Friday, 5 October 2012

Computer Fundamentals

Computer Fundamentals

1.MSI stands for
a. Medium Scale Intelligent Circuit
b. Medium System Integrated Circuits 
c. Medium System Intelligent Circuit
d. Medium Scale Integrated Circuits 

2.The metal disks, called __________  are permanently housed in sealed and contamination free containers.
a. Flexible disk
b. Winchester disk 
c. Floppy disk
d. Hard disks 


3.ALU is
a. None of above
b. Application Logic Unit
c. Array Logic Unit
d. Arithmetic Logic Unit 

4.CD-ROM stands for
a. Compactable Read Only Memory
b. Compact Data Read Only Memory
c. Compactable Disk Read Only Memory
d. Compact Disk Read Only Memory 

5.WAN stands for
a. Wireless Area Network
b. Wide Array Net
c. Wap Area Network
d. Wide Area Network 

6.Which factor  would strongly influence a business person to adopt a computer?
a. Reliability
b. Speed
c. All of above 
d. Accuracy

7.Chief component of first generation computer was
a. Vacuum Tubes and Valves 
b. Transistors
c. None of above
d. Integrated Circuits

8.The computer size was very large in
a. Second Generation
b. Third Generation
c. First Generation 
d. Fourth Generation

9.When was the first minicomputer built?
a. 1962 
b. 1971
c. 1966
d. 1965 

10.The capacity of 3.5 inch floppy disk is
a. 1.44 MB 
b. 1.40 GB
c. 1.44 GB
d. 1.40 MB

11.The memory address of the first element of an array is called?
a. foundation address
b. first address
c. floor address
d. base address 

12.What is the complexity of merge sort algorithm ?
a. O(n)
b. O(n log n) 
c. O(log n)
d. O(n2)

13.Identify the data structure which allows deletions at both ends of the list but insertion at only one end?
a. Input-restricted deque 
b. None of above
c. Priority queues 
d. Output-restricted deque

14.Which of the following is not the required condition for binary search algorithm?
a. The list must be sorted
b. There must be mechanism to delete and/or insert elements in list 
c. there should be the direct access to the middle element in any sublist
d. none of above

15.Which of the following case does not exist in complexity theory ?
a. Worst case 
b. Null case 
c. Average case
d. Best case

16.Which of the following is two way list?
a. linked list with header and trailer nodes 
b. grounded header list
c. none of above 
d. circular header list


17.Which of the following is not a limitation of binary search algorithm?
a. must use a sorted array
b. requirement of sorted array is expensive when a lot of insertion and deletions are needed
c. binary search algorithm is not efficient when the data elements are more than 1000
d. there must be a mechanism to access middle element directly

18.In a graph if e=(u, v) means ?
a. e begins at u and ends at v 
b. u is processor and v is successor
c. both b and c 
d. u is adjacent to v but v is not adjacent to u

19.A variable P is called pointer if?
a. P contains the address of an element in DATA. 
b. P can store only memory addresses 
c. P points to the address of first element in DATA
d. P contain the DATA and the address of DATA

20.What is the Average case occur in linear search algorithm ?
a. When Item is the last element in the array
b. When Item is not in the array at all 
c. When Item is the last element in the array or is not there at all
d. When Item is somewhere in the middle of the array 

21.Which of the following allows devices on one network to communicate with devices on another network ?
a. gateway 
b. t-switch
c. multiplexer
d. modem

22.What is VPN?
a. It is the connection of two or more private computer networks via a common routing technology (OSI Layer 3) using routers.
b. It is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. 
c. It is a large computer network that usually spans a city or a large campus.
d. It is a network used for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc

23.A __________ is a collection of computers and devices interconnected by communication channels.
a. Port
b. Printer
c. Network
d. Bridge

24.What is packet switching?
a. In complex networks when a series of packets sent from one host computer to another follow different routes to reach the same destination, it is called packet switching. 
b. In complex networks when a series of packets sent from one host computer to another follow same routes to reach the same destination, it is called packet switching.
c. In complex networks when a series of packets sent from one host computer to another follow same routes to reach the different destination, it is called packet switching.
d. In complex networks when a series of packets sent from one host computer to another follow different routes to reach different destination, it is called packet switching. 

25.What does a firewall do?
a. All of these
b. Does not do anything.
c. It creates a wall between two programs.
d. It secures the network by protecting it from unauthorized access while permitting legitimate communications to pass through it. 

26.On which layer of OSI model does a Bridge works?
a. Physical Layer
b. Network Layer 
c. Data link layer 
d. Application Layer

27.FTP, HTTP, E-mail, Telnet are all ______ protocols.
a. ATM
b. Netware
c. Token Ring
d. IP 

28.A set of network, under control of single administrator is known as
a. Internet 
b. Extranet
c. Work Area
d. Intranet 

29.In Network classification based on topology, network can be divided in to ____________ types.
a. Bus, Star, Ring, Tree and Mesh 
b. Bus, Ring, tree and mesh
c. None of these
d. Bus, star and Mesh

30.What is a brouter?
a. A bridge
b. A router
c. A network device which works as a bridge as well as router. 
d. None


31.Which of the following commands sends a directory listing to the printer ?
a. DIR < PRN
b. PRN > DIR
c. PRN < DIR 
d. DIR > PRN 

32.What is the full form of MS-DOS ?
a. MicroSoft Device Operating System
b. Microsoft Disk Operating System 
c. MicroSoft Disk Operating Space
d. MicroSoft Device Operating Space

33.Which of the following used to track the segments of the file ?
a. File Allocation Table 
b. Tree
c. Pipes
d. Filters

34.Which one is the beginning folder for all DOS paths ?
a. root 
b. desktop
c. home (wrong answer)
d. start

35.Which program does not run in DOS ?
a. Dbase
b. Lotus 1-2-3
c. Netscape Navigator 
d. Word Perfect

36.Which of the following correctly describes the main memory allocation in MS-DOS ?
a. Program with EXE extension are given all of the TPA, whether or not they need it
b. Program with the COM extension are given all of the TPA, whether or not they need it 
c. None of these
d. The amount of memory each application program actually owns does not depends upon the size of TPA 

37.When was MS-DOS first introduced ?
a. 1985 
b. 1980
c. 1981 
d. 1983

38.Which of the following commands causes the standard output from one command to be used as standard input to another command ?
a. Pipes 
b. Redirection
c. Filters 
d. Tree

No comments:

Post a Comment