Showing posts with label Multiple Choice. Show all posts
Showing posts with label Multiple Choice. Show all posts

Sunday, April 15, 2012

Basic Computer quiz

Q.1 If h is any hashing function and is used to hash n keys in to a table of size m, where n<=m, the expected number of collisions involving a particular key x is :
(A) less than 1. (B) less than n.
(C) less than m. (D) less than n/2.
Ans:A

Q.2 Let A be an adjacency matrix of a graph G. The th ij entry in the matrix K A , gives
(A) The number of paths of length K from vertex Vi to vertex Vj.
(B) Shortest path of K edges from vertex Vi to vertex Vj.
(C) Length of a Eulerian path from vertex Vi to vertex Vj.
(D) Length of a Hamiltonian cycle from vertex Vi to vertex Vj.
Ans:B

Sunday, June 27, 2010

IT Fundamental - X

1. On the motherboard (the) … is the temporary computer memory area in which data can be stored.
a. expansion slot
b. math co-processor
c. RAM
d. ROM BIOS

2. The device used in a data communication network to perform the conversion between analogue and digital signals, is called a …
a. front end processor.
b. modem.
c. decoder.
d. multiplexer.

3.If you look carefully at the motherboard, you will notice that some chips are soldered to the board whilst others are plugged into the board. The removable chips allow you to ...
a. add extra power sources to your computer.
b. integrate the ALU and the system clock unit.
c. re-arrange the layout of your motherboard.
d. upgrade your computer components.

4. The Internet offers different services. Which one listed below is incorrect?
a. Chat room
b. Electronic mail
c. Off line shopping
d. World Wide Web

5. The Internet is ...
a. a global network of computers networks.
b. a government-owned agency that links computers.
c. software for sending e-mail around the world.
d. a specialised form of local area network.

6. The CPU deals with each instruction in a cycle. The sequence of instructions to carry out one machine instruction is called the instruction or machine cycle. The first action is to fetch the instruction from memory and then the program counter is updated (reset). The other three phases of the machine cycle in the correct order are:
a. Decode the instruction; Execute the instruction; Transfer the data.
b. Decode the instruction; Transfer the data; Execute the instruction.
c. Execute the instruction; Decode the instruction; Transfer the data.
d. Transfer the data; Execute the instruction; Decode the instruction.

7. When the electrical power is disrupted or cut off, data and programs are lost in/on (the) ...
a. basic tools.
b. hard disk.
c. memory.
d. secondary storage.

8. The communication bus which is used to fetch the address of an instruction from memory is called the …
a. address bus.
b. control bus.
c. data bus.
d. fetch bus.

9. Read Only Memory (ROM)
i. Is volatile
ii. Is programmable
iii. Is mounted on the mother board
iv. Contains the bootstrap loader
a. i and iii
b. i, ii and iv
c. ii, iii and iv
d. iii and iv

10. An online meeting allows users to ...
a. determine the receiver's geographic location.
b. leave voice messages for one or two people.
c. print to a web address that is associated to a particular printer.
d. share documents with others in real time.

Friday, June 18, 2010

Software Engg. - III

1) Business model is the part of designing phase of software engineering development life cycle
a. True
b. False

2) The state transition diagram
a. depicts relationships between data objects
b. depicts functions that transform the data flow
c. indicates how data are transformed by the system
d. indicates system reactions to external events

3) The best way to conduct a requirements validation review is to
a. Examine the system
b. Have the customer look over the requirements
c. Send them to the design team
d. Use checklist to examine the questions

4) The system specification describes the
a. Function, performance and constraints of a computer-based system
b. implementation of each allocated system
c. time required for simulation
d. element software architecture

5) For each of the following given Requirement indicate whether it is Functional (F) or Non-Functional (N) Requirement.
a. The System should be designed so it can later be extended to a Blue Line
reservation System.(N)
b. The System will allow the user to view the layout of seats in Bus.(F)
c. The System must be available at all times.(N)
d. A given seat can be assigned to only one person.(F)

6)Both the software engineer and customer take an active role in software requirements engineering-a set of activities that is often referred to as Requirement_______________
a. Managing
b. Recognition
c. Analysis
d. Modeling

7)_________ is a measure of independence of a module or component.
a. Cohesion
b. Coupling
c. Loop coupling
d. Loop cohesion

8) In the Functional design, the structure of the system revolves around __________
a. Functions
b. Sequences
c. Models
d. Flows

9)Use case is the part of designing phase of software engineering
a. True
b. False

10) Three categories of risks are
a. Business, personnel risks, budget risks
b. project risks, technical risks, business risks
c. planning risks, technical risks, personnel risks
d. management risks, technical risks, design risks

Sunday, June 13, 2010

Software Engg. - II

1. Decomposing the major project deliverables into smaller, more manageable components to provide better control is called:
a) Project planning.
b) Scope definition.
c) Project base lining.
d) Requirements verification.

2. Select one aspect that is NOT included in a feasibility analysis for new system?
a) Organisational objectives
b) Cost effectiveness
c) Technical feasibility
d) Budgetary constraints
e) Requirements validation

3. One of the fundamental tenets of quality management is that quality:
a) Must exceed customer expectations.
b) Is planned in and not inspected in.
c) Will increase cost.
d) Costs must all be passed onto the customer.

4. In the Shewhart and Deming Quality cycle, the letters P D C A stands for:
a) Purchase, deliver, cost, and acquisition.
b) Prevent defects caused by anyone.
c) Plan, do, check, and act.
d) Please don’t cause accidents.

5. Which is NOT included in the software requirements specification?
a) test specifications for each mandatory requirement
b) project schedule and WBS
c) functional description of user requirements
d) performance description for each non-functional requirement
e) data dictionary

6. A data dictionary was created during the requirements analysis phase of a software engineering project. What information does it contain?
a) interface design criteria
b) data types and description of database table entries
c) restrictions on security
d) list of main functional requirements

7. A software project classifies system entities, their activities and relationships. The classification and abstraction of system entities is important. Which modelling methodology most clearly shows the classification and abstraction of entities in the system?
a) data flow model
b) event driven model
c) object oriented model
d) entity-relationship model

8. Which of the following is NOT a non-functional system requirement component?
a) cost
b) reliability
c) usability
d) performance
e) maintainability

9. What is the purpose of a test case specification in software engineering?
a) to specify the sequence of actions for the execution of a number of sequential tests
b) to specify inputs, predicted results, and a set of execution conditions for a test item
c) to list the test procedures to be performed on the integration of the system database
d) to report the specific tests results when integrating software modules

10. In the software testing process, when is validation testing performed?
a) after coding
b) after unit testing
c) after module testing
d) after integration testing

Wednesday, April 14, 2010

IT Fundamental - IX

1. Array is:
(a) linear data structure
(b) non-linear structure
(c) none of the above
(d) All of the above

2. A data structure in which elements are added and removed from only one end, is known as:
(a) Array
(b) Stack
(c) Queue
(d) None of the above

3. A diamond-shaped box in an Entity-Relationship diagram refers to:
(a) Entity
(b) Relationship
(c) Attribute
(d) Domain

4. The principle means of identifying entities within an entity set is:
(a) Primary Key
(b) Record
(c) Attribute
(d) Tuple

5. Modem refers to:
(a) Modulator
(b) Modulation
(c) Demodulator
(d) Modulator and Demodulator

6. C language is available for which of the following Operating Systems?
(a) DOS
(b) Windows
(c) Unix
(d) All of the above

7. Which of the following have the fastest access time?
(a) Magnetic Tapes
(b) Magnetic Disks
(c) Semiconductor Memories
(d) Compact Disks

8. DMA stands for:
(a) Direct Memory Allocation
(b) Distinct Memory Allocation
(c) Direct Memory Access
(d) Distinct Memory Access

9. Array subscripts in C always start at:
(a):1
(b) 0
(c) 1
(d) Value provided by user

10. Which type of commands in DOS needs additional files for their execution?
(a) Batch Commands
(b) Internal Commands
(c) External Commands
(d) Main Commands

Tuesday, April 06, 2010

IT Fundamental - VIII

1. What is the name of the software that allows us to browse through web pages?
(a) Browser
(b) Mail Client
(c) FTP Client
(d) Messenger

2. What is the address given to a network called?
(a) System Address
(b) SYSID
(c) Process ID
(d) IP Address

3. Which one of the following is a valid DOS command?
(a) LIST *.*
(b) LIST???.???
(c) RECOVER A:
(d) RENAME A:SAMPLE.TXT C:TEST.DOC

4. All system settings in WINDOWS are stored in:
(a) CONTROL.INI
(b) MAIN.INI
(c) SYSTEM.INI
(d) SETTING.INI

5. Which number system is usually followed in a typical 32-bit computer?
(a) 2
(b) 10
(c) 16
(d) 32

6. Which of the following is not an output device:
(a) Printer
(b) Scanner
(c) Flat Screen
(d) Touch Screen

7. A microprocessor is a processor with reduced
(a) instruction set
(b) power requirement
(c) MIPS performance
(d) none of the above

8. Which of the following is not an output of an assembler?
(a) executable program
(b) source listing with line numbers and errors
(c) a symbol table
(d) object program

9. Which layer of OSI model is responsible for routing and flow control:
(a) Presentation
(b) Transport
(c) Network
(d) Data Link

10. Arrays are passed as arguments to a function by
(a) value
(b) reference
(c) both a and b
(d) none of the above

Wednesday, March 24, 2010

IT Fundamental - VII

1. Which of the following arrangements of general-purpose data structures is from slowest to fastest for the purpose of finding objects according to a key value:
a. sorted arrays, unsorted linked lists, hash tables, binary search trees
b. sorted arrays, binary search trees, linked lists, hash tables
c. hash tables, binary search trees, unsorted arrays, sorted linked lists
d. sorted linked lists, sorted arrays, binary search trees, hash tables

2. Which of the following arrangements of general-purpose data structures is from slowest to fastest for the purpose of storing objects by key value (not necessarily in order):
a. unsorted arrays, sorted linked lists, hash tables, binary search trees
b. sorted arrays, binary search trees, linked lists, hash tables
c. hash tables, binary search trees, sorted arrays, sorted linked lists
d. unsorted arrays, linked lists, binary search trees, hash tables

3. In an abstract data type, access is often limited to certain items. Which of the following is not such an abstract data type?
a. binary search tree
b. priority queue
c. queue
d. stack

4. Which of the following is not a basic data structure that could be used to implement an abstract data type?
a. array
b. linked list
c. hash table
d. heap

5. Which of the following statements is true?
a. An abstract data type can be conveniently searched for an item by key.
b. An abstract data type can be conveniently traversed.
c. An abstract data type is an interface within a program that simplifies problems.
d. An abstract data type is a database for direct user-accessible data.

6. Which of the following methods of implementing a priority queue is best when both insertion and deletion need to be reasonably fast?
a. ordered array
b. ordered linked list
c. heap
d. binary search tree

7. If the amount of data to be stored in a stack cannot be predicted, the best data structure to implement the stack is:
a. hash table
b. binary search tree
c. linked list
d. unordered array

8. Which of the following statements is true regarding a queue?
a. It may be implemented either by an array or a linked list.
b. It may be implemented by a heap because first in is first out.
c. It may be implemented by a linked list because insertions and deletions may be from the same end.
d. It may be implemented by an array without providing for wrap-around.

9. Which of the following sort algorithms is not an O(n2) sort?
a. shell sort
b. insertion sort
c. selection sort
d. bubble sort

10. Which of the following is true regarding the efficiency of the shell sort?
a. It is slower than O(n2).
b. It is faster than O(n*log2 n).
c. It is not as efficient as the insertion sort.
d. It has not been established theoretically, i.e. as a single function of n.

Friday, February 26, 2010

IT Fundamental - VI

1. Database software allows users to __________.
a. add, change, and delete data
b. sort and retrieve data from the database
c. create forms and reports using the data in the database
d. all of the above

2. The results of presentation graphics software programs normally are viewed as __________.
a. macros
b. audience handouts
c. slides
d. notes pages

3. A clip art/image gallery can be stored on a __________.
a. hard disk
b. CD-ROM
c. DVD-ROM
d. all of the above

4. A(n) __________ is a PIM feature that can be used to record ideas, reminders, and other important information.
a. appointment calendar
b. address book
c. notepad
d. worksheet

5. Integrated software is __________.
a. less expensive than a less powerful software suite
b. more expensive than a less powerful software suite
c. less expensive than a more powerful software suite
d. more expensive than a more powerful software suite

6. Popular software suites used in schools usually include all of the following applications except __________.
a. word processing
b. spreadsheet
c. calendar
d. database

7. Integrated software and software suites offer all of the following advantages except __________.
a. lower cost
b. ease of use
c. higher cost
d. applications use a similar interface

8. Microsoft FrontPage and Netscape Composer are examples of __________ software.
a. educational
b. Web page authoring
c. reference
d. personal computer entertainment

9. On-screen talking calculators, speech synthesis software programs, and text enlargement software are examples of __________ software.
a. special needs
b. home design/landscaping
c. reference
d. personal computer entertainment

10. Tutorials are __________.
a. answers to questions that people frequently ask about an application
b. the electronic equivalent of a user manual, usually integrated into an application software package
c. step-by-step instructions using real examples to show how to use an application
d. automated assistants that help complete a task by asking questions and performing actions based on the answers

Search Aptipedia