1. For the purposes of defining data needs, a responsibility area is
(A). marketing
(B). personnel
(C). administration
(D). finance
Right Answer: B
2. The problem statement should include all of the following except
(A). input
(B). output
(C). processing
(D). storage
Right Answer: D
3. Gmail, a free web-based email service operated by which company
(A). Apple
(B). Google
(C). Microsoft
(D). Yahoo
Right Answer: B
4. A collection of 4 binary digits is known as
(A). Half Bit
(B). 1/2 KB
(C). Byte
(D). Nibble
Right Answer: D
5. Which of the following is not a part of the CPU?
(A). Arithmetic and Logic Unit
(B). storage Unit
(C). program Unit
(D). control Unit
Right Answer: C
6. How many options does a binary choice offer?
(A). None
(B). One
(C). Two
(D). It depends on the amount of memory in the computer
Right Answer: C
7. ..is collection of web pages and ..is the very first page that we Check on opening of a web-site.
(A). Home page, Web-page
(B). Web-site, Home-page
(C). Web-page, Home-page
(D). Web-page, Web-site
Right Answer:
8. When the pointer is positioned on a ..it is shaped like a hand.
(A). Grammar error
(B). Hyperlink
(C). Screen tip
(D). Spelling error
Right Answer: B
9. The ..of a system includes the programs or instructions.
(A). Hardware
(B). Icon
(C). Information
(D). Software
Right Answer: D
10. www stands for
(A). world word web
(B). world wide web
(C). world white web
(D). world work web
Right Answer: B
11. The internet is
(A). a large network of networks
(B). an internal communication system for a business
(C). a communications system for the Indian government
(D). All of these
Right Answer: A
12. Which of the following statements is FALSE concerning file names ?
(A). Files may share the same name or the same extension but not both
(B). Every file in the same folder must have a unique, name
(C). File extension is another name for file type
(D). The file extension comes before the dot (.) followed by the file name
Right Answer: D
13. Which of the following would most likely be a symptom of a virus ?
(A). Existing program files and icons disappear
(B). The CD-ROM stops functioning
(C). The Web browser opens to an un-usual home page
(D). Odd messages or images are displayed on the screen
Right Answer: B
14. What is a back up ?
(A). Restoring the information backup
(B). An exact copy of a system s information
(C). The ability to get a system u and running in the event of a system crash or failure
(D). All of these
Right Answer: D
15. .. are lists of commands that appear on the screen.
(A). GUIs
(B). Icons
(C). Menus
(D). Windows
Right Answer: C
16. How many common file type are there
(A). one
(B). six
(C). five
(D). two
Right Answer: B
17. Punched cards use
(A). alphanumeric code
(B). Hollerith code
(C). EBCDIC code
(D). ASCII code
Right Answer: B
18. Trojan-horse programs
(A). are legitimate programs that allow unauthorized access
(B). are hacker programs that do not show up on the system
(C). really do not usually work
(D). usually are immediately discovered
Right Answer: A
19. Hydra
(A). capability based protection system
(B). provides considerable flexibility
(C). both A and B
(D). not define
Right Answer:
20. Program threats are
(A). Trojan horse
(B). trap doors
(C). both A and B
(D). worm
Right Answer: A
21. To hold down the mouse button while moving the mouse
(A). cursor
(B). drag
(C). pointer
(D). marker
Right Answer: B
22. A notice on the screen that informs you of a problem
(A). frame
(B). window.
(C). dialog box
(D). message
Right Answer: C
23. Which of the following languages is used with an interpreter?
(A). COBOL
(B). BASIC
(C). PASCAL
(D). none of these
Right Answer: C
24. MS-Word allow creation of which type of documents by default
(A). .DOT
(B). .PDF
(C). .DOC
(D). .TXT
Right Answer: C
25. What type of software is used for creating letters papers and other documents?
(A). database
(B). word processor
(C). spreadsheet
(D). operating system
Right Answer: B
26. When you are working on a document on PC, where is the document temporarily stored?
(A). RAM
(B). ROM
(C). The CPU
(D). Flash memory
Right Answer: A
27. Information travels between components on the mother board through
(A). Flash memory
(B). CMOS
(C). Bays
(D). Buses
Right Answer: D
28. How are data organised in a spreadsheet?
(A). Lines and spaces
(B). Layers and planes
(C). Height and width
(D). Rows and columns
Right Answer: C
29. Which of the following is true?
(A). Byte is a single digit in a binary number
(B). Bit represents a grouping of digital numbers
(C). Eight-digit binary number is called a byte
(D). Eight-digit binary number is called a bit
Right Answer: C
30. Transformation of input into output is performed by?
(A). Peripherals
(B). Memory
(C). Storage
(D). The CPU
Right Answer: D
31. The most frequently used instructions of a computer program are likely to be fetched from
(A). the hard disk
(B). cache memory
(C). RAM
(D). registers
Right Answer: B
32. Personal logs or journal entries posted on the Web are known as
(A). listservs
(B). webcasts
(C). blogs
(D). subject directories
Right Answer: C
33. Which of the following is NOT a type of broad band internet connection ?
(A). Cable
(B). JSL
(C). Dial-up
(D). Satellite
Right Answer: C
34. Linux is a(n) .. operating system.
(A). open-source
(B). microsoft
(C). windows
(D). mac
Right Answer: A
35. Which of the following places the common data elements in order from smallest to largest?
(A). character, file, record, field, database
(B). character, record, field, database, file
(C). character, field, record, file, database
(D). Bit, byte, character, record, field, file, database
Right Answer: A
36. Ferk is
(A). the dispatching of a task
(B). the creation of anew job
(C). the creation of anew process
(D). increasing the priority of a task
Right Answer: C
37. The computer language generally translated to pseudo code is
(A). assembly
(B). machine
(C). Pascal
(D). PL/I
Right Answer: B
38. Backup should be done
(A). daily for most installation
(B). weekly for installations
(C). as several images copies, followed by an incremental
(D). as several incremental, followed by an image copy
Right Answer: A
39. File record length
(A). should always be fixed
(B). should always be variable
(C). depends upon the size of the file
(D). should be chosen to match the data character
Right Answer: B
40. A file is
(A). an abstract data type
(B). logical storage unit
(C). file is usually non volatile
(D). all of the above
Right Answer: C
41. A temporary storage are, used generally for cut/copied of text or graphics
(A). buffer
(B). clip board
(C). window
(D). none of these
Right Answer: B
42. The term operating system refers to
(A). a set of programs which controls computer working
(B). the way a computer operator works
(C). conversion of high level language into machine language
(D). the way a floppy disk drive operates
Right Answer: A
43. The term used to refer to horizontal page orientation
(A). portrait
(B). alignment
(C). table
(D). landscape
Right Answer: D
44. The ascending order of a data hierarchy is
(A). bit, byte, field ,record, file, database
(B). bite, byte, record, field, file, database
(C). byte, bit ,field, record, file, database
(D). byte, bit, record, field, file, database
Right Answer: B
45. What are symbol used to identify items in a list?
(A). icons
(B). markers
(C). bullets
(D). graphics
Right Answer: C
46. How are data organized in a spread-sheet?
(A). Lines & spaces
(B). Layers & Planes
(C). Height & Width
(D). Rows & Columns
Right Answer: D
47. The blinking symbol on the computer screen is called the
(A). mouse
(B). logo
(C). hand
(D). cursor
Right Answer: D
48. One megabyte equals approximately
(A). 1,000 bits
(B). 1,000 bytes
(C). 1 million bytes
(D). 1 million bits
Right Answer: C
49. Data going into the computer is called?
(A). Output
(B). Algorithm
(C). Input
(D). Calculations
Right Answer: C
50. Which of the following refers to the memory in your computer?
(A). RAM
(B). DSL
(C). USB
(D). LAN
Right Answer: A
51. What is the ultimate purpose of Defragmentation ?
(A). Make the PC faster
(B). Create more free space
(C). Delete temporary files
(D). Reduce power consumption
Right Answer: B
52. Computers process data into information by working exclusively with
(A). multimedia
(B). words
(C). characters
(D). numbers
Right Answer: D
53. You must install a/an .. on a network if you want to share a broadband Internet connection.
(A). router
(B). modem
(C). node
(D). cable
Right Answer: A
54. The purpose of the primary key in a database is to
(A). unlock the database
(B). provide a map of the data
(C). uniquely identify a record
(D). establish constraints on database operations
Right Answer:
55. The design of the network is called the network
(A). architecture
(B). server
(C). transmission
(D). type
Right Answer: A
56. Which of the following language support garbage collection
(A). java
(B). C++
(C). C
(D). small talk
Right Answer: A
57. Procedural programming language is
(A). COBOL
(B). BASIC
(C). C++
(D). PASCAL
Right Answer: A
58. PASCAL is
(A). structured programming language
(B). procedural programming
(C). monolithic programming
(D). object oriented
Right Answer: A
59. Class is
(A). a template which associates code and data
(B). data-abstraction
(C). implementation of abstract data type
(D). object oriented
Right Answer:
60. The most common system security method is
(A). password
(B). encryption
(C). fire wall
(D). all of the above
Right Answer: C
61. Instruction s to computer are given through
(A). input unit
(B). ALU unit
(C). keyboard
(D). pen drive
Right Answer: A
62. Which command is used to copy files?
(A). copy
(B). disk copy
(C). type
(D). all of these
Right Answer: A
63. You can save your document using which command
(A). save
(B). save as
(C). open
(D). edit
Right Answer: A
64. What does OCR stands for?
(A). optical character reader
(B). operational character reader
(C). optical character recognition
(D). only character reader
Right Answer: C
65. Which command is used to change the file name?
(A). ren
(B). rename
(C). both A and B
(D). none of these
Right Answer: C
66. Microsoft Office is
(A). Shareware
(B). Public domain software
(C). Open-sourse software
(D). A vertical market application
Right Answer: A
67. How many options does a BINARY choice offer
(A). None
(B). One
(C). Two
(D). It depends on the speed of the computer s processor
Right Answer: D
68. A collection of program that controls how your computer system runs and processes information is called
(A). Operating System
(B). Computer
(C). Office
(D). Compiler
Right Answer: D
69. Computer connected to a LAN (Local Area Network) can
(A). run faster
(B). go on line
(C). share information and /or share peripheral equipment
(D). E-mail
Right Answer: A
70. Information travels between components on the motherboard through
(A). Flash memory
(B). CMOS
(C). Bays
(D). Buses
Right Answer: A
71. .. is data that has been organized or presented in a meaningful fashion.
(A). A process
(B). Software
(C). Storage
(D). Information
Right Answer: D
72. The name for the way that computers manipulate data into information is called
(A). programming
(B). processing
(C). storing
(D). organizing
Right Answer: B
73. Computers gather data, which means that they allow users to .. data.
(A). present
(B). input
(C). output
(D). store
Right Answer: B
74. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered
(A). data
(B). output
(C). input
(D). the process
Right Answer: B
75. A circuit with about 100 transistors fabricated on a single chip is called
(A). MCR
(B). MSI
(C). MIS
(D). RJE
Right Answer: B
76. The first operating system used in micro-processor is
(A). zenix
(B). DOS
(C). CP/M
(D). multies
Right Answer: C
77. Any instruction should have at least
(A). 2 operands
(B). 1 operand
(C). 3 operands
(D). any operands
Right Answer: D
78. Function overloading done at
(A). run time
(B). compile-time
(C). linking time
(D). all of the above
Right Answer: B
79. Encapsulation is
(A). dynamic binding
(B). a mechanism to associates the code and data
(C). data abstraction
(D). data hiding .
Right Answer: B
80. Polymorphism is done by
(A). function overloading
(B). creating new classes from base class
(C). operator overloading
(D). both A and C
Right Answer: D
81. Which are the main types of software system, utility and
(A). application
(B). new
(C). computer
(D). complex
Right Answer: A
82. 1 megabyte (Mb) equal to
(A). 220 bytes
(B). 1 kilo KB
(C). both A and B
(D). 1024 kilobytes
Right Answer: D
83. A byte represents a group of
(A). 10 bits
(B). 40 bits
(C). 8 bits
(D). 22 bits
Right Answer: C
84. Data representation in a computer uses the number system
(A). decimal
(B). number
(C). binary
(D). integers
Right Answer: C
85. When a key is present on the keyboard, which standard is used converting the keystrokes into the corresponding bits?
(A). ANSI
(B). ASCII
(C). EBCDIC
(D). ISO
Right Answer: B
86. BIOS stands for
(A). Basic Input Output system
(B). Binary Input output system
(C). Basic Input Off system
(D). all the above
Right Answer: A
87. Father of C programming language
(A). Dennis Ritchie
(B). Prof Jhon Kemeny
(C). Thomas Kurtz
(D). Bill Gates
Right Answer: C
88. The 16 bit Microprocessor means that it has
(A). 16 address lines
(B). 16 Buses
(C). 16 Data lines
(D). 16 routes
Right Answer: A
89. Data going into the computer is called
(A). Output
(B). algorithm
(C). Input
(D). Calculations
Right Answer: C
90. Which of the following refers to a small, single-site network?
(A). LAN
(B). DSL
(C). RAM
(D). USB
Right Answer: D
91. A record that follows a group of related records and contains data relevant to those records is called as
(A). Trailer record
(B). Traffic record
(C). Transaction record
(D). Transducer
Right Answer: A
92. A type of semiconductor memory that usually has small capacity but very fast access is
(A). PROM
(B). RAM
(C). Scratchpad
(D). ROM
Right Answer: C
93. .. is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(A). Nanoscience
(B). Microelectrodes
(C). Computer forensics
(D). Artificial intelligence
Right Answer: A
94. A single pole, single throw switch with one common line and one output line is
(A). Switch circuit
(B). SPDT switch
(C). SPST switch
(D). Star bit
Right Answer: C
95. A one-bit signal that indicates the start of data transmission by an asynchronous device is
(A). Parity bit
(B). Status bit
(C). Zero bit
(D). Star bit
Right Answer:
96. Which of the following requires a device driver
(A). register
(B). cache
(C). main memory
(D). disk
Right Answer: B
97. 92 in octal number system is equivalent to
(A). 128
(B). 130
(C). 132
(D). 134
Right Answer: D
98. The most commonly used character codes for transmission is
(A). EBCDIC
(B). ASCII
(C). both A and B
(D). COBOL
Right Answer: D
99. Icons are
(A). typed commands
(B). verbal commands
(C). picture command
(D). imaginary commands
Right Answer: C
100. The gray code for decimal 7 is
(A). 0111
(B). 1011
(C). 0100
(D). 0101
Right Answer: C
101. are the raw facts from whic his derived.
(A). data, information
(B). data, output
(C). input, information
(D). output, input
Right Answer: A
102. Printed copy is often called
(A). soft copy
(B). blank copy
(C). hard copy
(D). write copy
Right Answer: C
103. It is type if action to be taken on data
(A). data
(B). information
(C). processing
(D). file
Right Answer: B
104. Compression tools compress data on
(A). hard drive
(B). floppy drive
(C). both A and B
(D). none of these
Right Answer: C
105. With digital camera, you can store
(A). text
(B). picture
(C). both A and B
(D). none of these
Right Answer: C
106. RAM stands for
(A). Random origin money
(B). Random only memory
(C). Read only memory
(D). Random access memory
Right Answer: A
107. 1 Byte = ?
(A). 8 bits
(B). 4 bits
(C). 2 bits
(D). 9 bits
Right Answer: C
108. SMPS stands for
(A). Switched mode power supply
(B). Start mode power supply
(C). Store mode power supply
(D). Single mode power supply
Right Answer: A
109. The device used to carry digital data on analog lines is called as
(A). Modem
(B). Multiplexer
(C). Modulator
(D). Demodulator
Right Answer: C
110. VDU is also called
(A). Screen
(B). Monitor
(C). Both (a) and (b)
(D). printer
Right Answer: C
111. In UNIX, which command is used to sort the lines of data in a file in reverse order
(A). sort
(B). sh
(C). st
(D). sort -r
Right Answer: D
112. The commonly used UNIX commands like date, Is, cat etc. are .stored in
(A). /dev directory
(B). /bin directory
(C). /tmp directory
(D). /unix directory
Right Answer: B
113. Which of the following computer language is used for artificial intelligence?
(A). FORTRAN
(B). PROLOG
(C). C
(D). COBOL
Right Answer: B
114. The variables which can be accessed by all modules in a C program are known as
(A). Local variables
(B). Internal variables
(C). External variables
(D). Global variables
Right Answer: D
115. Which computer memory is used for storing programs and, data currently being processed by the CPU ?
(A). Mass memory
(B). Internal memory
(C). Non-volatile memory
(D). PROM
Right Answer: B
116. A tree with n nodes has .. edges.
(A). n/2
(B). n- 1
(C). n
(D). n + 1
Right Answer: A
117. Which of the following algorithm design techniques is used in finding all pairs of shortest distances in a graph
(A). dynamic programming
(B). backtracking
(C). greedy
(D). divide and conquer
Right Answer: C
118. In a resident -OS computer, which of the following system must reside in the main memory under all situations
(A). assembler
(B). linker
(C). loader
(D). compiler
Right Answer: D
119. Formatting for a floppy disk refers to
(A). arranging the data on the disk in continuous fashion
(B). writing the directory
(C). erasing the system area
(D). writing identification information on all tracks and sectors
Right Answer: A
120. The address space of 8086 CPU is
(A). one megabyte
(B). 256 kilobytes
(C). 1 K megabytes
(D). 64 kilobytes
Right Answer: D
121. The number of keys in a keyboard
(A). 100
(B). 88
(C). 101
(D). 110
Right Answer: C
122. With CD you can
(A). read
(B). write
(C). both A and B
(D). delete
Right Answer: C
123. Printer is a device which
(A). input
(B). output
(C). both A and B
(D). none of these
Right Answer: B
124. Laser printer is device which
(A). input
(B). output
(C). both A and B
(D). none of these
Right Answer: B
125. In MICR, C stands for
(A). colour
(B). code
(C). character
(D). coding
Right Answer: C
126. ..are used to identify a user who returns to a Website.
(A). Cookies
(B). Plug-ins
(C). Scripts
(D). ASP
Right Answer: A
127. Which one of the following objects is passed to a Java Bean when one of its properties is set via a JSP action?
(A). Servlet Request
(B). Http Servlet Request
(C). Servlet Response
(D). Http Servlet Response
Right Answer: C
128. ..translates and executes program at run time line by line.
(A). Compiler
(B). lnterpreter
(C). Linker
(D). Loader
Right Answer: B
129. ..is an OOP principle.
(A). Structured programming
(B). Procedural programming
(C). Inheritance
(D). Linking
Right Answer: A
130. COBOL is widely used in ..applications.
(A). Commercial
(B). Scientific
(C). Space
(D). Mathematical
Right Answer: C
131. A single dimensional array is called
(A). List
(B). Subscripts
(C). Matrix
(D). File
Right Answer: A
132. How many types of drawing objects are available in drawing Tool Bar ?
(A). 4
(B). 5
(C). 10
(D). None of these
Right Answer: D
133. Data processing is
(A). data collection
(B). similar to computer programming
(C). associated with commercial work
(D). akin to data coding
Right Answer: C
134. In computer terminology, information means
(A). Raw data
(B). Data in more useful
(C). Alphanumeric data
(D). Program
Right Answer: B
135. What is meant by the term RAM?
(A). Memory which can only be read
(B). Memory which can be both read and written to
(C). Memory which is used for permanent storage
(D). Memory which can only be written to
Right Answer: B
136. Which of the following is not a magnetic memory
(A). core
(B). disk
(C). flip-flop
(D). tape
Right Answer: D
137. A volatile memory is
(A). magnetic tape
(B). disk
(C). drum
(D). flip-flop
Right Answer: B
138. Which of the following flip-flops is used as latch
(A). JK flip-flop
(B). D flip-flop
(C). RS flip-flop
(D). T flip-flop
Right Answer: A
139. 2 s complement of 7 is
(A). 11001
(B). 11000
(C). 10111
(D). 00111
Right Answer: D
140. Half adder is also known as
(A). AND gate
(B). NAND gate
(C). NOR gate
(D). EX-OR gate
Right Answer: B
141. All processing of computer is done in
(A). Monitor
(B). CPU
(C). keyboard
(D). RAM
Right Answer: B
142. When yon put on the computer in the morning, it is called
(A). hot boot
(B). cold boot
(C). warm boot
(D). dabugging
Right Answer: B
143. He is known as the father of computer
(A). Herman Hollerith
(B). Grace Hoppers
(C). Charles Babbage
(D). Newton
Right Answer: C
144. RAM consists of binary numbers 1s and
(A). 0s
(B). 2s
(C). 3s
(D). 4s
Right Answer: A
145. For Checking the output, you use
(A). monitor
(B). keyboard
(C). mouse
(D). joystick
Right Answer: A
146. A DVD-RAM is similar to a ..except it has storage capacities up to 5.2 GB.
(A). CD-R
(B). floppy disk
(C). CD-RW
(D). hard disk
Right Answer: C
147. When you are selecting a mouse for a particular computer system, what is the most important consideration?
(A). The type of drivers that come with the mouse
(B). The length of the mouse cord
(C). The type of connector the mouse is equipped with
(D). The number of buttons the mouse has
Right Answer: C
148. How is power supplied to a low-power USB device?
(A). Through a power cable
(B). From an external power supply
(C). Directly from the computer s power supply
(D). Through the USB cable
Right Answer: D
149. All of the following are basic principles of net works except
(A). each computer must have a network card
(B). there must be communications media connecting the network hardware devices
(C). there must be at least one connecting device
(D). each computer must have software that supports the movement of information.
Right Answer: B
150. The ..data mining technique derives rules from real-world case examples.
(A). Rule discover
(B). Signal processing
(C). Neural nets
(D). Case-based reasoning
Right Answer: C