(B) Amount of Data Transferred
(B) Amount of Data Transferred
[A]width of the data cable
[B] amount of data transferred
[C] number of the computers on a particular network
[D] none of the above
[A] Dell
[B] IBM
[C] Compaq
[D] SyteK Inc
3. DDL is used to define the structure of a database, including the tables, columns, and
data types that it contains. Its full form is?
4. 32 bit operations were introduced for the first time by Microsoft in ________?
[A] windows 9.5
[B] windows 3.0
[C] windows 3.11
[D] None of the above
5. A hybrid computer is the one which exhibits the features of __?
[A] analog computer
[B] digital computer
[C] both analog and digital computer
[D] mainframe computer
7. Who had proposed the principle of modern computer in his 1936 paper?
[A] Alan Turing
[B] Geoff Tootill
[C] Ferranti Mark
[D] Grace Hopper
8. Which of the following indicates where is the computer is in terms of the program
sequence?
10. A computer cannot boot if it does not have which of the following?
[A] Compiler
[B] Loader
[C] Operating System
[D] Assembler
11. Which of the following is used for 3D positioning and modeling, animation and other
application?
12. Which of the following is the device that is constructed with the series of sensors
that detects hand and finger motion?
[A] Digitizers
[B] Data glove
[C] Joystick
[D] Track ball
13. Which of the following define the meaning of RAM?
[A] It is a memory which only be read.
[B] It is a memory which both read and written.
[C] It is a memory which is used for permanent storage.
[D] It is a memory which can only be written.
14. What is the name given to the malicious software that is considered to fall between
normal software and a virus?
[A] Spyware
[B] Greyware
[C] Malware
[D] Spam
15. Which of the following is the another term used for Software hosting?
[A] Cloud computing
[B] On demand service
[C] Software as a service or Saas
[D] All of the Above
18. Which of the following statements in SQL are considered as Data manipulation
language?
[A] Update
[B] Insert
[C] Delete
[D] All of the Above
19. What is the name given to the computing infrastructure close to the sources of
data?
20. Who among the following proposed the R-tree for the first time?
[A] Antonin Guttman
[B] Van Neumann
[C] Steve Jobs
[D] Michael Raschell
21. What is the full form of IEC?
[A] International Electrotechnical Commission
[B] International Electrical Council
[C] Internet Embedded Commission
[D] None of the Above
22. Which among the following is the term given to the three rules to find logically
implied functional dependencies?
23. Which of the following are the primary ways to enable LAN connections?
[A] Ethernet
[B] Wi-Fi
[C] Both a and b
[D] None of the Above
24. Which of the following device encodes and decodes the analog signals in a dial-up
connection?
[A] Modem
[B] NIC
[C] Router
[D] None of the above
25. What is meant by the terms ‘connect time’?
[A] Speed of data transfer in a connection
[B] Amount of time it took for user to make a connection to a remote computer
[C] Amount of time user is logged in to a remote computer
[D] None of the above
27. Which of the following layer of the OSI model is used by the TCP for its operation?
[A] Network layer
[B] Transport layer
[C] Data Link layer
[D] Presentation layer
31. Which button in MS Excel is clicked to calculate the sum of a series of numbers?
[A] Autosum
[B] Fill
[C] Merge
[D] Insert
32. Which of the key combination is used to move to the bottom of the column in MS
Excel?
[A] Ctrl + D
[B] Ctrl + U
[C] Ctrl + Down Arrow
[D] Ctrl + End
33. Which of the following cannot be inserted in an MS PowerPoint slide?
[A] Picture
[B] Webpage
[C] Sound
[D] All of the above can be inserted
38. Analytical Engine, the first fully automatic calculating machine was
developed by
(a) Charles Babbage
(b) Blaise Pascal
(c) Leibniz
(d) John Von Neumann
40. Pascaline is a
(a) Abacus
(b) Adding Machine
(c) Difference Machine
(d) Multiplication Machine
41. During the second generation, the size of computers was decreased by
replacing vacuum tubes with
(a) ICs
(b) Semiconductors
(c) Transistors
(d) Microprocessor
42. Integrated chips (IC) were started to be used from which generation of
computers?
(a) First generation
(b) Second generation
(c) Third generation
(d) Fourth generation
44. The primary memory (also called main memory) of a personal computer
consists of
(a) RAM only
(b) ROM only
(c) both RAM and ROM
(d) Cache memory
46. The Boot sector files of the system are stored in which computer memory?
(a) RAM
(b) ROM
(c) Cache
(d) Register
49. Which memory acts as a buffer between CPU and main memory?
(a) RAM
(b) ROM
(c) Cache
(d) Storage
50. Which process is used to map logical addresses of variable length onto
physical memory?
(a) Paging
(b) Overlays
(c) Segmentation
(d) Paging with segmentation
51. Which computer memory chip allows simultaneous both read and write
operations?
(a) ROM
(b) RAM
(c) PROM
(d) EEPROM
52. In which type of memory, once the program or data is written, it cannot be
changed?
(a) EPROM
(b) PROM
(c) EEPROM
(d) None of these
53. In which type of ROM, data can be erased by ultraviolet light and then
reprogrammed by the user or manufacturer?
(a) PROM
(b) EPROM
(c) EEPROM
(d) Both a and b
57. National Internet Service Provider (ISP) networks are connected to one
another by private switching network is called
a) Peering Points
b) Network Access Points
c) National ISP
d) None of these
a) Simplex
b) Four-wire circuit
c) Half-duplex
d) Full duplex
63. Which mode of communication can be used when there is no need for
communication in both directions at the same time.
a) Simplex
b) Half duplex
c) Full duplex
d) b and c
a) Point-to-Point
b) Multipoint
c) Topology
d) Protocol
67. A connection in which more than two specific devices share a single link is
called
a) Standard
b) Multipoint
c) Channel
d) Peering points
69. A topology in which every node has a dedicated point to point link to all
nodes (devices) within the network is called
a) Mesh
b) Star
c) Bus
d) Ring
70. A topology that consists of a number of devices connected by point to point
links to a central hub is called
a) Mesh
b) Bus
c) Star
d) Ring
74. The topology that covers security, robust, and eliminating the traffic factor
or control is known as
a) Mesh
b) Ring
c) Bus
d) Star
76. A communication pathway that sends data from one point to another is
called
a) Node
b) Link
c) Medium
d) Topology
85. Which layer of OSI model transmits raw bits over a communication
channel?
a) Data Link
b) Physical
c) Network
d) Session
86. Which layer of OSI model divides the stream of bits received from the
network layer into data frames?
a) Physical
b) Transport
c) Data Link
d) Session
87. Which layer of OSI model defines the type of transmission medium between
two devices?
a) Data Link
b) Physical
c) Session
d) Presentation
88. Which layer of OSI model is responsible for the delivery of individual
packets from the source host to the destination host?
a) Network
b) Physical
c) Data Link
d) Application
111. In a computer, .com, .edu, .gov, and .net are the examples of
(a) tag
(b) protocol
(c) top level domain extension
(d) IP address
112. A small piece of data sent from a website and stored in the user’s web
browser is called
(a) anonymous file
(b) cookie
(c) web page
(d) information
117. Which of the following protocol is used to connect to Usenet server and
transfer newsgroup articles between systems over the internet?
(a) FTP
(b) NTTP
(c) TCP
(d) TCP/IP
118. Which of the following is used to connect the internet with a computer?
(a) Router
(b) Modem
(c) Network Switch
(d) Server
121. Which of the following instructs the computer hardware, what to do and
how to do it?
(a) Hardware
(b) Operating system
(c) Software
(d) Device driver
122. One or more defects occurring in the computer software that prevents the
software from working is called
(a) bot
(b) system error
(c) bug
(d) slug
129. Which among the following is not a type of utility system software?
(a) Antivirus
(b) Firewalls
(c) Disk defragmenter
(d) MS-DOS
130. Which utility software is used to protect the computer system from
hackers?
(a) Antivirus
(b) Firewall
(c) AUP
(d) Backup wizard
134. Which among the following is the fastest memory in a computer that holds
information?
(a) Register
(b) Cache
(c) Main memory
(d) RAM
135. Which register holds the address of the current instruction being executed?
(a) Instruction register
(b) Memory data register (MDR)
(c) Stack register
(d) Program counter
136. Which register shows the results of arithmetic and logical operations such
as carry, overflow, negative?
(a) Stack register
(b) Status register
(c) Memory data register
(d) Memory buffer
138. Which of the following is not an integral part of the computer system?
(a) CPU
(b) Mouse
(c) Monitor
(d) UPS
139. Which of the following is a temporary storage location attached to CPU for
input and output operations?
(a) Memory chip
(b) Register
(c) Buffer
(d) Core
140. A uniform interval of CPU time allocated for performing a task is called
(a) real time
(b) seek time
(c) time slice
(d) unit time
147. Which input device is widely used for acquiring textual data from images?
(a) MICR
(b) OCR
(c) Scanner
(d) Sensor
162. Which of the following was the first computer developed by India?
(a) IBM 370
(b) PARAM
(c) Siddhartha
(d) CRAY-1
172. The process of dividing the disk into tracks and sectors is called
(a) Tracking
(b) Crashing
(c) Dicing
(d) Formatting
183. Which of the following is used to overcome the difference in data transfer
speeds of various devices?
a) Speed enhancing circuit
b) Bridge circuit
c) Buffer register
d) Combinational circuit
184. Before performing arithmetic and logical operations by ALU, data must
first transfer from primary memory to
a) read-only memory
b) ALU register
c) control unit
d) secondary memory
187.