computer general knowledge and computer question answers for competative exams
Post on 14-Apr-2015
191 Views
Preview:
DESCRIPTION
TRANSCRIPT
http://www.yoursyllabus.blogspot.com
1. A parallel port is most often used by
(A) Mouse (B) Monitor
(C) Printer (D) Keyboard
Ans: C
2. Blue tooth technology allows:
(A) Landline phone to mobile phone communication
(B) Wireless communication between equipments
(C) Signal transmission on mobile phones only
(D) Satellite television communication
Ans: B
3. Which of the following is an example of an optical disk?
(A) Memory disk (B) Magnetic disk
(C) Hard disk (D) Digital versatile disk
Ans: D
4. Which of the following is(are) an example of storage devices?
(A) Tapes (B) DVDs
(C) Magnetic disks (D) All of these
Ans: D
5. IC chips used in computers are made of
(A) Silicon (B) Chromium
(C) Lead (D) Silver
Ans: A
6. Which of the following is not an example of Operating System?
(A) Microsoft Office (B) Windows Vista
(C) Unix (D) Ubuntu Linux
Ans: A
7. Which supercomputer is developed by the Indian Scientists?
(A) Sequoia (B) Param
(C) Mira (D) Jaguar
Ans: B
8. 'OS' in computer system means ?
(A) Open System (B) Open Software
(C) Operating System (D) All of these
http://www.yoursyllabus.blogspot.com Ans: C
9. '.MOV' extension refers to:
(A) Word file (B) Text file
(C) Image file (D) Movie file
Ans: D
10. '.MPG' extension refers to:
(A) Word file (B) Text file
(C) Image file (D) Movie file
Ans: D
11. '.INI' extension refers to:
(A) Image file (B) System file
(C) Movie file (D) Word file
Ans: B
12. Select the odd term out?
(A) Windows (B) Linux
(C) Unix (D) Internet
Ans: D
13. What is the full form of WWW in Internet?
(A) World Wide Web (B) World Wide Word
(C) World Wide Wood (D) None of these
Ans: A
14. Which Command is used to reboot the computer?
(A) Ctrl+Shift+Del (B) Ctrl+Del+End
(C) Ctrl+Alt+Del (D) Both (A) and (C)
Ans: C
15. The blinking symbol on the computer screen:
(A) Mouse (B) Cursor
(C) Character (D) Blinker
Ans: B
16. Which of the following refers to a small local network?
(A) LAN (B) WAN
(C) MAN (D) SLN
Ans: A
17. ATM means?
http://www.yoursyllabus.blogspot.com
(A) Any Time Money (B) Automatic Tele Money
(C) Automatic Teller Machine (D) Any Time Marketing
Ans: C
18. The term PC means?
(A) Personal Computer (B) Public Computer
(C) Private Computer (D) Professional Computer
Ans: A
19. A Laser printer is:
(A) an input device (B) an output device
(C) both (A) and (B) (D) None of these
Ans: B
20. Which one of the following is not a computer language?
(A) Java (B) COBOL
(C) ASP (D) LOTUS
Ans: D
1. LAN stands for
(A) Local And National (B) Local Area Network
(C) Large Area Network (D) Live Area Network
Ans: B
2. Which of the following statement is correct?
(A) Modem is a software
(B) Modem helps in stabilizing the voltage
(C) Modem is the operating system
(D) Modem converts the analog signal into digital signal and vice-versa
Ans: D
3. Which of the following is the appropriate definition of a computer ?
(A) Computer is a machine that can process information.
(B) Computer is an electronic device that can store, retrieve and process both qualitative and quantitative
data quickly and accurately.
(C) Computer is an electronic device that can store, retrieve and quickly process only quantitative data.
(D) Computer is a machine that can store, retrieve and process quickly and accurately only qualitative
information
Ans: B
4. Information and Communication Technology includes
(A) On line learning
(B) Learning through the use of EDUSAT
http://www.yoursyllabus.blogspot.com
(C) Web Based Learning
(D) All the above
Ans: D
5. Which of the following is the appropriate format of URL of e-mail?
(A) www_mail.com (B) www@mail.com
(C) WWW@mail.com (D) www.mail.com
Ans: B
6. Line access and avoidance of collision are the main functions of
(A) the CPU (B) the monitor
(C) network protocols (D) wide area networks
Ans: C
7. In the hypermedia database, information bits are stored in the form of
(A) signals (B) cubes
(C) nodes (D) symbols
Ans: A
8. Communications bandwidth that has the highest capacity and is used by microwave, cable and fibre
optic lines is known as ------
(A) hyper-link (B) broadband
(C) bus width (D) carrier wave
Ans: B
9. An electronic bill board that has a short text or graphical advertising message is referred to as
(A) bulletin (B) strap
(C) bridge line (D) banner
Ans: B
10. Which of the following is not the characteristic of a computer?
(A) computer is an electrical machine
(B) computer cannot think at its own
(C) computer processes information error free
(D) computer can hold data for any length of time
Ans: A
11. ICT Stands for
(A) International Communication Technology
(B) Intera Common Terminology
(C) Information and Communication Technology
(D) Inter Connected Terminals
http://www.yoursyllabus.blogspot.com
Ans: C
12. Which of the following statement is not correct?
(A) Computer is capable of processing only digital signal
(B) Computer is capable of analysing both quantitative and qualitative data
(C) Appropriate software is required for processing the data
(D) Computer is capable of processing digital as well as analog signals
Ans: A
13. Which of the following is the appropriate definition of Information Technology?
(A) Information Technology refers to the use of hardware and software for processinginformation
(B) Information Technology refers to the use of hardware and software for distribution of useful information
(C) Information Technology refers to the use of hardware and software for storage, retrieval, processing and
distributing information of many kinds
(D) Information Technology refers to the use of principles of Physical sciences and Social sciences
for processing of information of many kinds
Ans: C
14. Which of the following statement is correct?
(A) Virus improves the speed of processing information through computer
(B) Internet does not allow the virus to spread
(C) Virus is a part of software
(D) Virus is an operating system
Ans: C
15. Which of the following is correct statement?
(A) Computers can be used for diagnosing the difficulty of a student in learning a subject
(B) Psychological testing can be done with the help of computer provided a software is available
(C) A set of instructions is called a programme
(D) All of the above
Ans: D
16. Education combined with entertainment is called —————
(A) Simulation (B) CAI
(C) Edutainment (D) Synchronization
Ans: C
17. Pick out E-commerce application from the following
(A) DTP (C) SQL
(C) Tally (D) ATM
Ans: D
18. Which of the following is not a browser program ?
http://www.yoursyllabus.blogspot.com (A) MOSAIC (B) Windows Explorer
(C) Internet Explorer (D) Netscape Navigator.
Ans: B
19. A kiosk offers —————
(A) Digital Certificate (B) Touch Screen Application
(C) Internet Services (D) None of these
Ans: C
20. VAN refers to—————
(A) Virtual Analog Network (B) Value Added Network
(C) Variable Address Network (D) Virtual Additional Network
Ans: B
1. The Institution set up by the Government of India to provide computer based information services to
government departments
(A) C-DIT (B) CDAC
(C) NIC (D) DOEACC
Ans: C
2. Information Communication Technology (ICT) involves primarily
(A) Enrichment of existing knowledge
(B) Installation of equipments
(C) Storage and communication of information
(D) Use of technology for teaching
Ans: C
3. For use of ICT, teachers should be familiar with
(A) Programming (B) Browsing
(C) Planning (D) Handling of audio-visual aids
Ans: B
4. Cloud computing means
(A) Computing using the satellite
(B) Computing using cloud chamber technology
(C) Computing which results in errors
(D) Shifting computing power from offline PCs and Laptops onto the Web
Ans: D
5. URL is a term associated with
(A) Computer hardware (B) Internet
(C) Laser printer (D) Fax
Ans: B
http://www.yoursyllabus.blogspot.com
6. 1 GB is equal to
(A) 10000 KB (B) 1073741824 KB
(C) 1048576 KB (D) 100000 KB
Ans: C
7. Computer virus is
(A) A micro organism
(B) A useful computer component
(C) Electro magnetic waves entering the computer from internet
(D) A programme
Ans: D
8. Rohith was asked to prepare a multimedia presentation as part of a seminar. Which of the following
software can be made use of?
(A) Notepad (B) Excel
(C) Power Point (D) Adobe Reader
Ans: C
9. In internet terminology IP means
(A) Internet Provider (B) Internet Protocol
(C) Internet Procedure (D) Internet Processor
Ans: B
10. Which one of the following is not a search engine?
(A) Bing (B) Google
(C) Yahoo (D) Windows
Ans: D
11. CLASS is the acronym for
(A) Computer, Language and School Studies
(B) Computer, Literacy and Studies in Schools
(C) Computer, Language and Secondary Schools
(D) Computer, Learning and School Studies
Ans: B
12. SITE stands for
(A) Satellite Instructional Technology and Engineering
(B) State Institute of Teacher Education
(C) Satellite Instructional Television Experiment
(D) State Institute of Technology and Engineering
Ans: C
13. ICT (Information and Communication Technology) includes:
http://www.yoursyllabus.blogspot.com
(A) E-mail (B) Internet
(C) Educational TV (D) All the above
Ans: D
14. Where was the first computer installed in India?
(A) Indian Statistical Institute, Kolkata
(B) Indian Institute of Statistics, Delhi
(C) Indian Institute of Science, Bangalore
(D) Indian Institute of Management, Ahmedabad
Ans: A
15. A network that links across metropolitan, regional and national boundaries is called:
(A) MAN (B) LAN
(C) WAN (D) VAN
Ans: C
16. The Father of Modern Computer is:
(A) Charles Babbage (B) Blaize Pascal
(C) Howard Icons (D) Shanon
Ans: A
17. UNIX, DOS and Windows are examples of:
(A) Application Programmes (B) Operating Systems
(C) Word Processing (D) Commercial Computer Brands
Ans: B
18. Which is not a search engine?
(A) Microsoft (B) Alta Vista
(C) Google (D) Search Bug
Ans: A
19. The presentation package and slides are usually presented by:
(A) Power Point (B) Excel
(C) MS Word (D) All the above
Ans: A
20. What is the storage capacity of a single layered Blue Ray disc?
(A) 80 GB (B) 50 GB
(C) 10 GB (D) 25 GB
Ans: D
21. What is the storage capacity of a dual layered Blue Ray disc?
(A) 80 GB (B) 50 GB
http://www.yoursyllabus.blogspot.com
(C) 10 GB (D) 25 GB
Ans: B
22. What is the storage capacity of a CD ROM?
(A) 700 MB (B) 500 MB
(C) 7000 MB (D) 4.7 GB
Ans: A
23. What is the storage capacity of a DVD?
(A) 700 MB (B) 500 MB
(C) 7000 MB (D) 4.7 GB
Ans: D
24. What combination of short cut keys will you use to change a text in upper case to lower case in MS
Word?
(A) Ctrl+L (B) Shift+F3
(C) Ctrl+Shift+A (D) Shift+Alt+F5
Ans: B
25. Which Nobel Laureate is also known as the Father of Artificial Intelligence?
(A) Herbert A. Simon (B) Howard Aiken
(C) Charles Babbage (D) Alan Turing
Ans: A
1. In cyber crimes,
(A) The computer is a tool (B) The computer is a target
(C) Both (A) and (B) (D) Neither (A) nor (B)
Ans: C
2. Which of the following is not an operating system?
(A) Linux (B) Mozilla
(C) Macintosh (D) Windows
Ans: B
3. Statistical calculations and preparation of tables and graphs can be done using
(A) Adobe Photoshop (B) Excel
(C) Notepad (D) Power Point
Ans: B
4. Nod 32, Norton and Panda are
(A) Search engines (B) Operating Systems
(C) Antivirus software (D) Internet browsers
Ans: C
http://www.yoursyllabus.blogspot.com
5. EDUCOMP
(A) Reaches out to the entire education cycle – preschool toddlers to post graduatestudents
(B) Delivers the core curriculum subjects at school and college levels as well as vocational and
employability skills
(C) Empowers with IT education and IT enabled learning
(D) All of the above
Ans: D
6. Identify a web browser from the following
(A) Yahoo (B) Internet Explorer
(C) Bing (D) DuckDuckGo
Ans: B
7. Which is not a social networking site?
(A) Google Plus (B) Wink
(C) LinkedIn (D) Buzz
Ans: B
8. Which of the following is a wrong direction to guard against a ‘Phishing’ attack?
(A) Log on to a site by typing the proper URL in the address bar
(B) Ensure that the URL of the login page starts with http:// and not https://
(C) Give user id and password only at authenticated login page
(D) Look for the lock sign/icon and verisign certificate
Ans: B
9. Which of the following is not suitable for preparation of learning materials?
(A) NETLOG (B) ERIC
(C) PROQUEST (D) UTUBE
Ans: A
10. Nimbuz, Pidgin and Trillion are software used for
(A) Blogging (B) Chatting
(C) Surfing (D) All of the above
Ans: B
11. WWWW, in computer parlance, stands for
(A) World Wide Web Worm (B) World Wide Wildlife Web
(C) World Wide Women’s Web (D) World Wide Women’s Week
Ans: A
12. One kilobyte (KB) is equal to
(A) 1000 bytes (B) 1024 bytes
(C) 1024 bits (D) 1023 bytes
http://www.yoursyllabus.blogspot.com Ans: B
13. One megabyte (MB) is equal to
(A) 1023 kilobytes (B) 1000 bytes
(C) 100 kilobytes (D) 1024 kilobytes
Ans: D
14. One Gigabyte (GB) is equal to
(A) 1000 megabytes (B) 2048 megabytes
(C) 2023 megabytes (D) 1024 megabytes
Ans: D
15. 8 bits forms a
(A) byte (B) nibble
(C) kilobyte (D) None of the above
Ans: A
16. One Terabyte (TB) is equal to
(A) 1000 megabytes (B) 2048 megabytes
(C) 1024 gigabytes (D) 1024 megabytes
Ans: C
17. Super computer developed by Indian scientists?
(A) Param (B) Cray I
(C) Blue Gene (D) IBM Sequoia
Ans: A
18. A process used by large retailers to study trends
(A) data selection (B) data mining
(C) both (A) and (B) (D) None of the above
Ans: B
19. Technology no longer protected by copyright, available to everyone
(A) Proprietary (B) Open
(C) Private (D) Either (A) or (B)
Ans: B
20. Computers use -------- language to process data
(A) English (B) powerful
(C) decimal (D) binary
Ans: D
21. The term ‘bit’ is a short for
http://www.yoursyllabus.blogspot.com (A) binary digit (B) binary number
(C) digit (D) byte
Ans: A
22. Which of the following is not an example of input device?
(A) Keyboard (B) mouse
(C) Printer (D) scanner
Ans: C
23. DSL is an example for --------- connection
(A) network (B) wireless
(C) internet (D) broadband
Ans: D
24. ------------ is the program that manages CPU, memory, storage devices and input/output devices.
(A) Super system (B) Application software
(C) Operating system (D) Control system
Ans: C
25. Binary language consists of -------
(A) 2 digits (B) 3 digits
(C) 4 digits (D) 10 digits
Ans: A
1. “x1 is a clone of x” means x1 is identical to x in terms of the physical attributes namely, height, weight
and complexion. Given, height, weight and complexion only form a complete set of attributes for an
entity, cloning is an equivalence relation. What is your impression about this statement ?
(A) The statement is true
(B) The statement is false
(C) The truth value of the statement cannot be computed
(D) None of these
Ans: A
2. ‘R is a robot of M’ means R can perform some of the tasks that otherwise M would do and R is unable
to do anything else. Which of the following is the most appropriate representation to model this
situation ?
http://www.yoursyllabus.blogspot.com
Ans:
3. “My Lafter Machin (MLM) recognizes the following strings :
(i) a
(ii) aba
(iii) abaabaaba
(iv) abaabaabaabaabaabaabaabaaba
Using this as an information, how would you compare the following regular expressions ?
http://www.yoursyllabus.blogspot.com
(i) (aba)3x
(ii) a.(baa)3x–1. ba
(iii) ab.(aab).3x–1.a
(A) (ii) and (iii) are same, (i) is different.
(B) (ii) and (iii) are not same.
(C) (i), (ii) and (iii) are different.
(D) (i), (ii) and (iii) are same.
Ans: D
4. S1 : I teach algorithms and maths.
S2 : My professor teaches maths, electronics and computer science.
S3 : I have a student of maths.
S4 : Algorithm is a part of computer science.
S5 : Maths students know computer science.
What would be the chromatic number of a graph, vertices of which are the actors/entities that are
involved in the sentences S1 to S5 and edges-to represent the associations/relationships amongst the
entities/actors as expressed in the sentences S1 to S5 above?
(A) 2
(B) 3
(C) 4
(D) None of these
Ans:
5. For your ATM debit card, you have a 4-decimal-digit personal secret code. In the absence of any clue, a
brute-force attack takes time-‘t’ to crack the code on an ATM terminal. Therefore ‘t’ is the secure-
time for a customer to report in case the card is misplaced. Your Bank has decided to facilitate an
increased secure-time. Out of the following, which option should provide the largest rise in the value
of ‘t’ ?
(A) Instead of 4-decimal-digits, maintain the personal secret code in 4-hexadecimal-digits.
(B) Instead of 4-decimal digits, maintain a 5-decimal-digit personal secret code.
(C) Reduce the processing speed of the ATM terminals to the half of their current speed.
(D) None of the above provides any improvement.
Ans: B
6. The logic expression for the output of the circuit shown in the figure is
http://www.yoursyllabus.blogspot.com
(A) A’C’+B’C’+CD
(B) AC’+BC’+C’D
(C) ABC+C’D’
(D) A’B’+B’C’+C’D’
Ans: C
7. Advantage of synchronous sequential circuits over asynchronous ones is
(A) faster operation
(B) ease of avoiding problems due to hazard
(C) lower hardware requirement
(D) better noise immunity
Ans: A
8. What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ?
(A) 1V (B) 2V
(C) 5V (D) 10 V
Ans: C
9. What is decimal equivalent of BCD 11011.1100 ?
(A) 22.0 (B) 22.2
(C) 20.2 (D) 21.2
Ans: B
10. The function represented by the kmap given below is
(A) A.B
(B) AB+BC+CA
(C) (BÅC)’
(D) A.B.C
Ans:
http://www.yoursyllabus.blogspot.com
11. The statement
print f (“ % d”, 10 ? 0 ? 5 : 1 : 12);
will print
(A) 10 (B) 0
(C) 12 (D) 1
Ans: D
12. What will be the output of the following c-code ?
void main ( )
{
char *P = "ayqm" ;
char c;
c = ++*p ;
printf ("%c", c);
}
(A) a (B) c
(C) b (D) q
Ans: C
13. Member of a class specified as _______ are accessible only to method of the class.
(A) private (B) public
(C) protected (D) derive
Ans: A
14. Match the following :
(a) Garbage collection in 1. Java
(b) Nameless object 2. generic programming
(c) Template support 3. defines a class
(d) A forward reference 4. member function
(e) Derived class inherits
from base class 5. within a statement
Codes :
(a) (b) (c) (d) (e)
(A) 1 5 4 2 3
(B) 1 5 2 3 4
(C) 5 1 2 3 4
(D) 5 4 3 1 2
Ans: B
15. The data type created by the data abstraction process is called
(A) class
(B) structure
http://www.yoursyllabus.blogspot.com
(C) abstract data type
(D) user defined data type
Ans: C
16. An entity instance is a single occurrence of an _______.
(A) entity type
(B) relationship type
(C) entity and relationship type
(D) None of these
Ans: A
17. Generalization is _______ process.
(A) top-down (B) bottom up
(C) both (A) & (B) (D) None of these
Ans: B
18. Match the following :
I. 2 NF (a) transitive dependencies eliminated
II. 3 NF (b) multivalued attribute removed
III. 4 NF (c) contain no partial functional dependencies
IV. 5 NF (d) contains no join dependency
Codes :
I II III IV
(A) (a) (c) (b) (d)
(B) (d) (a) (b) (c)
(C) (c) (d) (a) (b)
(D) (d) (b) (a) (c)
Ans: B
19. Which data management language component enabled the DBA to define the schema components ?
(A) DML (B) Sub-schema DLL
(C) Schema DLL (D) All of these
Ans: C
20. The PROJECT Command will create new table that has
(A) more fields than the original table
(B) more rows than original table
(C) both (A) & (B)
(D) none of these
Ans: D
21. If we have six stack operations pushing and popping each of A, B and C-such that push (A) must occur
before push (B) which must occur before push (C), then A, C, B is a possible order for the pop
http://www.yoursyllabus.blogspot.com operations, since this could be our sequence : push (A), pop (A), push (B), push (C), pop (C), pop (B).
Which one of the following orders could not be the order the pop operations are run, if we are to
satisfy the requirements described above ?
(A) ABC (B) CBA
(C) BAC (D) CAB
Ans: D
22. What is the most appropriate data structure to implement a priority queue ?
(A) Heap
(B) Circular array
(C) Linked list
(D) Binary tree
Ans: A
23. In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge in the
path counts as !
(A) About log2n
(B) About 2 log2n
(C) About n log2n
(D) About 2n
Ans: B
24. A chained hash table has an array size of 100. What is the maximum number of entries that can be
placed in the table ?
(A) 100
(B) 200
(C) 10000
(D) There is no upper limit
Ans:
25. In a B tree of order 5, the following keys are inserted as follows :
7, 8, 1, 4, 13, 20, 2, 6 and 5
How many elements are present in the root of the tree ?
(A) 1 (B) 2
(C) 3 (D) 4
Ans: B
26. The ______ field is the SNMP PDV reports an error in a response message.
(A) error index (B) error status
(C) set request (D) agent index
Ans: B
27. What does the URL need to access documents ?
http://www.yoursyllabus.blogspot.com
I. Path name
II. Host name
III. DNS
IV. Retrieval method
V. Server port number
(A) I, II, III (B) I, III, V
(C) I, II, IV (D) III, IV, V
Ans: B
28. End-to-End connectivity is provided from Last-to-Last in
(A) Network layer (B) Session layer
(C) Transport layer (D) Data link layer
Ans: C
29. What services does the internet layer provide ?
1. Quality of service
2. Routing
3. Addressing
4. Connection oriented delivery
5. Framing bits
(A) 1, 2, 3 (B) 2, 3, 4
(C) 1, 3, 4, 5 (D) 2, 3, 4, 5
Ans:
30. What is the maximum operating rate of a wireless LAN using infrared communication ?
(A) 1 mbps (B) 2 mbps
(C) 5 mbps (D) 11mbps
Ans: A
31. In an absolute loading scheme, which loader function is accomplished by a loader ?
(A) Re-allocation (B) Allocation
(C) Linking (D) Loading
Ans: D
32. Which of the following expression is represented by the parse tree ?
http://www.yoursyllabus.blogspot.com
(A) (A + B) * C (B) A + * BC
(C) A + B * C (D) A * C + B
Ans: A
33. Consider the following left associative operators in decreasing order of precedence :
– subtraction (highest precedence)
* multiplication
$ exponentiation (lowest precedence)
What is the result of the following expression ?
3 – 2 * 4 $ | * 2**3
(A) – 61 (B) 64
(C) 512 (D) 4096
Ans: D
34. Which of the following is the most general phase structured grammar ?
(A) Regular
(B) Context-sensitive
(C) Context free
(D) None of the above
Ans: B
35. Which of the following is used for grouping of characters into tokens (in a computer) ?
(A) A parser
(B) Code optimizer
(C) Code generator
(D) Scanner
Ans: D
36. Match the following :
(a) Disk scheduling 1. Round-robin
(b) Batch processing 2. SCAN
(c) Time sharing 3. LIFO
(d) Interrupt processing 4. FIFO
http://www.yoursyllabus.blogspot.com
Codes :
(a) (b) (c) (d)
(A) 3 4 2 1
(B) 4 3 2 1
(C) 2 4 1 3
(D) 1 4 3 2
Ans: C
37. ________ synchronizes critical resources to prevent dead lock.
(A) P-operator (B) V-operator
(C) Semaphore (D) Swapping
Ans: C
38. _______ is one of pre-emptive scheduling algorithm.
(A) RR (B) SSN
(C) SSF (D) Priority based
Ans: A
39. In order to allow only one process to enter its critical section, binary semaphore are initialized to
(A) 0 (B) 1
(C) 2 (D) 3
Ans: B
40. Remote Computing Service involves the use of time sharing and _______.
(A) multi-processing
(B) interactive processing
(C) batch processing
(D) real-time processing
Ans: C
41. Software engineering primarily aims on
(A) reliable software
(B) cost effective software
(C) reliable and cost effective software
(D) none of the above
Ans: C
42. Top-down design does not require
(A) step-wise refinement
(B) loop invariants
(C) flow charting
(D) modularity
Ans: B
http://www.yoursyllabus.blogspot.com
43. Which model is simplest model in Software Development ?
(A) Waterfall model (B) Prototyping
(C) Iterative (D) None of these
Ans: A
44. Design phase will usually be
(A) top-down (B) bottom-up
(C) random (D) centre fringing
Ans: A
45. Applications-software
(A) is used to control the operating system
(B) includes programs designed to help programmers
(C) performs a specific task for computer users
(D) all of the above
Ans: C
46. The cost of the network is usually determined by
(A) time complexity
(B) switching complexity
(C) circuit complexity
(D) none of these
Ans: B
47. A leased special high-speed connection from the local telephone carrier for business users that transmits
at 1.544 mbps is known as ________ carrier.
(A) T1 (B) T2
(C) T3 (D) T4
Ans: A
48. CDMA Cell uses ________ carriers of 1.25 MHz.
(A) 9 (B) 18
(C) 22 (D) 64
Ans: A
49. At any given time Parallel Virtual Machine (PVM) has ________ send buffer and ________ receive
buffer.
(A) one-one (B) one-two
(C) two-two (D) two-one
Ans: B
50. Data Mining uses ________, ________ and ________ to build effective predictive model.
http://www.yoursyllabus.blogspot.com
(i) Data set
(ii) Information set
(iii) Input set
(iv) Process set
(v) Output set
(vi) Test set
(A) (i), (ii) and (iv)
(B) (ii), (iv) and (v)
(C) (i), (v) and (vi)
(D) (ii), (iii) and (v)
Ans:
top related