Test_CF 2
1. The access point for entry and exit of data are known as?
Connectors b) Ports c) Buses d) Controller
2. Which three of the following statements are TRUE?
Data processing cycle is information in, process and data out
Two categories of software are application and system software
Computers can take decisions on their own, like human beings.
The operating system has to take on conducting a process called as booting
The unit storing any data that comes into the CPU while processing is so called register
3. The string of bits needed to represent a character is called a .
a) Word b) Kilobyte c) Byte d) None of the above
4. The two advantages of domain model over workgroup model are
a) Centralised administration is possible b) Convenient for limited number of users
c) Security management is centralised d) Sharing of resources is easy
5. Each operating System organizes data internally with help of a program knows as file system
a) True b) False
6. Centronics ports are called as
a) Printer ports. b) Parallel ports. c) RS-232.
7. A translator that translates a statement of high-level language to machine language and immediately executes it is.........
a) Translator b) Assembler c) Compiler
d) Interpreter e) None of the above
8. Advantages of a workgroup include (choose three)
a) Centralised management b) Easy to share resources c) Efficient on a large network.
d) Convenient for a limited number of users.
e) Simple design makes it easy to implement.
9. Which of the following statements related to NTFS are TRUE? (choose three)
a) Supports file compression b) No security if user logs in locally
c) Supports long file names d) Partitions as file size can be a maximum of 16 exabytes
e) Not very reliable since it does not support bad cluster mapping
10. Which of the following are TRUE about primary partition? (choose three)
a) The system partition can be located on it b) Can contain only one logical drive.
c) Can contain one and more logical drives d) The boot partition can be located on it.
11. Which two of the following are TRUE about NTFS permission?
a) NTFS permission can be assigned to both file and folder
b) NTFS permission can be assigned only to folder
c) NTFS permission are not effective if the user logs on locally.
d) NTFS permission are effective even if the user logs on locally
12.The various functions performed by Operating System are (three options)
a) It acts as a manager for the various resources and allocates them to various programs and users as and when required by them
b) It allows the user to interact with the hardware to obtain results.
c) It is used to store both data and information
d) It is referred to as the hardware of the computer machine.
e) It interprets the program instructions one at a time
13. Which of the following statement is TRUE while logging on to Windows 2000?
a) The user name is not case sensitive. b) The password is not case sensitive
c) Both name and password is case sensitive d) None of them is case sensitive.
14. Shared permissions can be applied to____________
a) Only FAT partitions b) Only NTFS partitions
c) Both FAT and NTFS partitions d) None of the above
15. Why is protocol used?
a) To connect different computers b) To share the resource on the network
c) To establish communication between computers
16. Which of the following are TRUE about extended partition? (two options)
a) The system partition can be located on it
b) The active partition can be located on it
c) Can contain one and more logical drives.
d) The boot partition can be located on it.
17. Which of the following statements related to NTFS are NOT TRUE? (choose three)
a) Supports file compression b) No security if user logs in locally
c) Supports long file names d) Partitions as file size can be 4 gigabytes maximum
e) Not very reliable since it does not support bad cluster mapping
18. The various functions performed by the Operating System are (three options)
a) It load the user program into the memory
b) It is used to store both data and information.
c) It controls the whole process of data transfer from one place to the other while computations are going on.
d) It gives instruction to display the result on the monitor.
e) It controls the computer hardware. It co-ordinates the flow of data between the various application program and the users.
19. Which three of the following statements related to memory are NOT TRUE?
a) Primary memory is called the main memory or the central memory
b) ROM memory is read/write memory
c) RAM memory is non volatile, its storage is permanent
d) The secondary memory is the internal memory.
e) Data is stored and retrieved from the disk in blocks.
20. The software, which has been developed for a specific application is called
a) System software b) Application software c) Accounting software
d) Used software e) Non of the above
21.With reference to primary memory, which two of the following statements are TRUE?
a) It is so called central memory
b) It is thought of as a collection of many gramophone records stacked on each other without all of them actually touching each other.
c) It is resident on the mother board. d) It is used for only read operation.
22.CPU is also referred as ___________________
a) Calculator b) Micro-Calculator c) Microprocessor d) None of them
23. The two standard types of ports are (Choose 2)
a) Serial b) Printer Port c) Parallel
24. ____________ is a collection of wires used for data transmission from one part of computer to another.
a) Cable b) Bus c) Wire Set
25. When we type the URL of any Web Site, it is converted into an IP address.
a) True b) False
26. Web site is a collection of _____________
a) Web Pages b) Web Sites c) Presentation
27. Which one of the following is used to download softwares?
a) File Transfer Protocol b) Folder Transfer Protocol c) Download Transfer Protocol
28. Conversion of decimal number 80 to binary is
a) 1100010 b) 1010000 c) 1010001 d) 1011000
29. The Decimal equivalent of 111001
a) 52 b) 47 c) 56 d) 57
30. The result of subtraction of the binary number 11100101 from 101100 is
a) -11111000 b) 1000110 c) -10111001 d) None of the above
31. Which of the following statements are FALSE? (3)
POST is the process of the booting the computer
The POST process requires a bootable disk to perform its checks
The user must perform the POST process when the machine is booted
The POST process is carried out before the operating system is loaded
The POST process always effectively detects hardware errors
32. The codes defined to convey information like end-of-file, end-of-page, etc. to the computer are called
a) Binary code b) Non-printable control characters
c) Symbolic codes d) ASCII code e) Character code
33. Computers that are mainly used for scientific and engineering purposes is
a) Analog b) Digital c) Hybrid
Hexadecimal A45C when converted to octal gives
a) 141636 b) 122134 c) 156334 d) 122243
Which three of the following statements are TRUE?
A computer virus may also be called a biological virus
The infection caused from a computer virus can be prevent via inoculation
The computer virus may spread via a floppy disk from one computer to another
The execution of a virus program can take place without any user intervention
A virus may delete data, increase the file size and also affect the hardware components
Binary 110111 multiplied with 110 results in
a) 1011001010 b) 101010110 c) 101001010
Examples of mainframes include
a) IBM 4381 b) CRAY XMP-24 c) NEC-500 d) ICL 39 series
Which three of the following statements related buses are TRUE?
The data bus controls the data flow
The microchips seen inside the computer are called buses
The transport data between the processor and other components
The entry and the exit points of the buses are called ports.
The buses do not allow the expansion of the computer
Which of the following are required to be maintained for proper housekeeping ? (3)
a) Power supply b) Hardware c) Software
d) Printouts e) Data
Programs used to prevent virus are called
a) Vaccines b) Anti-virus program c) None of the above
The octal equivalent of the binary number 10001010101 is
a) 215 b) 2135 c) 2125 d) None of the above
With reference to booting a computer, Which three of the following statements are NOT TRUE?
After the POST, the RAM searches for the operating system and loads it into the ROM.
The operating system files are first searched in the floppy disk and if not found, then on the hard disk
A bootable disk is used to store the backup of all data in the computer
A bootable disk allows the operating system to get loaded onto the computer
The booting process involves getting all data inside the computer ready for use.
Which two of the following statements are NOT TRUE?
Microcomputer cannot be used for computer graphics, CAD and CAM applications
Mainframes are large computers, which have multiple processors that allow parallel processing of different tasks
Microcomputers are also known as personal computers.
Supercomputers have a superior technology and are used for complex scientific applications
Minicomputers are more powerful than the microcomputer
RS-232 refers to which two of the following ?
a) Mouse port b) Electronic Industry Standard c) Centronics port
c) Parallel port d) None of the above
With reference to EEPROMS which three of the following statements are TRUE ?
Are useful in process control equipment, where real time response is necessary
Can be erased and reprogrammed by exposing them to ultra violet rays
Are used where the software programs stored require to be modified continuously
Does not have to be removed from its socket for programming since its circuitry can be integrated into the computer.
Are programmed to a "1" and "0" by burning out a fusible link between selected cells.
Three examples of fourth generation language are
a) Fortran b) Ingres c) Cobol
d) Dbase e) Foxpro
The tool used for writing the set of instructions is called
a) Keyboard b) Program c) Software
d) Programing language e) None of above
The inherent benefits of a computerised system are: (3 options)
a) Repetitive calculation have done by the system b) All details are available at one place
c) Errors due to manual calculation are eliminated d) Data entry is reduced to nil
e) Records are maintained at a faster rate
With reference to hard disks which three of the following statements are NOT TRUE ?
The vacumed container, which protects the set of platters in a disk pack, is called a spindle
In a fixed head disk there is one read write head per track
Access time is the time taken by read write head to reach the specified cylinder
During a read / write operation the platter is stationary and the head rotates.
Certain control data is recorded at the start and end of each sector.
Which two of the following statements are TRUE ?
Control data recorded on a disk during formatting is used only by the disk drive
The density of data stored on a disk decreases towards the innermost tracks
Each track has the same width as the head
The hard disk is known as the main memory of the computer system
Which two of the following statements are TRUE about primary partition?
Any primary partition on a hard disk can be designated as the active partition
Primary partition can never be made as an active partition
It is also known as the boot partition
It is also known as the root partition
All digital computers use number system to store the data
a) Decimal b) Binary c)Octal e)Hexadecimal
Which of the following are NOT TRUE about extended partition? (two options)
a) The system partition cannot be located on it
b) The active partition can be located on it
c) Can contain only one logical drive.
d) The boot partition can be located on it.
Which two of the following statements about Positional numbering system are TRUE?
a) The numer of the symbols are very few
b) Each symbol represented some value irrespective of its position in the number
c) Each symbol represented different value depending on the position it occupies
d) Numer system consisted of bar like I, II, ... is positional number system
In Windows 2000 Professional it is possible to restrict users from visiting a particular site
a) true b) false
ASCII uses bits per character
a) 8 b) 7 c) 6 e) None of above
Which three of the following statements are NOT TRUE?
a) One character is stored in one byte
b) Character K is represented by 45 in ASCII code
c) The number 35795 cannot be represented in bynary form
d) The ASCII code uses 8 bits to represent a single character
e) In the binary number system the value of the digit to the left will become twice its predecesor
The result of addition of binary numbers 1011011 and 1010110 is
a) 10100001 b)10110101 c)10110001 d)None of those
Which of the following statements are NOT TRUE about single user operating system?(2 choices)
a) Only one user can interact with it at a time
b) It supports 2 processor
c) MS-DOS is a single user operating system which acts as a client in networking environment
Which three of the following statements with reference to registers in CPU are TRUE?
a)They are the collection if wires used for data transmission from one part of the computer to another
b) The speed and performance of the CPU does not depend upon the number and size of the register
c) They are special high-speed storage area within the CPU
d) All data must be represented in the register before it can be processed
e) They can have the address of the memory where the data is stored instead of having the data itself
Bạn đang đọc truyện trên: Truyen2U.Com