Monday, April 13

IT Fundamental

1. Which of the following is not used in First Generation Computers?
a. Vacuum tubes
b. Cards
c. Punch tapes
d. Magnetic cores

2. Which of the following is not associated with Second Generation Computers?
a. High level language
b. Operating system
c. Vacuum tubes
d. Transistor

3. Which of the following is true for the ENIAC machine?
a. Developed by Charles Babbage
b. Worked with stored programs
c. Used Vacuum tubes
d. Used electro-magnetic relays

4. The ALU is a part of
a. Operating system
b. CPU
c. ROM
d. None of these

5. Turbo C++ is a/an
a. Application software
b. Compiler
c. Interpreter
d. None of these

6. PARAM is a
a. Mini computer
b. Main-frame computer
c. Super computer
d. None of these

7. Digitization of continuous data is not necessary in
a. Mini computer
b. Main-frame computer
c. Super computer
d. Analog computer

8. Which of the following is not application software?
a. MS Word
b. PageMaker
c. Windows XP
d. Pro-Engineer

9. Which of the following is not a system file of MS DOS?
a. io.sys
b. msdos.sys
d. config.sys

10. A digital computer
a. Stores integer numbers in binary mode
b. Is less accurate than the analog computer
c. Can not store relation between continuous variables in the form of equations
d. All of these

11. Secondary storage of the computer is used for storing
a. Data only during the period when they are being processed by the CPU
b. Bilk data used by application programs
c. The operating system
d. All of these

12. Compared to secondary storage, primary storage is
a. Inexpensive but slow
b. Inexpensive but fast
c. Expensive and slow
d. Expensive but fast

13. The CPU performs read/write operations in
a. ROM
d. RAM

14. The most popular secondary storage is
a. Magnetic tape
b. Magnetic core
c. Disk drive
d. RAM

15. Which of the following is volatile in nature?
a. ROM
b. RAM
d. All of these

16. Which of the following can be programmed only once?
a. ROM
d. RAM

17. Disk drives are devices for
a. Sequential access of data
b. Overwriting of old data for storing new data
c. Faster data access as compared to magnetic tapes
d. All of these

18. Which of the following is most convenient for evaluating answer book with multiple choice questions?
b. OCR
c. OMR
d. Card reader

19. Which of the following produces best quality of printouts?
a. Dot-matrix Printer
b. Daisy-wheel Printer
c. Ink Jet Printer
d. Laser Printer

20. The primary memory of a personal computer consists of
a. ROM only
b. RAM only
c. ROM and RAM
d. ROM, RAM and Operating system

21. Different components of a computer are linked together by electrical conductors known as
a. Conductors
b. Buses
c. Connectors
d. Connecting leads

22. Which of the following converts digital signal into analog and analog signals to digital?
a. Fibre optic
b. Operating system
c. Modem
d. RAM

23. Conversion of analog signals to digital is known as
a. Modulation
b. Demodulation
c. Synchronization
d. Digitization

24. Half-duplex is a communication mode that facilitates data traffic
a. Always in one direction only
b. In one direction only, but the direction of data transfer can be set by the user
c. In both directions
d. In both directions but only in one direction at a time

25. A communication device that facilitates transmission from several input/output devices to a single line is known as a
a. Modifier
b. Modulator
c. Multiplexer
d. Duplex-system

26. A byte consists of
a. 2 bits
b. 8 bits
c. 32 bits
d. 1024 bits

27. Mode of communication in which data are transmitted in both directions, but not at the same time is known as
a. Simplex mode
b. Half-duplex mode
c. Full-duplex mode
d. None of these

28. The C compiler is
a. Part of the Operating system
b. A language translator
c. An interpreter
d. An application software

29. Which type of software facilitates creating, editing and printing of documents?
a. Word processing
b. Spreadsheets
c. Unix
d. Database management

30. Which of the following will convert instructions in a C program into the machine language?
a. System software
b. Operating system
c. Compiler
d. Interpreter

31. Instructions in a C program can be executed only when the program is
a. Assembled
b. Compiled
c. Assembled and Compiler
d. Compiled and linked with the library

32. A tuple in a database refers to a
a. Record
b. Field
c. File
d. Data item

33. A network model of database is useful as it
a. Facilitates physical representation of data
b. Allows one to many relationship
c. Easy to understand
d. Easy to store in a relational database

34. Which of the following is not true for a database system?
a. Eliminate data redundancy
b. Maintain data integrity
c. Allow to view and edit al files
d. Establish relation amongst records in the database

35. Programming language used in Database Management System is
a. C language
b. Query language
c. Cobol
d. None of these

36. The records of all activities in a specific period of time that requires updating the database is known as
a. Query report
b. Transaction file
c. Data manipulation file
d. Update file

37. Data items grouped together for storage in a file are called
a. Record
b. List
c. Grouped data
d. String

38. Which of the following is not a valid Dos command?
a. dir
b. dir>dfile
c. dir>>myfile
d. dir!

39. Which of the following is an external Dos command?
a. type
b. print
c. copy
d. format

40. What does command copy *.* a: do?
a. Copies all files in the working directory to floppy disk a:
b. Copies all files in the working directory and its sub-directories to floppy disk a:
c. Copies all files in c: drive to floppy disk a:
d. The command is illegal

41. Which of the following commands will delete a file named students.dat?
a. delete student.dat
b. del student.dat
c. remove student.dat
d. erase student.dat

42. Which of the following Boolean expressions is incorrect?
a. A+A’=1
b. A+0=A
c. A.1=A
d. AA’=1

43. According to Commutative law of Boolean algebra
a. X+Y=Y+X
b. X+(Y+Z)=(X+Y)+Z
c. X(Y.Z)=(X.Y)Z
d. X(Y+Z)=(XY)+(XZ)

44. Which of the following is correct Boolean expression?
a. X’.Y’+X.Y’+X.Y=Y+XY
b. X’.Y’+X.Y’+X.Y=Y’+XY
c. X’.Y’+X.Y’+X.Y=Y’+X’Y’
d. X’.Y’+X.Y’+X.Y=Y+X’Y’

45. What will be the output of the following logic circuit?

a. Q=A+B
b. Q=AB
c. Q=AB’
d. Q=A’+B’

46. Decimal number 136, in octal mode, is equivalent to
a. 209
b. 210
c. 211
d. 212

47. Which of the following is not a valid hexadecimal number?
a. 1AB
b. 2BC
c. 3FG
d. None of these

48. Decimal number 0.12 in octal mode is equivalent to
a. 0.375
b. 0.281
c. 0.015
d. None of these

49. Binary number 1110 is equivalent to 16 in
a. Octal system
b. Decimal system
c. Hexadecimal system
d. None of these

50. Which of the following does not form a part of Windows XP start menu?
a. Programs
b. Settings
c. Run
d. Edit

51. What happens when a user double clicks on the icon marked My Computer on desktop?
a. Icons for hard disk drives appear in a new window
b. Icons for hard disk and floppy disk drives appear in a new window
c. Icons for hard disk drives, floppy disk drives and CD ROM drives appear in a new window
d. Icons for installed programs appear in a new window

52. When a user deletes a file from the hard disk?
a. It is permanently erased from memory
b. It goes to the recycle bin and be retrieved at any time later
c. It goes to recycle bin and can be retrieved if the recycle bin has not been emptied
d. Any of the above can happen and the user has no control over it

53. Which of the following is not a tab in the menu bar of MS Word?
a. File
b. Edit
c. Format
d. Save

54. What value will the following C statement assign to integer variable k?
K = (5+3/2*2)*(5%3)
a. 10
b. 14
c. 4
d. None of these

55. Which of the following is not a key word in C?
a. default
b. break
c. file
d. switch

56. Suppose x and y have been declared as integer variables. Which of the following statement/s is/are illegal for reading values of x and y?
a. scanf(“%d,%d”,&x,&y)
b. scanf(“%d%d”,&x,&y)
c. scanf(“%d%d,&x;&y”)
d. scanf(“%d-%d”,&x,&y)

57. Suppose variables x and y hae been declared as integer and assigned respective values of 10 and 12. What output will the following statement give?
a. 10,12,10,12
b. 10,12,A,c
c. 10,12a,C
d. Statement is illegal

58. Which of the following is/are not valid C operand/operands?
a. 31stDecember
b. December31
c. _December31
d. _31stDecember

59. Which of the following is not valid format strings in C?
a. “%ud”
b. “%ux”
c. “%uo”
d. “%xd”

60. Suppose a has been declared as an integer variable and is assigned a value of 5. What output will the following statement give?
printf(“%d %d\n”,a++,++a);
a. 5,5
b. 5,6
c. 6,6
d. None of these

61. What will be the output of the following program?
a. abc
b. def
c. defghi
d. abcghi

62. What will be the output of the following code if integer variables k and p are declared and initialized with values of 1 and 3, respectively?
int k=1;
int P=3;
case 1:
case 2:
printf(“P*P ”);
a. 3
b. 3 9
c. P
d. P P*P

63. What will be the output of the following code?
int p=3;
printf(“%d”,(p<3)?5/2:(int)’A’); a. 2 b. 2.5 c. A d. 65 64. The following function is written to evaluate the cube root of a real number. Identify the errors in the following code. Assume that header file is included
cuberoot(float x)
a. It does not specify the return type
b. Variable crx has been used without being declared
c. To evaluate cube root of x, function pow() should be invoked as pow(x,
d. All of these

65. What will be the output of the following code?
char nextChar(char c)
void main()
int i;
char ch=’P’;
for(i=0;i<5;i++) printf(“%c “, nextChar(ch)); } a. P Q R S T b. Q Q Q Q Q c. Q R S T U d. None of these 66. Which of the following are valid declarations of an array of integer numbers? Assume M has been declared as an integer variable and assigned a value of 10 a. int x[] b. int y[10] c. int z[M] d. All of these 67. In which header file is function exit() defined? a. stdio.h b. stdlib.h c. conio.h d. None of these 68. What will be the output of the following code? int x[10]={1,4,9,16,25}; printf(“%d\n”,x[3]); a. 9 b. 16 c. The code is illegal. The array should be declared as int x[]={1,4,9,16,25} d. The code illegal. The array should be declared as int x[5]={ 1,4,9,16,25}; 69. Which of the following declarations is/are illegal? a. int x[][]={{1,2,3},{3,4,5}} b. int y [2][3] ={{1,2,3},{3,4,5}} c. int z[][3] ={{1,2,3},{3,4,5}} d. int z[2][] ={{1,2,3},{3,4,5}} 70. Examine the following program #include
double x;
void main()
int y;
for(x=y;x<5;x++) { double z; z=sqrt(x); printf(“Square root of %f is %f\n”,x,z); } } Which of the following is true? a. x and y are global variable b. y is a block variable c. x,y and z are auto variables d. All of these 71. A static variable has a. Local scope and visibility b. Local scope and global visibility c. Global scope and visibility d. Global scope and local visibility 72. For storage of a variable declared as float, one needs a. 2 bytes b. 4 bytes c. 6 bytes d. 8 bytes 73. What will be the output of the following code? enum size{ SMALL, MEDIUM, BIG} size mychoice=MEDIUM; printf(“%d\n”, mychoice==1); a. MEDIUM b. mychoice=MEDIUM c. 1 d. mychoice=1 74. Which of the following is/are valid escape sequence in C? a. ‘\a’ b. ‘\\’ c. ‘\t’ d. All of these 75. By default all variables in C are a. auto b. static c. external d. None of these 76. What will be the output of the following program? #include
void main()
char str1[10]={“uvw”};
char str2[10]={“xyz”};
printf(“%s %s %s\n”,strcat(str1,str2),str1,str2);
a. uvw xyz uvw xyz
b. uvwxyz uvw xyz
c. uvwxyz uvwxyz xyz
d. None of these

77. What will be the output of the following program?
#define RECIPROCAL(x)1/(float)x
void main()
a. 0.2
b. 1.25
c. 0
d. None of these

78. Which of the function will convert string str into uppercase?
a. toupper(str)
b. strupr(str)
c. upper(str)
d. stringupr(str)

79. A structure rectangle is defined with two data members length and breadth. If R is a structure of type Rectangle, its length can be accessed as
a. R.length
b. R->length
c. length.R
d. length->R

80. A structure Circle is defined with float variable radius as its only data member. The following code assigns values to data member radius of circle C and defines a pointer variable ptr to point to the address of Circle C
Circle C;
Circle *ptr;
The radius of the circle can be accessed by the following code
a. ptr.radius
b. ptr->radius
c. C->radius
d. C.radius

81. Suppose a pointer variable ptr is declared as int *p; the following code allocates memory for storing an integer number at address p
a. p=malloc(2)
b. p=(int*)malloc(2)
c. p=malloc(sizeof(int))
d. p=(int*)malloc(sizeof(int))

82. Function fopen() returns
a. void
b. 0 if successful and non zero integer number otherwise
c. A pointer to the file opened
d. None of these

83. Suppose it is required to write a string pointed to by pointer str to a file whose pointer is fptr. The following will write the string to the file
a. fputs(fptr,str)
b. puts(str,fptr)
c. fputs(str,fptr)
d. None of these

84. Function prototype of function fseek() is
a. void fseek(FILE*fp, int offset, int whence)
b. void fseek(FILE*fp, long offset, int whence)
c. int fseek(FILE*fp, int offset, int whence)
d. int fseek(FILE*fp, long offset, int whence)

85. Function fwrite() returns
a. Number of characters written to a file
b. Number of records written to a file
c. Number of bytes written to a stream
d. Does not return anything. It is a void function

86. What will be the output of the following code?
char str[]=”pqrst”;
a. pqr 14.4567352
b. pqr 14.4567
c. pqrst 14.46
d. pqrst 14.4567352

87. Statement coud<<<234 requires the following header files to be included
a. iostream.h
b. iostream.h and stdio.h
c. iostram.h and iomanip.h
d. stdio.h, stdlib.h and iostram.h

88. Bydefault, data members of a class are
a. private
b. protected
c. public
d. There is no default. All data members are to be explicitly declared as private, protected or public

89. Which of the following is true?
a. Constructor function of a class has a name same as a class name
b. Constructor of the class is automatically invoked when an object of the class is created
c. Constructor function can not return a value
d. Every class must have a constructor

90. Which of the following is true?
a. A C++ class can have more than one constructor
b. A C++ class can have more than one function with the same name
c. A class can be defined with default function argument
d. All member functions of a class, bydefault, are private


1. (d) 2.(c) 3.(c) 4.(b) 5.(b)

6.(c) 7.(d) 8.(c) 9.(d) 10.(a)

11.(b) 12.(d) 13.(d) 14.(c) 15.(b)

16.(a) 17.(d) 18.(c) 19.(d) 20.(c)

21.(b) 22.(c) 23.(a) 24.(d) 25.(c)

26.(b) 27.(b) 28.(b) 29.(a) 30.(c)

31.(d) 32.(a) 33.(b) 34.(c) 35.(b)

36.(b) 37.(a) 38.(d) 39.(b) 40.(a)

41.(a) 42.(d) 43.(a) 44.(b) 45.(c)

46.(b) 47.(c) 48.(d) 49.(a) 50.(d)

51.(c) 52.(c) 53.(d) 54.(b) 55.(c)

56.(c) 57.(b) 58.(a) 59.(d) 60.(c)

61.(c) 62.(d) 63.(d) 64.(d) 65.(b)

66.(a) & (b) 67.(b) 68.(b) 69.(a) & (d) 70.(b) & (c)

71.(d) 72.(b) 73.(c) 74.(d) 75.(a)

76.(c) 77.(b) 78.(b) 79.(a) 80.(b) & (d)

81.(b) & (c) 82.(d) 83.(c) 84.(d) 85.(c)

86.(c) 87.(c) 88.(a) 89.(a),(b) & (c) 90.(a),(b) & (c)

No comments: