1) Fastest component of a computer system is
a) Flash ROM b) Cache memory
c) DDR RAM d) CPU
2. Which tags are placed on animals, to track all of the animals movements.
a)POS b) RFID c) PPS d) GPS
3. _______________ uses an FAT for file allocation?
a) WINDOWS b) Linux c) Unix d) Solaris
4. TLB stands for?
a) Table Lookup Buffer b) Translation Look aside Buffer c) Translation table d) None
5. The address space of 8086 CPU is?
a) 1 Megabytes b) 256 Kilobytes c) 1 Kilobyte d) 64 kilobytes
6. The following statement
printf(”%f”, 9/5); prints
(a) 1.8 (b) 1.0 (c) 2.0 (d) none of the above
7. C is a?
(a) high level language (b) low level language
(c) high level language with some low level features.
(d) low level language with some high level features.
8. What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array?
(a. The element will be set to 0.
(b. The compiler would report an error.
(c. The program may crash if some important data gets overwritten.
(d. The array size would appropriately grow.
9. Which of the following operations can be performed on the file "NOTES.TXT" using the below code? FILE *fp;
fp = fopen("NOTES.TXT", "r+");
(a. Reading
(b. Writing
(c. Appending
(d,Read and Write
10. One of the following is not a real RDBMS
a) dBase b) DBII c) MA Access d) Oracle
11. Multi –media System involves
a) Only Audio and Video
b) Animation Video Movies
c) Animation movie with Text also
d) All type of movie with Animation Graphics and Text
12. The minimum number of temporary variables needed to swap the contents of two variables is?
(a)1 (b)2 (c)3 (d)0
13. Ping is a command used for
a) Checking MAC address
b) Checking Networking functionality and validity of IP address
c) Checking cabling performance
d) Checking cable connectivity only
14. The candidate key which identifies the tuples in a relation uniquely is called?
a) super key b) Primary key c) Foreign key d) none of the above
15. Back up and restore is preferred for
a) All files and data together b) System data areas only
c) Selected file system components d) Disk image for recovery
16. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
17. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
18. A____________ is approximately one billion bytes.
A. kilobyte
B. bit
A. kilobyte
B. bit
C. gigabyte
D. megabyte
D. megabyte
19.____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
A. Hardware
B. A device
C. A peripheral
D. An application
20. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
A. input devices.
B. output devices.
C. system unit.
D. storage component.
21. A____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
22. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
23.The____________, also called the “brains” of the computer, is responsible for processing
data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
B. memory
C. RAM
D. central processing unit (CPU)
24. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
25. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
A. application software.
B. system software.
C. operating system software.
D. platform software.
26.____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
A. An instruction
B. Software
C. Memory
D. A processor
27. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
A. platforms.
B. applications.
C. programs.
D. storage devices.
28. DSL is an example of a(n)____________ connection.
A. network
B. wireless
C. slow
D. broadband
29. Which of the following is the correct order of the four major functions of a computer?
A. Process , Output , Input , Storage
B. Input , Output, Process , Storage
C. Process , Storage , Input , Output
D. Input , Process , Output , Storage
A. Process , Output , Input , Storage
B. Input , Output, Process , Storage
C. Process , Storage , Input , Output
D. Input , Process , Output , Storage
30.____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
A. Eight
B. Two
C. One thousand
D. One million
31. The operating system is the most common type of____________ software.
A. communication
B. application
C. system
D. word-processing software
A. communication
B. application
C. system
D. word-processing software
32. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application
33. All of the following are examples of real security and privacy risks Except_____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(A) hackers
(B) spam
(C) viruses
(D) identify theft
34. The OSI model is divided into_______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(C) seven
(D) eight
35. Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(D) Logic bomb
36. Servers are computers that provide resources to other computers connected to a
(A) mainframe
(B) Network
(C) supercomputer
(D) client
(A) mainframe
(B) Network
(C) supercomputer
(D) client
37. URL stands for........
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
38. You must install a __________ on a network if you want to share a broadband Internet.
A) Router
(B) modem
(C) node
(D) cable
(B) modem
(C) node
(D) cable
39. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C) Integrated circuit
(D) semiconductor
(A) transistor
(B) resistor
(C) Integrated circuit
(D) semiconductor
40. The design of the network is called the network:
(A) Architecture
(B) server
(C) transmission
(D) type
(A) Architecture
(B) server
(C) transmission
(D) type
41. Personal logs or journal entries posted on the Web are known as:
(A) Podcast
(B) Webcasts
(C) Blogs
(D) subject directories
(A) Podcast
(B) Webcasts
(C) Blogs
(D) subject directories
42. Linux is a ____________ operating system.
(A) Open-source
(B) Microsoft
(C) Windows
(D) Mac
(A) Open-source
(B) Microsoft
(C) Windows
(D) Mac
43. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
44.____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
45. Verification of a login name and password is known as:
(A) configuration
(B) accessibility
(C) Authentication
(D) logging in
(A) configuration
(B) accessibility
(C) Authentication
(D) logging in
46. 'MICR' technology used for clearance of cheques by banks refers to—
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
47. The CPU and memory are located on the:
A. expansion board.
B. Motherboard.
C. storage device.
D. output device.
A. expansion board.
B. Motherboard.
C. storage device.
D. output device.
48. First generation computer systems used
(a) Transistors
(a) Transistors
(b) Vacuum tubes
(c) Magnetic cores
(c) Magnetic cores
(d) Silicon chips
49. Charles Babbage invented
(a) ENIAC
(a) ENIAC
(b) Difference engine
(c) Electronic computer
(d) Punched card
50. Which one of the following is not a programming language of a computer?
(a) BASIC
(a) BASIC
(b) FORTRAN
(c) LASER
(d) PASCAL
The likely answers are written in green ..if any error pls intimate