1. A group of attribute/field in a database is known as a______. a) Record b) File c) Database d) Entry e) None 2.
A ______ describe a category of information in a table of database. a) Record b) File c) Entry d) Field e) None 3. A goal of data mining includes which of the following? a) To confirm that data exists b) To create a new data warehouse c) To analyze data for expected relationships d) To explain some observed event or condition e) None of the above 4. The correct hierarchical order, smallest to largest, for the following database terms is: a) File, Field, Record, Database b) File, Record, Field, Database c) Record, Field, File, Database d) Field, Record, File, Database e) None of the above 5. In RDBMS , DBA is responsible for: a) Physical database design b) Defining conceptual models and schema c) Defining security and integrity rules d) Defining backup and recovery mechanisms e) All the above
6. this causes _______. How many layers are present in Open System Interconnection (OSI) model of network architecture? a) Five b) Six c) Seven d) Eight e) None of these 10. a) Duplicate data b) Data redundancy c) Data inconsistency d) Information overload e) None 7. firstly make use of unit of data called “Packet”? a) Datalink Layer b) Transport Layer c) Network Layer d) Presentation Layer e) None
. Which device act as a traffic cop over a network? a) Modem b) Hub c) Switch d) Router e) None 9. When data changes in multiple lists and all lists are not updated. Which layer of OSI model. Which of the following programming method is used to minimize data errors when data is transferred over a network? a) Checksum b) Checkbit c) Cryptography d) Encryption e) None 8.
interprets and sees to the execution of program instructions? a) ALU b) Control Unit c) Register Unit d) Processing Unit e) None 15. a) Network Layer b) Session Layer c) Application Layer d) Presentation Layer e) None 12. The process of finding errors in software’s source code a) Debugging b) Compiling c) Testing d) Running e) None 17. The place where data or information is stored for a short time is a) Memory b) Control Unit c) Buffer d) ALU e) None 14. A computer programmer a) can draw only flowchart b) can enter data quickly
. maintained and terminated by _____ . Which program is used to convert assembly language to machine language? a) Compiler b) Interpreter c) Linker d) Assembler e) None 16. Which term identifies a specific computer on the web and the main page of the entire site? a) URL b) Hyperlink c) Web site address d) Domain name e) None of these 13. Communication between computers is established.11. The section of CPU which selects.
and (c) 19. A Trojan horse is a) An ad ware program b) A virus disguised as a useful program. (b). c) A program that blows up every time you use it d) A spy ware which steal information over internet e) None 20.c) does all the thinking for a computer d) can operate all type of computer equipment e) None 18. Primary Memory of a personal computer consists of a) RAM only b) ROM only c) Hard Disk only d) Both (a) and (b) e) All (a). Which one of the following is not true? a) HTTP Protocol is used to view a web page in a browser b) Android is Google’s operating system for mobile devices c) GHz is the measurement used to determine the speed of processor d) WAN requires the same technology as LAN e) All are true
The unit of hardware.Which is/are the main provisions of Information Technology (IT) Act. (b) Finalisation of contracts through electronic media.Computers can be classified in which of the following hierarchical orders? (a) PC. Which of these statements are correct? (a) I. Large. Super Computer. II and IV (b) I and IV (c) II.The computer device primarily used to provide hard copy is the (a) CRT (b) Line Printer (c) Computer Console (d) Card Reader Answer : B 4. 2000? (a) Legal recognition to digital signatures and documents. Super Computer (d) Large. It is often misused and has triggered cyber-crimes. It provides the most dependable and latest mode for sending E-mail. IV. which an operator uses to monitor computer processing.Which one of the following is a stored program machine? (a) Micro-processor (b) Calculator (c) Analog-computer (d) Micro-computer Answer : D 7. PC. Large. Super Computer (c) PC.Consider the following statements about Internet facilityAnswer : I. PC Answer : C 6. III and IV (d) II and III Answer : A 3. III. (c) Making hacking with computer system an office. Super Micro. (d) All of the above Answer : D 2. II. It serves as the largest one-line information system. Large. is the (a) Card Reader (b) CPU (c) Line Printer (d) Console Answer : D 5. Super Micro. Super Computer (b) Super Micro. Super Micro. Recurring expenditure on communication E-mail is very high.First generation computer systems used (a) Transistors (b) Vacuum tubes (c) Magnetic cores (d) Silicon chips Answer : B
* Win+Up arrow: Maximize the active window. * Ctrl+Win+number (1-9): Cycles through open windows for the application pinned to the taskbar is that position. * Shift+Win+Up arrow: Maximize the active window vertically. * Double-Click Top Window Border (edge). * Alt+Win+number (1-9): Opens the Jump List for the application pinned to the taskbar. or more: * Win+number (1-9): Starts the application pinned to the taskbar in that position.Transistors are associated with which computer system? (a) First generation (b) Fifth generation (c) Second generation (d) None of these Answer : C 9.Who wrote the book ‘Computer Liberation and Dream Machine’. * Shake window back/forth: Minimize everything but the current window. * Shift+Win+Left/Right arrows: Move the window to the monitor on the left or right. * Win+Down arrow: Minimize the window/Restore the window if it’s maximized. You can also interact with windows by dragging them with the mouse: * Drag window to the top: Maximize * Drag window left/right: Dock the window to fill half of the screen.
. the first book on personal computers? (a) John McCarthy (b) Ted Nelson (c) Niklaus Wirth (d) Karl Capek Answer : B
Windows Management Shortcuts * Win+Home: Clear all but the active window. * Shift+Win+number (1-9): Starts a new instance of the application pinned to the taskbar in that position. * Win+Left/Right arrows: Dock the window to each side of the monitor.Charles Babbage invented (a) ENIAC (b) Difference engine (c) Electronic computer (d) Punched card Answer : B 10. Taskbar Shortcuts You can use any of these shortcut combinations to launch the applications in their respective position on the taskbar.8. * Win+Space: All windows become transparent so you can see through to the desktop. or switches to that program.
* Shift+Right-Click on a file: Adds extra hidden items to the Send To menu.0 is actually named Windows Premiere Edition. * Ctrl+Click on a grouped taskbar button: Cycle through the windows of the group.Android. Windows 7 is the latest release of Microsoft Windows. * Shift+Right-Click on a file: Adds Copy as Path. which lets you easily open a command prompt in that folder. Here’s a few more interesting hotkeys for you: * Ctrl+Shift+N: Creates a new folder in Windows Explorer.* Win+T: Focus and scroll through items on the taskbar.Haiku Windows 1. * Shift+Right-click on a grouped taskbar button: Show the window menu for the group. which copies the path of a file to the clipboard. * Alt+P: Toggles the preview pane in Windows Explorer. you can interact with the taskbar using your mouse and a modifier key: * Shift+Click on a taskbar button: Open a program or quickly open another instance of a program. * Win+G: Cycle between the Windows Gadgets on your screen. and the necessary linkages for the control and synchronization of the computer’s hardware The Most popular operating systems presently in the market are Windows. a series of operating systems produced by Microsoft for use on personal computers.
Operating systems (OSes) provide a set of functions needed and used by most application-programs on a computer.0 is a 16-bit graphical operating environment that was released on 20 November 1985 .Debian GNU/Linux.0 was the first version of Windows launched.
. * Win+(+/-): Zoom in/out.Mac OS X. Windows 1. * Alt+Up: Goes up a folder level in Windows Explorer. including home and commercial use Debian GNU/Linux Non-commercial linux distribution. * Win+P: Adjust presentation settings for your display. * Ctrl+Shift+Click on a taskbar button: Open a program as an administrator. * Shift+Right-click on a taskbar button: Show the window menu for the program (like XP does). * Win+B: Focuses the System Tray icons In addition. The first release version of Windows 1. initiated by Ian Murdock on 16th August 1993 Mac OS 9 Apple’s operating system for PowerPC from 1999. * Shift+Right-Click on a folder: Adds Command Prompt Here.
consisting of programs and data. this is the official open source successor of BeOS. that runs on computers and manages the computer hardware and provides common services for efficient execution of various application software. 2001 as OpenBeOS. developed by google. For hardware functions such as input and output and memory allocation. encrypted data is referred to as cipher text. To read an encrypted file.(also called private-key encryption)
Operating system of a computer manages Ans : all the operations of a computer Software that can manipulate or destroy data or programs in a computer is known as Ans : Virus Binary Code’ used in computers makes use of which numbers Ans : 0 & 1 One kilobyte is equal to Ans : 1024 bytes
. There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption. although the application code is usually executed directly by the hardware.
An operating system (OS) is software. you must have access to a secret key or password that enables you to decrypt it. On the market since October 2008 Haiku Started in August 18th. Encryption is the most effective way to achieve data security. and Linux. Mac OS X. the operating system acts as an intermediary between application programs and the computer hardware.
What is Encryption The translation of data into a secret code. Operating systems are found on almost any device that contains a computer—from cellular phones and video game consoles to supercomputers and web servers. but will frequently call the OS or be interrupted by it. Examples of popular modern operating systems for personal computers are Microsoft Windows.Android OS Special operating system with linux kernel for smartphones. Unencrypted data is called plain text .
In addition.Who is the architect of Supercomputer Ans : Seymour Cray Which computer company introduced mouse for the first time Ans : Apple Corporation Who developed the World Wide Web first Ans : Timothy Berners Lee The first large scale. ROM ROM – Read-only memory: On ROM. temporarily relegating some contents from RAM to a disk. general purpose digital computer Ans : ENIAC ENIAC Ans : Electronic Numerical Integrator And Computer The shortcut key to print documents is Ans : Ctrl + P The function of key F4 in keyboard is Ans : to repeat the last action Name the first general purpose electronic computer Ans : UNIVAC
Virtual Memory Virtual Memory is a feature of an operating system that enables a process to use a memory (RAM) address space that is independent of other processes running in the same system. Most personal computers contain a small amount of ROM that stores critical programs such as the program that boots the computer. There are a few variations of ROM such as programmable read-only
. ROMs are used in calculators and peripheral devices such as laser printers. with little or no overhead. and use a space that is larger than the actual amount of RAM present. ROM is nonvolatile and it retains its contents regardless the computer is on or off. whose fonts are often stored in ROMs. data is prerecorded for read only which can not be removed.
RAM RAM – Random access memory: whose contents can be accessed (read. discs and drums. in which the mechanical movement of the storage medium forces the computer to access data in a fixed order. write and remove) in any order.
.memory(PROM). RAM is usually used for primary storage in computers to hold active information such as data and programs. This is in contrast to sequential memory devices such as magnetic tapes. Common forms of RAM are: SRAM (Static RAM) and DRAM (Dynamic RAM). which is manufactured as blank chips on which data can be written with a special device called a PROM programmer.