Thursday, March 19, 2015

G.K. Computer Fundamental

G.K. Computer Fundamental

Q-1 Manual data can be put into computer by ………….’

(a) Keyboard (b) MICR
(c) OCR (d) Scanner

Q-2 The ………… provides the go-ahead approval for the development of projects

(a) The project head (b) The user department head
(c) The senior management (d) All of the above

Q-3 Which not the following does not fall under the category of operations to be performed during development of software

(a) Personnel security (b) Logical access control
(c) Physical protection (d) Environmental protection

Q-4 The term ‘remote’ wrt network means

(a) A device that cannot control network functions
(b) Machine located far off
(c) Any peripheral or application located far off
(d) FEP

Q-5 Which access control mechanism does security label fit into ?

(a) Logical access control (b) Discretionary access control
(c) Physical access control (d) None of these

Q-6 A character that retains its value during program execution is …………..

(a) Constant (b) Variables
(c) Type definitions (d) Function

Q-7 All decisions for a LAN are taken by

(a) The it steering committee (b) The top management
(c) A business analyst (d) A project manager

Q-8 Generation of PIN in Bank ATM would require :

(a) Acquirer validates
(b) Acquirer sends response to the acceptor
(c) Authorizations request is sent to the acquirer
(d) PIN entered is encrypted

Q-9 …………. Are self replicating malicious code independent of the action of the user, but slow down the processor on entering a network

(a) Viruses (b) Worms
(c) Trojan Horse (d) None of the above

Q-10 Physical access to a database can be altered by which factors ?

(a) OS used by the software (b) Hiring Procedure
(c) Biometric security tools (d) Access privileges

Q-11 Which is NOT a feature of www ?

(a) Retrieving information (b) Enabling multimedia
(c) Built in hyper text capability (d) None of these

Q-12 Organization would prefer in house development of software to

(a) Ensure that development adhere to defined quality
(b) Maintain vendor relations
(c) Use the technology that is being widely used for development
(d) None of these

Q-13 Which of the following is the fastest ?

(a) Tapes (b) Hard disk
(c) Floppy disk (d) CDs

Q-14 Which of the memory is fastest ?

(a) Auxiliary` (b) Buffer
(c) Hard disk (d) Optical drive

Q-15 Which of the following cannot be shared ?

(a) Printer (b) Scanner
(c) Plotter (d) Mouse

Q-16 Which one of the following statements is true with respect to VSAT ?

(a) Usage is restricted to geographical boundaries
(b) Very high cost due to the usage of fibre optic cables
(c) Though quality of data is high, it does not support high bandwidth
(d) It operates in two frequency bands namely Ku and C

Q-17 The CPU ( Central processing unit ) has

(a) Input ,output and processing
(b) Control unit primary storage and secondary storage
(c) Control unit , arithmetic – logic unit, and primary storage
(d) None of the above

Q-18 What should be considered while division of duties in an IT environment bank ?

 (a) Nature of business operations (b) Managerial policy
(c) Organization structure with job description (d) All the above

Q-19 Which of the following is used to append a digital signature ?

(a) Public key (b) private key
(c) Digital key (d) None of these

Q-20 Computer program looking “normal” but containing harmful code is infected by

(a) Trojan Horse (b) Virus
(c) Worm (d) None of these

Q-21 Steganography is

(a) Hiding the data to make it necessarily invisible and not easily detectable
(b) Hiding the data but not necessarily making it invisible and not easily detectable
(c) Detecting and destroying the hidden data
(d) None of these

Q-22 Mark I computer was

(a) Electrical machine (b) Mechanical Machine
(c) Electronic Machine (d) None of these

Q-23 A computer faster with

(a) GUI (b) Mouse
(c) Keyboard (d) None of these

Q-24 Which of the following do you think is NOT required to develop an application for computer ?

(a) Feasibility study (b) Designing
(c) Testing (d) None of these

Q-25 The data flow diagram is for analyzing

(a) How to do a function efficiently
(b) Restrict the number of times a function can be performed
(c) Requirements of user
(d) None of these


1. d 2. c 3. a 4. b 5. d 6. a 7. a 8. d 9. c 10. b 11. d 12. a 13. b
14. b 15. d 16. d 17. d 18. c 19. b 20. a 21. b 22. c 23. c 24. d 25. c


8. so that no one is able to understand it
12. In house development is company developing its own software
20 Trojan horse is software that has ‘virus hidden in it
24 All of these are required
25. These diagrams are just like flowcharts only difference is they show data movement instead of flow control in charts.

G.K (Computer Fundamentals)

G.K (Computer Fundamentals) 

 Q-1 VLSE Stands for………….
(a) Very large scale integrated circuits (b) Vast longitude scale integrated circuits.
(c) Very long scale interconnecting circuits (d) None of these.

Q-2 When was fourth generation computes comes in use ?

(a) 1966-80 (b) 1976-85 (c) 1986-90 (d) 1980-90

Q-3 What is the full form of MICR?

(a) Mark ink compact reader (b) Magnetic ink computer reader
(c) Magnetic ink character reader (d) None of these.

Q-4 How many types of printer are used

(a) 5 (b) 4 (c) 3 (d) 2

Q-5 Which of the following types of printers are used in the world?

(a) Line printers and serial character printers.(b) Drum printer and line printers.
(c) Chain printer and serial character printers (d) None of these

Q-6 The data read from the memory or that to be written in the memory is placed in

(a) Rom (b) MDR (C) MAR (d) RAM.

Q-7 MDR Stands for………………

(a) Memory drum register (b) Metric drum register
(c) Memory data register (d) Magnetic data register

Q-8 CDROM Stands for……………

(a) Computer disk read-only memory
(b) Compact direct read-only memory
(c) Computer disk research-only memory
(d) Compact disk read-only memory

Q-9 How many types of ROM in a computer?

(a) 3 (b) 4 (c) 5 (d) 6

Q-10 Variables that can have values in the form of a sequence of characters are
represented by an alphabet and a & sign at the end is called……………

(a) Numeric values (b) Characters (c) String variables

Q-11 BASIC is stands for…………..

(a) Begin all post system instruction code
(b) Beginners` All purpose symbolic instruction code.
(c) Belong all purpose system instruction code.
(d) None of these.

Q-12 Which statement is used to assign a numerical or a string value to a variable?
(a) Go sub (b) LET (C) REM (d) READ-DATA

Q-13 Which of the following printer consists of a steel band on which characters are

           (a) Line printer (b) Drum printer (c) Chain printer (d) None of these.

Q-14 The transaction where selling and buying of products is done online is

(a) E-Commerce (b) Netscape navigator
(c) Resolution (d) Spreadsheet

Q-15 HTTP Stands for………….

(a) Hyper table transport protocol
(b) Hyper text transport protocol
(c) Host text transport protocol
(d) None of these

Q-16 A Station on a network is……….It can be a dump terminal or a printer or a
computer machine.

(a) Patch (b) Port (c) Node (d) Interface

Q-17 The language in which data is represented in terms of dens and zeros and
programs can be executed directly by the computer is called……….. .

(a) Assembly language (b) High level language
(c) Binary coded language (d) Machine language

Q-18 PDA Stands for……………..
(a) Prolog digital assistant (b) Program decimal assistant
(c) Protocol digital assistant (d) Personal digital assistant

Q-19 An extremely light weight personal computer, typically weighing less than 6
pounds is called…………

(a) Notebook computer (b) Palmtop (c) Laptop (d) Mini computers

Q-20 How many basic operators in Boolean algebra?

(a) 5 (b) 4 (c) 3 (d) 2

Q-21 The language uses opcodes instead of binary machine codes is called……….

(a) High level language (b) Machine language
(c) Assembly language (d) None of these

Q-22 COBOL Stands for………….

(a) Computer business oriented language
(b) Coded business operator language
(c) Computer business operator language
(d) Common business operator language

Q-23 How many basic types of binary coding used in computers?

(a) 3 (b) 2 (c) 4 (d) 5

Q-24 WAIS Stands for ………..

(a) World area inter server
(b) Wide area information server
(c) Wide area inter connection server
(d) None of these

Q-25 Pascal was developed by which of the following person?

(a) John Backus (b) John kemeny
(c) Nicklaus (d) John wirth


1 (a) Very large scale integrated circuits
2 (b) 1976-85
3 (C) Magnetic ink character reader
4 (d) 2
5 (a) Line printers and serial character printers
6 (b) MDR
7 (c) Memory data register
8 (d) Compact disk read-only memory
9 (a) 3
10 (c) String variables
11 (b) Beginners All purpose symbolic instruction code
12 (b) LET
13 (c) Chain printer
14 (a) E-Commerce
15 (b) Hyper text transport protocol
16 (c) Node
17 (d) Machine language
18 (d) Personal digital assistant
19 (a) Notebook computer
20 (b) 4
21 (c) Assembly language
22 (d) Common business operator language
23 (a) 3
24 (b) Wide area information server
25 (c) Nicklaus wirth

Computer Application

Computer Application

Q-1 Which of the following makes a network insecure ?

(a) Encryption (b) Network interface card
(c) Static key (d) None of these

Q-2 Which of the following is IBM’s micro computer ?

(a) Mac (b) Microcomp
(c) Macintosh (d) Both (a) and (b)

Q-3 Which of the following s not a transmission technology ?

(a) Broadcast linking (b) Narrowcast linking
(c) Point to point linking (d) None of these

Q-4 Which of the following are mandatory parts of complete PC system ?

(a) Hardware and Software (b) Input and Output
(c) Keyboard and printer (d) All the above

Q-5 Firewall is used in PC for

(a) Security (b) Authentication
(c) Data transmission (d) None of these

Q-6 Processing control procedures have

(a) Authorization and authentication of users
(b) Access control for online data
(c) Reporting of before and after images
(d) None of these

Q-7 Which of the following do you think is NOT necessary for computerization system in a bank

(a) Effective customer system (b) Effective bank office integration
(c) Focus on manual records (d) None of these

Q-8 CD ROMs are ……………

(a) Primary storage devices (b) Optical storage devices
(c) Magnetic storage devices (d) None of these

Q-9 Library software management software is for

(a) Documenting the changes that are made to program
(b) Controlling the version numbers of the programs
(c) Both (a) and (b)
(d) None of these

Q-10 Client-server computing is used in

(a) Interactive multi-media (b) Network multi-media
(c) MPEG video (d) All the above

Q-11 Floppy disk are

(a) Random access memories (b) Storage devices
(c) Used for transferring data (d) All of the above

Q-12 Which of the following is NOT a characteristic of a computer

(a) Intelligence` (b) Speed
(c) Versatility (d) Automation

Q-13 Which of the following is NOT a part of system ?

(a) Peripherals (b) Electric supply
(c) Logical interconnection between peripherals (d) Common goal

Q-14 The most common input device used today is ………….

(a) Motherboard (b) VDU
(c) Keyboard (d) IC chip

Q-15 The third generation of computer were in

(a) 1959-1964 (b) 1965-1971
(c) 1971- 1981 (d) None of these

Q-16 Which of the following is true?

(a) If while executing a program the power goes off all the instructions and data in the memory
will be host
(b) A PC/XT uses a 80186 microprocessor whereas a PC/AT uses a 80286 microprocessor
(c) both
(d) None of these

Q-17 Which of the following is a component of Internet?

(a) Routers to strengthen the attenuated signals
(b) Repeaters to establish physical connection between various LANs
(c) Gateways to allow a network to use the resources of another main frame
(d) Bridges to optimize the transmission path of massages

Q-18 Which of the following is NOT a server based network features ?
(a) File server (b) DNS
(c) Print server (d) All are server types

Q-19 Collection of tracks on a disk forms ……….
(a) Track (b) Cylinder
(c) Block (d) Disk

Q-20 A device that receives data from slow speed devices and transmits it to different locations is called?

(a) Remote Concentrator (b) Message switcher
(c) Front and processor (d) Demux

Q-21 Desirable feature of modem is

(a) Attenuation and amplification (b) Dynamic equalization
(c) Automatic dial – up (d) All

Q-22 What does the restructuring of existing source code in Reverse Engineering?

(a) Abstraction (b) Completeness
(c) Directionality (d) None of these

Q-23 ………….. is a supercomputer created by networking many small computes.

(a) ASCI white (b) Grid
(c) LAN (d) Network super

Q-24 File transfer is ………………

(a) An application program
(b) The function of the Application Layer
(c) A protocol of the Application Layer
(d) A web application

Q-25 ……………. Is used to read choice filled up by a student in common entrance tests.

(a) Hand held scanner (b) Papers
(c) OMR (d) Pointing devices


1. c 2. c 3. b 4. a 5. a 6. d 7. c 8. a 9. c 10. b 11. d 12. a 13.b
14. c 15. b 16. a 17. c 18. d 19. d 20. a 21. a 22. b 23. b 24. b 25. c


1. All these keys don’t change, some or the other time they might be hacked
3. There is nothing called as narrowcase
4. System is physical & logical entity
6. They have responsibility checks
7. Once computerized, data is kept in database, not on papers
13. It is supplied by external power
24. FTP is protocol but file transferring is done by application layer

Computer Application

Computer Application

Q-1 A topology of computer network means.............

(a) Arrangement of PCs in certain pattern
(b) Cabling between PCs
(c) Way the server connects to PCs
(d) None of these

Q-2 One of the oldest calculating devices was?

(a) Arithometer (b) Ready reckoner
(c) Abacus (d) None of these
Q-3 Electronics funds transfer is the exchange of money

(a) From one place to another (b) From one account to another
(c) From one bank to another (d) all of the above

Q-4 Which of the following is most reliable, robust and has a very high processing power? It is used in networks too.
(a) Super computer (b) Macro computer
(c) Main Frame (d) All of these

Q-5 Which of the following is not a component of an e- wallet?

(a) Digital Cash (b) Communication manager
(c) User Profile Manager (d) None of these
Q-6 Micro computer should be made because of invention of

(a) Intergrated Circuit (b) Transistor
(c) Protocols (d) None of these

Q-7 …………. Is temporary and ………… is Permanent.
(a) Storage, Memory (b) Memory, Storage
(c) Disk Storage (d) None of these

Q-8 How many rollers are actually responsible for movement of the curser in mouse?

(a) One (b) Two
(c) Three (d) Depends from mouse to mouse

Q-9 ………….. can be one of the approach used to tax online transaction

(a) Permanent establishment (b) Residence – Based
(c) Income based classification (d) All of the above

Q-10 Which of the following organization have not become computerized?

(a) Banks (b) Railways
(c) Water supply (d) Airways

Q-11 A computer is a ……….. device

(a) Calculating (b) Electrical
(c) Electronic (d) All of these

Q-12 Transistor was first used in

(a) 2nd generation Computer (b) 3rd generation computer
(c) 4th generation computer (d) None of these

Q-13 Multiprocessing is same as

(a) Multi – Programming (b) Multitasking
(c) Multiuser (d) Multiresource

Q-14 Generally PCs is fail because of

(a) Errors, negligence and low tech manipulation by insiders
(b) Breakdown of hardware
(c) Natural disasters such as fire, earthquake and floods
(d) None of these

Q-15 Which of them takes care of E-mail at client side?

(a) POP (Post office protocol)
(b) MAP (Massaging Application Programming Interface)
(c) IMAP (Internet Massage Access Protocol)
(d) None of these

Q-16 Which of the following is not a peripheral of PC?

(a) CPU (b) O.S.
(b) V.D.U. (d) Touch Screen

Q-17 Dedicated line is same as

(a) Narrowband Line (b) Broadband Line
(c) Leased line (d) None of these

Q-18 The decreased cost and increased performance of computer hardware were the distinguishing features of ………… generation of computers
(a) Second (b) Third
(c) Fourth (d) All generation

Q-19 SONET is a standard for which of the following networks?

(a) Twisted-pair cable (b) Fiber-optic cable
(c) Coaxial cable (d) Ethernet

Q-20 Internet was started as………..

(a) TCP/IP experiment
(b) Network for defences forces of America
(c) Group of research scientist scientists of Bell lab
(d) Contribution was done by all the above institutions

Q-21 Which of these e-commerce systems can handle non monetary documents?

(a) SWIFT (b) EFTS
(c) EDI (d) EBTS

Q-22 1 KB is equivalent to

(a) 1024 bits (b) 1000 bits
(c) 1024 bytes (d) 1000 bytes

Q-24 Which of the following transmission techniques permits data flow in only one direction?
(a) Simplex (b) Half Duplex
(c) Full duplex (d) Multiplexing

Q-25 Which of the following relieves the host computer from tedious job and does them itself?

(a) Remote concentrator (b) Massage switcher
(c) Front and processor (d) Demux


1. b 2. c 3. b 4. c 5. a 6. a 7. b 8. b 9. d 10. c 11. c
12. a 13. b 14. a 15. c 16. b 17. c 18. d 19. b 2o. b 21. c 22. c
23. a 24. a 25. c


5. Credit cards are used
8. One for movement in X-direction, another for movement in Y- direction
16. Operating system is a software
17. Lease lines is a 24 hour, high bandwidth dedicated line
19. Sonet is also a network architecture like client Server expect that it uses optical fibers has high speed

G. K. (Computer Fundamental)

G. K. (Computer Fundamental)

Find out from the following which is correct option

Q-1 Which of the following was first Generation computer?

(c) FECNIA (d) None of these

Q-2 When was the first Generation computer started?

(a) 1925- 1935 (b) 1935 – 1945
(c) 1945- 1955 (d) 1955- 1965

Q-3 Which was the first commercial computer?

(c) UNIVAC (D) None of these

Q-4 HLL stands for….

(a) High Lead Language (b) Hyper Lead Language
(c) High Level Language (d) None of these

Q-5 A light sensitive photoelectric cell to signal screen position to the computer is called………….

(a) Key board (b) Mouse
(c) Light Pen (d) Printer

Q-6 When was abacus computer developed?

(a) 1350 B. C. (b) 1450 B. C.
(c) 1550 B. C. (d) 1750 B. C.

Q-7 Which amongst the following country was developing abacus computer in B. C.?

(a) USA (b) UK
(c) India (d) China

Q-8 Who was invented Logarithms, the Second Invention Computer?

(a) Johan Napier (b) Johan Dupe
(c) Blaisse Napier (d) None of these

Q-9 In which of the following year pascal’s Calculator the Adding Machine was invented?

(a) 1542 A. D. (b) 1642 A. D.
(c) 1742 A. B. (d) None of these

Q-10 How many rows and columns in punch cards?

(a) 10 Rows and 60 Columns (b) 12 Rows and 75 Columns
(c) 12 Rows and 80 Columns (d) 15 Rows and 80 Columns

Q-11 The father of modern computer is ………

(a) Blaisse Pascal (b) Charles Napier
(c) Charles Marie (d) Charles Babbage

Q-12 Who was called the first computer Programmer?

(a) Lady Ada Lovelace (b) Lady Aiken
(c) Lady John von (d) None of these

Q-13 When was the machine language developed for the computer?

(a) 1812- 1860 (b) 1815 – 1864
(c) 1817 – 1870 (d) 1820- 1880

Q-14 Which of the following Machine language developed by George Boole?

(a) Abstract Algebra (b) Linear Algebra
(c) Boolean Algebra (d) Modern Algebra

Q-15 EDSACC electronic Delayed storage and calculation in 1947A.D. developed by which University

(a) Harvard University USA (b) Pennsylvania University USA
(c) Oxford University London (d) Cambridge University London

Q-16 An electronic circuitry “Flip- Flops’ the basic unit of computer circuiting – developed by…

(a) Ada Lovelace (b) F. W. Jordan & W. H.Eccles
(c) Ada and George Boole (d) None of these

Q-17 ENIAC (Electronic Numerical Integrator and Calculator) was built by ……….

(a) W. H. Eccles and Presper (b) Presper Eckert and George Boole
(c) John Mauchly & Presper Eckert (d) None of these

Q-18 Who built harved Mark I computer with IBM and no sooner did the first computer ENIAC come in the market?

(a) Howard Aiken (b) Alan Turing
(c) George Boole (d) Johnson Neumann

Q-19 Which of the following generation computers had semi-conductors doped with impurities, better known as the transistors?

(a) First generation computers (b) Second generation computers
(c) Third generation computers (d) None of these

Q-20 Electronic circuits called integrated chips which had transistors closely packed on thin wafers used in ........................

(a) First generation computers (b) Second generation computers
(c) Third generation computers (d) Fourth generation computers

Q-21 How many types of storage media used in a computer system?

(a) Two types (b) Three types
(c) Four types (d) Five types

Q-22 Which amongst the following is extremely fast storage medias and on chip memory that is adjacent to the micro- Processor?

(a) Hard dick (b) Main Memory
(c) Registers (d) None of these

Q-23 FEP stands for……………

(a) FORTRAN English Protocol (b) Front End Processor
(c) Formula of English Principal (d) None of these

Q-24 What is the full form of PDA?

(a) Personal Difference Assistant
(b) Protocol Deformation Assistant
(c) Personal Digital Assistant
(d) Palmtops Digital Apple

Q-25 EBCDIC stands for…………………….

(a) Extended Binary Coded Decimal Interchange Code
(b) Extended Basic Coding Decode Information Code
(c) Extended Binary Coding Decode Interchange Code
(d) None of these

Answers With Reasons:

1 (b) ENIAC
2 (c) 1945- 1955
4(c) High Level Language
5 (c) Light Pen
6(b) 1450 B. C.
7 (d) China
8(a) Johan Napier
9(b) 1642 A. D.
10 (c) 12 Rows and 80 Columns
11(d) Charles Babbage
12(a) Lady Ada Lovelace
13(b) 1815 – 1864
14(c) Boolean Algebra
15(d) Cambridge University London
16(b) F. W. Jordan & W. H. Eccles
17(c) John Mabuchi &Presper Ecker
18(a) Howard Aiken
19(b) Second generation computers
20(c) Third generation computers
21(b) Three types
22(c) Registers
23(b) Front End Processor
24(c) Personal Digital Assistant
25(a) Extended Binary Coded Decimal Interchange Code

G.K. (Computer Fundamental)

G.K. (Computer Fundamental)

Q-1 The bank use……………. Device to minimize conversion process.

(a) Keyboard (b) MICR
(c) OCR (d) Scanner

Q-2 ………………can’t be used for source of data automation.

(a) POS terminal (b) OCR
(c) Keyboard (d) UPC

Q-3 Under which case will intranet be aneffective networking tool/s?

(a) In a distributed decision-making environment
(b) Where heterogeneous applications are involved
(c) In a centralised organization
(d) In a decentralisad organization

Q-4 When an organization gives contract for development of software; it has to give data to the service provider. In Such cases, the ownership of data should be_________

(a) Transferred to the service provider
(b) With the client/organization that outsource services
(c) Shared by both parties
(d) Not transferred

Q-5 A modem performs_________

(a) Modulation (b) Demodulation
(c) Data compression (d) All of these

Q-6 Which of the following is NOT done by modem?

(a) Transmission Speed (b) Data Accuracy
(b) Error detection and Correction (d) Data Compression

Q-7 A program coded in programming language is____________ .

(a) Target code (b) Source code
(c) Block (d) None of these

Q-8 “Platform” in computer world means___________ .

(a) Computer hardware used (b) Operating Systems used
(c) Both of these (d) None of these

Q-9 Which of these biometric tools use thermal sensors along with infrared rays for identification?

(a) Key stroke dynamics (b) Lris\ Retinal scan
(c) Speech recognition (d) Fingerprint scanning

Q-10 what is incorrect about software?

(a) It can manipulate computer (b) It has programs, instructions
(c) It can be touched (d)It can be touched

Q-11 Disadvantage of distributed database is.

(a) Unreliability (b) Easy implementation
(c) Insecurity (d) High communication cost

Q-12 which of the following transmission techniques let computer to alternatively send and receive data ?

(a) Simplex (b) Half duplex
(c)Full duplex (d) Multiplexing

Q-13 What is NOT a feature of networking?

(a) Reliability (b) Greater storage space
(c) Connectivity (d) All are features of networking

Q-14 Taking back-up of a file against crash is a

(a)Preventive measure (b) Curative measure
(c) Decisive measure (d) None of these

Q-15 A memory that is referred by its contents instead of physical address is called___________

(a) Associative memory (b) Content addressable storage
(c) Both (a) and (b) (d) None of these

Q-16 Most dangerous risk in leaking of information is :

(a) ready access to online terminals (b) Online processing of data
(c) Ignorance about the existence of risk (d) All of these
Q-17 A camera is an
(a) Input device (b) Can be either input or output
(c) Processing machine (b) Output device

Q-18 Using anti-virus software is

(a) Preventive measure (b) Detective measure
(c) Corrective measure (d) All the above

Q-19 An online transaction is

(a) One that is done in real time (b) Transaction done via internet
(c) One that is done via telephone (d) None of these

Q-20 A clerk in a bank has to access data n customer account. Logical access control for these users would be.
(a) Use of individual passwords
(b) Use of a Accounts Receivable Section password
(c) Use of individual passwords plus separate access passwords for customer data and product data
(d) Can’t say

Q-21 To stop unauthorized access to the computer system we should

(a) Have a trustworthy system administrator (b) Have a good passwords policy
(c) Have a sound encryption policy (d) All of the above

Q-22 Which can not assure data accuracy in an application?

(a) Limit and reasonableness test (b) Echo checking
(c) Control total (d) None of these

Q-23 Maximum storage space is available on
(a) CDs (b) ROM
(c) Hard disks (d) Floppies

Q-24 Jon Von Neumann developed:

(a) First electronic chip flip flop (b) Stored-program concept
(c) The first electronic computer (d) None of these

Q-25 Which of the following is single user computer with many features and good processing power?

(a) Minicomputer (b) Workstation
(c) Macintosh (d) None of these


1. b 2. d 3. c 4. b 5. d 6. b 7. b 8. c 9. c 10. d 11. c 12. b 13. d 14. b 15. b
16. c 17. b 18. a 19. b 20. a 21. b 22. a 23. b 24. a 25. b

GK (Computer Fundamental)

GK (Computer Fundamental)

Q-1 The executable file for Windows Explorer is ----------.

(a) Expol.EXE (b) Explorer.EXE
(c) Explorer.TXT (d) Explorer. EXT

Q-2 ----------------is a tool to browse all disks connected to the computer.

(a) Internet Explorer (b) Windows Explorer
(c) Windows Navigator (d)None of these

Q-3 The menu option to delete all the files present in the Recycle Bin is ----------------. (a) Empty Recycle         Bin (b) Full Recycle Bin
(c) Half Empty Recycle Bin (d) None of these

Q-4 The facility to reduce the Taskbar to thin line when the taskbar or Start button is not in use is called as ----------------------

(a) Auto hide (b) hide
(c) Automatic (d) None of these

Q-5 The extension for a created shortcut is------------.

(a) .KLN (b) .NLK
(c) .LNK (d) .LKN

Q-6 The shortcut key to switch between different applications is ----------.

(a) Alt + Tab (b) Alt + Shift
(c) Shift + Tab (d) Alt + Ctrl

Q-7 The Taskbar can be moved to ------------ of the screen.

(a) Right corner (b) Left corner
(c) Any corner (d) Top corner

Q-8 It is not possible to add items to the ---------------------.

(a) Program menu (b) Start menu
(c) Accessories menu (d) None

Q-9 Files can be deleted from Windows with or without confirmation.

(a) True (b) False

Q-10 Shortcuts can be created on the desktop.

(a) True (b) False

Q-11 Unix is an example for :

(a) Input Device (b) Output

(c) Operating system (d) Terminal

Q-12 Virus is a:

(a) OS (b) Destructive Program

(c) Useful Hardware (d) Useful Software

Q-13 Loading Operating System onto RAM is called:

(a) Booting (b) Saving
(c) Printing (d) Opening

Q-14 An example for Virus:

(a) Virus Rx (b) Nashot
(c) Raindrops (d) Undelete

Q-15 Multiple CPUs help processing multiple instructions simultaneously:

(a) Multiprogramming (b) Memory Management
(c) Multiprocessing (d) None these

Q-16 DOS Command to view the contents of the file -------EDUCATION.BAT is :



Q-17 Start button of windows 98 is available in :

(a) Control Panel (b) MS-Paint
(c) Taskbar (d) WordPad

Q-18 In Web Style, a single click on a program icon on desktop will:

(a) Copy the program (b) Delete the program
(c) Open the program (d) Close the program

Q-19 In Unix, mv command is used to :

(a) View the contents of a file (b) Change the name of a file
(c) Delete a file (d) None of these

Q-20 Windows 98 supports:

(a) Plug & Play (b) Creating Web pages
(c) Multitasking (d) All of these

Q-21 Memory Management is performed by ------------------------.

(a) Operating System (b) Application
(c) Software (d) None

Q-22 A wall paper effect can be created by using ---------------picture.

(a) JPEG (b) GIF
(c) Bitmap (d) JPG

Q-23 Deleted files can be recalled in windows 98 using ----------.

(a) Recycle (b) Recycle Bin
(c) Bin Recycle (d)None

Q-24 To edit a scanner image, in Windows 98, use -----------.

(a) Image (b) Images
(c) Imaging (d) None

Q-25 The two files used by Web View is ------------& -----------.

(a) Desktop,INI, Folder,HTT (b) Desktop,INS, Folder,HTP
(c) Desktop,SNI, Folder,HST (d) None


1. b 2. b 3. a 4. a 5. c 6. a 7. c 8. c 9. a 10. a 11. b 12 c 13. d 14. c
15. b 16. c 17. b 18. b 19. c 20. d 21. a 22. c 23. b 24. c 25. a

G.K. Computer ( Fundamental)

G.K. Computer (Fundamental)

Q-1 MS-Windows support file names up to---------characters.

(a) 256 (b) 255
(c) 254 (d) 257

Q-2 WYSIWYG stands for ----------------

(a) What you sing in what you Got (b) What you see is what you get
(c) What you seen in what you Got (d) What you see in what you Got

Q-3 The Application that is used to make telephone calls from the computer using a MODEM is -----------.

(a) Phone Divert (b) Phone Dialing
(c) Phone Dialer (d) None of these

Q-4 ----------- is used to select some special characters,

(a) Character chart (b) Control panal
(c) Character Map (d) None of these

Q-5 The Text editor available under MS-Windows is -----------

(a) MS –Word (b) Word Pad
(c) Notepad (d) None

Q-6 The extension of a file created in MS-Paint ----------

(a) .BBM (b) .BMP
(c) .BMM (d) .BPP

Q-7 The executable file for WordPad is :


Q-8 MS-Windows is :
(a) An spreadsheet (b) An Operating System
(c) An application software (d) None

Q-9 In the Calculator program, the font of the result can be -------

(a) Changed (b) Unchanged
(c) Increase (d) None

Q-10 Paint is an application program, which allows the user to ---------using
different tools present.

(a) text entered (b) draw pictures
(c) text in ASCII code (d) None

Q-11 Notepad is a application program which allows the text entered by the user to be I in the---------
(a) ASCII code (b) Binary code
(c) Machine language (d) Assembly language

Q-12 The screen saver starts automatically, if the computer is idle for----------------------

(a) Specified number of minutes (b) specified number of character
(c) specified number of hours (d) specified number of Seconds

Q-13 To select a screen saver, select Screen Saver from Desktop in ---------.

(a) Programmes (b) Files
(c) Control Panel (d) None

Q-14 Different mouse pointers can be selected from -------------.

(a) .CUS or .ANI files (b) .CUR or .ANS files
(c) .CUR or .ANI files (d) .CUT or .ANI files

Q-15 Allows the user to specify the decimal symbol. Default decimal symbol is a ------.

(a) dot (b)comma
(c) semi colon (d) colon

Q-16 Determines whether the system of measurement will be -----------.

(a) U.K. (b) U. S.
(c) U. P. (d) None

Q-17 Determines which symbol will separate items in a list or series. Default is --------

(a) dot (b) comma
(c) colon (d) semi colon

Q-18 In MS-Windows the default currency symbol is -----------
(a) @ (b) $
(c) # (d) &

Q-19 Number of digit in-group is used to determine how many digits determine a number group. Default is -----.

(a) 4 (b) 5
(c) 3 (d) 2

Q-20 In Keyboard properties, the default language is -------------.

(a) English (United) (b) English (United States)
(c) English (United Kingdom) (d) English (United City)

Q-21 The extension of Screen Saver file is -----------.
(a) .SCS (b) .SCR
(c) .SCP (d) None

Q-22 The item to change the format of the System Date and Time is -----------

(a) D & T (b) Date and Time
(c) System Date (d) None

Q-23 The executable file for Control Panel is -- ---------.

(a) Control.EXE (b) Control.TXE
(c) Control.TXT (d) Control.PXE

Q-24 The default time separator is -------------------.

(a) @ (b) $
(c) : (d) :

Q-25 How many printer can be install at a time?

(a) One (b) Two
(c) Three (d) None


1. b 2. b 3. c 4. c 5. c 6. b 7. d 8. b 9. b 10. b 11. a 12. a 13. c
14. c 15. a 16. b 17. b 18. b 19. c 20. b 21. b 22. b 23. a 24. c 25. a

Friday, March 13, 2015

Computer (Data structure & Algorithms) 3

Computer (Data structure & Algorithms) 3

Q-1 The process of visiting each element of the array exactly once is called ………..
(a) Analysis traversal operation (b) Traversal operation
(c) Search operation (d) Linear search operation

Q-2 How many types of approaches to search operations?
(a) 2 (b) 3
(c) 4 (d) 5

Q-3 Which amongst the following are approaches used to search operations?
(a) Linear search (b) Binary search
(c) Both a & b (d) None of these

Q-4 Which of the following search traverses a sequentially to locate items?
(a) Binary search (b) Logical search
(c) Search field (d) Linear search

Q-5 The operation of adding an element to existing list of elements is called……………..
(a) Insert operation (b) Analysis of binary search
(c) Sorted operation (d) None of these

Q-6 The process of arranging the element of the array in some logical order is called……………..
(a) Delete operation (b) Sort operation
(c) Insert operation (d) None of these

Q-7 The process of combining the elements of two similar structures into a single structure is…………
(a) Bubble sort (b) Sort operation
(c) Merge operation (d) Insert operation

Q-8 A list of a finite number m ´ n of homogeneous data elements is called…………
(a) Linear array (b) Multi dimensional array
(c) Single array (d) Two-dimensional array

Q-9 Matrices are often used to organize data for business and………
(a) Fortran language (b) Scientific applications
(c) Binary coding (d) None of these

Q-10 An square matrix has the same number of rows and columns is called………
(a) Diagonal matrix (b) Single matrix
(c) Special matrices (d) Equal matrices

Q-11 How many types of linked list defined in data structures & algorithms?
(a) 5 (b) 3 (c) 6 (d) 4

Q-12 Which of the following types are used in programming construct?
(a) Linear linked list (b) Doubly linked list
(c) Circular linked (d) All the above

Q-13 How many ways a linear linked list can be traversed?
(a) 2 (b) 3 (c) 4 (d) 5

Q-14 Which amongst the following ways can be traversed on linear linked list?
(a) In-order traversal (b) Reverse-order traversal
(c) Both a & b (d) None of these

Q-15 Traverse the list from the beginning and compare each element of the list with the given element, to be searched is called………..
(a) Sorted list (b) Linear list
(c) Linked list (d) unsorted list

Q-16 In ……………..we need the location of the element & the location of the preceding element.
(a) Auxiliary search (b) Unsorted search
(c) Sorted search (d) None of these

Q-17 How many pointer fields are used in reversing a list?
(a) 4 (b) 3
(c) 2 (d) 1

Q-18 Which of the following fields are used in reversing a list?
(a) Previous (b) Current
(c) Next (d) All of these

Q-19 Deleting entire list can be accomplished by performing which of the following steps?
(a) Assign the start pointer to a temporary variable
(b) Advance the start pointer to the next node
(c) Deallocate the memory occupied by the node pointed to by p t r.
(d) All of these

Q-20 A linear linked list, except that the last element points to the first element is called………
(a) Circular linked list (b) Doubly linked list
(c) Both a & b (d) None of these

Q-21 A linked list which always contains a special node is called………
(a) Circular linked list (b) Header node
(c) Doubly linked list (d) Linear linked list

Q-22 To produce the addition of polynomials which of the following steps to be performed?
(a) The terms of the polynomials are scanned from left to right
(b) The terms with powers that occurs only in one polynomials are simply copied into
resulting polynomial.
(c) The coefficients of terms with same powers are added and then the new term is copied
into the resulting polynomial.
(d) All of these

Q-23 Inserting at the end of the list is done by performing which of the following steps?
(a) Assign NULL value to the next pointer field of the new node.
(b) Assign address of the new node to start.
(c) Both a & b
(d) None of these

Q-24 Deleting an element of the list is done by performing which of the following positions?
(a) At the beginning of the list
(b) At the end of the list
(c) After a given element
(d) All of these

Q-25 ………..Are lists whose element are ordered according to the time when they are added to them?
(a) Stacks and queues (b) Stacks and arrays
(c) Queues and arrays (d) Stacks and linked list


1(b) Traversal operation
2(a) 2
3(c) Both a & b
4(d) Linear search
5(a) Insert operation
6(b) Sort operation
7 (c) Merge operations
8(d) Two-dimensional array
9(b) scientific applications
10(c) Special matrices
11(d) 4
12(d) All the above
13(a) 2
14(c) Both a & b
15(d) unsorted list
16(a) Auxiliary search
17(b) 3
18(d) All of these
19(d) All of these
20(a) Circular linked list
21(b) Header node
22(d) All of these
23(c) Both a & b
24(d) All of these
25(a) Stacks and queues

Computer (Data Structure) 2

Computer (Data Structure) 2

Q-1 Program development life cycle is divided in how many parts?
(a) 6 (b) 5
(c) 4 (d) 3

Q-2 Program design is called …………
(a) Top- design program (b) top- down ragramdesign
(c) Down- top program design (d) none of these

Q-3 How many program design tools are described in program development life cycle?
(a) 7 (b) 6
(c) 5 (d) 4

Q-4 A step-by-step description of how to arrive at a solution is called--------------.
(a) Decision tables (b) Structure charts
(c) Flow charts (d) Algorithm

Q-5 A special kind of table, which is divided in to four parts by a pair of horizontal& vertical lines are called-------.
(a) Decision tables (b) Structure charts
(c) Flow charts (d) Algorithms

Q-6 A diagram that shows the logic of the program is called-------.
(a) Algorithm (b) Flow charts
(c) Decision table (d) None of these

Q-7 ----------- is an another tools to describe the way to arrive at a solution.
(a) Coding table (b) Testing and debugging
(c) Pseudo codes (d) Flow charts

Q-8 A finite set of steps defining the solution of a particular problem is called-----------?
(a) Data structure (b) Implementing the program
(c) Documenting (d) Algorithm

Q-9 The format for the formal presentation of the algorithm Consists of
how many parts?
(a) 2 (b) 3
(c) 4 (d) 5

Q-10 The comments begin with a-------and the explain the purpose of the instruction.
(a) Single slashes (b) Double slash
(c) ¹ Sign (d) None of these

Q-11 The assignments statement will use the notation as-----------.
(a) Set A ¹2 (b) Max¹ai
(c) Set A=3 (d) Int ¹c’

Q-12 Data may be input & assigned to variable by means of a -------------statement.
(a) Write (b) Open
(c) Save (d) Read

Q-13 The algorithm is completed with the execution of the------------------.
(a) Last instruction (b) First instruction
(c) Middle instruction (d) Statement block

Q-14 Structured Programming constructs how many following type of programming constructs?
(a) 4 (b) 3
(c) 2 (d) 1

Q-15 The steps are executes one after other is called-----------------?
(a) Selection programming (b) Iterative programming
(c) Sequent ional programming (d) None of these

Q-16 The structure which implement conditions and depending on the out Come of the conditions may select one of the alternatives is called?
(a) Double attentive (b) Single alternative
(c) Multiple alternative (d) If structure

Q-17 Selection programming constructs how many following types of Programming constructs?
(a) 3 (b) 2
(c) 1 (d) None of these

Q-18 Which of these following selections programming construct are used in programming construct?
(a) Single alternatives (b) Double alternative
(c) Multiple alternative (d) All the above

Q-19 The instructions that are executed repetitively constitute the body of the loop is called---------?
(a) Selection programming construct
(b) Iterative programming construct
(c) Multiple programming construct
(d) None of these

Q-20 Iterative programming constructs & falls in to how many following categories?
(a) 5 (b) 4
(c) 3 (d) 2

Q-21 Which of the following iterative programming construct used in Programming construct?
(a) For construct (b) While construct
(c) Do- while construct (d) All the above

Q-22 The choice of particular algorithm depends on which of the following considerations?
(a) Programming requirements (b) Memory requirements
(c) Performance requirements (d) All of these

Q-23 The space needed to store the executable version of the program and is fixed is called--------?
(a) Instruction space (b) Date space
(c) Record space (d) None of these

Q-24 An algorithm is the amount of time it needs to run to completion is called----------?
(a) Time space trade-off (b) Time complexity
(c) Expressing space trade-off (d) None of these

Q-25 A characterization scheme that allows to measure prosperities of algorithms such as performance and for memory in a general fashion is called-----------?
(a) Recursion (b) Depth recursion
(c) Big Of Notation (d) Minmax problem


1 (a) 6
2 (b) top- down ragramdesign
3 (c) 5
4 (d) Algorithm
5 (a) Decision tables
6 (b) Flow charts
7 (c) Pseudo codes
8 (d) Algorithm
9 (a) 2
10 (b) Double slash
11 (c) Set A=3
12 (d) Read
13 (a) Last instruction
14 (b) 3
15 (c) Sequent ional programming
16 (d) If structure
17 (a) 3
18 (d) All the above
19 (b) Iterative programming construct
20 (c) 3
21 (d) All the above
22 (d) All of these
23 (a) Instruction space
24 (b) Time complexity
25 (c) Big Of Notation