Saturday, 12 December 2020

General Computer Test - 125

 

1: The Objective of testing is-

1. Debugging

2. To uncover errors

3. To gain modularity

4. To analyze system

Answer: 2.

2: In token Ring , when a frame reaches its destination station, which of the following occurs?

1. the message is copied

2. four bits in the packet are not changed

3. the message is take off the ring and replaced by the token

4. the message is removed from the buffer

Answer: 1.

3: MSword what is the short cut of paste

1. CTRL+V

2. CTRL+A

3. CTRL+C

4. CTRL+F

Answer: 1.

4: In digital computer, all the expressions are coded into ...........

1. Octal digits

2. Binary digits

3. Hexadecimal digits

4. Decimal digits

Answer: 2.

5: The purpose of the _______ layer is to transport a raw bit stream from one machine to another

1. Physical Layer

2. Data Link Layer

3. Network layer

4. Application Layer

Answer: 1.

6: Register is a

1. Set of capacitors used to register input instructions in a digital computer

2. Set of paper tapes and cards put in a file

3. Temporary storage unit within the CPU having dedicated or general purpose use

4. part of the auxiliary memory

Answer: 3.

7: Identify the directives of JSP.

1. page, include, and taglib

2. include, autoFlush, and taglib

3. page, import, taglib, and buffer

4. contentType, include, and taglib

Answer:1.

8: A(n) ____________ system is a small, wireless handheld computer that scans an itemâ€TMs tag and pulls up the current price (and any special offers) as you shop

1. PSS

2. POS

3. inventory

4. data mining

Answer: 1.

9: Which one of the following is the valid SAX enabled parser?

1. XML4J

2. XML Parser

3. DTD Parser

4. Tool Parser

Answer: 1.

10: In the following the fastest computer constituent is

1. CPU

2. Magnetic Tape

3. Video Terminal

4. Sensors and Mechanical controllers

Answer: 1.

11: DSDD is

1. Double Sided Double Density

2. Dual Sided Double Density

3. Double Sided Dual Density

4. Dual Sided Dual Density

Answer: 1.

12: Which among the following is a software based virtual computer

1. Digital immune module

2. CPU emulator

3. Virus signature scanner

4. Emulation control module

Answer: 2.

13: The operation of subnet is controlled by _ _ _ _ _ _ _ _

1. Network Layer.

2. Data Link Layer

3. Data Layer

4. Transport Layer

Answer: 1.

14: Which one of the following files forms a link to the physical devices and peripherals on a system?

1. Regular files

2. Directory files

3. Device special files

4. Link files

Answer: 3.

15: Name the latest version of Windows

1. Windows 3.1

2. Windows NT

3. Windows 98

4. Windows Vista

Answer: 4.

16: A trie structure is a complete _ _ _ _ _ _ _ _ _ _ _ _ _ tree [19S04]

1. binary

2. search

3. B-tree

4. m- ary

Answer: 4.

17: Name the device that provides attachment points for RAM, Video Cards, Graphics card, Modem etc.

1. processor

2. father board

3. motherboard

4. modem

Answer: 3.

18: Which term identifies a specific computer on the web and main page of the entire site

1. None

2. URL

3. Website address

4. Hyperlink

5. Domain name

Answer: 2.

19: In C, An array that uses more than two subscripts is known as

1. One dimentional Array

2. Two Dimentional Array

3. Three Dimentional Array

4. Multi Dimentional Array

Answer: 4.

20: Predict the output or error(s) for the following: void main(){int const * p=5; print("%d",++(*p));}

1. Compiler error: Cannot modify a constant value.

2. 5

3. 6

4. 7

Answer: 1.

21: Which command is used to undelete delete a bunch of files with extension doc that you have just deleted

1. Undelete

2. Undelete *.doc

3. Undelete/all

4. All of the above

Answer: 2.

22: In the SAR sub layer of _ _ _ _ _ _ _ _ _ , the payload is 48 bytes and there is no added header or trailer

1. AAL1

2. AAL2

3. AAL3/4

4. AAL5

Answer: 4.

23: Special I/O instruction r required for

1. a. Memory mapped I/O

2. b. I/O mapped I/O

3. c. both of these

4. d. none of these

Answer: 1.

24: Which of the following is not a type of UNIX shell?

1. KORN SHELL

2. BOURNE SHELL

3. C SHELL

4. JOIN SHELL

Answer: 4.

25: The key idea behind ISDN is that of the _ _ _ _ _ _ _ _ _, a conceptual pipe between the customer and the carrier through which bits flow

1. digital byte pipe

2. analog bit pipe

3. digital pipe

4. digital bit pipe

Answer: 4.

No comments:

Post a Comment