1. Program threats are
(a) Trap doors
(b) Trojan horse
(c) both ‘a’ and ‘b’
(d) Virus
ANSWER: (a)
2. Time during which a job is processed by the computer is
(a) Delay time
(b) Real time
(c) Execution time
(d) Down time
ANSWER (c)
3. Who invented the super-computer ?
(a) P.T. Farnsworth
(b) J .R. Whin field
(c) J.H. Van Tassell
(d) Charles Ginsberg
ANSWER (c)
4. The bar which displays information about the
current page number is
(a) Title bar
(b) Status bar
(c) Standard bar
(d) Formatting bar
ANSWER (b)
5. Which is not true of a correlated sub query?
(a) EXISTS/NOT EXISTS is a form of a correlated sub query
(b) The processing of the SELECT statements is nested
(c) They can be used to verify functional dependencies
(d) They are very similar to a regular sub query
ANSWER (d)
6. The data model that is produced from reverse engineering is
(a) A conceptual model
(b) An internal model
(c) A logical model
(d) None of the above is correct
ANSWER (a)
7. To drop a column that is used as a foreign key,first
(a) Drop the primary key
(b) Drop the table containing the foreign key
(c) Drop the foreign key constraint
(d) All of the above must be done
ANSWER (d)
8. a collection of related files is called as
(a) character
(b) Field
(c) database
(d) Record
(e) None of these
ANSWER (e)
9. …….is the process of finding errors in software code.
(a) compiling
(b) Testing
(c) Running
(d) debugging
(e) None of these
ANSWER (a)
10. Changing an existing document is called ......the document.
(a) Creating
(b) Editing
(c) Modifying
(d) Adjusting
(e) None of these
ANSWER (b)
11. Computers use the ......... number system to
store data and perform calculations.
(a) Decimal
(b) Hexadecimal
(c) Octal
(d) Binary
(e) None of these
ANSWER (d)
12. The ......... key will launch the Start button.
(a) Esc
(b) Shift
(c) Windows
(d) Shortcut
(e) None of these
aNSWER. (a)
13. When sending an e-mail, the ......... line
describes the contents of the message.
(a) To
(b) Subject
(c) contents
(d) cc
(e) None of these
ANSWER. (b)
14. Which of the following is the largest unit of storage ?
(a) Gb
(b) Kb
(c) Mb
(d) Tb
(e) None of these
ANSWER. (d)
15. Storage that retains its data after the power is
turned off is referred to as
(a) Volatile storage
(b) Non-volatile storage
(c) Sequential storage
(d) Direct storage
(e) None of the above
ANSWER (2)
16. because of the importance of making data model
changes correctly, many professionals are _____about using
an automated process for database redesign
(a) Optimistic
(b) Skeptical
(c) ambivalent
(d) Optimistic
ANSWER (b)
17.Which of the following is an example of connectivity ?
(a) Internet
(b) Floppy disk
(c) Power cord
(d) Data
(e) None of these
ANSWER (c)
18. a ....... contains specific rules and words that
express the logical steps of an algorithm.
(a) Syntax
(b) Programming structure
(c) Programming language
(d) Logic chart
(e) None of the above
ANSWER (c)
19. Virtual memory is .........
(a) Memory on the hard disk that the CPU uses as extended RAM
(b) In RAM
(c) Only necessary if you do not have any RAM in your computer
(d) A backup device for floppy disks
(e) None of the above
ANSWER (a)
20. The ......... tells the computer how to use its components.
(a) Utility
(b) Network
(c) Operating system
(d) Application program
(e) None of these
ANSWER. (c)
21. To save an existing file with new name or on new
location you should use ……….command.
(a) Save
(b) Save and replace
(c) Save as
(d) New file
(e) None of these
ANSWER. (c)
22. The part of CPU which coordinates the activities
of all other components of the computer is
(a) Mother board
(b) Coordination board
(c) Control Unit
(d) Arithmetic Logic Unit
(e) None of the above
ANSWER. (a)
23. …….fields store the numbers used for calculation in database.
(a) Next
(b) Key
(c) Alphanumeric
(d) Numeric
(e) None of these
ANSWER. (d)
24. Which of the following statements is true ?
(a) Virtual memory is the space on hard drive
where operating system starts storing the
data when it is memory-bound
(b) accessing data from RAM is slower than
accessing data from virtual memory
(c) When using the data from virtual memory,
operating system builds file named RAM
(d) If a computer is memory-bound, adding more
or extra RAM will not solve the problem
(e) None of the above
ANSWER. (a)
25. What kind of software manages the computer
processes functioning in the form of interphone,
connecting the application software ?
(a) System software
(b) Utility program
(c) Translator program
(d) Operating system
(e) None of these
ANSWER. (d)
No comments:
Post a Comment