the set of all frames.
a) Local replacement
b) Global replacement
c) Block replacement
d) Module replacement
View Answer
Answer: b
713. Any program, no matter how small, occupies an entire partition. This is called _____________
a) fragmentation
b) prior fragmentation
c) internal fragmentation
d) external fragmentation
View Answer
Answer: c
a) Thrashing
b) Compaction
c) External Fragmentation
d) Division
View Answer
Answer: a
a) Slab
b) Cache
c) Object
171
d) Allocator
View Answer
Answer: a
a) Memory
b) Record
c) Field
d) Value
View Answer
Answer: c
a) True
b) False
View Answer
Answer: a
a) Physical organisation
b) Logical organisation
c) Structural organisation
d) File organisation
View Answer
Answer: d
719. Which of the following is not an appropriate criterion for file organisation?
b) ease of update
172
c) simple maintenance
d) economy of storage
View Answer
Answer: a
a) Logical file
b) Record
c) Database
d) Directory
View Answer
Answer: d
a) Attributes
b) Protocol
c) Location
d) Ownership
View Answer
Answer: b
a) basic information
b) address information
d) usage information
View Answer
Answer: b
173
723. Which of the following is not a part of the usage information?
a) data created
b) identity of creator
c) owner
View Answer
Answer: c
724. When access is granted to append or update a file to more than one user, the OS or file management system
must enforce discipline. This is _________
a) Simultaneous access
b) Compaction
c) External Fragmentation
d) Division
View Answer
Answer: a
725. The user can load and execute a program but cannot copy it. This process is?
a) Execution
b) Appending
c) Reading
d) Updating
View Answer
Answer: a
726. Category of software that comprises word processing, graphics, databases etc.
a) System
b) Application
c) General purpose
174
d) OS
View Answer
Answer: b
a) True
b) False
View Answer
Answer: a
a) Document production
b) Graphics
c) Databases
d) Numerical Analysis
View Answer
Answer: a
729. A ______________is an application that allows the user to compose and edit simple documents.
a) Word processor
b) Spreadsheet
c) Email utility
d) Browsers
View Answer
Answer: a
730. In text documents, a structure which stays the same no matter how the document is represented.
a) Logical
b) Smart
175
c) Nano
d) Physical
View Answer
Answer: a
731. When the document gets put out : the best fit is calculated from ___________ structure.
a) Logical
b) Smart
c) Nano
d) Physical
View Answer
Answer: a
a) Font
b) Formatting
c) Approach
d) Debug
View Answer
Answer: b
a) Word
b) Outlook
c) Explorer
d) Excel
View Answer
Answer: b
176
734. A structure that is system- dependent.
a) Logical
b) Smart
c) Nano
d) Physical
View Answer
Answer: d
735. The _____________ in a document and the order in which it is presented is referred to as the document’s logical
structure.
a) data
b) information
c) features
d) functions
View Answer
Answer: b
a) Cells
b) Rows
c) Columns
d) Blocks
View Answer
Answer: c
a) True
b) False
View Answer
177
Answer: a
738. A numeric data analysis tool that allows us to create a computerized ledger.
b) Spreadsheet package
c) Graphics package
d) Mathematical Package
View Answer
Answer: b
a) row number
b) column number
c) column letter
d) cell address
View Answer
Answer: b
a) do calculations
b) create graphics
c) plot graphs
d) plot charts
View Answer
Answer: b
a) Spreadsheets
b) Calculations
178
c) Charts
d) Graphs
View Answer
Answer: c
a) Decimals
b) Fractions
c) Booleans
d) Functions
View Answer
Answer: d
a) Highlighted cell
b) Main cell
c) Active cell
d) Formula cell
View Answer
Answer: c
744. The placement of information within a cell at the left edge, right edge, or centered is :
a) Indentation
b) Placement
c) Identification
d) Alignment
View Answer
Answer: d
179
745. A change in the appearance of a value or label in a cell.
a) Alteration
b) Format
c) Indentation
d) Design
View Answer
Answer: b
View Answer
Answer: a
a) True
b) False
View Answer
Answer: b
a) Animation Graphics
b) Spreadsheet graphics
c) Graphics package
d) Presentation graphics
View Answer
180
Answer: d
a) animation
b) morphing
c) designing
d) graphics art
View Answer
Answer: b
750. Producing graphical representations for scientific, engineering, and medical data sets.
a) Scientific Analysation
b) Scientific Visualization
c) Plot analysation
d) Plot visualization
View Answer
Answer: b
751. ________________applies techniques to modify or interpret existing pictures such as photographs and TV scans.
a) Scientific Analysation
b) Scientific Visualization
c) Image processing
d) Business visualization
View Answer
Answer: c
a) Photography
181
b) Image processing
c) Visualization
d) Tomography
View Answer
Answer: d
a) Icons
b) Links
c) Window Manager
d) Cells
View Answer
Answer: c
View Answer
Answer: b
755. A set of libraries that provide programmatically access to some kind of graphics 2D functions.
a) Graphics Package
b) Formatting Package
c) Animation Package
d) Design Package
View Answer
182
Answer: a
756. A package that allows individuals to use personal computers for storing and retrieving their personal
information.
a) Animation package
b) Spreadsheet package
c) Graphics package
View Answer
Answer: d
a) True
b) False
View Answer
Answer: a
View Answer
Answer: a
759. You can expand the memory of some PDAs with ________ that can be inserted into the PDA.
a) hard disks
b) storage cards
c) pendrives
d) floppy disks
183
View Answer
Answer: b
760. The devices that work the best with contact management.
a) Palm OS
b) Pocket PC
c) Plot PC
d) Drives
View Answer
Answer: a
a) task
b) trade
c) tree
d) tele
View Answer
Answer: c
a) vector form
b) hanDbase forms
c) pendragon forms
d) html forms
View Answer
Answer: b
763. The forms that can be used for a variety of inventory applications.
a) vector form
184
b) hanDbase forms
c) pendragon forms
d) html forms
View Answer
Answer: c
a) CAD
b) Vector
c) Animation
d) Raster
View Answer
Answer: b
a) CAD
b) Vector
c) Animation
d) Raster
View Answer
Answer: d
View Answer
185
Answer: c
a) True
b) False
View Answer
Answer: a
768. ___________ is created when a user opens an account in the computer system.
a) RFD
b) Subdirectory
c) MFD
d) SFD
View Answer
Answer: b
a) File name
b) Complete filename
c) Directory name
d) Relative filename
View Answer
Answer: d
a) status
b) identifier
c) extension
d) descriptor
186
View Answer
Answer: c
771. Files that maintain the hierarchical structure of the file system.
a) Descriptors
b) Directories
c) Modifiers
d) Relative files
View Answer
Answer: b
a) Ordinary files
b) Special files
c) Duplicate files
d) Sub directories
View Answer
Answer: b
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: d
a) processing
187
b) parallel processing
c) serial processing
d) multitasking
View Answer
Answer: b
a) Information
b) Valuable information
c) Database
d) Metadata
View Answer
Answer: c
a) True
b) False
View Answer
Answer: a
a) Users
b) Clients
c) End Users
d) Stake Holders
View Answer
Answer: c
188
a) End Users
b) Data
c) Application Request
d) HTML
View Answer
Answer: d
a) System-centered
b) User-centered
c) Company-centered
d) Data-centered
View Answer
Answer: b.
a) Relation
b) Attribute
c) Parameter
d) Constraint
View Answer
Answer: b
a) Relation
b) Attribute
c) Parameter
d) Constraint
189
View Answer
Answer: d
View Answer
Answer: d
a) SDM
b) OODBM
c) DDM
d) RDM
View Answer
Answer: a
784. Object=_________+relationships.
a) data
b) attributes
c) entity
d) constraints
View Answer
Answer: c
a) Codes
190
b) Programs
c) Information
d) Metadata
View Answer
Answer: b
a) True
b) False
View Answer
Answer: a
a) physical
b) logical
c) user
d) view
View Answer
Answer: c
a) physical
b) logical
c) user
d) view
View Answer
Answer: a
789. The ______level helps application programs hide the details of data types.
191
a) physical
b) logical
c) user
d) view
View Answer
Answer: d
a) Schema
b) Attribute
c) Parameter
d) Instance
View Answer
Answer: a
a) Schema
b) Attribute
c) Parameter
d) Instance
View Answer
Answer: d
a) ER
b) Network
c) Semantic
d) Functional
192
View Answer
Answer: b
a) Relational
b) Network
c) IMS
d) Hierarchical
View Answer
Answer: a
794. A level that describes data stored in a database and the relationships among the data.
a) physical
b) logical
c) user
d) view
View Answer
Answer: b
795. A term that defines the direction of flow of information between devices.
a) interconnectivity
b) intra connectivity
c) transmission mode
d) transmission
View Answer
Answer: c
a) True
193
b) False
View Answer
Answer: a
a) physical
b) simplex
c) full duplex
d) half duplex
View Answer
Answer: a
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: a
799. A transmission mode that can transmit data in both the directions but transmits in only one direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: b
800. A communication between a computer and a keyboard involves ____________ duplex transmission.
194
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: a
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: c
a) direct
b) network
c) analog
d) multiple
View Answer
Answer: c
803. A technique of transmitting data or images or videos (information) using a continuous signal.
a) direct
b) network
c) analog
d) multiple
195
View Answer
Answer: c
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: b
a) 100
b) 150
c) 1000
d) 10000
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
a) tan wave
b) cosec wave
c) sine wave
196
d) cot wave
View Answer
Answer: c
a) modulation
b) half modulation
c) amplitude modulation
d) phase modulation
View Answer
Answer: d
809. A transmission mode that can transmit data in both the directions but transmits in only one direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: b
a) FDM
b) TDM
c) SDM
d) FM
View Answer
Answer: b
197
a) broadcast radio
b) telephone
c) machines
d) semi-duplex
View Answer
Answer: a
View Answer
Answer: a
a) direct
b) modulation
c) demodulation
d) multiplexing
View Answer
Answer: d
814. The purpose of communication system is to transfer information from _______ to the destination.
a) user
b) source
c) system
d) station
198
View Answer
Answer: b
View Answer
Answer: b
a) True
b) False
View Answer
Answer: a
817. In this type of multiplexing time slots are preassigned to sources and fixed.
a) TDM
b) Synchronous TDM
c) Asynchronous TDM
d) FDM
View Answer
Answer: b
a) frequency modulation
b) hertz modulation
c) amplitude modulation
199
d) phase modulation
View Answer
Answer: a
819. A technique that can be a solution to the problem of synchronizing data sources.
a) framing
d) pulse stuffing
View Answer
Answer: d
820. For voice, each channel contains a ___ word of digitized data.
a) 2
b) 1
c) 0
d) 4
View Answer
Answer: b
a) TDM
b) Synchronous TDM
c) Asynchronous TDM
d) FDM
View Answer
Answer: b
200
a) TDM
b) WDM
c) Dynamic TDM
d) Statistical TDM
View Answer
Answer: d
a) TV
b) Cable
c) Modem
d) Cable modem
View Answer
Answer: d
824. In this technique, there is a link between subscriber and network and a local loop.
a) SSDL
b) DSDL
c) ASDL
d) TSDL
View Answer
Answer: c
825. A topology that is responsible for describing the geometric arrangement of components that make up the LAN.
a) Complex
b) Physical
c) Logical
d) Incremental
201
View Answer
Answer: b
a) True
b) False
View Answer
Answer: a
827. _____ LAN topology describes the possible connections between pairs of networked end-points that can
communicate.
a) Complex
b) Physical
c) Logical
d) Incremental
View Answer
Answer: c
828. A term that refers to the way in which the nodes of a network are linked together.
a) network
b) topology
c) connection
d) interconnectivity
View Answer
Answer: b
a) Complex
b) Hybrid
c) Bus
202
d) Star
View Answer
Answer: b
a) Clients
b) Servers
c) Nodes
d) CPUs
View Answer
Answer: c
a) Star
b) Ring
c) Bus
d) Daisy Chaining
View Answer
Answer: b
832. A ____________WAN can be developed using leased private lines or any other transmission facility
a) Hybrids
b) peer-to-peer
c) Two-tiered
d) Three-tiered
View Answer
Answer: b
203
a) Bus
b) Ring
c) Daisy chains
d) Star
View Answer
Answer: c
834. A piece of information which is sent along with the data to the source computer.
a) data
b) module
c) token
d) element
View Answer
Answer: c
a) Complex
b) Distributed
c) Cloud
d) Incremental
View Answer
Answer: b
836. Partial mesh is a highly flexible topology that can take a variety of very different configurations.
a) True
b) False
View Answer
Answer: a
204
837. Components used for interconnecting dissimilar networks that use different communication protocols.
a) Switches
b) Gateways
c) Routers
d) Bridges
View Answer
Answer: b
a) network
b) two-tiered
c) bus
d) ring
View Answer
Answer: b
a) bus
b) two-tiered
c) three-tiered
d) ring
View Answer
Answer: c
840. Components that operate at the network layer of the OSI model.
a) Switches
b) Servers
c) Routers
205
d) Gateways
View Answer
Answer: c
a) Star
b) Ring
c) Bus
d) Daisy Chaining
View Answer
Answer: b
a) Bridges
b) Switches
c) Models
d) Modules
View Answer
Answer: a
a) Internetworking
b) Intranetworking
c) Interconnecting
d) Intraconnectivity
View Answer
Answer: a
206
a) Open Site Interconnection
View Answer
Answer: c
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
847. In this technique, there is no direct contact between users and their programs during execution.
a) Time Sharing
b) Batch Processing
c) System Processing
d) Message Passing
View Answer
Answer: b
207
848. A technique that marked the beginning of computer communications.
a) Batch Environment
b) Message passing
c) User Environment
d) Time Sharing
View Answer
Answer: d
849. A type of technique in which dumb terminals are connected to a central computer system.
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment
View Answer
Answer: a
View Answer
Answer: b
a) Telegraph
b) Batch Environment
c) Unit Environment
208
d) System Environment
View Answer
Answer: a
a) 1960s
b) 1980s
c) 2000s
d) 1990s
View Answer
Answer: a
853. The probability of failure-free operation of a software application in a specified environment for a specified
time.
a) Software Reliability
b) Software Quality
c) Software availability
d) Software Safety
View Answer
Answer: a
View Answer
Answer: d
855. A network that links many different types of computers all over the world.
209
a) Intranet
b) Internet
c) Arpanet
d) LAN
View Answer
Answer: b
a) True
b) False
View Answer
Answer: a
857. A service that allows a user to log in into another computer somewhere on the Internet.
a) Telnet
b) FTP
c) e-mail
d) UseNet
View Answer
Answer: a
a) FTP
b) Telnet
c) UseNet
d) Time Sharing
View Answer
Answer: a
210
859. Anonymous FTP files are called ___________ accessible files.
a) Privately
b) Publicly
c) Batch
d) User
View Answer
Answer: b
View Answer
Answer: b
861. Any system that uses the HTTP protocol is called _________
a) Web Browser
b) Web Server
c) WWW
d) TCP/IP
View Answer
Answer: b
a) Web Server
b) Web Browser
c) User
211
d) Web Client
View Answer
Answer: d
863. Allows the user to create and maintain a personal list of favorite URL addresses.
a) Software
b) Web Servers
c) Web Browsers
d) WWW
View Answer
Answer: c
View Answer
Answer: a
a) Intranet
b) Internet
c) Client-Server
d) Server
View Answer
Answer: c
866. In the Client-server model, the client receives a request from the server.
212
a) True
b) False
View Answer
Answer: b
a) File
b) Web
c) Name
d) Browsers
View Answer
Answer: d
a) <scheme>
b) <pathname>
c) <server name>
View Answer
Answer: a
a) <scheme>
b) <pathname>
c) <server name>
View Answer
Answer: b
213
870. Apache is a type of ________
b) Web Server
c) Web Browser
d) DBMS
View Answer
Answer: b
a) Cookie
b) Web Server
c) FTP
d) Database
View Answer
Answer: a
a) Web Server
b) Web Browser
c) User
d) Web Client
View Answer
Answer: d
873. Allows the user to create and maintain a personal list of favorite URL addresses.
a) Software
b) Web Servers
c) Web Browsers
214
d) WWW
View Answer
Answer: c
View Answer
Answer: c
875. A program that can retrieve files from the world wide web and render text, images or sounds encoded in the
files.
a) Browser
b) Internet
c) Server
d) Web Server
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
a) Netscape
b) Web
215
c) IE
d) Mozilla
View Answer
Answer: b
878. Both client and server release _________ connection after a page has been transferred.
a) IP
b) TCP
c) Hyperlink
d) Network
View Answer
Answer: b
879. In HTML, the tags that tell the browser how to display the page.
a) markup
b) style
c) body
d) head
View Answer
Answer: a
View Answer
Answer: b
216
881. A section in HTML that contains generic information about the document.
a) body
b) title
c) head
d) style
View Answer
Answer: c
a) <strong>
b) <cite>
c) <code>
d) <i>
View Answer
Answer: b
883. A _________ partitions a web browser window so that multiple web documents can be displayed
simultaneously.
a) Frame
b) set
c) Frameset
d) div
View Answer
Answer: c
884. The _________ attribute specifies the web page to be placed in the frame initially.
a) name
b) src
c) cols
217
d) rows
View Answer
Answer: b
View Answer
Answer: b
a) True
b) False
View Answer
Answer: b
View Answer
Answer: c
218
c) Graphical System for Monitoring
View Answer
Answer: d
a) Input
b) InterNet
c) Intelligent Network
d) IntraNet
View Answer
Answer: c
View Answer
Answer: b
View Answer
Answer: a
219
892. A tag similar to that of the bold tag.
a) <strong>
b) <cite>
c) <code>
d) <i>
View Answer
Answer: a
View Answer
Answer: b
a) name
b) network
c) new
d) normal
View Answer
Answer: b
a) Literacy
b) Internet
c) Media
220
d) Media Literacy
View Answer
Answer: d
896. Media literacy can help youth and adults understand how media shapes our culture.
a) True
b) False
View Answer
Answer: a
897. The analysis of _________ is a process of deconstruction that investigates the operations of texts, their
constructions, the ways they produce meanings, what those meanings may be.
a) Media
b) Web
c) IE
d) Text
View Answer
Answer: d
898. A type of analysis that attends to the repetition and frequency of features, their proportions within the text, and
consequent assumptions about significance.
a) Media
b) Content
c) Linguistic
d) Network
View Answer
Answer: b
899. __________ analysis regards texts as collections of signs or paradigms and possible meanings, operating within
the bounds of various codes.
a) Semiotic
221
b) Style
c) Linguistic
d) Text
View Answer
Answer: a
900. This part of image analysis refers to those primary signs, often part of the technique of photography, which are
about how the image is made.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: a
901. In image analysis, this part refers to objects represented within the image, which may signify to us because of,
for example, their symbolic power or because of their composition in relation to each other.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: c
a) narratives
b) plot
c) content
d) storyline
222
View Answer
Answer: a
903. __________ describes the effect of involving the reader with the story, of constructing it as truth.
a) Narration
b) Identification
c) Plot
d) Characters
View Answer
Answer: b
904. The notion of norms also links to the idea that representations are given force through a process of:
a) naturalization
b) identification
c) media
d) casting
View Answer
Answer: a
905. The media texts may throw up discourses and are called ____________
a) Binary oppositions
b) Violations
c) Oppositions
d) Media Illiteracy
View Answer
Answer: a
906. In terms of image analysis, it is important to attend to primary level signs in visual codes, most obviously for
examples of still photography.
a) True
223
b) False
View Answer
Answer: a
907. The notion of __________ is one which is especially associated with semiotics and with genres.
a) Media
b) Web
c) codes
d) Text
View Answer
Answer: c
908. The idea of _________is central to understanding the production of meaning through texts.
a) Identity
b) Content
c) Represntation
d) Network
View Answer
Answer: c
View Answer
Answer: b
910. A system of interlinked documents, websites, portals etc. accessed through the Internet.
224
a) WWW
b) Internet
c) Web
d) Media
View Answer
Answer: a
911. In image analysis, this part refers to objects represented within the image, which may signify to us because of,
for example, their symbolic power or because of their composition in relation to each other.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: c
a) Website
b) Blog
c) Web directories
d) Corporate Websites
View Answer
Answer: c
913. _________ are the web-based interactive applications to express and share your ideas and thoughts with
interested people.
a) Website
b) Blog
c) Web directories
225
d) Corporate Websites
View Answer
Answer: b
914. A term used in the context of web design to suggest the path that user takes while browsing a website.
a) navigation
b) identification
c) graphics media
d) casting
View Answer
Answer: a
View Answer
Answer: a
916. In terms of image analysis, it is important to attend to primary level signs in visual codes, most obviously for
examples of still photography.
a) True
b) False
View Answer
Answer: a
a) Motion analyzers
b) Motion Trackers
226
c) HMD
d) SMD
View Answer
Answer: b
View Answer
Answer: c
919. A term for Illusion of immersion by projecting stereo images on the walls and floor of a room.
a) CAVE
b) BOOM
c) GUI
d) HMD
View Answer
Answer: a
920. It is a mediated environment which creates the sensation in a user of being present in a (physical) surrounding.
a) WWW
b) VR
c) HMD
d) GUI
View Answer
Answer: b
227
921. A term to describe the extent to which a user can modify form and content of a mediated environment.
a) Vividness
b) Richness
c) Interactivity
d) Mapping
View Answer
Answer: c
922. A type of VR environment in which subjects are visually isolated from the real environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer
Answer: a
923. In this type of VR environment, the three-dimensional scene is considered as a part of the physical environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer
Answer: c
924. In this type of VR environment, the subjects can perform both in the real and virtual environment.
a) Immersive
b) Semi immersive
c) Non immersive
228
d) Augmented
View Answer
Answer: b
a) Photography
b) Animations
c) Drawing
d) Creativity
View Answer
Answer: b
a) True
b) False
View Answer
Answer: a
a) Motion
b) Animation
c) VR
d) SMD
View Answer
Answer: b
928. A ____________(invented by Paul Roget in 1828) is a simple mechanical toy which creates the illusion of
movement.
a) Binocular
b) Zoetrope
229
c) Thaumatrope
d) BOOM
View Answer
Answer: c
929. A device produces an illusion of movement from a rapid succession of static pictures.
a) Zoetrope
b) Thaumatrope
c) Phenakistoscope
d) HMD
View Answer
Answer: a
930. The ____________ is a piece of equipment designed to make cartoons more realistic and enjoyable. It uses
stacked panes of glass each with different elements of the animation.
a) Multiplane camera
b) VR
c) Thaumatrope
d) Phenakistoscope
View Answer
Answer: a
a) Walt Disney
b) J. Stuart Blackton
c) William Horner
View Answer
Answer: b
230
932. Name of the first animation film.
c) Mickey Mouse
View Answer
Answer: a
933. ___________ animation is used to animate things that are smaller than life size.
a) Immersive
b) Claymotion
c) Stop motion
d) Augmented
View Answer
Answer: c
a) Walt Disney
b) J. Stuart Blackton
c) William Horner
View Answer
Answer: b
935. A term in computer terminology is a change in technology a computer is/was being used.
a) development
b) generation
c) advancement
231
d) growth
View Answer
Answer: b
a) True
b) False
View Answer
Answer: b
a) 1st
b) 2nd
c) 3rd
d) 4th
View Answer
Answer: d
938. ______ generation of computer started with using vacuum tubes as the basic components.
a) 1st
b) 2nd
c) 3rd
d) 4th
View Answer
Answer: a
a) 1st
b) 2nd
232
c) 3rd
d) 4th
View Answer
Answer: a
940. ___________ is an emerging branch in computer science, which interprets means and method of making
computers think like human beings.
a) Block chain
b) VR
c) AI
d) Cloud computing
View Answer
Answer: c
View Answer
Answer: a
942. In this generation Time sharing, Real time, Networks, Distributed Operating System was used.
a) 1st
b) 2nd
c) 5th
d) 4th
View Answer
Answer: d
233
943. HLL stands for?
View Answer
Answer: a
a) 1st
b) 2nd
c) 5th
d) 4th
View Answer
Answer: b
a) processing
b) parallel processing
c) serial processing
d) multitasking
View Answer
Answer: b
a) True
b) False
View Answer
234
Answer: b
a) Multiprogramming
b) Multitasking
c) Threads
d) Concurrency
View Answer
Answer: d
a) Serialization
b) Parallelism
c) Serial processing
d) Distribution
View Answer
Answer: b
a) Increasing
b) Count based
c) Bit based
d) Bit level
View Answer
Answer: d
a) instructional
b) bit level
235
c) bit based
d) increasing
View Answer
Answer: a
a) Mandatory Instructions/sec
b) Millions of Instructions/sec
c) Most of Instructions/sec
View Answer
Answer: b
952. The measure of the “effort” needed to maintain efficiency while adding processors.
a) Maintainablity
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer
Answer: c
953. The rate at which the problem size need to be increased to maintain efficiency.
a) Isoeffciency
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer
Answer: a
236
954. Several instructions execution simultaneously in ________________
a) processing
b) parallel processing
c) serial processing
d) multitasking
View Answer
Answer: b
View Answer
Answer: d
956. A remote object is an object whose method can be invoked from another virtual environment.
a) True
b) False
View Answer
Answer: a
957. A typical _________ program creates some remote objects, makes references to these objects accessible, and
waits for clients to invoke methods on these objects.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer
237
Answer: a
958. A typical __________ program obtains a remote reference to one or more remote objects on a server and then
invokes methods on them.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer
Answer: b
959. The ___________ layer, which provides the interface that client and server application objects use to interact
with each other.
a) Increasing
b) Count
c) Bit
d) Stub/skeleton
View Answer
Answer: d
a) stub layer
b) skeleton layer
c) remote layer
d) transport protocol
View Answer
Answer: d
a) remote layer
238
b) instruction layer
c) reference layer
View Answer
Answer: d
a) skeleton
b) stub
c) remote
d) server
View Answer
Answer: b
a) skeleton
b) stub
c) remote
d) server
View Answer
Answer: a
964. RMI uses stub and skeleton for communication with the ________ object.
a) client
b) remote
c) server
d) any
View Answer
239
Answer: b
965. ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based
computing service.
a) Remote Sensing
b) Remote Invocation
c) Cloud Computing
d) Private Computing
View Answer
Answer: c
a) True
b) False
View Answer
Answer: a
a) Cloud providers
b) Clients
c) End users
d) Cloud users
View Answer
Answer: b
968. These cloud services are of the form of utility computing i.e. the _________ uses these services pay-as-you-go
model.
a) Cloud providers
b) Clients
c) End users
240
d) Cloud users
View Answer
Answer: d
a) Private
b) Public
c) Protected
d) Hybrid
View Answer
Answer: c
970. In this type of cloud, an organization rents cloud services from cloud providers on-demand basis.
a) Private
b) Public
c) Protected
d) Hybrid
View Answer
Answer: b
971. In this type of cloud, the cloud is composed of multiple internal or external cloud.
a) Private
b) Public
c) Protected
d) Hybrid
View Answer
Answer: d
972. _____________ enables the migration of the virtual image from one physical machine to another.
241
a) visualization
b) virtualization
c) migration
d) virtual transfer
View Answer
Answer: b
973. Most of the cloud architectures are built on this type of architecture.
a) skeleton
b) grid
c) linear
d) template
View Answer
Answer: b
a) Software as a service
c) Software as a system
d) System as a service
View Answer
Answer: a
975. Which of the following is not a type of computer on the basis of operation?
a) Remote
b) Hybrid
c) Analog
d) Digital
242
View Answer
Answer: a
a) True
b) False
View Answer
Answer: b
a) remote
b) hybrid
c) analog
d) digital
View Answer
Answer: d
a) remote
b) hybrid
c) analog
d) digital
View Answer
Answer: b
979. ______________ are used for solving complex application such as Global Weather Forecasting.
a) Super Computers
b) Public computers
c) Mobile computers
243
d) Hybrid computers
View Answer
Answer: a
980. The invention of _______________ gave birth to the much cheaper micro computers.
a) Mainframes
b) Microcomputers
c) Microprocessors
d) PDAs
View Answer
Answer: c
981. They can operate on batteries and hence are very popular with travelers.
a) Mainframes
b) Laptops
c) Microprocessors
d) Hybrid
View Answer
Answer: b
View Answer
Answer: b
244
a) PCs
b) Laptops
c) Tablets
d) Handheld
View Answer
Answer: d
984. ______computers are lower to mainframe computers in terms of speed and storage capacity.
a) Mini
b) Super
c) Mainframes
d) Hybrid
View Answer
Answer: a
985. Which of the following is not a type of computer on the basis of operation?
a) Remote
b) Hybrid
c) Analog
d) Digital
View Answer
Answer: a
a) True
b) False
View Answer
Answer: b
245
987. A computer that operates on digital data.
a) remote
b) hybrid
c) analog
d) digital
View Answer
Answer: d
a) remote
b) hybrid
c) analog
d) digital
View Answer
Answer: b
989. ______________ are used for solving complex application such as Global Weather Forecasting.
a) Super Computers
b) Public computers
c) Mobile computers
d) Hybrid computers
View Answer
Answer: a
990. The invention of _______________ gave birth to the much cheaper micro computers.
a) Mainframes
b) Microcomputers
c) Microprocessors
246
d) PDAs
View Answer
Answer: c
991. They can operate on batteries and hence are very popular with travelers.
a) Mainframes
b) Laptops
c) Microprocessors
d) Hybrid
View Answer
Answer: b
View Answer
Answer: b
a) PCs
b) Laptops
c) Tablets
d) Handheld
View Answer
Answer: d
994. ______computers are lower to mainframe computers in terms of speed and storage capacity.
247
a) Mini
b) Super
c) Mainframes
d) Hybrid
View Answer
Answer: a
a) AI
b) ML
c) IOT
d) Internet
View Answer
Answer: c
a) True
b) False
View Answer
Answer: a
View Answer
Answer: b
248
998. Which of the following is not involved in working of IoT?
a) RFID
b) Sensor
c) Nano tech
d) Server
View Answer
Answer: d
999. Making the smaller and smaller things have the ability to connect and interact.
a) Micro Tech
b) Smart tech
c) Nano tech
d) RFID
View Answer
Answer: c
a) Wireless fidelity
b) Wireless Flexibility
c) Wide Fidelity
d) WAN Flexibility
View Answer
Answer: a
a) MIPS
b) AutoBot
c) IoT Assistant
249
d) IoT
View Answer
Answer: b
a) Kevin Atrun
b) Kevin Atrhur
c) Kevin Ashton
d) Kevin Thomas
View Answer
Answer: c
1003. Collect->Communicate->__________->Act
a) Acknowledge
b) Analyze
c) Examine
d) Rectify
View Answer
Answer: a
a) processing
b) parallel processing
c) serial processing
d) multitasking
View Answer
Answer: b
1005. The technology that has the ability to interact with the world.
250
a) AI
b) ML
c) IOT
d) IT
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
a) RFD
b) SNARC
c) AM
d) AN
View Answer
Answer: b
1008. A hardware based system that has autonomy, social ability and reactivity.
a) AI
b) Autonomous Agent
c) Agency
d) Behavior Engineering
View Answer
Answer: b
251
1009. A particular system that contains intelligent agents.
a) AI systems
b) Agency
c) Autonomous systems
d) Company
View Answer
Answer: b
a) Descriptors
b) Behavior engineering
c) Behavior modeling
d) Auto engineering
View Answer
Answer: b
a) Fresh Kitty
b) RoboCup
c) AICup
d) SPOT
View Answer
Answer: b
a) Ordinary
b) Special
c) Duplicate
252
d) Default
View Answer
Answer: d
a) Observe
b) Learn
c) Improvise
d) Implement
View Answer
Answer: b
a) applied AI
b) parallel AI
c) serial AI
d) strong AI
View Answer
Answer: a
1015. The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT
View Answer
Answer: c
1016. Network Security provides authentication and access control for resources.
253
a) True
b) False
View Answer
Answer: a
a) Identification
b) Authentication
c) Access control
d) Lock
View Answer
Answer: d
a) UserID
b) Password
c) OTP
d) fingerprint
View Answer
Answer: a
a) Authentication
b) Identification
c) Validation
d) Verification
View Answer
Answer: a
254
1020. A concern of authentication that deals with user rights.
a) General access
b) Functional authentication
c) Functional authorization
d) Auto verification
View Answer
Answer: c
View Answer
Answer: a
1022. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control
View Answer
Answer: d
a) Algorithm
b) Procedure
c) Cipher
255
d) Module
View Answer
Answer: c
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
View Answer
Answer: a
a) Decryption
b) Encryption
c) Network Security
d) Information Hiding
View Answer
Answer: b
a) True
b) False
View Answer
Answer: a
a) Decryption
b) Encryption
256
c) Network Security
d) Information Hiding
View Answer
Answer: a
View Answer
Answer: a
1029. The protocol designed to make the security of wireless LAN as good as that of wired LAN.
a) WTLS
b) WEP
c) RSN
d) WP
View Answer
Answer: b
1030. A person who enjoys learning details about computers and how to enhance their capabilities.
a) Cracker
b) Hacker
c) App controller
d) Site controller
View Answer
Answer: b
257
1031. A program created by Farmer and Venema for auditing capability.
a) SAAS
b) SATAN
c) SAN
d) SAT
View Answer
Answer: b
a) Worm
b) Trojan
c) Bomb
d) Virus
View Answer
Answer: d
a) Worm
b) Virus
c) Trojan
d) Bomb
View Answer
Answer: a
1034. An attack in which the site is not capable of answering valid request.
a) Smurfing
b) Denial of service
c) E-mail bombing
258
d) Ping storm
View Answer
Answer: b
b) Transposition-based
c) Substitution based
View Answer
Answer: b
a) True
b) False
View Answer
Answer: b
a) Cipher
b) Plain Text
c) Key
d) Cipher
View Answer
Answer: c
a) Cipher
b) Cryptography
259
c) Encryption
d) Decryption
View Answer
Answer: b
1039. Creating a computer or paper audit that can help detect wrong doings.
a) Auditing
b) Validation
c) RSN
d) Verification
View Answer
Answer: a
a) Honey pot
b) Logical
c) Security
d) Intrusion
View Answer
Answer: a
a) Worm
b) Bomb
c) Trojan Horse
d) Virus
View Answer
Answer: c
260
1042. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing
View Answer
Answer: d
1043. A technique in which a program attacks a network by exploiting IP broadcast addressing operations.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer
Answer: a
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer
Answer: c
1045. These ciphers replace a character or characters with a different character or characters, based on some key.
b) Transposition-based
c) Substitution based
261
d) Mono alphabetic substitution based
View Answer
Answer: d
a) True
b) False
View Answer
Answer: b
a) Substitution based
b) Transposition-based
View Answer
Answer: c
a) Monoalphabetic Cipher
b) Cryptography
View Answer
Answer: d
a) public key
b) unique key
262
c) private key
d) security key
View Answer
Answer: c
View Answer
Answer: a
1051. Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of
encryption.
a) 64
b) 8
c) 16
d) 4
View Answer
Answer: c
a) 1
b) 2
c) 5
d) 4
View Answer
Answer: b
263
1053. Encryption standard that is selected by the US government to replace DES.
a) AES
b) BES
c) CES
d) DES
View Answer
Answer: a
1054. An electronic document that establishes your credentials when you are performing transactions.
a) Digital code
b) OTP
c) E-mail
d) Digital certificate
View Answer
Answer: d
1055. A field of technology that deals with a combination of real world and the data generated from computer.
a) ML
b) AI
c) AR
d) IoT
View Answer
Answer: c
a) True
b) False
View Answer
264
Answer: a
a) AR
b) VR
c) AI
d) ML
View Answer
Answer: b
1058. Technologies that allow the user to see the real world, with virtual objects composited in the real world.
a) AR
b) VR
c) AI
d) SR
View Answer
Answer: a
1059. A ______________________ is a display device, worn on head as a part of helmet that has a small display
optic.
a) HD
b) MD
c) HMD
d) ARD
View Answer
Answer: c
a) HMD
b) Helmets
265
c) Smart Glasses
d) VR Glasses
View Answer
Answer: c
a) Location based
b) Markerless
c) Marker based
d) GPS
View Answer
Answer: a
View Answer
Answer: a
1063. A technique that enables light field which is generally the product of a light source scattered off objects.
a) AES
b) Holography
c) Cryptography
d) Gyrography
View Answer
Answer: b
266
1064. A _______ can be recorded using a normal light source.
a) Holograph
b) Photography
c) Holography
d) Photograph
View Answer
Answer: d
a) waterfall
b) prototype
c) incremental
d) agile
View Answer
Answer: b
a) True
b) False
View Answer
Answer: a
1067. A stage in which individual components are integrated and ensured that they are error-free to meet customer
requirements.
a) Coding
b) Testing
c) Design
d) Implementation
View Answer
267
Answer: b
a) Design
b) Conversion
c) Debugging
d) Coding
View Answer
Answer: d
1069. The customer requirements are broken down into logical modules for ease of _______________
a) inheritance
b) design
c) editing
d) implementation
View Answer
Answer: d
1070. What do you call a technical person who is capable of understanding the basic requirements?
a) team leader
b) analyst
c) engineer
d) stakeholder
View Answer
Answer: b
1071. A step in waterfall model that involves a meeting with the customer to understand the requirements.
a) Requirement Gathering
b) SRS
268
c) Implementation
d) Customer review
View Answer
Answer: a
a) Incremental
b) Waterfall
c) Spiral
d) Prototyping
View Answer
Answer: b
a) Stakeholder
b) Project manager
c) Team leader
d) Programmer
View Answer
Answer: b
1074. A planned program if work that requires a definitive amount of time, effort and planning to complete.
a) Problem
b) Project
c) Process
d) Program
View Answer
Answer: b
269
1075. A set of activities that ensure that software correctly implements a specific function.
a) verification
b) testing
c) implementation
d) validation
View Answer
Answer: a
a) True
b) False
View Answer
Answer: a
a) Coding
b) Testing
c) Debugging
d) Implementation
View Answer
Answer: c
a) Design
b) Testing
c) Debugging
d) Coding
View Answer
270
Answer: b
a) System design
b) Design
c) System engineering
d) Implementation
View Answer
Answer: c
a) system testing
b) unit testing
c) validation testing
View Answer
Answer: b
a) Requirement Gathering
b) Verification testing
c) Validation testing
d) System testing
View Answer
Answer: d
1082. A testing strategy that tests the application in the context of an entire system.
a) System
b) Validation
271
c) Unit
d) Gray box
View Answer
Answer: a
1083. A ________ is tested to ensure that information properly flows into and out of the system.
a) module interface
c) boundary conditions
d) paths
View Answer
Answer: a
a) alpha
b) gamma
c) lambda
d) unit
View Answer
Answer: a
1085. A ______________ represents the need of information in the program without the presenting the details.
a) abstraction
b) polymorphism
c) implementation
d) class
View Answer
Answer: a
272
1086. Abstraction combines the data and functions into a single unit called a class.
a) True
b) False
View Answer
Answer: b
a) Abstraction
b) Polymorphism
c) Inheritance
d) Implementation
View Answer
Answer: c
1088. This concept allows routines to use data again at different times.
a) Abstraction
b) Polymorphism
c) Inheritance
d) Implementation
View Answer
Answer: b
1089. The ability for programmers to use the same written and debugged existing class.
a) Reusability
b) Design
c) Debugging
d) Implementation
View Answer
273
Answer: a
1090. A concept that combines data and functions into a single unit called class.
a) inheritance
b) encapsulation
c) polymorphism
d) abstraction
View Answer
Answer: b
a) module
b) block
c) object
d) token
View Answer
Answer: c
a) module
b) block
c) object
d) token
View Answer
Answer: c
a) top-down
b) bottom-up
274
c) left-right
d) right-left
View Answer
Answer: a
a) object oriented
b) procedural
c) logical
d) structural
View Answer
Answer: b
275
www.Taiz-Telecom.com
276