Saturday, 12 December 2020

General Computer Test - 127

 

1: Which computer language is preferred for data processing ?

1. APL

2. Pascal

3. BASIC

4. none of the above

Answer: 1.

2: What is the extension of Australia

1. .au

2. .in

3. .uk

4. .us

Answer: 1.

3: What is the abbreviation of SATA

1. Serial Advanced Technology Attachment

2. Sedentary Advanced Technology Attachment

3. Secondary Advanced Technology Attachment

4. Secondary Aerial Technology Attachment

Answer: 1.

4: What does XHTML stand for?

1. EXtra Hyperlinks and Text Markup Language

2. EXtreme HyperText Markup Language

3. EXtensible HyperText Marking Language

4. EXtensible HyperText Markup Language

Answer: 4.

5: Which of the following cannot be the status of a task?

1. Finished

2. In Progress

3. Waiting on someone else

4. Deferred

Answer: 1.

6: An n element AVL tree with height h can be searched in

1. o(log h)

2. O(h)

3. O(h log h)

4. O(n)

Answer: 2.

7: A monitor with high dot pitch will have:

1. a relatively large number of pixels.

2. a high number of possible colors in its display.

3. wide gaps between pixels.

4. relatively fast recharging of the pixels illumination.

Answer: 3.

8: List the results that will be displayed for each of the following lines: msgbox Int(-5.5) msgbox Fix(-5.5) msgbox Cint(-5.5)

1. Line 1: -6 Line 2: -5 Line 3: -6

2. Line 1: -5 Line 2: -5 Line 3: -6

3. Line 1: -5 Line 2: -6 Line 3: -6

4. Line 1: -6 Line 2: -6 Line 3: -5

Answer: 1.

9: The PC and the Apple Macintosh are examples of two different

1. platforms

2. programs

3. input devices

4. storage devices

Answer: 1.

10: In B-tree of order m all external nodes are _ _ _ _ _ _

1. at different levels

2. have 1 child node

3. at same levels

4. have two child nodes

Answer: 3.

11: Jim wants to create an object of the ItemEvent class. Which one of the following options represents the constructor for the ItemEvent class?

1. ItemEvent(ItemSelectable source, int id, Object item)

2. ItemEvent(ItemSelectable source, boolean id, Object item)

3. ItemEvent(ItemSelectable source, int id, Object item, int stateChange)

4. ItemEvent(ItemSelectable source, boolean id, Object item, int stateChange)

Answer: 3.

12: Two cards have been drawn successively from a pack without replacing the first. Find the probability that 2nd card is spade, if the first card is spade?

1. 4/17

2. 5/17

3. 6/17

4. 7/17

Answer: 1.

13: What type of PCMCIA card is used for modems and network cards. What type of PCMCIA card is used for modems and network cards.

1. Type 1

2. Type II

3. Type III

Answer: 2.

14: What connector on a network card is associated with a 10BASE2 cable? What connector on a network card is associated with a 10BASE2 cable?

1. RJ11

2. BNC

3. RJ45

4. DB25

Answer: 2.

15: A java Class can have two methods provided the return types are different!

1. true

2. false

3. depends on operating system

4. depends on coding style

Answer: 1.

16: A file contains characters a,e,i,o,u,s and t with frequencies 10,15,12,3,4,13 and 1 respectively. If we use Huffman coding for data compression then the average code length will be:

1. 140/58

2. 146/58

3. 150/58

4. 174/58

Answer: 3.

17. Multiprogramming was made possible by

(a) input/output units that operate independently of the CPU

(b) Operating systems

(c) Both a and b

(d) Neither a nor b

ANS: c

18. The person contributing the idea of the stored program was

(a) John von Neumann

(b) Charles Babbage

(c) Howard Aiken

(d) Thomas J. Watson, Sr.

ANS: a

19. Transistorized computer circuit were introduced in the

(a) first generation

(b) second generation

(c) third generation

(d) fourth generation

ANS: b

20. The first firm to mass-market a microcomputer as a personal computer was

(a) Data general corporation

(b) Sperry Univac

 (c) radio shack

(d)IBM

ANS: c

21. The "Father of Punched Card Processing" was

(a) J. Presper Eckert

(b) Charles Babbage

(c) Blaise Pascal

(d)Dr. Herman Hollerith

ANS: d

22. The punched card used in IBM System/3 contains

(a) 80 column

(b) 90 column

(c) 96 column

(d) 126 column

ANS: c

23. First integrated circuit chip was developed by

(a) C.V.Raman

(b) W.H.Brittain

(c) J.S.Kilby

(d) Robert Noyc

ANS: c

24. The main distinguishing features of fifth generation digital computers will be

(a) Liberal used microprocessors

(b) Artificial intelligence

(c) Extremely low cost

(d) Versatility

ANS: b

25. IBM 7000 digital computer

(a) Belongs to second generation

(b) Uses VLSI

(c) Employs semi-conductor memory

(d) has modular construction

ANS: d

General Computer Test - 126

 

Question 1: You use the History panel to:

1. insert Flash buttons.

2. insert images.

3. format text.

4. display the actions performed.

Answer: 4.

Question 2: What was the first ARPANET message?

1. "lo"

2. "hello world"

3. "mary had a little lamb"

4. "cyberspace, the final frontier"

Answer: 1.

Question 3: The name for the way that computers manipulate data into information is called:

1. Programming

2. Processing

3. Storing

4. Organizing

Answer: 2.

Question 4: The information related to multi-programmed hosts is placed in the header of _ _ _ _ _ _ _ Layer

1. Application layer

2. Transport Layer

3. Session layer

4. Network Layer.

Answer: 2.

Question 5: Which is not true for primary storage?

1. Information must be transferred to primary storage

2. It is relatively more expensive and it is a part of the CPU

3. It allows very fast access to data

4. All the above

Answer: 4.

Question 6: At which OSI layer does data translation and code formatting occur?

1. Network

2. Physical

3. Data link

4. Transport

5. Presentation

Answer: 5.

Question 7: Purpose of PC (Program Counter) in a Microprocessor is

1. To store address of TOS (Top Of Stack)

2. To store address of next instruction to be executed.

3. Count the number of instructions.

4. To store base address of the stack.

Answer: 2.

Question 8: In Photoshop You want to specify a halftone screen frequency when you print your image. Which command should you choose to access this option?

1. File > Print with Preview

2. File > Print

3. File > Page Setup

4. File > Print One Copy

Answer: 1.

Question 9: What command is used to partition a hard drive?

1. Fdisk

2. Format

3. Chkdsk

Answer: 1.

Question 10: For most of computers,the number of scan lines varies between

1. 100 and 1000

2. 200 and 2000

3. 300 and 3000

4. None of these

Answer: 1.

Question 11: The ..... tells the rest of the computer how to carry out a program's instructions.

1. ALU

2. System Unit

3. Control Unit

4. Motherboard

Answer: 2.

Question 12: You are working on a complex marketing problem and want to use the Solver feature of Excel. What are the three pieces of information that must be provided to the Solver to solve the problem?

1. Your data, variables, and constraints.

2. Your target, variables and data range.

3. Your target, variables and constraints.

4. Your target, subtotals and constraints.

Answer: 3.

Question 13: Default line spacing in Word is

1. Single

2. Double

3. 1.5

4. Multiple

Answer: 1.

Question 14: The computer code for interchange of information between terminals is

1. ASCII

2. BCD

3. BCDIC

4. Hollerith

Answer: 1.

Guide4Xam.blogspot.com

Question 15: Which of the following command is used to count just the number of lines contained in a file ?

1. wc-1

2. wc-w

3. wc-c

4. wc-r

Answer: 1.

Question 16: One of the major components of a PC is the Central Processing Unit (CPU) which can be best described as:

1. The device that sends the bus signals telling it what to do.

2. The area that regulates all of the system power usage

3. The area where all the of the Basic input/output routines are stored

4. The area where all of the processing takes place

Answer: 4.

Question 17 Which key should be pressed to start a new paragraph in MS-Word?

1. Down cursor key

2. Shift+Enter key

3. Enter key

4. Control+Enter key

Answer: 3.

Question 18: Which of the following is the correct syntax for CompactRepair method?

1. expression. CompactRepair

2. expression (SourceFile, DestinationFile, LogFile)

3. CompactRepair(SourceFile, DestinationFile, LogFile)

4. expression. CompactRepair(SourceFile, DestinationFile, LogFile)

Answer: 4.

Question 19: Consider the following statements: Statement A: The write access to a file system is possible while using the growfs command. Statement B: The growfs command increases the size of the UFS file system in a volume without causing data loss. Which of the following is true about the statements?

1. Statement A is true, and Statement B is false.

2. Statement A is false, and Statement B is true.

3. Both Statement A and Statement B are true.

4. Both Statement A and Statement B are false.

Answer: 2.

Question 20: Multiple items can be selected by pressing

1. CTRL key

2. ALT key

3. Shift key

4. CTRL, ALT & DEL key

Answer: 1.

Question 21: Susan needs to use a set of hidden tools frequently. To do this, she would:

1. select the tool from the pop-up toolbar.

2. detach the toolbar.

3. dock the toolbar.

4. group the toolbox.

Answer: 2.

Question 22: To test the IP stack on your local host, which IP address would you ping?

1. 127.0.0.0

2. 1.0.0.127

3. 127.0.0.1

4. 127.0.0.255

5. 255.255.255.25

Answer: 3.

Question 23: CHECK constraint is used to enforce:

1. entity integrity.

2. domain integrity.

3. referential integrity.

4. user-defined integrity.

Answer: 2.

Question 24: The horizontal and vertical lines on a worksheet are called ___

1. cells

2. sheets

3. gridlines

4. blocklines

Answer: 3.

Question 25: Which is not a type of anti-virus?

1. Norton

2. McAfee

3. STD

4. Symantec

Answer: 3.

General Computer Test - 125

 

1: The Objective of testing is-

1. Debugging

2. To uncover errors

3. To gain modularity

4. To analyze system

Answer: 2.

2: In token Ring , when a frame reaches its destination station, which of the following occurs?

1. the message is copied

2. four bits in the packet are not changed

3. the message is take off the ring and replaced by the token

4. the message is removed from the buffer

Answer: 1.

3: MSword what is the short cut of paste

1. CTRL+V

2. CTRL+A

3. CTRL+C

4. CTRL+F

Answer: 1.

4: In digital computer, all the expressions are coded into ...........

1. Octal digits

2. Binary digits

3. Hexadecimal digits

4. Decimal digits

Answer: 2.

5: The purpose of the _______ layer is to transport a raw bit stream from one machine to another

1. Physical Layer

2. Data Link Layer

3. Network layer

4. Application Layer

Answer: 1.

6: Register is a

1. Set of capacitors used to register input instructions in a digital computer

2. Set of paper tapes and cards put in a file

3. Temporary storage unit within the CPU having dedicated or general purpose use

4. part of the auxiliary memory

Answer: 3.

7: Identify the directives of JSP.

1. page, include, and taglib

2. include, autoFlush, and taglib

3. page, import, taglib, and buffer

4. contentType, include, and taglib

Answer:1.

8: A(n) ____________ system is a small, wireless handheld computer that scans an itemâ€TMs tag and pulls up the current price (and any special offers) as you shop

1. PSS

2. POS

3. inventory

4. data mining

Answer: 1.

9: Which one of the following is the valid SAX enabled parser?

1. XML4J

2. XML Parser

3. DTD Parser

4. Tool Parser

Answer: 1.

10: In the following the fastest computer constituent is

1. CPU

2. Magnetic Tape

3. Video Terminal

4. Sensors and Mechanical controllers

Answer: 1.

11: DSDD is

1. Double Sided Double Density

2. Dual Sided Double Density

3. Double Sided Dual Density

4. Dual Sided Dual Density

Answer: 1.

12: Which among the following is a software based virtual computer

1. Digital immune module

2. CPU emulator

3. Virus signature scanner

4. Emulation control module

Answer: 2.

13: The operation of subnet is controlled by _ _ _ _ _ _ _ _

1. Network Layer.

2. Data Link Layer

3. Data Layer

4. Transport Layer

Answer: 1.

14: Which one of the following files forms a link to the physical devices and peripherals on a system?

1. Regular files

2. Directory files

3. Device special files

4. Link files

Answer: 3.

15: Name the latest version of Windows

1. Windows 3.1

2. Windows NT

3. Windows 98

4. Windows Vista

Answer: 4.

16: A trie structure is a complete _ _ _ _ _ _ _ _ _ _ _ _ _ tree [19S04]

1. binary

2. search

3. B-tree

4. m- ary

Answer: 4.

17: Name the device that provides attachment points for RAM, Video Cards, Graphics card, Modem etc.

1. processor

2. father board

3. motherboard

4. modem

Answer: 3.

18: Which term identifies a specific computer on the web and main page of the entire site

1. None

2. URL

3. Website address

4. Hyperlink

5. Domain name

Answer: 2.

19: In C, An array that uses more than two subscripts is known as

1. One dimentional Array

2. Two Dimentional Array

3. Three Dimentional Array

4. Multi Dimentional Array

Answer: 4.

20: Predict the output or error(s) for the following: void main(){int const * p=5; print("%d",++(*p));}

1. Compiler error: Cannot modify a constant value.

2. 5

3. 6

4. 7

Answer: 1.

21: Which command is used to undelete delete a bunch of files with extension doc that you have just deleted

1. Undelete

2. Undelete *.doc

3. Undelete/all

4. All of the above

Answer: 2.

22: In the SAR sub layer of _ _ _ _ _ _ _ _ _ , the payload is 48 bytes and there is no added header or trailer

1. AAL1

2. AAL2

3. AAL3/4

4. AAL5

Answer: 4.

23: Special I/O instruction r required for

1. a. Memory mapped I/O

2. b. I/O mapped I/O

3. c. both of these

4. d. none of these

Answer: 1.

24: Which of the following is not a type of UNIX shell?

1. KORN SHELL

2. BOURNE SHELL

3. C SHELL

4. JOIN SHELL

Answer: 4.

25: The key idea behind ISDN is that of the _ _ _ _ _ _ _ _ _, a conceptual pipe between the customer and the carrier through which bits flow

1. digital byte pipe

2. analog bit pipe

3. digital pipe

4. digital bit pipe

Answer: 4.

General Computer Test - 124

 

1. The tracks on a disk which can be accessed without repositioning the R/W heads is

A. Surface

B. Cylinder

C. Cluster

D. All of the above

E. None of the above

Answer: B

2. Which of the following is the 1's complement of 10?

A. 01

B. 110

C. 11

D. 10

E. None of the above

Answer: A

3. A section of code to which control is transferred when a processor is interrupted is known as

A. M

B. SVC

C. IP

D. MDR

E. None of the above

Answer: A

4. Which part interprets program instructions and initiate control operations.

A. Input

B. Storage unit

C. Logic unit

D. Control unit

E. None of the above

Answer: D

5. The binary system uses powers of

A. 2

B. 10

C. 8

D. 16

E. None of the above

Answer: A

6. A computer program that converts assembly language to machine language is

A. Compiler

B. Interpreter

C. Assembler

D. Comparator

E. None of the above

Answer: C

7. The time required for the fetching and execution of one simple machine instruction is

A. Delay time

B. CPU cycle

C. Real time

D. Seek time

E. None of the above

Answer: B

8. The time for which a piece of equipment operates is called

A. Seek time

B. Effective time

C. Access time

D. Real time

E. None of the above

Answer: B

9. Binary numbers need more places for counting because

A. They are always big numbers

B. Any no. of 0's can be added in front of them

C. Binary base is small

D. 0's and l's have to be properly spaced apart

E. None of the above

Answer: C

10. Which access method is used for obtaining a record from a cassette tape?

A. Direct

B. Sequential

C. Random

D. All of the above

E. None of the above

Answer: B

11. Any type of storage that is used for holding information between steps in its processing is

A. CPU

B. Primary storage

C. Intermediate storage

D. Internal storage

E. None of the above

Answer: C

12. A name applied by Intel corp. to high speed MOS technology is called

A. HDLC

B. LAP

C. HMOS

D. SDLC

E. None of the above

Answer: C

13. A program component that allows structuring of a program in an unusual way is known as

A. Correlation

B. Coroutine

C. Diagonalization

D. Quene

E. None of the above

Answer: B

14. The radian of a number system

A. Is variable

B. Has nothing to do with digit position value

C. Equals the number of its distinct counting digits

D. Is always an even number

E. None of the above

Answer: C

15. The section of the CPU that selects, interprets and sees to the execution of program instructions

A. Memory

B. Register unit

C. Control unit

D. ALU

E. None of the above

Answer: C

16. Which type of system puts the user into direct conversation with the computer through a keyboard?

A. Real time processing

B. Interactive computer

C. Batch processing

D. Time sharing

E. None of the above

Answer: B

17. The term referring to evacuating the content of some part of the machine is known as

A. Dump

B. Enhancement

C. Down

D. Compiler

E. None of the above

Answer: A

18. A single packet on a data link is known as

A. Path

B. Frame

C. Block

D. Group

E. None of the above

Answer: B

19: Which of the following is not part of the data link layer?

1. Transports data across the physical link

2. Performs physical addressing

3. Performs flow control

4. Determines network topology

5. Terminates a session

Answer: 5.

20: A sensor that informs a body computer about temperature, such as an ambient air temperature sensor for A/C is a:

1. potentiometer.

2. hall-effect switch.

3. thermistor.

4. thermodiode.

Answer: 3.

 21: Which of the following is single user computer with many features and good processing power?

1. Minicomputer

2. Workstation

3. Macintosh

4. None of these

Answer: 2.

21: Computer ethics has its own roots in the work of ________during the World War II

1. Nobert Wiener

2. Herman Hollerith

3. Robert Wiener

4. Herman Wiener

Answer: 1.

22: The windows registry consists of which two files?

1. autoexec.bat and config.sys

2. user.dat and win.ini

3. user.dat and system.dat

4. win.reg and user.dat

Answer: 3.

23: Which Open Systems Interconnections (OSI) layer does IP belong to?

1. Session layer

2. Data link layer

3. Transport layer

4. Network layer

Answer: 4.

24: Keyboard is an ............

1. Input device

2. Memory device

3. Output device

4. None of the above

Answer: 1.

25: The destroyList() member function deletes the contents of the linked list and

1. does not delete the linked list itself

2. delete the linked list itself

3. adds the linked list itself

4. None of the above

Answer: 1.

General Computer Test - 123

 

1. Which computer has been designed to be as compact as possible?

A. Mini

B. Super computer

C. Micro computer

D. Mainframe

E. None of the above

Answer: C

2. Which method is used to connect a remote computer?

A. Device

B. Dialup

C. Diagnostic

D. Logic circuit

E. None of the above

Answer: B

3. How many bit code is used by Murray code for TELEPRINTER machines.

A. 4

B. 5

C. 9

D. 25

E. None of the above

Answer: B

4. The symbols used in an assembly language are

A. Codes

B. Mnemonics

C. Assembler

D. All of the above

E. None of the above

Answer: B

5. The 2's compliment of a binary no. is obtained by adding.....to its 1's compliment.

A. 0

B. 1

C. 10

D. 12

E. None of the above

Answer: B

6. A systems programming language for microcomputers in the Intel family is

A. PL/C

B. PL/CT

C. PL/M

D. PLA

E. None of the above

Answer: C

7. A datum that indicates some important state in the content of input or output is

A. Sequence

B. Sentinel

C. SIO

D. Sibling

E. None of the above

Answer: B

8. Which is a non-standard version of a computing language?

A. PROLOG

B. APL

C. Army

D. PL/1

E. None of the above

Answer: C

9. Which of the following is still useful for adding numbers?

A. EDSAC

B. ENIAC

C. Abacus

D. UNIVAC

E. None of the above

Answer: C

10. The average time necessary for the correct sector of a disk to arrive at the read write head is _____

A. Down time

B. Seek time

C. Rotational delay

D. Access time

E. None of the above

Answer: C

11. A number that is used to control the form of another number is known as

A. Map

B. Mask

C. Mamtossa

D. Marker

E. None of the above

Answer: B

12. A general purpose single-user microcomputer designed to be operated by one person at a time is

A. Special-purpose computer

B. KIPS

C. M

D. PC

E. None of the above

Answer: D

13. ASCII stands for

A. American standard code for information interchange

B. All purpose scientific code for information interchange

C. American security code for information interchange

D. American Scientific code for information interchange

E. None of the above

Answer: A

14. Which device of computer operation dispenses with the use of the keyboard?

A. Joystick

B. Light pen

C. Mouse

D. Touch

E. None of the above

Answer: C

15. The microcomputer, Intel MCS-80 is based on the widely used Intel

A. 8080 microprocessor

B. 8085 microprocessor

C. 8086 microprocessor

D. 8082 microprocessor

E. None of the above

Answer: A

16. Which is a machine-oriented high-level language for the GEC 4080 series machines.

A. LOGO

B. SNOBOL

C. Babbage

D. ALGOL

E. None of the above

Answer: C

17. A program that is employed in the development, repair or enhancement of other programs is known as

A. System software

B. Software tool

C. Applications program

D. Utility program

E. None of the above

Answer: B

18. Any storage device added to a computer beyond the immediately usable main storage is known as

A. Floppy disk

B. Hard disk

C. Backing store

D. Punched card

E. None of the above

Answer: C

19. Which output device is used for translating information from a computer into pictorial form on paper.

A. Mouse

B. Plotter

C. Touch panel

D. Card punch

E. None of the above

Answer: B

20. The list of coded instructions is called

A. Computer program

B. Algorithm

C. Flowchart

D. Utility programs

E. None of the above

Answer: A

21. Which of the following languages is more suited to a structured program?

A. PL/1

B. FORTRAN

C. BASIC

D. PASCAL

E. None of the above

Answer: D

22. A computer assisted method for the recording and analyzing of existing or hypothetical systems is

A. Data transmission

B. Data flow

C. Data capture

D. Data processing

E. None of the above

Answer: B

23. The brain of any computer system is

A. ALU

B. Memory

C. CPU

D. Control unit

E. None of the above

Answer: C

24. What difference does the 5th generation computer have from other generation computers?

A. Technological advancement

B. Scientific code

C. Object Oriented Programming

D. All of the above

E. None of the above

Answer: A

25. Which of the following computer language is used for artificial intelligence?

A. FORTRAN

B. PROLOG

C. COBOL

D. None of the above

Answer: B

General Computer Test - 122

 

1. An optical input device that interprets pencil marks on paper media is

A. OMR

B. Punch card reader

C. Optical scanners

D. Magnetic tape

E. None of the above

Answer: A

2. Most important advantage of an IC is its

A. Easy replacement in case of circuit failure

B. Extremely high reliability

C. Reduced cost

D. Low power consumption

E. None of the above

Answer: B

3. Data division is the third division of a _____ program.

A. COBOL

B. BASIC

C. PASCAL

D. FORTH

E. None of the above

Answer: A

4. Which language was devised by Dr. Seymour Cray?

A. APL

B. COBOL

C. LOGO

D. FORTRAN

E. None of the above

Answer: C

5. A program that converts computer data into some code system other than the normal one is known as

A. Encoder

B. Simulation

C. Emulator

D. Coding

E. None of the above

Answer: A

6. A device designed to read information encoded into a small plastic card is

A. Magnetic tape

B. Badge reader

C. Tape puncher

D. Card puncher

E. None of the above

Answer: B

7. A hybrid computer uses a _____ to convert digital signals from a computer into analog signals.

A. Modulator

B. Demodulator

C. Modem

D. Decoder

E. None of the above

Answer: C

8. A group of magnetic tapes, videos or terminals usually under the control of one master is

A. Cylinder

B. Cluster

C. Surface

D. Track

E. None of the above

Answer: B

9. Any device that performs signal conversion is

A. Modulator

B. Modem

C. Keyboard

D. Plotter

E. None of the above

Answer: A

10. Codes consisting of light and dark marks which may be optically read is known as

A. Mnemonics

B. Bar code

C. Decoder

D. All of the above

E. None of the above

Answer: B

11. A type of channel used to connect a central processor and peripherals which uses multipling is known as

A. Modem

B. Network

C. Multiplexer

D. All of the above

E. None of the above

Answer: C

12. The first generation of computers available was based on the bit micro processors.

A. 4

B. 8

C. 16

D. 64

E. None of the above

Answer: B

13. The complete picture of data stored in database is known as

A. Record

B. Schema

C. System flowchart

D. DBMS

E. None of the above

Answer: B

14. Which of the following is intended to be used in all applications runs on mainframe computers.

A. LOGO

B. APL

C. PL/1

D. OCCAM

E. None of the above

Answer: C

15. A language which is close to that used within the computer is

A. High-level language

B. Assembly language

C. Low-level language

D. All of the above

E. None of the above

Answer: C

16. Which is a unit representing the no bits of discrete.

A. Baud

B. Byte

C. Bit

D. All of the above

E. None of the above

Answer: A

17. The device that can both feed data into and accept data from a computer is

A. ALU

B. CPU

C. Input-Output device

D. All of the above

E. None of the above

Answer: C

18. The personnel who deals with the computer & its management put together are called

A. Software

B. Human ware

C. Firmware

Guide4Xam.blogspot.com

D. Hardware

E. None of the above

Answer: B

19. A modern digital computer has

A. Extremely high speed

B. Large memory

C. Almost unlimited array

D. All of the above

E. None of the above

Answer: D

20. Which of the following can store information in the form of microscopic pits on metal disks.

A. Laser disks

B. Tape cassettes

C. RAM cartridge

D. Punched cards

E. None of the above

Answer: A

21. A device for converting handwritten impressions into coded characters & positional coordinates for input to a computer is

A. Touch panel

B. Mouse

C. Wand

D. Writing tablet

E. None of the above

Answer: D

22. A storage system for small amounts of data is

A. Magnetic card

B. Magnetic tape

C. Punched card

D. Optical mark reader

E. None of the above

Answer: A

23. The process of communicating with a file from a terminal is

A. Interactive

B. Interrogation

C. Heuristic

D. All of the above

E. None of the above

Answer: B

24. A common boundary between two systems is called

A. Interdiction

B. Interface

C. Surface

D. None of the above

Answer: B

25. The examination and changing of single bits or small groups of his within a word is called

A. Bit

B. Byte

C. Bit manipulation

D. Bit slice

E. None of the above

Answer: C

General Computer Test - 121

 

1. Which is another name for functional language?

A. Machine

B. Application language

C. Low-level language

D. High-level language

E. None of the above

Answer: B

2. Compilers and interpreters are themselves

A. High-level language

B. Codes

C. Programs

D. Mnemonics

E. None of the above

Answer: C

3. A compiler means

A. A person who compiles source programs

B. The same thing as a programmer

C. Keypunch operator

D. A program which translates source program into object program

E. None of the above

Answer: D

Guide4Xam.blogspot.com

4. A pen shaped device which can sense light, and is used to point at spots on a video screen.

A. Mouse

B. Light pen

C. Joystick

D. Plotter

E. None of the above

Answer: B

5. A notation used to express clearly on algorithm is known as

A. Algorithmic language

B. Assembly language

C. Machine language

D. High level language

E. None of the above

Answer: A

6. Compression of digital data for efficient storage is

A. Buffer

B. CPU

C. Packing

D. Field

E. None of the above

Answer: C

7. An operating system intended for use on microprocessor based systems that support a single user is

A. PC-DOS B. MS-DOS

C. UNIX D. CP/M

E. None of the above

Answer: D

8. Which programming language is based on Algol 60.

A. PILOT

B. SNOBOL

C. ADA

D. SIMULA

E. None of the above

Answer: D

9. Computer memory consists of

A. RAM

B. ROM

C. PROM

D. All of the above

E. None of the above

Answer: D

10. A path by which communication is achieved between a central processor and other devices is called

A. Audit trail

B. Network

C. Bus

D. Channel

E. None of the above

Answer: C

11. A stand-alone system which produces one page of printed output at a time is

A. Page printer

B. Line printer

C. Laser printer

D. Dot matrix printer

E. None of the above

Answer: A

12. A memory that does not change its contents without external causes is known as

A. Dynamic memory

B. Static memory

C. RAM

D. EEPROM

E. None of the above

Answer: B

13. The report card and merit list forms the

A. Output data

B. Data processing

C. Central Processing

D. Input data

E. None of the above

Answer: A

14. A number which is stored and processed but not in the standard exponential form is called

A. Floating point number

B. Fixed point number

C. Octal number

D. Decimal number

E. None of the above

Answer: B

15. A memory that holds micro programs is

A. Core memory

B. ROM

C. RAM

D. Control memory

E. None of the above

Answer: B

16. A device invented by Dr. Bobeck in 1966, for mass storage of data is

A. Punched paper tape

B. Magnetic bubble storage

C. Magnetic tape

D. Magnetic disk

E. None of the above

Answer: B

17. The organization and interconnection of the various components of a computer system is

A. Architecture

B. Networks

C. Graphics

D. Designing

E. None of the above

Answer: A

18. Which of the following is the coding of data so that is can't be easily understood if intercepted.

A. Barcode

B. Decoder

C. Encryption

D. Mnemonics

E. None of the above

Answer: C

 

19. RAM is used as a short memory because it is

A. Volatile

B. Has small capacity

C. Is very expensive

D. Is programmable

E. None of the above

Answer: A

20. A modern electronic computer is a machine that is meant for

A. Doing quick mathematical calculations

B. Input storage, manipulation of outputting of data

C. Electronic data processing

D. Performing repetitive tasks accurately

E. None of the above

Answer: B

21. Which is a device that changes information into digital form?

A. Modem

B. Digitizer

C. Mouse

D. Light pen

E. None of the above

Answer: B

22. An index register that is automatically incremented or decremented with each use is

A. Auto index

B. Asynchronous

C. Assembler

D. Compiler

E. None of the above

Answer: A

23. Which network is a packet switching network?

A. Ring network

B. LAN

C. Star network

D. EuroNET

E. None of the above

Answer: D

24. Symbolic languages were developed in

A. 1962

B. 1950

C. 1974

D. 1980

E. None of the above

Answer: B

25. A technique used by codes to convert an analog signal into a digital bit stream is known as

A. Pulse code modulation

B. Pulse stretcher

C. Query processing

D. Queue management

E. None of the above

Answer: A

General Computer Test - 120

 

Q.1 Which of the following relational algebraic operations is not from set theory?

(A) Union

 (B) Intersection

(C) Cartesian Product

 (D) Select

Ans: (D)

Q.2 Which of the following ensures the atomicity of the transaction?

(A) Transaction management component of DBMS

(B) Application Programmer

(C) Concurrency control component of DBMS

(D) Recovery management component of DBMS

Ans: (A)

Q.3 If both the functional dependencies : X→Y and Y→X hold for two attributes X and Y then the relationship between X and Y is

 (A) M:N

(B) M:1

(C) 1:1

(D) 1:M

Ans: (C)

Q.4 What will be the number of columns and rows respectively obtained for the operation, A-B, if A B are Base union compatible and all the rows of a are common to B? Assume A has 4 columns and 10 rows; and B has 4 columns and 15 rows

(A) 4,0

(B) 0,0

(C) 4,5

(D) 8,5

Ans: (A)

Q.5 For correct behaviour during recovery, undo and redo operation must be

(A) Commutative

 (B) Associative

(C) idempotent

(D) distributive

Ans: (C)

Q.6 Which of the following is not a consequence of non-normalized database?

(A) Update Anomaly

 (B) Insertion Anomaly

(C) Redundancy

 (D) Lost update problem

Ans: (D)

Q.7 Which of the following is true for relational calculus?

(A) x(P(x))≡¬(x)(¬P(x))

(B) x(P(x))≡¬(x)(P(x))

(C) x(P(x))≡(x)(¬P(x))

(D) x(P(x))≡(x)(P(x))

Ans: (A)

Q.8 The part of a database management system which ensures that the data remains in a consistent state is

(A) authorization and integrity manager

(B) buffer manager

(C) transaction manager

(D) file manager

Ans: (C)

Q.9 Relationships among relationships can be represented in an-E-R model using

(A) Aggregation

 (B) Association

(C) Weak entity sets

(D) Weak relationship sets

Ans: (A)

Q.10 In tuple relational calculus P1 AND P2 is equivalent to

(A) (¬P1OR¬P2).

 (B) ¬(P1OR¬P2).

(C) ¬(¬P1OR P2).

(D) ¬(¬P1OR ¬P2).

Ans: (D)

Q.11 If α→β holds then so does

 

(A) γα→γβ

(B) α→→γβ

(C) both (A) and (B)

 (D) None of the above

Ans: (A)

Q.12 Cascading rollback is avoided in all protocol except

(A) strict two-phase locking protocol.

(B) tree locking protocol

(C) two-phase locking protocol

(D) validation based protocol.

Ans: (D)

Q. 13 Wait-for graph is used for

(A) detecting view serializability.

(B) detecting conflict serializability.

(C) deadlock prevention

(D) deadlock detection

Ans: (D)

Q.14 The expression σθ1(E1θ2E2) is the same as

(A) E1 θ1^ θ2E2

 (B) σθ1 E1^σθ2 E2

(C) E1 θ1 θ2E2

 (D) None of the above

Ans: (A)

Q.15 The clause alter table in SQL can be used to

(A) add an attribute

(B) delete an attribute

(C) alter the default values of an attribute

(D) all of the above

Ans: (D)

Q. 16 The data models defined by ANSI/SPARC architecture are

(A) Conceptual, physical and internal

(B) Conceptual, view and external

(C) Logical, physical and internal

(D) Logical, physical and view

Ans: (D)

Q.17 Whenever two independent one-to-many relationships are mixed in the same relation, a _______ arises.

(A) Functional dependency

(B) Multi-valued dependency

(C) Transitive dependency

(D) Partial dependency

Ans:(B)

Q.18 A table can have only one

(A) Secondary key

 (B) Alternate key

(C) Unique key

 (D) Primary key

Ans: (D)

Q.19 Dependency preservation is not guaranteed in

(A) BCNF

 (B) 3NF

(C) PJNF

 (D) DKNF

Ans: (A)

Q.20 Which is the best file organization when data is frequently added or deleted from a file?

(A) Sequentia

l (B) Direct

(C) Index sequential

(D) None of the above

Ans: (B)

Q.21 Which of the following constitutes a basic set of operations for manipulating relational data?

(A) Predicate calculus

(B) Relational calculus

(C) Relational algebra

(D) SQL

Ans: (C)

Q.22 An advantage of views is

(A) Data security

 (B) Derived columns

(C) Hiding of complex queries

(D) All of the above

Ans: (A)

Q.23 Which of the following is not a recovery technique?

(A) Deferred update

(B) Immediate update

(C) Two-phase commit

(D) Shadow paging

Ans: (C)

Q.24 Isolation of the transactions is ensured by

(A) Transaction management

(B) Application programmer

(C) Concurrency control

 (D) Recovery management

Ans: (C)

Q.25 _______ operator is used to compare a value to a list of literals values that have been specified.

(A) Like

(B) COMPARE

(C) BETWEEN

(D) IN

Ans: (A)

General Computer Test - 119

 

Q.1 The cost of reading and writing temporary files while evaluating a query can be reduced by

(A) building indices

 (B) pipelining

(C) join ordering

(D) none of the above

Ans: (B)

Q.2 A transaction is in __________ state after the final statement has been executed.

(A) partially committed

(B) active

(C) committed

 (D) none of the above

Ans: (C)

Q.3 In multiple granularity of locks SIX lock is compatible with

(A) IX

(B) IS

(C) S

(D) SIX

Ans: (B)

Q.4 The statement that is executed automatically by the system as a side effect of the modification of the database is

(A) backup

(B) assertion

(C) recovery

 (D) trigger

Ans: (D)

Q.5 The normal form that is not necessarily dependency preserving is

(A) 2NF

 (B) 3NF

(C) BCNF

(D) 4NF

Ans: (A)

Q.6 A functional dependency of the form x → y is trivial if AC14/AT11 Database Management Systems.

(A) y x

 (B) y x

(C) x y

 (D) x y

Ans: (A)

Q.7 The normalization was first proposed by ______________.

(A) Code

(B) Codd

(C) Boyce Codd

 (D) Boyce

Ans: (B)

Q.8 The division operator divides a dividend A of degree m+n by a divisor relation B of degree n and produces a result of degree

(A) m – 1

 (B) m + 1

(C) m * m

 (D) m

Ans: (D)

Q.9 Which of the following is not a characteristic of a relational database model?

(A) Table

(B) Tree like structure

(C) Complex logical relationship

(D) Records

Ans: (B)

Q.10 Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R.

(A) It will result in a deadlock situation.

(B) It will immediately be rejected.

(C) It will immediately be granted.

(D) It will be granted as soon as it is released by A .

Ans: (C)

Q.11 In E-R Diagram total participation is represented by

(A) double lines

(B) Dashed lines

(C) single line

(D) Triangle

Ans: (A)

Q.12 The FD A → B , DB → C implies

(A) DA → C

(B) A → C

(C) B → A

 (D) DB → A

Ans: (A)

Q.13 The graphical representation of a query is ________.

(A) B-Tree

(B) graph

(C) Query Tree

 (D) directed graph

Ans: (C)

Q.14 Union operator is a :

(A) Unary Operator

 (B) Ternary Operator

(C) Binary Operator

 (D) Not an operator

Ans: (C)

Q.15 Relations produced from an E-R model will always be

(A) First normal form.

 (B) Second normal form.

(C) Third normal form.

 (D) Fourth normal form.

Ans: (A)

Q.16 Manager salary details are hidden from the employee .This is

(A) Conceptual level data hiding.

(B) External level data hiding.

(C) Physical level data hiding.

(D) None of these.

Ans: (A)

Q.17 Which of the following is true for network structure?

(A) It is a physical representation of the data.

(B) It allows many to many relationship.

(C) It is conceptually simple.

(D) It will be the dominant database of the future.

Ans: (A)

Q.18 Which two files are used during operation of the DBMS?

(A) Query languages and utilities

(B) DML and query language

(C) Data dictionary and transaction log

(D) Data dictionary and query language

Ans: (C )

Q.19 A list consists of last names, first names, addresses and pin codes. If all people in the list have the same last name and same pin code a useful key would be

(A) the pin code

(B) the last name

 

(C) the compound key first name and last name

(D) Tr from next page

Ans: (C )

Q.20 In b-tree the number of keys in each node is ____ than the number of its children.

(A) one less

 (B) same

(C) one more

 (D) half

Ans: (A)

Q.21 The drawback of shadow paging technique are

(A) Commit overhead

 (B) Data fragmentation

(C) Garbage collection

 (D) All of these

Ans: (D)

Q.72 Which normal form is considered adequate for normal relational database design?

(A) 2NF (B) 5NF

(C) 4NF (D) 3NF

Ans: (D)

Q.23 Which of the following addressing modes permits relocation without any change over in the code?

(A) Indirect addressing

(B) Indexed addressing

(C) PC relative addressing

 (D) Base register addressing

Ans: (B)

Q.24 In a multi-user database, if two users wish to update the same record at the same time, they are prevented from doing so by

(A) jamming

 (B) password

(C) documentation

 (D) record lock

Ans: (D)

Q.25 The values of the attribute describes a particular_____________

(A) Entity set

(B) File

(C) Entity instance

(D) Organization

Ans: (C)

General Computer Test - 118

 

Q.1 When R , then the cost of computing ∩S = φ R >< S is

(A) the same as R × S

 (B) greater the R × S

(C) less than R × S

 (D) cannot say anything

Ans: (A)

Q.2 In SQL the word ‘natural’ can be used with

(A) inner join

 (B) full outer join

(C) right outer join

(D) all of the above

Ans: (A)

Q.3 The default level of consistency in SQL is

(A) repeatable read

(B) read committed

(C) read uncommitted

 (D) serializable

Ans: (D)

Q.4 If a transaction T has obtained an exclusive lock on item Q, then T can

(A) read Q

(B) write Q

(C) both read and write Q

 (D) write Q but not read Q

Ans: (C)

Q.5 Shadow paging has

(A) no redo

 (B) no undo

(C) redo but no undo

 (D) neither redo nor undo

Ans: (A)

Q.6 If the closure of an attribute set is the entire relation then the attribute set is a

(A) superkey

(B) candidate key

(C) primary key

 (D) not a key

Ans: (A)

Q.7 DROP is a ______________ statement in SQL.

(A) Query

 (B) Embedded SQL

(C) DDL

(D) DCL

Ans: (C)

Q.8 If two relations R and S are joined, then the non matching tuples of both R and S are ignored in

(A) left outer join

 (B) right outer join

(C) full outer join

 (D) inner join

 

Ans: (D)

Q.9 The keyword to eliminate duplicate rows from the query result in SQL is

(A) DISTINCT

 (B) NO DUPLICATE

(C) UNIQUE

(D) None of the above

` Ans: (C)

Q.10 In 2NF

(A) No functional dependencies (FDs) exist.

(B) No multivalued dependencies (MVDs) exist.

(C) No partial FDs exist.

(D) No partial MVDs exist.

Ans: (C)

Q.11 Which one is correct statement? Logical data independence provides following without changing application programs:

(i) Changes in access methods.

(ii) Adding new entities in database

(iii) Splitting an existing record into two or more records

(iv) Changing storage medium

(A) (i) and (ii)

 (B) (iv) only,

(C) (i) and (iv)

(D) (ii) and (iii)

Ans: (D)

Q.12 In an E-R, Y is the dominant entity and X is a subordinate entity. Then which of the following is incorrect :

(A) Operationally, if Y is deleted, so is X

(B) existence is dependent on Y.

(C) Operationally, if X is deleted, so is Y.

(D) Operationally, if X is deleted, & remains the same.\

Ans: (C)

Q.13 Relational Algebra is

(A) Data Definition Language .

(B) Meta Language

(C) Procedural query Language

(D) None of the above

Ans: (C)

Q.14 Which of the following aggregate functions does not ignore nulls in its results?.

(A) COUNT .

 (B) COUNT (*)

(C) MAX

(D) MIN

Ans: (B)

Q.15 R (A,B,C,D) is a relation. Which of the following does not have a lossless join dependency preserving BCNF decomposition

(A) AB, BCD

(B) AB, BC, CD .

(C) ABC, CAD

 (D) ABCD

Ans: (D)

Q.16 Consider the join of relation R with a relation S. If R has m tuples and S has n tuples, then the maximum and minimum size of the join respectively are

(A) m+n and 0

(B) m+n and |m-n|

(C) mn and 0

 (D) mn and m+n

Ans: (C)

Q.17 Maximum height of a B+ tree of order m with n key values is

(A) Logm(n)

(B) (m+n)/2

(C) Logm/2(m+n)

(D) None of these

Ans: (D)

Q.18 Which one is true statement :

(A) With finer degree of granularity of locking a high degree of concurrency is possible.

(B) Locking prevents non – serializable schedules.

(C) Locking cannot take place at field level.

(D) An exclusive lock on data item X is granted even if a shared lock is already

held on X.

Ans: (A)

Q.19 Which of the following statement on the view concept in SQL is invalid?

(A) All views are not updateable

(B) The views may be referenced in an SQL statement whenever tables are referenced.

(C) The views are instantiated at the time they are referenced and not when they are defined.

(D) The definition of a view should not have GROUP BY clause in it.

 

Ans: (D)

Q.20 Which of the following concurrency control schemes is not based on the serializability property?

(A) Two – phase locking

 (B) Graph-based locking

(C) Time-stamp based locking

 (D) None of these .

Ans: (D)

Q.21 Which of the following is a reason to model data?

(A) Understand each user’s perspective of data

(B) Understand the data itself irrespective of the physical representation

(C) Understand the use of data across application areas

(D) All of the above

Ans: (D)

Q.22 If an entity can belong to only one lower level entity then the constraint is

(A) disjoint

(B) partial

(C) overlapping

 (D) single

Ans: (B)

Q.23 The common column is eliminated in

(A) theta join

 (B) outer join

 (C) natural join

(D) composed join

Ans: (C )

Q.24 In SQL, testing whether a subquery is empty is done using

(A) DISTINCT

 (B) UNIQUE

(C) NULL

(D) EXISTS

Ans: (D)

Q.25 Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are

(A) distinct values

 (B) cannot have NULL

(C) both (A) & (B)

 (D) same as primary key

Ans: (C)