Anda di halaman 1dari 7

1) Fastest component of a computer system is a) Flash ROM b) Cache memory c) DDR RAM d) CPU 2.

Which tags are placed on animals, to track all of the animals movements. a)POS b) RFID c) PPS d) GPS 3. _______________ uses an FAT for file allocation? a) WINDOWS b) Linux c) Unix d) Solaris 4. TLB stands for? a) Table Lookup Buffer b) Translation Look aside Buffer c) Translation table d) None 5. The address space of 8086 CPU is? a) 1 Megabytes b) 256 Kilobytes c) 1 Kilobyte d) 64 kilobytes 6. The following statement printf(%f, 9/5); prints (a) 1.8 (b) 1.0 (c) 2.0 (d) none of the above 7. C is a? (a) high level language (b) low level language (c) high level language with some low level features. (d) low level language with some high level features. 8. What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array? (a. The element will be set to 0. (b. The compiler would report an error. (c. The program may crash if some important data gets overwritten. (d. The array size would appropriately grow. 9. Which of the following operations can be performed on the file "NOTES.TXT" using the below code? FILE *fp; fp = fopen("NOTES.TXT", "r+"); (a. Reading (b. Writing (c. Appending (d,Read and Write

10. One of the following is not a real RDBMS a) dBase b) DBII c) MA Access d) Oracle 11. Multi media System involves a) Only Audio and Video b) Animation Video Movies c) Animation movie with Text also d) All type of movie with Animation Graphics and Text 12. The minimum number of temporary variables needed to swap the contents of two variables is? (a)1 (b)2 (c)3 (d)0 13. Ping is a command used for a) Checking MAC address b) Checking Networking functionality and validity of IP address c) Checking cabling performance d) Checking cable connectivity only 14. The candidate key which identifies the tuples in a relation uniquely is called? a) super key b) Primary key c) Foreign key d) none of the above 15. Back up and restore is preferred for a) All files and data together b) System data areas only c) Selected file system components d) Disk image for recovery

16. The term bit is short for: A. megabyte. B. binary language. C. binary digit. D. binary number.

17. A string of eight 0s and 1s is called a: A. megabyte. B. byte. C. kilobyte. D. gigabyte.

18. A____________ is approximately one billion bytes. A. kilobyte B. bit C. gigabyte D. megabyte

19.____________ is any part of the computer that you can physically touch. A. Hardware B. A device C. A peripheral D. An application

20. The components that process data are located in the: A. input devices. B. output devices. C. system unit. D. storage component.

21. A____________ is approximately a million bytes. A. gigabyte B. kilobyte C. megabyte D. terabyte

22. All of the following are examples of storage devices EXCEPT: A. hard disk drives. B. printers. C. floppy disk drives. D. CD drives. 23.The____________, also called the brains of the computer, is responsible for processing data. A. motherboard B. memory C. RAM D. central processing unit (CPU)

24. The CPU and memory are located on the: A. expansion board. B. motherboard. C. storage device. D. output device.

25. Word processing, spreadsheet, and photo-editing are examples of: A. application software. B. system software. C. operating system software. D. platform software.

26.____________ is a set of computer programs used on a computer to help perform tasks. A. An instruction B. Software C. Memory D. A processor

27. The PC (personal computer) and the Apple Macintosh are examples of two different: A. platforms. B. applications. C. programs. D. storage devices. 28. DSL is an example of a(n)____________ connection. A. network B. wireless C. slow D. broadband

29. Which of the following is the correct order of the four major functions of a computer? A. Process , Output , Input , Storage B. Input , Output, Process , Storage C. Process , Storage , Input , Output

D. Input , Process , Output , Storage

30.____________ bits equal one byte. A. Eight B. Two C. One thousand D. One million

31. The operating system is the most common type of____________ software. A. communication B. application C. system D. word-processing software 32. The two broad categories of software are: A. word processing and spreadsheet. B. transaction and application. C. Windows and Mac OS. D. system and application

33. All of the following are examples of real security and privacy risks Except_____ (A) hackers (B) spam (C) viruses (D) identify theft

34. The OSI model is divided into_______ processes called layers. (A) five (B) six (C) seven (D) eight

35. Viruses are often transmitted by a floppy disk left in the floppy drive (A) Trojan horse (B) Boot sector (C) Script (D) Logic bomb 36. Servers are computers that provide resources to other computers connected to a (A) mainframe (B) Network (C) supercomputer (D) client

37. URL stands for........ (A) Universal Research List (B) Universal Resource List (C) Uniform Resource Locator (D) Uniform Research Locator 38. You must install a __________ on a network if you want to share a broadband Internet. A) Router (B) modem (C) node (D) cable 39. Chip is a common nickname for a (n): (A) transistor (B) resistor (C) Integrated circuit (D) semiconductor 40. The design of the network is called the network: (A) Architecture (B) server (C) transmission (D) type 41. Personal logs or journal entries posted on the Web are known as: (A) Podcast (B) Webcasts (C) Blogs (D) subject directories

42. Linux is a ____________ operating system. (A) Open-source (B) Microsoft (C) Windows (D) Mac

43. What is a backup? (A) Restoring the information backup (B) An exact copy of a system's information (C) The ability to get a system up and running in the event of a system crash or failure (D) All of these

44.____________ are lists of commands that appear on the screen. (A) GUIs (B) Icons (C) Menus (D) Windows

45. Verification of a login name and password is known as: (A) configuration (B) accessibility (C) Authentication (D) logging in

46. 'MICR' technology used for clearance of cheques by banks refers to (1) Magnetic Ink Character Recognition (2) Magnetic Intelligence Character Recognition (3) Magnetic Information Cable Recognition (4) Magnetic Insurance Cases Recognition

47. The CPU and memory are located on the: A. expansion board. B. Motherboard. C. storage device. D. output device.

48. First generation computer systems used (a) Transistors (b) Vacuum tubes (c) Magnetic cores (d) Silicon chips

49. Charles Babbage invented (a) ENIAC (b) Difference engine (c) Electronic computer (d) Punched card

50. Which one of the following is not a programming language of a computer? (a) BASIC (b) FORTRAN (c) LASER (d) PASCAL

Anda mungkin juga menyukai