Friday, June 8, 2012

Computer Set-3


1.       Which is not a language processor?
(1) compiler                                (2) interpreter
(3) processor                             (4) assembler
(5) None of these
2.       Combination of more than one program known as-
(1) Software                               (2) Hardware
(3) processor                             (4) Driver
(5) None of these
3.       Special purpose software known as -
(1) compiler                                (2) Customized software
(3) translator                              (4) word
(5) None of these
4.       Translator for low level programming language were termed as 
(1)  Assembler                           (2) Compiler
(3)   Linker                                   (4) Loader
(5)None of these
5.       An assembler is
(1) programming language dependent.
(2) syntax dependant                           
(3)  machine dependant
(4)  data dependant                                (5)None of these
6.       In latest generation computers, the instructions are executed
(1) Parallel only                         (2) Sequentially only
(3) Both sequentially and parallel
(4) All of above                         (5) None of these  
7.       A computer program that translates one program instructions at a time into machine language is called a/an
(1) Interpreter                          (2) CPU
(3) Compiler                               (4) Simulator
(5)None of these
8.       A computer program that converts an entire program into machine language is called a/an
(1) Interpreter                          (2) Simulator
(3) Compiler                               (4) Commander               
(5) None of these
9.       The system unit of a personal computer typically contains all of the following except:
(1) Microprocessor                  (2) Disk controller
(3) Serial interface                   (4) Modem
(5)None of these
10.   Instructions and memory address are represented by
(1) Character code                   (2) Binary codes               
(3) Binary word                         (4) Parity bit
(5)None of these
11.   ____is a technique of temporarily removing inactive programs from the memory  of computer system. 
        (1)  Swapping                             (2) Spooling
(3)  Semaphore                         (4) Scheduler
(5) None of these
12.   A grammar for a programming language is a formal description of 
        (1) Syntax                                    (2) Semantics
(3) Structure                              (4) Code
(5) None of these
13.   Which of the following loader is executed when a system is first turned on or restarted                      
(1) Boot loader                          (2) Compile
(3) Bootstrap loader               (4)  Relating loader
(5)None of these
14.   Poor response time is usually caused by                  
(1) Process busy                       (2) High I/O rates
(3) High paging rates               (4)   Any of the above
(5) None of these
15.   An assembler is-
(1) A programming language dependent
(2) Syntax dependant            (3) machine dependant
(4)  Data dependant                               (5) None of these   
16.   Minimum zoom percentage supported by MS Word is-
(1)10%                                          (2) 15%
(3) 25%                                         (4) 4%  
(5) None of these
17.   Which is not closed source software package?
        (1) VLC                                          (2) LINUX
(3) Open office                         (4) MS-Word
(5) None of these
18.   You can break the column by
(1) Pressing Ctrl + Shift + Enter
(2) Pressing Ctrl + Enter         (3) Pressing Shift + Enter
(4) Pressing Alt + Enter          (5) None of these
19.   The red wave underline in MS Word document indicates-
(1) Spelling error                      (2) Grammar errors
(3) Address block                     (4) Word not in dictionary
(5) None of these
20.   Which bar is usually located below the title bar that provides categorized options
(1) Menu Bar                             (2) Tool Bar
(3) Status Bar                             (4) Scroll Bar
(5)None of these
21.   Which input device is not suitable to work with MS Word?
(1) Keyboard                              (2) Mouse
(3) Light Pen                               (4) Joystick
(5) None of these
22.   What is extension of Word-pad?
        (1) .txt                                          (2) .doc
(3) .xls                                           (4) rtf   
(5)None of these
23.   background of window screen is called as
(1) Desktop                                                (2) window application
(3) GUI                                         (4) CUI 
(5) None of these
24.   The process of software development is called-.
        (1) Programming                      (2) Analyzing
(3) Testing                                   (4) Networking
(5) None of these
25.   ____ is problem - oriented languages?
        (1)HLL                                           (2) database
(3) Low level language           (4) SQL
(5) None of these
26.   Outlook express known as-
        (1) email-client                          (2) Word processor
(3) Spreadsheet                       (4)database
(5) None of these
27.   Language processor known as-
        (1) translator                              (2) HLL
(3) Processor                             (4) Low level
(4) None of these
28.   fault in a system known as -
(1) bug                                          (2) error              
(3) Glitch                                      (4) interrupt
(5) None of these
29.   ____ controls the way in which the computer system functions and provides a means by which used can interact with the computers
        (1) The platform                       (2) operating system
(3) Application system           (4) Utility            
(5) None of these
30.   System software is the set of programs that enables your computer’s hardware devices and ____ software to work together.
(1) Management                      (2) processing
(3) Utility                                     (4) application
(5) None of these
31.   Windows and Macintosh are example of two different-
        (1) Operating system             (2) storage device
(3) Programs                              (4) suite              
(5) None of these
32.   Manipulating data to create information is known as-
        (1)  Feedback                             (2) programming    
(3) Processing                            (4) analysis  
(5) None of these of these
33.   The type of software that controls the internal operation in the computer, and control how the computer works with all its part, is which of the following-
(2) Shareware          
(2) Operating system software
(3) Application software d public domain software
(4) Public domain software
(5) None of these of these
34.   In addition to keying data directly into a database, data entry can be done from a-
(1) input form                            (2) table    
(3) field                                        (4) data dictionary   
(5) None of these
35.   What is correcting errors in a program called-
        (1) interpreting                         (2) translating 
(3) debugging                            (4)compiling 
(5) None of these
36.   A word processor would most likely be used to do which of the following-
        (1) keep an account of money spent  
(2)maintain an inventory      (3)type a biography
(4)do a computer search in the media centre
(5) None of these
37.   A hard copy of a file created on a computer refers to data-
(1) saved on floppy disk        (2) printed on paper
(3) backed up on a tape drive
(4)sent as email                        (5) None of these
38.   A ____  is an organized collection of data about a single entity
        (1) file                                           (2) library
(3) database                               (4) dictionary
(5) None of these
39.   Something which has easily- understood instruction is said to be-
        (1) user-friendly                       (2) information 
(3) word processing                (4) icon     
(5) None of theses
40.   Digital photos and scanned images are typically stored as____ graphic with extensions such as bmp. Png, jpg, tif or gif.
        (1) vector                                                    (2) bitmap  
(3) either vector nor bitmap               
(4) neither vector nor bitmap 
(5) None of these.
41.   After a user has saved and deleted many files, many scattered areas of stored data remain that are too small to be used efficiently, causing-
        (1) disorder                                (2) turmoil  
(3) disarray                                 (4) fragmentation   
(5) None of these.
42.   Which of the following convert all the statement in a program in a single batch and the resulting collection of instructions is placed in a new file-
        (1) compiler                                (2) interpreter  
(3) converter                             (4) instruction
(5) None of these
43.   A program that  generally has more user-friendly interface then a DBMS is called a-
        (1) front end                              (2) repository 
(3) back end                               (4) form   
(5) None of these
44.   When you install a new program on your computer, it is typically added to the ____ menu.
        (1) all programs                         (2) select programs 
(3) start programs                    (4) desktop programs
(5) None of these.
45.   Which of the following contains information about a single “entity” in the database like a person, place, event, or thing
         (1) query                                    (2) form  
(3) record                                    (4) table  
(5) None of these
46.   The database administrator’s function in an organization is
       (1) to be responsible for the technical aspect of managing the information contained in organization databases.
         (2) to be responsible for the executive-level aspect of decision regarding information management.
         (3) to shown the relationship among entity classes in a data warehouse.
        (4) to define which data mining tools must be used to extract data
        (5) None of these
47.   Control in design of an information system is used to-
        (1) inspect the system and check that it is built as per specifications.
        (2) ensure that system processes data as it was designed to and that the result are reliable.
        (3) ensure privacy of data processed by it.
        (4) None of these.
48.   Which of the following is the first step in the transaction processing cycle, which captures business data through various modes such as optical scanning or at an electronic commerce website-
        (1) document and report  generation 
(2) database maintenance 
(3) transaction processing    (4) data entry
(5) None of these
49.   When you save a presentation-
         (1) All sides in a presentation are saved in same file. (2)  Two file are created one for graphics and one for content.
(3)a file is created for each slide. 
(4) a file is created for each animation or graphic.
(5) None of these.
50.   Computers manipulate data in many ways, and this manipulation is called-
        (1) utilizing                                  (2) batching   (3)upgrading                           (4) processing
(5) None of these.



ANSWERSHEET
Qns.
Ans.
Qns.
Ans.
Qns.
Ans.
Qns.
Ans.
Qns.
Ans.
1.
3
11.
2
21.
4
31.
1
41.
4
2.
1
12.
3
22.
4
32.
3
42.
1
3.
2
13.
3
23.
1
33.
2
43.
4
4.
1
14.
4
24.
1
34.
1
44.
1
5.
3
15.
3
25.
1
35.
3
45.
3
6.
3
16.
1
26.
1
36.
3
46.
2
7.
1
17.
4
27.
1
37.
2
47.
2
8.
3
18.
1
28.
3
38.
1
48.
1
9.
4
19.
1
29.
2
39.
1
49.
1
10.
3
20.
1
30.
3
40.
2
50.
4

No comments:

Post a Comment