Anda di halaman 1dari 28

1. During the program execution, temporary/intermediate values are stored in _____________.

a. Registers
b. Peripherals
c. LAN
d. None of these

2. The objects can be inherited by _____________.


a. A single object only
b. Multiple objects
c. Both (a) and (b)
d. Either (a) or (a)

3. The operating system may perform _____________ operation to manage the memory while
running a large program.
a. Sorting
b. Scheduling
c. Paging
d. None of these

4. When the LAN is arranged in such a way that each computer is connected directly to the HUB
the configuration can be termed as _____________ network.
a. Bus
b. Star
c. Ring
d. None of these

5. To communicate with other computers over a telephone line the computer must have
_____________ installed.
a. Telephone set
b. Modem
c. LAN Card
d. None of these

6. When each item of data in a database is directly linked with every other item of data, the
database is called _____________.
a. Relational
b. Hierarchical
c. Network
d. None of these

7. _____________ is the most efficient method to reduce the duplication of data.


a. Duplication
c. Normalization
c. Empty fields
d. None of these

8. The _____________ operation changes the coordinate values of objects being displayed.
a. Transformation
b. Windowing
c. Both (a) and (b)
d. None of these

9. A linear sequential software development model is also referred to as ____________ .


a. Prototype Model
b. RAD Model
c. Spiral Model
d. None of these

10. State Transition Diagram gives information of ___________.


a. Data Flow
b. Entry Relationship
c. Control Flow
d. None of these

(11) State Transition Diagram gives information of


(a) Prototype Model
(b) RAD Model
(c) Spiral Model
(d) None of these

(12) The concept of meaning represented by an algorithm is known as its:


(a) Control Structure
(b) Sequence
(c) Semantics
(d) Syntax

(13) Each cell of memory is numbered and that number is referred to as the cells

(a) Block
(b) Identity
(c) Address
(d) Size

(14) Main memory is called RAM because


(a) It is volatile, like a rams temper.
(b) The computer starts at address 0 and reads every byte until it reaches the correct address.
(c) It can Read all memory
(d) The memory is accessible randomly

(15) To use internet, the computer must have


(a) Telephone
(b) Modem
(c) ISP Connection
(d) All of the above
(11) What is the long form of 'CMOS'?
(a) Complementary Metal Oxide Semiconductor V
(b) Complex Metal Oxide Semiconductor
(c) Controller Metal Oxide Semiconductor
(d) Complementary Metal Oxide Sets.

(12) What is a Y-Connector? '


(a) A'Y-Shaped splitter cable that divides a source input into two output signals.
(b) A Y-Shaped splitter connector that divides a source input into two output signals.

(c) A Y-Shaped splitter card that divides'a source input into two output signals.
(d) None of the above.

(13) What do you mean by IBM-Compatible'?


(a) A computer that has a processor that is compatible vvith the original IBM PC.
(b) A computer that has a processor that is similar to original IBM PC
(c) A computer that has a casing that is similar original IBM PC.
(d) None of the above

(14) What do you mean by "virtual? Select'all that apply:


(a) In general, it distinguishes something that is merely conceptual from something that has
physical reality,
(b) Real
(c) Not real.
(d) None of the above

(15) Select correct statement describing a term 'stateless'?


(a) Having all information about what occurred previously
(b) Having some information about what occurred previously
(c) Having no information about what occurred previously
(d) Having new information about what occurred previously
(i) When all access and processing is done in one location, a computer system is said to be
(a) networked
(b) distributed
(c) centralized

(d) linked

(ii) Tools to change PROM chips, called


(a) chip kits
(b) RAM burners
(c) PROM burners
(d) none of
these

(iii) The type of modulation that changes the height of the single is called (a) frequency
(b) phase
(c) amplitude
(d) prophase

(iv) A connection for similar network:


(a) satellite
(b) bridge
(c) gateway
(d) fax

(v) The technology whereby part of the program is stored on disk and is brought into memory for
execution as needed is called
(a) memory allocation
(b) virtual storage
(c) interrupts

(d) prioritized memory

6) The processors components are synchronized by:


a. Instructions
b. Data
c. Information
d. Clock pulses
7) External devices are linked to a small computer system through:
a. Channels
b. Control units
c. Plugs
d. interfaces
8) Data on disk are recorded on a series of concentric circle called:
a. Sectors
b. Cylinders
c. Blocks
d. Tracks

9) The simplest data structure is a:


a. File
b. List
c. Record
d. Array

10) Several computers linked by communication lines for a:

a. Network
b. Distributed system
c. Time share system
d. Ring
(1) If the highest frequency of a signal is 2100 Hz and lowest frequency of a signal is 200 Hz,
sample rate will be:
(a) 4000 Hz
(b) 4600 Hz
(c) 4200 Hz
(d) 2300 Hz
(e) None of these

(2) A 56 K modem can download at a rate of _________ Kbps and upload at a rate of _________
Kbps.
(a) 33.6; 33.6
(b) 33.6; 56.6
(c) 56.6; 33.6
(d) 56.6; 56.6
(e) None of these

(3) A system call provides interface between:


(a) A process and a thread
(b) A thread and a user program
(c) A process and an operating system
(d) A process and a user program
(e) None of these

(4) CPU scheduling information about a process is held by:


(a) a PC
(b) the CPU Register
(c) the Cache
(d) a PCB
(e) None of these

(5) An example of Last-In-First-Out (LIFO) data structure is a:


(a) Class
(b) List
(c) Stack
(d) Tree
(e) None of these

(6) In Object Oriented Programming, overload methods:


(a) Can have the same types and number of parameters as another method with the same name in
the same class as long as the return type is different.
(b) Cannot be used as methods that manipulate attributes
(c) Must always have different number of parameters
(d) Must have different number of parameters or if the number of parameters is the same a
different sequence of parameter type
(e) None of these

(7) If you wanted to sort many large objects or structures, it would be most efficient to:
(a) Place them in an array and sort the array

(b) Place pointers to them in an array and sort the array


(c) Place them in a linked list and sort the linked list
(d) Place references to them in an array and sort the array
(e) None of these

(8) The type of the variable a pointer points to must be part of the pointers definition so that:
(a) Data types do not get mixed up when arithmetic is performed on them.
(b) Pointers can be added to one another to access structure members
(c) No ones religious conviction will be offended
(d) The computer can perform overloading
(e) None of these

(9) If we have a tree of n nodes, its depth can be calculated as:


(a) Log2 (n+1) 1
(b) Log2 n
(c) Log2 (n+1) 1
(d) Log10 (n+1) 1
(e) None of these

(10) Which one of the following methods does not change the original value of the argument in
the calling function?
(a) Call by passing reference of the argument
(b) Call by passing the address of the argument
(c) Call by passing value of the argument
(d) Call by passing pointer of the argument

(e) None of these


(i) AX register is also known as:
(a) Accumulator
(b) Collector
(c) Distributor
(d) Counter
(e) None of these

(ii) In the Base + Offset addressing, Offset address is also known as:
(a) Physical Address
(b) Logical Address
(c) Actual Address
(d) Instruction Address
(e) None of these

(iii) The technique for allowing a unit to check the status of another independently function unit
is known as?
(a) Interrupt
(b) System call
(c) Polling
(d) Trape
(e) None of these

(iv) The method for storing data temporarily such that the input-output of the same job is
overlapped with its own processing, is known as:
(a) Spooling

(b) Contention
(c) I/O wait
(d) Buffering
(e) None of these

(v) The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these

(vi) _________ Scheduler deals with the decision as to whether to admit another new job to the
system.
(a) High Level
(b) Medium Level
(c) Low Level
(d) Short term
(e) None of these

(vii) When the process is in the states of Blocked Suspended or Ready Suspended, its relevant
data is
stored in:
(a) Main Memory
(b) Hard Disk
(c) Magnetic Tape

(d) Buffer
(e) None of these

(viii) Priority, P = (Time Waiting + Run Time) / Run Time is used to calculate priority in
__________ scheduling algorithm:
(a) Shortest Job First
(b) Priority Scheduling
(c) Longest Wait First
(d) Highest Response Ratio Next
(e) None of these

(ix) HDLC Protocol stands for:


(a) High-Level Data Link Control
(b) High Level Development Protocol
(c) Huge Level Data Link Control
(d) High Development Level Control
(e) None of these

(x) _________ is the generic name for a set of standards issued by the International
CommunicationsStandards Body CCITT, designed to support Message Handling Systems; i.e.
Electronic Mail.
(a) TCP/IP
(b) ISDN
(c) X.400
(d) X.25
(e) None of these

(xi) ________ layer is responsible for the transfer of a packet of data along one link in the
network. It organizes data into frames and detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these

(xii) Encryption is the conversion of data in some intelligible format into an unintelligible format
called _________ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these

(xiii) Binary search requires about ______ comparisons with an initial list of 1,000,000 elements.
(a) 10
(b) 20
(c) 35
(d) 100
(e) None of these

(xiv) A _________ header list is a header list where the last node contains the null pointer.
(a) Grounded

(b) Circular
(c) One way
(d) Rooted
(e) None of these

(xv) ________ are small applications that are accessed on an internet server, transported over the
internet, automatically installed and run as part of a web document.
(a) Applets
(b) Java Bean
(c) Sockets
(d) Java Component
(e) None of these

(xvi) AWT stands for:


(a) Abstract Window Technique
(b) Abstract Window Toolkit
(c) Actual Window Technique
(d) Added Window Toolkit
(e) None of these

(xvii) GIF images can have only upto _______ colors.


(a) 128
(b) 256
(c) 512
(d) 1024

(e) None of these

(xviii) ________ is stored on a client and contains state information of the website visited.
(a) Cookies
(b) Servelet
(c) History
(d) Resident Page
(e) None of these

(xix) In software Engineering KPA denotes.


(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these

(xx) The ________ Process Model defines a series of events that will trigger transitions from
state to state for each of software engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these
(1).object (also called_____) is a common data type that includes photograph, audio, vedio, or a
document in other applications.
(a) Number (b) BLOB (c) Integer (d) binary (e) none of these

2. in database, a(n) ____ field is a group of related fields.


(a) Table (b) Key (c) Record (d) Primary field (e) None of these

3. In a database, a(n) ____ field is a field that uniquely identifies each record in a file.
(a) Main (b) Identifying (c) Master (d) Key (e) none of these

4. If a lowest annual fee at a discount warehouse is Rs.2025 and the highest is Rs.5550,
a(n)______ on annual fee field ensure it is a value between Rs.2025 and Rs.5550.
(a) Range Check (b) completeness check (c) consistency Check (d) alphabetic/numeric check (e)
none of these

5. A DBMS uses the _____ to perform validation checks.


(a) Data Server (b) data smart (c) data warehouse (d) data dictionary (e) none of these

6. _______ is a network technology that defines how messages are routed from one end of a
network to other, ensuring the data arrives correctly by dividing it into packets.
(a) HTML (b) XML (c) HTTP (d) TCP/IP (e) none of these

7. When a computer sends data over the internet, the data is divided into small pieces , or
_______
(a) Bundles (b) packets (c) slices (d) baskets (e) none of these

8. The amount of data, instructions and information that can travel over a communication
channel sometimes is called _______
(a) Broadband (b) baseband (c) latency (d) bandwidth (e) none of these

9. fiber optic cables have all of the following advantages over cables that used wire except
_______
(a) lower costs & easier installation and modification
(b) Faster data transmission & smaller size
(c) Less susceptible to noise from other divices
(d) Better security for signals during transmission
(e) none of these

10. A_____ is a network that connects computer and devices in a limited geographical area, such
as home, school computer laboratory, or office building
(a) LAN (b) MAN (c) WAN (d) VAN (e) none of these

11. With _______ memory , the operating system allocates a portion of storage medium, usually
the hard disk , to function as additional RAM
(a) Virtual (b) performance (c) device (d) Managed (e) none of these

12. If a new a device such as printer or scanner is attached to a computer, it _________ must be
installed before the device can be used
(a) Driver (b) platform (c) manager (d) kernel (e) none of these

13. A ________ is an icon on the desktop that provides a user with immediate access to a
program or file.
(a) kernel (b) spooler (c) buffer (d) Shortcut (e) none of these

14. ________ a disk or reorganizing it so the files are stored in contiguous sectors, speeds up
disk access and thus performance of entire computer.
(a) Formatting (b) Defragmenting (c) Spooling (d) compressing (e) none of these

15. The term computer _______ describes potentially damaging computer program that affects or
infects a computer by altering the way the computer works without the users knowledge or
permission .
(a) Hot spot (b) File compression Utility (c) Virus (d) File conversion Utility (e) none of these

17. Although used in all types of business modeling the _____ has been adopted as a standard
notation for object modeling.
(a) UML (b) CASE Tool (c) USE CASE Diagram (d) EMR (not sure) (e) none of these

18. For each input and output, a systems analyst typically develops _______ which is a sample of
the input or output and contains actual data.
(a) Adoption (b) prototype (c) Mockup (d) feasibility Scheme (e) none of these

19. _________ is a working model of proposed system.


(a) Adoption (b) feasibility Scheme (c) Mockup (d) Prototype (e) none of these

20. A unit test ________


(a) Verifies that each individual program works by itself
(b) Verifies that all programs in an application work together properly
(c) Verifies that an application works with other applications
(d) is performed by end-users and verifies that the new system works with actual data
(e) None of these

1. Which of the following best describes "virtual memory"?

a. A portion of the hard disk considered as RAM.


b. Extended memory on the secondary storage that is used whenever physical memory is full.
c. The abstraction of separating logical memory - memory as seen by the process - from physical
memory - memory as seen by the processor.
d. It is the page file in Windows folder.
e. None of these.

2. The 'cmp' instruction modifies the:

a. Instruction register.
b. Flags register.
c. Segment register.
d. None of these.

3. Consider the following page reference string:


1,2,3,4,2,1,5,6,2,1,2,3,7,6,3,2,1,. Assuming there are 4 page frames available and that all frames
are initially empty, what is the total number of page faults that would occur for the page
reference string above if the least-recently-used (LRU) replacement policy is used?

a. 6
b. 9
c. 10
d. 11
e. None of these

4. The Banker's algorithm is used to _________

a. Rectify deadlock
b. Detect deadlock
c. Prevent deadlock
d. Avoid deadlock
e. None of these

5. The necessary conditions needed before deadlock can occur are ________.

a. No Mutual Exclusion, Hold and wait, Preemption, Circular Wait.


b. Mutual Exclusion, No Hold and wait, Preemption, Circular Wait.
c. Mutual Exclusion, Hold and wait, No Preemption, Circular Wait.
d. Mutual Exclusion, Hold and wait, Preemption, No Circular Wait.

6. Differences between data lick layer and transport layer error detection is that:

a. Data link detects transmission errors while transport layer detects segmentation faults.
b. Data link detects node-to-node errors while transport layer detects end-to-end errors.
c. Data link detects end-to-end errors while transport layer detects node-to-node errors
d. Data link detects segmentation errors while transport layer detects bit error.
e. None of theses

7. Phase Shift Keying (PSK) method is used to modulate digital signals at 9600bps using 16
levels. The line signals speed (i.e. modulation rate) will be:

a. 1200 bands
b. 2400 bands
c. 4800 bands
d. 9600 bands
e. None of these

8. Exception handling is a powerful technique that separates error-handling code from ______
code

a. Buggy
b. Faulty
c. Normal
d. Exceptional
e. None of these

9. When a subroutine is called, the address of the instruction following the CALL instructions
stored in/on the:

a. Stack pointer
b. Accumulator
c. Programs counter
d. Stack
e. None of these

10. Binary tree "preorder" traversal is defined recursively as follows:

a. Traverse left subtree, visit the root, traverse right subtree


b. Traverse right subtree, visit the root, traverse left subtree
c. Visit the root, traverse left subtree, traverse right subtree
d. traverse left subtree, traverse right subtree, visit the root
e. None of these

11. What value will return to the operating system upon the successful completion of a program?

a. -1
b. 1
c. 0
d. None of these
13. The advantages of creating a prototype are:

a. It allows developers to experiment with number of different design options.


b. It can serve as means of communication between developers and customers.
c. It is better than water fall model
d. Both a and b
e. None of these

14. Choose the correct statement:

a. Testing can show the presence of bugs but never their absence
b. Testing can always find all the bugs
c. Testing can always be exhaustive
d. If we test enough then we can find all of the bugs
e. None of these

15. Which of the following operations need the participating relations to be union compatible?

a. UNION
b. INTERSECTION
c. DIFFERENCE
d. All of these
e. None of these

16. The language used in application programs to request data from the DBMA is referred to as
the:

a. DML
b. DDL
c. VDL
d. SDL
e. None of these

17. What is the correct XHTML for a paragraph?

a. <P></p>
b. <P></P>
c. <p></p>
d. </p><p>
e. None of these

18. Which of the following HTML form method is suitable when you need to send larger form
submission?

a. Get
b. Post
c. Both Get and Post
d. Ajax
e. None of these

19. (2,4) is a point on a circle that has center at the origin. Which of the following points are also
on circle?

a. (2,-4)
b. (-2,4)
c. (4,-2)
d. All of the above
e. None of these

20. In Bresenham's algorithm, while generating a circle, it is easy to generate?

a. One octant first and other by successive reflection


b. One octant first and other by successive rotation
c. One octant first and other by successive translation
d. All octants
e. None of these.

1.

The major language of World Wide Web is ___________.

A.

HTML

B.

PHP

C.

ASP.NET

D.

Java

2.

HTML is an abbreviation for?

A.

HiTech Meaningful Language

B.

HyperText Meaningful Language

C.

HiTech Markup Language

D.

HyperText Markup Language

3.

___________ is a device from where the information is sent.

A.

Transmitter

B.

Spreadsheet

C.

Simulation

D.

Modulation

4.

__________ is a mathematical model of a real system in the form of a computer program.

A.

Transmitter

B.

Spreadsheet

C.

Simulation

D.

Modulation

5.

LAN is an abbreviation for?

A.

Large Access Network

B.

Local Access Network

C.

Large Area Network

D.

Local Area Network

6.

In peer-to-peer networking,

A.

there is only one server and many clients

B.

there is only one client and many servers

C.

every computer is capable of playing the role of server

D.

every computer is capable of playing the role of client, server or both at the same time

7.

URL is an abbreviation for?

A.

Universal Resource Locator

B.

Uniform Resource Locator

C.

Universal Resource Location

D.

Uniform Resource Location

8.
The network in which we connect each node to the network along a single piece of
network cable is called __________.

A.

Bus Network Topology

B.

Star Network Topology

C.

Ring Network Topology

D.

None of these

9.
The network in which we connect each network node to a central device (hub) is called
__________.
A.

Bus Network Topology

B.

Star Network Topology

C.

Ring Network Topology

D.

None of these

10.

FTP is an abbreviation for?

A.

File Transfer Position

B.

File Transfer Protection

C.

File Transfer Protocol

D.

File Transfer Possibility

Anda mungkin juga menyukai