You are on page 1of 6

SET-A

1. In which topology, if a computer’s network cable is broken, whole network goes


down.
A. Bus
B. Star
C. Mesh
D. Ring

2. ISO OSI model is used in


A. Stand alone PC
B. Network environment
C. Cluster system
D. Internet

3. ISDN is an example of ______ network


A. Circuit switched
B. Packet switched
C. Circuit packet switched
D. None of these

4. X.25 is an example of ______ network


A. Circuit switched
B. Packet switched
B. Circuit packet switched
D. None of these

5. Print server uses ________ which is a buffer that holds data before it is send to the
printer.
A. Queue
B. Spool
C. Heap
D. Node

6. A standalone program that has been modified to work on a LAN by including


concurrency controls such as file and record locking is an example of____
A. LAN intrinsic software
B. LAN aware software
C. Groupware
D. LAN ignorant software

7. The ______ portion of LAN management software restricts access, records user
activities and audit data etc.
A. Configuration management
B. Security management
C. Performance management
D. System Management

8. Which of the following architecture uses CSMA/CD access method?


A. ARCnet
B. Ethernet
C. Internet
D. None of these
E. A, B, C

9. Which of the following system components is responsible for ensuring that the system
is working to fulfill its objective?
A. Outputs
B. Processing
C. Feedback
D. Control
E. Inputs.

10. Which of the following describes exchanges between a system and other systems or a
system and any external agencies?
A. Boundary
B. Interface
C. Suprasystem
D. Subsystem
E. Environment

11. Which category of computer-based information systems are concerned with


improving efficiency by applying information technology to common administrative
tasks, such as creating business documents?
A. Strategic information systems.
B. Business information systems
C. End user computing systems.
D. Expert systems
E. Office automation systems

12. What does the term UTM mean?


A. Universal Transverse Mercator
B. Universal Transfer Moniter
C. Universal Transver Merator
D. Universe Traverser Modifier
E. Universal transmitter Moniter

13. DNA computing is an


A. Infant Technology.
B. Nano Technology
C. Neural Technology
D. Cell Technology
14. A row in a database can also be called a domain.
A. True
B. False

15. In a networked web based GIS all communications must go through an internet map
server
A. True
B. False

16. In an OO database approach 'object = attributes + behaviour'.


A. True
B. False

17. Performing the same analysis in two different GIS software packages will always give
the same results.

A. True
B. False

18. Human factors influence the success of GIS as a decision support tool.

A. True
B. False

19. Will cut or scraped fingers cause identification issues with biometric systems?
A. Yes
B. No

20. Is it safe to rely on extensive use of remote PCs?


A. Yes
B. No

21. Which of the following is not a key concept that is part of our definition of GIS?
A. GIS technologies include GPS and remote sensing.
B. GIS includes both computer systems (hardware) and computer programs (software).
C. GIS can be used in all areas of modern science.
D. People are an important part of GIS.

22. Electronic Data Interchange (EDI) systems:


A. Commonly involve data transfer across a wide area network.
B. Can involve the electronic transmission of business transaction data over
telecommunications links between the computers of trading partners.
C. Can involve the exchange of transaction data among the branch offices of a single
organization.
D. Are used widely in the banking industry.
E. All Of Above
23. The applications backlog is:
A. One of the main reasons for the growth in end-user development.
B. A consequence of the ever increasing demand for business software applications.
C. A delay to the development of applications caused by staff shortages.
D. All of the Above
E. None of the above

24. The advantages of MM (Material Management) is:


A. Greater Accuracy.
B. Cost Control
C. Better Monitoring
D. All of the Above
E. None of the above

25. The applications backlog is:


A. Distance between Eyes
B. Width of Nose
C. Cheekbones
D. Chin
E. All of the Above

26. What are the Applications of Face Detection System..


A. Human Computer Interaction
B. Automatic Target recognition(ATR)
C. Missile Tracking
D. All of These
E. None of the Above

27. PSQL stands for:


A. Post SQL
B. Postgre SQL
C. PSQL
D. None of above

28. HPC stands for


A. High performance Computing
B. High performance compiler
C. High Performance code
D. None of Above

29. What are the components of SBC?


A. Brake operating Unit
B. Wheel Speed Sensors
C. Pressure hold
D. A , B
E. B, C
30. Which type of protocol kerberous is :
A. File Transfer Protocol
B. Security Protocol
C. Ethernet
D. All of above

31. Which is the first company who developed Push-to-Talk Technology..


A. Motorola
B. Nokia
C. Apple
D. Sony
E. HTC

32. JPEG stands for…..


33. ERP-SAP stands for……
34. ASISP stands for…..
35 The type of multiplexing is/are:
A. Angular
B. wavelength
C. Spatial
D. A, B, C
E. B , C

36 The Data transfer rate\Access Time of Holographic Memory is :


A. 10 GBPS\ 2.4 µs
B. 5 GBPS\ 3 µs
C. 100 MBPS\ 1 µs
D. None of Above

37 What is the avantages of Business Intelligence-


A. High responsiveness
B. Optimisation of operations
C. Fast execution
D. A, B
E. B, C

38 Which are the code that can be encoded by QR Code


A. Numeric
B. Alphanumeric
C. 8 bit Data type
D. KANJI
E. All of the above

39. The limitation of Siftables includes:


A. Ultra Small components
B. Bettery life
C. Sensor Network
D. All of above
E. A, B

40. Which of the following is the type of Sensors


A. polymer
B. MOSFET
C. Angular
D. A, B
E. A, C

41. Applications of Digital Scent Technology are:


A. Gaming
B. Medicine
C. Aromatheraphy
D. A, B
E. None of the above

42. RedTacton is:


A. Human Area Network (HAN)
B. Wide Area Network (WAN)
C. Local Area Network (LAN)
D. Public Area Network (PAN)
E. None of above
43. In which of the following is not the suitable component of intelligent
tutoring systems:
A. student model
B. communication model
c. Special environment model
d. Expert model

44. The three principles of AMR system are :


a. Openness, Abstraction and Modularity
b. Openness, Abstraction and Heterogeneity
c. Modularity, Abstraction and heterogeneity
d. None of these

45. In which of the following aspect, Robots can’t be used :


a. Medicine
b. Nuclear Energy
c. Environmental Changes
d. Customer Service

You might also like