tag:blogger.com,1999:blog-42991755167152415652024-03-04T20:52:18.327-08:00Computer Application Panini Online(Institute of Competitive Exams.)Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.comBlogger12125tag:blogger.com,1999:blog-4299175516715241565.post-72805825893905557612023-04-11T23:02:00.000-07:002023-04-11T23:02:01.436-07:00Computer (Data Structure) 2<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h2 style="text-align: left;">
<strong><span style="color: red;"><u>Computer (Data Structure) 2</u></span></strong></h2><span style="font-size: medium;">
Q-1 Program development life cycle is divided in how many parts?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) 6 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span> (b) 5<br />
(c) 4 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span> (d) 3<br />
<br />
Q-2 Program design is called …………</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br /></span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;">
(a) Top- design program <span> </span><span> </span><span> </span><span> </span><span> </span> (b) top- down program design<br />
(c) Down- top program design <span> </span><span> </span><span> </span>(d) none of these<br />
<br />
Q-3 How many program design tools are described in program development life cycle?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) 7 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span> <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(b) 6<br />
(c) 5<span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span> <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) 4<br />
<br />
Q-4 A step-by-step description of how to arrive at a solution is called--------------.</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Decision tables <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span> (b) Structure charts<br />
(c) Flow charts <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) Algorithm<br />
<br />
Q-5 A special kind of table, which is divided in to four parts by a pair of horizontal& vertical lines are called-------.</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Decision tables <span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span></span>(b) Structure charts<br />
(c) Flow charts <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span><span> </span></span>(d) Algorithms<br />
<br />
Q-6 A diagram that shows the logic of the program is called-------.<br />
(a) Algorithm <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(b) Flow charts<br />
(c) Decision table <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) None of these<br />
<br />
Q-7 ----------- is an another tools to describe the way to arrive at a solution.</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Coding table <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(b) Testing and debugging<br />
(c) Pseudo codes <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) Flow charts<br />
<br />
Q-8 A finite set of steps defining the solution of a particular problem is called-----------?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Data structure <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span></span>(b) Implementing the program<br />
(c) Documenting <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> <span> </span></span></span>(d) Algorithm<br />
<br />
Q-9 The format for the formal presentation of the algorithm Consists of<br />
how many parts?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) 2 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span></span>(b) 3 <br />
(c) 4 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span></span>(d) 5<br />
<br />
Q-10 The comments begin with a-------and the explain the purpose of the instruction.</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Single slashes <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span></span>(b) Double slash<br />
(c) ¹ Sign <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> <span> </span></span></span>(d) None of these<br />
<br />
Q-11 The assignments statement will use the notation as-----------.</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Set A ¹2 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span></span>(b) Max¹ai<br />
(c) Set A=3 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span></span>(d) Int ¹c’<br />
<br />
Q-12 Data may be input & assigned to variable by means of a -------------statement.</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Write <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> <span> </span></span></span>(b) Open<br />
(c) Save <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span></span>(d) Read<br />
<br />
Q-13 The algorithm is completed with the execution of the------------------.</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Last instruction <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(b) First instruction<br />
(c) Middle instruction <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) Statement block<br />
<br />
Q-14 Structured Programming constructs how many following type of programming constructs?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) 4 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(b) 3 <br />
(c) 2 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) 1<br />
<br />
Q-15 The steps are executes one after other is called-----------------?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Selection programming <span> </span><span> </span><span> </span> <span> </span>(b) Iterative programming<br />
(c) Sequential programming <span> </span><span> </span> <span> <span> </span></span>(d) None of these<br />
<br />
Q-16 The structure which implement conditions and depending on the out Come of the conditions may select one of the alternatives is called?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Double attentive <span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span></span>(b) Single alternative<br />
(c) Multiple alternative <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) If structure<br />
<br />
Q-17 Selection programming constructs how many following types of Programming constructs?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) 3 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(b) 2 <br />
(c) 1 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) None of these<br />
<br />
Q-18 Which of these following selections programming construct are used in programming construct?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Single alternatives <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(b) Double alternative<br />
(c) Multiple alternative <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) All the above<br />
<br />
Q-19 The instructions that are executed repetitively constitute the body of the loop is called---------?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Selection programming construct<br />
(b) Iterative programming construct<br />
(c) Multiple programming construct<br />
(d) None of these<br />
<br />
Q-20 Iterative programming constructs & falls in to how many following categories?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) 5 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span> </span>(b) 4<br />
(c) 3 <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span></span>(d) 2<br />
<br />
Q-21 Which of the following iterative programming construct used in Programming construct?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) For construct <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(b) While construct<br />
(c) Do- while construct <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) All the above<br />
<br />
Q-22 The choice of particular algorithm depends on which of the following considerations?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Programming requirements <span> </span><span> </span> (b) Memory requirements<br />
(c) Performance requirements <span> </span><span> </span><span> </span>(d) All of these<br />
<br />
Q-23 The space needed to store the executable version of the program and is fixed is called--------?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Instruction space <span> </span><span> </span><span> </span><span> </span><span> </span><span> <span> </span></span>(b) Date space<br />
(c) Record space <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) None of these<br />
<br />
Q-24 An algorithm is the amount of time it needs to run to completion is called----------?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Time space trade-off <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(b) Time complexity<br />
(c) Expressing space trade-off <span> </span><span> </span><span> </span>(d) None of these<br />
<br />
Q-25 A characterization scheme that allows to measure prosperities of algorithms such as performance and for memory in a general fashion is called-----------?</span></div><div dir="ltr" style="text-align: left;" trbidi="on"><span style="font-size: medium;"><br />
(a) Recursion <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(b) Depth recursion<br />
(c) Big Of Notation <span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span>(d) Minmax problem<br />
<br />
<br />
</span><h3 style="text-align: left;">
<strong><span style="color: #3d85c6; font-size: medium;"> ANSWERS:-</span></strong></h3><span style="font-size: medium;">
1 (a) 6<br />
2 (b) top- down program design<br />
3 (c) 5<br />
4 (d) Algorithm<br />
5 (a) Decision tables<br />
6 (b) Flow charts<br />
7 (c) Pseudo codes<br />
8 (d) Algorithm<br />
9 (a) 2 <br />
10 (b) Double slash<br />
11 (c) Set A=3<br />
12 (d) Read<br />
13 (a) Last instruction<br />
14 (b) 3<br />
15 (c) Sequential programming<br />
16 (d) If structure<br />
17 (a) 3<br />
18 (d) All the above<br />
19 (b) Iterative programming construct<br />
20 (c) 3<br />
21 (d) All the above<br />
22 (d) All of these<br />
23 (a) Instruction space<br />
24 (b) Time complexity<br />
25 (c) Big Of Notation</span></div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com0tag:blogger.com,1999:blog-4299175516715241565.post-2010536731502618762023-04-11T23:01:00.001-07:002023-04-11T23:01:35.396-07:00G.K. (Computer Fundamental) # 3<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
<strong><span style="color: #cc0000;"> </span><span style="color: red;"><u>G.K. (Computer Fundamental)</u></span></strong></h2>
Q-1 The bank use……………. Device to minimize conversion process.<br />
<br />
(a) Keyboard (b) MICR<br />
(c) OCR (d) Scanner<br />
<br />
Q-2 ………………can’t be used for source of data automation.<br />
<br />
(a) POS terminal (b) OCR<br />
(c) Keyboard (d) UPC<br />
<br />
Q-3 Under which case will intranet be an effective networking tool/s?<br />
<br />
(a) In a distributed decision-making environment<br />
(b) Where heterogeneous applications are involved<br />
(c) In a centralised organization <br />
(d) In a decentralized organization<br />
<br />
Q-4 When an organization gives contract for development of software; it has to<br />
give data to the service provider. In Such cases, the ownership of data<br />
should be_________<br />
<br />
(a) Transferred to the service provider <br />
(b) With the client/organization that outsource services<br />
(c) Shared by both parties <br />
(d) Not transferred<br />
<br />
Q-5 A modem performs_________<br />
<br />
(a) Modulation (b) Demodulation<br />
(c) Data compression (d) All of these<br />
<br />
Q-6 Which of the following is NOT done by modem?<br />
<br />
(a) Transmission Speed (b) Data Accuracy<br />
(c) Error detection and Correction (d) Data Compression<br />
<br />
Q-7 A program coded in programming language is____________ .<br />
<br />
(a) Target code (b) Source code<br />
(c) Block (d) None of these<br />
<br />
Q-8 “Platform” in computer world means___________ .<br />
<br />
(a) Computer hardware used (b) Operating Systems used<br />
(c) Both of these (d) None of these<br />
<br />
Q-9 Which of these biometric tools use thermal sensors along with infrared<br />
rays for identification?<br />
<br />
(a) Key stroke dynamics (b) Iris/ Retinal scan<br />
(c) Speech recognition (d) Fingerprint scanning<br />
<br />
Q-10 what is incorrect about software?<br />
<br />
(a) It can manipulate computer (b) It has programs, instructions<br />
(c) It can be touched (d) It can be touched<br />
<br />
Q-11 Disadvantage of distributed database is..<br />
<br />
(a) Unreliability (b) Easy implementation<br />
(c) Insecurity (d) High communication cost<br />
<br />
Q-12 which of the following transmission techniques let computer to<br />
alternatively send and receive data ?<br />
<br />
(a) Simplex (b) Half duplex<br />
(c)Full duplex (d) Multiplexing<br />
<br />
Q-13 What is NOT a feature of networking?<br />
<br />
(a) Reliability (b) Greater storage space<br />
(c) Connectivity (d) All are features of networking<br />
<br />
Q-14 Taking back-up of a file against crash is a<br />
<br />
(a) Preventive measure (b) Curative measure<br />
(c) Decisive measure (d) None of these<br />
<br />
Q-15 A memory that is referred by its contents instead of physical<br />
address is called--------------------.<br />
<br />
(a) Associative memory (b) Content addressable storage<br />
(c) Both (a) and (b) (d) None of these<br />
<br />
Q-16 Most dangerous risk in leaking of information is :<br />
<br />
(a) ready access to online terminals<br />
(b) Online processing of data<br />
(c) Ignorance about the existence of risk<br />
(d) All of these<br />
<br />
Q-17 A camera is an........<br />
<br />
(a) Input device (b) Can be either input or output<br />
(c) Processing machine (b) Output device<br />
<br />
Q-18 Using anti-virus software is----------<br />
<br />
(a) Preventive measure (b) Detective measure<br />
(c) Corrective measure (d) All the above<br />
<br />
Q-19 An online transaction is -----------------<br />
<br />
(a) One that is done in real time <br />
(b) Transaction done via internet<br />
(c) One that is done via telephone <br />
(d) None of these<br />
<br />
Q-20 A clerk in a bank has to access data in customer account. Logical access<br />
control for these users would be.<br />
<br />
(a) Use of individual passwords<br />
(b) Use of a Accounts Receivable Section password<br />
(c) Use of individual passwords plus separate access passwords for<br />
customer data and product data<br />
(d) Can’t say<br />
<br />
Q-21 To stop unauthorized access to the computer system we should<br />
<br />
(a) Have a trustworthy system administrator<br />
(b) Have a good passwords policy<br />
(c) Have a sound encryption policy<br />
(d) All of the above<br />
<br />
Q-22 Which can not assure data accuracy in an application?<br />
<br />
(a) Limit and reasonableness test (b) Echo checking<br />
(c) Control total (d) None of these<br />
<br />
Q-23 Maximum storage space is available on<br />
(a) CDs (b) ROM<br />
(c) Hard disks (d) Floppies<br />
<br />
Q-24 Jon Von Neumann developed:<br />
<br />
(a) First electronic chip flip flop (b) Stored-program concept<br />
(c) The first electronic computer (d) None of these<br />
<br />
Q-25 Which of the following is single user computer with many features<br />
and good processing power?<br />
<br />
(a) Minicomputer (b) Workstation<br />
(c) Macintosh (d) None of these<br />
<br />
<br />
<h3 style="text-align: left;">
<strong><span style="color: red;"> Answers:-</span></strong></h3>
1. b 2. d 3. c 4. b 5. d 6. b 7. b 8. c 9. c 10. d 11. c 12. b 13. d 14. b 15. b<br />
16. c 17. b 18. a 19. b 20. a 21. b 22. a 23. b 24. a 25. b</div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com0tag:blogger.com,1999:blog-4299175516715241565.post-55247774234346948192023-04-11T23:01:00.000-07:002023-04-11T23:01:06.412-07:00GK (Computer Fundamental) # 2<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
<span><span style="color: #cc0000;"> </span><u><span style="color: red;"> </span></u></span><span style="color: red;"><u> GK (Computer Fundamental)</u></span></h2>
Q-1 The executable file for Windows Explorer is ----------.<br />
<br />
(a) Expol.EXE (b) Explorer.EXE<br />
(c) Explorer.TXT (d) Explorer. EXT<br />
<br />
Q-2 ----------------is a tool to browse all disks connected to the computer.<br />
<br />
(a) Internet Explorer (b) Windows Explorer<br />
(c) Windows Navigator (d) None of these<br />
<br />
Q-3 The menu option to delete all the files present in the Recycle Bin is -----------.<br />
(a) Empty Recycle Bin (b) Full Recycle Bin<br />
(c) Half Empty Recycle Bin (d) None of these<br />
<br />
Q-4 The facility to reduce the Taskbar to thin line when the taskbar or Start button<br />
is not in use is called as ----------------------<br />
<br />
(a) Auto hide (b) Hide<br />
(c) Automatic (d) None of these<br />
<br />
Q-5 The extension for a created shortcut is------------.<br />
<br />
(a) .KLN (b) .NLK<br />
(c) .LNK (d) .LKN<br />
<br />
Q-6 The shortcut key to switch between different applications is ----------.<br />
<br />
(a) Alt + Tab (b) Alt + Shift<br />
(c) Shift + Tab (d) Alt + Ctrl<br />
<br />
Q-7 The Taskbar can be moved to ------------ of the screen.<br />
<br />
(a) Right corner (b) Left corner <br />
(c) Any corner (d) Top corner<br />
<br />
Q-8 It is not possible to add items to the ---------------------.<br />
<br />
(a) Program menu (b) Start menu<br />
(c) Accessories menu (d) None <br />
<br />
Q-9 Files can be deleted from Windows with or without confirmation.<br />
<br />
(a) True (b) False<br />
<br />
Q-10 Shortcuts can be created on the desktop.<br />
<br />
(a) True (b) False<br />
<br />
Q-11 Unix is an example for :<br />
<br />
(a) Input Device (b) Output<br />
<br />
(c) Operating system (d) Terminal<br />
<br />
Q-12 Virus is a:........<br />
<br />
(a) OS (b) Destructive Program<br />
<br />
(c) Useful Hardware (d) Useful Software<br />
<br />
Q-13 Loading Operating System onto RAM is called:<br />
<br />
(a) Booting (b) Saving<br />
(c) Printing (d) Opening<br />
<br />
Q-14 An example for Virus:<br />
<br />
(a) Virus Rx (b) Nashot <br />
(c) Raindrops (d) Undelete<br />
<br />
Q-15 Multiple CPUs help processing multiple instructions simultaneously:<br />
<br />
(a) Multiprogramming (b) Memory Management<br />
(c) Multiprocessing (d) None of these<br />
<br />
Q-16 DOS Command to view the contents of the file -------EDUCATION.BAT is :<br />
<br />
(a) TYPE EDUCATION.BAT (b) DEL EDUCATION.BAT<br />
<br />
(c) View EDUCATION.BAT (d) REN EDUCATION.BAT<br />
<br />
Q-17 Start button of windows 98 is available in :<br />
<br />
(a) Control Panel (b) MS-Paint <br />
(c) Taskbar (d) WordPad<br />
<br />
Q-18 In Web Style, a single click on a program icon on desktop will:<br />
<br />
(a) Copy the program (b) Delete the program<br />
(c) Open the program (d) Close the program<br />
<br />
Q-19 In Unix, mv command is used to :<br />
<br />
(a) View the contents of a file (b) Change the name of a file<br />
(c) Delete a file (d) None of these<br />
<br />
Q-20 Windows 98 supports:<br />
<br />
(a) Plug & Play (b) Creating Web pages<br />
(c) Multitasking (d) All of these<br />
<br />
Q-21 Memory Management is performed by ------------------------.<br />
<br />
(a) Operating System (b) Application<br />
(c) Software (d) None <br />
<br />
Q-22 A wall paper effect can be created by using ---------------picture.<br />
<br />
(a) JPEG (b) GIF<br />
(c) Bitmap (d) JPG<br />
<br />
Q-23 Deleted files can be recalled in windows 98 using ----------.<br />
<br />
(a) Recycle (b) Recycle Bin<br />
(c) Bin Recycle (d) None<br />
<br />
Q-24 To edit a scanner image, in Windows 98, use -----------.<br />
<br />
(a) Image (b) Images<br />
(c) Imaging (d) None<br />
<br />
Q-25 The two files used by Web View is ------------& -----------.<br />
<br />
(a) Desktop,INI, Folder,HTT (b) Desktop,INS, Folder,HTP<br />
(c) Desktop,SNI, Folder,HST (d) None<br />
<strong><span style="color: #660000;"><br /></span></strong>
<br />
<h3 style="text-align: left;">
<strong><span style="color: red;"> Answers:-</span></strong></h3>
1. b 2. b 3. a 4. a 5. c 6. a 7. c 8. c 9. a 10. a 11. b 12 c 13. d 14. c<br />
15. b 16. c 17. b 18. b 19. c 20. d 21. a 22. c 23. b 24. c 25. a</div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com0tag:blogger.com,1999:blog-4299175516715241565.post-4664282950450252922023-04-11T23:00:00.000-07:002023-04-11T23:00:16.233-07:00G.K. Computer ( Fundamental) # 1<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;"><strong><span style="color: #3d85c6;"> </span><span style="color: red;"><u>G.K. Computer (Fundamental)</u></span></strong></h2>
<strong><span style="color: #3d85c6;"><br /></span></strong> Q-1 MS-Windows support file names up to---------characters.<br />
<br />
(a) 256 (b) 255<br />
(c) 254 (d) 257<br />
<br />
Q-2 WYSIWYG stands for ----------------<br />
<br />
(a) What you sing in what you Got (b) What you see is what you get<br />
(c) What you seen in what you Got (d) What you see in what you Got<br />
<br />
Q-3 The Application that is used to make telephone calls from the computer using a MODEM is -----<br />
<br />
(a) Phone Divert (b) Phone Dialing<br />
(c) Phone Dialer (d) None of these<br />
<br />
Q-4 ----------- is used to select some special characters,<br />
<br />
(a) Character chart (b) Control panel<br />
(c) Character Map (d) None of these<br />
<br />
Q-5 The Text editor available under MS-Windows is -----------<br />
<br />
(a) MS –Word (b) Word Pad<br />
(c) Notepad (d) None<br />
<br />
Q-6 The extension of a file created in MS-Paint ----------<br />
<br />
(a) .BBM (b) .BMP<br />
(c) .BMM (d) .BPP<br />
<br />
Q-7 The executable file for WordPad is :<br />
<br />
(a) TXT.EXE (b) WINDOWS.EXE<br />
(b) WINWORD.EXE (d) WORDPAD.EXE<br />
<br />
Q-8 MS-Windows is :<br />
<br />
(a) An spreadsheet (b) An Operating System<br />
(c) An application software (d) None <br />
<br />
Q-9 In the Calculator program, the font of the result can be -------<br />
<br />
(a) Changed (b) Unchanged<br />
(c) Increase (d) None<br />
<br />
Q-10 Paint is an application program, which allows the user to ---------using <br />
different tools present.<br />
<br />
(a) text entered (b) draw pictures<br />
(c) text in ASCII code (d) None<br />
<br />
Q-11 Notepad is a application program which allows the text entered by the user to be I in the---------<br />
(a) ASCII code (b) Binary code<br />
(c) Machine language (d) Assembly language<br />
<br />
Q-12 The screen saver starts automatically, if the computer is idle for----------------------<br />
<br />
(a) Specified number of minutes (b) specified number of character<br />
(c) specified number of hours (d) specified number of Seconds<br />
<br />
Q-13 To select a screen saver, select Screen Saver from Desktop in ---------.<br />
<br />
(a) Programme (b) Files<br />
(c) Control Panel (d) None<br />
<br />
Q-14 Different mouse pointers can be selected from -------------.<br />
<br />
(a) .CUS or .ANI files (b) .CUR or .ANS files <br />
(c) .CUR or .ANI files (d) .CUT or .ANI files<br />
<br />
Q-15 Allows the user to specify the decimal symbol. Default decimal symbol is a ------.<br />
<br />
(a) Dot (b) Comma<br />
(c) Semi colon (d) Colon<br />
<br />
Q-16 Determines whether the system of measurement will be -----------.<br />
<br />
(a) U.K. (b) U. S.<br />
(c) U. P. (d) None<br />
<br />
Q-17 Determines which symbol will separate items in a list or series. Default is --------<br />
<br />
(a) Dot (b) Comma<br />
(c) Colon (d) Semi colon<br />
<br />
Q-18 In MS-Windows the default currency symbol is -----------<br />
(a) @ (b) $<br />
(c) # (d) &<br />
<br />
Q-19 Number of digit in-group is used to determine how many digits determine a number group. Default is -----.<br />
<br />
(a) 4 (b) 5<br />
(c) 3 (d) 2<br />
<br />
Q-20 In Keyboard properties, the default language is -------------.<br />
<br />
(a) English (United) (b) English (United States)<br />
(c) English (United Kingdom) (d) English (United City)<br />
<br />
Q-21 The extension of Screen Saver file is -----------.<br />
<br />
(a) .SCS (b) .SCR<br />
(c) .SCP (d) None<br />
<br />
Q-22 The item to change the format of the System Date and Time is -----------<br />
<br />
(a) D and T (b) Date and Time<br />
(c) System Date (d) None<br />
<br />
Q-23 The executable file for Control Panel is -- ---------.<br />
<br />
(a) Control.EXE (b) Control.TXE<br />
(c) Control.TXT (d) Control.PXE<br />
<br />
Q-24 The default time separator is -------------------.<br />
<br />
(a) @ (b) $<br />
(c) : (d) :<br />
<br />
Q-25 How many printer can be install at a time?<br />
<br />
(a) One (b) Two<br />
(c) Three (d) None<br />
<br />
<br />
<h3 style="text-align: left;">
<strong><span style="color: #3d85c6;"> Answers</span></strong> </h3>
1. b 2. b 3. c 4. c 5. c 6. b 7. d 8. b 9. b 10. b 11. a 12. a 13. c<br />
14. c 15. a 16. b 17. b 18. b 19. c 20. b 21. b 22. b 23. a 24. c 25. a<br />
<br />
<br />
<br /></div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com0tag:blogger.com,1999:blog-4299175516715241565.post-84594298313780822402023-04-11T22:59:00.002-07:002023-04-11T22:59:50.694-07:00Some Important Expected Questions of Computer Fundamentals<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyTv438H7lib6Hz8bWrnDf3x_1LPPwOyRmEp1-PMNSuKdEEO8-0vwdW964tG9ATx341Y80HKEjX0y-lGqeU89_kuXa3rEQwEZWU3_OoPC9C-YCNRVAMo3QpjAaJR8G3F89RAItswgUL2Wr/s1600/Computer+Fundamental+GeneralKnowledge.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1296" data-original-width="1600" height="518" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyTv438H7lib6Hz8bWrnDf3x_1LPPwOyRmEp1-PMNSuKdEEO8-0vwdW964tG9ATx341Y80HKEjX0y-lGqeU89_kuXa3rEQwEZWU3_OoPC9C-YCNRVAMo3QpjAaJR8G3F89RAItswgUL2Wr/s640/Computer+Fundamental+GeneralKnowledge.jpg" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMd1mTsZ0MEg9GKHs6jTVUsleNfmS5PB3tsFB3d4N438XKxbO2F_9WfpjX7hqW-OkqTnhbIwqgWX5q100J-_LN4iu8uddMWFazBcEiMQhqcRxo3h1OMsAZLBkg58sXFXYJHjAlfheZT5Vh/s1600/Computer+Fundamental+GeneralKnowledge%25281%2529.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1359" data-original-width="1600" height="543" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMd1mTsZ0MEg9GKHs6jTVUsleNfmS5PB3tsFB3d4N438XKxbO2F_9WfpjX7hqW-OkqTnhbIwqgWX5q100J-_LN4iu8uddMWFazBcEiMQhqcRxo3h1OMsAZLBkg58sXFXYJHjAlfheZT5Vh/s640/Computer+Fundamental+GeneralKnowledge%25281%2529.jpg" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTwwWiDoZzjPBzU-W4SN8AB37KrF-9Iz4BNR3BLLLq71ldPHdYLkQeS_eDX_4WZNKYsB3BbtbLhn_hIVNnIAT-ux1GuDOHbfOPQFzUHYmYL58LhNR8OYOwGsSue9SXckM12X2WHZm37GIj/s1600/Computer+Fundamental+GeneralKnowledge%25282%2529.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1383" data-original-width="1600" height="553" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTwwWiDoZzjPBzU-W4SN8AB37KrF-9Iz4BNR3BLLLq71ldPHdYLkQeS_eDX_4WZNKYsB3BbtbLhn_hIVNnIAT-ux1GuDOHbfOPQFzUHYmYL58LhNR8OYOwGsSue9SXckM12X2WHZm37GIj/s640/Computer+Fundamental+GeneralKnowledge%25282%2529.jpg" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia3spz3an4j19p3YPZEYbrh3UImgfzeqwtUp9jRwawaGu-trFcDewZeK1aVIWS7Hzc1CPzPsJ8l3fkzpN-7EYhmo_5UZik3l__j4_IQ10YPx3l2ZIZWZUUpO2mHwitSpUSFDYM6DdExbhh/s1600/Computer+Fundamental+GeneralKnowledge%25283%2529.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1590" data-original-width="1600" height="635" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia3spz3an4j19p3YPZEYbrh3UImgfzeqwtUp9jRwawaGu-trFcDewZeK1aVIWS7Hzc1CPzPsJ8l3fkzpN-7EYhmo_5UZik3l__j4_IQ10YPx3l2ZIZWZUUpO2mHwitSpUSFDYM6DdExbhh/s640/Computer+Fundamental+GeneralKnowledge%25283%2529.jpg" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjO3ZIwvzBH-Duhm8YQ3IV9SsbOw2EDCCTwT6sTx4OqvO15fbhqowVudz0bjcapL0PPCQ088bTHMYJxG-52bPkVvMbu6M4fSljekFrebIoE0ImA53eR2fYrFqaOvtzLTKI6dIwEWILI9YGw/s1600/Computer+Fundamental+GeneralKnowledge%25284%2529.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1323" data-original-width="1600" height="529" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjO3ZIwvzBH-Duhm8YQ3IV9SsbOw2EDCCTwT6sTx4OqvO15fbhqowVudz0bjcapL0PPCQ088bTHMYJxG-52bPkVvMbu6M4fSljekFrebIoE0ImA53eR2fYrFqaOvtzLTKI6dIwEWILI9YGw/s640/Computer+Fundamental+GeneralKnowledge%25284%2529.jpg" width="640" /></a></div>
</div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com0Nangal, Punjab, India31.3832213 76.37657530000001324.4533058 66.04942680000002 38.313136799999995 86.7037238tag:blogger.com,1999:blog-4299175516715241565.post-36470062965002281462023-04-11T22:59:00.001-07:002023-04-11T22:59:34.334-07:00Computer (Data Structure 1)<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
<span style="color: red;"><u>Computer (Data Structure 1)</u></span></h2>
<br />
Q-1 A value or set of values is called-------?<br />
(a) File (b) Entity (c) Data (d) Key<br />
<br />
Q-2 A data item in a record that takes unique values and can be used to distinguish<br />
a record from other record is called---------?<br />
(a) Key (b) Information<br />
(c) Data time (d) Record<br />
<br />
Q-3 What is information?<br />
(a) Set of values (b) A processed data <br />
(c) A collection of record (d) None of these<br />
<br />
Q-4 Which amongst the following is definition of record?<br />
(a) A collection of similar entities (b) A collection of related records<br />
(c) A collection of related items (d) None of these<br />
<br />
Q-5 A collection of values and a set of operations that act on those values is called---------?<br />
(a) Abstract data type (b) Primitive data type<br />
(c) Polymorphic (d) Data type<br />
<br />
Q-6 A primitive data type is a data type that is--------?<br />
(a) Predefined (b) Post defined<br />
(c) Abstract (d) None of these<br />
<br />
Q-7 The pre defined data type is also known as--------?<br />
(a) Set of values (b) Built – in data type<br />
(c) Polymorphic (d) Abstract data type<br />
<br />
Q-8 A data type that is organized in such a way that the specification of the values and<br />
the specification of the operation on those values are separated from the<br />
representation of the values and the implementation of the operation is called-------?<br />
(a) Primitive data type (b) Polymorphic data type<br />
(c) Abstract data type (d) None of these<br />
<br />
Q-9 What is a list?<br />
(a) A collection of record which can be ordered or unordered <br />
(b) A collection of data type which can be ordered or unordered<br />
(c) A collection of different values<br />
(d) A collection of elements which can be ordered or unordered<br />
<br />
Q-10 ---------- Is important because it supplies two essential pieces of information.<br />
(a) Data typing (b) Data hiding<br />
(c) Data typing (d) None of these<br />
<br />
Q-11 A data structure is a ---------of a particular organization of data.<br />
(a) Algorithm (b) Logical model<br />
(c) Analytical (d) None of these<br />
<br />
Q-12 What is a linear data structure?<br />
(a) The records form a sequence (b) The files form a sequence<br />
(c) The elements from a sequence (d) The logic form a sequence<br />
<br />
Q-13 A list of finite number of elements of same data type is called-----------?<br />
(a) Arrays (b) Data type<br />
(c) Record of file (d) None of these<br />
<br />
Q-14 -------- that requires only one index to access an individual element of the array?<br />
(a) Two-dimensional array (b) One- dimenstrional array <br />
(c) Multi dimensional array (d) Single ten arrays<br />
<br />
Q-15 A linked list is a liner collection of data elements is----?<br />
(a) Array (b) Station <br />
(c) nodes (d) None of these<br />
<br />
Q-16 In liner linked list each node is dinded into how many parts?<br />
(a) 5 (b) 4<br />
(c) 3 (d) 2<br />
<br />
Q-17 In liner linked list first part contains the information of the element and second<br />
called------ contains the address of the node in the list?<br />
(a) The linked field or next pointer field (b) The pervious pointer field<br />
(c) The information of the element (d) None of these<br />
Q-18 In doubly linked list each node is dinded in to how many parts?<br />
(a) 4 (b) 3<br />
(c) 5 (d) 6<br />
<br />
Q-19 LIFO stands for-------?<br />
(a) Left-in-first-off (b) Long- inbox- from- on<br />
(c) Last-in-first-out (d) Last-in-from-open<br />
Q-20 What is a stack?<br />
(a) LIFO (b) FILO<br />
(c) LOFT (d) FOLI<br />
<br />
Q-21 FIFO stands for---------?<br />
(a) First-out-first-in (b) First-inner-from-out<br />
(c) First-inter-for-offer (d) First-in-first-out <br />
<br />
Q-22 A data structure that represents hierarchical relationship between various elements<br />
is called?<br />
(a) Trees (b) Queues<br />
(c) Heaps (d) Shape<br />
<br />
Q-23 How many children are there in a binary tree?<br />
(a) 3 (b) 2<br />
(c) 4 (d) 5<br />
<br />
Q-24 Finding the location of a given element is called----?<br />
(a) Sorting (b) Deletion<br />
(c) Searching (d) In serration<br />
<br />
Q-25 Combining the elements of two similar sorted structures in to a single structure<br />
are called------?<br />
(a) Traversal (b) Heaps<br />
(c) Sorting (d) Merging<br />
<br />
<br />
<h3 style="text-align: left;">
<span style="color: #3d85c6;">Answers With Reasons:-</span></h3>
1 (c) Data<br />
2 (a) Key <br />
3 (b) A processed data<br />
4 (c) A collection of related items<br />
5 (d) Data type<br />
6 (a) Predefined <br />
7 (b) Built – in data type<br />
8 (c) Abstract data type<br />
9 (d) A collection of elements which can be ordered<br />
10 (a) Data typing<br />
11 (b) Logical model<br />
12 (b) Logical model<br />
13 (a) Arrays<br />
14 (b) One- dimensional array<br />
15 (c) Nodes<br />
16 (d) 2<br />
17 (a) The linked field or next pointer field<br />
18 (b) 3<br />
19 (c) Last-in-first-out<br />
20 (a) LIFO<br />
21 (d) First-in-first-out<br />
22 (a) Trees<br />
23 (b) 2<br />
24 (c) Searching<br />
25 (d) Merging</div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com0Nangal, Punjab 140124, India31.3810375 76.38109220000001231.326814000000002 76.300411200000013 31.435261 76.46177320000001tag:blogger.com,1999:blog-4299175516715241565.post-51313444629377473772023-04-11T22:59:00.000-07:002023-04-11T22:59:10.353-07:00G.K. Computer Fundamental<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
<span style="color: red;"><u>G.K. Computer Fundamental </u></span></h2>
Q-1 Manual data can be put into computer by ………….’<br />
<br />
(a) Keyboard (b) MICR<br />
(c) OCR (d) Scanner<br />
<br />
Q-2 The ………… provides the go-ahead approval for the development of projects<br />
<br />
(a) The project head (b) The user department head<br />
(c) The senior management (d) All of the above<br />
<br />
Q-3 Which not the following does not fall under the category of operations to be performed during development of software<br />
<br />
(a) Personnel security (b) Logical access control<br />
(c) Physical protection (d) Environmental protection<br />
<br />
Q-4 The term ‘remote’ wrt network means<br />
<br />
(a) A device that cannot control network functions<br />
(b) Machine located far off<br />
(c) Any peripheral or application located far off<br />
(d) FEP<br />
<br />
Q-5 Which access control mechanism does security label fit into ?<br />
<br />
(a) Logical access control (b) Discretionary access control<br />
(c) Physical access control (d) None of these<br />
<br />
Q-6 A character that retains its value during program execution is …………..<br />
<br />
(a) Constant (b) Variables<br />
(c) Type definitions (d) Function<br />
<br />
Q-7 All decisions for a LAN are taken by<br />
<br />
(a) The it steering committee (b) The top management<br />
(c) A business analyst (d) A project manager<br />
<br />
Q-8 Generation of PIN in Bank ATM would require :<br />
<br />
(a) Acquirer validates<br />
(b) Acquirer sends response to the acceptor<br />
(c) Authorizations request is sent to the acquirer<br />
(d) PIN entered is encrypted<br />
<br />
Q-9 …………. Are self replicating malicious code independent of the action of the user, but slow down the processor on entering a network<br />
<br />
(a) Viruses (b) Worms<br />
(c) Trojan Horse (d) None of the above<br />
<br />
Q-10 Physical access to a database can be altered by which factors ?<br />
<br />
(a) OS used by the software (b) Hiring Procedure<br />
(c) Biometric security tools (d) Access privileges<br />
<br />
Q-11 Which is NOT a feature of www ?<br />
<br />
(a) Retrieving information (b) Enabling multimedia<br />
(c) Built in hyper text capability (d) None of these<br />
<br />
Q-12 Organization would prefer in house development of software to<br />
<br />
(a) Ensure that development adhere to defined quality<br />
(b) Maintain vendor relations<br />
(c) Use the technology that is being widely used for development<br />
(d) None of these<br />
<br />
Q-13 Which of the following is the fastest ?<br />
<br />
(a) Tapes (b) Hard disk<br />
(c) Floppy disk (d) CDs<br />
<br />
Q-14 Which of the memory is fastest ?<br />
<br />
(a) Auxiliary` (b) Buffer<br />
(c) Hard disk (d) Optical drive<br />
<br />
Q-15 Which of the following cannot be shared ?<br />
<br />
(a) Printer (b) Scanner<br />
(c) Plotter (d) Mouse<br />
<br />
Q-16 Which one of the following statements is true with respect to VSAT ?<br />
<br />
(a) Usage is restricted to geographical boundaries<br />
(b) Very high cost due to the usage of fibre optic cables<br />
(c) Though quality of data is high, it does not support high bandwidth<br />
(d) It operates in two frequency bands namely Ku and C<br />
<br />
Q-17 The CPU ( Central processing unit ) has<br />
<br />
(a) Input ,output and processing<br />
(b) Control unit primary storage and secondary storage<br />
(c) Control unit , arithmetic – logic unit, and primary storage<br />
(d) None of the above <br />
<br />
Q-18 What should be considered while division of duties in an IT environment bank ?<br />
<br />
(a) Nature of business operations (b) Managerial policy<br />
(c) Organization structure with job description (d) All the above<br />
<br />
Q-19 Which of the following is used to append a digital signature ?<br />
<br />
(a) Public key (b) private key<br />
(c) Digital key (d) None of these<br />
<br />
Q-20 Computer program looking “normal” but containing harmful code is infected by<br />
<br />
(a) Trojan Horse (b) Virus<br />
(c) Worm (d) None of these<br />
<br />
Q-21 Steganography is<br />
<br />
(a) Hiding the data to make it necessarily invisible and not easily detectable<br />
(b) Hiding the data but not necessarily making it invisible and not easily detectable<br />
(c) Detecting and destroying the hidden data<br />
(d) None of these<br />
<br />
Q-22 Mark I computer was<br />
<br />
(a) Electrical machine (b) Mechanical Machine<br />
(c) Electronic Machine (d) None of these<br />
<br />
Q-23 A computer faster with<br />
<br />
(a) GUI (b) Mouse<br />
(c) Keyboard (d) None of these<br />
<br />
Q-24 Which of the following do you think is NOT required to develop an application for computer ?<br />
<br />
(a) Feasibility study (b) Designing<br />
(c) Testing (d) None of these<br />
<br />
Q-25 The data flow diagram is for analyzing<br />
<br />
(a) How to do a function efficiently<br />
(b) Restrict the number of times a function can be performed<br />
(c) Requirements of user<br />
(d) None of these <br />
<br />
<h3 style="text-align: left;">
<strong><span style="color: #3d85c6;">ANSWERS:-</span></strong></h3>
1. d 2. c 3. a 4. b 5. d 6. a 7. a 8. d 9. c 10. b 11. d 12. a 13. b<br />
14. b 15. d 16. d 17. d 18. c 19. b 20. a 21. b 22. c 23. c 24. d 25. c<br />
<h4 style="text-align: left;">
<span style="color: #3d85c6;">Reasons:</span></h4>
8. so that no one is able to understand it<br />
12. In house development is company developing its own software<br />
20 Trojan horse is software that has ‘virus hidden in it<br />
24 All of these are required<br />
25. These diagrams are just like flowcharts only difference is they show data movement instead of flow control in charts.</div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com0tag:blogger.com,1999:blog-4299175516715241565.post-48560562620902259382023-04-11T22:58:00.001-07:002023-04-11T22:58:46.547-07:00G.K (Computer Fundamentals)<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
<span style="color: red;"><u><strong>G.K (Computer Fundamentals)</strong> </u></span></h2>
Q-1 VLSE Stands for………….<br />
(a) Very large scale integrated circuits (b) Vast longitude scale integrated circuits.<br />
(c) Very long scale interconnecting circuits (d) None of these.<br />
<br />
Q-2 When was fourth generation computes comes in use ?<br />
<br />
(a) 1966-80 (b) 1976-85 (c) 1986-90 (d) 1980-90<br />
<br />
Q-3 What is the full form of MICR?<br />
<br />
(a) Mark ink compact reader (b) Magnetic ink computer reader<br />
(c) Magnetic ink character reader (d) None of these.<br />
<br />
Q-4 How many types of printer are used<br />
<br />
(a) 5 (b) 4 (c) 3 (d) 2<br />
<br />
Q-5 Which of the following types of printers are used in the world?<br />
<br />
(a) Line printers and serial character printers.(b) Drum printer and line printers.<br />
(c) Chain printer and serial character printers (d) None of these<br />
<br />
Q-6 The data read from the memory or that to be written in the memory is placed in<br />
register<br />
<br />
(a) Rom (b) MDR (C) MAR (d) RAM.<br />
<br />
Q-7 MDR Stands for………………<br />
<br />
(a) Memory drum register (b) Metric drum register<br />
(c) Memory data register (d) Magnetic data register<br />
<br />
Q-8 CDROM Stands for……………<br />
<br />
(a) Computer disk read-only memory <br />
(b) Compact direct read-only memory<br />
(c) Computer disk research-only memory <br />
(d) Compact disk read-only memory<br />
<br />
Q-9 How many types of ROM in a computer?<br />
<br />
(a) 3 (b) 4 (c) 5 (d) 6<br />
<br />
Q-10 Variables that can have values in the form of a sequence of characters are<br />
represented by an alphabet and a & sign at the end is called……………<br />
<br />
(a) Numeric values (b) Characters (c) String variables<br />
<br />
Q-11 BASIC is stands for…………..<br />
<br />
(a) Begin all post system instruction code <br />
(b) Beginners` All purpose symbolic instruction code.<br />
(c) Belong all purpose system instruction code.<br />
(d) None of these.<br />
<br />
Q-12 Which statement is used to assign a numerical or a string value to a variable?<br />
(a) Go sub (b) LET (C) REM (d) READ-DATA<br />
<br />
Q-13 Which of the following printer consists of a steel band on which characters are <br />
embossed?<br />
<br />
(a) Line printer (b) Drum printer (c) Chain printer (d) None of these.<br />
<br />
Q-14 The transaction where selling and buying of products is done online is<br />
called………….<br />
<br />
(a) E-Commerce (b) Netscape navigator<br />
(c) Resolution (d) Spreadsheet <br />
<br />
Q-15 HTTP Stands for………….<br />
<br />
(a) Hyper table transport protocol<br />
(b) Hyper text transport protocol<br />
(c) Host text transport protocol<br />
(d) None of these<br />
<br />
Q-16 A Station on a network is……….It can be a dump terminal or a printer or a<br />
computer machine.<br />
<br />
<br />
(a) Patch (b) Port (c) Node (d) Interface<br />
<br />
Q-17 The language in which data is represented in terms of dens and zeros and<br />
programs can be executed directly by the computer is called……….. . <br />
<br />
(a) Assembly language (b) High level language<br />
(c) Binary coded language (d) Machine language<br />
<br />
Q-18 PDA Stands for……………..<br />
(a) Prolog digital assistant (b) Program decimal assistant<br />
(c) Protocol digital assistant (d) Personal digital assistant<br />
<br />
Q-19 An extremely light weight personal computer, typically weighing less than 6<br />
pounds is called…………<br />
<br />
(a) Notebook computer (b) Palmtop (c) Laptop (d) Mini computers<br />
<br />
Q-20 How many basic operators in Boolean algebra?<br />
<br />
(a) 5 (b) 4 (c) 3 (d) 2<br />
<br />
Q-21 The language uses opcodes instead of binary machine codes is called……….<br />
<br />
(a) High level language (b) Machine language<br />
(c) Assembly language (d) None of these<br />
<br />
Q-22 COBOL Stands for………….<br />
<br />
(a) Computer business oriented language <br />
(b) Coded business operator language<br />
(c) Computer business operator language <br />
(d) Common business operator language<br />
<br />
Q-23 How many basic types of binary coding used in computers?<br />
<br />
(a) 3 (b) 2 (c) 4 (d) 5<br />
<br />
Q-24 WAIS Stands for ………..<br />
<br />
(a) World area inter server <br />
(b) Wide area information server<br />
(c) Wide area inter connection server <br />
(d) None of these<br />
<br />
Q-25 Pascal was developed by which of the following person?<br />
<br />
(a) John Backus (b) John kemeny<br />
(c) Nicklaus (d) John wirth <br />
<strong><span style="color: #990000;"><br /></span></strong>
<h3 style="text-align: left;">
<strong><span style="color: #3d85c6;">Answers:-</span></strong></h3>
1 (a) Very large scale integrated circuits<br />
2 (b) 1976-85<br />
3 (C) Magnetic ink character reader<br />
4 (d) 2<br />
5 (a) Line printers and serial character printers<br />
6 (b) MDR<br />
7 (c) Memory data register<br />
8 (d) Compact disk read-only memory<br />
9 (a) 3<br />
10 (c) String variables<br />
11 (b) Beginners All purpose symbolic instruction code<br />
12 (b) LET<br />
13 (c) Chain printer<br />
14 (a) E-Commerce<br />
15 (b) Hyper text transport protocol<br />
16 (c) Node<br />
17 (d) Machine language<br />
18 (d) Personal digital assistant<br />
19 (a) Notebook computer<br />
20 (b) 4<br />
21 (c) Assembly language<br />
22 (d) Common business operator language<br />
23 (a) 3<br />
24 (b) Wide area information server<br />
25 (c) Nicklaus wirth</div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com1tag:blogger.com,1999:blog-4299175516715241565.post-2768454120059948022023-04-11T22:58:00.000-07:002023-04-11T22:58:21.126-07:00Computer Application-2<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
<strong><span style="color: red;"><u>Computer Application</u></span></strong></h2>
Q-1 Which of the following makes a network insecure ?<br />
<br />
(a) Encryption (b) Network interface card<br />
(c) Static key (d) None of these<br />
<br />
Q-2 Which of the following is IBM’s micro computer ?<br />
<br />
(a) Mac (b) Microcomp<br />
(c) Macintosh (d) Both (a) and (b)<br />
<br />
Q-3 Which of the following s not a transmission technology ?<br />
<br />
(a) Broadcast linking (b) Narrowcast linking<br />
(c) Point to point linking (d) None of these<br />
<br />
Q-4 Which of the following are mandatory parts of complete PC system ?<br />
<br />
(a) Hardware and Software (b) Input and Output<br />
(c) Keyboard and printer (d) All the above<br />
<br />
Q-5 Firewall is used in PC for<br />
<br />
(a) Security (b) Authentication<br />
(c) Data transmission (d) None of these<br />
<br />
Q-6 Processing control procedures have<br />
<br />
(a) Authorization and authentication of users<br />
(b) Access control for online data<br />
(c) Reporting of before and after images<br />
(d) None of these<br />
<br />
Q-7 Which of the following do you think is NOT necessary for computerization system in a bank<br />
<br />
(a) Effective customer system (b) Effective bank office integration<br />
(c) Focus on manual records (d) None of these<br />
<br />
Q-8 CD ROMs are ……………<br />
<br />
(a) Primary storage devices (b) Optical storage devices <br />
(c) Magnetic storage devices (d) None of these<br />
<br />
Q-9 Library software management software is for<br />
<br />
(a) Documenting the changes that are made to program<br />
(b) Controlling the version numbers of the programs<br />
(c) Both (a) and (b)<br />
(d) None of these<br />
<br />
Q-10 Client-server computing is used in<br />
<br />
(a) Interactive multi-media (b) Network multi-media<br />
(c) MPEG video (d) All the above<br />
<br />
Q-11 Floppy disk are<br />
<br />
(a) Random access memories (b) Storage devices<br />
(c) Used for transferring data (d) All of the above<br />
<br />
Q-12 Which of the following is NOT a characteristic of a computer<br />
<br />
(a) Intelligence` (b) Speed<br />
(c) Versatility (d) Automation<br />
<br />
Q-13 Which of the following is NOT a part of system ?<br />
<br />
(a) Peripherals (b) Electric supply<br />
(c) Logical interconnection between peripherals (d) Common goal<br />
<br />
Q-14 The most common input device used today is ………….<br />
<br />
(a) Motherboard (b) VDU<br />
(c) Keyboard (d) IC chip<br />
<br />
Q-15 The third generation of computer were in <br />
<br />
(a) 1959-1964 (b) 1965-1971 <br />
(c) 1971- 1981 (d) None of these<br />
<br />
Q-16 Which of the following is true?<br />
<br />
(a) If while executing a program the power goes off all the instructions and data in the memory<br />
will be host<br />
(b) A PC/XT uses a 80186 microprocessor whereas a PC/AT uses a 80286 microprocessor<br />
(c) both<br />
(d) None of these<br />
<br />
Q-17 Which of the following is a component of Internet?<br />
<br />
(a) Routers to strengthen the attenuated signals<br />
(b) Repeaters to establish physical connection between various LANs<br />
(c) Gateways to allow a network to use the resources of another main frame<br />
(d) Bridges to optimize the transmission path of massages<br />
<br />
Q-18 Which of the following is NOT a server based network features ?<br />
(a) File server (b) DNS<br />
(c) Print server (d) All are server types<br />
<br />
Q-19 Collection of tracks on a disk forms ……….<br />
(a) Track (b) Cylinder<br />
(c) Block (d) Disk<br />
<br />
Q-20 A device that receives data from slow speed devices and transmits it to different locations is called?<br />
<br />
(a) Remote Concentrator (b) Message switcher<br />
(c) Front and processor (d) Demux<br />
<br />
Q-21 Desirable feature of modem is <br />
<br />
(a) Attenuation and amplification (b) Dynamic equalization<br />
(c) Automatic dial – up (d) All<br />
<br />
Q-22 What does the restructuring of existing source code in Reverse Engineering?<br />
<br />
(a) Abstraction (b) Completeness<br />
(c) Directionality (d) None of these<br />
<br />
Q-23 ………….. is a supercomputer created by networking many small computes.<br />
<br />
(a) ASCI white (b) Grid<br />
(c) LAN (d) Network super<br />
<br />
Q-24 File transfer is ………………<br />
<br />
(a) An application program <br />
(b) The function of the Application Layer<br />
(c) A protocol of the Application Layer<br />
(d) A web application<br />
<br />
Q-25 ……………. Is used to read choice filled up by a student in common entrance tests.<br />
<br />
(a) Hand held scanner (b) Papers <br />
(c) OMR (d) Pointing devices<br />
<br />
<h2 style="text-align: left;">
<strong><span style="color: #3d85c6;">ANSWERS:-</span></strong></h2>
1. c 2. c 3. b 4. a 5. a 6. d 7. c 8. a 9. c 10. b 11. d 12. a 13.b <br />
14. c 15. b 16. a 17. c 18. d 19. d 20. a 21. a 22. b 23. b 24. b 25. c<br />
<h4 style="text-align: left;">
<span style="color: #3d85c6;">Reasons: </span></h4>
1. All these keys don’t change, some or the other time they might be hacked<br />
3. There is nothing called as narrowcase<br />
4. System is physical & logical entity<br />
6. They have responsibility checks<br />
7. Once computerized, data is kept in database, not on papers <br />
13. It is supplied by external power<br />
24. FTP is protocol but file transferring is done by application layer</div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com0tag:blogger.com,1999:blog-4299175516715241565.post-55564792517716888182023-04-11T22:57:00.001-07:002023-04-11T22:57:59.626-07:00Computer Application-1<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
<strong><span style="color: red;"><u>Computer Application</u></span></strong></h2>
Q-1 A topology of computer network means.............<br />
<br />
(a) Arrangement of PCs in certain pattern<br />
(b) Cabling between PCs<br />
(c) Way the server connects to PCs<br />
(d) None of these<br />
<br />
Q-2 One of the oldest calculating devices was?<br />
<br />
(a) Arithometer (b) Ready reckoner<br />
(c) Abacus (d) None of these<br />
Q-3 Electronics funds transfer is the exchange of money<br />
<br />
(a) From one place to another (b) From one account to another<br />
(c) From one bank to another (d) all of the above<br />
<br />
Q-4 Which of the following is most reliable, robust and has a very high processing power? It is used in networks too.<br />
(a) Super computer (b) Macro computer<br />
(c) Main Frame (d) All of these<br />
<br />
Q-5 Which of the following is not a component of an e- wallet?<br />
<br />
(a) Digital Cash (b) Communication manager<br />
(c) User Profile Manager (d) None of these<br />
Q-6 Micro computer should be made because of invention of<br />
<br />
(a) Intergrated Circuit (b) Transistor <br />
(c) Protocols (d) None of these<br />
<br />
Q-7 …………. Is temporary and ………… is Permanent.<br />
(a) Storage, Memory (b) Memory, Storage<br />
(c) Disk Storage (d) None of these<br />
<br />
Q-8 How many rollers are actually responsible for movement of the curser in mouse?<br />
<br />
(a) One (b) Two<br />
(c) Three (d) Depends from mouse to mouse<br />
<br />
Q-9 ………….. can be one of the approach used to tax online transaction<br />
<br />
(a) Permanent establishment (b) Residence – Based<br />
(c) Income based classification (d) All of the above<br />
<br />
Q-10 Which of the following organization have not become computerized?<br />
<br />
(a) Banks (b) Railways<br />
(c) Water supply (d) Airways<br />
<br />
Q-11 A computer is a ……….. device<br />
<br />
(a) Calculating (b) Electrical<br />
(c) Electronic (d) All of these<br />
<br />
Q-12 Transistor was first used in<br />
<br />
(a) 2nd generation Computer (b) 3rd generation computer<br />
(c) 4th generation computer (d) None of these<br />
<br />
Q-13 Multiprocessing is same as<br />
<br />
(a) Multi – Programming (b) Multitasking <br />
(c) Multiuser (d) Multiresource<br />
<br />
Q-14 Generally PCs is fail because of<br />
<br />
(a) Errors, negligence and low tech manipulation by insiders<br />
(b) Breakdown of hardware <br />
(c) Natural disasters such as fire, earthquake and floods<br />
(d) None of these<br />
<br />
Q-15 Which of them takes care of E-mail at client side?<br />
<br />
(a) POP (Post office protocol)<br />
(b) MAP (Massaging Application Programming Interface)<br />
(c) IMAP (Internet Massage Access Protocol)<br />
(d) None of these<br />
<br />
Q-16 Which of the following is not a peripheral of PC?<br />
<br />
(a) CPU (b) O.S.<br />
(b) V.D.U. (d) Touch Screen<br />
<br />
Q-17 Dedicated line is same as<br />
<br />
(a) Narrowband Line (b) Broadband Line<br />
(c) Leased line (d) None of these<br />
<br />
Q-18 The decreased cost and increased performance of computer hardware were the distinguishing features of ………… generation of computers<br />
(a) Second (b) Third<br />
(c) Fourth (d) All generation<br />
<br />
Q-19 SONET is a standard for which of the following networks?<br />
<br />
(a) Twisted-pair cable (b) Fiber-optic cable<br />
(c) Coaxial cable (d) Ethernet<br />
<br />
Q-20 Internet was started as………..<br />
<br />
(a) TCP/IP experiment <br />
(b) Network for defences forces of America<br />
(c) Group of research scientist scientists of Bell lab<br />
(d) Contribution was done by all the above institutions<br />
<br />
Q-21 Which of these e-commerce systems can handle non monetary documents?<br />
<br />
(a) SWIFT (b) EFTS<br />
(c) EDI (d) EBTS<br />
<br />
Q-22 1 KB is equivalent to<br />
<br />
(a) 1024 bits (b) 1000 bits<br />
(c) 1024 bytes (d) 1000 bytes<br />
<br />
Q-24 Which of the following transmission techniques permits data flow in only one direction?<br />
(a) Simplex (b) Half Duplex<br />
(c) Full duplex (d) Multiplexing<br />
<br />
Q-25 Which of the following relieves the host computer from tedious job and does them itself?<br />
<br />
(a) Remote concentrator (b) Massage switcher<br />
(c) Front and processor (d) Demux<br />
<br />
<h3 style="text-align: left;">
<strong><span style="color: #3d85c6;">ANSWERS WITH REASONS:-</span></strong></h3>
1. b 2. c 3. b 4. c 5. a 6. a 7. b 8. b 9. d 10. c 11. c<br />
12. a 13. b 14. a 15. c 16. b 17. c 18. d 19. b 2o. b 21. c 22. c<br />
23. a 24. a 25. c<br />
<br />
<h4 style="text-align: left;">
<strong><span style="color: #990000;">Reasons:</span></strong></h4>
5. Credit cards are used<br />
8. One for movement in X-direction, another for movement in Y- direction<br />
16. Operating system is a software<br />
17. Lease lines is a 24 hour, high bandwidth dedicated line<br />
19. Sonet is also a network architecture like client Server expect that it uses optical fibers has high speed</div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com0tag:blogger.com,1999:blog-4299175516715241565.post-85089511699399213452023-04-11T22:57:00.000-07:002023-04-11T22:57:33.274-07:00G. K. (Computer Fundamental)<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
<strong><span style="color: red;"><u>G. K. (Computer Fundamental)</u></span></strong></h2>
<strong><span style="color: #990000;"><br /></span></strong>
<h3 style="text-align: left;">
Find out from the following which is correct option</h3>
<br />
<br />
Q-1 Which of the following was first Generation computer?<br />
<br />
(a) EANIC (b) ENIAC<br />
(c) FECNIA (d) None of these<br />
<br />
Q-2 When was the first Generation computer started?<br />
<br />
(a) 1925- 1935 (b) 1935 – 1945<br />
(c) 1945- 1955 (d) 1955- 1965<br />
<br />
Q-3 Which was the first commercial computer?<br />
<br />
(a) UNIVAC I (b) UNIVAC II<br />
(c) UNIVAC (D) None of these<br />
<br />
Q-4 HLL stands for….<br />
<br />
(a) High Lead Language (b) Hyper Lead Language<br />
(c) High Level Language (d) None of these<br />
<br />
Q-5 A light sensitive photoelectric cell to signal screen position to the computer is called………….<br />
<br />
(a) Key board (b) Mouse<br />
(c) Light Pen (d) Printer<br />
<br />
Q-6 When was abacus computer developed?<br />
<br />
(a) 1350 B. C. (b) 1450 B. C.<br />
(c) 1550 B. C. (d) 1750 B. C.<br />
<br />
Q-7 Which amongst the following country was developing abacus computer in B. C.?<br />
<br />
(a) USA (b) UK<br />
(c) India (d) China<br />
<br />
Q-8 Who was invented Logarithms, the Second Invention Computer?<br />
<br />
(a) Johan Napier (b) Johan Dupe<br />
(c) Blaisse Napier (d) None of these<br />
<br />
Q-9 In which of the following year pascal’s Calculator the Adding Machine was invented?<br />
<br />
(a) 1542 A. D. (b) 1642 A. D.<br />
(c) 1742 A. B. (d) None of these<br />
<br />
Q-10 How many rows and columns in punch cards?<br />
<br />
(a) 10 Rows and 60 Columns (b) 12 Rows and 75 Columns<br />
(c) 12 Rows and 80 Columns (d) 15 Rows and 80 Columns<br />
<br />
Q-11 The father of modern computer is ………<br />
<br />
(a) Blaisse Pascal (b) Charles Napier<br />
(c) Charles Marie (d) Charles Babbage<br />
<br />
Q-12 Who was called the first computer Programmer?<br />
<br />
(a) Lady Ada Lovelace (b) Lady Aiken<br />
(c) Lady John von (d) None of these<br />
<br />
Q-13 When was the machine language developed for the computer?<br />
<br />
(a) 1812- 1860 (b) 1815 – 1864<br />
(c) 1817 – 1870 (d) 1820- 1880<br />
<br />
Q-14 Which of the following Machine language developed by George Boole?<br />
<br />
(a) Abstract Algebra (b) Linear Algebra<br />
(c) Boolean Algebra (d) Modern Algebra<br />
<br />
Q-15 EDSACC electronic Delayed storage and calculation in 1947A.D. developed by which University<br />
<br />
(a) Harvard University USA (b) Pennsylvania University USA<br />
(c) Oxford University London (d) Cambridge University London<br />
<br />
Q-16 An electronic circuitry “Flip- Flops’ the basic unit of computer circuiting – developed by…<br />
<br />
(a) Ada Lovelace (b) F. W. Jordan & W. H.Eccles<br />
(c) Ada and George Boole (d) None of these<br />
<br />
Q-17 ENIAC (Electronic Numerical Integrator and Calculator) was built by ……….<br />
<br />
(a) W. H. Eccles and Presper (b) Presper Eckert and George Boole<br />
(c) John Mauchly & Presper Eckert (d) None of these<br />
<br />
Q-18 Who built harved Mark I computer with IBM and no sooner did the first computer ENIAC come in the market?<br />
<br />
(a) Howard Aiken (b) Alan Turing<br />
(c) George Boole (d) Johnson Neumann<br />
<br />
Q-19 Which of the following generation computers had semi-conductors doped with impurities, better known as the transistors?<br />
<br />
(a) First generation computers (b) Second generation computers<br />
(c) Third generation computers (d) None of these<br />
<br />
Q-20 Electronic circuits called integrated chips which had transistors closely packed on thin wafers used in ........................<br />
<br />
(a) First generation computers (b) Second generation computers<br />
(c) Third generation computers (d) Fourth generation computers<br />
<br />
Q-21 How many types of storage media used in a computer system?<br />
<br />
(a) Two types (b) Three types<br />
(c) Four types (d) Five types<br />
<br />
Q-22 Which amongst the following is extremely fast storage medias and on chip memory that is adjacent to the micro- Processor?<br />
<br />
(a) Hard dick (b) Main Memory<br />
(c) Registers (d) None of these<br />
<br />
Q-23 FEP stands for……………<br />
<br />
(a) FORTRAN English Protocol (b) Front End Processor<br />
(c) Formula of English Principal (d) None of these<br />
<br />
Q-24 What is the full form of PDA?<br />
<br />
(a) Personal Difference Assistant<br />
(b) Protocol Deformation Assistant<br />
(c) Personal Digital Assistant<br />
(d) Palmtops Digital Apple<br />
<br />
Q-25 EBCDIC stands for…………………….<br />
<br />
(a) Extended Binary Coded Decimal Interchange Code<br />
(b) Extended Basic Coding Decode Information Code<br />
(c) Extended Binary Coding Decode Interchange Code<br />
(d) None of these<br />
<br />
<h3 style="text-align: left;">
<strong><span style="color: #3d85c6;">Answers With Reasons:</span></strong></h3>
<br />
1 (b) ENIAC<br />
2 (c) 1945- 1955<br />
3(c) UNIVAC<br />
4(c) High Level Language<br />
5 (c) Light Pen<br />
6(b) 1450 B. C.<br />
7 (d) China<br />
8(a) Johan Napier<br />
9(b) 1642 A. D.<br />
10 (c) 12 Rows and 80 Columns<br />
11(d) Charles Babbage<br />
12(a) Lady Ada Lovelace<br />
13(b) 1815 – 1864<br />
14(c) Boolean Algebra<br />
15(d) Cambridge University London<br />
16(b) F. W. Jordan & W. H. Eccles<br />
17(c) John Mabuchi &Presper Ecker<br />
18(a) Howard Aiken<br />
19(b) Second generation computers<br />
20(c) Third generation computers<br />
21(b) Three types<br />
22(c) Registers<br />
23(b) Front End Processor<br />
24(c) Personal Digital Assistant<br />
25(a) Extended Binary Coded Decimal Interchange Code</div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com0tag:blogger.com,1999:blog-4299175516715241565.post-72904633515044197012023-04-11T22:56:00.000-07:002023-04-11T22:56:51.860-07:00Computer (Data structure & Algorithms) 3<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="text-align: left;">
<strong><span style="color: red;"><u> Computer (Data structure & Algorithms) 3</u></span></strong></h2>
<br />
Q-1 The process of visiting each element of the array exactly once is called ………..<br />
(a) Analysis traversal operation (b) Traversal operation<br />
(c) Search operation (d) Linear search operation<br />
<br />
Q-2 How many types of approaches to search operations?<br />
(a) 2 (b) 3 <br />
(c) 4 (d) 5<br />
<br />
Q-3 Which amongst the following are approaches used to search operations?<br />
(a) Linear search (b) Binary search<br />
(c) Both a & b (d) None of these<br />
<br />
Q-4 Which of the following search traverses a sequentially to locate items?<br />
(a) Binary search (b) Logical search<br />
(c) Search field (d) Linear search<br />
<br />
Q-5 The operation of adding an element to existing list of elements is called……………..<br />
(a) Insert operation (b) Analysis of binary search<br />
(c) Sorted operation (d) None of these<br />
<br />
Q-6 The process of arranging the element of the array in some logical order is called……………..<br />
(a) Delete operation (b) Sort operation<br />
(c) Insert operation (d) None of these<br />
<br />
Q-7 The process of combining the elements of two similar structures into a single structure is…………<br />
(a) Bubble sort (b) Sort operation<br />
(c) Merge operation (d) Insert operation<br />
<br />
Q-8 A list of a finite number m ´ n of homogeneous data elements is called…………<br />
(a) Linear array (b) Multi dimensional array<br />
(c) Single array (d) Two-dimensional array<br />
<br />
Q-9 Matrices are often used to organize data for business and………<br />
(a) Fortran language (b) Scientific applications<br />
(c) Binary coding (d) None of these<br />
<br />
Q-10 An square matrix has the same number of rows and columns is called………<br />
(a) Diagonal matrix (b) Single matrix<br />
(c) Special matrices (d) Equal matrices<br />
<br />
Q-11 How many types of linked list defined in data structures & algorithms?<br />
(a) 5 (b) 3 (c) 6 (d) 4<br />
<br />
Q-12 Which of the following types are used in programming construct?<br />
(a) Linear linked list (b) Doubly linked list<br />
(c) Circular linked (d) All the above<br />
<br />
Q-13 How many ways a linear linked list can be traversed?<br />
(a) 2 (b) 3 (c) 4 (d) 5<br />
<br />
Q-14 Which amongst the following ways can be traversed on linear linked list?<br />
(a) In-order traversal (b) Reverse-order traversal<br />
(c) Both a & b (d) None of these<br />
<br />
Q-15 Traverse the list from the beginning and compare each element of the list with the given element, to be searched is called………..<br />
(a) Sorted list (b) Linear list<br />
(c) Linked list (d) unsorted list<br />
<br />
Q-16 In ……………..we need the location of the element & the location of the preceding element.<br />
(a) Auxiliary search (b) Unsorted search<br />
(c) Sorted search (d) None of these<br />
<br />
Q-17 How many pointer fields are used in reversing a list?<br />
(a) 4 (b) 3 <br />
(c) 2 (d) 1<br />
<br />
<br />
Q-18 Which of the following fields are used in reversing a list?<br />
(a) Previous (b) Current<br />
(c) Next (d) All of these<br />
<br />
Q-19 Deleting entire list can be accomplished by performing which of the following steps?<br />
(a) Assign the start pointer to a temporary variable<br />
(b) Advance the start pointer to the next node<br />
(c) Deallocate the memory occupied by the node pointed to by p t r.<br />
(d) All of these<br />
<br />
Q-20 A linear linked list, except that the last element points to the first element is called………<br />
(a) Circular linked list (b) Doubly linked list<br />
(c) Both a & b (d) None of these<br />
<br />
Q-21 A linked list which always contains a special node is called………<br />
(a) Circular linked list (b) Header node<br />
(c) Doubly linked list (d) Linear linked list<br />
<br />
Q-22 To produce the addition of polynomials which of the following steps to be performed?<br />
(a) The terms of the polynomials are scanned from left to right<br />
(b) The terms with powers that occurs only in one polynomials are simply copied into <br />
resulting polynomial.<br />
(c) The coefficients of terms with same powers are added and then the new term is copied<br />
into the resulting polynomial.<br />
(d) All of these<br />
<br />
Q-23 Inserting at the end of the list is done by performing which of the following steps?<br />
(a) Assign NULL value to the next pointer field of the new node.<br />
(b) Assign address of the new node to start.<br />
(c) Both a & b <br />
(d) None of these<br />
<br />
Q-24 Deleting an element of the list is done by performing which of the following positions?<br />
(a) At the beginning of the list<br />
(b) At the end of the list<br />
(c) After a given element<br />
(d) All of these<br />
<br />
Q-25 ………..Are lists whose element are ordered according to the time when they are added to them?<br />
(a) Stacks and queues (b) Stacks and arrays<br />
(c) Queues and arrays (d) Stacks and linked list<br />
<br />
<h3 style="text-align: left;">
<span style="color: #3d85c6;">Answers:-</span></h3>
1(b) Traversal operation<br />
2(a) 2<br />
3(c) Both a & b<br />
4(d) Linear search<br />
5(a) Insert operation<br />
6(b) Sort operation<br />
7 (c) Merge operations<br />
8(d) Two-dimensional array<br />
9(b) scientific applications<br />
10(c) Special matrices<br />
11(d) 4<br />
12(d) All the above<br />
13(a) 2<br />
14(c) Both a & b<br />
15(d) unsorted list<br />
16(a) Auxiliary search<br />
17(b) 3<br />
18(d) All of these<br />
19(d) All of these<br />
20(a) Circular linked list<br />
21(b) Header node<br />
22(d) All of these<br />
23(c) Both a & b<br />
24(d) All of these<br />
25(a) Stacks and queues</div>
Physics Funndahttp://www.blogger.com/profile/08990455691963472001noreply@blogger.com0