Advertisement

Search Topics....

Friday, April 29, 2011

GK BASED ON COMPUTER SCIENCE MOST USEFUL FOR LET AND LDC EXAMINATIONS



1) Fastest component of a computer system is 

a) Flash ROM b) 
Cache memory 

c) DDR RAM d) CPU

2. Which tags are placed on animals, to track all of the animals movements.

a)POS b) 
RFID c) PPS d) GPS

3. _______________ uses an FAT for file allocation?

a) 
WINDOWS b) Linux c) Unix d) Solaris

4. TLB stands for?

a) Table Lookup Buffer b) 
Translation Look aside Buffer c) Translation table d) None

5. The address space of 8086 CPU is?

a) 
1 Megabytes b) 256 Kilobytes c) 1 Kilobyte d) 64 kilobytes

6. The following statement

printf(”%f”, 9/5); prints

(a) 
1.8 (b) 1.0 (c) 2.0 (d) none of the above

7. C is a?

(a) high level language (b) low level language

(c) 
high level language with some low level features.

(d) low level language with some high level features.

8. What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array?

(a. The element will be set to 0.
(b. 
The compiler would report an error.
(c. The program may crash if some important data gets overwritten.
(d. The array size would appropriately grow.

9. Which of the following operations can be performed on the file "NOTES.TXT" using the below code? FILE *fp;
fp = fopen("NOTES.TXT", "r+");
(a. Reading
(b. Writing
(c. Appending 
(d,Read and Write 

10. One of the following is not a real RDBMS
 a) 
dBase b) DBII c) MA Access d) Oracle

11. Multi –media System involves

a) Only Audio and Video

b) Animation Video Movies

c) Animation movie with Text also

d) 
All type of movie with Animation Graphics and Text 


12. The minimum number of temporary variables needed to swap the contents of two variables is?

(a)1 (b)2 (c)3 (d)


13. Ping is a command used for

a) Checking MAC address

b) 
Checking Networking functionality and validity of IP address

c) Checking cabling performance

d) Checking cable connectivity only

14. The candidate key which identifies the tuples in a relation uniquely is called?

a) super key b) 
Primary key c) Foreign key d) none of the above

15. Back up and restore is preferred for

a) All files and data together b) System data areas only

c) Selected file system components d) 
Disk image for recovery


16. The term bit is short for:
A. megabyte.
B. binary language.
C.
binary digit.
D. binary number.

17. A string of eight 0s and 1s is called a:
A. megabyte.
B.
byte.
C. kilobyte.
D. gigabyte.

18. A____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte




19.____________ is any part of the computer that you can physically touch.
A.
Hardware
B. A device
C. A peripheral
D. An application


20. The components that process data are located in the:
A. input devices.
B. output devices.
C.
system unit.
D. storage component.

21. A____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C.
megabyte
D. terabyte

22. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B.
printers.
C. floppy disk drives.
D. CD drives.

23.The____________, also called the “brains” of the computer, is responsible for processing
data.
A. motherboard
B. memory
C. RAM
D.
central processing unit (CPU)






24. The CPU and memory are located on the:
A. expansion board.
B.
motherboard.
C. storage device.
D. output device.

25. Word processing, spreadsheet, and photo-editing are examples of:
A.
application software.
B. system software.
C. operating system software.
D. platform software.

26.____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B.
Software
C. Memory
D. A processor

27. The PC (personal computer) and the Apple Macintosh are examples of two different:
A.
platforms.
B. applications.
C. programs.
D. storage devices.

28. DSL is an example of a(n)____________ connection.
A. network
B. wireless
C. slow
D. broadband


29. Which of the following is the correct order of the four major functions of a computer?
A. Process , Output , Input , Storage
B. Input , Output, Process , Storage
C. Process , Storage , Input , Output
D.
Input , Process , Output , Storage

30.____________ bits equal one byte.
A.
Eight
B. Two
C. One thousand
D. One million

31. The operating system is the most common type of____________ software.
A. communication
B. application
C.
system
D. word-processing software

32. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D.
system and application

33. All of the following are examples of real security and privacy risks Except_____
(A) hackers
(B)
spam
(C) viruses
(D) identify theft

34. The OSI model is divided into_______ processes called layers.
(A) five
(B) six
(C)
seven
(D) eight


35. Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B)
Boot sector
(C) Script
(D) Logic bomb
36. Servers are computers that provide resources to other computers connected to a
(A) mainframe
(B)
Network
(C) supercomputer
(D) client
37. URL stands for........
(A) Universal Research List
(B) Universal Resource List
(C)
Uniform Resource Locator
(D) Uniform Research Locator
38. You must install a __________ on a network if you want to share a broadband Internet.
A) Router
(B) modem
(C) node
(D) cable
39. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C)
Integrated circuit
(D) semiconductor
40. The design of the network is called the network:
(A)
Architecture
(B) server
(C) transmission
(D) type
41.  Personal logs or journal entries posted on the Web are known as:
(A) Podcast
(B) Webcasts
(C)
Blogs
(D) subject directories


42. Linux is a ____________ operating system.
(A)
Open-source
(B) Microsoft
(C) Windows
(D) Mac

43. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D)
All of these

44.____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C)
Menus
(D) Windows

45. Verification of a login name and password is known as:
(A) configuration
(B) accessibility
(C)
Authentication
(D) logging in

46. 'MICR' technology used for clearance of cheques by banks refers to—
(1)
Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition

47. The CPU and memory are located on the:
A. expansion board.
B.
Motherboard.
C. storage device.
D. output device.

48. First generation computer systems used
(a) Transistors
(b) Vacuum tubes
(c) Magnetic cores
(d) Silicon chips

49.  Charles Babbage invented
(a) ENIAC
(b) Difference engine
(c) Electronic computer
(d) Punched card

50. Which one of the following is not a programming language of a computer?
(a) BASIC
(b) FORTRAN
(c) LASER
(d) PASCAL

The likely answers are written in green ..if any error pls intimate 

1 comment:

Unknown said...

it is very useful