You are on page 1of 16

To locate a data item for storage is

a. Field
b. Feed
c. Database
d. Fetch

2. programs designed to perform specific tasks is known as

a. system software
b. application software
c. utility programs
d. operating system

3. perforated paper used as input of output media is known as

a. paper tapes
b. magnetic tape
c. punched papers tape
d. card punch

4. Time during which a job is processed by the computer is

a. Delay times
b. Real time
c. Execution time
d. Down time

5. a computer which CPU speed around 100 million instruction per second and with the word length of
around 64 bits is known as

a. Super computer
b. Mini computer
c. Micro computer
d. Macro computer

6. An approach that permits the computer to work on several programs instead of one is

a. On-line thesaurus
b. Multiprogramming
c. Over lapped processing
d. Outline processor

7. A directly accessible appointment calendar is feature of a resident package

a. CPU
b. Memory
c. Buffer
d. ALU

8. The term gigabyte refers to

a. 1024 bytes
b. 1024 kilobytes
c. 1024 megabytes
d. 1024 gigabyte

9. Which of the following processors use RISC technology?

a. 486dx
b. Power PC
c. 486sx
d. 6340

10. A/n . Device is any device that provides information, which is sent to the CPU

a. Input
b. Output
c. CPU
d. Memory

11. Current SIMMs have either or connectors (pins)

a. 9 or 32
b. 30 or 70
c. 28 or 72
d. 30 or 72

12. The storage subsystem in a microcomputer consists mainly of or media with varying capacities

a. Memory or video
b. Magnetic or optical
c. Optical or memory
d. Video or magnetic

13. Which of the following is not an input device?

a. OCR
b. Optical scanners
c. Voice recognition device
d. COM (Computer Output to Microfilm)

14. The central processing unit (CPU) consists of

a. Input, output and processing


b. Control unit, primary storage, and secondary storage
c. Control unit, arithmetic-logic unit and primary storage
d. Control unit, processing, and primary storage

15. EBCDIC can code up to how many different characters?

a. 256
b. 16
c. 32
d. 64

16. Which is considered a direct entry input device?

a. Optical scanner
b. Mouse and digitizer
c. Light pen
d. All of the above

17. Which is used for manufacturing chips?

a. Bus
b. Control unit
c. Semiconductors
d. A and b only

18. The computer code for the interchange of information between terminals is

a. ASCII
b. BCD
c. EBCDIC
d. All of above

19. A byte consists of

a. One bit
b. Four bits

c. Eight bits
d. Sixteen bits

20. A hybrid computer

a. Resembles digital computer


b. Resembles analog computer
c. Resembles both a digital and analog computer
d. None of the above

Answers:

1. To locate a data item for storage is

d. Fetch

2. programs designed to perform specific tasks is known as

b. application software

3. perforated paper used as input of output media is known as

a. paper tapes

4. Time during which a job is processed by the computer is

c. Execution time

5. a computer which CPU speed around 100 million instruction per second and with the word length of
around 64 bits is known as

a. Super computer

6. An approach that permits the computer to work on several programs instead of one is

c. Over lapped processing

7. A directly accessible appointment calendar is feature of a resident package

b. Memory

8. The term gigabyte refers to

c. 1024 megabytes

9. Which of the following processors use RISC technology?

b. Power PC

10. A/n . Device is any device that provides information, which is sent to the CPU

a. Input

11. Current SIMMs have either or connectors (pins)

d. 30 or 72

12. The storage subsystem in a microcomputer consists mainly of or media with varying capacities

b. Magnetic or optical

13. Which of the following is not an input device?

d. COM (Computer Output to Microfilm)

14. The central processing unit (CPU) consists of

c. Control unit, arithmetic-logic unit and primary storage

15. EBCDIC can code up to how many different characters?

a. 256

16. Which is considered a direct entry input device?

d. All of the above

17. Which is used for manufacturing chips?

c. Semiconductors

18. The computer code for the interchange of information between terminals is

a. ASCII

19. A byte consists of

c. Eight bits

20. A hybrid computer

c. Resembles both a digital and analog computer

Q.1. Select the best option/answer and fill in the appropriate box on the Answer Sheet. (20)
(i) AX register is also known as:
(a) Accumulator
(b) Collector
(c) Distributor
(d) Counter
(e) None of these
(ii) In the Base + Offset addressing, Offset address is also known as:
(a) Physical Address
(b) Logical Address
(c) Actual Address
(d) Instruction Address
(e) None of these
(iii) The technique for allowing a unit to check the status of another independently function unit is known
as?
(a) Interrupt
(b) System call
(c) Polling
(d) Trape
(e) None of these
(iv) The method for storing data temporarily such that the input-output of the same job is overlapped with
its own processing, is known as:
(a) Spooling
(b) Contention

(c) I/O wait


(d) Buffering
(e) None of these
(v) The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these
(vi) _________ Scheduler deals with the decision as to whether to admit another new job to the system.
(a) High Level
(b) Medium Level
(c) Low Level
(d) Short term
(e) None of these
(vii) When the process is in the states of Blocked Suspended or Ready Suspended, its relevant data is
stored in:
(a) Main Memory
(b) Hard Disk
(c) Magnetic Tape
(d) Buffer
(e) None of these
(viii) Priority, P = (Time Waiting + Run Time) / Run Time is used to calculate priority in __________
scheduling algorithm:
(a) Shortest Job First
(b) Priority Scheduling
(c) Longest Wait First
(d) Highest Response Ratio Next
(e) None of these
(ix) HDLC Protocol stands for:
(a) High-Level Data Link Control
(b) High Level Development Protocol
(c) Huge Level Data Link Control
(d) High Development Level Control
(e) None of these
(x) _________ is the generic name for a set of standards issued by the International
CommunicationsStandards Body CCITT, designed to support Message Handling Systems; i.e. Electronic
Mail.
(a) TCP/IP
(b) ISDN
(c) X.400
(d) X.25
(e) None of these
(xi) ________ layer is responsible for the transfer of a packet of data along one link in the network. It
organizes data into frames and detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these
(xii) Encryption is the conversion of data in some intelligible format into an unintelligible format called
_________ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these

(xiii) Binary search requires about ______ comparisons with an initial list of 1,000,000 elements.
(a) 10
(b) 20
(c) 35
(d) 100
(e) None of these
(xiv) A _________ header list is a header list where the last node contains the null pointer.
(a) Grounded
(b) Circular
(c) One way
(d) Rooted
(e) None of these
(xv) ________ are small applications that are accessed on an internet server, transported over the
internet, automatically installed and run as part of a web document.
(a) Applets
(b) Java Bean
(c) Sockets
(d) Java Component
(e) None of these
(xvi) AWT stands for:
(a) Abstract Window Technique
(b) Abstract Window Toolkit
(c) Actual Window Technique
(d) Added Window Toolkit
(e) None of these
(xvii) GIF images can have only upto _______ colors.
(a) 128
(b) 256
(c) 512
(d) 1024
(e) None of these
(xviii) ________ is stored on a client and contains state information of the website visited.
(a) Cookies
(b) Servelet
(c) History
(d) Resident Page
(e) None of these
(xix) In software Engineering KPA denotes.
(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these
(xx) The ________ Process Model defines a series of events that will trigger transitions from state to state
for each of software engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these

(B) Please choose the most appropriate answer from the given set of answers to fill the
blanks.
11. During the program execution, temporary/intermediate values are stored in

_____________.
a. Registers
b. Peripherals
c. LAN
d. None of these
12. The objects can be inherited by _____________.
a. A single object only
b. Multiple objects
c. Both (a) and (b)
d. Either (a) or (a)
13. The operating system may perform _____________ operation to manage the memory
while running a large program.
a. Sorting
b. Scheduling
c. Paging
d. None of these
14. When the LAN is arranged in such a way that each computer is connected directly to the
HUB the configuration can be termed as _____________ network.
a. Bus
b. Star
c. Ring
d. None of these
15. To communicate with other computers over a telephone line the computer must have
_____________ installed.
a. Telephone set
b. Modem
c. LAN Card
d. None of these
16. When each item of data in a database is directly linked with every other item of data,
the database is called _____________.
a. Relational
b. Hierarchical
c. Network
d. None of these
17. _____________ is the most efficient method to reduce the duplication of data.
a. Duplication
c. Normalisation
c. Empty fields
d. None of these
18. The _____________ operation changes the coordinate values of objects being
displayed.
a. Transformation
b. Windowing
c. Both (a) and (b)
d. None of these
19. A linear sequential software development model is also referred to as ____________ .
a. Prototype Model
b. RAD Model
c. Spiral Model
d. None of these
20. State Transition Diagram gives information of ___________.
a. Data Flow

b. Entry Relationship
c. Control Flow
d. None of these

(B) Please choose the most appropriate answer from the given set of answers.
(11) State Transition Diagram gives information of
(a) Prototype Model
(b) RAD Model
(c) Spiral Model
(d) None of these
(12) The concept of meaning represented by an algorithm is known as its:
(a) Control Structure
(b) Sequence
(c) Semantics
(d) Syntax
(13) Each cell of memory is numbered and that number is referred to as the cells
(a) Block
(b) Identity
(c) Address
(d) Size
(14) Main memory is called RAM because
(a) It is volatile, like a rams temper.
(b) The computer starts at address 0 and reads every byte until it reaches the correct
address.
(c) It can Read all memory
(d) The memory is accessible randomly
(15) To use internet, the computer must have
(a) Telephone
(b) Modem
(c) ISP Connection
(d) All of the above

(B) Please choose^he most appropriate answer from the given set of answers. . (.1x5)
(11) What is the long form of 'CMOS'?
(a) Complimentary Metal Oxide Semiconductor
(b) Complex Metal Oxide Semiconductor
(c) Controller Metal Oxide Semiconductor
(d) Complimentary Metal Oxide Sets.
(12) What is a Y-Connector? '
(a) A'Y-Shaped splitter cable that divides a source input into two output signals.
(b) A Y-Shaped splitter connector that divides a source input into two output
signals.
(c) A Y-Shaped splitter card that divides'a source input into two output signals.
(d) None of the above.
(13) What do you mean by IBM-Compatible'?
(a) A computer that has a processor that is compatible vvith the original IBM PC.
(b) A computer that has a processor that is similar to original IBM PC
(c) A computer that has a casing that is similar original IBM PC.
(d) None of the above
(14) What do you mean by "virtual? Select'all that apply:

(a) In general, it distinguishes something that is merely conceptual from something that has
physical reality,
(b) Real
(c) Not real.
(d) None of the above
(15) Select correct statement describing a term 'stateless'?
(a) Having all information about what occurred previously
(b) Having some information aboot what occurred previously
(c) Having no information about what occurred previously
(d) Having new information about what occurred previously

i)

When all access and processing is done in one location, a computer system is
said to be
(a) networked
(b) distributed
(c) centralized
(d) linked
(ii) Tools to change PROM chips, called
(a) chip kits
(b) RAM burners
(c) PROM burners
(d) none of
these
(iii) The type of modulation that changes the height of the single is called (a)
frequency
(b) phase
(c) amplitude
(d) prophase
(iv) A connection for similar network:
(a) satellite
(b) bridge
(c) gateway
(d) fax
(v) The technology whereby part of the program is stored on disk and is brought
into memory for execution as needed is called
(a) memory allocation
(b) virtual storage
(c) interrupts
(d) prioritized memory

(B) Choose the most appropriate answer from the given set of options:
6) The processors components are synchronized by:
a. Instructions
b. Data
c. Information
d. Clock pulses
7) External devices are linked to a small computer system through:
a. Channels
b. Control units
c. Plugs
d. interfaces
8) Data on disk are recorded on a series of concentric circle called:
a. Sectors
b. Cylinders

c. Blocks
d. Tracks
9) The simplest data structure is a:
a. File
b. List
c. Record
d. Array
10) Several computers linked by communication lines for a:
a. Network
b. Distributed system
c. Time share system
d. Ring

(i) When all access and processing is done in one location, a computer system is said to be
(a) networked
(b) distributed
(c) centralized
(d) linked
(ii) Tools to change PROM chips, called
(a) chip kits
(b) RAM burners
(c) PROM burners
(d) none of
these
(iii) The type of modulation that changes the height of the single is called (a) frequency
(b) phase
(c) amplitude
(d) prophase
(iv) A connection for similar network:
(a) satellite
(b) bridge
(c) gateway
(d) fax
(v) The technology whereby part of the program is stored on disk and is brought into memory for
execution as needed is called
(a) memory allocation
(b) virtual storage
(c) interrupts
(d) prioritized memory
6) The processors components are synchronized by:
a. Instructions
b. Data
c. Information
d. Clock pulses
Ans. (d)
7) External devices are linked to a small computer system through:
a. Channels
b. Control units
c. Plugs
d. interfaces
Ans. (d)
8) Data on disk are recorded on a series of concentric circle called:
a. Sectors
b. Cylinders
c. Blocks
d. Tracks
Ans. (d)
9) The simplest data structure is a:
a. File
b. List
c. Record
d. Array
Ans. (d)
10) Several computers linked by communication lines for a:
a. Network

b. Distributed system
c. Time share system
d. Ring
Ans. (a)
11) What is Fast Ethernet?
(12) How do you add a workstation to the domain?
(13) What is the draw back of Array implementation of Collection?
(14) Briefly write the procedure for Binary Search.
(15) Conceptually what happens in a DBMS?
(16) Briefly describe ROM BIOS.
(17) How do you define PORTS? Name different types of ports.
(18) What is Password? Where and how will you use it?
(19) How do viruses infect PCs?
(20) Briefly describe Data Transmission Modes

1. Which of the following devices can be sued to directly image printedtext?


a. OCR
b. OMR
c. MICR
d. All of above
2. The output quality of a printer is measured by
a. Dot per inch
b. Dot per sq. inch
c. Dots printed per unit time
d. All of above
3. In analog computer
a. Input is first converted to digital form
b. Input is never converted todigital form
c. Output is displayed in digital form
d. All of above
4. In latest generation computers, the instructions are executed
a. Parallel only
b. Sequentially only
c. Both sequentially and parallel
d. All of above
5. Who designed the first electronics computer ENIAC?
a. Van-Neumann
b. Joseph M. Jacquard
c. J. Presper Eckert and John WMauchly
d. All of above
6. Who invented the high level language c?
a. Dennis M. Ritchie
b. Niklaus Writh
c. Seymour Papert
d. Donald Kunth
7. Personnel who design, program, operate and maintain computer equipmentrefers to
a. Console-operator
b. Programmer
c. Peopleware
d. System Analyst
8. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
a. 1978
b. 1984
c. 1990
d. 1991
9. Human beings are referred to as Homosapinens, which device is calledSillico Sapiens?
a. Monitor
b. Hardware
c. Robot
d. Computer
10. An error in software or hardware is called a bug. What is thealternative computer jargon for it?
a. Leech
b. Squid
c. Slug
d. Glitch
11. Modern Computer are very reliable but they are not
a. Fast

b. Powerful
c. Infallible
d. Cheap
12. What is the name of the display feature that highlights are of the screenwhich requires operator
attention?
a. Pixel
b. Reverse video
c. Touch screen
d. Cursor
13. IMB launched its first personal computer called IBM-PC in 1981. It hadchips from Intel, disk drives
from Tandon, operating system from Microsoft, theprinter from Epson and the application software from
everywhere. Can you namethe country which contributed the video display?
a. India
b. China
c. Germany
d. Taiwan
14. Personal computers use a number of chips mounted on a main circuitboard. What is the common
name for such boards?
a. Daughter board
b. Motherboard
c. Father board
d. Breadboard
15. In most IBM PCs, the CPU, the device drives, memory expansion slots andactive components are
mounted on a single board. What is the name of thisboard?
a. Motherboard
b. Breadboard
c. Daughter board
d. Grandmother board
16. What is meant by a dedicated computer?
a. Which is used by one person only
b. Which is assigned one and only onetask
c. Which uses one kind of software
d. Which is meant for application software
17. The system unit of a personal computer typically contains all of thefollowing except:
a. Microprocessor
b. Disk controller
c. Serial interface
d. Modem
18. A computer program that converts an entire program into machinelanguage is called a/an
a. Interpreter
b. Simulator
c. Compiler
d. Commander
19. A computer program that translates one program instructions at a timeinto machine language is called
a/an
a. Interpreter
b. CPU
c. Compiler
d. Simulator
20. A small or intelligent device is so called because it contains within ita
a. Computer
b. Microcomputer
c. Programmable
d. Sensor

Q.1. Select the best option/answer and fill in the appropriate box on the Answer Sheet. (20)
(i) Object (also called ____) is a common data type that includes photograph, audio, video, or a
document created in other applications.
(a) Number (b) BLOB (c) Integer (d) Binary (e) None of these
(ii) In a database, a(n) ____ is a group of related fields.

(a) Table (b) Key (c) Record (d) Primary Field (e) None of these
(iii) In a database, a(n) ____ field is a field that uniquely identifies each record in a file.
(a) Main (b) Identifying (c) Master (d) Key (e) None of these
(iv) If the lowest annual fee at a discount warehouse is Rs.2025 and the highest is Rs. 5550, a(n) ____
on the Annual Fee field ensures it is a value between Rs. 2025 and Rs. 5550.
(a) Range Check (b) Completeness Check (c) consistency check
(d) alphabetic/numeric check (e) None of these
(v) A DBMS uses the ____ to perform validation checks.
(a) Data Server (b) data mart (c) data warehouse (d) data dictionary
(e) None of these
(vi) _______ is a network technology that defines how messages are routed from one end of a
network to the other, ensuring the data arrives correctly by dividing it into packets.
(a) HTML (b) XML (c) HTTP (d) TCP/IP (e) None of these
(vii) When a computer sends data over the Internet, the data is divided into small pieces, or ____.
(a) Bundles (b) Packets (c) Slices (d) Baskets (e) None of these
(viii) The amount of data, instructions, and information that can travel over a communications channel
sometimes is called the ____.
(a) Broadband (b) Baseband (c) Latency (d) Bandwidth (e) None of these
(ix) Fiber-optic cables have all of the following advantages over cables that use wire except ____.
(a) lower costs and easier installation and modification
(b) faster data transmission and smaller size
(c) less susceptible to noise from other devices
(d) better security for signals during transmission
(e) None of these
(x) A _________ is a network that connects computers and devices in a limited geographical area,
such as a home, school computer laboratory, or office building.
(a) local area network (LAN) (b) metropolitan area network (MAN)
(c) wide area network (WAN) (d) variable area network (VAN) (e) None of these
(xi) With ____ memory, the operating system allocates a portion of a storage medium, usually the
hard disk, to function as additional RAM.
(a) Virtual (b) Performance (c) Device (d) Managed (e) None of these
(xii) If a new device, such as a printer or scanner, is attached to a computer, its ____ must be installed
before the device can be used.
(a) Driver (b) Platform (c) Manager (d) Kernel (e) None of these

(xiii) A ____ is an icon on the desktop that provides a user with immediate access to a program or file.
(a) Kernel (b) Spooler (c) Buffer (d) Shortcut (e) None of these
(xiv) _____________ a disk, or reorganizing it so the files are stored in contiguous sectors, speeds up
disk access and thus the performance of the entire computer.
(a) Formatting (b) Defragmenting (c) Spooling (d) Compressing (e) None of these
NOTE: (i) First attempt PART-I (MCQ) on separate Answer Sheet which shall be taken back
after 30 minutes.
(ii) Overwriting/cutting of the options/answers will not be given credit.
Roll NumberCOMPUTER SCIENCE
Page 2 of 4
(xv) The term, computer ____, describes a potentially damaging computer program that affects, or
infects, a computer negatively by altering the way the computer works without the users
knowledge or permission.
(a) Hotspot (b) file compression utility (c) virus
(d) file conversion utility (e) None of these
(xvii) Although used in all types of business modeling, the ____ has been adopted as a standard
notation for object modeling.
(a) UML (b) CASE Tool (c) USE CASE diagram
(d) EMR (e) None of these
(xviii) For each input and output, a systems analyst typically develops a(n) ____, which is a sample of
the input or output and contains actual data.
(a) Adaptation (b) Prototype (c) Mockup (d) feasibility scheme (e) None of these
(xix) A(n) ____ is a working model of a proposed system.
(a) adaptation (b) feasibility scheme (c) mockup (d) prototype (e) None of these
(xx) A unit test ____.
(a) verifies that each individual program works by itself ANS A
(b) verifies that all programs in an application work together properly
(c) verifies that an application works with other applications
(d) is performed by end-users and verifies that the new system works with actual data
(e) None of these

You might also like