You are on page 1of 6

1.

UNIVAC is
A) Universal Automatic Computer
B) Universal Array Computer
C) Unique Automatic Computer
D) Unvalued Automatic Computer
2. The basic operations performed by a computer are
A) Arithmetic operation
B) Logical operation
C) Storage and relative
D) All the above
3. The two major types of computer chips are
A) External memory chip
B) Primary memory chip
C) Microprocessor chip
D) Both b and c
4. Microprocessors as switching devices are for which
generation computers
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
5. What is the main difference between a mainframe and
a super computer?
A) Super computer is much larger than mainframe computers
B) Super computers are much smaller than mainframe
computers
C) Supercomputers are focused to execute few programs as
fast as possible while mainframe uses its power to execute as
many programs concurrently
D) Supercomputers are focused to execute as many programs
as possible while mainframe uses its power to execute few
programs as fast as possible.
6. ASCII and EBCDIC are the popular character coding
systems. What does EBCDIC stand for?
A) Extended Binary Coded Decimal Interchange Code
B) Extended Bit Code Decimal Interchange Code
C) Extended Bit Case Decimal Interchange Code
D) Extended Binary Case Decimal Interchange Code

C) disk pack in disk surface


D) All of above
9. The two kinds of main memory are:
A) Primary and secondary
B) Random and sequential
C) ROM and RAM
D) All of above
10. A storage area used to store data to a compensate for
the difference in speed at which the different units can
handle data is
A) Memory
B) Buffer
C) Accumulator D) Address
11. Computer is free from tiresome and boardoom. We
call it
A) Accuracy
B) Reliability
C) Diligence
D) Versatility
12. Integrated Circuits (Ics) are related to which
generation of computers?
A) First generation
B) Second generation
C) Third generation
D) Fourth generation
13. CD-ROM is a
A) Semiconductor memory
B) Memory register
C) Magnetic memory
D) None of above
14. A hybrid computer
A) Resembles digital computer
B) Resembles analogue computer
C) Resembles both a digital and analogue computer
D) None of the above
15. Instruction in computer languages consists of
A) OPCODE
B) OPERAND
C) Both of above
D) None of above

7. The brain of any computer system is


A) ALU
B) Memory
C) CPU
D) Control unit
8. Storage capacity of magnetic disk depends on
A) tracks per inch of surface
B) bits per inch of tracks

16. Which generation of computer is still under


development
A) Fourth Generation
B) Fifth Generation

C) Sixth Generation
D) Seventh Generation
17. A register organized to allow to move left or right
operations is called a ____
A) Counter
B) Loader
C) Adder
D) Shift register
18. Which was the most popular first generation
computer?
A) IBM 1650
B) IBM 360
C) IBM 1130
D) IBM 2700
19. Which is considered a direct entry input device?
A) Optical scanner
B) Mouse and digitizer
C) Light pen
D) All of the above
20. A set of information that defines the status of
resources allocated to a process is
A) Process control
B) ALU
C) Register Unit
D) Process description
21. The Bankers algorithm is used
a. to rectify deadlock
b. to detect deadlock
c. to prevent deadlock
d. to slove deadlock

24. Finding the location of the element with a given


value is:
a. Traversal
b. Search
c. Sort
d. None of above
25. Which of the following case does not exist in
complexity theory
a. Best case
b. Worst case
c. Average case
d. Null case
26. The operation of processing each element in the list
is known as
a. Sorting
b. Merging
c. Inserting
d. Traversal
27. Arrays are best data structures
a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure
are constantly changing
c. for both of above situation
d. for none of above situation

28. Which one of the following is not a fundamental data


type in C++
a. float
b. string
c. int

22. The primary purpose of an operating system is a

d. wchar_t

a. To make the most efficient use of computer hardware


b. To allow people to use the computer
c. To keep system programmer employed
d. To make computer easier to use

29. Which of the following is a valid destructor of the class


name Country

23. Two main measures for the efficiency of an algorithm


are
a. Processor and memory
b. Complexity and capacity
c. Time and space
d. Data and space

a. int ~Country()
b. void Country()
c. int ~Country(Country obj)
d. void ~Country()

30. Which of the following correctly describes C++


language?
a. Statically typed language
b. Dynamically typed language
c. Both Statically and dynamically typed language
d. Type-less language

31. Which of the following keyword supports dynamic


method resolution?
a. abstract
b. Virtual
c. Dynamic
d. Typeid

32. Which of the following is the most preferred way of


throwing and handling exceptions?
a. Throw by value and catch by reference.

34. A webpage displays a picture. What tag was used to


display that picture?
a. picture
b. image
c. img
d. src
35. <b> tag makes the enclosed text bold. What is other
tag to make text bold?
a. <strong>
b. <dar>
c. <black>
d. <emp>
36. Tags and test that are not directly displayed on the
page are written in _____ section.
a. <html>
b. <head>
c. <title>
d. <body>
37. Which tag inserts a line horizontally on your web
page?
a. <hr>
b. <line>
c. <line direction=horizontal>
d. <tr>
38. What should be the first tag in any HTML document?
a. <head>
b. <title>
c. <html>
d. <document>

b. Throw by reference and catch by reference.


c. Throw by value and catch by value
d. Throw the pointer value and provide catch for the pointer
type.

33. Which of the following is not true about preprocessor


directives
a. They begin with a hash symbol
b. They are processed by a preprocessor
c. They form an integral part of the code
d. They have to end with a semi colon

39. Which tag allows you to add a row in a table?


a. <td> and </td>
b. <cr> and </cr>
c. <th> and </th>
d. <tr> and </tr>
40. How can you make a bulleted list?
a. <list>
b. <nl>
c. <ul>
d. <ol>
41. How can you make a numbered list?
a. <dl>
b. <ol>
c. <list>
d. <ul>

What is a collection of
42 interrelated data and a set
.. of programs to access
those data?
52. OSI stands for
A.
DBMS
a) open system
interconnection
B.
Data structure b) operating system interface
c) optical service
implementation
C.
Class
d) none of the mentioned
D.

Database

Data redundancy lead to


43 higher storage and access
. cost. it may lead to
____________.
A.
data isolation
B.

data

inconsistency
C.
intergritity
problem
D.
atomicity

Logical
View

D.

Hardware.

layer?

b) 5

a) routing

c) 6

b) inter-networking

d) 7

c) congestion control

d) none of the mentioned

54. TCP/IP model does not

View Answer

have ______ layer but OSI


model have this layer.

60. Stack is also called as

a) session layer

A) Last in first out

b) presentation layer

View

D.

Logical

C) Last in last out

55. Which layer links the


network support layers and
user support layers
a) session layer

61. When new data are to be inserted into a data structure,


but there is not available space; this situation is usually called
....
A. Underflow

c) transport layer

B. overflow

d) network layer

C. houseful

b) physical layer
c) transport layer

C.

B) First in last out

D) First in first out

Which is the highest level the packets from _____ and


45 of abstraction describe
encapsulates them into frames
. only part of the entire
database?
for transmission.
A.
User
a) network layer
Physical

d) none of the mentioned

a) 4

56. The data link layer takes

B.

c) packets

59. Which one of the following is not a function of network

b) data link layer


C.

b) frames

layers.

d) both (a) and (b)

B.

a) bits

53. The OSI model has ___

c) application layer
Which is lowest level of
44 abstraction describe how
. the data are actually
stored?
A.
Physical

58. The network layer concerns with

d) application layer

57. Which one of the


following task is not done

____________ level of
by data link layer?
abstraction describes what
a) framing
46 data are stored in the
. database and what
b) error control
relationship exist among

D. saturated
62. ......... form of access is used to add and remove nodes
from a queue.
A. LIFO, Last In First Out
B. FIFO, First In First Out
C. Both a and b
D. None of these
63. ........ form of access is used to add remove nodes from
a stack.

A.

Physical

B.

View

C.
A. LIFO

Logical

B. FIFO
D.

None

A. Direct graph
B. Digraph
C. Dir-graph

C. Both A and B
D. Digraph
The implementation
of the
D. None
of these
simple structure at the
levelare
may
involve
64. logical
New nodes
added
to the ......... of the queue.
complex physical level
47
structure, the user of the
A. Front
.
logical level does not need
to be aware of this
B. Back
complexity this is called as
____________.
C. Middle
A.
Logical data
D. Both A and B
independence.
65. The retrieval of items in a stack is ........... operation.
B.
Physical data

70. A terminal node in a binary tree is called ............


A. Root
B. Leaf
C. Child
D. Branch
71. Which indicates pre-order traversal?
A. Left sub-tree, Right sub-tree and root

A. push
B. Right sub-tree, Left sub-tree and root
B. pop
C. Root, Left sub-tree, Right sub-tree
C. retrieval
D. Right sub-tree, root, Left sub-tree
D. access
72. In a graph if e=[u,v], Then u and v are called ........
66. Stack follows the strategy of ........
A. End points of e
A. LIFO
B. Adjacent nodes
B. FIFO
C. Neighbours
C. LRU
D. All of the above
D. RANDOM
67. Deletion operation is done using ......... in a queue.

73. The primary key is selected from the:

A. front
B. rear
C. top
D. list
68. The operation of processing each element in the list is
known as ......

A.

composite keys.

B.

determinants.

C.

candidate keys.

D.

foreign keys.

74. Which of the following is a group of one or more attributes


that uniquely identifies a row?

A. sorting

A.

Key

B.

Determinant

B. merging

C.

Tuple

D.

Relation

C. inserting
D. traversal
69. Other name for directed graph is ..........

75. A relation is in this form if it is in BCNF and has no


multivalued dependencies:
A.

second normal form.

B.

third normal form.

C.

fourth normal form.

D.

domain/key normal form.

You might also like