1. What component manages the data flow and interaction between the components of a computer processor?
1.
Accumulator
2.
Control unit
3.
Register
4.
Monitor
2. Web pages are interlinked by using
1.
HTTP
2.
marquee
3.
hyperlinks
4.
Internet
3. “IP” is an abbreviation of
1.
Inner Process
2.
Internet Program
3.
Internet Protocol
4.
Internal process
4. Which of the following is an internet standard
communication protocol for email transmission?
1.
FTP
2.
SMTP
3.
SSH
4.
STEP
5. “CMS” is an abbreviation of computer software
related to
1.
Content Management System
2.
Content Modification Software
3.
Client Management System
4.
Control Management System
6. Internet uses _____ to communicate between devices
and networks.
1.
HTTP
2.
email
3.
website
4.
internet protocol suite
7. C++ is an object-oriented language, and C, BASIC,
and Pascal are _____ languages.
1.
Procedural
2.
scripting
3.
general purpose
4.
web-based
8. The amount of time taken by a device to begin reading
data is called
1.
Seek time
2.
Read time
3.
Access time
4.
Write time
9. The main function of a web server is to store and process
1.
Internet
2.
websites
3.
database
4.
programs
10. “Google Language Translator” is an example of the
application of
1.
Internet
2.
debugging
3.
computer simulations
4.
machine learning
11. Algorithms that improve automatically through experience
are known as
1.
computer program
2.
Machine learning
3.
computer language
12. The basic medium of optical fiber is
a fiber that is mostly made of
1.
glass
2.
wood
3.
copper
4.
lead
13. Web pages are interlinked by using
1.
HTTP
2.
marquee
3.
hyperlinks
4.
slider
14. In peer-to-peer networking,
1.
there is only one server and many clients
2.
there is only one client and many servers
3.
every computer is capable of playing the role of server
4.
every computer is capable of playing the role of client, server
or both at the same time
15. URL is an abbreviation for
1.
Universal Resource Locator
2.
Uniform Resource Locator
3.
Universal Resource Location
4.
Uniform Resource Location
16. The network in
which we connect each node to the network along a single piece of network cable
is called
1.
Bus Network Topology
2.
Star Network Topology
3.
Ring Network Topology
4.
None of these
17. The network in which we connect each
network node to a central device (hub) is called
1.
Star Network Topology
2.
Bus Network Topology
3.
Ring Network Topology
4.
None of these
18. FTP is an abbreviation for
1.
File Transfer Position
2.
File Transfer Protection
3.
File Transfer Protocol
4.
File Transfer Possibility
19. Which operating
system is used by most of the supercomputers in the world?
1.
Windows
2.
Linux
3.
Macintosh
4.
None of these
20. The “Macintosh” computers and laptops
are manufactured by
1.
Apple
2.
Microsoft
3.
Samsung
4.
Lenovo
21. Which variable
type can have only two possible values?
1.
integer
2.
string
3.
double
4.
bool
22. IDE is an
abbreviation of
1.
Integrated Dual Environment
2.
Inter Development Environment
3.
Integrated Development Environment
4.
Inter Dual Environment
23. C++ is an object-oriented language,
and C, BASIC, and Pascal are _____ languages.
1.
Procedural
2.
scripting
3.
general purpose
4.
web based
24. Which number system is used by
computers?
1.
Digital
2.
decimal
3.
analogue
4.
binary
25. A computer virus that replicates
itself is called
1.
Bug
2.
Worm
3.
Bomb
4.
Hoax
26. The tool used to find a similar word
in a document is called
1.
Finder
2.
Thesaurus
3.
Dictionary
4.
Find and Replace
27. The major language
of the World Wide Web (WWW) is
1.
HTML
2.
PHP
3.
ASP.NET
4.
Java
28. Which computer language is used to
design the display of an HTML web page?
1.
PHP
2.
Java
3.
CSS
4.
ASP.NET
29. “Google Language Translator” is an
example of the application of
1.
internet
2.
debugging
3.
computer simulations
4.
machine learning
30. Which of the following components of
physical database design refer to the correctness and consistency of data?
1.
Indexes
2.
Integrity constraints
3.
File organization
4.
Data Distribution strategy
31. conio.h stands for
1.
character input output
2.
console input output
3.
common input output
4.
complex input output
32. Duplication of data in multiple files
is called
1.
Data Redundancy
2.
Data Dependence
3.
Data Inconsistency
4.
None Of These
33. A relation that
contains minimal redundancy and allows easy use is called
1.
Clean
2.
Simple
3.
Complex
4.
Well-Structured
34. SQL stands for
1.
Structured Query Language
2.
Sequential Query Language
3.
Simple Query Language
4.
None Of These
35. In a program where the user inputs
the roll number and the program displays the marks obtained, which of the
following is suitable?
1.
for loop
2.
do-while loop
3.
if/ else statement
4.
switch statement
36. In which loop, the
loop body executes at least once?
1.
for loop
2.
while loop
3.
do-while loop
4.
none of these
37. Consider the main body of a program,
string a = “4”;
string b = “8”;
string c = a + b;
cout << c
<< endl;
If the program is run,
what will be displayed on the screen?
1.
4
2.
8
3.
12
4.
48
38. Which register stores the result of
ALU operations?
1.
Data Register
2.
Instruction Register
3.
Data Address Register
4.
Accumulator Register
39. A collection of
rules for writing programs in a programming language is known as
1.
Syntax
2.
Program logic
3.
Program Standards
4.
None Of These
40. Which one connects
two similar network segments?
1.
Router
2.
Bridge
3.
Gateway
4.
Node
41. Which of the following device uses
the parallel transmission?
1.
Mouse
2.
Keyboard
3.
Printer
4.
Light Pen
42. What is a diagrammatic way of
representing the relationship between the entities in a database?
1.
Flowchart
2.
ERD
3.
DFD
4.
Algorithm
43. In computer
science and information technology (IT), DNS is an abbreviation of
1.
Direct Name System
2.
Domain Name System
3.
Direct Name Software
4.
Domain Name Software
44. In C++, the
library function exit() causes an exit from the
statement
1.
loop in which it occurs
2.
function in which it occurs
3.
program in which it occurs
45. In C++, a function
name must be followed by
1.
braces
2.
parentheses
3.
statement
4.
variable name
46. Which transmission
allows data to travel in both directions but only one direction at a time?
1.
Simplex
2.
Full duplex
3.
Half duplex
4.
Reverse
47. Another name for free software is?
1.
Encrypted Software
2.
Copy Protected Software
3.
Shareware
4.
Public Domain Software
48. DPI stands for?
1.
Dot Per Inch
2.
Decimal Per Inch
3.
Digit Per Inch
4.
Data Per Inch
49. A small high-speed memory inside the
CPU is
1.
RAM
2.
ROM
3.
Cache
4.
Register
50. ________ are used to evaluate
compound conditions.
1.
Arithmetic Operators
2.
Logical Operators
3.
Relational Operators
4.
Assignment Operators
51. Consider the main body of a C++
program,
string var1 =
“Computer “;
string var2 =
“Science”;
string var3 = var1 +
var2;
cout << “var3”
<< endl;
If the program is run,
what will be displayed on the screen?
1.
var3
2.
Computer
3.
Science
4.
Computer Science
52. MICR stands for?
1.
Magic In Character Redo
2.
Magnetic Ink Character Recorder
3.
Magnetic Ink Character Reader
4.
None Of These
53. __________ is used
to control all the parts of a manufacturing process.
1.
ATM
2.
CAM
3.
CAD
4.
MICR
54. CPU consists of the following parts:
1.
Control unit and ALU
2.
CU and Main memory
3.
Main memory and ALU
4.
Operating system and Main memory
55. MHz stands for?
1.
Millihertz
2.
Microhertz
3.
Megahertz
4.
None Of These
56. DRAM stands for?
1.
Digital Random Access Memory
2.
Dynamic Random Access Memory
3.
Digital Read Access Memory
4.
Dynamic Read Access Memory
57. In C++, a pointer is
1.
address of a variable
2.
variable for storing addresses
3.
data type of an address variable
4.
constant value
58. What is the statement that displays
the address of the variable myvar?
1.
myvar;
2.
&myvar;
3.
cout << myvar;
4.
cout << &myvar;
59. An address is a
_____, while a pointer is a _____.
1.
constant, variable
2.
variable, constant
3.
constant, constant
4.
variable, variable
60. The dots that compose the image of a
digital photograph are called __________.
1.
Points
2.
Resolution Points
3.
Digital Points
4.
Pixels
61. A type of reader commonly used to
read UPC code is __________.
1.
Bar-code reader
2.
Optical-mark reader
3.
Magnetic-ink reader
4.
Both A and C
62. Caps Lock is a:
1.
Window key
2.
Modifier key
3.
Toggle key
4.
Cursor control key
63. GPS stands for?
1.
Global Pointing System
2.
Global Positioning System
3.
Google Positioning System
4.
None Of These
64. Internet surfing is an example of:
1.
Half duplex
2.
Simplex
3.
Full duplex
4.
None Of These
65. The file type
#include is called
1.
syntax
2.
operator
3.
header file
4.
string constant
66. To generate different random numbers
in C++, which of the following header file(s) must be included?
1.
#include <rand>
2.
#include <cstdlib>
3.
#include <ctime>
4.
#include <cstdlib> and #include <ctime>
67. Analog signal is measured in:
1.
Volt
2.
Hertz
3.
Digits
4.
WATTS
68. _________ uses liquid crystal between
the glass plates.
1.
ELD
2.
LCD
3.
CRT
4.
None of These
69. Open System Interconnection(OSI)
model consists of _________ layers.
1.
Eight
2.
Six
3.
Seven
4.
Five
70. Which of the following coding schemes
uses 4-bit code?
1.
Unicode
2.
ASCII
3.
EBCDIC
4.
BCD
71. Which of the following communication
medium requires “line-of-sight”?
1.
Microwave
2.
Fiber-Optic cable
3.
Twisted-Pair cable
4.
Coaxial cable
72. The goto statement causes control to
go to a/an
1.
function
2.
operator
3.
variable
4.
label
73. Bundling data and functions together
is known as
1.
debugging
2.
encapsulation
3.
overloading
4.
polymorphism
74. _________ is a
collection of system programs that controls and coordinates the overall
operations of a computer system.
1.
System software
2.
Operating system
3.
Utility program
4.
Device driver
75. The translated program into machine
code is called _________.
1.
Source program
2.
Object program
3.
System program
4.
None Of These
76. FormatC is an
example of virus _________.
1.
Chernobal
2.
Logic Bomb
3.
Boot Sector
4.
Torjan Horse
77. What type of operating system MS-DOS
is?
1.
Command Line Interface
2.
Graphical User Interface
3.
Multitasking
4.
Menu Driven Interface
78. Which of the following keyboard
shortcuts is used to change the case?
1.
Ctrl+F3
2.
Alt+F3
3.
Shift+F3
4.
Ctrl+Shift+F3
79. A technique to get
a small amount of money illegally from a large financial system is:
1.
Zapping
2.
Data Diddling
3.
Salami
4.
Piggy backing
80. If a legitimate user does not log
off from the system, an illegitimate user may be involved in:
1.
Zapping
2.
Trapdoor
3.
Piggy Backing
81. A program placed in a legitimate
program for unauthorized and hidden access to the system is called:
1.
Trapdoor
2.
Bomb
3.
Worm
4.
None of these
82. The term that
refers to a circular portion of the disk is:
1.
Track
2.
Cylinder
3.
Sector
4.
Machine cycle
83. Which of the
following RAID technology is used to improve system performance?
1.
Data striping
2.
Disk mirroring
3.
Tolerant computing
4.
None of these
84. The RAID
technology that contributes to fault tolerance is called:
1.
Data striping
2.
Disk mirroring
3.
Tolerant computing
4.
None of these
85. Which of the
following function is used to write a string to a file?
1.
fprintf()
2.
puts()
3.
fputs()
4.
printf()
86. Which of the
following loop is always executed at least once:
1.
for
2.
while
3.
do while
4.
counter loop
87. After
evaluation of expression 5%2 the value is equal to:
1.
0
2.
1
3.
2
4.
4
88. Which of the
following function is used to display output on the screen?
1.
getch()
2.
scanf()
3.
printf()
4.
main()
89. A type of
language in which instructions are written in binary form is:
1.
Machine language
2.
High level language
3.
Assembly language
4.
None
90. Which of the
following is compiler directive?
1.
#include<stdio.h>
2.
int main()
3.
getch()
4.
All of these
91. Which type of
error occurs when the program directs the computer to execute an illegal or
undefined operation?
1.
Syntax error
2.
Logical error
3.
Run-time error
4.
None
92. The Annotation
symbol in the flow chart indicates:
1.
Input
2.
Process
3.
Remarks
4.
Condition
93. A program syntax
error is detected by:
1.
Compiler
2.
Interpreter
3.
Debugger
4.
Both a & b
94. The process
of carefully observing the working of an algorithm is called:
1.
Desk Checking
2.
Debugging
3.
Coding
4.
Compiling
95. A set of
tests ensure that computer and peripherals are working correctly is called:
1.
Registry
2.
Load
3.
Post
4.
Cold boot
96. The process
of transferring data from a storage device to memory is known as:
1.
Boot
2.
Load
3.
Post
4.
Install
97. A process of
restarting a computer that is already on is called:
1.
Warm boot
2.
Cold boot
3.
Load
4.
Post
98. The rules for
exchanging data between computers are called:
1.
Protocols
2.
Hyperlinks
3.
Procedures
4.
Programs
99. The protocol
responsible for routing packets to the correct address is:
1.
HTTP
2.
FTP
3.
TCP
4.
IP
100. At which
layer of the OSI Model, Bit synchronization is handled?
1.
Data link
2.
Session
3.
Network
4.
Physical
101. Which of the
following Microsoft Products is used to plan tasks?
1.
Excel
2.
Access
3.
Project
4.
PowerPoint
102. The process
of training personnel to use the new systems is done during:
1.
Design
2.
Implementation
3.
Development
4.
analysis
103. Which type
of diagram shows how information flows through a system?
1.
DFD
2.
Logic flowchart
3.
Decision table
4.
Gantt chart
104. The virus
that activates itself every Friday the 13th and erases program files from the
disk is called:
1.
Melissa
2.
Cascade
3.
Michelangelo
4.
Jerusalem B
105. Which layer
is responsible for flow control and ensuring messages are delivered without
error?
1.
Session
2.
Physical
3.
Application
4.
Transport
106. Routers operate
at which layer of the OSI Model?
1.
Network
2.
Transport
3.
Physical
4.
Application
107. An operating
system in which all processes are time-bounded uses:
1.
Distributed processing
2.
Time sharing
3.
Real time processing
4.
Batch processing
108. Which type
of processing needs very limited or no interaction from the user?
1.
Real time processing
2.
Time Sharing
3.
Batch processing
4.
Distributed processing
109. What is
running programs with more than one CPU called?
1.
Multiprocessing
2.
Interrupting
3.
Multitasking
4.
Multi-programming
110. What is the
default mode parameter for ofstream?
1.
ios::in
2.
ios::out
3.
ios::binary
4.
both a and b
111. The operator
used for dereferencing or indirection is:
1.
&
2.
*
3.
->
4.
->>
112. Which of the
following creates user groups and assigns privileges to them?
1.
Process management
2.
I/O management
3.
File management
4.
Network management
113. A file that
contains data about a single entity is:
1.
Database table
2.
Field
3.
Relation
4.
Record
114. What data
file type is used to provide descriptive comments?
1.
Text
2.
Report
3.
Autonumber
4.
Memo
115. Which of the
following query is used to change data in existing records?
1.
Update query
2.
Select query
3.
Make table query
4.
Append query
116. CTRL, SHIFT, and
ALT are called _____ keys.
1.
Adjustment
2.
Alphanumeric
3.
Modifier
4.
Function
117. Which software
can convert document images into text that can be edited in a word processor?
1.
Document imaging
2.
Optical character recognition
3.
Discrete word systems
4.
Continuous word systems
118. The Caps Lock key
is a:
1.
Window key
2.
Modifier key
3.
Cursor control key
4.
Toggle key
119. The set of
rules to exchange data in a communication network is called:
1.
Token
2.
Gateway
3.
Protocol
4.
Router
120. SDLC stands
for:
1.
System development life cycle
2.
System design life cycle
3.
Server design life circle
4.
System development life circle
121. Which of the
following is the first phase of SDLC?
1.
System analysis
2.
System development
3.
Initial investigation
4.
Maintenance
122. Which of the
following computer program is a mathematical model of a real system?
1.
Transmitter
2.
Spreadsheet
3.
Simulation
4.
Modulation
123. “Google
Translator” is an example of the applications of
1.
HTTPS
2.
internet
3.
computer simulations
4.
machine learning
124. How many
bytes are occupied by the data type “long double” in a 32-bit system?
1.
4
2.
6
3.
8
4.
10
125. Which
component of a computer holds data or instructions temporarily when they are
being processed?
1.
Accumulator
2.
Control unit
3.
Register
4.
Bus
126. At which layer of
the OSI Model, IP is implemented?
1.
Data link
2.
Presentation
3.
Network
4.
Transport
127. Which of the
following is the bottom layer of the OSI Model?
1.
Application
2.
Presentation
3.
Transport
4.
Physical
128. A
communications signal in the form of a continuous wave is called:
1.
Analog
2.
Digital
3.
Modulation
4.
None of these
129. A cell at the
fourth column and 20 rows has a cell address:
1.
A20
2.
B20
3.
C20
4.
D20
130. In
spreadsheet MS Excel, columns are labeled by:
1.
Numbers
2.
Letters
3.
Alphanumeric
4.
Cell reference
131. In a spreadsheet,
MS Excel rows are labeled by?
1.
Numbers
2.
Letters
3.
Alphanumeric
4.
Cell reference
132. Software
used to connect a PC and the server of ISP is known as:
1.
ISP’s link
2.
Dial up software
3.
Modem software
4.
Communication software
133. ARPA stands
for:
1.
Advance Research Project Agency
2.
American Research Project Agency
3.
Advanced Residential Programming Association
4.
American Residential Programming Association
134. What is the
domain name in the following address? name@server.com
1.
name
2.
server
3.
com
4.
server.com
135. Which of the
following bus transfers actual data from input devices to memory and from
memory to CPU?
1.
Control bus
2.
Address bus
3.
Data bus
4.
System
136. The ASCII coding
system can provide _____ different representations.
1.
16
2.
32
3.
64
4.
256
137. The most widely
used code for representing characters in computers is:
1.
BCD
2.
ASCII
3.
EBCDIC
4.
ANSII
138. In which
topology a hub (switch) is used?
1.
Ring topology
2.
Star topology
3.
Bus topology
4.
Mesh topology
139. Which
combination of keys is used to move back to previous control, while working in
forms?
1.
Ctrl+Tab
2.
Shift+Alt
3.
Shift+Tab
4.
Shift+F3
140. Which of the
following is the oldest search engine on Internet?
1.
Ask.com
2.
Archie.com
3.
Google.com
4.
Yahoo.com
141. In which
topology all nodes are connected to a single cable?
1.
Bus topology
2.
Ring topology
3.
Tree topology
4.
Star topology
142. Which of the
following standards were developed without any formal planning?
1.
De Jure
2.
De Facto
3.
ISO
4.
CCIT
143. In which network
model do all computers have equal status?
1.
Peer-to-peer
2.
Client-Server
3.
Hybrid
4.
All of these
144. The most recent
version of the MAC OS is based on the _____ operating system.
1.
Linux
2.
Unix
3.
Windows
4.
BSD/OS
145. The operating
system is the most common type of _____ software.
1.
System
2.
Application
3.
Communication
4.
Freeware
146. The process
of copying data from a memory location is known as:
1.
Booting
2.
Hacking
3.
Writing
4.
Reading
147. You can
protect your device from hackers by using:
1.
Malware
2.
Antivirus
3.
Firefox
4.
File manager
148. What is the
maximum number of columns that can be inserted in MS Word?
1.
60
2.
63
3.
70
4.
73
149. Which of the
following type cannot be attached with email?
1.
pptx
2.
exe
3.
docx
4.
sisx
150. How many bits a
bus with 32 data lines can transport at a time?
1.
8 bits
2.
16 bits
3.
32 bits
4.
64 bits
151. What type of
software and operating system is?
1.
Utility software
2.
Firmware software
3.
System software
4.
Application software
152. Which term is
related to the database?
1.
Oracle
2.
Php
3.
Java
4.
Assembly
153. Which key is used
to close Microsoft Excel?
1.
ALT+F3
2.
ALT+F4
3.
ALT+F5
4.
ALT+F7
154. What is used
at the end of a Word document, providing more info about something in your
document?
1.
Sidenote
2.
Footer
3.
Footnote
4.
Endnote
155. Which
shortcut is used to search for a word in a document?
1.
CTRL+I
2.
CTRL+E
3.
CTRL+F
4.
CTRL+S
156. Conditional
formatting feature is used in:
1.
MS Word
2.
MS Powerpoint
3.
MS Excel
4.
MS Outlook
157. With which
sign every formula in MS Excel starts?
1.
+
2.
*
3.
<
4.
=
158. Which shortcut key is used in order
to set line spacing at 1.5?
1.
CTRL+5
2.
CTRL+6
3.
CTRL+7
4.
CTRL+8
159. How many distinct
operations can be performed if the op-code of a microprocessor consists of 4
bits?
1.
4
2.
8
3.
16
4.
32
160.What is the
interface that provides connections to external devices called?
1.
Expansion slot
2.
Memory slot
3.
Disk controller
4.
Port
161. Which of the
following memory devices has sequential access to data?
1.
Magnetic disk
2.
Magnetic tape
3.
Optical memory
4.
Chip memory
162. The most
powerful tool to handle memory addresses is:
1.
Arrays
2.
operator
3.
string
4.
pointer
163. The ability
to use a function in multiple ways is:
1.
Class
2.
Overloading
3.
Inheritance
4.
Polymorphism
164. Which of the
following is NOT a reserved word in C++?
1.
quit
2.
break
3.
exit
4.
continue
165. Which command is
used to change the directory in the disk operating system?
1.
CD
2.
CHG DIR
3.
Change directory
4.
Replace directory
166. Which operating
system allows the execution of application software on different computers in a
network?
1.
Parallel processing operating system
2.
Multi-tasking operating system
3.
Distributed operating system
4.
multi-processor operating system
167. What is the
number of default sheets in MS Excel?
1.
1
2.
2
3.
3
4.
4
168. The protocol
which assigns an IP address to a client, connected to the internet is:
1.
FTP
2.
DHCP
3.
ARP
4.
HTTP
169. Which
shortcut key combination is used to select an entire column in Excel?
1.
Ctrl-pagedown
2.
Ctrl-shift
3.
Ctrl-space
4.
Alt-enter
170. Which query
is used to add records from a table to another table?
1.
Select query
2.
Update query
3.
Append query
4.
Make Table query
171. Which key
combination is used to center align text?
1.
CTRL + B
2.
CTRL + C
3.
CTRL + E
4.
CTRL + Z
172. Does CRT stand
for?
1.
Cathode Rays Tube
2.
Clarity Rays Tube
3.
Crystal Rays Tube
4.
None Of These
173. A computer
program that translates one statement of program instructions at a time into
machine language is called
1.
CPU
2.
Interpreter
3.
Compiler
4.
Simulator
174. What does NTFS
stand for?
1.
New Trend File Saving
2.
Network File Saving
3.
New Technology File System
4.
None Of These
175. In MS Windows key F1 is mostly used
for
1.
Help
2.
Exit
3.
Save
4.
Refresh
176. 1 Gigabyte is equal to
1.
1024 bits
2.
1024 bytes
3.
1024 kilobytes
4.
1024 megabytes
177. The most widely
used code for representing characters in computers is
1.
ASCII
2.
BCD
3.
EBCDIC
4.
None Of These
178. The type of
reader commonly used to read bank cheques is
1.
OPtical-mark reader
2.
Magnetic-ink reader
3.
Bar-code reader
4.
None Of These
179. Which of the following devices stores
instructions that help the computer startup?
1.
Keyboard
2.
RAM
3.
ROM
4.
Hard disk
180. The computer can move data and
instructions between storage and memory as needed, in a process called
1.
Volatility
2.
Swapping
3.
Pipelining
4.
Exchanging
181. When you press a key, which device
notifies the system software?
1.
Keyboard
2.
Keyboard Controller
3.
Keyboard Buffer
4.
Keyboard Handler
182. DOS was introduced by
1.
IBM
2.
Xerox
3.
Microsoft
4.
Bell labs
183. Which of the following operating
system is based on open-source software?
1.
UNIX
2.
Windows 2000
3.
Windows NT
4.
Linux
184. The amount of time taken by a device
to begin reading data is called
1.
Seek time
2.
Read time
3.
Access time
4.
Write time
185. The RAID technology that contributes
to fault tolerance is called
1.
Disk mirroring
2.
Tolerant computing
3.
Data striping
4.
None Of These
186. What does MAN
stand for?
1.
Metropolitan Arranged Network
2.
Marked Area Network
3.
Manufactured Arrangements of Networks
4.
Metropolitan Area Network
187. The software used
for workgroup computing is called
1.
Shareware
2.
Freeware
3.
Groupware
4.
Both A and B
189. Which of the following standards were
developed without any formal planning?
1.
De Facto
2.
De Jure
3.
ISO
4.
Both A and B
190. Which of the
following is LAN protocol?
1.
Ethernet
2.
ARCnet
3.
Token Ring
4.
All
191. Which one is the Bottom-most layer of
the OSI model?
1.
Data link
2.
Physical
3.
Network
4.
Transport
192. Data is transmitted block-by-block in
___________ transmission.
1.
Digital
2.
Analog
3.
Synchronous
4.
Asynchronous
193. An important property of fiber optic
is
1.
Refraction
2.
Reflection
3.
Interface
4.
None Of These
194. The process to
convert analog signals into digital signals is called
1.
Modulation
2.
Demodulation
3.
Digitization
4.
Conversion
195. Which of the
following memories can be re-written by using electrical devices?
1.
PROM
2.
ROM
3.
EEPROM
4.
EPROM
196. ___________ virus
is a polymorphic virus. Polymorphic means “change nature with passage of time”.
1.
Redlof
2.
Torjan Horse
3.
Chernobal
4.
Logic Bomb
197. Which of the following protocols is
used by World Wide Web(www)?
1.
TCP/IP
2.
Ethernet
3.
FTP
4.
HTTP
198. A primary key that consists of more
than one attribute is called a
1.
Foreign key
2.
Composite key
3.
Multivalued key
4.
Global key
199. An attribute in the database is also
known as
1.
Tuple
2.
Relation
3.
Row
4.
Field
200. C language was
developed by
1.
Van Neumann
2.
Dennis Ritchie
3.
Charles Babbage
4.
John Backus
201. A space in a computer’s memory set
aside for some data that can be changed is called
1.
Variable
2.
Constant
3.
Integer
4.
Floating Point
202. Which of the
following components is used to convert the first .c to first .exe?
1.
Compiler and header
2.
Header and linker
3.
Compiler and linker
4.
Compiler only
203. Which of the
database objects allows to extract specific information from tables?
1.
Queries
2.
Forms
3.
Reports
4.
Records
204. The instructions
that are given to the compiler before the beginning of the actual program are:
1.
C statements
2.
Preprocessor directive
3.
Linking instructions
4.
C instructions
205. Which key
combination is used to run the C program:
1.
Alt+F9
2.
Ctrl+S
3.
Alt+F5
4.
Ctrl+F9
206. Different
attributes in two different tables having the same name are referred to as
1.
Acronym
2.
Synonym
3.
Homonym
4.
Mutually exclusive
207. SQL is a/an
1.
Unstructured language
2.
Structured language
3.
Object oriented language
4.
Software
208. The loop which
never ends is called:
1.
Infinite loop
2.
Running loop
3.
Continuous loop
4.
Nested loop
209. Another term for
a conditional operator is:
1.
Binary
2.
Iteration
3.
Selective
4.
Ternary
210. The total number of keywords in C
are:
1.
60
2.
42
3.
32
4.
50
211. What does CIM
stand for?
1.
Computer Integrated Manufacturing
2.
Copy In Memory
3.
Computer International Management
4.
Computer Intel Marketing
212. Which register
normally functions as a 16-bit counter that controls the sequence in which the
instructions are fetched from memory?
1.
PC
2.
IR
3.
DR
4.
DAR
213. Access time for
most memories is measured in:
1.
Microseconds
2.
Milliseconds
3.
Nanoseconds
4.
Megahertz
214. A database
consists of various components called:
1.
Tools
2.
Properties
3.
Entities
4.
Objects
215. Which of the
following terms is related to the features of cascading deletion?
1.
Data integrity
2.
Data redundancy
3.
Referential integrity
4.
Indexing
216. What does ATM
stand for?
1.
Automatic Talking Machine
2.
Automatic Teller Machine
3.
Analog Teller Machine
4.
Automatic Ticketing Machine
217. Who is known as
the “Father of Computer Science”?
1.
Charles Babbage
2.
Howard Aiken
3.
Dr.Herman Hollerith
4.
Blaise Pascal
218. One of the first
recognized calculating devices was?
1.
Abacus
2.
Analytical engine
3.
Difference engine
4.
None of these
219. Pentium II is a
__________ generation computer.
1.
second
2.
third
3.
fourth
4.
fifth
220. The first
computer that used vacuum tubes was?
1.
Mark I
2.
ENIAC
3.
EDVAC
4.
UNIVAC
221. Which of the
following is not a pointing device?
1.
Mouse
2.
Joystick
3.
Trackball
4.
None of these
222. The number of
reading/write heads for a hard disk of four platters are
1.
4
2.
6
3.
8
4.
16
223. Which of the
following is a 16-bit code?
1.
BCD
2.
Unicode
3.
ASCII
4.
EBCDIC
224. Boolean algebra
is also known as?
1.
Logical algebra
2.
Code algebra
3.
Switching algebra
4.
Digital algebra
225. The command that is not present on
the edit menu?
1.
Font
2.
GoTo
3.
Find
4.
Ctrl+z
226. Does
first-generation language use?
1.
Pseudo code
2.
Binary code
3.
Mnemonics code
4.
Decimal code
227. In which of the
flowchart symbols, the statement “IS A > B” is placed?
1.
Connector
2.
Rectangular
3.
Parallelogram
4.
Diamond
228. Name the error which you think exists
in the formula C=C*D/C.
1.
Logical
2.
Syntax
3.
Execution
4.
None of these
229. Which of the following statements
transfers control unconditionally?
1.
GOTO
2.
FOR…NEXT
3.
IF THEN
4.
ON GOTO
230. The statement to
reserve memory locations for an array M arranged in 12 columns and 20 rows
maybe?
1.
DIM(12,20)
2.
DIMM(20,12)
3.
M(240)
4.
DIMM(12,20)
231. On execution of
PRINT FIX(-6.83), the output will be?
1.
6
2.
6.83
3.
–6
4.
–7
233. In BASIC, LOG
function refers to natural logarithm have Base?
1.
2
2.
10
3.
5
4.
e
234. An 8-bit address
bus can address memory of?
1.
1 Byte
2.
8 Bytes
3.
256 bits
4.
256 Bytes
235. The number of
colors a CGA monitor displays are?
1.
4
2.
16
3.
64
4.
256
236. The radix of a computerized version
of the number (+0.66E–4) is?
1.
4
2.
6
3.
2
4.
8
237. The programs which are permanent and
stored in ROM are known as?
1.
Utility Programs
2.
Firmware
3.
System softwares
4.
None of these
238. UNIVAC stands for?
1.
Universal Automatic Computer
2.
Universal Array Computer
3.
Unvalued Automatic Computer
4.
Unique Automatic Computer
239. File compression utilities can reduce
the file size by?
1.
10%
2.
60%
3.
80%
4.
100%
240. The “NT” in Windows NT stands for?
1.
Not Tested
2.
Network Technology
3.
Network Terminal
4.
New Technology
241. In C language,
the .exe file is produced by?
1.
Linker
2.
Loader
3.
Compiler
4.
Interpreter
242. Which of the
following is a valid statement for declaring a Variable In C?
1.
Int marks;
2.
int a,b,c;
3.
double salary;
4.
All of these
243. The number of
Bytes used by char data type in C is?
1.
2
2.
1
3.
3
4.
4
244. The format
specifier %u is used for?
1.
Integer
2.
unsigned short
3.
unsigned float
4.
unsigned long int
245. Which of the
following objects are used to store data in MS Access?
1.
Reports
2.
Queries
3.
Forms
4.
Table
246. Which number
system is usually followed in a typical 32-bit computer?
1.
Binary
2.
Decimal
3.
Hexadecimal
4.
Octal
247. Operating system,
editors, and debuggers come under?
1.
System software
2.
Application software
3.
Utilities
4.
None of these
248. When did John
Napier develop logarithm?
1.
1416
2.
1614
3.
1641
4.
1804
249. Which of the
following tools of MS Word is used to rotate the text?
1.
Word Art
2.
Auto Shape
3.
Text Boxes
4.
None of these
250. Which of the
following features of the word processor allows specifying margins of the
documents?
1.
Marco
2.
Thesaurus
3.
Merge
4.
Layout
251. Which of the
following devices can be used to directly image printed text?
1.
OCR
2.
OMR
3.
MICR
4.
All of these
252. The popular
series of personal computers was the Apple series designed in 1976 using
__________ microprocessor.
1.
8-bit
2.
16-bit
3.
64-bit
4.
None of these
253. Who designed the
first electronic computer-ENIAC?
1.
Van-Neumann
2.
Joseph M.Jacquard
3.
J.Presper Eckert and John W. Mauchly
4.
All of these
254. In the latest
generation computers, the instructions are executed?
1.
Parallel
2.
Sequentially
3.
Both A and B
4.
Randomly
255. Web pages are
linked together using?
1.
HTTP
2.
Hyperlinks
3.
Interlinks
4.
None of these
256. A CPU with a
32-bit Address Bus can address memory of?
1.
4 KB
2.
4 GB
3.
8 KB
4.
8 GB
257. In BASIC,
LEFT(A$,n) is used to?
1.
Leave n spaces before the strung A$
2.
Leave n spaces before every character of the strung A$
3.
Leave n left characters of the strung A$
4.
Select n characters of the strung A$
258. In BASIC, RETURN
statement passes control back to?
1.
GOSUB statement
2.
Next to GOSUB statement
3.
Beginning of the program
4.
The statement before GOSUB
259. The number of elements assigned
automatically to a two-dimensional array in BASIC is?
1.
10
2.
100
3.
110
4.
121
260. Which of the following statements can
be used for multiple branching?
1.
GOTO
2.
IF THEN ELSE
3.
ON GOTO
4.
WHILE…WEND
261. Which of the following statements can
be used for unlimited looping?
1.
GOTO
2.
FOR…NEXT
3.
IF THEN
4.
ON GOTO
262. Which of the
following command is used to exit from BASIC and to return to DOS?
1.
CLEAR
2.
KILL
3.
SYSTEM
4.
NEW
263. A number of Shutdown options on
Windows 2000 professional are?
1.
2
2.
3
3.
4
4.
5
264. The number of items present on the
control panel depends upon?
1.
Items install during Setup
2.
Items contained on Windows CD
3.
Items required by your system
4.
Hardware Items attached with the system
265. The number of actions with two
buttons mouse is?
1.
6
2.
5
3.
4
4.
3
266. Which of the following is a DOS
Internal Command?
1.
DELTREE
2.
ERASE
3.
FORMAT
4.
None of these
267. Which of the following is not an
executable command?
1.
CLS
2.
REN
3.
REM
4.
COPY
268. An OR operation has 4 variables, the
possible number of combinations in its truth table is?
1.
64
2.
16
3.
34
4.
32
269. By default, Word automatically saves
your document after every?
1.
5 minutes
2.
10 minutes
3.
15 minutes
4.
20 minutes
270. Pressing
Ctrl+Shift+A causes?
1.
To select whole document
2.
To highlight the selected text
3.
To capitalize the selected text
4.
Office assistant to appear
271. Pressing
Ctrl+Shift+D causes?
1.
To delete the selected text
2.
To underline selected text
3.
To double underline the selected text
4.
None of these
272. The number of colors a VGA monitor
displays are?
1.
16
2.
256
3.
64
4.
4
273. The device driver
is an example of?
1.
System software
2.
Application software
3.
Freeware
4.
Shareware
274. A standard
keyboard used in personal computers?
1.
80 keys
2.
84 keys
3.
101 keys
4.
102 keys
275. Which of the following layers of the
OSI model is responsible for breaking data into segments?
1.
Presentation
2.
Transport
3.
Datalink
4.
Session
276. The Media Access Control sublayer
resides in which layer?
1.
Datalink
2.
Physical
3.
Network
4.
Transport
277. Which of the following coding schemes
uses 4-bit code?
1.
Unicode
2.
ASCII
3.
EBCDIC
4.
BCD
278. Satellite
transmission stations that can both send and receive messages are known as?
1.
Transreceivers
2.
Receivers
3.
Earth Stations
4.
Transmitters
279. Which of the
following tools of MS Word is used to rotate the text?
1.
Word Art
2.
Auto Shape
3.
Text Boxes
4.
None of these
280. Which of the following features of
the word processor allows to specify margins of the documents?
1.
Marco
2.
Thesaurus
3.
Merge
4.
Layout
281. Which of the
following devices can be used to directly image printed text?
1.
OCR
2.
OMR
3.
MICR
4.
All of these
282. The popular
series of personal computers was the Apple series designed in 1976 using
__________ microprocessor.
1.
8-bit
2.
16-bit
3.
64-bit
4.
None of these
283. Who designed the first electronic
computer-ENIAC?
1.
Van-Neumann
2.
Joseph M.Jacquard
3.
J.Presper Eckert and John W. Mauchly
4.
All of these
284. In the latest generation computers,
the instructions are executed?
1.
Parallel
2.
Sequentially
3.
Both A and B
4.
Randomly
285. Web pages are linked together using?
1.
HTTP
2.
Hyberlinks
3.
Interlinks
4.
None of these
286. A CPU with a
32-bit Address Bus can address memory of?
1.
4 KB
2.
4 GB
3.
8 KB
4.
8 GB
287. In BASIC, LEFT(A$,n) is used to?
1.
Leave n spaces before the strung A$
2.
Leave n spaces before every character of the strung A$
3.
Leave n left characters of the strung A$
4.
Select n characters of the strung A$
288. In BASIC, RETURN
statement passes control back to?
1.
GOSUB statement
2.
Next to GOSUB statement
3.
Beginning of the program
4.
The statement before GOSUB
289. The number of elements assigned
automatically to two-dimensional arrays in BASIC is?
1.
10
2.
100
3.
110
4.
121
290. Which of the following statements can
be used for multiple branching?
1.
GOTO
2.
IF THEN ELSE
3.
ON GOTO
4.
WHILE…WEND
291. Which of the following statements can
be used for unlimited looping?
1.
GOTO
2.
FOR…NEXT
3.
IF THEN
4.
ON GOTO
292. Which of the
following command is used to exit from BASIC and to return to DOS?
1.
CLEAR
2.
KILL
3.
SYSTEM
4.
NEW
293. The number of Shutdown options on
Windows 2000 professionals is?
1.
2
2.
3
3.
4
4.
5
294. The number of items present on the
control panel depends upon?
1.
Items install during Setup
2.
Items contained on Windows CD
3.
Items required by your system
4.
Hardware Items attached with the system
295. The number of actions with two
buttons mouse is?
1.
6
2.
5
3.
4
4.
3
296. Which of the following is a DOS
Internal Command?
1.
DELTREE
2.
ERASE
3.
FORMAT
4.
None of these
297. Which of the
following is not an executable command?
1.
CLS
2.
REN
3.
REM
4.
COPY
298. An OR operation has 4 variables, the
possible number of combinations in its truth table is?
1.
64
2.
16
3.
34
4.
32
299. According to Absorption Law A+(A.B)
is equal to?
1.
1+B
2.
AB
3.
A+1
4.
A
300. The number of tracks in one cylinder
of a hard dick with two platters is?
1.
4
2.
8
3.
16
4.
32
301. A translator is
a?
1.
System Software
2.
Low-Level language
3.
Translating machine
4.
Application Software
302. CRAY-1, CRAY-2, and CYBER 205 are
examples of?
1.
Mainframes
2.
Supercomputers
3.
Microcomputers
4.
Minicomputers
303. IBM PC, AT&T,
PS/2, and Apple Macintosh are examples of?
1.
Supercomputers
2.
Minicomputers
3.
Microcomputers
4.
Mainframes
304. In 1786, J.H.
Muller proposed a calculating machine called a?
1.
Analytical Engine
2.
Difference Engine
3.
Electronic Engine
4.
None of these
305. Which of the following is called the
first generation computer?
1.
ENIAC
2.
ABACUS
3.
UNIVAC-1
4.
EDVAC
306. Which of the following software
products is the most appropriate for developing web pages?
1.
Adobe Page Maker
2.
Arcsoft
3.
Corel Draw
4.
Dreamweaver
307. Which of the following codes used in
present-day computing was developed by IBM Corporation?
1.
ASCII
2.
Hollerith code
3.
Baudot code
4.
EBCDIC code
308. The ALU of a computer responds to the
commands coming from?
1.
Primary Memory
2.
Control Section
3.
External Memory
4.
Cache Memory
309. In Microsoft
Windows, key F1 is mostly used for?
1.
Help
2.
Exit
3.
Save
4.
Refresh
310. The operating
system may perform __________ operation to manage the memory while running a
large program.
1.
Sorting
2.
Scheduling
3.
Paging
4.
None of these
311. Octal 6 is equal to __________
decimal.
1.
14
2.
16
3.
15
4.
13
312. In the decimal system, the base is?
1.
1
2.
0
3.
2
4.
10
313. Which logic gate is similar to the
function of two series switches?
1.
NOR
2.
OR
3.
AND
4.
NAND
314. Does remote
computing service involve the use of time-sharing and?
1.
Multiprocessing
2.
Interactive processing
3.
Batch processing
4.
Real-time processing
315. A combination of
16-bits is called?
1.
Word
2.
Nibble
3.
Memory Block
4.
Byte
316. In the OSI
network model, the dialogue control and token management are the responsibility
of?
1.
Data link layer
2.
Session layer
3.
Transport layer
4.
None of these
317. In the OSI
network model, the routing is performed by?
1.
Network layer
2.
Data link layer
3.
Transport layer
4.
Session layer
318. The transmission
signal coding method of the TI carrier is called?
1.
Binary
2.
NRZ
3.
Bipolar
4.
Manchester
319. CTRL, SHIFT, and
ALT are called _____ keys.
1.
Adjustment
2.
Alphanumeric
3.
Modifier
4.
Function
320. Which software
can convert document images into text that can be edited in a word processor?
1.
Document imaging
2.
Optical character recognition
3.
Discrete word systems
4.
Continuous word systems
321. The Caps Lock key
is a:
1.
Window key
2.
Modifier key
3.
Cursor control key
4.
Toggle key
322. Which of the
following computer program is a mathematical model of a real system?
1.
Transmitter
2.
Spreadsheet
3.
Simulation
4.
Modulation
323. How many
bytes are occupied by the data type “long double” in a 32-bit system?
1.
4
2.
6
3.
8
4.
10
324. Which
component of a computer holds data or instructions temporarily when they are
being processed?
1.
Accumulator
2.
Control unit
3.
Register
4.
Bus
325. The process
of copying data from a memory location is known as:
1.
Booting
2.
Hacking
3.
Writing
4.
Reading
326. You can
protect your device from hackers by using:
1.
Malware
2.
Antivirus
3.
Firefox
4.
File manager
327. How many
bits a bus with 32 data lines can transport at a time?
1.
8 bits
2.
16 bits
3.
32 bits
4.
64 bits
No comments:
Post a Comment