Anda di halaman 1dari 8

Time : 1 Hour

F.M.: 100

1. A Time sharing system is: A) Batch processing approach B) Interactive multi-user multiprogramming approach C) Single user system D) Single user Multiprocessing approach 2. Which keystroke will take you at the beginning of the next or previous page of the document? A) Ctrl+PageUp and Ctrl+PageDown B) Shift+Home and Shift+End C) Ctrl+Home and Ctrl+End D) The only way is by using the right scroll bar

Which of the following menu option is used to display the Custom Animation task pane in PowerPoint by choosing Custom Animation option
3. A) Format B) Tools C) Slide Show D) Window 4. The advantage of using a spreadsheet is: A) Calculations can be done automatically B) Changing data automatically updates calculations C) More flexibility D) All of the above 5.

Which of the following allows you to communicate with multiple users at the same time?

A) Instant messaging B) E-mail C) A chat room D) A photo community 6. Input: A=11/05/1983 Choose the right function to get Output: 198 A) ?SUBSTR(A,7,2) B) ?STUFF(A,7,3) C) ?SUBSTR(A,8,3) D) ?SUBSTR(A,7,3)

7. What is output of expression: A=CEILING(5.4)? A) 5 B) 4 C) 6 D) none of the Above 8. The operation carried out on an input data for examining its acceptability is termed A) Checking B) Moderation C) Verification D) Validation 9. Decision Table is a A) Tabular representation of a program logic B) Symbolic representation of a program logic C) Graphical representation of a program logic D) All of the above 10. The command to create a new database file based on two open database files is A) SET RELATION B) UPDATE C) JOIN D) None of the above 11. The ??? Indicates A) Print text to Output Screen B) Print text directly to printer C) Comment D) Logical Operation 12. Which one is A) Staffing B) Controlling C) Planning D) Co-operating

not a function of Management?

13. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers. B. spam. C. viruses. D. identity theft.

14. A process known as ____________ is used by large retailers to study trends.


A. data mining B. data selection C. POS D. data conversion

15. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data B. Point-of-sale (POS) C. Sales D. Query

16. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop.
A. PSS B. POS C. inventory D. data mining

17. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:
A. robotics. B. simulation. C. computer forensics. D. animation.

18. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information

19. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements.
A. POS B. RFID C. PPS D. GPS

20. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics. B. computer forensics. C. simulation.

D. forecasting.

21. Technology no longer protected by copyright, available to everyone, is considered to be:


A. proprietary. B. open. C. experimental. D. in the public domain.

22. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence

23. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI)

24. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process B. Software C. Storage D. Information

25. The name for the way that computers manipulate data into information is called:
A. programming. B. processing. C. storing. D. organizing.

26. Computers gather data, which means that they allow users to ____________ data.
A. present B. input C. output D. store

27. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data. B. output. C. input.

D. the process.

28. A string of eight 0s and 1s is called a:


A. megabyte. B. byte. C. kilobyte. D. gigabyte.

29. A ____________ is approximately one billion bytes.


A. kilobyte B. bit C. gigabyte D. megabyte

30. A ____________ is approximately a million bytes.


A. gigabyte B. kilobyte C. megabyte D. terabyte

31. ____________ is any part of the computer that you can physically touch.
A. Hardware B. A device C. A peripheral D. An application

32. Array is of
(a)Scalar type (b)Aggregate type (c)Union type (d)Enumerated type

33. Array name is a


(a)Variable (b)Pointer to constant (c)Constant pointer (d)Constant

34. The only operator that can act on the array as a whole is
(a)indirection operator (b)sizeof operator (c){ } (d)[ ]

35. Which of the following is true about array?


(a)Array elements are stored in contiguous memory locations (b)In c arrays are stored in row-major order (c)An array can be declared as local as well as global (d)All the above 36. Find the correct output void main() { char a[]=rama; char b[]=a; printf (%d %s, sizeof (b),b); } (a)5 rama (b)4 rama (c)5 r (d)None of these

37. It is said that the array uses zero-based addressing because


(a)Array size must be an integer greater than 0 (b)The array subscript must always start at 0 (c)Array declaration reserves memory during compilation (d)None of these

38. Find the correct output


void main() { char a[]=manish; char b[10]=manish\0; if(strcmp(a,b)) printf(Not equal); else printf(Both are equal); } (a)Not equal (b)Both are equal (c)Array of different size can not be compared (d)None of these

39. Need to retrieve a file from the file server for your word processing application, which layer of the OSI model is responsible for this function?

1. 2. 3. 4. 5.

Presentation layer Application layer Session layer Transport layer Datalink layer

40. IEEE subdivided the datalink layer to provide for environments that need connectionless or connection-oriented services. What are the two layers called?
1. 2. 3. 4. 5. Physical MAC LLC Session IP

41. Routers can be configured using several sources. Select which of the following sources can be used.
1. 2. 3. 4. 5. Console Port Virtual Terminals TFTP Server Floppy disk Removable media

42. Which layer is responsible for flow control with sliding windows and reliability with sequence numbers and acknowledgments?
1. 2. 3. 4. Transport Application Internet Network Interface

43. Which processes does TCP, but not UDP, use?


1. 2. 3. 4. Windowing Acknowledgements Source Port Destination Port

44. The Internet was orginally a


a. LAN at MIT b. Code-cracking network during World War II by the U.S. Defense Department c. A network cooperatively created by several large hardware and software companies d. A small experimental research network called ARPANET e. A Microsoft product that quickly became too big for the company to control

45. Where is the Internet's central hub and control center located?

a. Near Washington D.C. b. Near the Microsoft campus in Redmond, Washington c. In a top-secret location d. In Silicon Valley e. Nowhere, the Internet has no central hub

46. Which of these domains is restricted to qualified organizations?


a. .com b. .org c. .net d. .edu e. None are restricted; anyone can have a URL in any of these domains

47. Which of these types of Internet connections is typically the slowest?


a. Direct connection through T1 lines b. Dial-up modem connections through phone lines c. DSL connections through phone lines d. Cable modem connections through cable TV lines e. Satellite connections through satellite dishes

48. Which of these services would you probably not be able to get from a typical Internet service provider (ISP)?
a. An email address b. Access to a Web server c. A connection to the Internet d. Technical help e. Free Windows upgrades

49. Specialized servers are used on the Internet to


a. Function like email post offices b. Accept FTP requests to upload the download files c. Store applications that are rented or leased by large corporations d. Store and send Web pages e. All of the above

50. The first Web pages were


a. Strictly hypertext with no multimedia content b. Designed to simulate printed pages using HTML's table tools c. The first true multimedia documents to be published on the Internet d. Viewable only with proprietary Microsoft software e. Sent via email from Doug Engelbart's office on the Stanford campus

Anda mungkin juga menyukai