Q.1
The linker:
(A)
is the same as loader
(B)
is required to create a load module
(C)
uses course code as input
(D)
is always used before program are executed
Q.2 What
does the acronym (ISDN) stand for?
(A) Integrated Services Digital network
(B) Integrated Standard Digital network
(C)Indian
Services Digital network
(D)
Integrated Services Data network
Q.3
In C language ,the “break” statement is used for to exit from:
(A)
a do loop
(B)
a for loop
(C)
a switch statement
(D)
all of the above
Q.4 Bulletin
board system:
(A)
is a public access message systems
(B)
is a modem capable of accepting commands
(C)
converts analog signals to digital signals
(D)
converts digital signal to analog signals
Q.5 You
can delete text in MS. Word By:
(A)
selecting the text and pressing the CTRL key
(B)
selecting the text and pressing the DELETE key
(C)
selecting the text and pressing the ALT+PAGEUP key
(D)
selecting the text and pressing the ESC key
Q.6
Indicate which one of the following best describes the tern Software?
(A)
Application programme only
(B)
Operating System Programme only
(C)
Control System
(D)Both
(A) and (B)
Q.7
Encryption is being used primarily with:
(A)
transaction entry
(B)
computer processing
(C)
file retention
(D)
data communication
Q.8---------------normally
certifies a site on the internet as secure site.
(A)
CRISIL
(B)
CRA
(C)
Verisign
(D)
None of the above
Q.9
Structured programs do not include:
(A)
Loops
(B)
GOTO statements
(C)
DO-WHILE statement
(D)
All of the above
Q.10
Data Integrity is refers to:
(A)
the privacy of the data
(B)
the simplicity of the data
(C)
the validity of the data
(D
)the security of the data
Q.11
In C++ , a function contained within a class is called.
(A)
a member function
(B)
an operator
(C)
a class function
(D)
a method
Q.12
A flip-flop can store:
(A)
One bit of data
(B)Two
bit of data
(C)Three
bit of data
(D)Any
number of bits of data
Q.13
Which language has recently become the defacto standard for interfacing
application programs with relational database system ?
(A)
Oracle
(B)
SQL
(C)
dBASE
(D)
4GL
Q.14
The basic goal of software engineering is to ------------
(A)
produce high quality software at low cost
(B)
modify programs
(C)
design systems and logic
(D)
produce high quality irrespective of cost
Q.15
Kernel is:
(A) considerd as the critical part of the operating systems
(A) considerd as the critical part of the operating systems
(B)
the software which monitors the operating system
(C)
the set of primitive functions upon which the rest of operating functions are
built-up
(D)
none of the above
Q.16
The OCR is stand for:
(A)
Outsized Character Reader
(B)
Optical Character Reader
(C)
Operational Character Reader
(D)
Only character Reader
Q.17
The first step in System Development Life Cycle is:
(A)
database design
(B)
system design
(C)
preliminary investigation and analysis
(D)
graphical user interface
Q.18
Selected the smallest memory size.
(A)
Terabyte
(B)
Gigabyte
(C)
Kilobyte
(D)
Megabyte
Q.19
A (n )----------- search begins the search with the first array element.
(A)Serial
(B)Random
(C)Parallel
(D)Binary
Q.20
Who is regarded as the Father of computers?
(A)Abascus
(B)John
Napier
(C)Pascal
(D)Charles
Babbage
Q21.
Which command brings you to the first slide in your Power Point Presentation ?
(A)Next
slide button
(B)PAGEUP
(C)CTRL+HOME
(D)CRTL+END
Q.22
Which of the following are typical characteristics of a RISC machine?
(A)Instruction
taking multiple cycles
(B)Highly
pipelined
(C)Multiple
Register sets
(D)Both
(B)and (C)
Q.23 Which
of the following might be the output as a result of using a CASE tool?
(A)programming
code
(B)flow
charts and data flow diagrams
(C)protypes
and cost /benefit analysis
(D)all
of the above
Q.24
Programming in a Laguage that actually controls the path of signals or data
within the computer is called:
(A)micro
programming
(B)
systems programming
(C)assembly
language programming
(D)
machine language programming
Q.25
Moving process from main memory to disk in computer terminology is called:
(A)scheduling
(B)caching
(C)swapping
(D)spooling
Q.26
Subclass in JAVA is also called:
(A)base
class
(B)child
class
(C)derived
class
(D)both
(B)and(C)
Q.27
To promote encapsulation ,JAVA provides an access modifier of type:
(A)public
(B)private
(C)protected
(D)none
of the these
Q.28Application
software :
(A)is
used to control the operating system
(B)includes
programs designed to help programmers
(C)perform
a specific task for computer users
(D)all
of the above
Q.29
Which of the following is not a characteristics of a relational database model?
(A)records
(B)complex
logical relationships
(C)treelike
structure
(D)tables
Q.30A
flip-flop circuit can be used for :
(A)counting
(B)scaling
(C)demodulation
(D)both
(A)and (B)
Q.31
RAM is used for as a short memory because it:
(A)is
volatile
(B)is
very expensive
(C)has
small capacity
(D)is
programmable
Q.32 Error detection at the data link level is
achieved by:
(A)Bit
stuffing
(B)Hamming
Codes
(C)Cyclic
redundancy code
(D)Equalization
Answer
Sheet:
Q.1
(A)
Q.2
(A)
Q.3
(D)
Q.4
(A)
Q.5
(B)
Q.6
(D)
Q.7
(D)
Q.8
(C)
Q.9
(B)
Q.10
(A)
Q.11
(A)
Q.12
(A)
Q.13
(B)
Q.14
(A)
Q.15
(C)
Q.16
(B)
Q.17
(C)
Q.18
(C)
Q.19
(A)
Q.20
(D)
Q.21
(C)
Q.22
(D)
Q.23
(D)
Q.24
(A)
Q.25
(C)
Q.26
( D)
Q.27
(C)
Q.28
(D)
Q.29
(C)
Q.30
(A)
Q.31
(A)
Q.32(C)
Read More:-Click Here
No comments:
Post a Comment