Computer MCQs
1. The tracks on a
disk which can be accused without repositioning the R/W heads is
a. Surface
b. Cylinder
c. Cluster
d. All of these
e. None of these
Ans : b
2. Which of the following is true about GUIs ?
a. They make computers easier to use for non professionals
b. They use icons and menus that users can select with a mouse
c. Both a and b
d. All of these
e. None of these
Ans : c
3. A computer system consisting of its processor, memory and I/O devices
accepts data, processes it and produces the output results. Can you tell in
which component is the raw data fed ?
a. Mass Memory
b. Main Memory
c. Logic Unit
d. Arithmetic Unit
e. None of these
Ans : b
4. The mechanical diskette drive in which you insert your diskette is connected
to the computer's ________ bus
a. Data
b. Communication
c. Address
d. Parallel
e. None of these
Ans : b
5. A set of programs that handle firm's database responsibilities is called a
a. Data Base Management System (DBMS)
b. Data Base Processing System (DBPS)
c. Data Management System (DMS)
d. All of these
e. None of these
Ans : d
6. You are in the process of analyzing a problem that requires you to collect
and store TCP/IP Packets. Which of the following utilities is best suited for
this purpose ?
a. NBTSTAT
b. Performance Monitor
c. NETSTAT
d. Network Monitor
e. DHCP Management Console
Ans : d
7. A top to bottom relationship among the items in a database is established by
a
a. Hierarchical Schema
b. Network Schema
c. Relational Schema
d. All of these
e. None of these
Ans : a
8. The process of transferring data intended for a peripheral device into a
disk (or intermediate store) so that it can be transferred to peripheral at a
more convenient time or in bulk is known as
a. Multi Programming
b. Spooling
c. Caching
d. Virtual Programming
e. None of these
Ans : b
9. Which of the following system program forgoes the production of object code
to generate absolute machine code and load it into the physical main storage
location from which it will be executed immediately upon completion of the
assembly ?
a. Two pass assembler
b. Load and go assembler
c. Macro processor
d. Compiler
e. None of these
Ans : b
10. Relocation bits used by relocating loader are specified (generated) by
a. Relocating loader itself
b. Linker
c. Assembler or translator
d. Macro Processor
e. None of these
Ans : b
11. From what location are the 1st computer instructions available on boot up ?
a. ROM BIOS
b. CPU
c. Boot.ini
d. CONFIG.SYS
e. None of these
Ans : a
12. Abstraction is __________
a. The act of representing the essential features of something without
including much detail
b. The act of representing the features of something much detail
c. A tree structure
d. All of these
e. None of these
Ans : a
13. Aggregation is a special form of _____
a. Generalization
b. Spectalization
c. Association
d. Object
e. None of these
Ans : c
14. Consider an operation of addition. For two numbers, the operating will
generate a sum. If the operand are strings and the same operation would produce
a third string by concatenation. This feature is called
a. Inheritance
b. Encapsulation
c. Polymorphism
d. Binding
e. None of these
Ans : c
15. In E - R diagrams, the term cardinality is a synonym for the term ___
a. Attribute
b. Degree
c. Entities
d. Cartesian
e. None of these
Ans : b
16. An oracle server index ____
a. Is a schema object
b. Is used to speed up the retrieval of rows by using a pointer
c. Is independent of the table it indexes
d. All of these
e. None of these
Ans : d
17. Which of the following is not a context free grammar components ?
a. Terminal symbols
b. Non termincal symbol
c. Production line
d. List
e. None of these
Ans : d
18. Which of the following is a phase of RAD model ?
a. Business modeling
b. Data modeling
c. Application generation
d. All of these
e. None of these
Ans : d
19. ______ is a set design steps that allows a DFD with transform flow
characteristics to be mapped into a predefined template for program structure.
a. Transaction flow
b. Contributor
c. Transform mapping
d. Design evaluation
e. None of these
Ans : c
20. A combinational logic circuit which is used to send data coming from a
single source to two or more separate destinations is called as
a. Decoder
b. Encoder
c. Multiplexer
d. Demultiplexer
e. None of these
Ans : d
21. Which of the following is a Universal Gate ?
a. AND
b. OR
c. EX - OR
d. NAND
e. None of these
Ans : d
22. The 2's compliment of binary number 010111.1100 is
a. 101001.1100
b. 101000.0100
c. 010111.0011
d. 101000.0011
e. None of these
Ans : b
23. In 8086, the overflow flag is set when
a. The sum is more than 16 bits
b. Signed numbers go out their range after an arithmetic operation
c. Carry and sign flags are set
d. During subtraction
e. None of these
Ans : b
24. What does mircro processor speed depends on ?
a. Clock
b. Data bus width
c. Address bus width
d. All of these
e. None of these
Ans : c
25. The TRAP is one of the interrupts available its INTEL 8086. Which one
statement is true of TRAP ?
a. It is level triggered
b. It is negative edge triggered
c. It is positive edge triggered
d. It is both positive edge triggered and level triggered
e. None of these
Ans : d
26. A special type gateway that can keep external users from accessing
resources on the LAN users access the external info is called _____
a. Repeater
b. Firewall
c. Encryption
d. Hub
e. None of these
Ans : b
27. What is the name given to the exchange of control signals which is
necessary for establishing a connection between a modem and a computer at one
end of a line and another modem and computer at the other end ?
a. Handshaking
b. Modem Options
c. Protocol
d. All of these
e. None of these
Ans : a
28. In SQL, which command is used to change data in a data table ?
a. UPDATE
b. INSERT
c. BROWSE
d. APPEND
e. None of these
Ans : a
29. In SQL, which of the following is not a data definition language command ?
a. RENAME
b. REVOKE
c. GRANT
d. UPDATE
e. None of these
Ans : d
30. Which command(s) is(are) used to redefine a column of the table in SQL ?
a. ALTER TABLE
b. DEFINE TABLE
c. MODIFY TABLE
d. All of these
e. None of these
Ans : a
31. In a relational schema, each tuple is divided into fields called
a. Relations
b. Domains
c. Queries
d. All of the these
e. None of these
Ans : b
32. An indexing operation
a. Sorts a file using a single key
b. Sorts file using two keys
c. Establishes an index for a file
d. Both a and c
e. None of these
Ans : c
33. Data security threats include
a. Hardware failure
b. Privacy invasion
c. Fraudulent manipulation of data
d. All of these
e. None of these
Ans : b
34. The language used in application programs to request data from the DBMS is
referred to as the
a. DML
b. DDL
c. Query Language
d. DCL
e. None of these
Ans : a
35. A________ contains the smallest unit of meaningful data, so you might call
it the basic building block for a data file.
a. File Structures
b. Records
c. Fields
d. Data base
e. None of these
Ans : c
36. A ______ means that one record in a particular record type is related to
only one record of another record type.
a. One-to-one relationship
b. One-to-many relationship
c. Many-to-one relationship
d. Many-to-many relationship
e. None of these
Ans : a
37. Through linked list one can implement ____
a. Stack
b. Graph
c. Queue
d. All of these
e. None of these
Ans : d
38. A heap allows a very efficient implementation of a ____
a. Double ended queue
b. Priority queue
c. Stack
d. Trees
e. None of these
Ans : b
39. In files, there is a key associated with each record which is used to
differentiate among different records. For every file there is atleast one set
of keys that is unique. Such a Key is called ____
a. Unique Key
b. Prime attribute
c. Index key
d. Primary Key
e. Null key
Ans : d
40. _____ is primarily used for mapping host names and email destinations to IP
address but can also be used for other purposes
a. TCP (Transfer Control Protocol)
b. DNS (Domain Name System)
c. SHA (Secure Hash Algorithm)
d. Simple Network Management Protocol (SNMP)
e. None of these
Ans : b
41. Override is a method ____
a. For an operation that replaces an inherited method for the same operation
b. For a data that replaces an inherited method for the same operation
c. For an operation that takes arguments from library function
d. All of these
e. None of these
Ans : a
42. Local Variables ______
a. Are created outside a block
b. Are known only to that block
c. Continue to exist when their block ends
d. Are illegal in C++
e. None of these
Ans : b
43. ______ is virus that inserts itself into a system's memory. Then it take
number of actions when an infected file is executed.
a. Web scripting virus
b. Polymorphic Virus
c. Macro virus
d. Boot sector virus
e. Resident virus
Ans : e
44. This _____ data mining technique derives rules from real world case examples.
a. Waterfall model
b. RAD
c. White Box
d. Spiral model
e. Case based reasoning
Ans : e
45. The ____ model remains operative until the software is required.
a. Waterfall model
b. Incremental model
c. Spiral model
d. Prototyping model
e. Incremental model
Ans : c
46. Data mining evolve as a mechanism to cater the limitations of ____ systems
to deal massive data sets with high dimensionality, new data type, multiple
heterogeneous data resource etc..
a. OLTP
b. OLAP
c. DSS
d. DWH
e. None of these
Ans : a
47. An important application of cryptography, used in computerized commercial
and financial transaction ____
a. Data mining
b. Data warehousing
c. Digital signature
d. Media convergence
e. None of these
Ans : c
48. Rows of a relation are called __
a. Relation
b. Tuples
c. Data structure
d. An entity
e. None of these
Ans : b
49. The drawbacks of the binary tree sort are remedied by the
a. Linear sort
b. Quick sort
c. Heap Sort
d. Insertion sort
e. None of these
Ans : c
50. Which layer of OSI determines the interface of the system with the user ?
a. Network
b. Application
c. Data link
d. Session
e. None of these
Ans : b
0 Comments