phne no


Matthew 7:7,8 Ask, and it shall be given you; seek, and ye shall find; knock, and it shall be opened unto you: For every one that asketh receiveth; and he that seeketh findeth; and to him that knocketh it shall be opened.

17 Dec 2016


Q. (1). To locate a data item for storage is - Fetch

Q. (2). Programs designed to perform specific tasks is known as - Application software

Q. (3). Perforated paper used as input of output media is known as - Paper tapes

Q. (4). Time during which a job is processed by the computer is - Execution time

Q. (5). A computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as - Super computer

Q. (6). An approach that permits the computer to work on several programs instead of one is- Over lapped processing

Q. (7). A directly accessible appointment calendar is feature of a resident package- Memory

Q. (8). The term gigabyte refers to 1024 megabytes

Q. (9). Which of the following processors use RISC technology? - Power PC

Q. (10). A/n Device is any device that provides information, which is sent to the CPU- Input

Q. (11). Current SIMMs have either___or___connectors (pins)- 30 or 72

Q. (12). The storage subsystem in a microcomputer consists mainly of ___or___media with varying capacities Magnetic or optical

Q. (13). Which device is also called Pointing Device?- Mouse

Q. (14). The central processing unit (CPU) consists of- Control unit, arithmetic-logic unit and primary storage

Q. (15). EBCDIC can code up to how many different characters?- 256

Q. (16). Which is considered a direct entry input device?- Optical scanner, Mouse and digitizer and Light pen

Q. (17). Which is used for manufacturing chips?- Semiconductors

Q. (18). The computer code for the interchange of information between terminals is- ASCII

Q. (19). A byte consists of- Eight bits

Q. (20). A hybrid computer- Resembles both a digital and analog computer

Q. (21). The ALU of a computer responds to the commands coming from- Control section

Q. (22). The act of retrieving existing data from memory is called- Read-out, Read from and Read

Q. (23). All modern computer operate on- Data

Q. (24). Instructions and memory address are represented by- Binary codes

Q. (25). Which of the following code used in present day computing was developed by IBM Corporation?- EBCDIC Code

Q. (26). What is the latest write-once optical storage media?- CD-ROM disk

Q. (27). The most important advantage of a video disk is- Potential capacity

Q. (28). What is the number of read-write heads in the drive for a 9-trac magnetic tape?- 9

Q. (29). Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify?- Track number, Sector number and Surface number

Q. (30). As compared to diskettes, the hard disks are- More expensive

Q. (31). Floppy disks which are made from flexible plastic material are also called?- Diskettes

Q. (32). Regarding a VDU, Which statement is more correct?- It is a peripheral device

Q. (33). What is the name of the computer terminal which gives paper printout?- Hard copy terminal

Q. (34). Dot-matrix is a type of- Printer

Q. (35). The two kinds of main memory are- ROM and RAM

Q. (36). A kind of serial dot-matrix printer that forms characters with magnetically-charged ink sprayed dots is called- Ink-jet printer

Q. (37). Which printer is very commonly used for desktop publishing- Laser printer

Q. (38). An output device that uses words or messages recorded on a magnetic medium to produce audio response is- Voice response unit

Q. (39). Which of the following will happen when data is entered into a memory location- It will erase the previous content

Q. (40). A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is- Buffer


1. A……………is an acyclic diagraph, which has only node with in-degree 0, and other nodes have indegree 1. 

(1) Dis-joint tree
(2) Direction oriented tree
(3) directed tree
(4) Diagonalised tree
(5) Undirected tree

2. The UML designation for a public class member is
(1) the symbol @
(2) the symbol #
(3) the minus symbol (-)
(4) the plus symbol (+)
(5) the word public

3. Every host computer on the internet has a(n)
(1) similar IP address
(2) unique 10-digit number
(3) common name and number
(4) unique IP address
(5) unique 15-digit number

4. Built-in functions provided by SQL are?

5. Which of the following is true regarding Common Gateway Interface (CGI)?
(1) An interface that accepts and returns data that may be written in SQL.
(2) A small program that excutes within other application and is stored on the server.
(3) A small program that excutes within other application and is stored on the client.
(4) A small program that executes within other application and is stored on the client or the server.
(5) An interface that accepts and returns data that may be written in any language that produces executable file.

6. Which of the following wildcard masks is most useful for matching all IP packets in subnet, mask


7. What is the full form of DLCI?
(1) Data Link Circuit Identifier
(2) Data Link Connection Interrupt
(3) Data Link Connection Indicator
(4) Data Link Circuit Indicator
(5) Data Link Connection Identifier

8. Which of the following is used to create and delete views and relations within tables?
(1) SQL Data Identification Language
(2) SQL Data Identification and Manipulation Languages
(3) SQL Data Relational Language
(4) SQL Data Definition Language
(5) SQL Data Manipulation Language

9. What is the result of a SQL SELECT statement called?
(1) report
(2) file
(3) page
(4) table
(5) form

10. Which of the following is true for a CASE SQL statement?

(1) CASE SQL statement a way to establish a data definition in SQL or establish a loop in SQL
(2) CASE SQL statement a way to establish an IF-THEN-ELSE in SQL
(3) CASE SQL statement a way to establish a loop in SQL
(4) CASE SQL statement a way to establish a data definition in SQL
(5) Establish a loop in SQL and establish an IF-THEN-ELSE in SQL

11. Which one of the following computer language is not the procedure-oriented language?
(1) C-language
(4) Simula
(5) None of these

12. ‘TELNET’ is
(1) running complex programs by logging on to supercomputers belonging to other countries
(2) a telephone call made by the help of Internet
(3) a software to perfect viral attack
(4) All of the above
(5) None of the above

13. Which one of the following internet protocol version is the most deployed internet layer protocol?
(1) IPv2
(2) IPv4
(3) IPv6
(4) IPv8
(5) None of these

14. Which one of the following malware is used in the Internet Relay chart channel or other chart system to coordinate the activity of many infected computer?
(1) Keyloggers
(2) Adwares
(3) Dialers
(4) Botnets
(5) None of these

15. Which one of the following rebooting commonly occurs when the system of computer is crashed?
(1) Soft rebooting
(2) Cold rebooting
(3) Hard rebooting
(4) Random rebooting
(5) None of the above

16. Which one of the following computers is the world’s first commercial computer?
(1) Ferranti Mar-I
(2) Mark-I Star
(4) IBM-704
(5) None of these

17. The advantage of a LAN is
(1) sharing peripherals
(2) backing up your data
(3) saving all your data
(4) accessing the web
(5) automatic printing of data

18. A tree like structure of records in a database
(1) hierarchical database structure
(2) relational database structure
(3) multidimensional database structure
(4) sequential database access
(5) None of the above

19. The memory address of the first element of an array is called
(1) floor address
(2) foundation address
(3) first address
(4) base address
(5) None of these

20. The PHP Syntax is most similar to
(1) PERL and C
(2) Java script
(3) VB script
(4) Visual Basic
(5) None of these

No comments:

Post a Comment