Sei sulla pagina 1di 10

1. A group of attribute/field in a database is known as a______.

a) Record b) File c) Database d) Entry e) None

2. A ______ describe a category of information in a table of database.

a) Record b) File c) Entry d) Field e) None

3. A goal of data mining includes which of the following?

a) To confirm that data exists

b) To create a new data warehouse

c) To analyze data for expected relationships

d) To explain some observed event or condition

e) None of the above

4. The correct hierarchical order, smallest to largest, for the following database terms

is:

a) File, Field, Record, Database

b) File, Record, Field, Database

c) Record, Field, File, Database

d) Field, Record, File, Database

e) None of the above

5. In RDBMS , DBA is responsible for:

a) Physical database design

b) Defining conceptual models and schema

c) Defining security and integrity rules

d) Defining backup and recovery mechanisms

e) All the above


6. When data changes in multiple lists and all lists are not updated, this causes

_______.

a) Duplicate data

b) Data redundancy

c) Data inconsistency

d) Information overload

e) None

7. Which of the following programming method is used to minimize data errors when

data

is transferred over a network?

a) Checksum b) Checkbit c) Cryptography d) Encryption e) None

8. Which device act as a traffic cop over a network?

a) Modem b) Hub c) Switch d) Router e) None

9. How many layers are present in Open System Interconnection (OSI) model of

network

architecture?

a) Five b) Six c) Seven d) Eight e) None of these

10. Which layer of OSI model, firstly make use of unit of data called “Packet”?

a) Datalink Layer

b) Transport Layer

c) Network Layer

d) Presentation Layer

e) None
11. Communication between computers is established, maintained and terminated by

_____ .

a) Network Layer

b) Session Layer

c) Application Layer

d) Presentation Layer

e) None

12. Which term identifies a specific computer on the web and the main page of the

entire

site?

a) URL b) Hyperlink c) Web site address d) Domain name e) None of these

13. The place where data or information is stored for a short time is

a) Memory b) Control Unit c) Buffer d) ALU e) None

14. The section of CPU which selects, interprets and sees to the execution of program

instructions?

a) ALU b) Control Unit c) Register Unit d) Processing Unit e) None

15. Which program is used to convert assembly language to machine language?

a) Compiler b) Interpreter c) Linker d) Assembler e) None

16. The process of finding errors in software’s source code

a) Debugging b) Compiling c) Testing d) Running e) None

17. A computer programmer

a) can draw only flowchart

b) can enter data quickly


c) does all the thinking for a computer

d) can operate all type of computer equipment

e) None

18. Primary Memory of a personal computer consists of

a) RAM only

b) ROM only

c) Hard Disk only

d) Both (a) and (b)

e) All (a), (b), and (c)

19. A Trojan horse is

a) An ad ware program

b) A virus disguised as a useful program.

c) A program that blows up every time you use it

d) A spy ware which steal information over internet

e) None

20. Which one of the following is not true?

a) HTTP Protocol is used to view a web page in a browser

b) Android is Google’s operating system for mobile devices

c) GHz is the measurement used to determine the speed of processor

d) WAN requires the same technology as LAN

e) All are true


1.Which is/are the main provisions of Information Technology (IT) Act, 2000?
(a) Legal recognition to digital signatures and documents.
(b) Finalisation of contracts through electronic media.
(c) Making hacking with computer system an office.
(d) All of the above

Answer : D

2.Consider the following statements about Internet facilityAnswer :


I. It serves as the largest one-line information system.
II. It provides the most dependable and latest mode for sending E-mail.
III. Recurring expenditure on communication E-mail is very high.
IV. It is often misused and has triggered cyber-crimes.
Which of these statements are correct?
(a) I, II and IV (b) I and IV (c) II, III and IV (d) II and III

Answer : A

3.The computer device primarily used to provide hard copy is the


(a) CRT (b) Line Printer (c) Computer Console (d) Card Reader

Answer : B

4.The unit of hardware, which an operator uses to monitor computer processing, is the
(a) Card Reader (b) CPU (c) Line Printer (d) Console

Answer : D

5.Computers can be classified in which of the following hierarchical orders?


(a) PC, Large, Super Micro, Super Computer
(b) Super Micro, PC, Large, Super Computer
(c) PC, Super Micro, Large, Super Computer
(d) Large, Super Micro, Super Computer, PC

Answer : C

6.Which one of the following is a stored program machine?


(a) Micro-processor (b) Calculator
(c) Analog-computer (d) Micro-computer

Answer : D

7.First generation computer systems used


(a) Transistors (b) Vacuum tubes
(c) Magnetic cores (d) Silicon chips

Answer : B
8.Transistors are associated with which computer system?
(a) First generation (b) Fifth generation
(c) Second generation (d) None of these

Answer : C

9.Charles Babbage invented


(a) ENIAC (b) Difference engine (c) Electronic computer (d) Punched card

Answer : B

10.Who wrote the book ‘Computer Liberation and Dream Machine’, the first book on
personal computers?
(a) John McCarthy (b) Ted Nelson (c) Niklaus Wirth (d) Karl Capek

Answer : B

Windows Management Shortcuts

* Win+Home: Clear all but the active window.


* Win+Space: All windows become transparent so you can see through to the desktop.
* Win+Up arrow: Maximize the active window.
* Shift+Win+Up arrow: Maximize the active window vertically.
* Win+Down arrow: Minimize the window/Restore the window if it’s maximized.
* Win+Left/Right arrows: Dock the window to each side of the monitor.
* Shift+Win+Left/Right arrows: Move the window to the monitor on the left or right.

You can also interact with windows by dragging them with the mouse:

* Drag window to the top: Maximize


* Drag window left/right: Dock the window to fill half of the screen.
* Shake window back/forth: Minimize everything but the current window.
* Double-Click Top Window Border (edge).

Taskbar Shortcuts

You can use any of these shortcut combinations to launch the applications in their
respective position on the taskbar, or more:

* Win+number (1-9): Starts the application pinned to the taskbar in that position, or
switches to that program.
* Shift+Win+number (1-9): Starts a new instance of the application pinned to the taskbar
in that position.
* Ctrl+Win+number (1-9): Cycles through open windows for the application pinned to
the taskbar is that position.
* Alt+Win+number (1-9): Opens the Jump List for the application pinned to the taskbar.
* Win+T: Focus and scroll through items on the taskbar.
* Win+B: Focuses the System Tray icons

In addition, you can interact with the taskbar using your mouse and a modifier key:

* Shift+Click on a taskbar button: Open a program or quickly open another instance of a


program.
* Ctrl+Shift+Click on a taskbar button: Open a program as an administrator.
* Shift+Right-click on a taskbar button: Show the window menu for the program (like
XP does).
* Shift+Right-click on a grouped taskbar button: Show the window menu for the group.
* Ctrl+Click on a grouped taskbar button: Cycle through the windows of the group.

Here’s a few more interesting hotkeys for you:

* Ctrl+Shift+N: Creates a new folder in Windows Explorer.


* Alt+Up: Goes up a folder level in Windows Explorer.
* Alt+P: Toggles the preview pane in Windows Explorer.
* Shift+Right-Click on a file: Adds Copy as Path, which copies the path of a file to the
clipboard.
* Shift+Right-Click on a file: Adds extra hidden items to the Send To menu.
* Shift+Right-Click on a folder: Adds Command Prompt Here, which lets you easily
open a command prompt in that folder.
* Win+P: Adjust presentation settings for your display.
* Win+(+/-): Zoom in/out.
* Win+G: Cycle between the Windows Gadgets on your screen.

Operating systems (OSes) provide a set of functions needed and used by most
application-programs on a computer, and the necessary linkages for the control and
synchronization of the computer’s hardware

The Most popular operating systems presently in the market are Windows,Debian
GNU/Linux,Android,Mac OS X,Haiku

Windows 1.0 is a 16-bit graphical operating environment that was released on 20


November 1985 . Windows 1.0 was the first version of Windows launched. The first
release version of Windows 1.0 is actually named Windows Premiere Edition.

Windows 7 is the latest release of Microsoft Windows, a series of operating systems


produced by Microsoft for use on personal computers, including home and commercial
use

Debian GNU/Linux Non-commercial linux distribution, initiated by Ian Murdock on


16th August 1993

Mac OS 9 Apple’s operating system for PowerPC from 1999.


Android OS Special operating system with linux kernel for smartphones, developed by
google. On the market since October 2008

Haiku Started in August 18th, 2001 as OpenBeOS, this is the official open source
successor of BeOS.

An operating system (OS) is software, consisting of programs and data, that runs on
computers and manages the computer hardware and provides common services for
efficient execution of various application software.

For hardware functions such as input and output and memory allocation, the operating
system acts as an intermediary between application programs and the computer hardware,
although the application code is usually executed directly by the hardware, but will
frequently call the OS or be interrupted by it. Operating systems are found on almost any
device that contains a computer—from cellular phones and video game consoles to
supercomputers and web servers.

Examples of popular modern operating systems for personal computers are Microsoft
Windows, Mac OS X, and Linux.

What is Encryption
The translation of data into a secret code. Encryption is the most effective way to achieve
data security. To read an encrypted file, you must have access to a secret key or password
that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is
referred to as cipher text.

There are two main types of encryption: asymmetric encryption (also called public-key
encryption) and symmetric encryption.(also called private-key encryption)

Operating system of a computer manages

Ans : all the operations of a computer

Software that can manipulate or destroy data or programs in a computer is known as

Ans : Virus

Binary Code’ used in computers makes use of which numbers

Ans : 0 & 1

One kilobyte is equal to

Ans : 1024 bytes


Who is the architect of Supercomputer

Ans : Seymour Cray

Which computer company introduced mouse for the first time

Ans : Apple Corporation

Who developed the World Wide Web first

Ans : Timothy Berners Lee

The first large scale, general purpose digital computer

Ans : ENIAC

ENIAC

Ans : Electronic Numerical Integrator And Computer

The shortcut key to print documents is

Ans : Ctrl + P

The function of key F4 in keyboard is

Ans : to repeat the last action

Name the first general purpose electronic computer

Ans : UNIVAC

Virtual Memory

Virtual Memory is a feature of an operating system that enables a process to use a


memory (RAM) address space that is independent of other processes running in the same
system, and use a space that is larger than the actual amount of RAM present, temporarily
relegating some contents from RAM to a disk, with little or no overhead.

ROM

ROM – Read-only memory: On ROM, data is prerecorded for read only which can not be
removed. ROM is nonvolatile and it retains its contents regardless the computer is on or
off. Most personal computers contain a small amount of ROM that stores critical
programs such as the program that boots the computer. In addition, ROMs are used in
calculators and peripheral devices such as laser printers, whose fonts are often stored in
ROMs. There are a few variations of ROM such as programmable read-only
memory(PROM), which is manufactured as blank chips on which data can be written
with a special device called a PROM programmer.

RAM

RAM – Random access memory: whose contents can be accessed (read, write and
remove) in any order. This is in contrast to sequential memory devices such as magnetic
tapes, discs and drums, in which the mechanical movement of the storage medium forces
the computer to access data in a fixed order. RAM is usually used for primary storage in
computers to hold active information such as data and programs. Common forms of
RAM are: SRAM (Static RAM) and DRAM (Dynamic RAM).

Potrebbero piacerti anche