Showing posts with label IT Fundamental. Show all posts
Showing posts with label IT Fundamental. Show all posts

Sunday, June 27, 2010

IT Fundamental - X

1. On the motherboard (the) … is the temporary computer memory area in which data can be stored.
a. expansion slot
b. math co-processor
c. RAM
d. ROM BIOS

2. The device used in a data communication network to perform the conversion between analogue and digital signals, is called a …
a. front end processor.
b. modem.
c. decoder.
d. multiplexer.

3.If you look carefully at the motherboard, you will notice that some chips are soldered to the board whilst others are plugged into the board. The removable chips allow you to ...
a. add extra power sources to your computer.
b. integrate the ALU and the system clock unit.
c. re-arrange the layout of your motherboard.
d. upgrade your computer components.

4. The Internet offers different services. Which one listed below is incorrect?
a. Chat room
b. Electronic mail
c. Off line shopping
d. World Wide Web

5. The Internet is ...
a. a global network of computers networks.
b. a government-owned agency that links computers.
c. software for sending e-mail around the world.
d. a specialised form of local area network.

6. The CPU deals with each instruction in a cycle. The sequence of instructions to carry out one machine instruction is called the instruction or machine cycle. The first action is to fetch the instruction from memory and then the program counter is updated (reset). The other three phases of the machine cycle in the correct order are:
a. Decode the instruction; Execute the instruction; Transfer the data.
b. Decode the instruction; Transfer the data; Execute the instruction.
c. Execute the instruction; Decode the instruction; Transfer the data.
d. Transfer the data; Execute the instruction; Decode the instruction.

7. When the electrical power is disrupted or cut off, data and programs are lost in/on (the) ...
a. basic tools.
b. hard disk.
c. memory.
d. secondary storage.

8. The communication bus which is used to fetch the address of an instruction from memory is called the …
a. address bus.
b. control bus.
c. data bus.
d. fetch bus.

9. Read Only Memory (ROM)
i. Is volatile
ii. Is programmable
iii. Is mounted on the mother board
iv. Contains the bootstrap loader
a. i and iii
b. i, ii and iv
c. ii, iii and iv
d. iii and iv

10. An online meeting allows users to ...
a. determine the receiver's geographic location.
b. leave voice messages for one or two people.
c. print to a web address that is associated to a particular printer.
d. share documents with others in real time.

Wednesday, April 14, 2010

IT Fundamental - IX

1. Array is:
(a) linear data structure
(b) non-linear structure
(c) none of the above
(d) All of the above

2. A data structure in which elements are added and removed from only one end, is known as:
(a) Array
(b) Stack
(c) Queue
(d) None of the above

3. A diamond-shaped box in an Entity-Relationship diagram refers to:
(a) Entity
(b) Relationship
(c) Attribute
(d) Domain

4. The principle means of identifying entities within an entity set is:
(a) Primary Key
(b) Record
(c) Attribute
(d) Tuple

5. Modem refers to:
(a) Modulator
(b) Modulation
(c) Demodulator
(d) Modulator and Demodulator

6. C language is available for which of the following Operating Systems?
(a) DOS
(b) Windows
(c) Unix
(d) All of the above

7. Which of the following have the fastest access time?
(a) Magnetic Tapes
(b) Magnetic Disks
(c) Semiconductor Memories
(d) Compact Disks

8. DMA stands for:
(a) Direct Memory Allocation
(b) Distinct Memory Allocation
(c) Direct Memory Access
(d) Distinct Memory Access

9. Array subscripts in C always start at:
(a):1
(b) 0
(c) 1
(d) Value provided by user

10. Which type of commands in DOS needs additional files for their execution?
(a) Batch Commands
(b) Internal Commands
(c) External Commands
(d) Main Commands

Tuesday, April 06, 2010

IT Fundamental - VIII

1. What is the name of the software that allows us to browse through web pages?
(a) Browser
(b) Mail Client
(c) FTP Client
(d) Messenger

2. What is the address given to a network called?
(a) System Address
(b) SYSID
(c) Process ID
(d) IP Address

3. Which one of the following is a valid DOS command?
(a) LIST *.*
(b) LIST???.???
(c) RECOVER A:
(d) RENAME A:SAMPLE.TXT C:TEST.DOC

4. All system settings in WINDOWS are stored in:
(a) CONTROL.INI
(b) MAIN.INI
(c) SYSTEM.INI
(d) SETTING.INI

5. Which number system is usually followed in a typical 32-bit computer?
(a) 2
(b) 10
(c) 16
(d) 32

6. Which of the following is not an output device:
(a) Printer
(b) Scanner
(c) Flat Screen
(d) Touch Screen

7. A microprocessor is a processor with reduced
(a) instruction set
(b) power requirement
(c) MIPS performance
(d) none of the above

8. Which of the following is not an output of an assembler?
(a) executable program
(b) source listing with line numbers and errors
(c) a symbol table
(d) object program

9. Which layer of OSI model is responsible for routing and flow control:
(a) Presentation
(b) Transport
(c) Network
(d) Data Link

10. Arrays are passed as arguments to a function by
(a) value
(b) reference
(c) both a and b
(d) none of the above

Wednesday, March 24, 2010

IT Fundamental - VII

1. Which of the following arrangements of general-purpose data structures is from slowest to fastest for the purpose of finding objects according to a key value:
a. sorted arrays, unsorted linked lists, hash tables, binary search trees
b. sorted arrays, binary search trees, linked lists, hash tables
c. hash tables, binary search trees, unsorted arrays, sorted linked lists
d. sorted linked lists, sorted arrays, binary search trees, hash tables

2. Which of the following arrangements of general-purpose data structures is from slowest to fastest for the purpose of storing objects by key value (not necessarily in order):
a. unsorted arrays, sorted linked lists, hash tables, binary search trees
b. sorted arrays, binary search trees, linked lists, hash tables
c. hash tables, binary search trees, sorted arrays, sorted linked lists
d. unsorted arrays, linked lists, binary search trees, hash tables

3. In an abstract data type, access is often limited to certain items. Which of the following is not such an abstract data type?
a. binary search tree
b. priority queue
c. queue
d. stack

4. Which of the following is not a basic data structure that could be used to implement an abstract data type?
a. array
b. linked list
c. hash table
d. heap

5. Which of the following statements is true?
a. An abstract data type can be conveniently searched for an item by key.
b. An abstract data type can be conveniently traversed.
c. An abstract data type is an interface within a program that simplifies problems.
d. An abstract data type is a database for direct user-accessible data.

6. Which of the following methods of implementing a priority queue is best when both insertion and deletion need to be reasonably fast?
a. ordered array
b. ordered linked list
c. heap
d. binary search tree

7. If the amount of data to be stored in a stack cannot be predicted, the best data structure to implement the stack is:
a. hash table
b. binary search tree
c. linked list
d. unordered array

8. Which of the following statements is true regarding a queue?
a. It may be implemented either by an array or a linked list.
b. It may be implemented by a heap because first in is first out.
c. It may be implemented by a linked list because insertions and deletions may be from the same end.
d. It may be implemented by an array without providing for wrap-around.

9. Which of the following sort algorithms is not an O(n2) sort?
a. shell sort
b. insertion sort
c. selection sort
d. bubble sort

10. Which of the following is true regarding the efficiency of the shell sort?
a. It is slower than O(n2).
b. It is faster than O(n*log2 n).
c. It is not as efficient as the insertion sort.
d. It has not been established theoretically, i.e. as a single function of n.

Friday, February 26, 2010

IT Fundamental - VI

1. Database software allows users to __________.
a. add, change, and delete data
b. sort and retrieve data from the database
c. create forms and reports using the data in the database
d. all of the above

2. The results of presentation graphics software programs normally are viewed as __________.
a. macros
b. audience handouts
c. slides
d. notes pages

3. A clip art/image gallery can be stored on a __________.
a. hard disk
b. CD-ROM
c. DVD-ROM
d. all of the above

4. A(n) __________ is a PIM feature that can be used to record ideas, reminders, and other important information.
a. appointment calendar
b. address book
c. notepad
d. worksheet

5. Integrated software is __________.
a. less expensive than a less powerful software suite
b. more expensive than a less powerful software suite
c. less expensive than a more powerful software suite
d. more expensive than a more powerful software suite

6. Popular software suites used in schools usually include all of the following applications except __________.
a. word processing
b. spreadsheet
c. calendar
d. database

7. Integrated software and software suites offer all of the following advantages except __________.
a. lower cost
b. ease of use
c. higher cost
d. applications use a similar interface

8. Microsoft FrontPage and Netscape Composer are examples of __________ software.
a. educational
b. Web page authoring
c. reference
d. personal computer entertainment

9. On-screen talking calculators, speech synthesis software programs, and text enlargement software are examples of __________ software.
a. special needs
b. home design/landscaping
c. reference
d. personal computer entertainment

10. Tutorials are __________.
a. answers to questions that people frequently ask about an application
b. the electronic equivalent of a user manual, usually integrated into an application software package
c. step-by-step instructions using real examples to show how to use an application
d. automated assistants that help complete a task by asking questions and performing actions based on the answers

Monday, February 22, 2010

IT Fundamental-V

1. One type of system software, the operating system __________.
a. contains instructions that coordinate a computer's activities
b. is only important when a computer processes information
c. is not loaded into memory when a computer is first turned on
d. is loaded into memory from a floppy disk each time a computer is turned on

2. Application software can be used __________.
a. as a productivity/business tool and to facilitate communications
b. to assist with graphics and multimedia projects
c. to support household activities, for personal business, or for education
d. all of the above

3. A(n) __________ is a graphical element (usually rectangular or circular in shape) that can be clicked to cause a specific action to take place.
a. button
b. icon
c. menu
d. window

4. An application can be started by __________.
a. dragging its icon over the Start button
b. pointing at a command followed by an arrow
c. clicking its program name on a menu or submenu
d. all of the above

5. __________ involves developing a word processing document by entering text or numbers, inserting graphical images, and performing other tasks using an input device.
a. Creating
b. Editing
c. Formatting
d. Printing

6. To cut involves removing a portion of a document and electronically storing it in a temporary storage location called the __________.
a. Warehouse
b. Cupboard
c. Desktop
d. Clipboard

7.__________ involves changing the appearance of a word processing document.
a. Creating
b. Editing
c. Formatting
d. Printing

8. A __________ is a special window displayed by a program to provide information, present available options, or request a response.
a. menu
b. dialog box
c. title bar
d. submenu

9. Wizards are __________.
a. answers to questions that people frequently ask about an application
b. the electronic equivalent of a user manual, usually integrated into an application software package
c. step-by-step instructions using real examples to show how to use an application
d. automated assistants that help complete a task by asking questions and performing actions based on the answers

10. The __________ entered in a spreadsheet cell identifies the data and helps organize the worksheet.
a. label
b. value
c. formula
d. function

Thursday, January 28, 2010

IT Fundamental-IV

1. A group of interrelated or interacting elements forming a unified whole can be best defined as:
a. Communication technologies.
b. An information system.
c. A company network.
d. Interorganizational system.

2. The majority of organizations today would be classified as:
a. Open nonadaptive systems.
b. Closed nonadaptive systems.
c. Open adaptive systems.
d. Closed adaptive systems.

3. Which one of the following would NOT be considered a good example of information?
a. The company's forklift operator's social security number is 456-38-1276.
b. The retail price of blue widgets is $28.99.
c. The company owes $3,847 to vendor number 10782.
d. The numbers 12367892, 436897458, and 837621984.

4. In the internetworked e-business enterprise, an extranet refers to:
a. A network inside the enterprise.
b. A network between an enterprise and its trading partners.
c. A local area network within the enterprise.
d. A wide area network within the enterprise.

5. A manager needs to have summary sales information by product line available to her on a timely basis when purchasing decisions need to be made. The type of information system most likely to provide this information is a:
a. Management information system.
b. Decision support system.
c. Transaction processing system.
d. Process control system.

6. A physician wants an information system that can help in the diagnosis of rare diseases by suggesting diagnostic procedures and help in interpreting the symptoms that are found. This type of information system is called a(n):
a. End user information system.
b. Integrated information system.
c. Executive information system.
d. Expert system.

7. Developing new products and services that are fundamentally different from the way business has been conducted in an industry would be considered a(n):
a. Cost leadership strategy.
b. Innovation strategy.
c. Product differentiation strategy.
d. Strategic dominance strategy.

8. Establishing new business linkages and alliances with customers, suppliers, and competitors is an example of a(n):
a. Alliance strategy.
b. Differentiation strategy.
c. Innovation strategy.
d. Gowth strategy.

9. Charles Schwab & Company's use of online discount stock trading is an example of the way in which a firm can use strategic information system technology. Their primary competitive strategy was to:
a. Establish cost leadership.
b. Improve operational efficiency.
c. Promote business innovation.
d. Build strategic information resources.

10. The value chain views a series, chain, or network of basic activities that add value to products and services. One of the primary activities in a firm's "value chain" typically includes:
a. Outbound logistics.
b. Procurement of resources.
c. Human resource management.
d. Technology development.

Search Aptipedia