GAGAN IT SOLUTIONS

download GAGAN IT SOLUTIONS

of 20

Transcript of GAGAN IT SOLUTIONS

  • 8/7/2019 GAGAN IT SOLUTIONS

    1/20

    Gagan@9855689837 2008

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    INFORMATION TECHNOLOGY BASIC QUESTIONS

    InformationTe

    chnologySolutions

    InformationTe

    chnologySolut

    ions

    InformationTe

    chnologySolut

    ions

    InformationTe

    chnologySolutions

    Gagan@9

    8556898

    37

    DEEPINSTITUTEOFMANGEME

    NT

    D

    EEPINSTITUTEOFMANGEME

    NT

    D

    EEPINSTITUTEOFMANGEME

    NT

    D

    EEPINSTITUTEOFMANGEME

    NT

  • 8/7/2019 GAGAN IT SOLUTIONS

    2/20

    Gagan@9855689837 2008

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    1.1.1.1. Programs from the samedeveloper , sold bundled together ,that provide better integrationand share common features ,

    toolbars and menus are known as.(A) software suites(B) integrated software packages(C) software processing packages(D) personal information managers(E) none of theseANS (A)ANS (A)ANS (A)ANS (A)2222. A data warehouse is which of

    the following ?(A) Can be updated by the endusers(B) Contains numerous namingconventions and formats(C) Organized around importantsubject areas(D) Contains only current data(E) None of theseANS (C)ANS (C)ANS (C)ANS (C)

    3333. ______________ serversstore and manages files fornetwork users.(A) Authentication(B) Main(C) Web(D) File(E) None of theseANS (D)ANS (D)ANS (D)ANS (D)

    4444. All of the following areexamples of real security andprivacy risks Except _____(A) hackers(B) spam(C) viruses(D) identify theft

    (E) None of theseANS (B)ANS (B)ANS (B)ANS (B)

    5.5.5.5.___________ terminals

    (formerly known as cashregisters) are often connected tocomplex inventory and salescomputer systems .(A) Data(B) Sales(C) Query(D) (Point-of-sale (POS)(E) None of theseANS (B)ANS (B)ANS (B)ANS (B)

    6.6.6.6.The OSI model is divided into_______ processes called layers.(A) five(B) six(C) seven(D) eight(E) None of theseANS (C)ANS (C)ANS (C)ANS (C)7.7.7.7.System software is the set of

    programs that enables yourcomputers hardware devices and______ software to worktogether.(A) management(B) processing(C) utility(D) application(E) None of these

    ANS (D)ANS (D)ANS (D)ANS (D)8.8.8.8.________ are speciallydesigned computer chips resideinside other devices, such as yourcar or your electronic thermostat.(A) Servers(B) Embedded computers(C) Robotic computers

  • 8/7/2019 GAGAN IT SOLUTIONS

    3/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    (D) Mainframes(E) None of theseANS (B)ANS (B)ANS (B)ANS (B)

    9.9.9.9.The following are all computingdevices , except(A) notebook computers(B) cellular telephones(C) digital scanners(D) personal digital assistants(E) None of theseANS (C)ANS (C)ANS (C)ANS (C)10.10.10.10.in a ring topology , the the

    computer in possession of the______ can trasmit data(A) packet(B) data(C) access method(D) token(E) None of theseANS (D)ANS (D)ANS (D)ANS (D)11.11.11.11.This part of operating systemmanages the essential peripherals,such as the keyboard, screen , diskdrives, and parallel and serialports ____(A) basic input/output system(B) secondary input/output system(C) peripheral input/output system(D) marginal input/output system(E) None of theseANS (A)ANS (A)ANS (A)ANS (A)

    12121212. ________ Viruses are oftentransmitted by a floppy disk leftin the floppy drive(A) Trojan horse(B) Boot sector(C) Script(D) Logic bomb

    (E) None of theseANS (B)ANS (B)ANS (B)ANS (B)13131313. ________ controls the way inwhich the

    computersystem functionsand provides ameans by whichusers caninteract with thecomputer(A) The platform(B) Applicationsoftware(C) Operatingsystem(D) Themotherboard(E) None ofthese

    ANS (C)ANS (C)ANS (C)ANS (C)

    14.14.14.14.

    Servers are computers that provideresources to other computers connectedto a ___________(A) mainframe(B) network(C) supercomputer(D) client(E) None of theseANS (B)ANS (B)ANS (B)ANS (B)15.15.15.15.A goal of data mining includes which

    of the following?(A) To explain some observed event orcondition(B) To confirm that data exists(C) To analyze data for expectedrelationships(D) To create a new data warehouse

  • 8/7/2019 GAGAN IT SOLUTIONS

    4/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    (E) None of theseANS (A)ANS (A)ANS (A)ANS (A)16.16.16.16.URL stands for ..(A) Universal Research List

    (B) Universal Resource List(C) Uniform Resource Locator(D) Uniform Research Locator(E) None of theseANS (C)ANS (C)ANS (C)ANS (C)

    17171717. A database management system(DBMS) is a

    (A) hardware system used to create ,maintain and provide controlled accessto a database(B) hardware system used to create,maintain, and provide uncontrolled accessto a database.(C) software system used to create,maintain, and provide uncontrolled accessto a database.

    (D) software system used to create,maintain, and provide controlled accessto a database.(E) None of theseANS (D)ANS (D)ANS (D)ANS (D)

    18181818. Which of the following is NOT a goalof transaction processing system ?(A) Capture , process and storetransactions

    (B) Produce a variety of documentsrelated to routine business activities(C) Reduce manual effort associated withprocessing business transactions(D) Produce standard reports used formanagement decision making(E) None of these

    ANS ()ANS ()ANS ()ANS ()19.19.19.19.A Proxy server is used forwhich of the following?(A) To provide security against

    unauthorized users(B) To process client requestsfor web pages(C) To process client requestsfor database access(D) To provide TCP/IP(E) None of theseANS (B)ANS (B)ANS (B)ANS (B)20202020. When data changes in multiple

    lists and all lists are not updated,this causes:(A) data redundancy(B) information overload(C) duplicate data(D) data inconsistency(E) None of theseANS (D)ANS (D)ANS (D)ANS (D)21212121. _____________ are words that aprogramming language has set aside for

    its own use.(A) Control worlds(B) Reserved words(C) Control structures(D) Reserved keys(E) None of theseANS (B)ANS (B)ANS (B)ANS (B)

    Gagan@9855689837

  • 8/7/2019 GAGAN IT SOLUTIONS

    5/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    22222222. What is the primary differencebetween a virus and a worm?(A) A worm has the ability to self-

    propagate from an infected users

    computer to other computers(B) A worm is usually written by acracker: Script bunnies do not have theskills to develop a worm program(C) A virus is very harmful to thecomputers it infects : a worm is not aserious a problem(D) Anti-virus software is effective infighting viruses but not worms

    (E) None of theseANS ()ANS ()ANS ()ANS ()23232323. ______ describe what is databasefields.(A) Structures(B) Field markers(C) Field definition(D) Field names(E) None of theseANS (D)ANS (D)ANS (D)ANS (D)

    24242424. You must install a (n)____________ on a network if youwant to share a broadband Internetconnection.(A) router(B) modem(C) node(D) cable(E) None of these

    ANS (A)ANS (A)ANS (A)ANS (A)25.25.25.25.A goal of normalization is to__________(A) minimize the number of relationships(B) minimize the number of entities(C) minimize the number of tables(D) minimize the number of redundancy

    (E) None of theseANS (D)ANS (D)ANS (D)ANS (D)26262626. Granting an outside organizationaccess to internet web pages is often

    implemented using a (n) ____(A) extranet(B) intranet(C) internet(D) hacker(E) None of theseANS (A)ANS (A)ANS (A)ANS (A)27272727. Which term identifies a specificcomputer on the web and the main pageof the entire site(A) URL(B) Web site address(C) Hyperlink(D) Domain name(E) None of theseANS (A)ANS (A)ANS (A)ANS (A)

    28.28.28.28.The code that relational databasemanagement systems use to perform

    their database task is referred to as ..(A) QBE(B) SQL(C) OLAP(D) Sequel Server(E) None of theseANS (B)ANS (B)ANS (B)ANS (B)29.29.29.29.Chip is a common nickname for a (n):(A) transistor

    (B) resistor(C) integrated circuit(D) semiconductor(E) None of theseANS (c)ANS (c)ANS (c)ANS (c)

    30.30.30.30.The purpose of the primary key in adatabase is to:

  • 8/7/2019 GAGAN IT SOLUTIONS

    6/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    (A) unlock the database(B) provide a map of the data(C) uniquely identify a record(D) establish constraints on database

    operations.(E) None of theseANS (B)ANS (B)ANS (B)ANS (B)31313131. A _________ contains specific rulesand words that express the logical stepsof an algorithm.(A) programming language(B) syntax(C) programming structure(D) logic chart(E) None of theseANS ()ANS ()ANS ()ANS ()

    32323232. The design of the network is calledthe network:(A) architecture(B) server(C) transmission(D) type

    (E) None of theseANS (A)ANS (A)ANS (A)ANS (A)33.33.33.33.The most frequently used instructionsof a computer program are likely to befetched from:(A) the hard disk(B) cache memory(C) RAM(D) registers(E) None of these(E) None of these(E) None of these(E) None of these

    ANS (B)ANS (B)ANS (B)ANS (B)34.34.34.34.The ____________ contains datadescriptions and defines the name, datatype, and length of each field in thedatabase.(A) data dictionary(B) data table

    (C) data record(D) data field(E) None of theseANS (A)ANS (A)ANS (A)ANS (A)

    nnnno somokingo somokingo somokingo somoking....

    35.35.35.35.Personal logs or journal entries posted on Web are known as:(A) listservs(B) Webcasts(C) blogs

    (D) subject directories(E) None of theseANS (C)ANS (C)ANS (C)ANS (C)36.36.36.36.A(n) _______ uses pictures (called icons) menus displayed on the screen to send commanto the computer system.(A) command based user interface(B) GUI

  • 8/7/2019 GAGAN IT SOLUTIONS

    7/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    (C) system utility(D) API(E) None of theseANS (B)ANS (B)ANS (B)ANS (B)37.37.37.37.The _____ manual tells you how to use asoftware program.(A) documentation(B) programming(C) technical(D) user(E) None of theseANS ()ANS ()ANS ()ANS ()38.38.38.38.Which of the following is NOT a type ofbroadband Internet connection?(A) Cable

    (B) DSL(C) Dial-up(D) Satellite(E) None of theseANS (C)ANS (C)ANS (C)ANS (C)39.39.39.39.Software, such as viruses, worms and Trojanhorses, that has a malicious intent, is known as:(A) spyware(B) adware(C) spam(D) malware

    (E) None of theseANS (D)ANS (D)ANS (D)ANS (D)40.40.40.40.Making a field ______ means that it cannotbe left blank.(A) numeric(B) required(C) calculated(D) validated(E) None of theseANS (B)ANS (B)ANS (B)ANS (B)41414141. _________ is the process of finding errors in

    software code.(A) Debugging(B) Compiling(C) Testing(D) Running(E) None pf theseANS (C)ANS (C)ANS (C)ANS (C)42.42.42.42.____________ are viruses that are

    triggered by the passage of time or on a certdate.(A) Boot-sector viruses(B) Macro viruses(C) Time bombs(D) Worms(E) None of theseAns (C)Ans (C)Ans (C)Ans (C)43434343. Linux is a (n) ____________ operatingsystem.(A) open-source(B) Microsoft(C) Windows(D) Mac(E) None of theseANS (A)ANS (A)ANS (A)ANS (A)44.44.44.44.What is a backup?(A) Restoring the information backup(B) An exact copy of a systems information(C) The ability to get a system up and runningthe event of a system crash or failure(D) All of these(E) None of theseANS (D)ANS (D)ANS (D)ANS (D)45454545. Which of the following places the commondata elements in order from smallest to larges

    (A) character, file, record, field, database(B) character, record, field, database, file(C) character, field, record, file, database(D) Bit, byte, character, record, field, file,database,(E) None of theseANS (C)ANS (C)ANS (C)ANS (C)46464646. The internet is (A) a large network of networks(B) an internal communication system for abusiness

    (C) a communication system for the Indiangovernment(D) All of these(E) None of theseANS (D)ANS (D)ANS (D)ANS (D)47474747. ____________ are lists of commands thappear on the screen.(A) GUIs

  • 8/7/2019 GAGAN IT SOLUTIONS

    8/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    (B) Icons(C) Menus(D) Windows(E) None of theseANS (C)ANS (C)ANS (C)ANS (C)48484848. Which of the following statements is FALSEconcerning file names?(A) Files may share the same name or the sameextension but not both(B) Every file in the same folder must have aunique name(C) File extension is another name for file type(D) The file extension comes before the dot (.)followed by the file name(E) None of theseANS (D)ANS (D)ANS (D)ANS (D)49.49.49.49.Verification of a login name and password isknown as:(A) configuration(B) accessibility(C) authentication(D) logging in(E) None of theseANS (C)ANS (C)ANS (C)ANS (C)50.50.50.50.Which of the following would most likely NOTbe a symptom of a virus?

    (A) Existing program files and icons disappear.(B) The CD-ROM stops functioning.(C) The Web browser opens to an unusual homepage.(D) Odd messages or images are displayed on thescreen.(E) None of theseANS (B)ANS (B)ANS (B)ANS (B)

    New questions

    1. A keyboard is this kind of device(A) black(B) input(C) output(D) word Processing

    (E) None of theseAns : (B)

    2. IT stands for

    (A) information Technology(B) integrated Technology(C) intelligent Technology(D) interesting Technology(E) None of theseAns : (A)

    3. Which of the following refers to the fastest,biggest and most expensive computers ?(A) Personal Computers(B) Supercomputers

    (C) Laptops(D) Notebooks(E) None of theseAns : (B)

    4. A collection of related information sorted adealt with as a unit is a(A) disk(B) data(C) file

    (D) floppy(E) None of theseAns : (C)

    5. The process of a computer receivinginformation from a server on the Internet isknown as(A) pulling(B) pushing(C) downloading(D) transferring

    (E) None of theseAns : (C)

    6. Which part of the computer helps to storeinformation ?(A) Disk drive(B) Keyboard(C) Monitor

  • 8/7/2019 GAGAN IT SOLUTIONS

    9/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    (D) Printer(E) None of theseAns : (A)

  • 8/7/2019 GAGAN IT SOLUTIONS

    10/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

  • 8/7/2019 GAGAN IT SOLUTIONS

    11/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    7.7.7.7. is the process of carrying out commands.is the process of carrying out commands.is the process of carrying out commands.is the process of carrying out commands.(A) Fetching(A) Fetching(A) Fetching(A) Fetching(B) Storing(B) Storing(B) Storing(B) Storing(C) Executing(C) Executing(C) Executing(C) Executing(D) Decoding(D) Decoding(D) Decoding(D) Decoding(E) None of these(E) None of these(E) None of these(E) None of theseAns : (C)Ans : (C)Ans : (C)Ans : (C)

    8. The role of a8. The role of a8. The role of a8. The role of agenerally is to determine agenerally is to determine agenerally is to determine agenerally is to determine abuyerbuyerbuyerbuyers needs and match it to the corrects needs and match it to the corrects needs and match it to the corrects needs and match it to the correcthardware and software.hardware and software.hardware and software.hardware and software.(A) computer Scientist(A) computer Scientist(A) computer Scientist(A) computer Scientist(B) computer sales representative(B) computer sales representative(B) computer sales representative(B) computer sales representative(C) computer consultant(C) computer consultant(C) computer consultant(C) computer consultant(D) corporate trainer(D) corporate trainer(D) corporate trainer(D) corporate trainer

    (E) None of these(E) None of these(E) None of these(E) None of theseAns : (B)Ans : (B)Ans : (B)Ans : (B)

    9. Which of the following groups consist of only9. Which of the following groups consist of only9. Which of the following groups consist of only9. Which of the following groups consist of onlyoutput devices ?output devices ?output devices ?output devices ?(A) Scanner, Printer, Monitor(A) Scanner, Printer, Monitor(A) Scanner, Printer, Monitor(A) Scanner, Printer, Monitor(B) Keyboard, Printer, Monitor(B) Keyboard, Printer, Monitor(B) Keyboard, Printer, Monitor(B) Keyboard, Printer, Monitor(C) Mouse, Printer, Monitor(C) Mouse, Printer, Monitor(C) Mouse, Printer, Monitor(C) Mouse, Printer, Monitor(D) Plotter, Printer, Monitor(D) Plotter, Printer, Monitor(D) Plotter, Printer, Monitor(D) Plotter, Printer, Monitor(E) None of these(E) None of these(E) None of these(E) None of theseAns : (D)Ans : (D)Ans : (D)Ans : (D)

    10. The rectangular area of the screen that10. The rectangular area of the screen that10. The rectangular area of the screen that10. The rectangular area of the screen thatdisplays a program, data, and/or information isdisplays a program, data, and/or information isdisplays a program, data, and/or information isdisplays a program, data, and/or information isaaaa(A) title bar(A) title bar(A) title bar(A) title bar(B) button(B) button(B) button(B) button(C) dialog box(C) dialog box(C) dialog box(C) dialog box(D) window(D) window(D) window(D) window(E) None of these(E) None of these(E) None of these(E) None of theseAns : (D)Ans : (D)Ans : (D)Ans : (D)

    11. A(n)11. A(n)11. A(n)11. A(n)contains commands that can becontains commands that can becontains commands that can becontains commands that can beselected.selected.selected.selected.(A) pointer(A) pointer(A) pointer(A) pointer(B) menu(B) menu(B) menu(B) menu(C) icon(C) icon(C) icon(C) icon(D) button(D) button(D) button(D) button

    (E) None of these(E) None of these(E) None of these(E) None of theseAns : (B)Ans : (B)Ans : (B)Ans : (B)

    12. An error is also known as12. An error is also known as12. An error is also known as12. An error is also known as

    (A) bug(A) bug(A) bug(A) bug(B) debug(B) debug(B) debug(B) debug(C) cursor(C) cursor(C) cursor(C) cursor(D) icon(D) icon(D) icon(D) icon(E(E(E(E) None of these) None of these) None of these) None of theseAns : (A)Ans : (A)Ans : (A)Ans : (A)

    13. Arithmetic Operations13. Arithmetic Operations13. Arithmetic Operations13. Arithmetic Operations(A) involve matching one data item to another(A) involve matching one data item to another(A) involve matching one data item to another(A) involve matching one data item to anotherdetermine if the first item is greater than, equdetermine if the first item is greater than, equadetermine if the first item is greater than, equdetermine if the first item is greater than, equato, or less than the other itemto, or less than the other itemto, or less than the other itemto, or less than the other item

    (B) sort data items according to standard,(B) sort data items according to standard,(B) sort data items according to standard,(B) sort data items according to standard,predefined criteria in ascenpredefined criteria in ascenpredefined criteria in ascenpredefined criteria in ascending order ording order ording order ording order ordescending orderdescending orderdescending orderdescending order(C) use conditions with operators such as AND(C) use conditions with operators such as AND(C) use conditions with operators such as AND(C) use conditions with operators such as ANDand NOTand NOTand NOTand NOT(D) include addition, subtraction, multiplication (D) include addition, subtraction, multiplication (D) include addition, subtraction, multiplication (D) include addition, subtraction, multiplication divisiondivisiondivisiondivision(E) None of these(E) None of these(E) None of these(E) None of theseAns : (D)Ans : (D)Ans : (D)Ans : (D)

    14. Sending an e14. Sending an e14. Sending an e14. Sending an e----mail is similar tomail is similar tomail is similar tomail is similar to

    (A) picturing an event(A) picturing an event(A) picturing an event(A) picturing an event(B) narrating a(B) narrating a(B) narrating a(B) narrating a storystorystorystory(C) writing a letter(C) writing a letter(C) writing a letter(C) writing a letter(D) creating a drawing(D) creating a drawing(D) creating a drawing(D) creating a drawing(E) None of these(E) None of these(E) None of these(E) None of theseAns : (C)Ans : (C)Ans : (C)Ans : (C)

    16. Microsoft Word is an example of16. Microsoft Word is an example of16. Microsoft Word is an example of16. Microsoft Word is an example of(A) an operating system(A) an operating system(A) an operating system(A) an operating system(B) a processing device(B) a processing device(B) a processing device(B) a processing device

    (C) application software(C) application software(C) application software(C) application software(D) an input device(D) an input device(D) an input device(D) an input device(E) None of these(E) None of these(E) None of these(E) None of theseAns : (B)Ans : (B)Ans : (B)Ans : (B)

    18. Any data or inst18. Any data or inst18. Any data or inst18. Any data or instruction entered into theruction entered into theruction entered into theruction entered into thememory of a computer is considered asmemory of a computer is considered asmemory of a computer is considered asmemory of a computer is considered as(A) storage(A) storage(A) storage(A) storage

  • 8/7/2019 GAGAN IT SOLUTIONS

    12/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    (B) output(C) input(D) information(E) None of theseAns : (A)

    19. Which part of the computer displays the workdone ?(A) RAM(B) printer(C) monitor(D) ROM(E) None of theseAns : (C)

    22. A series of instructions that tells a computerwhat to do and how to do it is called a(A) program(B) command(C) user response(D) processor(E) None of theseAns : (A)

    24. Which is the part of a computer that one can

    touch and feel ?(A) Hardware(B) Software(C) Programs(D) Output(E) None of theseAns : (A)

    27. Processing involves(A) inputting data into a computer system(B) transforming input into output

    (C) displaying output in a useful manner(D) providing relevant answers(E) None of theseAns : (B)

    34. can be done through digital Banking ?(A) Mobile phone(B) Internet

    (C) Telephone(D) All of these(E) None of theseAns : (A)

    1. The _____ states that a foreign key musteither match a primary key value in anotherrelation or it must be null.

    (a) entity integrity rule

    (b) referential integrity constraint

    (c) action assertion

    (d) composite attribute

    (e) None of these

    2. An applet __________

    (a) is an interpreted program that runs on theclient

    (b) tracks the number of visitors to a Website

    (c) is a compiled program that usually runs onclient

    (d) collects data from visitors to a Website

    (e) None of these

    3. A _____ sometimes called a boot sector viexecutes when a computer boots up because resides in the boot sector of a floppy disk or master boot record of a hard disk.

    (a) system virus

    (b) Trojan horse virus

  • 8/7/2019 GAGAN IT SOLUTIONS

    13/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    (c) file virus

    (d) macro virus

    (e) None of these

    4. Which error detection method uses onescomplement arithmetic?

    (a) Simply parity check

    (b) Checksum

    (c) Two-dimensional parity check

    (d) CRC

    (e) None of these

    5. A result of a computer viruscan notcan notcan notcan notlead to___.(a) Disk Crash

    (b) Mother Board Crash

    (c) Corruption of program

    (d) Deletion of files

    (e) None of these

    6. The network interface card of LAN is related tofollowing layer of OSI Model-

    (a) Transport

    (b) Network

    (c) Data Link

    (d) Physical

    (e) All of these

    7. Which of the following doesnotnotnotnotdescribe a dwarehouse?(a) Subject-oriented

    (b) Integrated

    (c) Time-variant

    (d) Updateable

    (e) None of these

    8. Which of the following istruetruetruetrue?(a) Logical design is software-dependent

    (b) In a distributed database, database is storin one physical location

    (c) Conceptual design translates the logical deinto internal model

    (d) Logical design is software independent

    (e) None of these

    9. A range check _____

    (a) ensures that only the correct data type isentered into a field

    (b) verifies that all required data is present

    (c) determines whether a number is within aspecified limit

    (d) tests if the data in two or more associatefields is logical

  • 8/7/2019 GAGAN IT SOLUTIONS

    14/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    (e) None of these

    10. The total set of interlinked hypertextdocuments worldwide is-

    (a) HTTP

    (b) Browser

    (c) WWW

    (d) B2B

    (e) None of these

    11. With the object-oriented (OO) approach, anobject encapsulates, or_____.a programmer.

    (a) carries out, the details of an object for

    (b) hides, the details of an object from

    (c) reveals, the details of an object to

    (d) extends, the details of an object beyond

    (e) None of these

    12. Every computer connected to an intranet orextranet must have a distinct_____

    (a) firewall

    (b) proxy server

    (c) IP address

    (d) domain name

    (e) None of these

    13. A table of bits in which each row representhe distinct values of a key?

    (a) Join index

    (b) Bitmap index

    (c) B + Tree

    (d) Hierarchical index

    (e) None of these

    14. The degree of detail that should be

    incorporated into a database depends on wha

    (a) Data integrity

    (b) The type of database

    (c) The users perspective

    (d) The business practices and policies

    (e) None of these

    15. The ___.converts digital signals to analogsignals for the purpose of transmitting data otelephone lines.

    (a) Modem

    (b) Router

    (c) Gateway

    (d) Bridge

    (e) All of these

  • 8/7/2019 GAGAN IT SOLUTIONS

    15/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    16. Before a package can be used in a javaprogram it must be___.

    (a) executed

    (b) referenced

    (c) imported

    (d) declared

    (e) None of these

    17. Choose the correct way to indicate that a line

    in a C++ program is a comment line, that is, a linethe will not be executed as an instruction___.

    (a) begin the line with a # sign

    (b) begin the line with double slashes (/ /)

    (c) begin and end the line with double hyphens (-_-)

    (d) indent the line

    (e) None of these

    18. Programming language built into userprograms such as Word and Excel are knownas____

    (a) 4GLs

    (b) macro languages

    (c) object-oriented languages

    (d) visual programming languages

    (e) None of these

    19. Firewalls are used to protect against___.

    (a) Unauthorized Attacks

    (b) Virus Attacks

    (c) Data Driven Attacks

    (d) Fire Attacks

    (e) All of these

    20. This is a standard way for a Web server tpass a Web users request to an application

    program and to receive data back to forwardthe user-

    (a) Interrupt request

    (b) Forward DNS lookup

    (c) Data-Link layer

    (d) File Transfer Protocol

    (e) Common gateway interface

    21. Three SQL, DDL, CREATE commands are__.

    (a) Schema, Base and Table

    (b) Base, Table and Schema

    (c) Key, Base and Table

    (d) Schema, Table and View

    (e) None of these

  • 8/7/2019 GAGAN IT SOLUTIONS

    16/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    22. Data are ________ in client/servercomputing.

    (a) never sent to the client machine

    (b) sent in very large sections to save processingtime

    (c) sent only upon the clients request

    (d) sent in complete copies for the client to filterand sort

    (e) sent from the client to the server for

    processing

    23. Which of the following willnotnotnotnoteliminates theambiguities of a null value?(a) Define the attribute as required

    (b) Define subtypes

    (c) Define each attribute as having an initial valuethat is recognized as blank

    (d) Define supertypes

    (e) None of these

    24. The____directory is mandatory for every disk.

    (a) Root

    (b) Base

    (c) Sub

    (d) Case

    (e) None of these

    25. This is a group of servers that share workand may be able to back each other up if oneserver fails.

    (a) Channel bank

    (b) Cluster

    (c) Tiger team

    (d) Serverless backup

    (e) Logical unit

    ANSWERSANSWERSANSWERSANSWERS1. (a)

    2- (c)

    3- (e)

    4- (b)

    5- (b)

    6. (e)

    7- (d)

    8- (a)

    9- (c)

  • 8/7/2019 GAGAN IT SOLUTIONS

    17/20

    Gagan@9855689837 2008

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    10- (a)

    11. (b)

    12- (c)

    13- (b)

    14- (b)

    15- (a)

    16. (c)

    17- (b)

    18- (d)

    19- (a)

    20- (e)

    21. (d)

    22-(c)

    23- (d)

    24- (c)

    25- (b)

    Unsolved questions for practise

    1) When silicon chips were invented in the1970s, what result followed?a) Larger system units were requiredb) Computer manufacturing moved to

    Australiac) Cancer among computer users increasedd) Desktop microcomputers were created

    2) As computer technology advances, whatcan we expect the future to bring?a) Increase in speed and efficiencyb) Decrease in technology careersc) Decrease of hazardous waste dumpingd) Increase in the use of floppy disks

    (Note: Increasemeans moremoremoremore, Decreasemeans lesslesslessless.)

    3) Which system might have hundreds ofterminals that send input to a cabinet-sizedcomputer for processing?a) Personal digital assistantb) Mainframec) Notebook computerd)Desktop microcomputers

    4) Which type of computer is a compact,portable unit?a) Microcomputerb) Notebookc) Workstationd) Card reader

    5) What is a system unit?a) Output devices and peripherals

    b)Case that holds the circuit boards apower unit

    c) IBM or MAC platformd) Documentation: Software CD and use

    manual

    6) How is the speed of the microprocessormeasured?a) Bytes, such as MBb) Points, such as 12 pt.

    c)Hertz, such and mHz

    d) Scale, such as 55%

    7) RAM is . . .a) Filename extensionb) Monitor resolutionc) Temporary storage zone

    Data on magnetic tape

  • 8/7/2019 GAGAN IT SOLUTIONS

    18/20

    Gagan@9855689837 2008

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    8) Which of the following is pre-recorded dataused to start the boot process?

    a)

    DATb) RAMc) ROMd) DSL

    9) Which group of data storage units isarranged from smallest to largest (readingfrom left to right)?a) Terabyte, kilobyte, byte, bitb) Byte, kilobyte, megabyte, gigabyte

    c)

    Byte, petabyte, gigabyte, megabyted) Byte, gigabyte, megabyte, kilobyte

    10) Which storage medium can be write-protected?a) Hard discb) Floppy discc) CD-RWd) Hard copy

    11)

    How much data can be saved on onecompact disc?a) Less than a Zip discb) About the same as 500 floppy discsc) More than a DVDd) It varies a lot, depending on the

    computer

    12) When data has been stored on thismedium, a laser light reads the file:a)Compact Disc

    b) Digital Audio Tapec) Zip diskd) Hard disk

    13) Which group represents input devices?a) Ink cartridge, tray, paperb) Monitor, speakers, printer

    c) Trackball, mouse, microphoned) Projector, screen, PowerPoint

    presentation

    14)

    Which types of printers would be mopractical for home use?a) Image setter, dye sublimationb) MacIntosh, IBMc) Ink jet, laserd) Microsoft, Corel

    15) Which devices expand the basiccomputer system, but are not a necessapart of it?

    a)Peripheral

    b) Surgec) Pixeld) Cartridge

    16) Windows, Mac OS, UNIX, and Linnuxaall examples of

  • 8/7/2019 GAGAN IT SOLUTIONS

    19/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    a) Microsoft productsb) Operating system softwarec) Application softwared) Freeware software

    17) When using the Windowsprogram, whatis a menu?a) Auto-correctb) Helpful tipsc) List of choicesd) Warning

    18) An icon is . . .

    a)A small picture or symbol thatrepresents a program, file, or function

    b) An infrared beam that provides inputthrough mouse-clicks

    c) A unit of measurement used to describestorage capacity

    d) A type of encryption used to protectprivacy while using a network.

    19) Before buying a software program,

    what detail should you check to be sure itwill work with your computer system?a) Previous versionsb) Platformc) Peripheralsd) Price

    20) Which type of software accepts inputfrom the user and tells the computer howto complete a specific task?

    a)Operating system

    b) Sectorc) Applicationd) Boot

    21) Which software would be best for usingformulas to make calculations?

    a) CADb) WordPerfectc) Exceld) Explorer

    22) When a computer runs two or moresoftware applications at the same timeis called:a) Multitaskingb) Binaryc) Domaind) Error

    23) What is the sequence of events that

    occurs from the time that you turn on computer to the time it is ready to acccommands?a) Control dialogb) Master launchc) Boot processd) Simple

  • 8/7/2019 GAGAN IT SOLUTIONS

    20/20

    Gagan@9855689837 200

    Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

    24) In order for the computer to be able toprocess data, the input must first beconverted to:

    a)

    Webdingsymbolsb) Default settingsc) Binary coded) Digits with three decimals

    25) An output device allows the computeruser to . . .a) Search a databaseb) Change a passwordc) Save files

    d)See or hear information

    26) What is good about a LAN (Local AreaNetwork)?a) Privacy is guaranteedb) Expensive devices can be shared by

    more than one computerc) A problem with the network only

    impacts one computerd) Passwords never expire

    27) Which option links small networksaround the world together using unique IPaddresses:a) Microsoft Corporationb) Customer Supportc) Internetworkd) State/Local Government

    28)

    Which type of computer links to othercomputers so that data, programs, andperipheral devices can be shared?a) Supercomputer

    b) Serverc) Hard drived) Expansion slot

    29)

    Which of the following statements abviruses and destructive programs is moTRUE?a) They destroy programs if copyright

    violatedb) They can lurk for months before

    attackingc) As time passes, they weaken and died) Their creators intended no harm

    30)

    When it comes to saving files, which NOT possible?a) I can organize files into folders and

    subfoldersb) I can move files from one folder to

    another folderc) I can save files in more than one fold

    with one commandd) I can delete files that I no longer nee

    Thank you

    If you want questions for competitive

    exams then you can demand through m

    email id:-

    [email protected]