Truyen2U.Net quay lại rồi đây! Các bạn truy cập Truyen2U.Com. Mong các bạn tiếp tục ủng hộ truy cập tên miền mới này nhé! Mãi yêu... ♥

Test_CF 2

1. The access point for entry and exit of data are known as?

Connectors b) Ports c) Buses d) Controller

2. Which three of the following statements are TRUE?

Data processing cycle is information in, process and data out

Two categories of software are application and system software

Computers can take decisions on their own, like human beings.

The operating system has to take on conducting a process called as booting

The unit storing any data that comes into the CPU while processing is so called register

3. The string of bits needed to represent a character is called a .

a) Word b) Kilobyte c) Byte d) None of the above

4. The two advantages of domain model over workgroup model are

a) Centralised administration is possible b) Convenient for limited number of users

c) Security management is centralised d) Sharing of resources is easy

5. Each operating System organizes data internally with help of a program knows as file system

a) True b) False

6. Centronics ports are called as

a) Printer ports. b) Parallel ports. c) RS-232.

7. A translator that translates a statement of high-level language to machine language and immediately executes it is.........

a) Translator b) Assembler c) Compiler

d) Interpreter e) None of the above

8. Advantages of a workgroup include (choose three)

a) Centralised management b) Easy to share resources c) Efficient on a large network.

d) Convenient for a limited number of users.

e) Simple design makes it easy to implement.

9. Which of the following statements related to NTFS are TRUE? (choose three)

a) Supports file compression b) No security if user logs in locally

c) Supports long file names d) Partitions as file size can be a maximum of 16 exabytes

e) Not very reliable since it does not support bad cluster mapping

10. Which of the following are TRUE about primary partition? (choose three)

a) The system partition can be located on it b) Can contain only one logical drive.

c) Can contain one and more logical drives d) The boot partition can be located on it.

11. Which two of the following are TRUE about NTFS permission?

a) NTFS permission can be assigned to both file and folder

b) NTFS permission can be assigned only to folder

c) NTFS permission are not effective if the user logs on locally.

d) NTFS permission are effective even if the user logs on locally

12.The various functions performed by Operating System are (three options)

a) It acts as a manager for the various resources and allocates them to various programs and users as and when required by them

b) It allows the user to interact with the hardware to obtain results.

c) It is used to store both data and information

d) It is referred to as the hardware of the computer machine.

e) It interprets the program instructions one at a time

13. Which of the following statement is TRUE while logging on to Windows 2000?

a) The user name is not case sensitive. b) The password is not case sensitive

c) Both name and password is case sensitive d) None of them is case sensitive.

14. Shared permissions can be applied to____________

a) Only FAT partitions b) Only NTFS partitions

c) Both FAT and NTFS partitions d) None of the above

15. Why is protocol used?

a) To connect different computers b) To share the resource on the network

c) To establish communication between computers

16. Which of the following are TRUE about extended partition? (two options)

a) The system partition can be located on it

b) The active partition can be located on it

c) Can contain one and more logical drives.

d) The boot partition can be located on it.

17. Which of the following statements related to NTFS are NOT TRUE? (choose three)

a) Supports file compression b) No security if user logs in locally

c) Supports long file names d) Partitions as file size can be 4 gigabytes maximum

e) Not very reliable since it does not support bad cluster mapping

18. The various functions performed by the Operating System are (three options)

a) It load the user program into the memory

b) It is used to store both data and information.

c) It controls the whole process of data transfer from one place to the other while computations are going on.

d) It gives instruction to display the result on the monitor.

e) It controls the computer hardware. It co-ordinates the flow of data between the various application program and the users.

19. Which three of the following statements related to memory are NOT TRUE?

a) Primary memory is called the main memory or the central memory

b) ROM memory is read/write memory

c) RAM memory is non volatile, its storage is permanent

d) The secondary memory is the internal memory.

e) Data is stored and retrieved from the disk in blocks.

20. The software, which has been developed for a specific application is called

a) System software b) Application software c) Accounting software

d) Used software e) Non of the above

21.With reference to primary memory, which two of the following statements are TRUE?

a) It is so called central memory

b) It is thought of as a collection of many gramophone records stacked on each other without all of them actually touching each other.

c) It is resident on the mother board. d) It is used for only read operation.

22.CPU is also referred as ___________________

a) Calculator b) Micro-Calculator c) Microprocessor d) None of them

23. The two standard types of ports are (Choose 2)

a) Serial b) Printer Port c) Parallel

24. ____________ is a collection of wires used for data transmission from one part of computer to another.

a) Cable b) Bus c) Wire Set

25. When we type the URL of any Web Site, it is converted into an IP address.

a) True b) False

26. Web site is a collection of _____________

a) Web Pages b) Web Sites c) Presentation

27. Which one of the following is used to download softwares?

a) File Transfer Protocol b) Folder Transfer Protocol c) Download Transfer Protocol

28. Conversion of decimal number 80 to binary is

a) 1100010 b) 1010000 c) 1010001 d) 1011000

29. The Decimal equivalent of 111001

a) 52 b) 47 c) 56 d) 57

30. The result of subtraction of the binary number 11100101 from 101100 is

a) -11111000 b) 1000110 c) -10111001 d) None of the above

31. Which of the following statements are FALSE? (3)

POST is the process of the booting the computer

The POST process requires a bootable disk to perform its checks

The user must perform the POST process when the machine is booted

The POST process is carried out before the operating system is loaded

The POST process always effectively detects hardware errors

32. The codes defined to convey information like end-of-file, end-of-page, etc. to the computer are called

a) Binary code b) Non-printable control characters

c) Symbolic codes d) ASCII code e) Character code

33. Computers that are mainly used for scientific and engineering purposes is

a) Analog b) Digital c) Hybrid

Hexadecimal A45C when converted to octal gives

a) 141636 b) 122134 c) 156334 d) 122243

Which three of the following statements are TRUE?

A computer virus may also be called a biological virus

The infection caused from a computer virus can be prevent via inoculation

The computer virus may spread via a floppy disk from one computer to another

The execution of a virus program can take place without any user intervention

A virus may delete data, increase the file size and also affect the hardware components

Binary 110111 multiplied with 110 results in

a) 1011001010 b) 101010110 c) 101001010

Examples of mainframes include

a) IBM 4381 b) CRAY XMP-24 c) NEC-500 d) ICL 39 series

Which three of the following statements related buses are TRUE?

The data bus controls the data flow

The microchips seen inside the computer are called buses

The transport data between the processor and other components

The entry and the exit points of the buses are called ports.

The buses do not allow the expansion of the computer

Which of the following are required to be maintained for proper housekeeping ? (3)

a) Power supply b) Hardware c) Software

d) Printouts e) Data

Programs used to prevent virus are called

a) Vaccines b) Anti-virus program c) None of the above

The octal equivalent of the binary number 10001010101 is

a) 215 b) 2135 c) 2125 d) None of the above

With reference to booting a computer, Which three of the following statements are NOT TRUE?

After the POST, the RAM searches for the operating system and loads it into the ROM.

The operating system files are first searched in the floppy disk and if not found, then on the hard disk

A bootable disk is used to store the backup of all data in the computer

A bootable disk allows the operating system to get loaded onto the computer

The booting process involves getting all data inside the computer ready for use.

Which two of the following statements are NOT TRUE?

Microcomputer cannot be used for computer graphics, CAD and CAM applications

Mainframes are large computers, which have multiple processors that allow parallel processing of different tasks

Microcomputers are also known as personal computers.

Supercomputers have a superior technology and are used for complex scientific applications

Minicomputers are more powerful than the microcomputer

RS-232 refers to which two of the following ?

a) Mouse port b) Electronic Industry Standard c) Centronics port

c) Parallel port d) None of the above

With reference to EEPROMS which three of the following statements are TRUE ?

Are useful in process control equipment, where real time response is necessary

Can be erased and reprogrammed by exposing them to ultra violet rays

Are used where the software programs stored require to be modified continuously

Does not have to be removed from its socket for programming since its circuitry can be integrated into the computer.

Are programmed to a "1" and "0" by burning out a fusible link between selected cells.

Three examples of fourth generation language are

a) Fortran b) Ingres c) Cobol

d) Dbase e) Foxpro

The tool used for writing the set of instructions is called

a) Keyboard b) Program c) Software

d) Programing language e) None of above

The inherent benefits of a computerised system are: (3 options)

a) Repetitive calculation have done by the system b) All details are available at one place

c) Errors due to manual calculation are eliminated d) Data entry is reduced to nil

e) Records are maintained at a faster rate

With reference to hard disks which three of the following statements are NOT TRUE ?

The vacumed container, which protects the set of platters in a disk pack, is called a spindle

In a fixed head disk there is one read write head per track

Access time is the time taken by read write head to reach the specified cylinder

During a read / write operation the platter is stationary and the head rotates.

Certain control data is recorded at the start and end of each sector.

Which two of the following statements are TRUE ?

Control data recorded on a disk during formatting is used only by the disk drive

The density of data stored on a disk decreases towards the innermost tracks

Each track has the same width as the head

The hard disk is known as the main memory of the computer system

Which two of the following statements are TRUE about primary partition?

Any primary partition on a hard disk can be designated as the active partition

Primary partition can never be made as an active partition

It is also known as the boot partition

It is also known as the root partition

All digital computers use number system to store the data

a) Decimal b) Binary c)Octal e)Hexadecimal

Which of the following are NOT TRUE about extended partition? (two options)

a) The system partition cannot be located on it

b) The active partition can be located on it

c) Can contain only one logical drive.

d) The boot partition can be located on it.

Which two of the following statements about Positional numbering system are TRUE?

a) The numer of the symbols are very few

b) Each symbol represented some value irrespective of its position in the number

c) Each symbol represented different value depending on the position it occupies

d) Numer system consisted of bar like I, II, ... is positional number system

In Windows 2000 Professional it is possible to restrict users from visiting a particular site

a) true b) false

ASCII uses bits per character

a) 8 b) 7 c) 6 e) None of above

Which three of the following statements are NOT TRUE?

a) One character is stored in one byte

b) Character K is represented by 45 in ASCII code

c) The number 35795 cannot be represented in bynary form

d) The ASCII code uses 8 bits to represent a single character

e) In the binary number system the value of the digit to the left will become twice its predecesor

The result of addition of binary numbers 1011011 and 1010110 is

a) 10100001 b)10110101 c)10110001 d)None of those

Which of the following statements are NOT TRUE about single user operating system?(2 choices)

a) Only one user can interact with it at a time

b) It supports 2 processor

c) MS-DOS is a single user operating system which acts as a client in networking environment

Which three of the following statements with reference to registers in CPU are TRUE?

a)They are the collection if wires used for data transmission from one part of the computer to another

b) The speed and performance of the CPU does not depend upon the number and size of the register

c) They are special high-speed storage area within the CPU

d) All data must be represented in the register before it can be processed

e) They can have the address of the memory where the data is stored instead of having the data itself

Bạn đang đọc truyện trên: Truyen2U.Com

Tags: