1) Computers that control processes, accept data in a continuous.....
(A) data traffic pattern
(B) data highway
(C) infinite loop
(D) feedback loop
2) A language reflects the way people think mathematically is.....
(A) cross platform programming
(B) functional
(C) event driven programming
(D) 3GL business programming
3) A mistake in an algorithm that causes incorrect results is called a....
(A) logical error
(B) syntax error
(C) procedural error
(D) compiler error
4) A device for changing the connection on a connector to a different configuration
is....
(A) a converter
(B) a component
(C) an attachment
(D) an adapter
5) Technique that is used to send more than one call over a single line is
(A) Digital transmission
(B) Infrared transmission
(C) Streaming
(D) Multiplexing
6) Which of the following would you find on LinkedIn?
(A) Games
(B) Connections
(C) Chat
(D) Applications
7) The method of Internet access that requires a phone line, but offers faster access
speeds than dial-up is the.....Connection
(A) Cable access
(B) Satellite access
(C) Fiber optic service
(D) Digital Subscriber Line (DSL)
8) ......is a form of denial of service attack in which a hostile client repeatedly sends
SYN packets to every port on the server using fake IP addresses.
(A) Cyber crime
(B) Memory shaving
(C) Synflooding
(D) Software Piracy
9) A program either talk or music that is made available in digital format for
automatic download over the internet is called a.....
(A) wiki
(B) broadcast
(C) vodcast
(D) podcast
10) A USB communication device that supports data encryption for secure wireless
communication for notebook users is called a...
(A) USB Wireless Network adapter
(B) wireless switch
(C) wireless hub
(D) router
11) The term "user interface" refers to .....
(A) What the user sees on the screen and how they can interact with it
(B) How the operating system responds to user commands
(C) the means by which the user interacts with the peripheral devices on the computer.
(D) None of these.
12) The connection between your computer at home and your local ISP is called.....
(A) the last mile
(B) the home stretch
(C) the home page
(D) the vital mile
13) ....are attempts by individuals to obtain confidential information from you by
falsifying their identity through e-mails.
(A) Phishing trips
(B) Viruses
(C) Phishing scams
(D) Spyware scams
14) ERP is an acronym for....
(A)Enterprise Relationship planning
(B)Enterprise Resource planning
(C)Enterprise Reorder planning
(D)None.
15) Collecting personal information and effectively posing as another individual is
known as the crime of .....
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
16) The signal that a computer is waiting for a command from the user is....
(A) prompt
(B) event
(C) time slice
(D) interrupt
17) Physical security is concerned with protecting computer hardware from human
tampering & natural disasters and..... security is concerned with protecting
software from unauthorized tampering or damage.
(A) data
(B) cyber
(C) internet
(D) metaphysical
18) Which ports connect special types of music instruments to sound cards?
(A) BUS
(B) CPU
(C) USB
(D) Musical Instrument Digital Interface (MIDI)
19) Where you are likely to find an embedded operating system?
(A) On a desktop operating system
(B) On a networked PC
(C) On a PDA
(D) On a Mainframe.
20) Which of the following places the common data elements in order from smallest
to largest?
(A) Bit, byte, character, record, field, file, database
(B) Database, file, record, field, character
(C) Character, file, record, field, database
(D) Character, field, record, file, database
21) Which protocol provides e-mail facility among different hosts?
(A) File Transfer Protocol (FTP)
(B) TELNET
(C) Simple Mail Transfer Protocol (SMTP)
(D) Simple Network Management Protocol (SNMP)
22) Which of the following memory is non-volatile?
(A) DRAM
(B) SRAM
(C) ROM
(D) None of the above
23) What is embedded system?
(A) The programme which arrives by being wrapped in box.
(B) The programme which is the permanent part of the computer
(C) The computer which is the part of a big computer.
(D) Some combination of computer hardware and software.
24) Which device connects a LAN to the Internet ?
(A) Adapter
(B) Repeater
(C) Router
(D) None of the above
25) EBCDIC stands for
(A) Extended Binary Coded Decimal Interchange Code
(B) Extended Bit Code Decimal Interchange Code
(C) Extended Bit Case Decimal Interchange Code
(D) Extended Binary Case Decimal Interchange Code
26) The first general purpose electronic digital computer in the world was?
(A) UNIVAC (Universal Automatic Computer)
(B) EDVAC (Electronic Discrete Variable Automatic Computer)
(C) ENIAC (Electronic Numerical Integrator & Computer)
(D) EDSAC (Electronic Delay Storage Automatic Computer)
27) Signals can be analog or digital and a computer that processes the both type of
signals is known as?
(A) Analog computer
(B) Digital Computer
(C) Hybrid Computer
(D) Mainframe Computer
28) Human beings are referred to as Homo sapiens, which device is called Silico
Sapiens?
(A) Monitor
(B) Hardware
(C) Robot
(D) Computer
29) EBCDIC can code up to how many different characters?
(A) 256
(B) 16
(C) 32
(D) 64
30) Different components of the motherboard of a PC unit are linked together by
sets of parallel electrical conducting lines. What are these lines called?
(A) Conductors
(B) Buses
(C) Connectors
(D) Consecutive
31) Which is the first automatic electronic digital computer?
(A) ENIAC
(B) MARK I
(C) Z3
(D) ABC (Atanasoff –Berry Computer)
32) India’s first supercomputer is
(A) Cyber 205
(B) Aaditya
(C) Anupam
(D) PARAM 8000
33) The metal disks, which are permanently housed in, sealed and contamination
free containers are called?
(A) Hard disks
(B) Floppy disk
(C) Winchester disk
(D) Flexible disk
34) What was the name of the first commercially available microprocessor chip?
(A) Intel 308
(B) Intel 33
(C) Intel 4004
(D) Motorola 639
35) The first digital computer built with IC chips was known as
(A) IBM 7090
(B) Apple - 1
(C) IBM System / 360
(D) VAX - 10
36) RATS stands for
(A) Regression Analysis Time Series
(B) Regression Analysis Time Sharing
(C) Real Analysis Series
(D) All of above
37) The magnetic storage chip used to provide non-volatile direct access storage of
data and that have no moving parts are known as
(A)Magnetic core memory
(B)Magnetic tape memory
(C)Magnetic disk memory
(D)Magnetic bubble memory
38) A computer program that converts an entire program into machine language is
called a/an
(A) Interpreter
(B) Simulator
(C) Compiler
(D) Commander
39) A language translator that analyses and executes the source code in-line-by-
line manner without looking at the entire program is called a/an
(A) Interpreter
(B) Simulator
(C) Compiler
(D) Commander
40) Who designed the first electronics computer (ENIAC)?
(A) Von Neumann
(B) John Eckert & John Mauchly
(C) Joseph M Jacquard
(D) None of the above
41) A device driver acts like a……. between the device & OS
(A) inverter
(B) converter
(C) translator
(D) None
42) Computers can be divided into…..major categories.
(A) Four ( Micro, Mini, Mainframe, Super)
(B) Three
(C) One
(D) None
43) SAN stands for
(A) Storage Area Network
(B) Super Array Network
(C) Shared Area Network
(D) None
44) NAS stands for
(A) Network Area Service
(B) Network Attached Storage
(C) Network Attached Service
(D) None
45) To produce high quality graphics (hardcopy) in color, ……… is used
(A) RGB monitor
(B) Plotter
(C) Ink-jet printer
(D) Laser printer
46) Hardware or software designed to guard against unauthorized access to a
computer network is known as…..
(A) Hacker-proof program
(B) Firewall
(C) Hacker-resistant server
(D) None
47) The scrambling of code is known as
(A) Encryption
(B) a firewall
(C) Scrambling
(D) None
48) A type of message that web servers pass to your web browser when you visit
the website
(A) Cache
(B) Spam
(C) None
(D) Cookie
49) Software that you can use free of charge for a set period. After that you have to
buy it to keep working is known as
(A) Freeware
(B) Shareware
(C) Software
(D) None
50) A type of virus (malicious code) that looks for security loopholes in a system
and uses that to replicate itself is known as
(A) Worm
(B) Threat
(C) Trojan Horse
(D) None
51) RAID stands for________
(A) Reproduce Array of Intelligent Disks
(B) Reproduce Array of Inexpensive Disks
(C) Redundant Array of Inexpensive Drives
(D) Redundant Array of Inexpensive Disks
52) Software that monitors your online computer activities is known as
(A) Malware
(B) Spyware
(C) Freeware
(D) None
53) Software that is made available at no cost and is sometimes used to entice a
user to purchase the unbranded version with no advertising.
(A) Malware
(B) Spyware
(C) Freeware
(D) None
54) Which is used to display one or more web pages within another normal web
page?
(A) IFRAME
(B) Hyperlink
(C) Home page
(D) None
55) What is the main difference between a mainframe and a super computer?
(A) Supercomputer is much larger than mainframe computers
(B) Supercomputers are much smaller than mainframe computers
(C) Supercomputers are focused to execute few programs as fast as possible while
mainframe uses its power to execute as many programs concurrently.
(D) None
56) storage area used to store data to a compensate for the difference in speed at
which the different units can handle data is
(A) Memory
(B) Buffer
(C) Accumulator
(D) None
57) Computer is free from tiresome and boardroom. We call it
(A) Accuracy
(B) Diligence
(C) Versatility
(D) None
58) Integrated Circuits (ICs) are related to which generation of computers?
(A) First generation
(B) Second generation
(C) Third generation
(D) None
59) Which type of computers uses the 8-bit code called EBCDIC?
(A) Minicomputers
(B) Microcomputers
(C) Mainframe computers
(D) None
60) The ALU of a computer responds to the commands coming from
(A) Primary memory
(B) Control section
(C) External memory
(D) Cache memory
61) A physical connection between the microprocessor memory and other parts of
the microcomputer is known as
(A) Path
(B) Address bus
(C) Route
(D) All of the above
62) A technique used by codes to convert an analog signal into a digital bit stream
is known as
(A) Pulse code modulation
(B) Pulse stretcher
(C) Query processing
(D) Queue management
63) Before a disk drive can access any sector record, a computer program has to
provide the record’s disk address. What information does this address specify?
(A) Track number
(B) Sector number
(C) Surface number
(D) All of above
64) What is the responsibility of the logical unit in the CPU of a computer?
(A) To produce result
(B) To compare numbers
(C) To control flow of information
(D) To do math’s works
65) The terminal device that functions as a cash register, computer terminal, and
OCR reader is the?
(A) Data collection terminal
(B) OCR register terminal
(C) Video Display terminal
(D) POS terminal
66) A set of flip flops integrated together is called ____
(A) Counter
(B) Adder
(C) Register
(D) None of the above
67) A register organized to allow moving left or right operations is called a ____
(A) Counter
(B) Loader
(C) Adder
68) How many address lines are needed to address each machine location in a 2048
x 4 memory chip?
(A) 10
(B) 11
(C) 8
(D) 12
69) Multi user systems provided cost savings for small business because they use a
single processing unit to link several
(A) Personal computers
(B) Workstations
(C) Dumb terminals
(D) Mainframes
70) The difference between memory and storage is that memory is _____ and
storage is __
(A) Temporary, permanent
(B) Permanent, temporary
(C) Slow, fast
(D) All of the above
71) Which of the following is the first computer to use Stored Program Concept?
(A) UNIVAC
(B) ENIAC
(C) EDSAC
(D) None of above
72) 1 nibble equals to
(A) 1 bits
(B) 2 bits
(C) 4 bits
(D) 8 bits
73) The most commonly used standard data code to represent alphabetical,
numerical and punctuation characters used in electronic data processing system is
called
(A) ASCII
(B) EBCDIC
(C) BCD
(D) All of the above
74) The term GIGO (Garbage In Garbage Out) is related to which characteristics of
computers?
(A) Speed
(B) Automatic
(C) Accuracy
(D) Reliability
75) Hard disk is coated on both sides with
(A) Magnetic metallic oxide
(B) Optical metallic oxide
(C) Carbon layer
(D) All of the above
76) The contents of information are stored in
(A) Memory data register
(B) Memory address register
(C) Memory arithmetic registers
(D) Memory access register
77) The programs which are as permanent as hardware and stored in ROM is known
as
(A) Hardware
(B) Software
(C) Firmware
(D) ROM ware
78) Which of the following memories must be refreshed many times per second?
(A) Static RAM
(B) Dynamic RAM
(C) EPROM
(D) ROM
79) In which mode, the communication channel is used in both directions at the
same time?
(A) Full-duplex
(B) Simplex
(C) Half-duplex
(D) None of the above
80) Which of the printers used in conjunction with computers uses dry ink powder?
(A) Daisy wheel printer
(B) Line printer
(C) Laser printer
(D) Thermal printer
81) Daisy wheel printer is a type of
(A) Matrix printer
(B) Impact printer
(C) Laser printer
(D) Manual printer
82) Which of these is considered intelligent CASE tool?
(A) Workbench
(B) Toolkit
(C) Upper CASE
(D) Lower CASE
83) Origin of internet can be tracked from
(A) Satellite networks
(B) Radio networks
(C) ARPANET (Advanced Research Projects Agency Network)
(D) None
84)…… is used by public & private enterprises to publish and share financial
information with each other and industry analysts across all computer platforms &
the Internet.
(A)Extensible Markup Language (XML)
(B) Extensible Business Reporting Language (XBRL)
(C) Enterprise Application Integration (EAI)
(D) None
85) System proposal is prepared in …… phase of SDLC.
(A) Conception
(B) Initiation
(C) Analysis
(D) Design
86) A data warehouse
(A) Contains numerous naming conventions and formats
(B) Is organized around important subject areas
(C)Contains only current data
(D)None
87) “>” symbol in DOS commands is used to
(A) Compare two values
(B) Redirect Input
(C) Redirect Output
(D) None
88) To connect networks of similar protocols, …….. are used
(A) Routers
(B) Gateways
(C) Bridges
(D) None
89)……….. is one reason for problems of data integrity
(A) Data availability constraints
(B) Data inconsistency
(C) Data redundancy
(D) None
90) Which of the following is an advantage of mounting an application on the web?
(A) the possibility of 24-hour access for users
(B) creating a system that can extend globally
(C) standardizing the design of the interface
(D) All of these
91) Which of the following domains is used for profit businesses?
(A) .com
(B) .edu
(C) .net
(D) None
92) Which of the following domains is used for non-profit organizations?
(A) .org
(B) .edu
(C) .net
(D) None
93) Browsers can be classified into two types. They are
(A) Graphical & Text
(B) Graphical & Navigational
(C) Text & Pictorial
(D) None
94) The displayed data over internet can be classified into two types. They are
(A) Static & Dynamic
(B) Graphical & Text
(C) Data & Voice
(D) None
95) Which is an open source development environment to develop dynamic web
pages?
(A) PHP (Hypertext Preprocessor)
(B) XML
(C) VB Script
(D) None
96) A protocol that allows a user to log on to a remote computer which is also
known as remote login is…..
(A) FTP
(B) Telnet
(C) HTTP
(D) None
97) A set of rules that enables a user to log on to another computer and transfer
information between it & his/ her computer.
(A) HTTP
(B) FTP
(C) WWW
(D) None
98) PSTN stands for
(A) Public Switched Transformation Network
(B) Public Switched Telephone Network
(C) Public Serviced Telnet Network
(D) None
99) Home Page is also known as
(A) Index Page
(B) Front Page
(C) Back Page
(D) None
100) GPRS stands for
(A) Global Packet Radio Service
(B) Global Positioning Radio Service
(C) General Packet Radio Service
(D) None
Answers:
1 D
2 B
3 A
4 D
5 D
6 B
7 D
8 C
9 D
10 A
11 A
12 A
13 A
14 B
15 D
16 A
17 A
18 D
19 C
20 D
21 C
22 C
23 D
24 C
25 A
26 C
27 C
28 D
29 A
30 B
31 D
32 D
33 C
34 C
35 C
36 A
37 D
38 C
39 A
40 B
41 C
42 A
43 A
44 B
45 B
46 B
47 A
48 D
49 B
50 A
51 D
52 B
53 C
54 A
55 C
56 B
57 B
58 C
59 C
60 B
61 B
62 A
63 D
64 B
65 D
66 C
67 D
68 B
69 C
70 A
71 C
72 C
73 A
74 C
75 A
76 A
77 C
78 B
79 A
80 C
81 B
82 A
83 C
84 B
85 B
86 B
87 C
88 C
89 A
90 D
91 A
92 A
93 A
94 A
95 A
96 B
97 B
98 B
99 A
100 C