Professional Documents
Culture Documents
Computer Fundamentals:
A pivot table is a data summarization tool that is used in the context of data processing. Pivot
tables are used to summarize, sort, reorganize, group, count, total or average data stored in a
database. It allows its users to transform columns into rows and rows into columns. It allows
grouping by any data field. Pivot tables are the perfect solution when you need to summarize and
analyze large amounts of data. In just a few clicks, you have access to a whole new set of
information. As already said, spreadsheets are one solution to create pivot tables, but the best
tools don’t require to write complicated formulas or to start all over again every time you want to
organize the data differently. A drag and drop option to move your fields around is the easiest way
to go.
Answer: a Answer: d
Explanation: The word COMPUTER is an Explanation: The above diagram is a simple
abbreviation for the terms “Commonly Operated explanation which describes how the instruction is
Machines Used in Technical and Educational given to the CPU, how it is processed, and then
Research”. The word COMPUTER also relates to how the result is obtained.
the word COMPUTE which means to calculate. So here, the input unit is used to give instructions
So, initially it was thought that a computer is a to the central processing unit and the output unit is
device which is used to perform calculations. responsible for giving the result to the user.
4
d) DDR 1. The ‘heart’ of the processor which performs
View Answer many different operations _____________
a) Arithmetic and logic unit
Answer: b b) Motherboard
Explanation: DRAM stands for dynamic random c) Control Unit
access memory. It is denser than SDRAM (Static) d) Memory
and therefore it is used in the main memory. They View Answer
are in the form of semiconductor RAMs.
Answer: a
7. Which of the following are types of ROMs? Explanation: The Arithmetic and logic unit
a) SROM & DROM performs all the basic operations of the computer
b) PROM & EPROM system. It performs all the arithmetic(+,-,*,/,etc) as
c) Only one type there is no further classification well as the logical operations( AND, OR, NOT,
d) PROM & EROM etc.).
View Answer
2. ALU is the place where the actual executions of
8. RAID stands for __________ instructions take place during the processing
a) Redundant array of independent disks operation.
b) Redundant array of individual disks a) True
c) Reusable Array of independent disks b) False
d) Reusable array of individual disks View Answer
View Answer
Answer: a
Answer: a Explanation: ALU is a combinational electronic
Explanation: RAID is a multiple-disk database circuit which basically performs all the logical or
design which is viewed as a single logical disk by the bitwise operations and the arithmetic
the operating system. Data are distributed across operations. Therefore, it is the place where the
the physical drives of the array. It guarantees the actual executions of instructions take place.
recovery of data in case of data failure.
3. Which of the following is not a bitwise
9. A non-erasable disk that stores digitized audio operator?
information is _____ a) |
a) CD b) ^
b) CD-ROM c) .
c) DVD-R d) <<
d) DVD-RW View Answer
View Answer
Answer: c
Answer: a Explanation: All except the dot(.) operator are
Explanation: A compact disk stores digitized audio bitwise operators.
information. The standard system uses 12 cm disks | : Bitwise OR
and can record more than 60 minutes of ^ : Bitwise XOR
uninterrupted playing game. << : Shift Left
10. The first practical form of Random Access 4. The sign magnitude representation of -1 is
Memory was the __________ __________
a) SSEM a) 0001
b) Cathode Ray Tube b) 1110
c) William’s Tube c) 1000
d) Thomas’s Tube d) 1001
View Answer View Answer
Answer: c Answer: d
Explanation: The first practical form of RAM was Explanation: The first leftmost bit i.e. the most
William’s Tube made in 1947. It stored data as significant bit in the sign magnitude represents if
electrically charged spots on the face of a Cathode the number is positive or negative. If the MSB is 1,
Ray Tube. the number is negative else if it is 0, the number is
positive. Here, +1=0001 and for -1=1001.
5
5. IEEE stands for ___________ b) Parity
a) Instantaneous Electrical Engineering c) Auxiliary
b) Institute of Emerging Electrical Engineers d) Carry
c) Institute of Emerging Electronic Engineers View Answer
d) Institute of Electrical and electronics engineers
View Answer Answer: b
Explanation: The parity flag indicates the number
Answer: d of 1 bit in any operation. The resultant bit is called
Explanation: The IEEE is an organization of the parity bit. The main aim of the parity bit is to
professionals in the field of electronics and check for errors.
electrical engineering. IEEE has given certain
standards of its own which are followed in the field 10. The bitwise complement of 0 is ___________
of computer science and electrical engineering. a) 00000001
b) 10000000
6. The ALU gives the output of the operations and c) 11111111
the output is stored in the ________ d) 11111110
a) Memory Devices View Answer
b) Registers
c) Flags Answer: c
d) Output Unit Explanation: Bitwise complement is basically used
View Answer to convert all the 0 digits to 1 and the 1s to 0s.
So, for 0 = 00000000(in 8-bits) ::: 11111111(1s
Answer: b complement). The bitwise complement is often
Explanation: Any output generated by the ALU referred to as the 1s complement.
gets stored in the registers. The registers are the
temporary memory locations within the processor
that are connected by signal paths to the CPU. 1. ____________ is the raw material used as input
and __________ is the processed data obtained as
7. The process of division on memory spaces is output of data processing.
called ______________ a) Data, Instructions
a) Paging b) Instructions, Program
b) Segmentation c) Data, Program
c) Bifurcation d) Program, Code
d) Dynamic Division View Answer
View Answer
Answer: a
Answer: b Explanation: Data can be assumed as a raw
Explanation: The memory space is divided into material which, in turns after processing gives the
segments of dynamic size. The programmer is desired output in the form of instructions. Further,
aware of the segmentation and can reallocate the a set of ordered and meaningful instructions is
segments accordingly. known as a program.
Answer: d
a) Input Unit Explanation: The main task of a control unit is to
b) Memory Unit generate control signals. There are two main types
c) Control Unit of control units:
d) I/O Unit A hardwired control unit generates control signals
View Answer by using combinational logic circuits and the
Micro programmed control unit generates control
signals by using some softwares.
Answer: c
Explanation: The control unit manages and
coordinates the operations of a computer system. 7. Which is the simplest method of implementing
The ALU is responsible for performing all the hardwired control unit?
arithmetic and bitwise operations . Therefore, both a) State Table Method
these units combine to form the brain of the b) Delay Element Method
computer ,which is the central processing unit. c) Sequence Counter Method
d) Using Circuits
View Answer
4. The part of a processor which contains
hardware necessary to perform all the operations
required by a computer: Answer: a
a) Data path Explanation: There are 3 ways of implementing
b) Controller hardwired control unit:
c) Registers A state table is the simplest method in which a
d) Cache number of circuits are designed based on the cells
View Answer in the table.
A delay element method consists of a flowchart
drawn for the circuit. A D-flip flop is used as a
Answer: a
delay element.
Explanation: A processor is a part of the computer
A sequence counter method used k-modulo counter
which does all the data manipulation and decision
as a replacement for k delay elements.
making. A processor comprises of:
A data path which contains the hardware necessary
to perform all the operations. A controller tells the 8. A set of microinstructions for a single machine
data path what needs to be done. instruction is called ___________
The registers act as intermediate storage for the a) Program
data. b) Command
c) Micro program
d) Micro command
5. What does MAR stand for?
View Answer
a) Main Address Register
b) Memory Access Register
c) Main Accessible Register Answer: c
d) Memory Address Register Explanation: For every micro-operation, a set of
View Answer microinstructions are written which indicate the
control signals to be activated. A set of
microinstructions is a micro program. The address
7
of the next microinstruction is given by a Micro- Answer: a
program counter. Explanation: In a non-positional number system, 1
is represented as I, 2 as II, 3 as III, 4 as IIII and
9. Micro-program consists of a set of therefore, 5 is represented as IIIII. This number
microinstructions which are strings of 0s and 1s. system uses symbols for the representation of
a) True digits.
b) False
View Answer 3. The base is the total number of digits in a
number system.
Answer: a a) True
Explanation: The computer understands only b) False
binary language. So, the micro-program should View Answer
have instructions which are in the form of 0s and
1s. Each output line of the micro-program Answer: a
corresponds to one control signal. Explanation: The statement is true. In a positional
number system, base is the number of digits the
10. A decoder is required in case of a system comprises. For example, a binary number
______________ system comprises of only 2 digits, 0 and 1,
a) Vertical Microinstruction therefore its base is 2. Similarly, the decimal
b) Horizontal Microinstruction system comprises 10 digits 0 to 9, therefore its
c) Multilevel Microinstruction base is 10.
d) All types of microinstructions
View Answer 4. The LSB and MSB of 1243247 are ____ and
____
Answer: a a) 1, 7
Explanation: There are two types of b) 4, 7
microinstructions: Horizontal and Vertical. c) 7, 1
In a horizontal microinstruction, each bit represents d) 4, 1
a signal to be activated whereas, in case of vertical View Answer
microinstruction bits are decoded and, the decoder
then produces signals. Answer: c
Explanation: The LSB or the least significant bit is
1. Which of the following is not a type of number the rightmost digit at the zeros position. The MSB
system? or the most significant bit is the leftmost digit.
a) Positional
b) Non-Positional 5. A device that uses positional notation to
c) Octal represent a decimal number.
d) Fractional a) Abacus
View Answer b) Calculator
c) Pascaline
Answer: d d) Computer
Explanation: There are two main types of number View Answer
systems : Positional & Non-positional.
Positional System uses digits for the representation Answer: a
whereas, non-positional number systems use Explanation: Abacus was used to doing arithmetic
certain symbols for the representation of numbers. calculations around 2500 years ago. Pascaline was
Octal is a type of positional number systems with the pascal’s calculator by Blaise Pascal invented
base 8. for doing laborious calculations.
Answer: b Answer: c
Explanation: BCD is the binary coded decimal Explanation: A decimal number system consists of
form of representation of numbers in 4 bits.E.g. 10 digits from 0 to 9.
The BCD representation of 5 is 0101. BCD The definition of base describes it as a quantity to
representation of 22 is 00100010. represent the number of digits present in that
particular number system.
8. 1 zettabyte = ______________ Therefore, here, the base is 10.
a) 1024 TB
b) 1024 EB 2. Convert : (110)2 = ( __ )10.
c) 1024 ZB a) 4
d) 1024 PB b) 5
View Answer c) 6
d) 9
Answer: b View Answer
Explanation: 1 ZB=1024 EB(exabyte)
1 EB=1024PB(petabyte) Answer: c
1 YB(yottabyte)=1024ZB. Explanation: The base 2 represents that the number
is binary ,whereas, the base 10 represents that it is
9. Perfrom BCD addition: 2+3= to be converted to the decimal format.
_______________ Conversion: 22 * 1 + 21 * 1 + 20 *0 = 6.
a) 0010
b) 0011 3. The 2’s complement of 15 is ____________
c) 0101 a) 0000
d) 1010 b) 0001
View Answer c) 0010
d) 0100
Answer: c View Answer
Explanation: BCD of 2 =0010
BCD of 3=0011 Answer: b
0010+0011=0101 Explanation: 2’s complement is obtained by adding
Therefore, 2+3=0101(5). 1 to the 1’s complement of the number.
Here, Binary of 15 = 1111
10. ASCII stands for _____________________ 1’s complement of 15= 0000
a) American standard code for information 2’s complement of 15= 0000+1=0001.
interchange
b) American scientific code for information 4. Another name for base is __________
interchange a) root
c) American scientific code for international b) radix
interchange c) entity
d) American standard code of international d) median
interchange View Answer
View Answer
Answer: b
Answer: a Explanation: Another name for base is radix. Base
Explanation: ASCII is an encoding standard which refers to the number of digits that a particular
is used for communications worldwide. ASCII number system consists of.
9
The base of decimal number system is 10, binary is 10 : A
2 and so on. 11 : B
12 : C
5. The decimal equivalent of (0.101)2 will be 13 : D
____________ 14 : E
a) 0.5 15 : F.
b) 0.625
c) 0.25 9. Which of the following is not a decimal
d) 0.875 number?
View Answer a) 114
b) 43.47
Answer: b c) 99.9A
Explanation: Since the base is 2 , it could be easily d) 10101
guessed that the number is binary. Conversion: 2-1 View Answer
* 1 + 2-2 * 0 + 2-3 * 1 = 0.625.
Answer: c
6. The signed magnitude for -3 will be Explanation: All the numbers except 99.9A are
___________ decimal numbers.
a) 00000011 This number has a hexadecimal component A in it,
b) 10000011 therefore , it is not a valid decimal number.
c) 11111101 The decimal equivalent of A is 10.
d) 11111100
View Answer 10. Select the incorrect option:
a) (101)10 = (1100101)2
Answer: b b) G is valid in hexadecimal system.
Explanation: Signed Magnitude of a number is a c) C represents 12
representation to determine if the number is d) The base of a decimal number system is 10.
positive or negative. View Answer
If the MSB of a number is 0, the number is
positive, else if it is 1 the number is negative. Answer: b
Here, +3 = 00000011 Explanation: G is not a valid hexadecimal number.
-3= 100000011. In this system, only representations from A to E
are used to represent the numbers from 10 to 15.
7. A number with both integer and a fractional The base of the hexadecimal number system is 16.
part has digits raised to both positive and negative
powers of 2 in a decimal number system. 1. Which of the following is not a positional
a) True number system?
b) False a) Roman Number System
View Answer b) Octal Number System
c) Binary Number System
Answer: b d) Hexadecimal Number System
Explanation: In a decimal number system, a View Answer
number with both integer and a fractional part has
digits raised to both positive and negative powers Answer: a
of 10 and not 2. Explanation: The Roman number system isn’t a
e.g. 22.34 = 2 * 101 + 2 * 100 + 3 * 10-1 + 4 * 10-2. positional number system since it uses symbols to
represent numbers.
8. The hexadecimal representation of 14 is The octal number system uses digits from 0-7, the
_______________ binary number system uses digits from 0-1
a) A whereas, the hexadecimal number system uses
b) F digits from 0-15.
c) D
d) E 2. The value of radix in binary number system is
View Answer _____________
a) 2
Answer: d b) 8
Explanation: The hexadecimal representations are c) 10
as follows:
10
d) 1 before decimal and from right to left after the
View Answer decimal place.
Here,
Answer: a
Explanation: In a binary number system, the value
of base or radix is 2. The binary system uses only
two digits for the representation of numbers,
therefore its base id has chosen to be 2.
Answer: b
Explanation: In hexadecimal number system, 1110
= 15, which is represented by the alphabet E.
Some representations are:
A 10
B 11
We then write the remainders in the reverse order
C 12
as 1010 .
D 13
E 14
4. A computer language that is written in binary F 15.
codes only is _____
a) machine language
7. A bit in a computer terminology means either 0
b) C
or 1.
c) C#
a) True
d) pascal
b) False
View Answer
View Answer
Answer: a
Answer: a
Explanation: Machine Language is written in
Explanation: A bit stands for a binary digit. A
binary codes only. It can be easily understood by
binary digit can have only two digits i.e. 0 or 1. A
the computer and is very difficult for us to
binary number consisting of n-bits is called an n-
understand. A machine language, unlike other
bit number.
languages, requires no translators or interpreters.
8. Convert the binary equivalent 10101 to its
5. The octal equivalent of 1100101.001010 is
decimal equivalent.
______
a) 21
a) 624.12
b) 12
b) 145.12
c) 22
c) 154.12
d) 31
d) 145.21
View Answer
View Answer
Answer: a
Answer: b
Explanation: To convert a binary number to its
Explanation: The octal equivalent is obtained by
decimal equivalent follow these steps :
grouping the numbers into three, from right to left
11
24 * 1 + 23 * 0 + 22 *1 + 21 * 0 + 20 * 1 = 21. represented as :
Therefore, the answer is 21. 82 * 1 + 81 * 1 + 80 *3.
9. Which of the following is not a binary number? 3. The maximum number of bits sufficient to
a) 1111 represent an octal number in binary is _______
b) 101 a) 4
c) 11E b) 3
d) 000 c) 7
View Answer d) 8
View Answer
Answer: c
Explanation: A binary number can have only two Answer: b
possible digits, 0 and 1. In the third option, there is Explanation: The octal number system comprises
an alphabet E present which makes it an invalid of only 8 digits. Hence, three bits (23 = 8) are
binary number. Alphabets are only allowed in the sufficient to represent any octal number in the
hexadecimal number system. binary format.
10. Which of the following is the correct 4. The binary number 111 in octal format is
representation of a binary number? ________________
a) (124)2 a) 6
b) 1110 b) 7
c) (110)2 c) 8
d) (000)2 d) 5
View Answer View Answer
Answer: d Answer: b
Explanation: The binary numbers should comprise Explanation: Certain binary to octal representations
only two digits 0 and 1. are :
Also, for the base, the value should be 2 and it 000=0
should be written as a subscript enclosing the 001=1
entire number. Here, the fourth option gives the 010=2
correct representation. 011=3
100=4
1. What could be the maximum value of a single 101=5
digit in an octal number system? 110=6
a) 8 111=7.
b) 7
c) 6 5. Convert (22)8 into its corresponding decimal
d) 5 number.
View Answer a) 28
b) 18
Answer: b c) 81
Explanation: The maximum value in any number d) 82
system is one less than the value of the base. The View Answer
base in an octal number system is 8, therefore, the
maximum value of the single digit is 7. It takes Answer: b
digits from 0 to 7. Explanation: To convert an octal number to
decimal number:
2. In a number system, each position of a digit 81 * 2 + 80 * 2 = 16 + 2 = 18.
represents a specific power of the base. Hence, the decimal equivalent is 18.
a) True
b) False 6. The octal equivalent of the binary number
View Answer (0010010100)2 is ______________
a) 422
Answer: a b) 242
Explanation: In a number system, every digit is c) 224
denoted by a specific power of base. Like in an d) 226
octal system, consider the number 113, it will be View Answer
12
Answer: c 1011 0000 0001 (
Explanation: To obtain the octal equivalent, we groups of 4)
take numbers in groups of 3, from right to left as : B 0 1 (
000 010 010 100 hexadecimal equivalent)
advertisement
14
10. What do we call the point(decimal) in any a) Constants
hexadecimal number of the form 111.A3? b) Variables
a) radix c) Modules
b) hexadecimal point d) Tokens
c) decimal View Answer
d) octal point
View Answer Answer: b
Explanation: Variables are the data entities whose
Answer: b values can be changed. Constants have a fixed
Explanation: The decimal is often referred to as the value. Tokens are the words which are easily
hexadecimal point in hexadecimal representation identified by the compiler.
of numbers.
It is referred to as the octal point in octal numbers. 5. Which of the following is not a basic data type
in C language?
1. Which of the following is not a data type? a) float
a) Symbolic Data b) int
b) Alphanumeric Data c) real
c) Numeric Data d) char
d) Alphabetic Data View Answer
View Answer
Answer: c
Answer: a Explanation: There are 5 basic data types in C
Explanation: Data types are of three basic types: language: int, char, float, double, void.
Numeric, Alphabetic and Alphanumeric. Numeric Int is for the representation of integers, char is for
Data consists of only numbers. strings and characters, float and double are for
Alphabetic Data consists of only letters and a blank floating point numbers whereas void is a valueless
character and alphanumeric data consists of special data type.
symbols.
6. BOOLEAN is a type of data type which
2. *@Ac# is a type of ________________ data. basically gives a tautology or fallacy.
a) Symbolic a) True
b) Alphanumeric b) False
c) Alphabetic View Answer
d) Numeric
View Answer Answer: a
Explanation: A Boolean representation is for
Answer: b giving logical values. It returns either true or false.
Explanation: Alphanumeric data consists of If a result gives a truth value, it is called tautology
symbols. Alphanumeric data may be a letter, either whereas if it returns a false term, it is referred to as
in uppercase or lowercase or some special symbols fallacy.
like #,^,*,(, etc.
7. What does FORTRAN stands for?
3. Which of the following is not a valid a) Formula Transfer
representation in bits? b) Formula Transformation
a) 8-bit c) Formula Translation
b) 24-bit d) Format Transformation
c) 32-bit View Answer
d) 64-bit
View Answer Answer: c
Explanation: FORTRAN is a type of computer
Answer: b language. It was developed for solving
Explanation: There are no criteria like the 24-bit mathematical and scientific problems. It is very
representation of numbers. Numbers can be written commonly used among the scientific community.
in 8-bit, 16-bit, 32-bit and 64-bit as per the IEEE
format. 8. The program written by the programmer in high
level language is called _____________
4. What are the entities whose values can be a) Object Program
changed called? b) Source Program
15
c) Assembled Program Answer: a
d) Compiled Program Explanation: In a Binary Coded Decimal format,
View Answer 64 characters i.e. 26 different characters can be
represented. It is one of the early computer codes.
Answer: b
Explanation: The program written by the 3. Which of the following is not a type of
programmer is called a source program. The computer code?
program generated by the compiler after a) EBCDIC
compilation is called an object program. The object b) BCD
program is in machine language. c) ASCII
d) EDIC
9. A standardized language used for commercial View Answer
applications.
a) C Answer: d
b) Java Explanation: There is no coding scheme like
c) COBOL EDIC. EBCDIC stands for Extended Binary Coded
d) FORTRAN Decimal Interchange Code. BCD stands for Binary
View Answer Coded Decimal. ASCII stands for American
Standard Code for information interchange.
Answer: c
Explanation: COBOL is a language used in 4. The BCD representation of (34)10 is
business and commercial applications. It stands for _______________
Common Business Oriented Language. It is a) 6
imperative, procedural as well as object oriented b) 7
language. c) 8
d) 5
10. ______________ define how the locations can View Answer
be used.
a) Data types Answer: b
b) Attributes Explanation: BCD numbers are represented as:
c) Links 34 = (0011 0100)BCD.
d) Data Objects Each digit is individually taken and an equivalent
View Answer standard 4 bit term is written for the respective
digit.
Answer: b
Explanation: Attributes can determine how any 5. Perform BCD addition of (23)BCD + (20)BCD .
location can be used. Attributes can be type, name, a) 00110100
component, etc. Data objects are the variables and b) 01000011
constants in a program. c) 10011
d) 11100
1. A group of bits used to represent a symbol is View Answer
called a ____________
a) byte Answer: b
b) memory Explanation: To add any two BCD numbers :
c) nibble Simply perform the addition : 23+20=43.
d) code Then, write the equivalent BCD number = (0100
View Answer 0011)BCD.
8. The characters from 0 to 9 have their common 2. The decimal representation for the character ‘!’
digit as ___________ in ASCII is ____________
a) 1111 a) 31
b) 0000 b) 32
c) 0001 c) 33
d) 1000 d) 34
View Answer View Answer
Answer: a Answer: c
Explanation: The digits are 1111 in case of Explanation: The decimal representation of a few
basic characters are:
18
33 : ! 7. The zone of alphabetic characters from A to O
34 : ” in ASCII is _____________
35: # a) 1000
36 :$. b) 0100
c) 0010
3. The two types of ASCII are _____________ d) 0001
and ____________ View Answer
a) ASCII-4 and ASCII-8
b) ASCII-8 and ASCII-16 Answer: b
c) ASCII-7 and ASCII-8 Explanation: The zone used by ASCII for
d) ASCII-4 and ASCII-16 alphabets is 0100. For e.g. A is represented as
View Answer 0100(zone)0001(digit). The hex equivalent is 41
for A. The zone used by numbers is 0011.
Answer: c
Explanation: The two types of ASCII are ASCII-7 8. The representation of the number 8 in binary in
and ASCII-8. ASCII-7 uses 7 bits for the ASCII-8 format _________
representation of numbers and ASCII-8 uses 8-bits. a) 00111000
b) 01001000
4. Any set of digits or alphabets are generally c) 1000
referred as ______________ d) 00011000
a) Characters View Answer
b) Symbols
c) Bits Answer: a
d) Bytes Explanation: The ASCII-8 format will have 8 bits.
View Answer The zone for the character 8 is 0011 and the digit is
1000. Therefore, its representation is 00111000.
Answer: a
Explanation: We refer to the digits and alphabets 9. Binary Coding for the letter X is
generally as characters. A character is generally a ______________
unit of information in computers. a) 01011000
b) 00111000
5. The first 128 characters are the same in both the c) 10001000
types of ASCII i.e. ASCII-7 and ASCII-8. d) 00010100
a) True View Answer
b) False
View Answer Answer: a
Explanation: The binary coding for the letter X is
Answer: a 01011000. Here, 0101 is the zone whereas 1000 is
Explanation: There are two types of ASCII codes: the digit. The alphabets from P to Z have the zone
ASCII-7 and ASCII-8. ASCII-7 uses 7 bits to 0101.
represent a number whereas ASCII-8 uses 8-bits to
represent a number. 10. Express the ASCII equivalent of the signed
binary number (00110010)2.
6. The number of characters that can be a) 2
represented in ASCII-8 are ______________ b) 1
a) 128 c) A
b) 256 d) ,
c) 32 View Answer
d) 64
View Answer Answer: a
Explanation: The ASCII characters for the
Answer: b remaining options are:
Explanation: ASCII-8 can represent 256 different 1 : 00110001
characters. ASCII-8 uses 8-bits for the A : 01000001
representation of numbers i.e. it can represent 28 = , : 00101100.
256 different characters.
1. The numbers used to represent numeric values
in EBCDIC are _______
19
a) zoned d) F3F4D5
b) unsigned View Answer
c) packed
d) eb Answer: a
View Answer Explanation: F is used for the representation of
unsigned numbers therefore, F3F4F5 represents
Answer: a 345. F3F4C5 represents +345 . F3F4D5 represents
Explanation: Zoned numbers represent the numeric -345.
values under EBCDIC (Extended Binary Coded
Decimal Interchange Code). In zoned format, there 6. Which of the following is a valid encoding
is only one digit per byte. format?
a) UTF-1
2. Unicode provides a consistent way of encoding b) UTF-8
multilingual plain text. c) UTF-A
a) True d) UTF-4
b) False View Answer
View Answer
Answer: b
Answer: a Explanation: The various encoding formats are
Explanation: Unicode defines codes for characters UTF-8, UTF-16 and UTF-32. UTF stands for
used in all major languages of the world. Unicode Transformation Format. It is basically an
It is a coding system which supports almost all the encoding system that supports all languages.
languages. It defines special codes for different
characters, symbols, diacritics, etc. 7. _________________ defines the assigned
ordering among the characters used by the
3. Which of the following is not a type of numeric computer.
value in zoned format? a) Unicode
a) Positive b) Collating Sequence
b) Negative c) Accumulation
c) Double d) Sorting
d) Unsigned View Answer
View Answer
Answer: b
Answer: c Explanation: Collating sequence is the term used
Explanation: The zoned format can represent for ordering among characters. It may vary
numeric values of type Positive, negative and depending upon the type of code used by a
unsigned numbers. A sign indicator is used in the computer.
zone position of the rightmost digit.
8. The sorting sequence of the strings A1,23,1A
4. The sign indicator of unsigned numbers is will be ______________
____________ a) 23 > A1 > 1A
a) C b) 23 < 1A > A1
b) D c) A1 > 1A > 23
c) F d) A1 < 1A < 23
d) X View Answer
View Answer
Answer: d
Answer: c Explanation: The sorting order is A1, 1A, 23.
Explanation: A sign indicator is used in the zone Numeric characters are given a greater preference
position of the rightmost digit. A sign indicator C in EBCDIC as compared to the alphabets.
is used for positive, D for negative and F is used
for negative numbers. 9. The default character coding in HTML-5 is
_____________
5. The EBCDIC value of the number 345 in zoned a) UTF-8
format is __________ b) UTF-16
a) F3F4F5 c) UTF-4
b) E3E4E5 d) UTF-32
c) F3F4C5 View Answer
20
Answer: a Answer: d
Explanation: HTML5 which is the hypertext Explanation: 1’s complement is obtained by
markup language generally uses the UTF-8 format reversing the bits from 0 to 1 and vice-versa.
as its default encoding. Unicode covers all the Binary of 1 is : 0001 and 1’s complement is : 1110.
characters and symbols in all the different
languages. 4. The binary number 111 in its 2’s complement
form is ____________
10. Numbers used in packed decimal format can a) 010
be used for _____________ operations. b) 001
a) logical c) 000
b) relational d) 111
c) arithmetic View Answer
d) bitwise
View Answer Answer: b
Explanation: 2’s complement is obtained by adding
Answer: c 1 to the 1’s complement. 1’s complement of 111:
Explanation: The packed numbers can be used for 000 and 2’s complement:001.
arithmetic operations. The packed numbers also
require the lesser number of bytes as compared to 5. The sign magnitude representation of -9 is
zoned numbers. ___________
a) 00001001
1. __________________ is a straightforward b) 11111001
method of representing positive and negative c) 10001001
numbers. d) 11001
a) Radix View Answer
b) Complement
c) Sign Magnitude Answer: c
d) Encode Explanation: In case of a negative number, the
View Answer leftmost digit is 1 if the number is negative.
Therefore, +9=00001001 and -9=10001001.
Answer: c Similarly for all other negative numbers.
Explanation: Sign Magnitude is used for the
representation of positive and negative numbers. If 6. If you are given a word of size n bits, the range
the leftmost digit is 0, the number is positive. If the of 2’s complement of binary numbers is ________
leftmost digit is 1, the number is negative. a) -2n+1 to +2n+1
b) -2n-1 to +2n-1
2. The additive inverse of a number is the number c) -2n-1 to +2n+1
which when added to the original number gives 1 d) -2n-1 to +2n-1-1
as a result. View Answer
a) True
b) False Answer: d
View Answer Explanation: 2’s complement is obtained by adding
1 to the 1’s complement. For e.g. 5 :0101 and 1’s
Answer: b complement=1010 and 2’s complement=1011.
Explanation: Additive Inverse of a number is the
number which gives 0 and not 1 when added to the 7. In both signed magnitude and 2’s complement ,
original number. e.g. number=45, additive inverse positive and negative numbers are separated using
=-45, after addition they give 0. ______________
a) LSB
3. The 1’s complement of 1 in 4 bits is b) MSB
__________ c) 0
a) 0001 d) 1
b) 0 View Answer
c) 1001
d) 1110 Answer: b
View Answer Explanation: The positive and negative numbers
are separated using the MSB. MSB is the Most
Significant Bit. MSB is the leftmost bit. e.g. If
21
1000 is the number then 1 is the most significant 2. One extra bit is added on the left of a binary
bit. number, in case of Binary Multiplication using
Booth’s Algorithm.
8. Single Precision format comprises of a) True
_________ bits. b) False
a) 4 View Answer
b) 8
c) 16 Answer: a
d) 32 Explanation: The statement is true as an extra bit is
View Answer added when we multiply 2 binary numbers by
using Booth’s.
Answer: d Let us take an example if we multiply 2 * – 3.
Explanation: The single precision format The first step is to obtain the binary equivalents.
comprises of 32-bits. It has 1 sign bit, 8 bits for Hence, 2=10 and -3=01.
exponent and 23 for the mantissa. Now after adding the extra bit 2=010 and -3=101.
We add 0 in case of positive numbers whereas 1 in
9. If m is the 2’s complement and n is the binary negative numbers.
number, then ______________
a) m=n’ 3. The binary number obtained after applying
b) m=n’+1 RSC on 11010 will be ___________
c) m=n’-1 a) 11101
d) m=n b) 10100
View Answer c) 01101
d) 01000
Answer: b View Answer
Explanation: 2’s complement is simply obtained by
addition of 1. So if n is the number and we take the Answer: c
2’s complement, add 1 to it, we get the 2’s Explanation: RSC stands for Right-Shift Circulant.
complement. Therefore, m=n’+1. So, whenever the numbers are shifted to the right
an extra 0 bit is added to the left. Here, after the
10. The possible number of bit patterns with 8 bits right shift of 11010, the number obtained will be
________________ 01101.
a) 128
b) 8 4. The result of >> of 11001 by 3-bits will be
c) 24 ______________
d) 256 a) 01000
View Answer b) 01111
c) 00011
Answer: d d) 11111
Explanation: The total number of patterns that can View Answer
be formed using n-bits are 2n. Here, possible
patterns are: 28=256. Answer: a
Explanation: >> is the bitwise left shift operator in
1. Which of the following is used for binary binary arithmetic.
multiplication? Applying >>(left-shift) by 3-bits on the number
a) Restoring Multiplication 11001 will result in 3 zeroes on the right, i.e.,
b) Booth’s Algorithm 01000.
c) Pascal’s Rule
d) Digit-by-digit multiplication 5. Booth’s Algorithm is applied on
View Answer _____________
a) decimal numbers
Answer: b b) binary numbers
Explanation: The Booth’s Algorithm is used for the c) hexadecimal numbers
multiplication of binary numbers. It is basically d) octal Numbers
used for the multiplication of 2 signed numbers. View Answer
This is a very important algorithm in binary
arithmetic. Answer: b
Explanation: Booth’s Algorithm is applied only on
22
signed and unsigned binary numbers. c) -2
Although, the values of other number systems can d) -3
be converted to binary, and then the multiplication View Answer
could be performed.
Answer: a
6. If Booth’s Multiplication is performed on the Explanation: After applying the procedure of
numbers 22*3, then what is 3 referred to as Booth’s Algorithm, the value obtained will be 6.
__________ Even though the result is obtained in its 2’s
a) accumulator complement for but then it is reconverted to its
b) multiplicand normalized form. Also, the value obtained after
c) quotient decimal multiplication is the same as the value
d) multiplier obtained after binary multiplication.
View Answer
10. What does the data transfer instruction STA
Answer: d stand for?
Explanation: It is referred to as the multiplier. a) Store Accumulator
Multiplier is denoted by Q in booth’s algorithm. 22 b) Send Accumulator
is called the multiplicand. These numbers are first c) Send Action
converted to their binary equivalents and further d) Store Action
the multiplication is performed. View Answer
Answer: b Answer: a
Explanation: The two main IEEE formats are 16- Explanation: The 64-bit format is referred to as the
bit and 32-bit. No format of 4-bit exists. Further, 8- double precision format. It has 1 sign bit, 8
bit format also exists. exponent bits and 23 bits for the mantissa.
In IEEE format, there are certain bits allotted to
sign, exponent and mantissa. 7. What is NaN in IEEE standards?
a) Not arithmetic
3. The result of 0 – 1 in binary is b) Not a negation
______________ c) Not a number
a) 0 d) Not a Node
b) 1 View Answer
c) 11
d) 10 Answer: c
View Answer Explanation: It stands for not a number in IEEE
standards. A NaN is obtained whenever a result id
Answer: b indeterminate like whenever anything is divided by
Explanation: The binary subtraction 0 – 1 gives the 0.
result 1. A borrow of 1 is although generated and is
removed from the next higher column. 8. The result that is smaller than the smallest
number obtained is referred to as ___________
4. The complement of any number can be given a) NaN
by a general term _______________ b) Underflow
a) Bn – 1 – N c) Smallest
b) Bn -1 + N d) Mantissa
c) Bn +1 – N View Answer
d) Bn +1 + N
View Answer Answer: b
Explanation: It is referred to as underflow. Nan
Answer: a stands for not a number. The mantissa is the part
Explanation: Complement of a number can be after the decimal.
given by the term :
C= Bn – 1 – N. 9. The number of sign bits in a 32-bit IEEE format
Here, _________
B= base a) 1
n= number of digits b) 11
N= the number. c) 9
d) 23
5. The IEEE standard followed by almost all the View Answer
computers for floating point arithmetic _____
a) IEEE 260 Answer: a
b) IEEE 488 Explanation: There is only 1 sign bit in all the
c) IEEE 754 standards. In a 32-bit format, there is 1 sign bit, 8
d) IEEE 610 bits for the exponent and 23 bits for the mantissa.
View Answer
25
10. Express the decimal format of the signed c) Multiplicand
binary number (101010)2 . d) Multiplier
a) 10 View Answer
b) 12
c) -12 Answer: d
d) -10 Explanation: 111 is called the multiplier.
View Answer Whenever a multiplication is performed the second
term is called the multiplier whereas the first term
Answer: d is called the multiplicand.
Explanation: The first bit is the sign bit whereas
the rest of the bits are magnitude bits. So the 5. The result obtained on binary multiplication of
number is: 01010 =23 * 1 + 21 * 1 =8+2 =10. 1010 * 1100 is _____________
But, the sign bit is 1 , a) 0001111
Therefore the answer is : (-2)10. b) 0011111
c) 1111100
1. Perform binary addition of 1101 + 0010 is d) 1111000
________ View Answer
a) 1110
b) 1111 Answer: d
c) 0111 Explanation: The solution is as follows :
d) 1,1101 1010
View Answer * 1100
________
Answer: b 0000
Explanation: The addition is performed as : 0000
1101 1010
+ 0010 1010
_______ _______
1111 1111000
Therefore, the result is 1111.
6. Which of the following is often called the
2. The addition 1+1 gives 0 as a result. double precision format?
a) True a) 64-bit
b) False b) 8-bit
View Answer c) 32-bit
d) 128-bit
Answer: a View Answer
Explanation: The two result obtained is 0 with a
carry of 1. This carry is transferred to the next Answer: a
higher column. Explanation: The 64-bit format is referred to as the
double precision format. It has 1 sign bit, 8
3. The result of 0*1 in binary is ____________ exponent bits and 23 bits for the mantissa.
a) 0
b) 1 7. What do you call the intermediate terms in
c) invalid binary multiplication?
d) 10 a) Multipliers
View Answer b) Mid terms
c) Partial Products
Answer: a d) Multiplicands
Explanation: The binary multiplication of any View Answer
number with 0 will give the result 0 itself. Any
binary number when multiplied by 0 gives 0 only. Answer: c
e.g. 1101 * 0000 = 0000. Explanation: The intermediate terms are called
partial terms. The mid terms obtained in the binary
4. The multiplication of 110 * 111 is performed. multiplications are the partial ones whereas the
What is a general term used for 111? answer obtained is called the final product.
a) Dividend
b) Quotient
26
8. The result that is smaller than the smallest 2. Boolean Algebra can deal with any number
number obtained is referred to as ___________ system.
a) NaN a) True
b) Underflow b) False
c) Smallest View Answer
d) Mantissa
View Answer Answer: b
Explanation: Boolean Algebra can only be used
Answer: b with the binary number system. Boolean deals with
Explanation: It is referred to as underflow. Nan only two values 0 and 1. In Boolean System, if the
stands for not a number. Mantissa is the part after result is tautology it returns 1 otherwise 0.
the decimal.
3. The symbol + in Boolean is also known as the
9. The number of sign bits in a 32-bit IEEE format ____________ operator.
is _______ a) AND
a) 1 b) OR
b) 11 c) ADD
c) 9 d) SUMMATION
d) 23 View Answer
View Answer
Answer: b
Answer: a Explanation: The symbol + is also called as the OR
Explanation: There is only 1 sign bit in all the operator. It is used for logical addition. It follows
standards. In a 32-bit format, there is 1 sign bit, 8 the law of binary addition.
bits for the exponent and 23 bits for the mantissa.
advertisement 4. Which operator has the highest precedence?
a) +
10. Express the decimal format of the signed b) .
binary number (101010)2 . c) !
a) 10 d) *
b) 12 View Answer
c) -12
d) -10 Answer: c
View Answer Explanation: The NOT operator has the highest
precedence. It is denoted by ! or – sign. Further,
Answer: d AND (.) operations are performed and then the OR
Explanation: The first bit is the sign bit whereas terms are evaluated.
the rest of the bits are magnitude bits. So the
number is: 01010 =23 * 1 + 21 * 1 =8+2 =10. 5. In the expression Y + X’.Y, which operator will
But , the sign bit is 1, be evaluated first?
Therefore the answer is : (-2)10. a) ‘
b) +
c) .
1. The number of values applicable in Boolean d) ,
Algebra. View Answer
a) 1
b) 2 Answer: a
c) 3 Explanation: In Boolean Algebra, complement of a
d) 4 number is given the highest precedence. Therefore,
View Answer complement which is denoted by the ‘ (apostrophe)
symbol is evaluated first.
Answer: b
Explanation: Boolean algebra is based on binary 6. Which of the following is false?
number system. It therefore comprises only 2 bits : a) x+y=y+x
0 and 1. Hence, only two values are applicable to b) x.y=y.x
Boolean algebra. c) x.x’=1
d) x+x’=1
View Answer
27
Answer: c Answer: a
Explanation: The first and second option describes Explanation: The Boolean functions are
the commutative law. The fourth option holds true represented using the truth tables. Truth tables
since if x=1, then x’=0, and x+x’=1. Third option represent the tautology and fallacy for terms.
is incorrect because on multiplication of a boolean
value with its complement the result will always be 1. Boolean Function is of the form of ________
0. a) Truth values
b) K=f(X,Y,X)
7. As per idempotent law, X + X will always be c) Algebraic Expression
equal to ________ d) Truth Table
a) 0 View Answer
b) 1
c) X Answer: a
d) 2X Explanation: The boolean function is of the form
View Answer of algebraic expressions or truth table. A boolean
function is of the form as that of option 2. The
Answer: c result obtained from a boolean function can be a
Explanation: It will always return the same value truth value or a fallacy.
X. Since, boolean deals with only two numbers 0
and 1, if we add 0+0, the answer is 0. Similarly, if 2. The result of X+X.Y is X.
we add 1+1 the answer is 1. a) True
b) False
8. The expression for involution law is _________ View Answer
a) x+y=y+x
b) x+1=1 Answer: a
c) (x’)’=x Explanation: This is a boolean expression. It can be
d) x.x=x evaluated as :
View Answer X+X.Y = X(1+Y) = X.
Since 1+Y=1 by boolean laws.
Answer: c
Explanation: The involution law states that the 3. In the boolean function w=f(X,Y,Z), what is the
complement of complement of a number is the RHS referred to as ________
number itself. The third option justifies the a) right hand side
statement. Thus, (x’)’=x. b) expression
c) literals
9. Who proposed the use of Boolean algebra in d) boolean
the design of relay switching circuits? View Answer
a) George Boole
b) Claude E. Shannon Answer: b
c) Claude E. Boole Explanation: The RHS is commonly referred to as
d) George Shannon the expression. The symbols X, Y and Z are
View Answer commonly referred to as the literals of the function.
4. The corresponding min term when x=0, y=0 8. The number of cells in a K-map with n-
and z=1. variables.
a) x.y.z’ a) 2n
b) X’+Y’+Z b) n2
c) X+Y+Z’ c) 2n
d) x’.y’.z d) n
View Answer View Answer
Answer: d Answer: c
Explanation: The min term is obtained by taking Explanation: K-map is nothing but Karnaugh map.
the complement of the zero values and taking the SOP and POS expressions can be simplified using
term with value 1 as it is. the K-map.
Here, x=0,y=0 and z=1, then the min term is x’y’z. The number of cells in case of n-variables=2n.
5. LSI stands for ___________ 9. The output of AND gates in the SOP
a) Large Scale Integration expression is connected using the ________ gate.
b) Large System Integration a) XOR
c) Large Symbolic Instruction b) NOR
d) Large Symbolic Integration c) AND
View Answer d) OR
View Answer
Answer: a
Explanation: It stands for large scale integration. Answer: d
This is the abstraction level of the integrated Explanation: Since the product terms or the min
circuits. terms are added in an SOP expression.
It can also be small scale, medium, large or very Therefore, the OR gate is used to connect the AND
large scale integration. gates.
6. Which operation is shown in the following 10. The expression A+BC is the reduced form of
expression: (X+Y’).(X+Z).(Z’+Y’) ______________
a) NOR a) AB+BC
b) ExOR b) (A+B)(A+C)
c) SOP c) (A+C)B
d) POS d) (A+B)C
View Answer View Answer
Answer: c Answer: b
Explanation: The expression comprises of max Explanation: The second option is correct.
terms. It can simplified as follows: (A+B)(A+C)
Also, the terms are ANDed together, therefore it is =AA+AC+AB+BC
a POS term. =A+AC+AB+BC
=A(1+C)+AB+BC
7. The number of min terms for an expression =A+AB+BC
comprising of 3 variables? =A(1+B)+BC
a) 8 =A+BC.
b) 3
c) 0 1. Electronic circuits that operate on one or more
d) 1 input signals to produce standard output _______
View Answer a) Series circuits
b) Parallel Circuits
Answer: a c) Logic Signals
Explanation: If any expression comprises of n d) Logic Gates
variables, its corresponding min terms are given by View Answer
2n.
30
Answer: d output from 0 to 1 and vice-versa.
Explanation: The logic gates operate on one or The Boolean expression for NOT gate is Y=A’.
more input signals to produce a standard output. Therefore, it gives the complement of the result
Logic gates give the output in the form of 0 and 1. obtained.
The Boolean algebra can be applied to the logic
gates. 6. Which of the following gate will give a 0 when
both of its inputs are 1?
2. Logic Gates are the building blocks of all a) AND
circuits in a computer. b) OR
a) True c) NAND
b) False d) EXOR
View Answer View Answer
Answer: a Answer: c
Explanation: The statement is true. Explanation: The NAND gate gives 0 as the output
Logic gates are idealized to implement a boolean when both of its inputs are 1 or any one of the
function in all circuits of a computer. input is 1.
The signals are directed as per the outputs of the It returns a 1 only if both the inputs are 0.
logic gates in the form of 0 and 1.
7. When logic gates are connected to form a
3. A __________ gate gives the output as 1 only if gating/logic network it is called as a
all the inputs signals are 1. ______________ logic circuit.
a) AND a) combinational
b) OR b) sequential
c) EXOR c) systematic
d) NOR d) hardwired
View Answer View Answer
Answer: a Answer: a
Explanation: The AND gate gives a 1 only if all Explanation: It is referred to as a combinational
the input signals are 1. circuit as it comprises a number of gates.
The Boolean expression for evaluating an AND It is connected to evaluate a result of a Boolean
signal is: Y=A.B. expression.
4. The boolean expression of an OR gate is 8. The universal gate that can be used to
_______ implement any Boolean expression is __________
a) A.B a) NAND
b) A’B+AB’ b) EXOR
c) A+B c) OR
d) A’B’ d) AND
View Answer View Answer
Answer: c Answer: a
Explanation: An OR gate gives the result as 1 if Explanation: NAND gate can be used to implement
any one of the inputs is one. any Boolean expression.
Its expression is A+B. It is a universal gate. A universal gate can be used
An OR gate gives a 0 only if both the inputs are 0. to implement any other Boolean function without
using any other logic gate.
5. The gate which is used to reverse the output
obtained is _____ 9. The gate which is called an inverter is called
a) NOR _________
b) NAND a) NOR
c) EXOR b) NAND
d) NOT c) EXOR
View Answer d) NOT
View Answer
Answer: d
Explanation: NOT gate is used to reverse the
31
Answer: d It gives a HIGH output only in one case when all
Explanation: Inverter is used to reverse the output. the inputs given to it are LOW.
A NOT gate is used to invert or change the output
from 0 to 1 and vice-versa. 4. The following figure shows a ___________
gate.
10. The expression of an EXOR gate is
____________
a) A’B+AB’
b) AB+A’B’
c) A+A.B
d) A’+B’
a) NOR
View Answer
b) NAND
c) EXOR
Answer: a d) OR
Explanation: The expression for an EXOR gate is View Answer
A’B+AB’.
An EXOR gate is nothing but an exclusive OR
Answer: a
gate.
Explanation: The figure is that of a NOR gate.
The bubble signifies that it is a NOR gate.
1. A ____________ is a circuit with only one It is a type of universal gate and can be used to
output but can have multiple inputs. implement all the boolean expressions.
a) Logic gate
b) Truth table
5. The complement of the input given is obtained
c) Binary circuit
in case of:
d) Boolean circuit
a) NOR
View Answer
b) AND+NOR
c) NOT
Answer: a d) EX-OR
Explanation: A logic gate is used to evaluate a View Answer
Boolean expression.
It can have multiple inputs but can have only one
Answer: c
output.
Explanation: The NOT gate, also called as the
The different types of logic gates are AND, OR,
inverter gate is used to reverse the input which is
NOT etc.
given.
It gives an inverted output, thus gives the
2. There are 5 universal gates. complement.
a) True Expression for NOT gate: Y=A’, where A is the
b) False input.
View Answer
6. How many AND gates are required to realize
Answer: b the following expression Y=AB+BC?
Explanation: There are only 2 main universal a) 4
gates: NAND and NOR. b) 8
A NAND gate as well as the NOR gate can be used c) 1
to implement any other Boolean expression thus it d) 2
is called as a universal gate. View Answer
3. The Output is LOW if any one of the inputs is Answer: d
HIGH in case of a _________ gate. Explanation: 2 AND gates are required to realize
a) NOR the expression.
b) NAND 1 AND gate will be used to connect the inputs A
c) OR and B whereas the other will be used to connect the
d) AND inputs B and C.
View Answer
7. Number of outputs in a half adder
Answer: b _____________
Explanation: In case of a NAND gate the output is a) 1
LOW if any one of the inputs is HIGH (i.e. 1).
32
b) 2 c) Central Processing Unit
c) 3 d) Memory
d) 0 View Answer
View Answer
Answer: c
Answer: b Explanation: The CPU is referred to as the brain of
Explanation: A half adder gives two outputs. a computer.
One is called the sum and the other is carry. It consists of a control unit and the arithmetic and
Half adder can be implemented using an EXOR logic unit. It is responsible for performing all the
gate and an AND gate. processes and operations.
8. The ________ gate is an OR gate followed by a 2. Control Unit acts as the central nervous system
NOT gate. of the computer.
a) NAND a) True
b) EXOR b) False
c) NOR View Answer
d) EXNOR
View Answer Answer: a
Explanation: The control unit is referred to as the
Answer: c central nervous system because it selects and
Explanation: A NOR gate is a universal gate which interprets the instructions and coordinates
is an OR gate followed by a NOT gate. execution.
It therefore reverses the output obtained by an OR
gate. 3. What does MBR stand for?
It can be used to implement any Boolean a) Main Buffer Register
expression. b) Memory Buffer Routine
c) Main Buffer Routine
9. The expression of a NAND gate is_______ d) Memory Buffer Register
a) A.B View Answer
b) A’B+AB’
c) (A.B)’ Answer: d
d) (A+B)’ Explanation: The binary subtraction 0 – 1 gives the
View Answer result 1.
A borrow of 1 is although generated and is
Answer: c removed from the next higher column.
Explanation: A NAND gate is an AND gate
followed by a NOT gate. 4. In the instruction ADD A, B, the answer gets
It therefore inverts the output of an AND gate. stored in ___________
NAND gate is also a universal gate. a) B
b) A
10. Which of the following correctly describes the c) Buffer
distributive law. d) C
a)( A+B)(C+D)=AB+CD View Answer
b) (A+B).C=AC+BC
c) (AB)(A+B)=AB Answer: b
d) (A.B)C=AC.AB Explanation: In any instruction of the form ADD
View Answer A, B; the answer gets stored in the A register. The
format is: ADD Destination, Source.
Answer: b
Explanation: The second option correctly describes 5. What does PC stand for?
the distributive law. a) Program Changer
(A+B).C =AC+BC. b) Program Counter
Boolean Laws are used to implementing and c) Performance Counter
simplifying Boolean expression. d) Performance Changer
View Answer
1. Brain of computer is ____________
a) Control unit Answer: b
b) Arithmetic and Logic unit Explanation: The Program counter contains the
33
address of the next instruction which is to be Sequencing is traversing each and every operation
fetched by the control unit. whereas execution causes the performance of each
All other options are invalid. operation.
6. Which of the following holds the last 10. What does D in the D-flip flop stand for?
instruction fetched? a) Digital
a) PC b) Direct
b) MAR c) Delay
c) MBR d) Durable
d) IR View Answer
View Answer
Answer: c
Answer: d Explanation: In the hardwired control unit, the
Explanation: The IR which stands for the delay element method uses D-flip flop which
instruction register contains the last instruction causes a delay. Since, in the delay element method,
fetched. there must be a finite time gap between the 2 steps.
All the others options are registers which are used
for the fetch operation. 1. CPU has built-in ability to execute a particular
set of machine instructions, called as __________
7. The portion of the processor which contains the a) Instruction Set
hardware required to fetch the operations is b) Registers
_______ c) Sequence Set
a) Datapath d) User instructions
b) Processor View Answer
c) Control
d) Output unit Answer: a
View Answer Explanation: An instruction is any task which is to
be performed by the processor. Instructions are
Answer: a stored in the register. Instruction set is the set of
Explanation: The datapath contains the hardware machine instructions.
required to fetch the operations. The control tells
the data path what needs to be done. 2. Opcode indicates the operations to be
performed.
8. Causing the CPU to step through a series of a) True
micro operations is called _________ b) False
a) Execution View Answer
b) Runtime
c) Sequencing Answer: a
d) Pipelining Explanation: Every instruction has an opcode.
View Answer Additionally, it may have one or more operands
and the op code indicates the operation to be
Answer: c performed.
Explanation: Sequencing is the process of causing
the CPU to step through a series of micro 3. The length of a register is called _______
operations. Execution causes the performance of a) word limit
each micro operation. b) word size
c) register limit
9. The functions of execution and sequencing are d) register size
performed by using ______________ View Answer
a) Input Signals
b) Output Signals Answer: b
c) Control Signals Explanation: The length of a register is called word
d) CPU size. It tells the number of bits a register can store.
View Answer Registers are a part of the CPU.
35
3. Whenever the data is found in the cache c) Write within
memory it is called as _________ d) Buffered write
a) HIT View Answer
b) MISS
c) FOUND Answer: a
d) ERROR Explanation: Snoopy writes is the efficient method
View Answer for updating the cache. In this case, the cache
controller snoops or monitors the operations of
Answer: a other bus masters.
Explanation: Whenever the data is found in the
cache memory, it is called as Cache HIT. CPU first 8. In ____________ mapping, the data can be
checks in the cache memory since it is closest to mapped anywhere in the Cache Memory.
the CPU. a) Associative
b) Direct
4. LRU stands for ___________ c) Set Associative
a) Low Rate Usage d) Indirect
b) Least Rate Usage View Answer
c) Least Recently Used
d) Low Required Usage Answer: a
View Answer Explanation: This happens in the associative
mapping. In this case, a block of data from the
Answer: c main memory can be mapped anywhere in the
Explanation: LRU stands for Least Recently Used. cache memory.
LRU is a type of replacement policy used by the
cache memory. 9. The number of sign bits in a 32-bit IEEE format
is ____
5. When the data at a location in cache is different a) 1
from the data located in the main memory, the b) 11
cache is called _____________ c) 9
a) Unique d) 23
b) Inconsistent View Answer
c) Variable
d) Fault Answer: a
View Answer Explanation: There is only 1 sign bit in all the
standards. In a 32-bit format, there is 1 sign bit, 8
Answer: b bits for the exponent and 23 bits for the mantissa.
Explanation: The cache is said to be inconsistent.
Inconsistency must be avoided as it leads to serious 10. The transfer between CPU and Cache is
data bugs. ______________
a) Block transfer
6. Which of the following is not a write policy to b) Word transfer
avoid Cache Coherence? c) Set transfer
a) Write through d) Associative transfer
b) Write within View Answer
c) Write back
d) Buffered write Answer: b
View Answer Explanation: The transfer is a word transfer. In the
memory subsystem, word is transferred over the
Answer: b memory data bus and it typically has a width of a
Explanation: There is no policy which is called as word or half-word.
the write within policy. The other three options are
the write policies which are used to avoid cache 1. Computer has a built-in system clock that emits
coherence. millions of regularly spaced electric pulses per
_____ called clock cycles.
7. Which of the following is an efficient method a) second
of cache updating? b) millisecond
a) Snoopy writes c) microsecond
b) Write through
36
d) minute Answer: b
View Answer Explanation: CISC is a large instruction set
computer. It has variable length instructions. It also
Answer: a has variety of addressing modes.
Explanation: The regularly spaced electric pulses
per second are referred to as the clock cycles. All 6. Which of the following processor has a fixed
the jobs performed by the processor are on the length of instructions?
basis of clock cycles. a) CISC
b) RISC
2. It takes one clock cycle to perform a basic c) EPIC
operation. d) Multi-core
a) True View Answer
b) False
View Answer Answer: b
Explanation: The RISC which stands for Reduced
Answer: a Instruction set computer has a fixed length of
Explanation: It takes exactly one clock cycle to instructions. It has a small instruction set. Also has
perform a basic operation, such as moving a byte reduced references to memory to retrieve operands.
of memory from a location to another location in
the computer. 7. Processor which is complex and expensive to
produce is ________
3. The operation that does not involves clock a) RISC
cycles is _________ b) EPIC
a) Installation of a device c) CISC
b) Execute d) Multi-core
c) Fetch View Answer
d) Decode
View Answer Answer: c
Explanation: CISC stands for complex instruction
Answer: a set computer. It is mostly used in personal
Explanation: Normally, several clock cycles are computers. It has a large instruction set and a
required to fetch, execute and decode a particular variable length of instructions.
program.
Installation of a device is done by the system on its 8. The architecture that uses a tighter coupling
own. between the compiler and the processor is
____________
4. The number of clock cycles per second is a) EPIC
referred as ________ b) Multi-core
a) Clock speed c) RISC
b) Clock frequency d) CISC
c) Clock rate View Answer
d) Clock timing
View Answer Answer: a
Explanation: EPIC stands for Explicitly parallel
Answer: a instruction computing. It has a tighter coupling
Explanation: The number of clock cycles per between the compiler and the processor. It enables
second is the clock speed. It is generally measured the compiler to extract maximum parallelism in the
in gigahertz(109 cycles/sec) or megahertz (106 original code.
cycles/sec).
9. MAR stands for ___________
5. CISC stands for ____________ a) Memory address register
a) Complex Information Sensed CPU b) Main address register
b) Complex Instruction Set Computer c) Main accessible register
c) Complex Intelligence Sensed CPU d) Memory accessible register
d) Complex Instruction Set CPU View Answer
View Answer
Answer: a
Explanation: The MAR stands for memory address
37
register. It holds the address of the active memory a) Cache
location. b) Main
c) Secondary
10. A circuitry that processes that responds to and d) Registers
processes the basic instructions that are required to View Answer
drive a computer system is ________
a) Memory Answer: b
b) ALU Explanation: The main memory is implemented
c) CU using semiconductor chips. Main memory is
d) Processor located on the motherboard. It mainly consists of
View Answer RAM and small amount of ROM.
8. What is the location of the internal registers of 2. It takes one clock cycle to perform a basic
CPU? operation.
a) Internal a) True
b) On-chip b) False
c) External View Answer
d) Motherboard
View Answer Answer: a
Explanation: It takes exactly one clock cycle to
Answer: b perform a basic operation, such as moving a byte
Explanation: The internal registers are present on- of memory from a location to another location in
chip. They are therefore present inside the CPU. the computer.
L1 cache is also present on-chip inside the CPU.
3. The operation that does not involves clock
9. MAR stands for ___________ cycles is ____________
a) Memory address register a) Installation of a device
b) Main address register b) Execute
c) Main accessible register c) Fetch
d) Memory accessible register d) Decode
View Answer View Answer
Answer: a Answer: a
Explanation: The MAR stands for memory address Explanation: Normally, several clock cycles are
register. It holds the address of the active memory required to fetch, execute and decode a particular
location. program. Installation of a device is done by the
system on its own.
10. If M denotes the number of memory locations
and N denotes the word size, then an expression 4. The number of clock cycles per second is
that denotes the storage capacity is referred as ______
______________ a) Clock speed
a) M*N b) Clock frequency
b) M+N c) Clock rate
c) 2M+N d) Clock timing
d) 2M-N View Answer
View Answer
Answer: a
Answer: a Explanation: The number of clock cycles per
Explanation: Storage capacity is the product of a second is the clock speed. It is generally measured
number of memory locations that is the number of in gigahertz(109 cycles/sec) or megahertz (106
words and the word size or the number of bits cycles/sec).
stored per location. Storage capacity should be as
large as possible. 5. CISC stands for ___________
a) Complex Information Sensed CPU
1. Computer has a built-in system clock that emits b) Complex Instruction Set Computer
millions of regularly spaced electric pulses per c) Complex Intelligence Sensed CPU
_____ called clock cycles. d) Complex Instruction Set CPU
a) second View Answer
b) millisecond
c) microsecond Answer: b
d) minute Explanation: CISC is a large instruction set
View Answer computer. It has variable length instructions. It also
has a variety of addressing modes.
Answer: a
Explanation: The regularly spaced electric pulses 6. Which of the following processor has a fixed
per second are referred to as the clock cycles. All length of instructions?
a) CISC
39
b) RISC c) 8 bits
c) EPIC d) 32 bits
d) Multi-core View Answer
View Answer
Answer: c
Answer: b Explanation: The word length which is the size of a
Explanation: The RISC which stands for Reduced word is generally 8 bits in a personal computer.
Instruction set computer has a fixed length of Word Size is generally the number of bits that can
instructions. It has a small instruction set. Also has be processed in one go by the CPU.
reduced references to memory to retrieve operands.
1. ________________ is also called auxiliary
7. Processor which is complex and expensive to storage.
produce _________ a) secondary memory
a) RISC b) tertiary memory
b) EPIC c) primary memory
c) CISC d) cache memory
d) multi-core View Answer
View Answer
Answer: a
Answer: c Explanation: The secondary memory which allows
Explanation: CISC stands for complex instruction us to store a large amount of data is often referred
set computer. It is mostly used in personal to as the auxiliary memory. It generally stores large
computers. It has a large instruction set and a amount of data on a permanent basis.
variable length of instructions.
2. Secondary storage virtually has an unlimited
8. The architecture that uses a tighter coupling capacity because the cost per bit is very low.
between the compiler and the processor. a) True
a) EPIC b) False
b) Multi-core View Answer
c) RISC
d) CISC Answer: a
View Answer Explanation: The statement is true as secondary
storage devices can store large amounts of data
Answer: a temporarily. It is used to overcome the limitations
Explanation: EPIC stands for Explicitly parallel of primary storage.
instruction computing. It has a tighter coupling
between the compiler and the processor. It enables 3. Magnetic tape is a type of _________ access
the compiler to extract maximum parallelism in the device.
original code. a) Sequential
b) Direct access
9. HLDA stands for _______ c) Step
a) High level data d) Indirect
b) High level data acknowledgment View Answer
c) Hold Acknowledgement
d) Hold Data Answer: a
View Answer Explanation: Magnetic tapes are sequential access
devices. They are the secondary storage devices
Answer: c and are used to store large amounts of data. In
Explanation: The HOLD signal is given to the sequential access, data can be retrieved in the same
CPU whenever an interrupt is to be served. If the sequence in which it is stored.
CPU is ready to give the control of the bus, it gives
the HLDA command which is Hold 4. The magnetic tape is generally a plastic ribbon
Acknowledgement. coated with ______
a) Magnesium oxide
10. Word length of a personal computer b) Chromium dioxide
___________ c) Zinc oxide
a) 64bits d) Copper oxide
b) 16 bits View Answer
40
Answer: b d) Data mode
Explanation: Plastic ribbon is coated with a View Answer
magnetizable recording material. Iron oxide and
chromium dioxide is generally used in magnetic Answer: a
tapes. Data are recorded on the tape in the form of Explanation: Transfer rate measurement unit is
tiny invisible dots. bytes/second(bps). Value depends on the data
recording density and the speed with which the
5. The dots on the magnetic tape represent tape travels under the read/write head.
________
a) Binary digits 9. The typical value of data transfer rate is
b) Decimal digits __________
c) Hex digits a) 7.7 MB/s
d) Oct digits b) 6.6 MB/s
View Answer c) 5.5 MB/s
d) 10 MB/s
Answer: a View Answer
Explanation: The data recorded on the tape is the
form of tiny invisible magnetized and non- Answer: a
magnetized spots (representing 1s and 0s) on its Explanation: Data transfer rate is defined as the
coated surface. number of characters per second that can be
transmitted to the memory from tape. The typical
6. Which of the following is the correct value is 7.7 megabytes per second.
representation for a storage capacity of a tape?
a) Data recording density = Storage capacity 10. Tape drive is connected to and controlled by
b) Length = Storage capacity _______
c) Storage capacity= Length * data recording a) Interpreter
density b) Tape controller
d) Storage capacity= Length + data recording c) CPU
density d) Processor
View Answer View Answer
Answer: c Answer: b
Explanation: Storage capacity is nothing but the Explanation: The tape drive is connected to and
product of length and the data recording density. controlled by a tape controller that interprets the
Magnetic tape is commonly used sequential-access commands for operating the tape drive. Certain
secondary device. Data recording density is commonly used commands are read, write, erase
measured in bytes per inch. tape, etc.
Answer: c Answer: b
Explanation: Data recording density is the amount Explanation: The magnetic tape ribbon is used for
of data that can be stored on a given length of the the same. It has read/write heads for
tape. It is measured in bytes per inch. Bytes per reading/writing of data on the tape. When
inch=bpi. processing is complete, the tape is removed from
the tape drive for off-line storage.
8. The number of characters/second that can be
transmitted to the memory from the tape is denoted 2. Magnetic disk is a sequential access device.
by the term. a) True
a) Data transfer rate b) False
b) Transmission mode View Answer
c) Transmission rate
41
Answer: b Answer: a
Explanation: It is a direct access secondary storage Explanation: Disk address represents the physical
device. In case of direct access devices, the storage location of the record on the disk. It is comprised
location may be selected and accessed at random. of the sector number, track number, and surface
number (when double-sided disks are used).
3. The disk’s surface is divided into a number of
invisible concentric circles called: 7. What does CHS stand for?
a) Drives a) Cylinder-high-sector
b) Tracks b) Concentric-head-sector
c) Slits c) Cylinder-head-sector
d) References d) Concentric-high-sector
View Answer View Answer
Answer: b Answer: c
Explanation: The concentric circles are called as Explanation: CHS stands for cylinder-head-sector.
tracks. The tracks are numbered consecutively The scheme is called CHS addressing. The same is
from outermost to innermost starting from zero. also referred to as disk geometry.
The number of tracks on a disk may be as few as
40 on small-capacity disks to several thousand on 8. The interval between the instant a computer
large capacity disks. makes a request for the transfer of data from a disk
system to the primary storage and the instance this
4. The number of sectors per track on a magnetic operation is completed is called _________
disk ________ a) Disk arrival time
a) less than 5 b) Disk access time
b) 10 or more c) Drive utilization time
c) 8 or more d) Disk utilization time
d) less than 7 View Answer
View Answer
Answer: b
Answer: c Explanation: The interval is referred to as the disk
Explanation: Each track of a disk is subdivided arrival time. It depends on several parameters.
into sectors. There are 8 or more sectors per track. Generally, a computer makes a request and the
Disk drives are designed to read/write only whole operation is served.
sectors at a time.
9. Disk access time does not depends on which of
5. Generally there are __________bytes in a the following factors __________
sector. a) Seek time
a) 64 b) Latency
b) 128 c) Transfer rate
c) 256 d) Arrival rate
d) 512 View Answer
View Answer
Answer: d
Answer: d Explanation: The disk access time depends on the
Explanation: Each track of a disc is divided into seek time, latency and transfer rate. Wherein, seek
sectors. A sector typically contains 512 bytes. Disk time is the time required to position the read/write
drives are designed to read/write only whole head over the desired track.
sectors at a time.
10. The time required to spin the desired sector
6. Which of the following is not a part of disk under the read/write head, once the read/write head
address? is positioned on the desired track.
a) Sector size a) Seek time
b) Sector number b) Arrival rate
c) Track number c) Latency
d) Surface number d) Transfer rate
View Answer View Answer
42
Answer: c Answer: a
Explanation: It is called latency. It is one of the Explanation: The storage capacity is given by the
factors on which the disk access time depends. formula in option a. The most popular disk uses a
Disk access time is the interval between the instant disk of 5.25 inch diameter with a storage capacity
a request is made and the instance operation is of around 650 megabytes.
completed.
5. Rotation of the disk must vary __________
1. A ____________ disk consists of a circular with the radius of the disk.
disk, which is coated with a thin metal or some a) directly
other material that is highly reflective. b) inversely
a) magnetic c) concurrently
b) optical d) accordingly
c) compact View Answer
d) hard
View Answer Answer: b
Explanation: The rotation speed is inversely
Answer: b proportional to the radius of the disk.
Explanation: Optical disks are highly reflective. Optical drives use a constant linear velocity
They can be used to store extremely large amounts encoding scheme often referred to as the CLV
of data in a limited space. scheme.
2. Optical disks are proved to be a promising 6. Which of the following correctly represents the
random access medium for high capacity track pattern of an optical disk ?
secondary storage.
a) True
b) False
View Answer
Answer: a
Explanation: Optical disks can store large amounts a)
of data. The storage capacity depends on the
sectors and the number of bytes.
Answer: c
Explanation: Laser beam technology is used in
optical disks for recording or reading of data on the c)
disk.
It is sometimes called the laser disk/optical laser
disk due to the use of laser beam technology.
43
7. The tracks are divided into sectors whose size 1. Winchester disks are a type of _______
_______ a) optical disks
a) remains the same b) magnetic disks
b) keeps increasing c) compact disks
c) keeps decreasing d) magnetic drives
d) remains uneven View Answer
View Answer
Answer: b
Answer: a Explanation: The regularly spaced electric pulses
Explanation: The tracks in an optical disk are per second are referred to as the clock cycles. All
divided into equal size sectors. Optical disk has the jobs performed by the processor are on the
one long spiral track, which starts at the outer edge basis of clock cycles.
and spirals inward to the center. Each sector is of
the same length regardless of whether it is located 2. Bernoulli disks are a type of magnetic floppy
near or away from the disk’s center. disks.
a) True
8. CLV stands for, in terms of rotation of the b) False
optical disk ___ View Answer
a) Concurrent lines value
b) Constant Linear velocity Answer: b
c) constant linear value Explanation: Bernoulli disks are a type of magnetic
d) concurrent linear velocity hard disks and not floppy disks. They are also
View Answer called as zip disks. It uses a single hard disk platter
encased in a plastic cartidge.
Answer: a
Explanation: It stands for constant linear velocity. 3. A plug and play storage device that simply
The optical disk uses the CLV encoding scheme. plugs in the port of a computer is __________
Rotation speed depends on the radius of the disk. a) Flash drive
b) Compact disk
9. The range of access times of optical disks is c) Hard disk
generally ______ d) CD
a) 100 to 300 milliseconds View Answer
b) 10 to 30 milliseconds
c) 200 to 400 milliseconds Answer: a
d) 20 to 40 milliseconds Explanation: A flash drive often called as a pen
View Answer drive enables easy transport of data from one
computer to another. It comes in various shapes
Answer: a and sizes and may have different added features.
Explanation: The access times of optical disks are
typically in the range of 100 to 300 milliseconds 4. What does USB stand for?
and that of hard disks are in the range of 10 to 30 a) Universal Signal Board
milliseconds. b) Universal Signal Bus
c) Universal Serial Bus
10. Which of the following is not a type of optical d) Universal Serial Board
disk? View Answer
a) DVD
b) CD Answer: c
c) WORM Explanation: USB stands for universal serial bus.
d) Winchester A flash drive simply plugs in the USB port of a
View Answer computer.
Answer: b Answer: d
Explanation: RAID is Redundant array of Explanation: Flash drives are a type of memory
inexpensive disks. It is an array of disks which can storage devices. It is a relatively newer type of
store data bits. secondary storage device which enables easy
transfer of data from one computer to another.
7. A set of hard disk drives with a controller
mounted in a single box, forming a single large 1. These devices provide a means of
storage unit is ____________ communication between a computer and outer
a) Disk array world.
b) Drives a) I/O
c) Compact drives b) Storage
d) Multi-cores c) Compact
View Answer d) Drivers
View Answer
Answer: a
Explanation: The answer is disk array. It is Answer: a
commonly known as RAID. As a secondary Explanation: The I/O i.e. the input/output devices
storage device, provides enhanced performance, provide a means of communication between the
enhanced storage capacity and reliability. computer and the outer world. They are often
referred to as the peripheral devices sometimes.
8. The process in which a file is partitioned into
smaller parts and different parts are stored in 2. The I/O devices are sometimes called the
different disks is ____________ peripheral devices because they surround the CPU
a) RAID and memory of the computer system.
b) Mirroring a) True
c) Stripping b) False
d) RAID classification View Answer
View Answer
Answer: a
Answer: c Explanation: The statement is true. The input
Explanation: Enhanced reliability is achieved by devices are used to enter data from the outside
using techniques like mirroring and stripping in world into primary storage. The output devices
case of disk arrays. Stripping is the division of a supply results of processing from primary storage
large file into smaller parts and then storing them to users.
on different disks.
3. Identify the blank space in the diagram.
9. Which of the following uses multiple hard disk
platters mounted on a single central shift?
a) Disk drives
b) Hard disks
c) Disk packs a) Processor
d) Compact disks b) Memory
View Answer c) CPU
45
d) Storage d) Kiaks
View Answer View Answer
Answer: c Answer: a
Explanation: Firstly, the input is given to the input Explanation: The term information kiosks are used
device, then the data in coded in internal form and for the same. Touch screens are used the most
is sent to the CPU. Further, the processed data is preferred human-computer interface used in
sent to the output device and the result is obtained. information kiosks.
4. What does GUI stand for? 8. Which are the input devices that enable direct
a) Graphical User Instruction data entry into a computer system from source
b) Ground User Interface documents?
c) General User Instruction a) Data Scanning devices
d) Graphical User Interface b) Data retrieving devices
View Answer c) Data acquiring devices
d) System Access devices
Answer: d View Answer
Explanation: GUI stands for a graphical user
interface. Graphical user interface basically Answer: a
provides a set of graphical elements on the screen Explanation: They are referred to as data scanning
to the users. Commonly used for point-and-draw devices. They eliminate the need to key in text data
devices. into the computer. It demands the high quality of
input documents.
5. Which of the following is not a point-and-draw
device? 9. Which of the following is a type of image
a) Keypad scanner?
b) Trackball a) Flat-held
c) Touch screen b) Hand-led
d) Mouse c) Flat-bed
View Answer d) Compact
View Answer
Answer: a
Explanation: All except the keypad are point-and- Answer: c
draw devices. They are used to rapidly point to and Explanation: Image scanners are the input devices
select a graphic icon or menu item from multiple that translate the paper documents into an
options displayed on the GUI of a screen. electronic format for storage in a computer. Stored
image can be altered or manipulated with image-
6. A device used for video games, flight processing software.
simulators, training simulators and for controlling
industrial robots. 10. Which of the following is capable of
a) Mouse recognizing a pre-specified type of mark by pencil
b) Light pen or pen?
c) Joystick a) OMR
d) Keyboard b) Winchester
View Answer c) Bar code reader
d) Image Scanner
Answer: c View Answer
Explanation: Joystick is the device used for the
same. It is a point-and-draw device. It has a click Answer: a
button, a stick, a ball, a socket as well as a light Explanation: OMR stands for optical mark reader.
indicator. These are very useful for grading tests with
objective type questions or for any input data that
7. The unattended interactive information systems is of choice or selection nature.
such as automatic teller machine or ATM is called
as _________ 1. Input Devices that use a special ink that
a) Kiosks contains magnetizable particles of iron oxide are
b) Sioks ____
c) Cianto a) Optical disks
46
b) Magnetic disks d) Voice systems
c) MICR View Answer
d) Magnetic drives
View Answer Answer: c
Explanation: A speech synthesizer converts text
Answer: c information into spoken sentences. It is used for
Explanation: MICR reads data on cheques and reading out text information to blind people.
sorts them for distribution to other banks or for Allowing people to communicate effectively.
further processing. MICR stands for Magnetic-Ink-
Character Recognition. 6. Which of the following is not a part of a
digitizer?
2. MICR character set consists of only 2 digits 0 a) Digitizing tablet
and 1. b) Cursor
a) True c) Stick
b) False d) Stylus
View Answer View Answer
Answer: b Answer: c
Explanation: The statement is false. It consists of Explanation: A digitizer consists of a digitizing
numerals from 0 to 9 and 4 special characters. It tablet, a stylus in the form of a cross-hair cursor. A
supports only 14 symbols. digitizer is used in the areas of GIS.
3. A printer that prints one line at a time and has a 7. Which is the device used for converting maps,
predefined set of characters is called _______ pictures and drawings into digital form for storage
a) Laser in computers?
b) Drum a) Digitizer
c) Inkjet b) Scanner
d) Impact c) Image Scanner
View Answer d) MICR
View Answer
Answer: b
Explanation: The drum printers print one line at a Answer: a
time. They have a cylindrical drum with characters Explanation: A digitizer serves the purpose given
embossed on its surface in the form of circular in the question. Digitizers are generally used in the
bands. area of Computer Aided Design by architects and
engineers to design cars, buildings, etc.
4. Which of the following is a name of plotter as
well as a printer? 8. The process in which a file is partitioned into
a) Flatbed smaller parts and different parts are stored in
b) Laser different disks is called _________
c) Drum a) RAID
d) Impact b) Mirroring
View Answer c) Stripping
d) RAID classification
Answer: c View Answer
Explanation: Drum is the name of a plotter as well
as a printer. Drum printers have a predefined set of Answer: c
characters and print one line at a time. Drum Explanation: Enhanced reliability is achieved by
plotters is an ideal device for architects and others using techniques like mirroring and stripping in
who need to generate high-precision hard copy case of disk arrays. Stripping is the division of a
graphics output of widely varying sizes. large file into smaller parts and then storing them
on different disks.
5. Name the device that converts text information
into spoken sentences. 9. Which of the following Printers have a speed in
a) Speech Sensors the range of 40-300 characters per second?
b) Compact convertors a) Inkjet
c) Speech Synthesizers b) Laser
c) Dot matrix
47
d) Drum Answer: c
View Answer Explanation: A digitizer converts analog signals to
digital images. Due to this, it is compatible with
Answer: a both scanners and mice.
Explanation: The inkjet printers are non-impact
printers. Hence, they cannot produce multiple 4. Which of the following term is used when
copies of a document in a single printing. Can be different forms of information like text, sound is
both monochrome and color. converted to a binary code?
a) Digitalization
10. Which of the following is a temporary output? b) Digitization
a) Hard copy c) Binarization
b) Soft copy d) Digization
c) Duplicate copy View Answer
d) On paper
View Answer Answer: b
Explanation: Digitization is the term that is used. It
Answer: b converts the input which is in the form of an
Explanation: There are only two types of outputs: image, sound or text into a binary format and
hard copy and soft copy. Soft copy output is further makes it easier for the computer to
temporary and vanishes after use. Hard copy understand and process.
output is permanent in nature and can be kept in
paper files, etc. 5. Which of the following isn’t a phase of
digitization?
1. Input Devices that use a special ink that is used a) Discretization
for converting pictures, maps and drawings into b) Quantization
digital format. c) Discretization + Quantization
a) Digitizers d) Analog conversion
b) Digital pens View Answer
c) Light Pens
d) MICR Answer: d
View Answer Explanation: There is no phase called analog
conversion. Discretization means the reading of an
Answer: a analog signal. Quantization is the rounding of
Explanation: The digitizer is used for digitizing samples to numbers.
pictures, maps and drawings into digital form for
storage in computers. It is used in CAD by 6. Which of the following is not a part of a
architects and engineers. digitizer?
a) Digitizing tablet
2. GIS stands for Graphical Information System. b) Cursor
a) True c) Stick
b) False d) Stylus
View Answer View Answer
Answer: b Answer: c
Explanation: The statement is false. GIS stands for Explanation: A digitizer consists of a digitizing
Geographical Information System. Digitizers are tablet, a stylus in the form of a cross-hair cursor. A
used in the area of GIS for digitizing maps digitizer is used in the areas of Geographical
available in paper form. Information Systems.
3. A digitizer converts __________ input into 7. The process of making digital information work
digital input. for you is called ___________
a) Laser a) Digitization
b) Digital b) Digital Transformation
c) Analog c) Digitalization
d) Complex d) Analogization
View Answer View Answer
48
Answer: c Answer: c
Explanation: The process of making digitized data Explanation: TTS stands for Text to speech. It is a
or information work for you is called digitalization. commonly used term with Speech Synthesis. Often
The conversion of analog signal to digital signal is called as text to speech synthesis.
called digitization. Digital signals are in the form
of 0s and 1s. 2. Text analysis is all about converting the input
text into a ‘speakable’ form.
8. What is the full form of FSM? a) True
a) Field Service Management b) False
b) Frequent Service Management View Answer
c) Final Service Management
d) Field Service Master Answer: a
View Answer Explanation: The statement is true. This process
has two phases: firstly the text goes through
Answer: a analysis and then the result is used to generate a
Explanation: FSM is Field Service Management. speech signal.
FSM soft wares are used for making proper use of
the digitized information. Therefore, they are 3. A concept that contains rhythm of speech,
basically responsible for digitalization. stress patterns and intonation is ________
a) Text synthesis
9. Which of the following Techniques are used to b) Prosody
optimize field services? c) Speech Synthesis
a) AI d) Formant Synthesis
b) ML View Answer
c) CC
d) Reality tools Answer: b
View Answer Explanation: Prosody is the correct term. It
contains three main parts: the rhythm of speech,
Answer: a the stress patterns and the intonation. Intonation is
Explanation: AI or Artificial Intelligence is a term used for the rise and fall when a person
optimizing the field services. It ensures that the speaks.
fastest service is performed by the person in
charge. Artificial intelligence is nothing but 4. Which of the following does not come under
machine intelligence. text analysis?
a) Document Structure Detection
10. Obtaining services from a rapidly evolving b) Speech Synthesis
group of internet users __________ c) Prosonic Analysis
a) Outsourcing d) Prosodic Analysis
b) Crowd Sourcing View Answer
c) Human collaboration
d) Human Computation Answer: c
View Answer Explanation: For TTS, the main concepts involved
are :
Answer: b 01) Text Analysis
Explanation: Crowd sourcing is the appropriate 02) Phonetic Analysis
term which is to be used. Though human 03) Prosodic Analysis
collaboration, outsourcing and computation mean 04) Speech Synthesis.
the same. Crowd Sourcing means collaboration of
a group of internet users for the same purpose. 5. What is the medium to convert text information
into spoken sentences?
1. What is the full form of TTS? a) Speech Sensors
a) Typically Typed Speech b) Compact convertors
b) Typographic Text Speech c) Speech Synthesizers
c) Text to Speech d) Voice systems
d) Typography to speech View Answer
View Answer
Answer: c
Explanation: A speech synthesizer converts text
49
information into spoken sentences. It is used for Answer: a
reading out text information to blind people. This Explanation: IPA(International phonetic
allows people to communicate effectively. association) contains some symbols that are
complicated and cannot be found in typewriters.
6. Pitch and duration attachment comes under SAMPA is an example of alphabets which are
_____ compatible with computers and based on ASCII
a) Prosody characters.
b) Phonetic Analysis
c) Speech Synthesis 10. A speech synthesis model which tries to
d) Text Analysis model the human speech production mechanisms is
View Answer _________
a) Articulatory Synthesis
Answer: a b) Formant Synthesis
Explanation: Pitch and duration attachment comes c) Summative Synthesis
under Prosodic analysis. Other three terms are also d) Concatenative Synthesis
used when we consider the text to speech View Answer
conversion.
Answer: a
7. Which of the following is not a speech Explanation: Articulative Synthesis tries to model
synthesis method? the human speech production mechanisms. It is by
a) Formant far the most complicated speech synthesis method.
b) Summative Its implementation is difficult and therefore is not
c) Articulator widely used.
d) Concatenative
View Answer 1. The physical devices of a computer :
a) Software
Answer: b b) Package
Explanation: Summative isn’t a Speech Synthesis c) Hardware
method. Formant Synthesis is the oldest method. d) System Software
Concatenative is the cut-and-paste method. View Answer
Whereas, Articulative tries to model the human
speech production mechanisms. Answer: c
Explanation: Hardware refers to the physical
8. Speech Synthesis method based on the devices of a computer system. Software refers to a
generation of periodic and non-periodic signals is collection of programs. A program is a sequence of
____________ instructions.
a) Formant
b) Summative 2. Software Package is a group of programs that
c) Conactenative solve multiple problems.
d) Articulative a) True
View Answer b) False
View Answer
Answer: a
Explanation: Formant synthesis is based on the Answer: b
same. It is based on the well known source-filter Explanation: The statement is false. The software
model whose idea is to generate periodic and non- package is a group of programs that solve a
periodic signals. specific problem or perform a specific type of job.
50
Answer: d solving a specific problem. System software is
Explanation: Upgrades is the right term to be used. designed for controlling the operations of a
Upgrades are installed to renew or implement a computer system.
new feature. Except for upgrades, hardware is
normally one-time expense. 8. Assembler is used as a translator for?
a) Low level language
4. Which of the following is designed to control b) High Level Language
the operations of a computer? c) COBOL
a) Application Software d) C
b) System Software View Answer
c) Utility Software
d) User Answer: a
View Answer Explanation: Assembler is used in case of low
level languages. It is generally used to make the
Answer: b binary code into an understandable format.
Explanation: Software is basically classified into Interpreter is used with the high level languages
two: System and application. System Software is similarly.
designed to control the operations and extend the
processing capability of a computer system. 9. What do you call a program in execution?
a) Command
5. Which of the following is not an example of b) Process
system software? c) Task
a) Language Translator d) Instruction
b) Utility Software View Answer
c) Communication Software
d) Word Processors Answer: b
View Answer Explanation: Option Process is correct. A program
is a set of instructions. A program in execution is
Answer: d called a process.
Explanation: A system software is responsible for
controlling the operations of a computer system. 10. Which of the following is not a process state?
Word Processor is an application software since it a) Terminated
is specific to its purpose. b) Running
c) Blocked
6. A person who designs the programs in a d) Execution
software package is called : View Answer
a) User
b) Software Manager Answer: c
c) System Developer Explanation: There is no blocked state in a process
d) System Programmer model. The different states are ready, running,
View Answer executing, waiting and terminated.
52
software. An application software is a set of b) RAM
instructions designed to serve a particular purpose. c) External
d) ROM
1. The software substituted for hardware and View Answer
stored in ROM.
a) Synchronous Software Answer: d
b) Package Software Explanation: Firmware is stored in ROM which is
c) Firmware the read only memory. Firmware basically acts as a
d) Middleware link between the hardware and the system.
View Answer
6. DNS stands for?
Answer: c a) Domain Name System
Explanation: Software refers to a collection of b) Direct Name System
programs. Firm wares act as a link between the c) Direct Network System
hardware and the system. It is stored in read only d) Domain Network System
memory. View Answer
56
5. Which of the following is incorrect? Answer: a
Algorithms can be represented: Explanation: Linear arrays are the 1-Dimensional
a) as pseudo codes arrays wherein only one row is present and the
b) as syntax items are inserted.
c) as programs
d) as flowcharts 10. A data structure that follows the FIFO
View Answer principle.
a) Queue
Answer: b b) LL
Explanation: Representation of algorithms: c) Stack
-As programs d) Union
-As flowcharts View Answer
-As pseudo codes.
Answer: c
6. When an algorithm is written in the form of a Explanation: The answer is Stack. A stack follows
programming language, it becomes a _________ the FIFO principle. FIFO stands for First In First
a) Flowchart Out.
b) Program
c) Pseudo code 1. The symbol denotes _______
d) Syntax
View Answer
Answer: b a) I/O
Explanation: An algorithm becomes a program b) Flow
when it is written in the form of a programming c) Terminal
language. Thus, any program is an algorithm. d) Decision
View Answer
7. Any algorithm is a program.
a) True Answer: c
b) False Explanation: The symbol denotes a terminal. It is
View Answer used for indication of start and stop nodes of a
program.
Answer: b
Explanation: The statement is false. An algorithm 2. In computer science, algorithm refers to a
is represented in the form of a programming pictorial representation of a flowchart.
language is called a program. Any program is an a) True
algorithm but the reverse is not true. b) False
View Answer
8. A system wherein items are added from one
and removed from the other end. Answer: b
a) Stack Explanation: The statement is false. The correct
b) Queue statement would be: In computer science,
c) Linked List flowchart refers to a pictorial representation of an
d) Array algorithm.
View Answer
3. The process of drawing a flowchart for an
Answer: b algorithm is called __________
Explanation: In a queue, the items are inserted a) Performance
from the rear end and deleted from the front end. b) Evaluation
c) Algorithmic Representation
d) Flowcharting
9. Another name for 1-D arrays.
View Answer
a) Linear arrays
b) Lists
c) Horizontal array Answer: d
d) Vertical array Explanation: It is called as flowcharting. A
View Answer flowchart is nothing but a pictorial representation
of an algorithm.
57
4. Actual instructions in flowcharting are c) Micro
represented in __________ d) Union
a) Circles View Answer
b) Boxes
c) Arrows Answer: c
d) Lines Explanation: A detailed flowchart or a flowchart
View Answer with more details is called as micro flowchart. It
represents all the components of the algorithm that
Answer: b is followed.
Explanation: The actual instructions are written in
boxes. Boxes are connected by using arrows to 9. Which of the following is not an advantage of a
indicate the exact flow of a flowchart and the order flowchart?
in which they are to be executed. a) Better communication
b) Efficient coding
5. The following box denotes? c) Systematic testing
d) Improper documentation
View Answer
Answer: d
a) Decision Explanation: Flowcharts provide a proper
b) Initiation documentation. It also provides systematic
c) Initialization debugging.
d) I/O
View Answer 10. A flowchart that outlines the main segments of
a program.
Answer: a a) Queue
Explanation: A diamond shape box denotes the b) Macro
decision making statements. It jumps to a truth c) Micro
value or a false value. d) Union
View Answer
6. A box that can represent two different
conditions. Answer: b
a) Rectangle Explanation: The answer is Macro Flowchart. A
b) Diamond macro flowchart outlines the important
c) Circle components of a program. It therefore shows fewer
d) Parallelogram details.
View Answer
1. A ______________ is diagram that depicts the
Answer: b flow of a program.
Explanation: A diamond shape box denotes either a a) Algorithm
truth value or a false value. It jumps onto two b) Hash Table
different statements following it via flow lines. c) Graph
d) Flowchart
7. There should be certain set standards on the View Answer
amount of details that should be provided in a
flowchart. Answer: d
a) True Explanation: A flowchart is a diagram that helps us
b) False determine the flow of the program. Other options
View Answer are irrelevant.
Answer: a
Explanation: The input/output operations are
represented by parallelograms. They generally are a) sequence
used to display messages during input and output b) case
part of a program. c) repetition
d) process
4. Which of the following is not a flowchart View Answer
structure?
a) Process Answer: c
b) Sequence Explanation: This is a repetition structure. The
c) Repetition action performed by a repetition structure must
d) Case eventually cause the loop to terminate. Otherwise,
View Answer an infinite loop is created.
Answer: c Answer: b
Explanation: The action performed by a repetition Explanation: This is a case structure. Certain cases
structure must eventually cause the loop to are given along with a default case in the case
terminate. Otherwise, an infinite loop is created. structure.
Answer: a
Explanation: Each design structure uses a
particular indentation pattern.
a) Decision
Indentation should be considered in the following
b) Input/Output
cases:
c) Process
Sequence
d) Module
Selection
View Answer
Loop.
Answer: a
5. The statement that tells the computer to get a
Explanation: The answer is decision. Conditions
value from an input device and store it in a
are given in this box and then the result is checked
memory location.
accordingly if the condition is true or false.
a) read
b) write
1. Keep the statement language ______________ c) READ
while writing a pseudo code. d) WRITE
a) Dependent View Answer
b) Independent
c) Case sensitive
Answer: c
d) Capitalized
Explanation: The READ statement is used to take
View Answer
the input. READ being a keyword should be in
capital letters.
Answer: b
Explanation: The statement’s language should be
6. _____________ are identified by their
independent. Other rules are to write only one
addresses, we give them names (field names /
statement per line and end multiline structures.
variable names) using words.
a) Memory variables
2. Capitalize initial keyword – This is a rule while b) Memory Locations
writing a pseudo code. c) Memory Addresses
a) True d) Data variables
b) False View Answer
View Answer
Answer: b
Answer: a Explanation: Memory locations are identified by
Explanation: The statement is true. It is an their addresses, we give them names (field
important rule to capitalize the initial keyword names/variable names) using words descriptive to
while writing a pseudo code. us such as ctr as opposed to a location addresses
such as 19087.
3. Which of the following is not a keyword?
a) Read 7. ____________ begins with lower case letters.
b) Write a) Keywords
c) start b) Variables
d) endif c) Tokens
View Answer d) Functions
View Answer
Answer: c
Explanation: Start is not a Keyword. Other words Answer: b
like read, write, if, else, etc are keywords and Explanation: Variables begin with a lowercase.
convey a special meaning. They contain no spaces. They also involve the
consistent use of names.
4. ______________ is used to show hierarchy in a
pseudo code. 8. Another notation for exponentiation.
a) Indentation a) *
b) Curly Braces b) **
c) Round Brackets c) ***
60
d) *^ 3. A ________ is a directed graph that describes
View Answer the flow of execution control of the program.
a) Flowchart
Answer: b b) Flow graph
Explanation: Double asterisk sign is also used for c) Complexity curve
exponentiation. The general notation is ^ sign. d) Algorithm
View Answer
9. A symbol used for grouping.
a) () Answer: a
b) {} Explanation: A flowchart is a directed graph. It
c) []. simply describes the flow of execution control of
d) ” ” the program.
View Answer
4. A program should be ________
Answer: a a) Secure
Explanation: Parenthesis is used for grouping b) Sequential
while working with fields. There are other symbols c) Ordered
like *, +, -, **, etc. d) Simple
View Answer
10. A statement used to close the IF block.
a) ELSE Answer: b
b) ELSEIF Explanation: It is natural to write a program as a
c) END sequence of program structures such as sequences,
d) ENDIF choices and loops.
View Answer
5. The following is the syntax for:
Answer: d
Explanation: The answer is ENDIF. It is used to ____(condition)
close the IF block. ENDIF statement should be in action
line with the IF statement.
a) Else
1. Programming based on stepwise refinement b) Elif
process. c) If
a) Structural d) Switch
b) C programming View Answer
c) Procedural
d) Fine Answer: c
View Answer Explanation: The if statement follows that syntax.
If is a choice statement. Else is also a choice
Answer: a statement.
Explanation: Structured programming is based on
the stepwise refinement process-a method of 6. Which of the following is a loop statement?
problem decomposition common to all engineering a) IF
disciplines and the physical, chemical, and b) ELSE
biological sciences. c) WHILE
d) DO
2. Top-down approach is followed in structural View Answer
programming.
a) True Answer: c
b) False Explanation: WHILE is a loop statement.
View Answer Syntax : while(condition)
action.
Answer: a
Explanation: The statement is true. Structural 7. What is the correct syntax of for statement?
programming follows the top – down approach. a) for(initialization;condition;update)
Each module is further divided into sub modules. b) for(initialization,condition,update)
c) for(condition;initialization;update)
61
d) for(initialization;condition;) particular computer and used directly by the
View Answer computer is machine language.
Answer: a Answer: a
Explanation: Data coverage is an approach that Explanation: The processor supports the following
designs test cases by looking at the allowable data data sizes:
values. Code coverage is an approach that designs • Word: a 2-byte data item
test cases by looking at the code. • Double word: a 4-byte (32 bit) data item, etc.
10. The rules that give meaning to the 4. A direct reference of specific location.
instructions. a) Segment Address
a) Semantics b) Absolute Address
b) Syntax c) Offset
c) Code d) Memory Address
d) Cases View Answer
View Answer
63
Answer: b Answer: d
Explanation: There are two kinds of memory Explanation: The processor has some internal
addresses: memory storage locations, known as registers. The
• An absolute address – a direct reference of registers stores data elements for processing
specific location. without having to access memory.
• The segment address (or offset) – starting address
of a memory segment with the offset value. 9. To locate the exact location of data in memory,
we need the starting address of the segment, which
5. A Borland Turbo Assembler. is found in the DS register and an offset value. This
a) nasm offset value is also called?
b) tasm a) Effective Address
c) gas b) Direct offset address
d) asm c) Memory address
View Answer d) General Address
View Answer
Answer: b
Explanation: Tasm is the borland turbo assembler. Answer: a
Nasm is used with linux generally. Gas is the GNU Explanation: When operands are specified in
assembler. memory addressing mode, direct access to main
memory, usually to the data segment, is required.
6. The instructions that tell the assembler what to This way of addressing results in slower processing
do. of data. To get the exact location of data in
a) Executable instructions memory, we need segment start address, which is
b) Pseudo-ops found in the DS register and an offset value. This
c) Logical instructions offset value is called an effective address.
d) Macros
View Answer 10. Each byte of character is stored as its ASCII
value in _______
Answer: a a) Hexadecimal
Explanation: The executable instructions or simple b) Binary
instructions tell the processor what to do. Each c) Octal
instruction consists of an operation code (opcode). d) Decimal
Each executable instruction generates one machine View Answer
language instruction.
Answer: a
7. The segment containing data values passed to Explanation: Assembly language deals with
functions and procedures within the program. hexadecimal values only. Each decimal value is
a) Code automatically converted to its 16-bit binary
b) Data equivalent and stored as a hexadecimal number.
c) Stack
d) System 1. Prolog comes under ___________
View Answer a) Logic Programming
b) Procedural Programming
Answer: c c) OOP
Explanation: The stack segment contains data d) Functional
values passed to functions and procedures within View Answer
the program. The code segment defines an area in
memory that stores the instruction codes. Answer: a
Explanation: Prolog stands for Programming in
8. To speed up the processor operations, the Logic. The options mentioned are the four
processor includes some internal memory storage categories of programming. Prolog is a type of
locations, called ___________ logic programming.
a) Drives
b) Memory 2. Java is procedural programming.
c) Units a) True
d) Registers b) False
View Answer View Answer
64
Answer: b 7. JIT stands for?
Explanation: The statement is false. Java is a type a) Just in time
of object oriented programming language. It b) Jump in time
involves solving real-life problems as well. c) Jump in text
d) Jump in terms
3. A program that can execute high-level language View Answer
programs.
a) Compiler Answer: a
b) Interpreter Explanation: JIT stands for Just in time. JVMs
c) Sensor actually compile each bytecode instruction to
d) Circuitry native code the first time it is used.
View Answer
8. JVM stands for?
Answer: b a) Java virtual machine
Explanation: Interpreter is a program that can b) Java visual machine
execute high-level language programs “directly,” c) JRE virtual machine
without first being translated into machine d) JRE visual machine
language. View Answer
67
d) Alphanumeric sign 4. Which of the following is a common testing
View Answer conducted by the developers?
a) Unit testing
Answer: b b) Entry testing
Explanation: It denotes a sign in a picture clause. c) Phrase testing
Picture clause values usually use 9, X, V, S, A. d) Code testing
View Answer
10. _____________ denotes the format in which
data is stored in memory. Answer: a
a) kind Explanation: Unit testing is commonly performed
b) attach by the developers. It is difficult to perform testing
c) select at any time during its cycle. An early start
d) usage decreases the time and cost.
View Answer
5. SDLC stands for ________
Answer: d a) Software development life cycle
Explanation: Usage denotes the format in which b) System development life cycle
data is stored in the memory. Normally the phrase c) Software design life cycle
usage is omitted in COBOL. d) System design life cycle
View Answer
1. Another name for white-box testing is
___________ Answer: a
a) Control testing Explanation: It stands for Software development
b) Graybox life cycle. In SDLC, the testing can be started from
c) Glassbox the software gathering requirement phase. And can
d) Black box be carried over till the deployment phase.
View Answer
6. Which of the following is a myth in testing?
Answer: c a) Tester can find bugs
Explanation: Sometimes it is called the glass box b) Any user can test software
testing. It is a type of testing in which the internal c) Missed defects are not due to testers
structure of any application is tested and examined. d) Complete testing is not possible
View Answer
2. Test cases ensure that all the statements are
executed atleast once. Answer: b
a) True Explanation: Any user can test software is a myth.
b) False Anyone cannot test the software. A person who has
View Answer no knowledge cannot test the software.
7. Which of the following should describe the 1. Maintenance and review add to the useful life
technical terms used in the document? of the system but can consume large amounts of
a) glossary __________
b) index a) Documents
c) user requirements b) Soft wares
d) system architecture c) Devices
View Answer d) Resources
View Answer
Answer: a
Explanation: Glossary should describe the Answer: d
technical terms used in the document. In this, the Explanation: They consume a large amount of
writer shouldn’t make assumptions about the resources. They can benefit from the methods and
experience and expertise of the reader. project management techniques though which are
applied to the systems development.
8. The services provided for the user are described
in which section? 2. File and database contains the frequency
a) System requirements component.
b) User requirements a) True
c) System models b) False
d) Appendices View Answer
View Answer
Answer: b
Answer: b Explanation: The statement is false. Frequency is a
Explanation: The services provided by the software part of output design. File design contains
for the user are described in this section. The non- capabilities and organization.
functional requirements should also be described in
this section. 3. This is not a part of the signing on the
procedure.
9. ______________ architecture provides a high- a) Identification
level overview of the anticipated system b) Verification
architecture. c) Execution
a) System d) Authorization
b) User View Answer
c) Test
d) Software Answer: c
View Answer Explanation: Signing on is a part of special system
design considerations. It does not involve a step of
Answer: a execution. It involves identification, verification
Explanation: System architecture shows the and authorization.
description and distribution functions across
system modules. Architectural components that are 4. A __________ is a noted set of activities that
reused should be highlighted. are executed on the software in order to confirm its
behavior to certain set of inputs.
10. The graphical models showing the a) Process
relationships between the system and its b) Document
71
c) Use case d) V(G) = E + N – 2
d) Test case View Answer
View Answer
Answer: a
Answer: d Explanation: The option V(G) = E – N + 2 denotes
Explanation: A test case is basically a documented the correct expression. Here, E is the number of
set of activities that are carried out on the software flow graph edges. N is the number of flow graph
in order to confirm its functionality to certain given nodes.
inputs. Each test case would in turn have steps to
address how we can check a particular test 9. The probability of failure-free operation of a
condition is satisfied or not. software application in a specified environment for
a specified time.
5. A type of testing that is conducted at the a) Software Reliability
software interface. b) Software Quality
a) gray box c) Software availability
b) black box d) Software Safety
c) red box View Answer
d) white box
View Answer Answer: a
Explanation: The answer is software reliability. It
Answer: b is estimated using historical and development data.
Explanation: Black box testing is conducted at the
software interface. White box testing is predicted 10. SCM stands for __________
on close examination of procedural details. a) Software configuration monitoring
b) System configuration management
6. A simple notation for the representation of c) Software configuration management
control flow. d) System configuration monitoring
a) System flow View Answer
b) Flow graph
c) Flow program Answer: a
d) System program Explanation: Software configuration management
View Answer (SCM), also called change management, is a set of
activities designed to manage change by
Answer: b identifying the work products that are likely to
Explanation: The flow graph depicts logical change.
control flow. Each circle in a flow graph is called a
flow graph node, represents one or more 1. ______________ is done in the development
procedural statements. phase by the developers.
a) Deployment
7. A software metric that provides a quantitative b) Debugging
measure of the logical complexity of a program. c) Verification
a) Cyclomatic complexity d) Validation
b) Index matrix View Answer
c) Quantitative complexity
d) System complexity Answer: b
View Answer Explanation: Debugging is done in the
development phase by the developer. In
Answer: a development phase developer fixes the bug (i.e)
Explanation: The number of regions of the flow called debugging.
graph corresponds to the cyclomatic complexity.
All other options are invalid. 2. Testing is conducted by the developers in
testing phase.
8. An expression for the calculation of cyclomatic a) True
complexity. b) False
a) V(G) = E – N + 2 View Answer
b) V(G) = E + N + 2
c) V(G) = E – N – 2 Answer: b
Explanation: The statement is false. Testing is
72
conducted by the testers in testing phase. Testing is in an existing system to enhance, update, or
a process of finding the defects from a user upgrade its features is called system maintenance.
perspective(Black Box Testing). On an average, maintenance cost of a computerized
system is two to four times more than the initial
3. Process of evaluating a system to verify development cost.
whether or not it is meeting its objectives.
a) System Maintenance 7. _____________ Conducted at developer’s site.
b) System Evaluation a) Alpha Testing
c) System validation b) Beta Testing
d) System authorization c) Unit testing
View Answer d) System testing
View Answer
Answer: b
Explanation: Process of evaluating a system (after Answer: a
it is put in operation) to verify whether or not it is Explanation: Alpha testing is conducted at the
meeting its objectives is called as system developer’s site. It is conducted by a customer (end
evaluation. users) in developer’s presence before software
delivery.
4. A point not considered in system evaluation.
a) Process control 8. ___________ Conducted at customers’ site.
b) Performance evaluation a) Alpha Testing
c) User Satisfaction b) Beta Testing
d) Failure Rate c) Unit testing
View Answer d) System testing
View Answer
Answer: a
Explanation: Points considered for evaluating a Answer: b
system are: Explanation: Beta testing is conducted at the
-> Performance evaluation customer’s site. Generally, developer is not
-> Cost analysis present. Customer records all problems (defects)
-> Time analysis and reports it to developer.
-> User satisfaction
-> Ease of modification 9. The probability of failure-free operation of a
-> Failure rate. software application in a specified environment for
a specified time.
5. A type of testing that is conducted at the a) Software Reliability
software interface. b) Software Quality
a) gray box c) Software availability
b) black box d) Software Safety
c) red box View Answer
d) white box
View Answer Answer: a
Explanation: The answer is software reliability. It
Answer: b is estimated using historical and development data.
Explanation: Black box testing is conducted at the
software interface. White box testing is predicated 10. The probability that a software application is
on close examination of procedural details. operating according to requirements at a given
point in time.
6. Incorporating changes in an existing system to a) Software Reliability
enhance, update, or upgrade its features. b) Software Quality
a) Maintenance c) Software availability
b) Evaluation d) Software Safety
c) Deployment View Answer
d) Validation
View Answer Answer: c
Explanation: Software availability marks the
Answer: a proper functioning of the software at a given point
Explanation: The Process of incorporating changes
73
of time. Reliability, availability and safety are three c) Q
important factors. d) &
View Answer
1. A __________is a set of instructions which is
prepared to perform a specific assignment if Answer: a
executed by a computer. Explanation: Wait fraction of a processor is
a) Browser represented by w. It is also known as the processor
b) Internet wait ratio.
c) Program
d) Code 6. Processor wait ratio is given by ________
View Answer a) w=b/e+b
b) w=b/e-b
Answer: c c) #=b/e-b
Explanation: A set of meaningful instructions is d) #=b/e+b
called a program. A program is basically designed View Answer
to perform any function assigned to it.
Answer: b
2. A program is an active entity. Explanation: Processor wait ratio is represented by
a) True w. It is given by :
b) False w=b/b+e.
View Answer
7. What does ‘b’ represent in a processor wait
Answer: b ratio?
Explanation: The statement is false. A program is a) input ratio
not an active entity. It is completely passive. b) output ratio
c) average time
3. What is responsible for creating a process from d) average I/O time
a program? View Answer
a) OS
b) Web Answer: d
c) Internet Explanation: It represents the average I/O time.
d) Firewall Average execution time with single programming
View Answer is given by e.
75
9. A method used to temporarily release time for d) Simple
other threads. View Answer
a) yield()
b) set() Answer: a
c) release() Explanation: The secondary memory is the long
d) start() term store for programs and data while main
View Answer memory holds program and data currently in use.
This is a physical organization.
Answer: a
Explanation: We can use the yield() method to 4. Memory organization in which users write
temporarily release time for other threads. It is programs in modules with different characteristics.
static by default. a) Physical
b) Logical
10. A method used to force one thread to wait for c) Structural
another thread to finish. d) Simple
a) join() View Answer
b) connect()
c) combine() Answer: b
d) concat() Explanation: The answer is Logical. To handle
View Answer user programs properly, the operating system and
the hardware should support a basic form of
Answer: a module to provide protection and sharing.
Explanation: The answer is join(). We can use the
join() method to force one thread to wait for 5. An executing process must be loaded entirely in
another thread to finish. main memory. What kind of a memory
organization is this?
1. A task carried out by the OS and hardware to a) Physical
accommodate multiple processes in main memory. b) Logical
a) Memory control c) Structural
b) Memory management d) Simple
c) Memory sharing View Answer
d) Memory usage
View Answer Answer: d
Explanation: This is simple memory organisation.
Answer: b An executing process must be loaded entirely in
Explanation: Memory management is carried out main memory (if overlays are not used).
by the OS and hardware to accommodate multiple
processes in main memory. 6. FTP stands for?
a) File Text Protocol
2. An HTML file is a text file containing small b) File Transfer Protocol
markup tags. c) Firm Transfer Protocol
a) True d) File Transplant Protocol
b) False View Answer
View Answer
Answer: b
Answer: a Explanation: FTP stands for File Transfer Protocol.
Explanation: The statement is true. HTML stands It is a type of internet service use for the
for Hyper Text Markup Language. It is a text file transmission of files.
containing small markup tags.
7. A set of overlapping divisions in the main
3. Secondary memory is the long term store for memory are called _______
programs and data while main memory holds a) Partitions
program and data currently in use. What kind of an b) Divisions
organization is this? c) Blocks
a) Physical d) Modules
b) Logical View Answer
c) Structural
76
Answer: a 2. Logical Address space can be larger than
Explanation: Partition main memory into a set of physical address space.
non overlapping regions called partitions. a) True
Partitions can be of equal or unequal sizes. b) False
View Answer
8. Any program, no matter how small, occupies an
entire partition. This is called ____________ Answer: a
a) fragmentation Explanation: The statement is true. Since, a part of
b) prior fragmentation the program needs to be in memory for the process
c) internal fragmentation of execution, the logical space can therefore be
d) external fragmentation much larger than the physical address space.
View Answer
3. Virtual Memory can be implemented via
Answer: c __________
Explanation: It is called as internal fragmentation. a) Demand Paging
Main memory use is inefficient. Any program, no b) Logical paging
matter how small, occupies an entire partition. This c) Structural way
is called internal fragmentation. d) Simple division
View Answer
9. __________ is used to shift processes so they
are contiguous and all free memory is in one block. Answer: a
a) Fragmentation Explanation: Demand paging can implement
b) Compaction virtual memory. Another way is demand
c) External Fragmentation segmentation.
d) Division
View Answer 4. COW stands for?
a) Copy over write
Answer: b b) Convert over write
Explanation: Use compaction to shift processes so c) Count over write
they are contiguous and all free memory is in one d) Copy over write
block. View Answer
86
Answer: d 2. Transmission mode controls the direction of
Explanation: The answer is Instance. Instance is signal flow.
the actual content of the database at a particular a) True
point of time. b) False
View Answer
8. Which of the following is not an object-based
logical model? Answer: a
a) ER Explanation: The statement is true. The term
b) Network transmission mode defines the direction of flow of
c) Semantic information between two communication devices.
d) Functional It tells the direction of signal flow between two
View Answer devices.
92
d) Open Site Interdependence computer and could share its information
View Answer processing resources.
94
Answer: d d) Browsers
Explanation: Any computer that has access to the View Answer
web server is called the web client. Web server is
any computer that uses the HTTP protocol. Answer: d
Explanation: Browser is the answer. Browser is a
9. Allows the user to create and maintain a type of client and it is not a server. File, web and
personal list of favorite URL addresses. name are the types of servers.
a) Software
b) Web Servers 4. This determines the type of protocol to be used.
c) Web Browsers a) <scheme>
d) WWW b) <pathname>
View Answer c) <server name>
d) <server domain name>
Answer: c View Answer
Explanation: Web Browsers help the user to
maintain a personal favorite list of URLs. Also, Answer: a
allows the user to download information on various Explanation: The answer is <scheme>. In general,
formats. http is used. Others like file and ftp can also be
used.
10. URL stands for?
a) Uniform Resource Locator 5. The location of file is determined by ________
b) Uniform Research Locator a) <scheme>
c) Uniform Resource Link b) <pathname>
d) Uniform Research Link c) <server name>
View Answer d) <server domain name>
View Answer
Answer: a
Explanation: WWW specifies the URL of a Answer: b
website and allows the user to access information. Explanation: <pathname> tells the server where to
URL stands for Uniform Resource Locator. find the file name. It is an important part of the
URL format.
1. The web works on this model.
a) Intranet 6. Apache is a type of ________
b) Internet a) Transmission control program
c) Client-Server b) Web Server
d) Server c) Web Browser
View Answer d) DBMS
View Answer
Answer: c
Explanation: Web works on the client server Answer: b
model. Client and server operate on machines Explanation: Apache is a type of web server. It is
which are able to communicate through a network. an application which waits for client requests,
fetches requested documents from disk and
2. In the Client-server model, the client receives a transmits them to the client.
request from the server.
a) True 7. A small data file in the browser.
b) False a) Cookie
View Answer b) Web Server
c) FTP
Answer: b d) Database
Explanation: The statement is false. The server View Answer
receives a request from the client. It then performs
the requested work. Answer: a
Explanation: Cookie is a small data file in the
3. Which of the following is not a type of server? browser. Most browsers nowadays allow the user
a) File to decide if they want the cookies or not.
b) Web
c) Name
95
8. Any computer that can access the server is Answer: a
called? Explanation: The statement is true. HTML stands
a) Web Server for Hyper Text Markup Language. It is a text file
b) Web Browser containing small markup tags.
c) User
d) Web Client 3. Which of the following is not a type of
View Answer browser?
a) Netscape
Answer: d b) Web
Explanation: Any computer that has access to the c) IE
web server is called the web client. Web server is d) Mozilla
any computer that uses the HTTP protocol. View Answer
Answer: b Answer: a
Explanation: Animation is basically a form of Explanation: In 1843, William Horner, a British
pictorial presentation. It has become the most mathematician invented the zoetrope. A zoetrope
prominent feature of technology-based learning produces an illusion of movement from a rapid
environments. succession of static pictures.
7. In this type of cloud, the cloud is composed of 1. Which of the following is not a type of
multiple internal or external cloud. computer on the basis of operation?
107
a) Remote Answer: a
b) Hybrid Explanation: Super computers are used with
c) Analog complex applications like Global Weather
d) Digital Forecasting, Creating graphic images, engineering
View Answer design and testing, space exploration, etc.
109
9. PDAs are also called? identification was a prerequisite for Internet of
a) PCs Things.
b) Laptops
c) Tablets 4. Which of the following is not involved in
d) Handheld working of IoT?
View Answer a) RFID
b) Sensor
Answer: d c) Nano tech
Explanation: PDAs are also called as Personal d) Server
Digital Assistants. They are small and can be View Answer
carried anywhere.
Answer: d
10. ______computers are lower to mainframe Explanation: IoT works from RFID to Sensor, to
computers in terms of speed and storage capacity. Smart tech and then to Nano tech.
a) Mini
b) Super 5. Making the smaller and smaller things have the
c) Mainframes ability to connect and interact.
d) Hybrid a) Micro Tech
View Answer b) Smart tech
c) Nano tech
Answer: a d) RFID
Explanation: The answer is a. Mini computers are View Answer
compared to mainframe computers in terms of:
1. speed and, 2. storage capacity. Answer: c
Explanation: Nano Tech is the term used when
1. A network of physical objects or things smaller things are made to interact and
embedded with electronics or softwares. communicate. It is involved in the working of Iot
a) AI also.
b) ML
c) IOT 6. Wi-Fi stands for?
d) Internet a) Wireless fidelity
View Answer b) Wireless Flexibility
c) Wide Fidelity
Answer: c d) WAN Flexibility
Explanation: IoT is a network of physical objects View Answer
or things embedded with electronics or softwares.
Iot allows objects to be controlled remotely across Answer: a
existing network. Explanation: Wi-Fi stands for Wireless Fidelity. It
is widely used in both outdoor and indoor
2. RFID is a part of IoT. environments.
a) True
b) False 7. Diagnostics service for Cars.
View Answer a) MIPS
b) AutoBot
Answer: a c) IoT Assistant
Explanation: The statement is true. RFID is Radio d) IoT
frequency identification. Radio frequency View Answer
identification is a part of IoT.
Answer: b
3. RFID stands for? Explanation: Autobot is a diagnostics service for
a) Random frequency identification cars. This service is integrated with several web
b) Radio frequency identification services.
c) Random frequency information
d) Radio frequency information 8. The father of ioT.
View Answer a) Kevin Atrun
b) Kevin Atrhur
Answer: b c) Kevin Ashton
Explanation: Earlier, RFID or Radio frequency
110
d) Kevin Thomas 3. The first neural network computer.
View Answer a) RFD
b) SNARC
Answer: c c) AM
Explanation: Kevin Ashton is the father of IoT. He d) AN
believed IoT could turn the world into data. View Answer
9. Collect->Communicate->__________->Act Answer: b
a) Acknowledge Explanation: SNARC was the first neural network
b) Analyze computer. it was built by Minsky and Edmonds in
c) Examine 1956.
d) Rectify
View Answer 4. A hardware based system that has autonomy,
social ability and reactivity.
Answer: a a) AI
Explanation: The correct option is analyze. This b) Autonomous Agent
shows the lifecycle of IoT. c) Agency
Collect->Communicate->Analyze->Act. d) Behavior Engineering
View Answer
10. Several instructions execution simultaneously
in? Answer: b
a) processing Explanation: The answer is Autonomous Agent.
b) parallel processing Autonomous agent has autonomy i.e. ability to
c) serial processing operate without the direct intervention of humans
d) multitasking or others.
View Answer
5. A particular system that contains intelligent
Answer: b agents.
Explanation: In parallel processing, the several a) AI systems
instructions are executed simultaneously. Parallel b) Agency
processing system provides the concurrent data c) Autonomous systems
processing to increase the execution time. d) Company
View Answer
1. The technology that has the ability to interact
with the world. Answer: b
a) AI Explanation: It is called an agency. A particular
b) ML system consisting of intelligent agents like
c) IOT computers or robots that cooperate to find the
d) IT solution to a problem.
View Answer
6. A methodology used to develop behavior-based
Answer: a autonomous agents.
Explanation: AI which is artificial intelligence is a) Descriptors
the ability to interact with the world. It is the b) Behavior engineering
ability to model the world and to learn and adapt. c) Behavior modeling
d) Auto engineering
2. The goal of AI is to build systems that exhibit View Answer
intelligent behavior.
a) True Answer: b
b) False Explanation: The answer is behavior engineering.
View Answer Autonomous agent implements autonomy, social
ability and reactivity.
Answer: a
Explanation: The statement is true. There are 2 7. An international research effort to promote
main goals in AI: to exhibit intelligent behavior autonomous robots.
and understand intelligence in order to model it. a) Fresh Kitty
b) RoboCup
c) AICup
111
d) SPOT Everyday jobs like conducting transactions and
View Answer communications among business and government
agencies etc.
Answer: b
Explanation: RoboCup is designed to promote 2. Network Security provides authentication and
autonomous robots. It is based on multi agent access control for resources.
collaboration. a) True
b) False
8. A type of non-monotonic reasoning. View Answer
a) Ordinary
b) Special Answer: a
c) Duplicate Explanation: The statement is true. AFS is an
d) Default example. It helps us protect vital information.
View Answer
3. Which is not an objective of network security?
Answer: d a) Identification
Explanation: Default reasoning is a type of non- b) Authentication
monotonic reasoning. Default logic is a non- c) Access control
monotonic logic proposed by Raymond Reiter to d) Lock
formalize reasoning with default assumptions. View Answer
113
Answer: b 10. An attack in which the site is not capable of
Explanation: WEP stands for Wired Equivalent answering valid request.
Privacy. WEP has been broken already in 2001. a) Smurfing
WEP protocol designed to make the security of b) Denial of service
wireless LAN as good as that of wired LAN. c) E-mail bombing
d) Ping storm
6. A person who enjoys learning details about View Answer
computers and how to enhance their capabilities.
a) Cracker Answer: b
b) Hacker Explanation: The answer is Denial of service. In
c) App controller case of denial of service attacks, a computer site is
d) Site controller bombarded with a lot of messages.
View Answer
1. A cipher in which the order is not preserved.
Answer: b a) Polyalphabetic substitution based
Explanation: The person is called hacker. A person b) Transposition-based
who enjoys learning the details of computer c) Substitution based
systems and how to stretch their capabilities is d) Public key based
called hacker. View Answer
116
Answer: a Answer: c
Explanation: The statement is true. Augmented Explanation: Smart glasses are also called as
Reality is the field of computer research that deals optical head mounted displays. (OHMD), it has the
with the combination of real-world and computer capability of reflecting projected images as well as
generated data. allowing users to see through it.
117
1. A model that is the demo implementation of the c) editing
system. d) implementation
a) waterfall View Answer
b) prototype
c) incremental Answer: d
d) agile Explanation: The requirements are broken down
View Answer for ease of implementation. Hardware and software
requirements are identified and designed
Answer: b accordingly.
Explanation: Prototype is the demo implementation
so that the customer gets a brief idea of his 6. What do you call a technical person who is
product. It is generally used when the customer capable of understanding the basic requirements?
requirements are not clear. a) team leader
b) analyst
2. Maintenance is the final phase in waterfall c) engineer
model. d) stakeholder
a) True View Answer
b) False
View Answer Answer: b
Explanation: The person is called an analyst. An
Answer: a analyst is a software engineering who is
Explanation: The statement is true. This is the responsible for requirements gathering.
phase in which the completed software product is
handed over to the client. 7. A step in waterfall model that involves a
meeting with the customer to understand the
3. A stage in which individual components are requirements.
integrated and ensured that they are error-free to a) Requirement Gathering
meet customer requirements. b) SRS
a) Coding c) Implementation
b) Testing d) Customer review
c) Design View Answer
d) Implementation
View Answer Answer: a
Explanation: A waterfall model involves
Answer: b requirement gathering as its first step. This is the
Explanation: Hardware and software components most important phase. It is important to understand
are tested individually. Testing stage in which the customer requirements.
individual components are integrated and ensured
that they are error-free to meet customer 8. Methodology in which project management
requirements. processes were step-by step.
a) Incremental
4. ___________ is a step in which design is b) Waterfall
translated into machine-readable form. c) Spiral
a) Design d) Prototyping
b) Conversion View Answer
c) Debugging
d) Coding Answer: b
View Answer Explanation: Waterfall model is based on step-by
step completion of the project. Every step is done
Answer: d individually.
Explanation: Coding is the step in which design in
translated into machine-readable form. If design is 9. An individual who plans and directs the work.
efficient, coding can be done effectively. a) Stakeholder
b) Project manager
5. The customer requirements are broken down c) Team leader
into logical modules for ease of _______________ d) Programmer
a) inheritance View Answer
b) design
118
Answer: b 4. Locating or identifying the bugs is known as
Explanation: Project planner is the one who plans ___________
and designs the project. Team leader is the one a) Design
who provides guidance, instruction, direction and b) Testing
leadership to a group of individuals. c) Debugging
d) Coding
10. A planned program if work that requires a View Answer
definitive amount of time, effort and planning to
complete. Answer: b
a) Problem Explanation: Testing is conducted by the testers.
b) Project They locate or identify the bugs. In debugging
c) Process developer fixes the bug. Coding is done by the
d) Program developers.
View Answer
5. Which defines the role of software?
Answer: b a) System design
Explanation: The answer is Project. A project is a b) Design
program which is something which is planned and c) System engineering
needs effort and time to complete. d) Implementation
View Answer
1. A set of activities that ensure that software
correctly implements a specific function. Answer: c
a) verification Explanation: The answer is system engineering.
b) testing System engineering defines the role of software.
c) implementation
d) validation 6. What do you call testing individual
View Answer components?
a) system testing
Answer: a b) unit testing
Explanation: Verification ensures that software c) validation testing
correctly implements a specific function. It is a d) black box testing
static practice of verifying documents. View Answer
119
d) Gray box abstraction involves hiding the details and giving
View Answer only the necessary information to the user.
10. A programming technique in which the focus 3 Missing slot covers on a computer can cause?
is on doing things. . A
over heat
a) object oriented .
b) procedural B
power surges
c) logical .
d) structural C
EMI.
View Answer .
D
incomplete path for ESD
Answer: b .
Explanation: In procedural programming, the focus E
None of the above
is on doing things(functions). It follows top-down .
approach.
Answer: Option A
Computer Hardware:
Explanation:
1 From what location are the 1st computer
. instructions available on boot up? No answer description available for this
A question. Let us discuss.
ROM BIOS
. View Answer Discuss in Forum Workspace
B Report
CPU
.
C 4 When installing PCI NICS you can check the
boot.ini
. . IRQ availability by looking at
121
A A
dip switches clusters
. .
B B
CONFIG.SYS sectors
. .
C C
jumper settings vectors
. .
D D
motherboard BIOS heads
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
5 With respect to a network interface card, the 8 A wrist grounding strap contains which of the
. term 10/100 refers to . following:
A A
protocol speed Surge protector
. .
B B
a fiber speed Capacitor
. .
C C
megabits per seconds Voltmeter
. .
D D
minimum and maximum server speed Resistor
. .
E E
None of the above None of the above
. .
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
10 In laser printer technology, what happens 13 To view any currently running Terminate Stay
. during the conditioning stage? . Resident (TSR's) programs you could type:
AThe corona wire places a uniform positive A
Memory
. charge on the paper .
BA uniform negative charge is placed on the B
MEM
. photosensitive drum .
CA uniform negative charge is placed on the C
SYS /M
. toner .
D D
All of the above Memmaker
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
34 What tool is used to test serial and parallel 37 What voltage does a Pentium system use?
. ports? . A
+12 volts
A .
high volt probe
. B
+ 5 volts
B .
cable scanner
. C
+ 8 volts
C .
loop backs (wrap plugs)
. D
+3.3 volts
D .
sniffer
. E
None of the above
E .
None of the above
.
Answer: Option D
Answer: Option C
Explanation:
Explanation:
No answer description available for this
No answer description available for this question. Let us discuss.
question. Let us discuss. View Answer Discuss in Forum Workspace
View Answer Discuss in Forum Workspace Report
Report
38 A numeric error code check: A 17xx indicates a
35 ESD would cause the most damage to which . problem with:
. component? A
CMOS
A .
Power supply
. B
ROM BIOS
B .
Expansion board
. C
DMA controller
C .
Monitor
. D
hard drive or controller
D .
Keyboard
. E
power supply
E .
None of the above
.
Answer: Option D
Answer: Option B
36 What is the highest binary number that can be Explanation:
. referred to on a three position jumper block?
A No answer description available for this
4
. question. Let us discuss.
B View Answer Discuss in Forum Workspace
6
. Report
C
F
. 39 Which provides the fastest access to large
D1 . video files?
127
A .
Optical drives
. B
press alt + Ctrl + delete, and end task
B .
IDE hard drives
. C
press the reset button on the computer
C .
SCSI hard drives
. D
turn off computer and boot from a floppy disk
D .
EIDE hard drives
. E
None of the above
E .
None of the above
.
Answer: Option D
Answer: Option C
Explanation:
Explanation:
No answer description available for this
No answer description available for this question. Let us discuss.
question. Let us discuss. View Answer Discuss in Forum Workspace
View Answer Discuss in Forum Workspace Report
Report
43 RS-232 is a standard that applies to:
40 A 25-pin female connector on the back of your . A
serial ports
. computer will typically be: .
A B
Serial port 1 parallel ports
. .
B C
A parallel port game ports
. .
C D
Docking networks
. .
D E
COM2 port digital frequencies
. .
E
None of the above
. Answer: Option A
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
4 Match the device driver HIMEM.SYS to its 7 An anti static strap uses a small _____ to make
. operation. . sure you do not become the least path of
A resistance to the ground?
Supports (ANSI) terminal emulation
. A
capacitor
B .
Manages the use of extended memory
. Bdiode
130
. question. Let us discuss.
C View Answer Discuss in Forum Workspace
transistor
. Report
D
resistor
. 10 Which values are held in CMOS for the hard
E . drive
None of the above
. A
size (heads, cylinders, sectors)
.
Answer: Option D B
IRQ
.
Explanation: C
Free space
.
No answer description available for this D
Virus alert
question. Let us discuss. .
View Answer Discuss in Forum Workspace E
None of the above
Report .
8 If the memory slots have 30 pins then the chip is Answer: Option A
. a? 11 Which of the following would be a logical first
A . step in troubleshooting a PC?
DIMM A
. Check the computer CMOS
B .
SIMM B
. Define the circumstances of the problem
C .
SDRAM C
. Call the vendor
D .
All of the above D
. Define what applications are being used
E .
None of the above E
. None of the above
.
Answer: Option B
Answer: Option B
Explanation:
Explanation:
No answer description available for this
question. Let us discuss. No answer description available for this
View Answer Discuss in Forum Workspace question. Let us discuss.
Report View Answer Discuss in Forum Workspace
Report
9 Laser Jet printer speeds are measured in pages
. per minute (ppm) what do we use to measure dot- 12 Which DOS driver is used to emulate expanded
matrix printers? . memory?
A A
lines per inch Himem.sys
. .
B B
lines per sheet EMM386.exe
. .
C C
characters per inch Mem386.sys
. .
D D
characters per second Ramdrive.sys
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
131
question. Let us discuss. E
None of the above
View Answer Discuss in Forum Workspace .
Report
Answer: Option C
13 For a Macintosh to print successfully, the 16 When is the risk for electrostatic discharge the
. System Folder must contain: . greatest?
A A
File sharing software Day time
. .
B B
A printer enabler High humidity
. .
C C
The apple Garamond font set Low humidity
. .
D D
A printer driver Night time
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
20 In a computer with an eide adapter, where 23 During boot-up, the memory test:
. should you connect an ATA CD-ROM drive? . A
Is a superfluous step that should be ignored
A .
on the floppy bus
. BChecks and verifies that contiguous memory
B . is installed
on the primary IDE
. C
Is an operational error
C .
on the secondary IDE
. DDisplays what memory is installed, but
D . nothing else
on the SCSI bus
. E
None of the above
E .
All of the above
.
Answer: Option B
Answer: Option C
21 What's the best way to prevent damaging your Explanation:
. PC with static electricity?
A No answer description available for this
place your PC on a rubber mat
. question. Let us discuss.
B View Answer Discuss in Forum Workspace
wear leather soled shoes
. Report
Cperiodically touch a safe ground point on the
. PC to discharge yourself 24 IRQ6 is typically reserved for:
D . A
static electricity doesn't really hurt a PC The floppy
. .
E B
wear an ESD wrist strap The keyboard controller
. .
133
C CThe map statement is not in the autoexec.bat
LPT2
. . file
D D
The modem The last drive was not set correctly
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
25 Which would you do first when 28 What do you need to check serial and parallel
. troubleshooting a faulty monitor? . port?
ACheck its connections to the computer and A
Port adapter
. power source .
BUse a meter to check the CRT and internal B
Logic probe
. circuitry for continuity .
CPower down the monitor, then turn it on again C
Loopback plug
. to see if that corrects the problem .
DPower down the computer, then turn it on D
All of the above
. again to see if that corrects the problem .
E E
None of the above None of the above
. .
Explanation:
136
No answer description available for this .
question. Let us discuss. E
None of the above
View Answer Discuss in Forum Workspace .
Report
Answer: Option B
42 A COM port is a _____ port.
. A Explanation:
parallel
.
B No answer description available for this
serial
. question. Let us discuss.
C View Answer Discuss in Forum Workspace
static
. Report
D
multi
. 45 What is the most significant difference between
E . the USB and IEEE1394 standards?
SCSI
. A
IEEE 1394 is faster
.
Answer: Option B B
USB does not support USB
.
Explanation: C
USB is plug and play
.
No answer description available for this D
IEEE 1394 is hot swappable
question. Let us discuss. .
View Answer Discuss in Forum Workspace E
None of the above
Report .
139
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
24 What is the paper feeding technology most 27 A capacitor is measured in which of the
. commonly associated with dot-matrix printers? . following units?
A A
sheet feed Volts
. .
B B
tractor feed Ohms
. .
C C
friction feed Farads
. .
D D
manual feed Resistance
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
25 COM1 is typically represented by which of the 28 UART is a type of serial chip. Its letters stand
. following? . for:
A A
15 pin port unidirectional access regarding transmission
. .
B B
9 pin male port universal asynchronous receiver/ transmitter
. .
C C
9 pin female port upper advanced real transfer
. .
D D
25 pin male port unable all restore t-bits
. .
E E
None of the above use all ROM types
. .
143
.
Answer: Option B
Answer: Option B
Explanation:
Explanation:
No answer description available for this
question. Let us discuss. No answer description available for this
View Answer Discuss in Forum Workspace question. Let us discuss.
Report View Answer Discuss in Forum Workspace
Report
29 A system has two IDE hard drives that are each
. divided into primary and extended partitions, 32 In the Binary numbering system, a (1)
which drive letter is assigned to the primary . represents a jumper being shorted and a (0)
partition of the second drive? represents a jumper being open. On a three-bit
A jumper block on a SCSI drive, how would an ID
C
. of logical 3 be set?
B A
D 100
. .
C B
E 010
. .
D C
F 011
. .
E D
None of the above . 101
. .
E
None of the above
Answer: Option B .
35 What are the most likely conditions for ESD? 38 In the DOS memory model, the HIGH Memory
. A . Area (HMA). is the _____ memory.
Hot and dry
. A
Last 64k of conventional
B .
Hot and wet
. B
Last 64k of extended
C .
Cold and dry
. C
First 64k above conventional
D .
Cold and wet
. D
First 64k of extended
E .
None of the above
. E
None of the above
.
Answer: Option B
36 What is the i/o address for com3? Answer: Option D
. A
3e8
. Explanation:
B
345
. No answer description available for this
C question. Let us discuss.
ff8
. View Answer Discuss in Forum Workspace
D Report
5e8
.
E 39 In addition to I/O port addresses, SCSI adapters
be8
. . also use a range of ROM addresses for their
onboard BIOS.
Answer: Option A A
True
.
Explanation: B
False
.
No answer description available for this
question. Let us discuss. Answer: Option A
View Answer Discuss in Forum Workspace
Report Explanation:
37 The following process determines the amount No answer description available for this
. of memory present, the date/ time, and which question. Let us discuss.
communications ports and display adapters are View Answer Discuss in Forum Workspace
installed in a microcomputer? Report
A
Start-up utility test
. 40 COM1 is typically represented by which of the
B . following?
Power on Self Test
. A
C 15 pin port
Power up boot process .
. B
D 9 pin male port
Power on start up process .
. C
E 9 pin female port
None of the above .
. D
25 pin male port
.
Answer: Option B E
None of the above
.
Explanation:
Answer: Option B
No answer description available for this 41 A PC with a 486DX2 processor runs internally
question. Let us discuss. . at 50Mhz. What speed would its external logic
154
be running? Explanation:
A
l0Mhz
. No answer description available for this
B question. Let us discuss.
25Mhz
. View Answer Discuss in Forum Workspace
C Report
50Mhz
.
D 44 Which REQUIRES an anti-static bag for
100 Mhz
. . transport?
E A
None of the above Monitor
. .
B
Floppy disks
Answer: Option B .
C
Power supply
Explanation: .
D
I/O controller
No answer description available for this .
question. Let us discuss. E
None of the above
View Answer Discuss in Forum Workspace .
Report
Answer: Option D
42 A capacitor is measured in which of the
. following units? Explanation:
A
Volts
. No answer description available for this
B question. Let us discuss.
Ohms
. View Answer Discuss in Forum Workspace
C Report
Farads
.
D 45 Static electricity thrives is which type of
Resistance
. . environment?
E A
None of the above cold and humid
. .
B
warm and humid
Answer: Option C .
C
warm and dry
Explanation: .
D
cold and warm
No answer description available for this .
question. Let us discuss. E
cold and dry
View Answer Discuss in Forum Workspace .
Report
Answer: Option E
43 Which device uses a DMA channel? 46 ESD potential decreases with the use of:
. A . A
Modem De-ionizing fans
. .
B B
Network Card A wrist strap
. .
C C
Sound Card Rubber gloves with matching cap
. .
D D
All of the above A static meter
. .
E E
None of the above None of the above
. .
155
Explanation: .
D
Resistor
No answer description available for this .
question. Let us discuss. E
None of the above
View Answer Discuss in Forum Workspace .
Report
Answer: Option D
47 With a dot matrix printer, light then dark print
. is most commonly caused by: Explanation:
A
Erratic paper advancement
. No answer description available for this
B question. Let us discuss.
Erratic ribbon advancement
. View Answer Discuss in Forum Workspace
C Report
Misalligned print head
.
D 50 Every video card must have?
Overheating print head
. . A
E CMOS
None of the above .
. B
RAM
.
Answer: Option B C
CPU
.
Explanation: D
All of the above
.
No answer description available for this E
None of the above
question. Let us discuss. .
View Answer Discuss in Forum Workspace
Report Answer: Option B
1. What is the jumper setting on a SCSI device to
48 How many DMA channels are there in an AT configure it to use the fourth SCSI id?
. class PC? Remember, SCSI ids start with zero.
A A
3 010
. .
B B
4 110
. .
C C
7 011
. .
D D
8 101
. .
E E
None of the above 001
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
49 A wrist grounding strap contains which of the 2 What tool is used to test serial and parallel
. following: . ports?
A A
Surge protector high volt probe
. .
B B
Capacitor cable scanner
. .
CVoltmeter Cloop backs (wrap plugs)
156
. 5 If a computer's BIOS allows it, you can boot
D . from a CD-ROM.
sniffer
. A
True
E .
None of the above
. B
False
.
Answer: Option C
Answer: Option A
Explanation: 6 ISDN stands for:
. A
internal select data nulls
No answer description available for this .
question. Let us discuss. B
integrated services digital network
View Answer Discuss in Forum Workspace .
Report C
interval set down next
.
3 Which best describes a fragmented hard drive: D
interior sector direct none
. A .
The platters are bad E
. inferior sector data net
B .
Data files are corrupted
.
C Answer: Option B
Clusters of data are damaged
.
D Explanation:
Files are not stored in consecutive clusters
.
E No answer description available for this
None of the above
. question. Let us discuss.
View Answer Discuss in Forum Workspace
Answer: Option D Report
15 Which device should not be plugged into a 18 What Does EISA stand for?
. standard ups? . A
Extended Industry Standard Architecture
A .
monitor
. B
Expanded Industry Standard Architecture
B .
laser printer
. C
Enhanced Industry Standard Architecture
C .
ink-jet printer
. D
Electronics Industry Standard Architecture
D .
an external modem
. E
All of the above
E .
None of the above
.
Answer: Option A
Answer: Option B
16 What is the main communication method from Explanation:
. one PDA to another PDA?
A No answer description available for this
IR
. question. Let us discuss.
B View Answer Discuss in Forum Workspace
USB
. Report
C
RS-232
. 19 A static jolt of as little of _____ volts can fry
D . most any PC integrated circuit.
IEEE 1394
. A
E 200
None of the above .
. B
30
.
Answer: Option A C
1000
.
Explanation: D
200
.
No answer description available for this E
500
question. Let us discuss. .
View Answer Discuss in Forum Workspace
Report Answer: Option B
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
160
Report
Answer: Option D
27 A human cannot feel a static discharge as high
. as _____ volts. Explanation:
A
200
. No answer description available for this
B question. Let us discuss.
2000
. View Answer Discuss in Forum Workspace
C Report
10000
.
D 30 What does the acronym RTS represent?
50000
. . A
E Required to save
50 .
. B
Ready to start
.
Answer: Option A C
Request to send
.
Explanation: D
Right to separate
.
No answer description available for this E
None of the above
question. Let us discuss. .
View Answer Discuss in Forum Workspace
Report Answer: Option C
31 Which is the easiest component to
28 What can you use to ensure power is not . environmentally recycle?
. interrupted, resulting in corrupted data? A
A Motherboards
UPS .
. B
B CMOS batteries
Proper grounding .
. C
C Toner cartridges
Surge protector .
. D
D Cathode ray tubes
Sag protector .
. E
E None of the above
None of the above .
.
Answer: Option C
Answer: Option A
Explanation:
Explanation:
No answer description available for this
No answer description available for this question. Let us discuss.
question. Let us discuss. View Answer Discuss in Forum Workspace
View Answer Discuss in Forum Workspace Report
Report
32 What problem can occur if a printer cable is to
29 Which step should you perform first before . close to a power cable?
. discharging a CRT? A
A ESD Electrostatic Discharge
Remove the CRT from its housing .
. B
B EMI Electromagnetic Interference
Disconnect the CRT from the computer .
. C
C parity error
Remove the video assembly .
. D
DTurn power off before removing power no affect
.
. source E
E None of the above
None of the above .
.
161
.
Answer: Option B C
parity error
.
Explanation: D
no affect
.
No answer description available for this E
None of the above
question. Let us discuss. .
View Answer Discuss in Forum Workspace
Report Answer: Option B
36 How can you totally protect a PC from damage
33 ESD damage can be caused by: . during an electrical storm?
. A A
Placing an IC in a non-conductive plastic bag Disconnect the AC power cable
. .
B BDisconnect all external cables and power
Placing an IC on a grounded mat . cords
.
C C
Repeated sags in current supplied from outlets Use a surge protector
. .
D D
Touching metal on the chasis Turn off the AC power
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
34 The standard VGA display has _____ pixels in 37 The ESD wrist strap is designed to protect PC
. its native graphics mode? . Components or Service Technicians ?
A A
648 x 320 PC Components
. .
B B
640 x 480 Service Technicians
. .
C C
680 x 440 All of the above
. .
D D
1024 x 786 None of the above
. .
E
None of the above Answer: Option C
.
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
14 Which hardware component controls serial port 17 The 34-pin connection on an I/O card is for?
. communications? . A
floppy drive
A .
ROM BIOS BSCSI drive
.
167
. Explanation:
C
IDE drive
. No answer description available for this
D question. Let us discuss.
zip drive
. View Answer Discuss in Forum Workspace
E Report
None of the above
.
20 Which of the following is a type of
Answer: Option A . preventative maintenance used on a hard drive?
A
Disk check diagnostics
Explanation: .
B
Head alignment diagnostics
No answer description available for this .
question. Let us discuss. C
Initializing
View Answer Discuss in Forum Workspace .
Report D
Uninstalling programs
.
18 You run a super wing-ding diagnostic program E
None of the above
. on your PC, and it reports that your hard drive, .
microprocessor, RAM, and video card have seen
better days. To resolve this problem you should: Answer: Option A
Areplace each part one at a time, rerunning the 21 ESD damage can be caused by:
. diagnostic before replacing the next part. . A
Placing an IC in a non-conductive plastic bag
B .
check to see if you have a software problem B
. Placing an IC on a grounded mat
Creplace everything at once and rerun the .
. diagnostic C
Repeated sags in current supplied from outlets
D .
get another copy of the diagnostic program D
. Touching metal on the chassis
E .
run an exhaustive memory check E
. None of the above
.
Answer: Option B
Answer: Option A
Explanation:
Explanation:
No answer description available for this
question. Let us discuss. No answer description available for this
View Answer Discuss in Forum Workspace question. Let us discuss.
Report View Answer Discuss in Forum Workspace
Report
19 On a leased line installation a known good
. external modem shows no carrier detect light. 22 How can you totally protect a PC from damage
Where is the problem most likely to be? . during an electrical storm?
A A
In the modem Disconnect the AC power cable
. .
B BDisconnect all external cables and power
In the phone line . cords
.
C C
In the computer Use a surge protector
. .
D D
In the DTC equipment Turn off the AC power
. .
E E
None of the above None of the above
. .
168
Explanation: .
D
second adapter card
No answer description available for this .
question. Let us discuss. E
CMOS battery
View Answer Discuss in Forum Workspace .
Report
Answer: Option A
23 When you boot a PC and don't hear any beep, 26 What are the IRQ's for sound card?
. this could suggest which of the following? . A
IRQ8
A .
The monitor is turned off
. B
IRQ4
B .
Keyboard not plugged in
. C
IRQ5
C .
Normal PC boot
. D
IRQ7
D .
Bad or disconnected speaker
. E
None of the above
E .
None of the above
.
Answer: Option C
Answer: Option D
Explanation:
Explanation:
No answer description available for this
No answer description available for this question. Let us discuss.
question. Let us discuss. View Answer Discuss in Forum Workspace
View Answer Discuss in Forum Workspace Report
Report
27 Your IDE hard drive is not spinning up when
24 What is the file extension used by WIN95 to . you turn on the PC. What is the most likely
. back up registry file when windows starts? problem.
A A
.dat bad data cable
. .
B B
.dao incorrect jumper setting on drive
. .
C C
.bak loose molex connector
. .
D D
.tmp virus
. .
E E
None of the above tfad system board
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
25 A 2xx POST error code indicates a problem 28 You can place an ISA device in an EISA slot.
. with: . A
True
A .
RAM or ROM
. B
False
B .
hard drive
.
Csystem board
169
Answer: Option A Answer: Option D
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
29 Which provides the fastest access to large 32 What resistance in ohms should be displayed
. video files? . when testing a speaker in a computer?
A A
Optical drives Q Ohms
. .
B B
IDE hard drives 16 Ohms
. .
C C
SCSI hard drives -200 Ohms
. .
D D
EIDE hard drives Unlimited Ohms
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
30 An anti static strap uses a small _____ to make 33 After displaying the directory of a floppy disk,
. sure you do not become the least path of . a different floppy is inserted into the drive. The
resistance to the ground? contents of the original floppy continue to
A display regardless of the director requests on the
capacitor
. other floppies placed in the drive. You remove
B the drive in question and install it into your test
diode
. system, and it does not exhibit the problem. You
C should next replace the:
transistor
. A
System's floppy drive device driver
D .
resistor
. B
Original IDE controller
E .
None of the above
. C
Floppy drive ribbon cable
.
Answer: Option D D
System's power supply
31 Which best describes a fragmented hard drive: .
. A E
The platters are bad None of the above
. .
B
Data files are corrupted
. Answer: Option C
C
Clusters of data are damaged
. Explanation:
D
Files are not stored in consecutive clusters
. No answer description available for this
E question. Let us discuss.
None of the above
. View Answer Discuss in Forum Workspace
170
Report
37 A customer has just installed a new cd-rw. the
34 What is the best ground for a conductive work . system was working fine before the installation,
. bench? but now the cdrom does not work, what should
A you suggest that the customer do?
AC outlet
. A
flash or upgrade the BIOS
B .
Ground to bench
. B
check the CONFIG.SYS
C .
To the motherboard
. C
add cdrw in the device manager
D .
To the PC's Chassis
. D
check the jumper setting on the cd-rw
E .
None of the above
. E
None of the above
.
Answer: Option A
Answer: Option D
Explanation:
Explanation:
No answer description available for this
question. Let us discuss. No answer description available for this
View Answer Discuss in Forum Workspace question. Let us discuss.
Report View Answer Discuss in Forum Workspace
Report
35 When you are testing a fuse, you should set the
. Volt-OHM meter to what scale? 38 Which is the most difficult environmentally to
A . dispose of?
AC
. A
floppy drives
B .
DC
. B
hard drives
C .
AMPS
. C
power supplies
D .
OHMS
. D
CRTs
E .
None of the above
. E
system boards
.
Answer: Option D
36 During boot-up, the memory test: Answer: Option D
. A
Is a superfluous step that should be ignored
. Explanation:
BChecks and verifies that contiguous memory
. is installed No answer description available for this
C question. Let us discuss.
Is an operational error
. View Answer Discuss in Forum Workspace
DDisplays what memory is installed, but Report
. nothing else
E 39 Resistance is measured:
None of the above
. . A
in parallel
.
Answer: Option A B
in series
.
Explanation: C
after breaking the circuit
.
No answer description available for this D
after checking voltage
question. Let us discuss. .
View Answer Discuss in Forum Workspace E
after checking current
Report .
171
No answer description available for this
Answer: Option C question. Let us discuss.
View Answer Discuss in Forum Workspace
Explanation: Report
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
9 On PC power supplies, the wire attached to pin 12 What is the size of a sector?
. one is usually: . A
512 bytes
A .
blue or red B
. 256 bytes
B .
blue or white C
. 512 Kb
C .
red or black D
. 1024 bytes
D .
red or white E
. None of the above
E .
white or orange
.
Answer: Option A
Answer: Option E
Explanation:
Explanation:
No answer description available for this
175
question. Let us discuss. .
View Answer Discuss in Forum Workspace
Report Answer: Option D
16 A brownout is defined as:
13 During the normal PC boot process, which of . Aa slightly elevated voltage lasting from
. the following is active first? . seconds to minutes or more
A Ba slightly decreased voltage lasting from
RAM BIOS
. . seconds to minutes or more
B C
CMOS complete power out lasting a few minutes
. .
C Dalternating power out, power on lasting a few
ROM BIOS
. . minutes
D E
Hard disk information has nothing to do with electricity
. .
E
None of the above
. Answer: Option B
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
15 In which mode can 2 or more applications be 18 Which component stores an electrical charge?
. stored in memory at the same time? . A
A diode
Segmented Mode .
. B
B rectifier
Unprotected Mode .
. C
C capacitor
Real Mode .
. D
D resistor
Protected Mode .
. E
ENone of the above transistor
.
176
.
Answer: Option C D
Beer or Jack Daniels
.
Explanation: E
None of the above
.
No answer description available for this
question. Let us discuss. Answer: Option B
View Answer Discuss in Forum Workspace
Report Explanation:
19 You are installing an IDE hard drive that will No answer description available for this
. be your boot drive. Which is the correct order of question. Let us discuss.
steps that need to be followed? View Answer Discuss in Forum Workspace
jumper properly, auto-detect(or configure Report
A
manually) in CMOS, low level format, high
.
level format, partition 22 Which controller would support an external
jumper properly, auto-detect(or configure . CD-ROM drive?
B
manually) in CMOS, partition, high level A
. ESDI
format with / s switch .
jumper properly, partition, auto-detect(or B
C ARLL
configure manually in CMOS, high level .
.
format with /s switch C
MFM
Djumper properly, auto-detect in CMOS, .
. regular format D
SCSI
Ejumper properly, partition, low level format, .
. high level format E
None of the above
.
Answer: Option B
Answer: Option D
Explanation:
Explanation:
No answer description available for this
question. Let us discuss. No answer description available for this
View Answer Discuss in Forum Workspace question. Let us discuss.
Report View Answer Discuss in Forum Workspace
Report
20 Which type of cable is most likely in use with
. rj-45 connectors? 23 What would you ask to determine if the display
A . is working?
10base2
. AIs there a video cursor or action on the
B . screen?
10base5
. B
Did the computer beep or chime?
C .
10baseT
. C
Is there high voltage static on the screen
D .
10baseFL
. DIs the brightness or contrast turned up or
E . down?
None of the above
. E
All of the above
.
Answer: Option C
21 To prevent toner from sticking to a laser Answer: Option E
. printer's heat rollers, apply which of the
following: Explanation:
A
Alcohol
. No answer description available for this
B question. Let us discuss.
Oil
. View Answer Discuss in Forum Workspace
CAmmonia Report
177
Report
24 You should never put floppy drives, hard
. drives, or even VCR tapes or cassette tapes on 27 RS-232 is a standard that applies to?
top of speakers (or near any other source of . A
Parallel port
magnetism) because of: .
A B
RFI Serial port
. .
B C
EMI Game port
. .
C D
EXE All of the above
. .
D E
FYI None of the above
. .
E
IOU
. Answer: Option B
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
30 How would you allow device drivers and TSR's 33 In inkjet technology the droplets of ink are
. to be loaded into Upper Memory Blocks ? . deflected by?
A A
DOS=High Electrically Charge Plate
. .
B B
devicehigh= Multi directional nozzle
. .
C C
loadhigh= High pressure jets
. .
D D
DOS=UMB All of the above
. .
E E
None of the above None of the above
. .
42 The standard IRQ for the floppy drive is? Answer: Option A
. A
9 Explanation:
.
B
6
. No answer description available for this
C question. Let us discuss.
10
. View Answer Discuss in Forum Workspace
D Report
All of the above
.
E 45 To find out how much memory is available,
None of the above
. . you could type _____
A
EMM
Answer: Option B .
B
MEM
Explanation: .
C
CHKDSK
No answer description available for this .
question. Let us discuss. D
MEMMAKER
View Answer Discuss in Forum Workspace .
Report E
None of the above
.
43 A keyboard locks up intermittently even when
. replaced with a new keyboard. What is the Answer: Option B
LEAST likely cause of the problem? 46 IBM's Micro Channel Architecture (MCA)
A . specifies which type of the following bit access
A second bad keyboard widths?
.
B A
The keyboard controller chip 8 bit & 16 bit
. .
C B
The keyboard connector 16 bit & 24 bit
. .
D C
The motherboard 16 bit & 32 bit
. .
E D
None of the above 32 bit & 64 bit
. .
E
None of the above
Answer: Option A .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
49 A PC with a 486DX2 processor runs internally 52 The output voltages of a PC power supply are
. at 50Mhz. What speed would its external logic . in the form of _____ current.
be running? A
A AC
l0Mhz .
. B
B DC
25Mhz .
. C
C amperage
50Mhz .
. D
D100 Mhz resistive
.
182
E 55 In laser printing, there are six steps the printer
trickle
. . follows. What comes between the conditioning
phase and the developing phase?
Answer: Option B A
transfer phase
.
Explanation: B
writing phase
.
No answer description available for this C
fusing phase
question. Let us discuss. .
View Answer Discuss in Forum Workspace D
cleaning phase
Report .
E
All of the above
53 After doing a low-level format, what would be .
. the next step in configuring the hard drive in a
system? Answer: Option B
A 56 During the laser printer's conditioning phase a
Format DOS partition . uniform charge of _____ is placed on the
.
B photosensitive drum.
Install operating system A
. +1000 volt
CConfigure DMA channel and back-up .
. interrupt B
+600 volts
D .
Partition hard disk C
. -600 volts
E .
None of the above D
. -1000 volts
.
Answer: Option D E
+ 12 volts
.
Explanation:
Answer: Option C
No answer description available for this
question. Let us discuss. Explanation:
View Answer Discuss in Forum Workspace
Report No answer description available for this
question. Let us discuss.
54 After trying to unload a TSR, you get an error View Answer Discuss in Forum Workspace
. message saying that other TSRs were loaded Report
after the one you tried to remove. Which of the
following commands could you use to see the 57 A dialog box with a bomb appears oh a
current load order? . Macintosh screen. What type of problem has
A occurred?
MEM /P A
. A RAM problem
B .
MEMMAKER B
. A software problem
C .
MEM /C (A SYS: C
. A ROM problem
D .
None of the above D
. An ADB problem
.
Answer: Option C E
None of the above
.
Explanation:
Answer: Option B
No answer description available for this
question. Let us discuss. Computer Architecture:
View Answer Discuss in Forum Workspace
Report 1. The ______ format is usually used to store data.
a) BCD
183
b) Decimal are compared to RAM because they optimize the
c) Hexadecimal performance of the system and they only keep files
d) Octal which are required by the current process in them
View Answer
6. The ALU makes use of _______ to store the
Answer: a intermediate results.
Explanation: The data usually used by computers a) Accumulators
have to be stored and represented in a particular b) Registers
format for ease of use. c) Heap
d) Stack
2. The 8-bit encoding format used to store data in View Answer
a computer is ______
a) ASCII Answer: a
b) EBCDIC Explanation: The ALU is the computational center
c) ANCI of the CPU. It performs all the mathematical and
d) USCII logical operations. In order to perform better, it
View Answer uses some internal memory spaces to store
immediate results.
Answer: b
Explanation: The data to be stored in the 7. The control unit controls other units by
computers have to be encoded in a particular way generating ____
so as to provide secure processing of the data. a) Control signals
b) Timing signals
3. A source program is usually in _______ c) Transfer signals
a) Assembly language d) Command Signals
b) Machine level language View Answer
c) High-level language
d) Natural language Answer: b
View Answer Explanation: This unit is used to control and
coordinate between the various parts and
Answer: c components of the CPU.
Explanation: The program written and before being
compiled or assembled is called as a source 8. ______ are numbers and encoded characters,
program. generally used as operands.
a) Input
4. Which memory device is generally made of b) Data
semiconductors? c) Information
a) RAM d) Stored Values
b) Hard-disk View Answer
c) Floppy disk
d) Cd disk Answer: b
View Answer Explanation: None.
186
d) Multiple bus b) Register file
View Answer c) Register Block
d) Map registers
Answer: a View Answer
Explanation: PCI BUS is used to connect other
peripheral devices which require a direct Answer: b
connection with the processor. Explanation: None.
4. IBM developed a bus standard for their line of 9. The main advantage of multiple bus
computers ‘PC AT’ called _____ organisation over a single bus is _____
a) IB bus a) Reduction in the number of cycles for execution
b) M-bus b) Increase in size of the registers
c) ISA c) Better Connectivity
d) None of the mentioned d) None of the mentioned
View Answer View Answer
Answer: c Answer: a
Explanation: None. Explanation: None.
5. The bus used to connect the monitor to the CPU 10. The ISA standard Buses are used to connect
is ______ ___________
a) PCI bus a) RAM and processor
b) SCSI bus b) GPU and processor
c) Memory bus c) Harddisk and Processor
d) Rambus d) CD/DVD drives and Processor
View Answer View Answer
Answer: b Answer: c
Explanation: SCSI BUS is usually used to connect Explanation: None.
the video devices to the processor.
1. During the execution of the instructions, a copy
6. ANSI stands for __________ of the instructions is placed in the ______
a) American National Standards Institute a) Register
b) American National Standard Interface b) RAM
c) American Network Standard Interfacing c) System heap
d) American Network Security Interrupt d) Cache
View Answer View Answer
Answer: a Answer: d
Explanation: None. Explanation: None.
7. _____ register Connected to the Processor bus 2. Two processors A and B have clock
is a single-way transfer capable. frequencies of 700 Mhz and 900 Mhz respectively.
a) PC Suppose A can execute an instruction with an
b) IR average of 3 steps and B can execute with an
c) Temp average of 5 steps. For the execution of the same
d) Z instruction which processor is faster?
View Answer a) A
b) B
Answer: d c) Both take the same time
Explanation: The Z register is a special register d) Insufficient information
which can interact with the processor BUS only. View Answer
advertisement
Answer: a
8. In multiple Bus organisation, the registers are Explanation: The performance of a system can be
collectively placed and referred as ______ found out using the Basic performance formula.
a) Set registers
187
3. A processor performing fetch or decoding of operation speed of the processor by reducing the
different instruction during the execution of time taken to compile the program instructions.
another instruction is called ______
a) Super-scaling 7. The ultimate goal of a compiler is to ________
b) Pipe-lining a) Reduce the clock cycles for a programming task
c) Parallel Computation b) Reduce the size of the object code
d) None of the mentioned c) Be versatile
View Answer d) Be able to detect even the smallest of errors
View Answer
Answer: b
Explanation: Pipe-lining is the process of Answer: a
improving the performance of the system by Explanation: None.
processing different instructions at the same time,
with only one instruction performing one specific 8. SPEC stands for _______
operation. a) Standard Performance Evaluation Code
b) System Processing Enhancing Code
4. For a given FINITE number of instructions to c) System Performance Evaluation Corporation
be executed, which architecture of the processor d) Standard Processing Enhancement Corporation
provides for a faster execution? View Answer
a) ISA
b) ANSA Answer: c
c) Super-scalar Explanation: SPEC is a corporation started to
d) All of the mentioned standardize the evaluation method of a system’s
View Answer performance.
191
13. In a normal n-bit adder, to find out if an 3. An 24 bit address generates an address space of
overflow as occurred we make use of ________ ______ locations.
a) And gate a) 1024
b) Nand gate b) 4096
c) Nor gate c) 248
d) Xor gate d) 16,777,216
View Answer View Answer
Answer: d Answer: d
Explanation: None. Explanation: The number of addressable locations
in the system is called as address space.
14. In the implementation of a Multiplier circuit in
the system we make use of _______ 4. If a system is 64 bit machine, then the length of
a) Counter each word will be _______
b) Flip flop a) 4 bytes
c) Shift register b) 8 bytes
d) Push down stack c) 16 bytes
View Answer d) 12 bytes
View Answer
Answer: c
Explanation: The shift registers are used to store Answer: b
the multiplied answer. Explanation: A 64 bit system means, that at a time
64 bit instruction can be executed.
15. When 1101 is used to divide 100010010 the
remainder is ______ 5. The type of memory assignment used in Intel
a) 101 processors is _____
b) 11 a) Little Endian
c) 0 b) Big Endian
d) 1 c) Medium Endian
View Answer d) None of the mentioned
View Answer
Answer: d
Explanation: None. Answer: a
Explanation: The method of address allocation to
1. The smallest entity of memory is called data to be stored is called as memory assignment.
_______
a) Cell 6. When using the Big Endian assignment to store
b) Block a number, the sign bit of the number is stored in
c) Instance _____
d) Unit a) The higher order byte of the word
View Answer b) The lower order byte of the word
c) Can’t say
Answer: a d) None of the mentioned
Explanation: Each data is made up of a number of View Answer
units.
Answer: a
2. The collection of the above mentioned entities Explanation: None.
where data is stored is called ______
a) Block 7. To get the physical address from the logical
b) Set address generated by CPU we use ____
c) Word a) MAR
d) Byte b) MMU
View Answer c) Overlays
d) TLB
Answer: c View Answer
Explanation: Each readable part of data is called as
blocks. Answer: b
Explanation: Memory Management Unit, is used to
192
add the offset to the logical address generated by b) !
the CPU to get the physical address. c) $
advertisement d) *
View Answer
8. _____ method is used to map logical addresses
of variable length onto physical memory. Answer: c
a) Paging Explanation: None.
b) Overlays
c) Segmentation 3. When generating physical addresses from a
d) Paging with segmentation logical address the offset is stored in _____
View Answer a) Translation look-aside buffer
b) Relocation register
Answer: c c) Page table
Explanation: Segmentation is a process in which d) Shift register
memory is divided into groups of variable length View Answer
called segments.
Answer: b
9. During the transfer of data between the Explanation: In the MMU the relocation register
processor and memory we use ______ stores the offset address.
a) Cache
b) TLB 4. The technique used to store programs larger
c) Buffers than the memory is ______
d) Registers a) Overlays
View Answer b) Extension registers
c) Buffers
Answer: d d) Both Extension registers and Buffers
Explanation: None. View Answer
197
Answer: a 3. ______ pointer is used to point to parameters
Explanation: By using general purpose registers for passed or local parameters of the subroutine.
the parameter passing we make the process more a) Stack pointer
efficient. b) Frame pointer
c) Parameter register
9. The most Flexible way of logging the return d) Log register
addresses of the subroutines is by using _______ View Answer
a) Registers
b) Stacks Answer: b
c) Memory locations Explanation: This pointer is used to track the
d) None of the mentioned current position of the stack being used.
View Answer
4. The reserved memory or private space of the
Answer: b subroutine gets deallocated when _______
Explanation: The stacks are used as Logs for return a) The stop instruction is executed by the routine
addresses of the subroutines. b) The pointer reaches the end of the space
c) When the routine’s return statement is executed
10. The wrong statement/s regarding interrupts d) None of the mentioned
and subroutines among the following is/are ______ View Answer
i) The sub-routine and interrupts have a return
statement Answer: c
ii) Both of them alter the content of the PC Explanation: The work space allocated to a
iii) Both are software oriented subroutine gets deallocated when the routine is
iv) Both can be initiated by the user completed.
a) i, ii and iv
b) ii and iii 5. The private space gets allocated to each
c) iv subroutine when _________
d) iii and iv a) The first statement of the routine is executed
View Answer b) When the context switch takes place
c) When the routine gets called
Answer: d d) When the Allocate instruction is executed
Explanation: None. View Answer
201
Answer: c Answer: b
Explanation: The trap is a non-maskable interrupt Explanation: None.
as it deals with the ongoing process in the
processor. The trap is initiated by the process being 3. In vectored interrupts, how does the device
executed due to lack of data required for its identify itself to the processor?
completion. Hence trap is unmaskable. a) By sending its device id
b) By sending the machine code for the interrupt
14. From amongst the following given scenarios service routine
determine the right one to justify interrupt mode of c) By sending the starting address of the service
data transfer routine
i) Bulk transfer of several kilo-byte d) None of the mentioned
ii) Moderately large data transfer of more than 1kb View Answer
iii) Short events like mouse action
iv) Keyboard inputs Answer: c
a) i and ii Explanation: By sending the starting address of the
b) ii routine the device ids the routine required and
c) i,ii and iv thereby identifying itself.
d) iv
View Answer 4. The code sent by the device in vectored
interrupt is _____ long.
Answer: d a) upto 16 bits
Explanation: None. b) upto 32 bits
c) upto 24 bits
15. How can the processor ignore other interrupts d) 4-8 bits
when it is servicing one View Answer
a) By turning off the interrupt request line
b) By disabling the devices from sending the Answer: d
interrupts Explanation: None.
c) BY using edge-triggered request lines
d) All of the mentioned 5. The starting address sent by the device in
View Answer vectored interrupt is called as __________
a) Location id
Answer: d b) Interrupt vector
Explanation: None. c) Service location
d) Service id
1. When dealing with multiple devices interrupts, View Answer
which mechanism is easy to implement?
a) Polling method Answer: b
b) Vectored interrupts Explanation: None.
c) Interrupt nesting
d) None of the mentioned 6. The processor indicates to the devices that it is
View Answer ready to receive interrupts ________
a) By enabling the interrupt request line
Answer: a b) By enabling the IRQ bits
Explanation: In this method, the processor checks c) By activating the interrupt acknowledge line
the IRQ bits of all the devices, whichever is d) None of the mentioned
enabled first that device is serviced. View Answer
205
Answer: a d) 1024 X 1
Explanation: None. View Answer
206
1. The Reason for the disregarding of the SRAM’s Answer: a
is ________ Explanation: The sense amplifier detects if the
a) Low Efficiency value is above or below the threshold and then
b) High power consumption restores it.
c) High Cost
d) All of the mentioned 6. To reduce the number of external connections
View Answer required, we make use of ______
a) De-multiplexer
Answer: c b) Multiplexer
Explanation: The reason for the high cost of the c) Encoder
SRAM is because of the usage of more number of d) Decoder
transistors. View Answer
Answer: a
Explanation: None.
209
10. The memory devices which are similar to Answer: b
EEPROM but differ in the cost effectiveness is Explanation: The flash drives have been developed
______ to provide faster operation but with lesser space.
a) Memory sticks
b) Blue-ray devices 15. The reason for the fast operating speeds of the
c) Flash memory flash drives is
d) CMOS a) The absence of any movable parts
View Answer b) The integrated electronic hardware
c) The improved bandwidth connection
Answer: c d) All of the mentioned
Explanation: The flash memory functions similar View Answer
to the EEPROM but is much cheaper.
Answer: a
11. The only difference between the EEPROM Explanation: Since the flash drives have no
and flash memory is that the latter doesn’t allow movable parts their access and seek times are
bulk data to be written. reasonably reduced.
a) True
b) False 1. The standard SRAM chips are costly as
View Answer _________
a) They use highly advanced micro-electronic
Answer: a devices
Explanation: This is not permitted as the previous b) They house 6 transistor per chip
contents of the cells will be overwritten. c) They require specially designed PCB’s
d) None of the mentioned
12. The flash memories find application in View Answer
______
a) Super computers Answer: b
b) Mainframe systems Explanation: As they require a large number of
c) Distributed systems transistors, their cost per bit increases.
d) Portable devices
View Answer 2. The drawback of building a large memory with
DRAM is ______________
Answer: d a) The large cost factor
Explanation: The flash memories low power b) The inefficient memory organisation
requirement enables them to be used in a wide c) The Slow speed of operation
range of hand held devices. d) All of the mentioned
advertisement View Answer
Answer: b Answer: b
Explanation: This is basically used to provide Explanation: This difference in the speeds of
effective memory mapping. operation of the system caused it to be inefficient.
7. The next level of memory hierarchy after the 2. The effectiveness of the cache memory is based
L2 cache is _______ on the property of ________
a) Secondary storage a) Locality of reference
b) TLB b) Memory localisation
c) Main memory c) Memory size
d) Register d) None of the mentioned
View Answer View Answer
Answer: d Answer: a
Explanation: None. Explanation: This means that the cache depends on
advertisement the location in the memory that is referenced often.
8. The last on the hierarchy scale of memory 3. The temporal aspect of the locality of reference
devices is ______ means ________
a) Main memory a) That the recently executed instruction won’t be
b) Secondary memory executed soon
c) TLB b) That the recently executed instruction is
d) Flash drives temporarily not referenced
View Answer c) That the recently executed instruction will be
executed soon again
Answer: b d) None of the mentioned
Explanation: The secondary memory is the slowest View Answer
memory device.
211
Answer: c 8. The bit used to signify that the cache location is
Explanation: None. updated is ________
a) Dirty bit
4. The spatial aspect of the locality of reference b) Update bit
means ________ c) Reference bit
a) That the recently executed instruction is d) Flag bit
executed again next View Answer
b) That the recently executed won’t be executed
again Answer: a
c) That the instruction executed will be executed at Explanation: When the cache location is updated in
a later time order to signal to the processor this bit is used.
d) That the instruction in close proximity of the
instruction executed will be executed in future 9. The copy-back protocol is used ________
View Answer a) To copy the contents of the memory onto the
cache
Answer: d b) To update the contents of the memory from the
Explanation: The spatial aspect of locality of cache
reference tells that the nearby instruction is more c) To remove the contents of the cache and push it
likely to be executed in future. on to the memory
d) None of the mentioned
5. The correspondence between the main memory View Answer
blocks and those in the cache is given by
_________ Answer: b
a) Hash function Explanation: This is another way of performing the
b) Mapping function write operation, wherein the cache is updated first
c) Locale function and then the memory.
d) Assign function
View Answer 10. The approach where the memory contents are
transferred directly to the processor from the
Answer: b memory is called ______
Explanation: The mapping function is used to map a) Read-later
the contents of the memory to the cache. b) Read-through
c) Early-start
6. The algorithm to remove and place new d) None of the mentioned
contents into the cache is called _______ View Answer
a) Replacement algorithm
b) Renewal algorithm Answer: c
c) Updation Explanation: None.
d) None of the mentioned
View Answer
1. The memory blocks are mapped on to the cache
Answer: a with the help of ______
Explanation: As the cache gets full, older contents a) Hash functions
of the cache are swapped out with newer contents. b) Vectors
This decision is taken by the algorithm. c) Mapping functions
d) None of the mentioned
7. The write-through procedure is used ________ View Answer
a) To write onto the memory directly
b) To write and read from memory simultaneously Answer: c
c) To write directly on the memory and the cache Explanation: The mapping functions are used to
simultaneously map the memory blocks on to their corresponding
d) None of the mentioned cache block.
View Answer
2. During a write operation if the required block is
Answer: c not present in the cache then ______ occurs.
Explanation: When write operation is issued then a) Write latency
the corresponding operation is performed. b) Write hit
advertisement c) Write delay
212
d) Write miss 7. In direct mapping the presence of the block in
View Answer memory is checked with the help of block field.
a) True
Answer: d b) False
Explanation: This indicates that the operation has View Answer
missed and it brings the required block into the
cache. Answer: b
Explanation: The tag field is used to check the
3. In ________ protocol the information is presence of a mem block.
directly written into the main memory.
a) Write through 8. In associative mapping, in a 16 bit system the
b) Write back tag field has ______ bits.
c) Write first a) 12
d) None of the mentioned b) 8
View Answer c) 9
d) 10
Answer: a View Answer
Explanation: In case of the miss, then the data gets
written directly in main memory. Answer: a
Explanation: The Tag field is used as an id for the
4. The only draw back of using the early start different memory blocks mapped to the cache.
protocol is _______
a) Time delay 9. The associative mapping is costlier than direct
b) Complexity of circuit mapping.
c) Latency a) True
d) High miss rate b) False
View Answer View Answer
Answer: b Answer: a
Explanation: In this protocol, the required block is Explanation: In associative mapping, all the tags
read and directly sent to the processor. have to be searched to find the block.
5. The method of mapping the consecutive 10. The technique of searching for a block by
memory blocks to consecutive cache blocks is going through all the tags is ______
called ______ a) Linear search
a) Set associative b) Binary search
b) Associative c) Associative search
c) Direct d) None of the mentioned
d) Indirect View Answer
View Answer
Answer: c
Answer: c Explanation: None.
Explanation: This method is most simple to
implement as it involves direct mapping of 11. The set-associative map technique is a
memory blocks. combination of the direct and associative
technique.
6. While using the direct mapping technique, in a a) True
16 bit system the higher order 5 bits are used for b) False
________ View Answer
a) Tag
b) Block Answer: a
c) Word Explanation: The combination of the efficiency of
d) Id the associative method and the cheapness of the
View Answer direct mapping, we get the set-associative
mapping.
Answer: a
Explanation: The tag is used to identify the block
mapped onto one particular cache block.
213
12. In set-associative technique, the blocks are Answer: c
grouped into ______ sets. Explanation: The mapping functions are used to
a) 4 map the memory blocks on to their corresponding
b) 8 cache block.
c) 12
d) 6 2. During a write operation if the required block is
View Answer not present in the cache then ______ occurs.
a) Write latency
Answer: d b) Write hit
Explanation: The set-associative technique groups c) Write delay
the blocks into different sets. d) Write miss
advertisement View Answer
216
b) False 5. __________is used to implement virtual
View Answer memory organisation.
a) Page table
Answer: a b) Frame table
Explanation: The extra time needed to bring the c) MMU
data into memory in case of a miss is called as miss d) None of the mentioned
penalty. View Answer
Answer: c
1. The physical memory is not as large as the Explanation: The MMU stands for Memory
address space spanned by the processor. Management Unit.
a) True
b) False 6. ______ translates the logical address into a
View Answer physical address.
a) MMU
Answer: a b) Translator
Explanation: This is one of the main reasons for c) Compiler
the usage of virtual memories. d) Linker
View Answer
2. The program is divided into operable parts
called as _________ Answer: a
a) Frames Explanation: The MMU translates the logical
b) Segments address into a physical address by adding an offset.
c) Pages
d) Sheets 7. The main aim of virtual memory organisation is
View Answer ________
a) To provide effective memory access
Answer: b b) To provide better memory transfer
Explanation: The program is divided into parts c) To improve the execution of the program
called as segments for ease of execution. d) All of the mentioned
View Answer
3. The techniques which move the program blocks
to or from the physical memory is called as ______ Answer: d
a) Paging Explanation: None.
b) Virtual memory organisation advertisement
c) Overlays
d) Framing 8. The DMA doesn’t make use of the MMU for
View Answer bulk data transfers.
a) True
Answer: b b) False
Explanation: By using this technique the program View Answer
execution is accomplished with a usage of less
space. Answer: b
Explanation: The DMA stands for Direct Memory
4. The binary address issued to data or Access, in which a block of data gets directly
instructions are called as ______ transferred from the memory.
a) Physical address
b) Location 9. The virtual memory basically stores the next
c) Relocatable address segment of data to be executed on the _________
d) Logical address a) Secondary storage
View Answer b) Disks
c) RAM
Answer: d d) ROM
Explanation: The logical address is the random View Answer
address generated by the processor.
Answer: a
Explanation: None.
217
10. The associatively mapped virtual memory 5. The iconic feature of the RISC machine among
makes use of _______ the following is _______
a) TLB a) Reduced number of addressing modes
b) Page table b) Increased memory size
c) Frame table c) Having a branch delay slot
d) None of the mentioned d) All of the mentioned
View Answer View Answer
Answer: a Answer: c
Explanation: TLB stands for Translation Look- Explanation: A branch delay slot is an instruction
aside Buffer. space immediately following a jump or branch.
1. The CISC stands for ___________ 6. Both the CISC and RISC architectures have
a) Computer Instruction Set Compliment been developed to reduce the ______
b) Complete Instruction Set Compliment a) Cost
c) Computer Indexed Set Components b) Time delay
d) Complex Instruction set computer c) Semantic gap
View Answer d) All of the mentioned
View Answer
Answer: d
Explanation: CISC is a computer architecture Answer: c
where in the processor performs more complex Explanation: The semantic gap is the gap between
operations in one step. the high level language and the low level language.
2. The computer architecture aimed at reducing 7. Out of the following which is not a CISC
the time of execution of instructions is ________ machine.
a) CISC a) IBM 370/168
b) RISC b) VAX 11/780
c) ISA c) Intel 80486
d) ANNA d) Motorola A567
View Answer View Answer
Answer: b Answer: d
Explanation: The RISC stands for Reduced Explanation: None.
Instruction Set Computer. advertisement
3. The Sun micro systems processors usually 8. Pipe-lining is a unique feature of _______
follow _____ architecture. a) RISC
a) CISC b) CISC
b) ISA c) ISA
c) ULTRA SPARC d) IANA
d) RISC View Answer
View Answer
Answer: a
Answer: d Explanation: The RISC machine architecture was
Explanation: The Risc machine aims at reducing the first to implement pipe-lining.
the instruction set of the computer.
9. In CISC architecture most of the complex
4. The RISC processor has a more complicated instructions are stored in _____
design than CISC. a) Register
a) True b) Diodes
b) False c) CMOS
View Answer d) Transistors
View Answer
Answer: b
Explanation: The RISC processor design is more Answer: d
simpler than CISC and it consists of fewer Explanation: In CISC architecture more emphasis
transistors.
218
is given on the instruction set and the instructions Answer: a
take over a cycle to complete. Explanation: The stages in the pipelining should
get completed within one cycle to increase the
10. Which of the architecture is power efficient? speed of performance.
a) CISC
b) RISC 5. In pipelining the task which requires the least
c) ISA time is performed first.
d) IANA a) True
View Answer b) False
View Answer
Answer: b
Explanation: Hence the RISC architecture is Answer: b
followed in the design of mobile devices. Explanation: This is done to avoid starvation of the
longer task.
1. ______ have been developed specifically for
pipelined systems. 6. If a unit completes its task before the allotted
a) Utility software time period, then _______
b) Speed up utilities a) It’ll perform some other task in the remaining
c) Optimizing compilers time
d) None of the mentioned b) Its time gets reallocated to a different task
View Answer c) It’ll remain idle for the remaining time
d) None of the mentioned
Answer: c View Answer
Explanation: The compilers which are designed to
remove redundant parts of the code are called as Answer: c
optimizing compilers. Explanation: None.
2. The pipelining process is also called as ______ 7. To increase the speed of memory access in
a) Superscalar operation pipelining, we make use of _______
b) Assembly line operation a) Special memory locations
c) Von Neumann cycle b) Special purpose registers
d) None of the mentioned c) Cache
View Answer d) Buffers
View Answer
Answer: b
Explanation: It is called so because it performs its Answer: c
operation at the assembly level. Explanation: By using the cache we can reduce the
speed of memory access by a factor of 10.
3. The fetch and execution cycles are interleaved advertisement
with the help of ________
a) Modification in processor architecture 8. The periods of time when the unit is idle is
b) Clock called as _____
c) Special unit a) Stalls
d) Control unit b) Bubbles
View Answer c) Hazards
d) Both Stalls and Bubbles
Answer: b View Answer
Explanation: The time cycle of the clock is
adjusted to perform the interleaving. Answer: d
Explanation: The stalls are a type of hazards that
4. Each stage in pipelining should be completed affect a pipelined system.
within ____ cycle.
a) 1 9. The contention for the usage of a hardware
b) 2 device is called ______
c) 3 a) Structural hazard
d) 4 b) Stalk
View Answer c) Deadlock
219
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: a
Explanation: Data hazards are generally caused
when the data is not ready on the destination side.
220