*

.

Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

G.K. Computer ( Fundamental) # 1

                                G.K. Computer (Fundamental)


Q-1 MS-Windows support file names up to---------characters.

        (a) 256                                               (b) 255
        (c) 254                                               (d) 257

Q-2 WYSIWYG stands for ----------------

      (a) What you sing in what you Got    (b) What you see is what you get
      (c) What you seen in what you Got    (d) What you see in what you Got

Q-3 The Application that is used to make telephone calls from the computer using a MODEM is -----

       (a) Phone Divert                                (b) Phone Dialing
       (c) Phone Dialer                                (d) None of these

Q-4 ----------- is used to select some special characters,

       (a) Character chart                           (b) Control panel
       (c) Character Map                            (d) None of these

Q-5 The Text editor available under MS-Windows is -----------

     (a) MS –Word                                  (b) Word Pad
     (c) Notepad                                      (d) None

Q-6 The extension of a file created in MS-Paint ----------

      (a) .BBM                                       (b) .BMP
      (c) .BMM                                      (d) .BPP

Q-7 The executable file for WordPad is :

      (a) TXT.EXE                                 (b) WINDOWS.EXE
     (b) WINWORD.EXE                     (d) WORDPAD.EXE

Q-8 MS-Windows is :

     (a) An spreadsheet                        (b) An Operating System
     (c) An application software          (d) None

Q-9 In the Calculator program, the font of the result can be -------

     (a) Changed                                 (b) Unchanged
     (c) Increase                                  (d) None

Q-10 Paint is an application program, which allows the user to ---------using
        different tools present.

      (a) text entered                            (b) draw pictures
      (c) text in ASCII code                 (d) None

Q-11 Notepad is a application program which allows the text entered by the user to be I in the---------
     (a) ASCII code                            (b) Binary code
     (c) Machine language                 (d) Assembly language

Q-12 The screen saver starts automatically, if the computer is idle for----------------------

   (a) Specified number of minutes  (b) specified number of character
   (c) specified number of hours      (d) specified number of Seconds

Q-13 To select a screen saver, select Screen Saver from Desktop in ---------.

    (a) Programme                          (b) Files
    (c) Control Panel                      (d) None

Q-14 Different mouse pointers can be selected from -------------.

    (a) .CUS or .ANI files             (b) .CUR or .ANS files
    (c) .CUR or .ANI files            (d) .CUT or .ANI files

Q-15 Allows the user to specify the decimal symbol. Default decimal symbol is a ------.

    (a) Dot                                      (b) Comma
    (c) Semi colon                          (d) Colon

Q-16 Determines whether the system of measurement will be -----------.

     (a) U.K.                                    (b) U. S.
     (c) U. P.                                    (d) None

Q-17 Determines which symbol will separate items in a list or series. Default is --------

     (a) Dot                                      (b) Comma
     (c) Colon                                  (d) Semi colon

Q-18 In MS-Windows the default currency symbol is -----------
     (a)  @                                       (b)  $
     (c) #                                          (d)  &

Q-19 Number of digit in-group is used to determine how many digits determine a number group.                 Default is -----.

     (a) 4                                          (b) 5
     (c) 3                                          (d) 2

Q-20 In Keyboard properties, the default language is -------------.

     (a) English (United)                  (b) English (United States)
     (c) English (United Kingdom)  (d) English (United City)

Q-21 The extension of Screen Saver file is -----------.

     (a) .SCS                                    (b) .SCR
     (c) .SCP                                    (d) None

Q-22 The item to change the format of the System Date and Time is -----------

     (a) D and T                               (b) Date and Time
     (c) System Date                        (d) None

Q-23 The executable file for Control Panel is -- ---------.

     (a) Control.EXE                        (b) Control.TXE
     (c) Control.TXT                        (d) Control.PXE

Q-24 The default time separator is -------------------.

     (a) @                                         (b) $
     (c) :                                            (d) :

Q-25 How many printer can be install at a time?

    (a) One                                       (b) Two
    (c) Three                                    (d) None


Answers

1. b 2. b 3. c 4. c 5. c 6. b 7. d 8. b 9. b 10. b 11. a 12. a 13. c
14. c 15. a 16. b 17. b 18. b 19. c 20. b 21. b 22. b 23. a 24. c 25. a



G.K. Computer Fundamental

G.K. Computer Fundamental

Q-1 Manual data can be put into computer by ………….’

(a) Keyboard (b) MICR
(c) OCR (d) Scanner

Q-2 The ………… provides the go-ahead approval for the development of projects

(a) The project head (b) The user department head
(c) The senior management (d) All of the above

Q-3 Which not the following does not fall under the category of operations to be performed during development of software

(a) Personnel security (b) Logical access control
(c) Physical protection (d) Environmental protection

Q-4 The term ‘remote’ wrt network means

(a) A device that cannot control network functions
(b) Machine located far off
(c) Any peripheral or application located far off
(d) FEP

Q-5 Which access control mechanism does security label fit into ?

(a) Logical access control (b) Discretionary access control
(c) Physical access control (d) None of these

Q-6 A character that retains its value during program execution is …………..

(a) Constant (b) Variables
(c) Type definitions (d) Function

Q-7 All decisions for a LAN are taken by

(a) The it steering committee (b) The top management
(c) A business analyst (d) A project manager

Q-8 Generation of PIN in Bank ATM would require :

(a) Acquirer validates
(b) Acquirer sends response to the acceptor
(c) Authorizations request is sent to the acquirer
(d) PIN entered is encrypted

Q-9 …………. Are self replicating malicious code independent of the action of the user, but slow down the processor on entering a network

(a) Viruses (b) Worms
(c) Trojan Horse (d) None of the above

Q-10 Physical access to a database can be altered by which factors ?

(a) OS used by the software (b) Hiring Procedure
(c) Biometric security tools (d) Access privileges

Q-11 Which is NOT a feature of www ?

(a) Retrieving information (b) Enabling multimedia
(c) Built in hyper text capability (d) None of these

Q-12 Organization would prefer in house development of software to

(a) Ensure that development adhere to defined quality
(b) Maintain vendor relations
(c) Use the technology that is being widely used for development
(d) None of these

Q-13 Which of the following is the fastest ?

(a) Tapes (b) Hard disk
(c) Floppy disk (d) CDs

Q-14 Which of the memory is fastest ?

(a) Auxiliary` (b) Buffer
(c) Hard disk (d) Optical drive

Q-15 Which of the following cannot be shared ?

(a) Printer (b) Scanner
(c) Plotter (d) Mouse

Q-16 Which one of the following statements is true with respect to VSAT ?

(a) Usage is restricted to geographical boundaries
(b) Very high cost due to the usage of fibre optic cables
(c) Though quality of data is high, it does not support high bandwidth
(d) It operates in two frequency bands namely Ku and C

Q-17 The CPU ( Central processing unit ) has

(a) Input ,output and processing
(b) Control unit primary storage and secondary storage
(c) Control unit , arithmetic – logic unit, and primary storage
(d) None of the above

Q-18 What should be considered while division of duties in an IT environment bank ?

 (a) Nature of business operations (b) Managerial policy
(c) Organization structure with job description (d) All the above

Q-19 Which of the following is used to append a digital signature ?

(a) Public key (b) private key
(c) Digital key (d) None of these

Q-20 Computer program looking “normal” but containing harmful code is infected by

(a) Trojan Horse (b) Virus
(c) Worm (d) None of these

Q-21 Steganography is

(a) Hiding the data to make it necessarily invisible and not easily detectable
(b) Hiding the data but not necessarily making it invisible and not easily detectable
(c) Detecting and destroying the hidden data
(d) None of these

Q-22 Mark I computer was

(a) Electrical machine (b) Mechanical Machine
(c) Electronic Machine (d) None of these

Q-23 A computer faster with

(a) GUI (b) Mouse
(c) Keyboard (d) None of these

Q-24 Which of the following do you think is NOT required to develop an application for computer ?

(a) Feasibility study (b) Designing
(c) Testing (d) None of these

Q-25 The data flow diagram is for analyzing

(a) How to do a function efficiently
(b) Restrict the number of times a function can be performed
(c) Requirements of user
(d) None of these

ANSWERS:-

1. d 2. c 3. a 4. b 5. d 6. a 7. a 8. d 9. c 10. b 11. d 12. a 13. b
14. b 15. d 16. d 17. d 18. c 19. b 20. a 21. b 22. c 23. c 24. d 25. c

Reasons:

8. so that no one is able to understand it
12. In house development is company developing its own software
20 Trojan horse is software that has ‘virus hidden in it
24 All of these are required
25. These diagrams are just like flowcharts only difference is they show data movement instead of flow control in charts.

G.K (Computer Fundamentals)

G.K (Computer Fundamentals) 

 Q-1 VLSE Stands for………….
(a) Very large scale integrated circuits (b) Vast longitude scale integrated circuits.
(c) Very long scale interconnecting circuits (d) None of these.

Q-2 When was fourth generation computes comes in use ?

(a) 1966-80 (b) 1976-85 (c) 1986-90 (d) 1980-90

Q-3 What is the full form of MICR?

(a) Mark ink compact reader (b) Magnetic ink computer reader
(c) Magnetic ink character reader (d) None of these.

Q-4 How many types of printer are used

(a) 5 (b) 4 (c) 3 (d) 2

Q-5 Which of the following types of printers are used in the world?

(a) Line printers and serial character printers.(b) Drum printer and line printers.
(c) Chain printer and serial character printers (d) None of these

Q-6 The data read from the memory or that to be written in the memory is placed in
register

(a) Rom (b) MDR (C) MAR (d) RAM.

Q-7 MDR Stands for………………

(a) Memory drum register (b) Metric drum register
(c) Memory data register (d) Magnetic data register

Q-8 CDROM Stands for……………

(a) Computer disk read-only memory
(b) Compact direct read-only memory
(c) Computer disk research-only memory
(d) Compact disk read-only memory

Q-9 How many types of ROM in a computer?

(a) 3 (b) 4 (c) 5 (d) 6

Q-10 Variables that can have values in the form of a sequence of characters are
represented by an alphabet and a & sign at the end is called……………

(a) Numeric values (b) Characters (c) String variables

Q-11 BASIC is stands for…………..

(a) Begin all post system instruction code
(b) Beginners` All purpose symbolic instruction code.
(c) Belong all purpose system instruction code.
(d) None of these.

Q-12 Which statement is used to assign a numerical or a string value to a variable?
(a) Go sub (b) LET (C) REM (d) READ-DATA

Q-13 Which of the following printer consists of a steel band on which characters are
          embossed?

           (a) Line printer (b) Drum printer (c) Chain printer (d) None of these.

Q-14 The transaction where selling and buying of products is done online is
            called………….

(a) E-Commerce (b) Netscape navigator
(c) Resolution (d) Spreadsheet

Q-15 HTTP Stands for………….

(a) Hyper table transport protocol
(b) Hyper text transport protocol
(c) Host text transport protocol
(d) None of these

Q-16 A Station on a network is……….It can be a dump terminal or a printer or a
computer machine.


(a) Patch (b) Port (c) Node (d) Interface

Q-17 The language in which data is represented in terms of dens and zeros and
programs can be executed directly by the computer is called……….. .

(a) Assembly language (b) High level language
(c) Binary coded language (d) Machine language

Q-18 PDA Stands for……………..
(a) Prolog digital assistant (b) Program decimal assistant
(c) Protocol digital assistant (d) Personal digital assistant

Q-19 An extremely light weight personal computer, typically weighing less than 6
pounds is called…………

(a) Notebook computer (b) Palmtop (c) Laptop (d) Mini computers

Q-20 How many basic operators in Boolean algebra?

(a) 5 (b) 4 (c) 3 (d) 2

Q-21 The language uses opcodes instead of binary machine codes is called……….

(a) High level language (b) Machine language
(c) Assembly language (d) None of these

Q-22 COBOL Stands for………….

(a) Computer business oriented language
(b) Coded business operator language
(c) Computer business operator language
(d) Common business operator language

Q-23 How many basic types of binary coding used in computers?

(a) 3 (b) 2 (c) 4 (d) 5

Q-24 WAIS Stands for ………..

(a) World area inter server
(b) Wide area information server
(c) Wide area inter connection server
(d) None of these

Q-25 Pascal was developed by which of the following person?

(a) John Backus (b) John kemeny
(c) Nicklaus (d) John wirth

Answers:-

1 (a) Very large scale integrated circuits
2 (b) 1976-85
3 (C) Magnetic ink character reader
4 (d) 2
5 (a) Line printers and serial character printers
6 (b) MDR
7 (c) Memory data register
8 (d) Compact disk read-only memory
9 (a) 3
10 (c) String variables
11 (b) Beginners All purpose symbolic instruction code
12 (b) LET
13 (c) Chain printer
14 (a) E-Commerce
15 (b) Hyper text transport protocol
16 (c) Node
17 (d) Machine language
18 (d) Personal digital assistant
19 (a) Notebook computer
20 (b) 4
21 (c) Assembly language
22 (d) Common business operator language
23 (a) 3
24 (b) Wide area information server
25 (c) Nicklaus wirth

Computer Application-2

Computer Application

Q-1 Which of the following makes a network insecure ?

(a) Encryption (b) Network interface card
(c) Static key (d) None of these

Q-2 Which of the following is IBM’s micro computer ?

(a) Mac (b) Microcomp
(c) Macintosh (d) Both (a) and (b)

Q-3 Which of the following s not a transmission technology ?

(a) Broadcast linking (b) Narrowcast linking
(c) Point to point linking (d) None of these

Q-4 Which of the following are mandatory parts of complete PC system ?

(a) Hardware and Software (b) Input and Output
(c) Keyboard and printer (d) All the above

Q-5 Firewall is used in PC for

(a) Security (b) Authentication
(c) Data transmission (d) None of these

Q-6 Processing control procedures have

(a) Authorization and authentication of users
(b) Access control for online data
(c) Reporting of before and after images
(d) None of these

Q-7 Which of the following do you think is NOT necessary for computerization system in a bank

(a) Effective customer system (b) Effective bank office integration
(c) Focus on manual records (d) None of these

Q-8 CD ROMs are ……………

(a) Primary storage devices (b) Optical storage devices
(c) Magnetic storage devices (d) None of these

Q-9 Library software management software is for

(a) Documenting the changes that are made to program
(b) Controlling the version numbers of the programs
(c) Both (a) and (b)
(d) None of these

Q-10 Client-server computing is used in

(a) Interactive multi-media (b) Network multi-media
(c) MPEG video (d) All the above

Q-11 Floppy disk are

(a) Random access memories (b) Storage devices
(c) Used for transferring data (d) All of the above

Q-12 Which of the following is NOT a characteristic of a computer

(a) Intelligence` (b) Speed
(c) Versatility (d) Automation

Q-13 Which of the following is NOT a part of system ?

(a) Peripherals (b) Electric supply
(c) Logical interconnection between peripherals (d) Common goal

Q-14 The most common input device used today is ………….

(a) Motherboard (b) VDU
(c) Keyboard (d) IC chip

Q-15 The third generation of computer were in

(a) 1959-1964 (b) 1965-1971
(c) 1971- 1981 (d) None of these

Q-16 Which of the following is true?

(a) If while executing a program the power goes off all the instructions and data in the memory
will be host
(b) A PC/XT uses a 80186 microprocessor whereas a PC/AT uses a 80286 microprocessor
(c) both
(d) None of these

Q-17 Which of the following is a component of Internet?

(a) Routers to strengthen the attenuated signals
(b) Repeaters to establish physical connection between various LANs
(c) Gateways to allow a network to use the resources of another main frame
(d) Bridges to optimize the transmission path of massages

Q-18 Which of the following is NOT a server based network features ?
(a) File server (b) DNS
(c) Print server (d) All are server types

Q-19 Collection of tracks on a disk forms ……….
(a) Track (b) Cylinder
(c) Block (d) Disk

Q-20 A device that receives data from slow speed devices and transmits it to different locations is called?

(a) Remote Concentrator (b) Message switcher
(c) Front and processor (d) Demux

Q-21 Desirable feature of modem is

(a) Attenuation and amplification (b) Dynamic equalization
(c) Automatic dial – up (d) All

Q-22 What does the restructuring of existing source code in Reverse Engineering?

(a) Abstraction (b) Completeness
(c) Directionality (d) None of these

Q-23 ………….. is a supercomputer created by networking many small computes.

(a) ASCI white (b) Grid
(c) LAN (d) Network super

Q-24 File transfer is ………………

(a) An application program
(b) The function of the Application Layer
(c) A protocol of the Application Layer
(d) A web application

Q-25 ……………. Is used to read choice filled up by a student in common entrance tests.

(a) Hand held scanner (b) Papers
(c) OMR (d) Pointing devices

ANSWERS:-

1. c 2. c 3. b 4. a 5. a 6. d 7. c 8. a 9. c 10. b 11. d 12. a 13.b
14. c 15. b 16. a 17. c 18. d 19. d 20. a 21. a 22. b 23. b 24. b 25. c

Reasons: 

1. All these keys don’t change, some or the other time they might be hacked
3. There is nothing called as narrowcase
4. System is physical & logical entity
6. They have responsibility checks
7. Once computerized, data is kept in database, not on papers
13. It is supplied by external power
24. FTP is protocol but file transferring is done by application layer

Computer Application-1

Computer Application

Q-1 A topology of computer network means.............

(a) Arrangement of PCs in certain pattern
(b) Cabling between PCs
(c) Way the server connects to PCs
(d) None of these

Q-2 One of the oldest calculating devices was?

(a) Arithometer (b) Ready reckoner
(c) Abacus (d) None of these
Q-3 Electronics funds transfer is the exchange of money

(a) From one place to another (b) From one account to another
(c) From one bank to another (d) all of the above

Q-4 Which of the following is most reliable, robust and has a very high processing power? It is used in networks too.
(a) Super computer (b) Macro computer
(c) Main Frame (d) All of these

Q-5 Which of the following is not a component of an e- wallet?

(a) Digital Cash (b) Communication manager
(c) User Profile Manager (d) None of these
Q-6 Micro computer should be made because of invention of

(a) Intergrated Circuit (b) Transistor
(c) Protocols (d) None of these

Q-7 …………. Is temporary and ………… is Permanent.
(a) Storage, Memory (b) Memory, Storage
(c) Disk Storage (d) None of these

Q-8 How many rollers are actually responsible for movement of the curser in mouse?

(a) One (b) Two
(c) Three (d) Depends from mouse to mouse

Q-9 ………….. can be one of the approach used to tax online transaction

(a) Permanent establishment (b) Residence – Based
(c) Income based classification (d) All of the above

Q-10 Which of the following organization have not become computerized?

(a) Banks (b) Railways
(c) Water supply (d) Airways

Q-11 A computer is a ……….. device

(a) Calculating (b) Electrical
(c) Electronic (d) All of these

Q-12 Transistor was first used in

(a) 2nd generation Computer (b) 3rd generation computer
(c) 4th generation computer (d) None of these

Q-13 Multiprocessing is same as

(a) Multi – Programming (b) Multitasking
(c) Multiuser (d) Multiresource

Q-14 Generally PCs is fail because of

(a) Errors, negligence and low tech manipulation by insiders
(b) Breakdown of hardware
(c) Natural disasters such as fire, earthquake and floods
(d) None of these

Q-15 Which of them takes care of E-mail at client side?

(a) POP (Post office protocol)
(b) MAP (Massaging Application Programming Interface)
(c) IMAP (Internet Massage Access Protocol)
(d) None of these

Q-16 Which of the following is not a peripheral of PC?

(a) CPU (b) O.S.
(b) V.D.U. (d) Touch Screen

Q-17 Dedicated line is same as

(a) Narrowband Line (b) Broadband Line
(c) Leased line (d) None of these

Q-18 The decreased cost and increased performance of computer hardware were the distinguishing features of ………… generation of computers
(a) Second (b) Third
(c) Fourth (d) All generation

Q-19 SONET is a standard for which of the following networks?

(a) Twisted-pair cable (b) Fiber-optic cable
(c) Coaxial cable (d) Ethernet

Q-20 Internet was started as………..

(a) TCP/IP experiment
(b) Network for defences forces of America
(c) Group of research scientist scientists of Bell lab
(d) Contribution was done by all the above institutions

Q-21 Which of these e-commerce systems can handle non monetary documents?

(a) SWIFT (b) EFTS
(c) EDI (d) EBTS

Q-22 1 KB is equivalent to

(a) 1024 bits (b) 1000 bits
(c) 1024 bytes (d) 1000 bytes

Q-24 Which of the following transmission techniques permits data flow in only one direction?
(a) Simplex (b) Half Duplex
(c) Full duplex (d) Multiplexing

Q-25 Which of the following relieves the host computer from tedious job and does them itself?

(a) Remote concentrator (b) Massage switcher
(c) Front and processor (d) Demux

ANSWERS WITH REASONS:-

1. b 2. c 3. b 4. c 5. a 6. a 7. b 8. b 9. d 10. c 11. c
12. a 13. b 14. a 15. c 16. b 17. c 18. d 19. b 2o. b 21. c 22. c
23. a 24. a 25. c

Reasons:

5. Credit cards are used
8. One for movement in X-direction, another for movement in Y- direction
16. Operating system is a software
17. Lease lines is a 24 hour, high bandwidth dedicated line
19. Sonet is also a network architecture like client Server expect that it uses optical fibers has high speed

G. K. (Computer Fundamental)

G. K. (Computer Fundamental)


Find out from the following which is correct option



Q-1 Which of the following was first Generation computer?

(a) EANIC (b) ENIAC
(c) FECNIA (d) None of these

Q-2 When was the first Generation computer started?

(a) 1925- 1935 (b) 1935 – 1945
(c) 1945- 1955 (d) 1955- 1965

Q-3 Which was the first commercial computer?

(a) UNIVAC I (b) UNIVAC II
(c) UNIVAC (D) None of these

Q-4 HLL stands for….

(a) High Lead Language (b) Hyper Lead Language
(c) High Level Language (d) None of these

Q-5 A light sensitive photoelectric cell to signal screen position to the computer is called………….

(a) Key board (b) Mouse
(c) Light Pen (d) Printer

Q-6 When was abacus computer developed?

(a) 1350 B. C. (b) 1450 B. C.
(c) 1550 B. C. (d) 1750 B. C.

Q-7 Which amongst the following country was developing abacus computer in B. C.?

(a) USA (b) UK
(c) India (d) China

Q-8 Who was invented Logarithms, the Second Invention Computer?

(a) Johan Napier (b) Johan Dupe
(c) Blaisse Napier (d) None of these

Q-9 In which of the following year pascal’s Calculator the Adding Machine was invented?

(a) 1542 A. D. (b) 1642 A. D.
(c) 1742 A. B. (d) None of these

Q-10 How many rows and columns in punch cards?

(a) 10 Rows and 60 Columns (b) 12 Rows and 75 Columns
(c) 12 Rows and 80 Columns (d) 15 Rows and 80 Columns

Q-11 The father of modern computer is ………

(a) Blaisse Pascal (b) Charles Napier
(c) Charles Marie (d) Charles Babbage

Q-12 Who was called the first computer Programmer?

(a) Lady Ada Lovelace (b) Lady Aiken
(c) Lady John von (d) None of these

Q-13 When was the machine language developed for the computer?

(a) 1812- 1860 (b) 1815 – 1864
(c) 1817 – 1870 (d) 1820- 1880

Q-14 Which of the following Machine language developed by George Boole?

(a) Abstract Algebra (b) Linear Algebra
(c) Boolean Algebra (d) Modern Algebra

Q-15 EDSACC electronic Delayed storage and calculation in 1947A.D. developed by which University

(a) Harvard University USA (b) Pennsylvania University USA
(c) Oxford University London (d) Cambridge University London

Q-16 An electronic circuitry “Flip- Flops’ the basic unit of computer circuiting – developed by…

(a) Ada Lovelace (b) F. W. Jordan & W. H.Eccles
(c) Ada and George Boole (d) None of these

Q-17 ENIAC (Electronic Numerical Integrator and Calculator) was built by ……….

(a) W. H. Eccles and Presper (b) Presper Eckert and George Boole
(c) John Mauchly & Presper Eckert (d) None of these

Q-18 Who built harved Mark I computer with IBM and no sooner did the first computer ENIAC come in the market?

(a) Howard Aiken (b) Alan Turing
(c) George Boole (d) Johnson Neumann

Q-19 Which of the following generation computers had semi-conductors doped with impurities, better known as the transistors?

(a) First generation computers (b) Second generation computers
(c) Third generation computers (d) None of these

Q-20 Electronic circuits called integrated chips which had transistors closely packed on thin wafers used in ........................

(a) First generation computers (b) Second generation computers
(c) Third generation computers (d) Fourth generation computers

Q-21 How many types of storage media used in a computer system?

(a) Two types (b) Three types
(c) Four types (d) Five types

Q-22 Which amongst the following is extremely fast storage medias and on chip memory that is adjacent to the micro- Processor?

(a) Hard dick (b) Main Memory
(c) Registers (d) None of these

Q-23 FEP stands for……………

(a) FORTRAN English Protocol (b) Front End Processor
(c) Formula of English Principal (d) None of these

Q-24 What is the full form of PDA?

(a) Personal Difference Assistant
(b) Protocol Deformation Assistant
(c) Personal Digital Assistant
(d) Palmtops Digital Apple

Q-25 EBCDIC stands for…………………….

(a) Extended Binary Coded Decimal Interchange Code
(b) Extended Basic Coding Decode Information Code
(c) Extended Binary Coding Decode Interchange Code
(d) None of these

Answers With Reasons:


1 (b) ENIAC
2 (c) 1945- 1955
3(c) UNIVAC
4(c) High Level Language
5 (c) Light Pen
6(b) 1450 B. C.
7 (d) China
8(a) Johan Napier
9(b) 1642 A. D.
10 (c) 12 Rows and 80 Columns
11(d) Charles Babbage
12(a) Lady Ada Lovelace
13(b) 1815 – 1864
14(c) Boolean Algebra
15(d) Cambridge University London
16(b) F. W. Jordan & W. H. Eccles
17(c) John Mabuchi &Presper Ecker
18(a) Howard Aiken
19(b) Second generation computers
20(c) Third generation computers
21(b) Three types
22(c) Registers
23(b) Front End Processor
24(c) Personal Digital Assistant
25(a) Extended Binary Coded Decimal Interchange Code

Computer (Data structure & Algorithms) 3

Computer (Data structure & Algorithms) 3


Q-1 The process of visiting each element of the array exactly once is called ………..
(a) Analysis traversal operation (b) Traversal operation
(c) Search operation (d) Linear search operation

Q-2 How many types of approaches to search operations?
(a) 2 (b) 3
(c) 4 (d) 5

Q-3 Which amongst the following are approaches used to search operations?
(a) Linear search (b) Binary search
(c) Both a & b (d) None of these

Q-4 Which of the following search traverses a sequentially to locate items?
(a) Binary search (b) Logical search
(c) Search field (d) Linear search

Q-5 The operation of adding an element to existing list of elements is called……………..
(a) Insert operation (b) Analysis of binary search
(c) Sorted operation (d) None of these

Q-6 The process of arranging the element of the array in some logical order is called……………..
(a) Delete operation (b) Sort operation
(c) Insert operation (d) None of these

Q-7 The process of combining the elements of two similar structures into a single structure is…………
(a) Bubble sort (b) Sort operation
(c) Merge operation (d) Insert operation

Q-8 A list of a finite number m ´ n of homogeneous data elements is called…………
(a) Linear array (b) Multi dimensional array
(c) Single array (d) Two-dimensional array

Q-9 Matrices are often used to organize data for business and………
(a) Fortran language (b) Scientific applications
(c) Binary coding (d) None of these

Q-10 An square matrix has the same number of rows and columns is called………
(a) Diagonal matrix (b) Single matrix
(c) Special matrices (d) Equal matrices

Q-11 How many types of linked list defined in data structures & algorithms?
(a) 5 (b) 3 (c) 6 (d) 4

Q-12 Which of the following types are used in programming construct?
(a) Linear linked list (b) Doubly linked list
(c) Circular linked (d) All the above

Q-13 How many ways a linear linked list can be traversed?
(a) 2 (b) 3 (c) 4 (d) 5

Q-14 Which amongst the following ways can be traversed on linear linked list?
(a) In-order traversal (b) Reverse-order traversal
(c) Both a & b (d) None of these

Q-15 Traverse the list from the beginning and compare each element of the list with the given element, to be searched is called………..
(a) Sorted list (b) Linear list
(c) Linked list (d) unsorted list

Q-16 In ……………..we need the location of the element & the location of the preceding element.
(a) Auxiliary search (b) Unsorted search
(c) Sorted search (d) None of these

Q-17 How many pointer fields are used in reversing a list?
(a) 4 (b) 3
(c) 2 (d) 1


Q-18 Which of the following fields are used in reversing a list?
(a) Previous (b) Current
(c) Next (d) All of these

Q-19 Deleting entire list can be accomplished by performing which of the following steps?
(a) Assign the start pointer to a temporary variable
(b) Advance the start pointer to the next node
(c) Deallocate the memory occupied by the node pointed to by p t r.
(d) All of these

Q-20 A linear linked list, except that the last element points to the first element is called………
(a) Circular linked list (b) Doubly linked list
(c) Both a & b (d) None of these

Q-21 A linked list which always contains a special node is called………
(a) Circular linked list (b) Header node
(c) Doubly linked list (d) Linear linked list

Q-22 To produce the addition of polynomials which of the following steps to be performed?
(a) The terms of the polynomials are scanned from left to right
(b) The terms with powers that occurs only in one polynomials are simply copied into
resulting polynomial.
(c) The coefficients of terms with same powers are added and then the new term is copied
into the resulting polynomial.
(d) All of these

Q-23 Inserting at the end of the list is done by performing which of the following steps?
(a) Assign NULL value to the next pointer field of the new node.
(b) Assign address of the new node to start.
(c) Both a & b
(d) None of these

Q-24 Deleting an element of the list is done by performing which of the following positions?
(a) At the beginning of the list
(b) At the end of the list
(c) After a given element
(d) All of these

Q-25 ………..Are lists whose element are ordered according to the time when they are added to them?
(a) Stacks and queues (b) Stacks and arrays
(c) Queues and arrays (d) Stacks and linked list

Answers:-

1(b) Traversal operation
2(a) 2
3(c) Both a & b
4(d) Linear search
5(a) Insert operation
6(b) Sort operation
7 (c) Merge operations
8(d) Two-dimensional array
9(b) scientific applications
10(c) Special matrices
11(d) 4
12(d) All the above
13(a) 2
14(c) Both a & b
15(d) unsorted list
16(a) Auxiliary search
17(b) 3
18(d) All of these
19(d) All of these
20(a) Circular linked list
21(b) Header node
22(d) All of these
23(c) Both a & b
24(d) All of these
25(a) Stacks and queues

..