Friday, November 21, 2014

GK Computer test_07


COMPUTER TEST____________07
1. In cyber crimes ,
(A) The computer is a tool       (B) The computer is a target      (C) Both (A) and (B)      (D) None
2. Which of the following is not an operating system?
(A) Linux       (B) Mozilla         (C) Macintosh        (D) Windows
3. Statistical calculations and preparation of tables and graphs can be done using
(A) Adobe Photoshop      (B) Excel         (C) Notepad       (D) Power Point
4. Nod 32, Norton and Panda are
(A) Search engines    (B) Operating Systems     (C) Antivirus software     (D) Internet browsers
5. Identify a web browser from the following
(A) Yahoo      (B) Internet Explorer        (C) Bing       (D) DuckDuckGo
6. Which is not a social networking site?
(A) Google Plus         (B) Wink           (C) LinkedIn              (D) Buzz
7. Which of the following is not suitable for preparation of learning materials?
(A) NETLOG            (B) ERIC         (C) PROQUEST        (D) UTUBE
8. Nimbuz, Pidgin and Trillion are software used for
(A) Blogging         (B) Chatting         (C) Surfing            (D) All of the these
9. WWWW, in computer parlance, stands for
(A) World Wide Web Worm   (B) World Wide Wildlife Web      (C) World Wide Women’s Web    (D) World Wide Women’s Week
10. One megabyte (MB) is equal to
(A) 1023 kilobytes         (B) 1000 bytes       (C) 100 kilobytes            (D) 1024 kilobytes
11. Cloud computing means
(A) Computing using the satellite             (B) Computing using cloud chamber technology
(C) Computing which results in errors      (D) Shifting computing power from offline PCs and Laptops onto the Web
12. URL is a term associated with
(A) Computer hardware         (B) Internet          (C) Laser printer                      (D) Fax
13. Computer virus is
(A) A micro organism              (B) A useful computer component
(C) Electro magnetic waves entering the computer from internet        (D) A programme
14. Rohith was asked to prepare a multimedia presentation as part of a seminar. Which of the following software can be made use of?
(A) Notepad              (B) Excel      (C) Power Point       (D) Adobe Reader
15. CLASS is the acronym for
(A) Computer, Language and School Studies             (B) Computer, Literacy and Studies in Schools
(C) Computer, Language and Secondary Schools       (D) Computer, Learning and School Studies
16. SITE stands for
(A) Satellite Instructional Technology and Engineering     (B) State Institute of Teacher Education
(C) Satellite Instructional Television Experiment                 (D) State Institute of Technology and Engineering
17. ICT (Information and Communication Technology) includes:
(A) E-mail                    (B) Internet         (C) Educational TV      (D) All
18. A network that links across metropolitan, regional and national boundaries is called:
(A) MAN        (B) LAN        (C) WAN         (D) VAN
19. Which of the following is the appropriate format of URL of e-mail?
(A) www_mail.com    (B)
www@mail.com      (C) WWW@mail.com     (D) www.mail.com
20. Line access and avoidance of collision are the main functions of
(A) the CPU     (B) the monitor    (C) network protocols    (D) wide area networks
21. In the hypermedia database, information bits are stored in the form of
(A) signals       (B) cubes     (C) nodes         (D) symbols
22. Communications bandwidth that has the highest capacity and is used by microwave, cable and fibre optic lines is known as ——
(A) hyper-link       (B) broadband       (C) bus width       (D) carrier wave
23. An electronic bill board that has a short text or graphical advertising message is referred to as
(A) bulletin        (B) strap      (C) bridge line       (D) banner
24. Which of the following is not the characteristic of a computer?
(A) computer is an electrical machine                        (B) computer cannot think at its own
(C) computer processes information error free         (D) computer can hold data for any length of time
25. Which of the following statement is not correct?
(A) Computer is capable of processing only digital signal
(B) Computer is capable of analysing both quantitative and qualitative data
(C) Appropriate software is required for processing the data
(D) Computer is capable of processing digital as well as analog signals
26. A parallel port is most often used by
(A) Mouse           (B) Monitor        (C) Printer           (D) Keyboard
27. Blue tooth technology allows:
(A) Landline phone to mobile phone communication    (B) Wireless communication between equipments
(C) Signal transmission on mobile phones only              (D) Satellite television communication
28. Which of the following is an example of an optical disk?
(A) Memory disk        (B) Magnetic disk          (C) Hard disk               (D) Digital versatile disk
29. IC chips used in computers are made of
(A) Silicon        (B) Chromium         (C) Lead            (D) Silver
30. ‘OS’ in computer system means ?
(A) Open System        (B) Open Software     (C) Operating System      (D) All of these
31. ‘.MOV’ extension refers to:
(A) Word file        (B) Text file       (C) Image file        (D) Movie file
32. ‘.MPG’ extension refers to:
(A) Word file        (B) Text file      (C) Image file       (D) Movie file
33. ‘.INI’ extension refers to:
(A) Image file      (B) System file      (C) Movie file      (D) Word file
34. Which Command is used to reboot the computer?
(A) Ctrl+Shift+Del        (B) Ctrl+Del+End      (C) Ctrl+Alt+Del          (D) Both (A) and (C)
35. The blinking symbol on the computer screen:
(A) Mouse          (B) Cursor       (C) Character        (D) Blinker
36. Father of the computer
(A) Charles Babbage        (B) Vint Cerf      (C) Bob Khan            (D) David Filo
37. Inventer of Email system?
(A) Alan Turing        (B) Zuckerburg      (C) Vint Cerf           (D) Ray Tomilson
38. Super computer developed by Indian scientists?
(A) Param                (B) CrayI      (C) Blue Gene         (D) IBM Sequoia
39. A process used by large retailers to study trends
(A) data selection      (B) data mining      (C) both (A) and (B)     (D) None of the above
40. Technology no longer protected by copyright, available to everyone
(A) Proprietary            (B) Open         (C) Private             (D) Either (A) or (B)
41. Computers use ——– language to process data
(A) English     (B) powerful      (C) decimal       (D) binary
42. The term ‘bit’ is a short for
(A) binary digit        (B) binary number         (C) digit                   (D) byte
43. What combination of short cut keys will you use to change a text in upper case to lower case in MS Word?
(A) Ctrl+L              (B) Shift+F3        (C) Ctrl+Shift+A          (D) Shift+Alt+F5
44. Which Nobel Laureate is also known as the Father of Artificial Intelligence?
(A) Herbert A. Simon       (B) Howard Aiken      (C) Charles Babbage        (D) Alan Turing
45. What is the storage capacity of a single layered Blue Ray disc?
(A) 80 GB         (B) 50 GB        (C) 10 GB         (D) 25 GB
46. What is the storage capacity of a dual layered Blue Ray disc?
(A) 80 GB        (B) 50 GB        (C) 10 GB        (D) 25 GB
47. Education combined with entertainment is called —————
(A) Simulation           (B) CAI       (C) Edutainment        (D) Synchronization
48. VAN refers to—————
(A) Virtual Analog Network       (B) Value Added Network      (C) Variable Address Network      (D) Virtual Additional Network
49. ATM means?
(A) Any Time Money           (B) Automatic Tele Money      (C) Automatic Teller Machine       (D) Any Time Marketing
50. When a key is pressed on the keyboard, which standard is used for converting the keystroke into corresponding bits?
(A) ANSI           (B) EBCDIC         (C) ASCII             (D) ISO
51. Which technology is used in Compact disks?
(A) Electrical           (B) Mechanical      (C) Electromagnetic        (D) Laser
52. The programs which are as permanent as hardware and stored in ROM is known as:
(A) Software       (B) Firmware     (C) Algorithm      (D) ROMware
53. Which access method is used for obtaining a record from a cassette tape?
(A) Sequential        (B) Direct         (C) Random            (D) None of these
54. ASCII stands for:
(A) American Security Code for Information Interchange       (B) American Standard Code for Information Interchange
(C) American Scientific Code for Interchanging Information   (D) American Standard Code for Interchanging Information
55. AX register is also known as:
(a) Accumulator     (b) Collector    (c) Distributor     (d) Counter    (e) None of these
56. In the Base + Offset addressing, Offset address is also known as:
(a) Physical Address    (b) Logical Address     (c) Actual Address    (d) Instruction Address   (e) None of these
57. The technique for allowing a unit to check the status of another independently function unit is known as?
(a) Interrupt   (b) System call   (c) Polling    (d) Trape   (e) None of these
58. The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is known as:
(a) Spooling      (b) Contention     (c) I/O wait    (d) Buffering      (e) None of these
59. The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA    (b) Cycle Stealing      (c) Channel     (d) Transparent DMA     (e) None of these
60. _________ Scheduler deals with the decision as to whether to admit another new job to the system.
(a) High Level    (b) Medium Level      (c) Low Level    (d) Short term    (e) None of these
61. When the process is in the states of Blocked Suspended or Ready Suspended, its relevant data is
stored in:

(a) Main Memory    (b) Hard Disk   (c) Magnetic Tape    (d) Buffer    (e) None of these
62. Priority, P = (Time Waiting + Run Time) / Run Time is used to calculate priority in __________ scheduling algorithm:
(a) Shortest Job First     (b) Priority Scheduling     (c) Longest Wait First     (d) Highest Response Ratio Next     (e) None
63. HDLC Protocol stands for:
(a) High-Level Data Link Control    (b) High Level Development Protocol       (c) Huge Level Data Link Control
(d) High Development Level Control         (e) None of these
64. _________ is the generic name for a set of standards issued by the International CommunicationsStandards Body CCITT, designed to support Message Handling Systems; i.e. Electronic Mail.
(a) TCP/IP    (b) ISDN     (c) X.400    (d) X.25     (e) None of these
65 ________ layer is responsible for the transfer of a packet of data along one link in the network. It organizes data into frames and detects errors in transmission.
(a) Physical Layer    (b) Data Link Layer    (c) Network Layer   (d) Transport Layer   (e) None of these
66. Encryption is the conversion of data in some intelligible format into an unintelligible format called _________ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text     (b) Encrypted Text   (c) Cipher Text    (d) Coded Text     (e) None of these
67.  Binary search requires about ______ comparisons with an initial list of 1,000,000 elements.
(a) 10   (b) 20   (c) 35   (d) 100    (e) None of these
68.  A _________ header list is a header list where the last node contains the null pointer.
(a) Grounded   (b) Circular   (c) One way    (d) Rooted    (e) None of these
69. ________ are small applications that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.
(a) Applets    (b) Java Bean   (c) Sockets    (d) Java Component    (e) None of these
70.  AWT stands for:
(a) Abstract Window Technique   (b) Abstract Window Toolkit   (c) Actual Window Technique   (d) Added Window Toolkit
71.  GIF images can have only upto _______ colors.
(a) 128   (b) 256   (c) 512    (d) 1024   (e) None of these
72.  ________ is stored on a client and contains state information of the website visited.
(a) Cookies   (b) Servelet   (c) History    (d) Resident Page   (e) None of these
73.  In software Engineering KPA denotes.
(a) Key Process Audit    (b) Key Process Area     (c) Key Process Analysis    (d) Key Problem Area    (e) None of these
74.  The ________ Process Model defines a series of events that will trigger transitions from state to state for each of software engineering activities.
(a) Spiral   (b) Operational    (c) RAD   (d) Concurrent Development   (e) None of these
75. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.       B. spam.        C. viruses.        D. identity theft.
76. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS        B. POS       C. inventory         D. data mining
77. Status : Offline 11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience       B. Nanotechnology       C. Simulation      D. Artificial intelligence (AI)
78. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process       B. Software          C. Storage         D. Information
79. The name for the way that computers manipulate data into information is called:
A. programming.        B. processing.      C. storing.      D. organizing.
80. Computers gather data, which means that they allow users to ____________ data.
A. present     B. input      C. output      D. store
81. Computers use the ____________ language to process data.
A. processing      B. kilobyte      C. binary     D. representational
82. Computers process data into information by working exclusively with:
A. multimedia.      B. words.        C. characters.      D. numbers.
83. A string of eight 0s and 1s is called a:
A. megabyte.        B. byte.       C. kilobyte.        D. gigabyte.
84. Program threats are
(a) Trap doors       (b) Trojan horse       (c) Both (a) & (b)         (d) None
85. Failure of passwords security due to exposure can result from
(a) Electronic monitoring     (b) Visual        (c) Both (a) & (b)          (d) None
86. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar    (b) Windows    (c) Desktop     (d) Icons
87. Who is credited with the creation of WWW
(a)  Tim Berners-Lee      (b) Herbert A. Simon       (c) Howard Aiken      (d) Charles Babbage       

88. A monitor's ...... is the distance between the holes in the mask behind the screen. This helps determine how sharp the dots appear.
(a) refresh rate           (b) dot pitch         (c) resolution        (d) colour depth        (e) None of the above
89. A prefix for billion which is equal to .... is called as billi.
(a) 100     (b) 10000      (c) 1000     (d) 10     (e) None of the above
90. Each model of a computer has a unique
(a) Assembly language       (b) Machine language       (c) High level language       (d) All of the above
91. The size of commonly used Floppy disk is
(a) 4.5”      (b) 3.5”        (c) 3.25”        (d) 5.5”
92. Operating system of a computer
(a) Enables the programmer to draw a flow chart        (b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface                    (d) None of the above
93. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer          (b) Quantum Computer         (c) Param-10,000             (d) IBM chips
94. Which of the following is not as language for computer programming?
(a) WINDOWS       (b) PASCAL         (c) BASIC        (d) COBOL        (e) All of these
95. Off-line operation is the operation of devices without the control of
(a) Memory       (b) CPU         (c) ALU        (d) Control unit        (e) None of the above
96. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer         (b) Dot-matrix printer        (c) Laser printer        (d) Band printer        (e) None
97. ROM is composed of
(a) Magnetic cores        (b) Micro-processors        (c) Photoelectric cells       (d) Floppy disks
98. Magnetic disk a medium known as
(a) Serial access    (b) Direct access    (c) Sequential access     (d) Sequential and rotational access
99. A term associated with the comparison of processing speed is
(a) FFTS       (b) MPG         (c) MIPS        (d) CPS
100. The maximum size of a memory addressed by 12 bits is
(a) 1 K bytes        (b) 16 K bytes       (c) 32 K bytes      (d) 4 K bytes



 
TEST___7

1.   C
2.   B
3.  B
4.   C
5.   B
6.   B
7.   A
8.   B
9.   A
10. D
11. D
12. B
13. D
14. C
15. B
16. C
17. D
18. C
19. B
20. C
21. A
22. B
23. B
24. A
25. A
26. C
27. B
28. D
29. A
30. C
31. D
32. D
33. B
34. C
35. B
36. A
37. D
38. A
39. B
40. B
41. D
42. A
43. B
44. A
45. D
46. B
47. C
48. B
49. C
50. A
51. D
52. B
53. A
54. B
55. A
56. D
57. B
58. D
59. D
60. A
61. A
62. B
63. A
64. A
65. B
66. C
67. D
68. D
69. A
70. B
71. B
72. B
73. B
74. A
75. B
76. A
77. D
78. D
79. B
80. B
81. C
82. D
83. B
84. B
85. C
86. D
87. A
88. B
89. D
90. B
91. B
92. C
93. B
94. A
95. B
96. D
97. B
98. B
99. C
100. D




4 comments:

  1. Excellent questions for the presentation of computer science lecturer.... Thanks

    ReplyDelete
  2. Education is the most important and powerful tool in this world. It's not about studying and only getting good marks. NCSE-Level-1 practice exam provides authentic IT Certification exams preparation material guaranteed to make you pass in the first attempt.

    ReplyDelete
  3. Answer of question no 72 should be a) Cookie

    ReplyDelete