Showing posts with label IT Fundamental. Show all posts
Showing posts with label IT Fundamental. Show all posts

Friday, November 06, 2009

Computer Fundamental-IX

>
1. Which of the following is a web browser?
a. Paint
b. Power point
c. Firefox
d. Word

2. Most of the commonly used personal computers/laptops do not have a command key known as-
a. Turnover
b. Shift
c. Alter
d. Delete

3. What is the full form of USB as used in computer related activities?
a. Universal security Block
b. Ultra serial block
c. United service block
d. Universal serial bus

Sunday, November 01, 2009

Computer Fundamental-VIII


1. To indent the first paragraph of your report, you should use this key
a. Space bar
b. Return key
c. Tab key
d. Shift key

2. _______ are distinct items that don’t have much meaning to you in a given context.
a. Fields
b. Data
c. Queries
d. Properties

3. A website address is a unique name that identifies a specific _______ on the web.
a. Web browser
b. PDA
c. Website
d. Link

4. An example of a telecommunications device is a
a. Keyboard
b. Modem
c. Mouse
d. Printer

5. Which is the best definition of a software package?
a. An add-on for your computer such as additional memory
b. A set of computer programs used for a certain function such as word processing
c. A protection you can buy for a computer
d. The box, manual and license agreement that accompany commercial software

Computer Fundamental-VII


1. Special effect used to introduce slides in a presentation are called
a. Effect
b. Custom animation
c. Transition
d. Animation

2. Computers send and receive data in the form of ____________ signals.
a. Analog
b. Digital
c. Modulated
d. All of the above

3. Most World Wide Web pages contain commands in the language.
a. NIH
b. URL
c. HTML
d. IRC

4. _____________ are graphical objects used to represent commonly used application.
a. GUI
b. Drivers
c. Windows
d. Icons

5. Which of the following operating systems is not owned and licensed by a company?
a. Unix
b. Linux
c. Windows 2000
d. Mac

6. In any window, the maximize button, the minimize button and the close button appears on
a. the title bar
b. menu bar
c. status bar
d. tool bar

7. Which is the slowest internet connection service?
a. Digital subscriber line
b. T1
c. Dial up service
d. Cable modem

8. Every component of your computer is either
a. Software of CPU/RAM
b. Hardware or software
c. Application software or system software
d. Input devices or output devices

9. Checking that a pin code number is valid before it is entered into the system in an example of
a. Error connection
b. Backup and recovery
c. Data preparation
d. Data validation

10. A compiler translates higher-level programs into a machine language program, which is called
a. Source code
b. Object code
c. Compiled code
d. Beta code

11. A field that uniquely identifies which person, thing or event the recode describes is a
a. File
b. Data
c. Field
d. Key

12. The ability to find an individual item in a file immediately
a. Sequential access
b. File allocation table
c. Direct access
d. Directory

13. Computers connected to a LAN can
a. Run faster
b. Go on line
c. Email
d. Share information and/or share devices

14. A CD-RW disk
a. Has a faster access than an internal disk
b. Is a form of optical disk, so it an only be written once
c. Holds less data than a floppy disk
d. Can be erased and rewritten

15. The two major categories of software include
a. Operating system and utility
b. Personal productivity and system
c. System and application
d. System and utility

16. Windows 95, windows 98 and windows NT are known as
a. Processors
b. Domain names
c. Modems
d. Operating system

17. Information on a computer is stored as
a. Analog data
b. Digital data
c. Modem data
d. Watts data

18. To take information from one source and bring it to your computer is referred to as
a. Upload
b. Download
c. Transfer
d. De-link

19. A program that works like a calculator for keeping track of money and making budgets
a. Calculator
b. Keyboard
c. Spreadsheets
d. Scholastic

20. Each box in a spreadsheet is called
a. Cell
b. Empty space
c. Record
d. Field
__________________________________________________________________________________

Tuesday, October 13, 2009

Computer Fundamental-VI


1. What type of program controls the various computer parts and allows the user to interact with the computer?
a. Utility software
b. Operating system
c. Word processing software
d. Database program

2. What is the term for unsolicited email?
a. Spam
b. Usenet
c. Backbone
d. Flaming

3. What is backup?
a. Adding more components to your network
b. Protecting data by copying it from the original source to a different destination
c. Filtering old data from the new data
d. Accessing data on tape

Thursday, October 08, 2009

Computer Fundamental-V


1. How many options does a binary choice offer?
a. One
b. Two
c. It depends on the amount of memory in the computer
d. It depends on the speed of the computer’s processor

Computer Fundamental-IV


1. The component is required to process data into information and consists of integrated circuits-
a. Hard disk
b. RAM
c. ROM
d. CPU

Saturday, October 03, 2009

Computer Fundamental-III


1. ____________ is when the more power-hungry components, such as the monitor and the hard drive, are put in idle.
a. Hibernation
b. Power down
c. Standby mode
d. The shutdown procedure

Computer Fundamental-II


1. What menu is selected to cut, copy and paste?
a. File
b. Tools
c. Special
d. Edit

Computer Fundamental-I


1. What menu is selected to print?
a. Edit
b. Special
c. File
d. Tools

Sunday, August 09, 2009

IT Fundamentals - III

1. Which layers of the OSI model are included in the lower layers?
A. Application, Session, Presentation
B. Physical, Transport, Data Link
C. Data Link, Physical, Network
D. Session, Data Link, Physical
E. None of these

2. From smallest to largest, rank the following logical pieces of the database : data block, table space, extent, segment
A. table space, segment, extent, data block
B. data block, segment, extent, table space
C. Segment, extent, data block, table space
D. data block, extent, segment, table space
E. None of these

3. Where are cookies stored?
A. On the server
B. In web.xml
C. On the client
D. In HTML
E. None of these

4. How is power supplied to a low-power USB device?
A. Through a power cable
B. From an external power supply
C. Directly from the computer's power supply
D. Through the USB cable
E. None of these

5. When you are selecting a mouse for a particular computer system, what is the most important consideration?
A. The type of drivers that come with the mouse
B. The length of the mouse cord
C. The type of connector the mouse is equipped with
D. The number of buttons the mouse has
E. None of these

6. Programme that automatically submit your search request to several search engines simultaneously are called..................
A. Metasearch engines
B. Webcrawlers
C. Spiders
D. Hits
E. None of these

7. You are planning on using a single network that support 208 users. Which IP address class would you choose to be the most effect?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E

8. Which of the following options is not a JSP implicit object?
A. Out
B. In
C. Response
D. Page
E. None of these

9. In Oracle, which statement is true about segments?
A. Each table has its own segment
B. A segment is created every time an extent is created, extended, or altered
C. An index segment is created every time a table is created
D. A segment is deleted whenever a table is truncated
E. None of these

10. All of the following are basic principles of networks, except ...............
A. each computer must have a network card
B. there must be communications media connecting the network hardware devices
C. there must be at least one connecting device
D. each computer must have software that supports the movement of information
E. None of these

11. Which of the following could be a legitimate Media Access Control address?
A. 192.168.254.3
B. 3FA2.4756.F9A3
C. A5514
D. C1.3A.77.5B
E. None of these

12. The term, hypertext means .................
A. Non-sequential writing
B. Hypermedia
C. Blinking text
D. Text with heavy formatting
E. None of these

13. You receive an e-mail message that forms you that a terrible virus has been unleashed on the Internet and that you should warn all the people in your Address Book. Which of the following have you most likely encountered?
A. A virus hoax
B. A filter
C. A spam
D. A virus
E. A worm

14. If 20 people need to communicate using symmetric-key cryptography, .................symmetric keys are needed
A. 190
B. 200
C. 20
D. 19
E. 210

15. What should you do as soon as you have successfully created the data base and the data dictionary?
A. Open the data base for users to start adding data
B. Start adding a bunch of table space to allow users to use
C. Leave it running for a few days to make sure that nothing bad is going to happen
D. Shut it down and take a cold back up
E. None of these

16. Which of the following is the default mask of a class A IP address?
A. 255.0.0.255
B. 255.255.0.0
C. 255.0.0.0
D. 255.255.255.0
E. None of these

17. What is Internet 2?
A. A new type of cabling system for Wide Area Networks
B. A second local area network that can connect with another online LAN to share access
C. A new standard for Internet browsers
D. An association to develop advanced Internet technology
E. None of these

18. Which of the following objects is passed to a Java Bean when one of its properties is set via at JSP action?
A. Servlet Request
B. Http Servlet Request
C. Servlet Response
D. Http Servlet Response
E. None of these

19. If you wanted to locate the hardware address to a local device, which protocol would you use?
A. ARP
B. RARP
C. ICMP
D. PING
E. PONG

20. In oracle, which table space is the minimum required when creating a new data base?
A. Undo table space
B. Temporary table space
C. System table space
D. Users table space
E. None of these

21. Data space red sign is not terribly difficult if the .........................
A. data base is structured
B. data base is well- designed
C. data space has no data
D. data base is relatively small
E. data base is relatively large

22. Which of the following are normally used to initialize a computer system's hard ware?
A. Bootstrap memory
B. Volatile memory
C. External mass memory
D. Static memory
E. Random access memory

23. Which of the following is not true about two-tier client-server data base architecture?
A. SQL statements are processed on the server
B. SQL statements may be processed on some of the clients
C. Business logic is mostly processed on clients
D. Business logic may be processed on the server
E. None of these

24. The process by which the structure of the data base is modified to eliminate hidden dependencies and repeating groups is .............
A. enforcing data integrity
B. enforcing referential integrity
C. indexing
D. normalization
E. None of these

25. Which of the following functions is not performed by TCP?
A. Flow control
B. Sequencing
C. Error checking
D. Sub netting
E. None of these

26. In oracle, who owns the data dictionary?
A. Oracle
B. SYS
C. The DBA
D. SYSTEM
E. None of these

27. The reason the data outputs of most ROM ICs are tri-state outputs is to .........
A. allow for three separate data input lines
B. allow the bi-directional flow of data between the bus lines and the ROM registers
C. permit the connection of many ROM chips to a common data bus
D. isolate the registers from the data bus during read operations
E. None of these

28. To drop a column that is used as a foreign key, first......................
A. drop the primary key
B. drop the table
C. drop the foreign key constraint
D. All of these
E. None of these

29. In the straight CGI approach to data-base connectivity on the Internet.....................
A. the external program is located between the client and the web server
B. the external program is located between the data base server and the data base
C. the external program is located between the web server and the data base server
D. there is no external program

30. What is the name of protocol used to eliminate loops?
A. Switching
B. ISL
C. Frame Tagging
D. Spanning Tree Protocol
E. Scanning

31. The effect of the ROLLBACK command in a transaction is the following.............................
A. undo all changes to the data base resulting from the execution of the transaction
B. undo the effects of the last UPDATE command
C. restore the content of the data base to its state at the end of the previous day
D. make sure that all changes to the data base are in effect
E. None of these

32. In Oracle, what is the default number of transactions that MAXTRANS is set to if not specified?
A. 512
B. 10
C. 40
D. 1
E. 255

33. To which pin on the RAM chip does the address decoder connect in order to signal which memory chip is being accessed?
A. The address input
B. The output enable
C. The chip enable
D. The data input
E. The data output

34. Which of the following switching methods provides the greatest frame through out?
A. Store-and-forward switching
B. Frame-tag switching
C. Cut-through switching
D. ISL switching
E. Store-and-backward switching

35. Which kind of lock includes a keypad that can be used to control access into areas?
A. Cipher
B. Warded
C. Device
D. Tumbler.
E. Typelock

36. A gateway is .............................
A. a device that enables users to send information simultaneously over a network without slowing down transmission
B. an electronic device that connects several computing devices to a network
C. a point in one network that is an entrance point to another network
D. a device that links two or more segments of a network and helps direct traffic
E. None of these

37. Which of the following is considered a vulnerability of SNMP?
A. Clear text community strings
B. Its use of TCP
C. The fact that it is on by default in Windows 2000 server
D. The fact that it is on by default in Windows XP Professional
E. None of these

38. Network routing information distributed among routers is stored in which of the following?
A. Flash memory
B. Route table
C. Metric table
D. NVRAM
E. Router memory

39. If the destination did not receive a segment, how will the TCP host know to resend the information?
A. The ACK received will not include the segment number that was not received
B. The ACK received will include the segment number that was not received
C. The sending host will send a PACK to verify segment receipt
D. The destination host will send a YACK message back to the sending host
E. None of these

40. What are the effects of mixing RAM modules with different speed ratings?
A. The system runs at the speed of the slowest RAM stick
B. The system runs normally
C. The system runs at the speed of the memory bus
D. The system may not run, or it crashes periodically
E. None of these

41. What kind of scheme is the HTTP protocol?
A. Get/ put
B. Store/ forward
C. Queuing
D. Search/ return
E. Request/ response'

42. What type of error does a memory parity error create?
A. A fatal exception error
B. An NMI error
C. A corrupt windows operating system file
D. A GPF error
E. A GPA error

43. Which is not a part of the Oracle data base base block?
A. Header
B. Row directory
C. Data
D. Freelists
E. None of these

44. Which of the following cannot be used as the scope when using a Java Bean with JSP?
A. Page
B. Request
C. Session
D. Application
E. Response

45. Which of the following is used for integrity?
A. DES
B. Diffie-Hellman
C. SED
D. AES
E. MD5

46. What is ISL used for?
A. To allow an Ethernet interface to understand frame tags
B. To make two Ethernet interfaces appear as one
C. To connect an Ethernet switch with a high-speed core switch such as ATM
D. To allow simultaneous routing and switching
E. None of these

47. Which of the following describes programs that can run independently, travel from system and disrupt computer communications?
A. Trojans
B. Viruses
C. Idlers
D. Droppers
E. Worms

48. You need to configure a switch from a remote subnet. Which of the following must be configured on the switch?
A. Console port
B. IP
C. Hostname
D. SNMP
E. Default gateway

49. In Oracle, which is more appropriate to store a small list of values in a single column in each row in your address table?
A. ORACARRAY
B. Nested table
C. Index organised table
D. Index
E. VARRAY

50. While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?
A. Visit Google's cached page to view the older copy
B. Forget about it, as there is no way to find this information
C. Visit a partner site of the organisation to see if it is there
D. Use the way back machine
E. None of these
____________________________________________________________________________________________________

Tuesday, April 14, 2009

IT Fundamentals

1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item̢۪s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal̢۪s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal̢۪s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D

13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B

16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer:

17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer:

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D

19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C

20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer:

21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C

22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A

24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C

25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D

26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A

27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B

28. The ____________, also called the â€Å“brainsâ€� of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D

29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B

30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer:

31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B

32. System software is the set of programs that enables your computer̢۪s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C

35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B

38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A

41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer:

42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A

43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer:

44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A

49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D

50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
________________________________________________________________________________________________

Monday, April 13, 2009

IT Fundamental

1. Which of the following is not used in First Generation Computers?
a. Vacuum tubes
b. Cards
c. Punch tapes
d. Magnetic cores

2. Which of the following is not associated with Second Generation Computers?
a. High level language
b. Operating system
c. Vacuum tubes
d. Transistor

3. Which of the following is true for the ENIAC machine?
a. Developed by Charles Babbage
b. Worked with stored programs
c. Used Vacuum tubes
d. Used electro-magnetic relays

4. The ALU is a part of
a. Operating system
b. CPU
c. ROM
d. None of these

5. Turbo C++ is a/an
a. Application software
b. Compiler
c. Interpreter
d. None of these

6. PARAM is a
a. Mini computer
b. Main-frame computer
c. Super computer
d. None of these

7. Digitization of continuous data is not necessary in
a. Mini computer
b. Main-frame computer
c. Super computer
d. Analog computer

8. Which of the following is not application software?
a. MS Word
b. PageMaker
c. Windows XP
d. Pro-Engineer

9. Which of the following is not a system file of MS DOS?
a. io.sys
b. msdos.sys
c. command.com
d. config.sys

10. A digital computer
a. Stores integer numbers in binary mode
b. Is less accurate than the analog computer
c. Can not store relation between continuous variables in the form of equations
d. All of these

11. Secondary storage of the computer is used for storing
a. Data only during the period when they are being processed by the CPU
b. Bilk data used by application programs
c. The operating system
d. All of these

12. Compared to secondary storage, primary storage is
a. Inexpensive but slow
b. Inexpensive but fast
c. Expensive and slow
d. Expensive but fast

13. The CPU performs read/write operations in
a. ROM
b. PROM
c. EPROM
d. RAM

14. The most popular secondary storage is
a. Magnetic tape
b. Magnetic core
c. Disk drive
d. RAM

15. Which of the following is volatile in nature?
a. ROM
b. RAM
c. PROM
d. All of these

16. Which of the following can be programmed only once?
a. ROM
b. PROM
c. EPROM
d. RAM

17. Disk drives are devices for
a. Sequential access of data
b. Overwriting of old data for storing new data
c. Faster data access as compared to magnetic tapes
d. All of these

18. Which of the following is most convenient for evaluating answer book with multiple choice questions?
a. MICR
b. OCR
c. OMR
d. Card reader

19. Which of the following produces best quality of printouts?
a. Dot-matrix Printer
b. Daisy-wheel Printer
c. Ink Jet Printer
d. Laser Printer

20. The primary memory of a personal computer consists of
a. ROM only
b. RAM only
c. ROM and RAM
d. ROM, RAM and Operating system

21. Different components of a computer are linked together by electrical conductors known as
a. Conductors
b. Buses
c. Connectors
d. Connecting leads

22. Which of the following converts digital signal into analog and analog signals to digital?
a. Fibre optic
b. Operating system
c. Modem
d. RAM

23. Conversion of analog signals to digital is known as
a. Modulation
b. Demodulation
c. Synchronization
d. Digitization

24. Half-duplex is a communication mode that facilitates data traffic
a. Always in one direction only
b. In one direction only, but the direction of data transfer can be set by the user
c. In both directions
d. In both directions but only in one direction at a time

25. A communication device that facilitates transmission from several input/output devices to a single line is known as a
a. Modifier
b. Modulator
c. Multiplexer
d. Duplex-system

26. A byte consists of
a. 2 bits
b. 8 bits
c. 32 bits
d. 1024 bits

27. Mode of communication in which data are transmitted in both directions, but not at the same time is known as
a. Simplex mode
b. Half-duplex mode
c. Full-duplex mode
d. None of these

28. The C compiler is
a. Part of the Operating system
b. A language translator
c. An interpreter
d. An application software

29. Which type of software facilitates creating, editing and printing of documents?
a. Word processing
b. Spreadsheets
c. Unix
d. Database management

30. Which of the following will convert instructions in a C program into the machine language?
a. System software
b. Operating system
c. Compiler
d. Interpreter

31. Instructions in a C program can be executed only when the program is
a. Assembled
b. Compiled
c. Assembled and Compiler
d. Compiled and linked with the library

32. A tuple in a database refers to a
a. Record
b. Field
c. File
d. Data item

33. A network model of database is useful as it
a. Facilitates physical representation of data
b. Allows one to many relationship
c. Easy to understand
d. Easy to store in a relational database

34. Which of the following is not true for a database system?
a. Eliminate data redundancy
b. Maintain data integrity
c. Allow to view and edit al files
d. Establish relation amongst records in the database

35. Programming language used in Database Management System is
a. C language
b. Query language
c. Cobol
d. None of these

36. The records of all activities in a specific period of time that requires updating the database is known as
a. Query report
b. Transaction file
c. Data manipulation file
d. Update file

37. Data items grouped together for storage in a file are called
a. Record
b. List
c. Grouped data
d. String

38. Which of the following is not a valid Dos command?
a. dir
b. dir>dfile
c. dir>>myfile
d. dir!

39. Which of the following is an external Dos command?
a. type
b. print
c. copy
d. format

40. What does command copy *.* a: do?
a. Copies all files in the working directory to floppy disk a:
b. Copies all files in the working directory and its sub-directories to floppy disk a:
c. Copies all files in c: drive to floppy disk a:
d. The command is illegal

41. Which of the following commands will delete a file named students.dat?
a. delete student.dat
b. del student.dat
c. remove student.dat
d. erase student.dat

42. Which of the following Boolean expressions is incorrect?
a. A+A’=1
b. A+0=A
c. A.1=A
d. AA’=1

43. According to Commutative law of Boolean algebra
a. X+Y=Y+X
b. X+(Y+Z)=(X+Y)+Z
c. X(Y.Z)=(X.Y)Z
d. X(Y+Z)=(XY)+(XZ)

44. Which of the following is correct Boolean expression?
a. X’.Y’+X.Y’+X.Y=Y+XY
b. X’.Y’+X.Y’+X.Y=Y’+XY
c. X’.Y’+X.Y’+X.Y=Y’+X’Y’
d. X’.Y’+X.Y’+X.Y=Y+X’Y’

45. What will be the output of the following logic circuit?



a. Q=A+B
b. Q=AB
c. Q=AB’
d. Q=A’+B’

46. Decimal number 136, in octal mode, is equivalent to
a. 209
b. 210
c. 211
d. 212

47. Which of the following is not a valid hexadecimal number?
a. 1AB
b. 2BC
c. 3FG
d. None of these

48. Decimal number 0.12 in octal mode is equivalent to
a. 0.375
b. 0.281
c. 0.015
d. None of these

49. Binary number 1110 is equivalent to 16 in
a. Octal system
b. Decimal system
c. Hexadecimal system
d. None of these

50. Which of the following does not form a part of Windows XP start menu?
a. Programs
b. Settings
c. Run
d. Edit

51. What happens when a user double clicks on the icon marked My Computer on desktop?
a. Icons for hard disk drives appear in a new window
b. Icons for hard disk and floppy disk drives appear in a new window
c. Icons for hard disk drives, floppy disk drives and CD ROM drives appear in a new window
d. Icons for installed programs appear in a new window

52. When a user deletes a file from the hard disk?
a. It is permanently erased from memory
b. It goes to the recycle bin and be retrieved at any time later
c. It goes to recycle bin and can be retrieved if the recycle bin has not been emptied
d. Any of the above can happen and the user has no control over it

53. Which of the following is not a tab in the menu bar of MS Word?
a. File
b. Edit
c. Format
d. Save

54. What value will the following C statement assign to integer variable k?
K = (5+3/2*2)*(5%3)
a. 10
b. 14
c. 4
d. None of these

55. Which of the following is not a key word in C?
a. default
b. break
c. file
d. switch

56. Suppose x and y have been declared as integer variables. Which of the following statement/s is/are illegal for reading values of x and y?
a. scanf(“%d,%d”,&x,&y)
b. scanf(“%d%d”,&x,&y)
c. scanf(“%d%d,&x;&y”)
d. scanf(“%d-%d”,&x,&y)

57. Suppose variables x and y hae been declared as integer and assigned respective values of 10 and 12. What output will the following statement give?
printf(“%d,%d,%X,%x\n”,x,y,x,y);
a. 10,12,10,12
b. 10,12,A,c
c. 10,12a,C
d. Statement is illegal

58. Which of the following is/are not valid C operand/operands?
a. 31stDecember
b. December31
c. _December31
d. _31stDecember

59. Which of the following is not valid format strings in C?
a. “%ud”
b. “%ux”
c. “%uo”
d. “%xd”

60. Suppose a has been declared as an integer variable and is assigned a value of 5. What output will the following statement give?
printf(“%d %d\n”,a++,++a);
a. 5,5
b. 5,6
c. 6,6
d. None of these

61. What will be the output of the following program?
if(‘A’)
printf(“abc”);
else
printf(“def”);
printf(“ghi\n”);
a. abc
b. def
c. defghi
d. abcghi

62. What will be the output of the following code if integer variables k and p are declared and initialized with values of 1 and 3, respectively?
int k=1;
int P=3;
switch(k)
{
case 1:
printf(“P”);
case 2:
printf(“P*P ”);
a. 3
b. 3 9
c. P
d. P P*P

63. What will be the output of the following code?
int p=3;
printf(“%d”,(p<3)?5/2:(int)’A’); a. 2 b. 2.5 c. A d. 65 64. The following function is written to evaluate the cube root of a real number. Identify the errors in the following code. Assume that header file is included
cuberoot(float x)
{
crx=pow(x,13);
return(cr);
}
a. It does not specify the return type
b. Variable crx has been used without being declared
c. To evaluate cube root of x, function pow() should be invoked as pow(x,1.0.3.0)
d. All of these

65. What will be the output of the following code?
char nextChar(char c)
{
return(c+1);
}
void main()
{
int i;
char ch=’P’;
for(i=0;i<5;i++) printf(“%c “, nextChar(ch)); } a. P Q R S T b. Q Q Q Q Q c. Q R S T U d. None of these 66. Which of the following are valid declarations of an array of integer numbers? Assume M has been declared as an integer variable and assigned a value of 10 a. int x[] b. int y[10] c. int z[M] d. All of these 67. In which header file is function exit() defined? a. stdio.h b. stdlib.h c. conio.h d. None of these 68. What will be the output of the following code? int x[10]={1,4,9,16,25}; printf(“%d\n”,x[3]); a. 9 b. 16 c. The code is illegal. The array should be declared as int x[]={1,4,9,16,25} d. The code illegal. The array should be declared as int x[5]={ 1,4,9,16,25}; 69. Which of the following declarations is/are illegal? a. int x[][]={{1,2,3},{3,4,5}} b. int y [2][3] ={{1,2,3},{3,4,5}} c. int z[][3] ={{1,2,3},{3,4,5}} d. int z[2][] ={{1,2,3},{3,4,5}} 70. Examine the following program #include
#include
double x;
void main()
{
int y;
for(x=y;x<5;x++) { double z; z=sqrt(x); printf(“Square root of %f is %f\n”,x,z); } } Which of the following is true? a. x and y are global variable b. y is a block variable c. x,y and z are auto variables d. All of these 71. A static variable has a. Local scope and visibility b. Local scope and global visibility c. Global scope and visibility d. Global scope and local visibility 72. For storage of a variable declared as float, one needs a. 2 bytes b. 4 bytes c. 6 bytes d. 8 bytes 73. What will be the output of the following code? enum size{ SMALL, MEDIUM, BIG} size mychoice=MEDIUM; printf(“%d\n”, mychoice==1); a. MEDIUM b. mychoice=MEDIUM c. 1 d. mychoice=1 74. Which of the following is/are valid escape sequence in C? a. ‘\a’ b. ‘\\’ c. ‘\t’ d. All of these 75. By default all variables in C are a. auto b. static c. external d. None of these 76. What will be the output of the following program? #include
#include
void main()
{
char str1[10]={“uvw”};
char str2[10]={“xyz”};
printf(“%s %s %s\n”,strcat(str1,str2),str1,str2);
}
a. uvw xyz uvw xyz
b. uvwxyz uvw xyz
c. uvwxyz uvwxyz xyz
d. None of these

77. What will be the output of the following program?
#include
#define RECIPROCAL(x)1/(float)x
void main()
{
printf(“%f\n”,RECIPROCAL(4+1));
}
a. 0.2
b. 1.25
c. 0
d. None of these

78. Which of the function will convert string str into uppercase?
a. toupper(str)
b. strupr(str)
c. upper(str)
d. stringupr(str)

79. A structure rectangle is defined with two data members length and breadth. If R is a structure of type Rectangle, its length can be accessed as
a. R.length
b. R->length
c. length.R
d. length->R

80. A structure Circle is defined with float variable radius as its only data member. The following code assigns values to data member radius of circle C and defines a pointer variable ptr to point to the address of Circle C
Circle C;
C.radius=5;
Circle *ptr;
ptr=&c;
The radius of the circle can be accessed by the following code
a. ptr.radius
b. ptr->radius
c. C->radius
d. C.radius

81. Suppose a pointer variable ptr is declared as int *p; the following code allocates memory for storing an integer number at address p
a. p=malloc(2)
b. p=(int*)malloc(2)
c. p=malloc(sizeof(int))
d. p=(int*)malloc(sizeof(int))

82. Function fopen() returns
a. void
b. 0 if successful and non zero integer number otherwise
c. A pointer to the file opened
d. None of these

83. Suppose it is required to write a string pointed to by pointer str to a file whose pointer is fptr. The following will write the string to the file
a. fputs(fptr,str)
b. puts(str,fptr)
c. fputs(str,fptr)
d. None of these

84. Function prototype of function fseek() is
a. void fseek(FILE*fp, int offset, int whence)
b. void fseek(FILE*fp, long offset, int whence)
c. int fseek(FILE*fp, int offset, int whence)
d. int fseek(FILE*fp, long offset, int whence)

85. Function fwrite() returns
a. Number of characters written to a file
b. Number of records written to a file
c. Number of bytes written to a stream
d. Does not return anything. It is a void function

86. What will be the output of the following code?
char str[]=”pqrst”;
cout<<<<<14.4567352<
a. pqr 14.4567352
b. pqr 14.4567
c. pqrst 14.46
d. pqrst 14.4567352

87. Statement coud<<<234 requires the following header files to be included
a. iostream.h
b. iostream.h and stdio.h
c. iostram.h and iomanip.h
d. stdio.h, stdlib.h and iostram.h

88. Bydefault, data members of a class are
a. private
b. protected
c. public
d. There is no default. All data members are to be explicitly declared as private, protected or public

89. Which of the following is true?
a. Constructor function of a class has a name same as a class name
b. Constructor of the class is automatically invoked when an object of the class is created
c. Constructor function can not return a value
d. Every class must have a constructor

90. Which of the following is true?
a. A C++ class can have more than one constructor
b. A C++ class can have more than one function with the same name
c. A class can be defined with default function argument
d. All member functions of a class, bydefault, are private



Solutions:

1. (d) 2.(c) 3.(c) 4.(b) 5.(b)

6.(c) 7.(d) 8.(c) 9.(d) 10.(a)

11.(b) 12.(d) 13.(d) 14.(c) 15.(b)

16.(a) 17.(d) 18.(c) 19.(d) 20.(c)

21.(b) 22.(c) 23.(a) 24.(d) 25.(c)

26.(b) 27.(b) 28.(b) 29.(a) 30.(c)

31.(d) 32.(a) 33.(b) 34.(c) 35.(b)

36.(b) 37.(a) 38.(d) 39.(b) 40.(a)

41.(a) 42.(d) 43.(a) 44.(b) 45.(c)

46.(b) 47.(c) 48.(d) 49.(a) 50.(d)

51.(c) 52.(c) 53.(d) 54.(b) 55.(c)



56.(c) 57.(b) 58.(a) 59.(d) 60.(c)

61.(c) 62.(d) 63.(d) 64.(d) 65.(b)

66.(a) & (b) 67.(b) 68.(b) 69.(a) & (d) 70.(b) & (c)

71.(d) 72.(b) 73.(c) 74.(d) 75.(a)

76.(c) 77.(b) 78.(b) 79.(a) 80.(b) & (d)

81.(b) & (c) 82.(d) 83.(c) 84.(d) 85.(c)

86.(c) 87.(c) 88.(a) 89.(a),(b) & (c) 90.(a),(b) & (c)

Search Aptipedia