Q.1.The metal or plastic case that holds all the physical parts of the computer is the:
A. System Unit.
B. CPU.
C. Mainframe.
D. Platform.
Answer A.
Q.2.------------- controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The Platform
B. The Operating System
C. Application Software
D. The Motherboard
Answer B.
Q.3.--------------is the science revolving around the use of Nano Structures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer A.
Q.4.Servers are computers that provide resources to other computers connected to a
A. Network.
B. Mainframe.
C. Super Computer.
D. Client.
Answer A.
Q.5.Word processing, spreadsheet, and photo-editing are examples of:
A. Application software.
B. System software.
C. Operating system software.
D. Platform software.
Answer A.
Q.6. The _______states that a foreign key must either match a primary key value in another relation or it must be null.
A. Entity integrity rule
B. Referential integrity constraint
C. Action assertion
D. Composite attribute
Answer A.
Q.7. An applet _______
A. Is an interpreted program that runs on the client
B. Tracks the number of visitors to a Website
C. Conceptual design translates the logical design into internal model
D. Logical design is software independent
Answer B.
Q.8. A ________sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk orthe master boot record of a hard disk.
A. System virus
B. Trojan horse virus
C. File virus
D. None of these
Answer D.
Q.9. Which error detection method uses one's complement arithmetic?
A. Simply parity check
B. Check sum
C. Two-dimensional parity check
D. CRC
Answer B
Q.10. A result of a computer virus can NOT lead to ________ .
A. Disk Crash
B. Mother Board Crash
C. Corruption of program
D. Deletion of files
Answer B
Q.11. Which one is not an examples of input devices :
A. Scanner.
B. Mouse.
C. Keyboard.
D. Printer.
Answer D
Q.12. A string of eight 0's Or 1's is called a:
A. Megabyte.
B. Byte.
C. Kilobyte.
D. Gigabyte.
Answer B
Q.13. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered
A. Data.
B. Output
C. Input.
D. Process
Answer B
Q.14. -------- is the study of molecules & structures whose size ranges from 1 to 100 Nanometers
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer A
Q.15. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. Robotics.
B. Simulation.
C. Computer forensics
D. Animation.
Answer C
Q.16. The network interface card of LAN is related to following layer of OSIModel
A. Transport
B. Network
C. Data Link & Physical
D. All of these
Answer D
Q.17. Which of the following does NOT describe a data warehouse?
A. Subject-oriented
B. Integrated
C. Time-variant
D. Updateable
Answer D
Q.18.Which of the following is TRUE ?
A. Logical design is software-dependent
B. In a distributed database, database is stored in one physical location
C. Conceptual design translates the logical design into internal model
D. Logical design is software independent
Answer A
Q.19. A range check ________
A. Ensures that only the correct data type is entered into a field
B. Verifies that all required data is present
C. Determines whether a number is within a specified limit
D. Tests if the data in two or more associated fields is logical
Answer C
Q.20.The total set of interlinked hypertext documents worldwide is-
A. · HTTP
B. · Browser
C. · WWW
D. · B2B
E. Answer A
A. Subject-oriented
B. Integrated
C. Time-variant
D. Updateable
Answer D
Q.18.Which of the following is TRUE ?
A. Logical design is software-dependent
B. In a distributed database, database is stored in one physical location
C. Conceptual design translates the logical design into internal model
D. Logical design is software independent
Answer A
Q.19. A range check ________
A. Ensures that only the correct data type is entered into a field
B. Verifies that all required data is present
C. Determines whether a number is within a specified limit
D. Tests if the data in two or more associated fields is logical
Answer C
Q.20.The total set of interlinked hypertext documents worldwide is-
A. · HTTP
B. · Browser
C. · WWW
D. · B2B
E. Answer A
No comments:
Post a Comment