You are on page 1of 173

1.

Information increases knowledge, reduces uncertainty, adds value when used.


[True]

2.

Data are facts which have been recorded.


[True]

3.

Communication systems include a source, a message and the destination.


[True]

4.

Explained jargon is a barrier to understanding.


[False]

5.

A management information system provides information for tactical level decision making.
[True]

6.

For decision making either formal or informal source may provide information but they should complement one another.
[True]

7.

Scientific management was a production oriented rational approach to organizations pioneered by Weber.
[False]

8.

Motivation is the driving force or commitment people have for doing things.
[True]

9.

Maslows hierarchy of needs range from physiological needs to self-actualization needs.


[True]

10.

There is no complete understanding about what motivates people but the assumptions what managers uses strongly influences the way he carries out his task.
[True]

11.

Modern approaches emphasize the need to take individual circumstances into account when designing organizations.
[True]

12.

Burus and stalken categorized organizations into mechanistic and organic.


[True]

13.

By type of technology used by the firms was found inadequate to influence the organizational structure.
[True]

14.

Within every formal organization exists an informal one.


[True]

15.

Depart mentation is the result of grouping people by specialization.


[True]

16.

Mixed form of specialization frequently occurs.


[True]

17.

Decentralization occurs when authority the center is week.


[False]

18.

Since standard and commercially available MIS packages has inherent limitations hence MIS of an organization must he tailor made.
[True]

19.

Decentralized organization can be more responsible and flexible hence centralized control should be limited to only few disciplines.
[True]

20.

Flat structures have a short chain of command with a broad span of control and tend to produce better results.
[True]

21.

Fayols original definition of management still holds good inspite of numerous definitions being floating around.
[True]

22.

Management takes place at all levels.


[True]

23.

Decision making which is choosing between alternatives, is an integral part of all management tasks.
[True]

24.

The strategic level of management supersedes all other level of management.


[True]

25.

Leadership is the ability to mould people and made them tow your line of thinking.
[True]

26.

Job enlargement is essentially more of job enrichment which involves more scope and more autonomy.
[True]

27.

Management by objectives (MBO) is a formal structured form of delegation where the

emphasis is on results achieved and not on how they have been achieved.
[True]

28.

Controls are the mandatoring process mostly undertaken to get the feedback.
[True]

29.

Positive feedback causes the system to dampen or deviate from the original target.
[True]

30.

Control efforts should be directed where it can be more effective.


[True]

31.

Delays are inherent in control cycle system.


[True]

32.

Closed loop systems are where no feedback loop exists and control is exercised through external source information.
[True]

33.

Managers may be actively involved in MIS design.


[True]

34.

Management by exception is more than a reporting method. It is one of the style of management.
[True]

35.

The computer misuse act relates to most of the computer related offences.
[True]

Select any one of the correct answers

36.

Information may be a. b. c. d. Demand/response Deposit/reference Internal/external All of the above

Answer

37.

Operational level MIS is a. b. c. d. Formal Structured Computer based All of the above

Answer

38.

All system definitions contain a. b. c. d. Parts Relationship Objectives All of the above

Answer

39.

The main theoretical approaches to organizations include a. b. c. d. Scientific Management The departmental approach The human relation school All of the above

Answer

40.

The main traditional principles of organizations include. a. b. c. d. e. Scalar principle Unity of command Span of control and specialization None of the above All of the above

Answer

A DNS server gets its data from another DNS server. a) root b) primary c) secondary d) All of the above

Operating system functions may include a) input/output control b) virtual storage c) multiprogramming d) All of the above e) All of the none

The necessary and sufficient sondition for a dead to occurs The necessary and sufficient conditions for deadlock to occurs a) Mutual Exlusion b) Hold and Wait

c). No preemption d) Circular Wait e) All of the above The term operating system means a) a set of programs which controls computer working b) conversion of high level language into machine code c) the way a computer operator works d) the way a floppy disk drive operates e) none of the above

E-commerce infrastructure involves : a) Web Servers b) E-catalogs c) Networks d) All of the above

E-Business is integration Web with a) Governance b) IT c) Telecommunication d) Media Which of the following database element? a) data b) relationship c) constraints and schema d) all of the above Object Oriented Programming permits a) Inheritance b) Polymorphism c) Reusability d) All of the above e) None of the above

Structured Programming permits a) Inheritance b) Abstraction c) Polymorphism d) None of the above

ERP system has evolved from: a) MIS b) DPS c) TPS d) Both MIS, TPS

Q1: ________ is a method of generating information which is used by management of organization for decision making, control of activities, operations etc. a. b. c. d. Transaction processing system. Decision support system. Management information system. None of the above.

Q2: During the period 1940 and 1960 computers were commercially used for ______ and __________. a. b. c. d. Transation processing, decision support. Transaction processing, payroll work. Payroll work, decision support. Census and payroll work.

Q3: ________ helps in conducting the daily routine activities like sales order entry, airline reservations, payroll etc. a. b. c. d. Office systems. Transaction processing system. Knowledge based system. Management information system.

Q4: __________ is a system that represents knowledge. a. Office systems. b. Transaction processing system. c. Knowledge based system. d. Management information system.

Q5: _________ system helps the management in decision-making by providing them with reports and different statistical tools. a. b. c. d. Office systems. Management information systems. Knowledge based systems. Management reporting systems.

Q6: ________ system helps the senior executives in the organization in decision-making through advanced graphics and communication. a. b. c. d. Executive information system. Management information system. Decision support system. Expert system.

Q7: _________ systems form the workstations and office systems in an organization which help in including the latest technology in the working of the organization. a. b. c. d. Operational level systems. Knowledge level systems. Management level systems. None of the above.

Q8: ________ are smaller in size as compared to desktop computers. a. b. c. d. Personal computers. Notebook computers. Both A and B. None of the above.

Q9: PDA stands for: a. b. c. d. Personal digital assistant. Personal device assistant. Practical device assistant. None of the above.

Q10: __________ refers to unit which processes the input received the way it has been instructed. a. b. c. d. Memory. PDA. Processor. Facilitator.

Q11: A PC can _______ data at a very high speed. a. b. c. d. Input. Output. Process Store

Q12: OLAP stands for a. b. c. d. Online analytical processing. Offline analytical processing. Offline absolute preparation. None of the above.

Q13: payroll system is a __________. a. b. c. d. Management information system. Transaction processing system Executive information system. Expert system

Q14: In _________ systems there is a direct interaction of the operator and TPS system. a. b. c. d. Batch systems. Online systems. Both A & B None of the above.

Q15: _________ refers to system in which there are predefined multiple instances of various modules used in business applications. a. b. c. d. OLTP. OLAP. EIS. TPS.

Q16: _________ is a flexible system which can be customized to suit the organization needs. a. b. c. d. DSS. EIS MIS OOS

Q17: __________ is a system developed as model, which are representative of real world cases. a. b. c. d. Business process systems. Object Oriented Systems. Decision Support Systems. None of the above.

Q18: __________ is a structure that uses the resources from the environment like manpower, raw materials, capital etc and returns the output like products and services to the environment. a. b. c. d. Management. Organization. System. All of the above.

Q19: __________ means the behavior of the object differently to different messages. a. b. c. d. Inheritance. Polymorphism. Encapsulation. Neural networks.

Q20: _________ is an enterprises plan for achieving sustainable competitive advantage over, or reducing the edge of, its advertisements. a. b. c. d. Low cost. Competitive strategy. Competitive necessity. Collaboration.

Q21: ________ is a major innovation changing the way organizations conduct their business. a. b. c. d. Regeneration. Reengineering. Relocation. None of the above.

Q22: _________ is a specific measure of quality, representing 3.4 defects per million opportunities. a. b. c. d. TQM. Reengineering. Six Sigma. None of the above.

Q23: ___________ is a data structure used to store organized information. a. b. c. d. Data. Database. Data mining. Data mart.

Q24: _________ is a process of progressively ascertaining the information needs, developing methodology, trying it out on a smaller scale with respect to the data and complexity, ensuring that it satisfies the needs of users. a. b. c. d. Life style approach. Prototype approach. Management approach. None of the above.

Q25: ________ are closed systems with little or no uncertainty about the information needs. a. b. c. d. Prototype approach. Life style approach. Management approach. Recursive approach.

Q26: _________ is a course of action where the process begins and reaches the desired level of stability. a. b. c. d. Unfreezing. Freezing. Refreezing. Choosing.

Q27: _________ is used to create and store definitions of data, location, format for storage and other characteristics. a. b. c. d. Data mart. Database. Data dictionary. None of the above.

Q28: _________ creates an awareness of those aspects of business where the manager is forced to think, decide and act. a. b. c. d. Data. Information. Knowledge. Objectives.

Q29: _________ planning is adopted by the top-level executives in the organization. a. b. c. d. Tactical level planning. Strategic level planning. Operational level planning. None of the above.

Q30: _________ systems typically handle the manufacturing, logistics, distribution, and inventory, shipping, invoicing and accounting for a company. a. b. c. d. Enterprise Resource Planning. Data warehouse. Data mart. Customer relationship management.

Q31: __________ is the science and technology based on various functions to develop a system that can think and work like a human being. a. b. c. d. Artificial intelligence. Expert intelligence. Computer system. None of the above.

Q32: _________ is a micro cell, which is connected to thousands of other micro cells in the brain and all the other parts of the human body containing nerves. a. b. c. d. Artificial intelligence. Neuron Expert system. All of the above.

Q33: _________ provides information about product, and sells and delivers directly to customer or business organization. a. Transaction.

b. Virtual store. c. Online marketing. d. Content selling. Q34: _________ provides a marketing platform where buyers and sellers can meet to exchange information, negotiate and place order for delivery. a. b. c. d. Virtual store. Transaction processing. Online marketing. Content selling.

Q35: ________ adds value in the manufacturing by the way of simplification of processes in production and design. a. b. c. d. E-commerce. Computer Integrated Manufacturing. Data warehouse. None of the above.

Q36: E-business systems use_________ and run on Internet platform. a. b. c. d. Client server architecture. E-business architecture. Both A and B. None of the above.

Q37: _________ help in automatic scheduling, notification and reminding to the participants. a. b. c. d. E-collaboration. Video conferencing. Groupware tools. Web publishing.

Q38: _________ is the one, which, effectively and efficiently, ensures the achievement of the goal for which the decision is made. a. b. c. d. DSS. Rational Decision Making. Irrational decision-making. None of the above.

Q39: If a decision can be based on a rule, method or even guidelines, it is called the ________. a. b. c. d. Programmed Decision. Non-programmed decision. Semi-programmed decision. All of the above.

Q40: when a decision maker must make a sequence of decisions, the ________ is useful in selecting the set

of the decisions. a. b. c. d. Rational decision-making. Decision tree analysis. Optimization techniques. Pay off analysis.

Q41: Which one of the following are methods for selection of decision alternatives: 1. 2. 3. 4. a. b. c. d. 1,2,3,4 1,3,4 1,2,3 3,4 Optimization methods. Payoff analysis Decision tree analysis. The law of requisite variety.

Q42: True or False: 1. When all the alternatives and their outcomes are not known with certainty, the decision is made with the help of payoff analysis. 2. The requisite variety of situations means that for efficient programmed decision it is necessary for the manager to provide the decision rules to handle the situation. a. b. c. d. 1-true, 2- false. 1-false, 2-false. 1-true, 2- true. 1-false, 2-false.

Q43: Analytical modeling is analyzed in which of the following ways: 1. 2. 3. 4. a. b. c. d. What if analysis. Goal seeking analysis. Sensitivity analysis. Goal achieving analysis.

1,2,3,4. 1,2 2,3,4 1,4

Q44: In _______, one analysis the problem in exactly reverse reverse way, and in goal seeking one does not _________ but tries to achieve a goal of an optimum value arrived at after satisfying all the constraints operating in the problem. a. b. c. d. Goal seeking analysis, fix the goal. Optimization analysis, fix the goal. What if analysis, fix the objective. None of the above.

Q45: The _________ system refers to a class of system, which supports in the process of decision-making but does not always give __________ itself. a. b. c. d. MIS, decision. DSS, decision. EIS, support. Expert system, support.

Q46: The use of _________, _________ or _________ is the basis for the model. a. Rules, formula or mathematical expressions. b. Expressions, theories, concepts. c. Algorithms, theories, concepts. d. Case studies, algorithms, theories.

Q47: The_________ and _________ techniques have emerged as very powerful tools for planning and control on one-time tasks or projects. a. b. c. d. GANTT, PERT PERT, CPM Corporate, management. None of the above.

Q48: Which one of the following are cost accounting systems: 1. 2. 3. 4. a.1, 2, 3,4 b. 1,3,4. c. 1, 4 d.1, 2,3 Job order cost system Process cost system. Period cost system. Management cost system.

Q49: which one of the following are knowledge management tools: 1. 2. 3. 4. 5. Database management tools. Data warehouse. Process modeling. Linear programming. PERT

a. b. c. d.

1,2,3,4,5 1,3,4,5 1,2,3 1,5

Q50: Which one of the following are components of Knowledge Based Expert System. 1. 2. 3. 4. a. b. c. d. 1,2,3,4 1,2,3 1,2,4 1,4 User control mechanism. Knowledge base. Inference mechanism Interference mechanism.

Q51: _________ is a database of knowledge consisting of the foundations, facts, judgments, rules, formulas, intuition and experience and __________ is a tool to interpret the knowledge available and to perform logical deductions in a given situation. a. b. c. d. User control mechanism, inference mechanism. Knowledge base, inference mechanism. Interference mechanism, knowledge base. User control mechanism, interference mechanism.

Q52: ________ is an organized data structure of knowledge and __________ is a conditional statement of an action that is supposed to take place, under certain conditions. a. b. c. d. Rule, frame. Frame, rule. Database, frame. Program, rule.

Q53: _________ is a computer network covering a small geographic area and _________ is a computer network that covers a broader area. a. b. c. d. WAN, LAN LAN, MAN MAN, WAN LAN, WAN

Q54: ________ is a WAN technology in which users share common carrier resources and _________ is a device that interprets digital and analog signals, enabling data to be transmitted over voice grade telephone lines. a. b. c. d. Internet, modem. Packet switching, modem. Point-to-point links modem. Modem, Internet.

Q55: Web publishing allows cumbersome corporate knowledge to be maintained and easily accessed throughout the company using ________ and _________ technologies. a. b. c. d. Extranet and web. Extranet and intranet. Hypermedia and web. Hypermedia and intranet.

Q56: A CIO is ________ and ________ about opportunities for the use of IT in the respective industry. a. b. c. d. Proactive and knowledgeable. Active and knowledgeable. Reactive and acknowledgeable. Reactive and proactive.

Q57: _______ are designed for individual user and ________ can process large amounts of data and can perform more than one trillion calculations per second. a. b. c. d. Supercomputer, minicomputer. Mainframe computers, minicomputer. Supercomputer, mainframe computers. Minicomputer, supercomputers.

Q58: In any information system application, the steps involved are data processing, _________ , application processing and _________. a. b. c. d. Transaction processing, system processing. Database processing, system processing. Database processing, transaction processing. System processing, information processing.

Q59: The objective of ______ in the information systems design is to assure the quality of information. a. b. c. d. SQM. MQM. TQM None of the above.

Q60: Which one of the following are real time system components. 1. 2. 3. 4. a. b. c. d. 1,2,3,4 1,2,3 1,4 1,2,4 Data acquisition. Measurement, interpretation and evaluation. Decision-making and action. Initialization, operation and control.

Q61: Match the following:

1. LAN 2. WAN 3. MAN 4. Point-to point-links

A. Is a computer network that covers broader area. B. Is a computer network covering a small geographic area. C. large computer networks spanning a city. D. Provides a single, pre-established communications path.

5. Circuit switching a. b. c. d. 1-b, 2-a, 3-c, 4-d, 5-e 1-a, 2-b, 3-c, 4-d, 5-e 1-d, 2-c, 3-b, 4-a, 5-e 1-c, 2-b, 3-e, 4-a, 5-d

E.. Allow data connections that can be initiated when needed and terminated when communication is complete.

Q62: Which one of the following are types of computers systems used in the organization to support the MIS. 1. 2. 3. 4. a. b. c. d. 1,2,3,4 1,2,3 1,2 1,4 Network servers Mainframe computers Minicomputers. Supercomputers

Q63: Which one of the following are benefits of MIS: 1. Speedy access to information. 2. Interpretation of data. 3. Quick decisions 4. Speedy actions 5. Decreased productivity 6. Increased transaction cost a. b. c. d. 1,2,3,4,5,6 1,2,3,5 1,2,3,4 1,3,5,6

Q64: Arrange the stages of transformation in correct sequence: 1. Storage systems. 2. Appraisal of the procedures 3. Formulation and coding 4. Review 5. Verification and validation. 6. Documentation. 7. Types of documents. a. 2, 7, 1, 3, 5, 4, 6 b. 1,2,3,4,5,6,7

c. 2,1,3,4,5,7,6 d. 1,3,2,4,6,5,7 Q65: Which one of the following are roles of IS in Business. 1. Support business process and operations. 2. Support business decision making 3. Support strategies for competitive advantage. 4. Support analysis of business opportunities.

a. b. c. d.

1,2,3,4 1,2,4 1,4 1,2,3

Q66: Which one of the following are types of IS. 1. TPS. 2. Office systems. 3. KBS 4. DSS 5. MRS 6. ESS 7. DLL a. b. c. d. 1,2,3,4,5,6,7 1,2,3,4,5,6 1,3,4,5,6 3,4,6,7

Q67: Which one of the following are four generic strategies under Porters framework: 1. Cost leadership. 2. Differentiation. 3. Cost focus. 4. Focused differentiation. 5. Bargaining power 6. Threat of substitutes. a. b. c. d. 1,2,3,5 1,2,3,4 1,2,3,6 2,3,4,6

Q68: Match the following: 1. Vertical quasi-integration 2. Outsourcing 3. Quasi-diversification 4. Object oriented systems i. Activities previously performed within one enterprise due to high transaction risk may be shifted to third pary providers. ii. the existing relationship with customers and suppliers can become more tightled coupled. iii. the enterprise cooperate across markets to leverage their key resources in new areas. iv. System developed as models, which are representative of real world cases.

a. b. c. d.

1-ii, 2-I, 3-iii, 4-iv 1-I, 2-ii, 3-iii, 4-iv 1-iv, 2-iii, 3-ii, 4-I 1-iii, 2-ii, 3-I, 4-iv

Q69: Match the following: 1. Prototyping approach 2. Life cycle approach 3. Data warehousing 4. Metadata a. b. c. d. 1-I, 2-ii, 3-iii, 4-iv 1-ii, 2-I, 3-iv, 4-iii 1-ii, 2-I, 3-iii, 4-iv 1-iv, 2-iii, 3-ii, 4-I i. The user is confident and confirms the specifications and the information needs. ii. user of the system wants to tryout the system before he commits the specification and the information requirements. iii. Is a copy of transaction data specially structured for querying and reporting. iv. data about the data.

Q70: Match the following: 1. Unfreezing 2. Choosing 3. Refreezing a.1-I, 2-ii, 3-iii b.1-b, 2-i, 3-c c.1-iii, 2-ii,3-I d.1-iii, 2-I,3-ii Q71: Match the following: 1. Feasibility study 2. Design 3. Prototyping 4. Implementation i. It is concerned with the specification of the information system structure. ii. It is concerned with the programming of the final operational version of the information system. iii. It is concerned with determining the cost effectiveness of various alternatives in design of the information system. iv. Simplified implementation that is produced in order to verify in practice that the previous phases of the design were well conducted. a. where the process begins and reaches the desired level of stability. b. make people more receptive and interested in change. c. where the change is consolidated and equilibrium is reinforced.

a. b. c. d.

1-iii, 2-I, 3-iv, 4-iii 1-I, 2-ii, 3-iii, 4-iv 1-ii, 2-I, 3-iii, 4-iv 1-iv, 2-ii, 3-I, 4-iii

Q72: Match the following: 1. Organizational 2. Functional managerial II. Information required by number of personnel, departments and divisions or the functions in the organization. II. Status information on a particular aspect, such as utilization, profitability standard, requirement versus attainability.

Knowledge 3. Decision support 4. Operational a. b. c. d. 1-ii, 2-I, 3-iii, 4-iv 1-iii, 2-I, 3-iii,4-iv 1-iv, 2-ii, 3-I, 4-iii 1-I, 2-iii, 3-ii, 4-iv

III. Purchases, sales, production, stocks, receivables, payables. IV. Information required by operational and lower level management.

Q73: Arrange the methods of determining information requirements in proper sequence: 1. Determining from existing system. 2. Asking or interviewing. 3. Experimentation and modeling. 4. Analyzing the critical success factors. a. b. c. d. 1,2,3,4 2,1,3,4 1,3,4,2 2,1,4,3

Q74: Match the following: 1. DSS 2. 3. Neuron 4. i. Interactive, flexible computer based information system. AI ii. A system that can think and work like a human being. iii. A micro cell connected to thousands of other micro cells. Robotics iv. This technology produces robot machines with computer intelligence and computer controlled, human like physical capabilities.

a. b. c. d.

1-ii, 2-iii, 3-iv, 4-I 1-iii, 2-iv, 3-ii, 4-I 1-I, 2-ii, 3-iii, 4-iv 1-iv, 2-ii, 3-iii, 4-I

Q75: Decision Support System can be based on which one of the following models. 1. Behavioral models. 2. Management science models. 3. Operations research models. 4. Management model. 5. Decision model. a. b. c. d. 1,2,3,4,5 1,2,3 1,3,4,5 1,4,5

Question No: 1 ( M a r k s: 1 ) A diode functions as the electronic version of a __________-way valve. one two three four Diodes A diode functions as the electronic version of a one-way valve. By restricting the direction of movement of charge carriers, it allows an electric current to flow in one direction, but blocks it in the opposite direction. A diode's current-voltage, or IV, characteristic can Question No: 2 ( M a r k s: 1 ) What is name of book from which word algorithm is taken ? Algebra and trigonometry Introduction to algorithms Research for new horizons Algoritmi de numero Indorum Origin of the Term Algorithm The name derives from the title of a Latin book: Algoritmi de numero Indorum .That book was a translation of an Arabic book: Al-Khwarizmi Concerning the Hindu Art of Reckoning Question No: 3 ( M a r k s: 1 ) Tags always placed between the and tags of a Web page. True False Question No: 4 ( M a r k s: 1 ) _______ consists of cells arranged in rows & columns Spreadsheets Software Word processor Presentation Software Microsoft Paint Software The Structure of A Spreadsheet Collection of cells arranged in rows and columns

Each cell can contain one of the following:Numbers Text Formulas These cells display either the number or text that was entered in them or the value that is found by executing the formula Question No: 5 ( M a r k s: 1 ) ____ was designed as a replacement for typewriter. Spreadsheet Software Word Processor Software Presentation Software Database Software Word Processors Probably the most popular productivity app Initially designed as a replacement for the typewriter Automation Automatic end-of-line soft carriage return Style sheets Table of contents & index Spelling & grammar checking Question No: 6 ( M a r k s: 1 ) ________ manages the HW and SW resources ( memory, disk drives etc) of the computer system, often invisibly. Explorer.exe System Files Operating System Application Software The Role of An OS Manages the HW and SW resources of the computer system, often invisibly. These include the processor, memory, disk drives, etc. Provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW Question No: 7 ( M a r k s: 1 )

To display a radio button on the web page, we use ___ tag. INPUTBUTTON INPUT RADIOBUTTON RADIO Radio Button Input Element <INPUT type=radio name=radioButtonName checked value=selectedValue > Question No: 8 ( M a r k s: 1 ) Machine language is also called Assembly Language Binary Language High Level Language HTML Language High-level programming languages, while simple compared to human languages, are more complex than the languages the uP actually understands, called machine languages each different type of microprocessors has its own unique machine language lying between machine languages & high-level languages are languages called Assembly languages Question No: 9 ( M a r k s: 1 ) When the user needs something to be done by the computer, he/she gives instructions in the form of _____ to computer ____. Software, Hardware Hardware, Software System Software, Application Software Graph, Monitor When the user needs something done by the computer, he/she gives instructions in the form of SW to computer HW Question No: 10 ( M a r k s: 1 ) A truth table defines the _________of a logic function for all possible _________.

Input -- Outputs Output Inputs Process -- Inputs Input -- Processes what is the truth table of a logic function A truth table defines the output of a logic function for all possible inputs Question No: 11 ( M a r k s: 1 ) which one is correct? Both and Question No: 12 ( M a r k s: 1 ) WWW stands for: Wide World Web World Wide Web World White Web World Web Wide Question No: 13 ( M a r k s: 1 ) A _________translates a high-level language (that is easy to understand for humans) into a language that the computer can understand. Computer Transistor Compiler Device Question No: 14 ( M a r k s: 1 ) Deep Blue was the name of: computer human city

game In 1997 Deep Blue, a supercomputer designed by IBM, beat Gary Kasparov, the World Chess Champion. Question No: 15 ( M a r k s: 1 ) Data travels through bus in the form of ---------------------------. Packets Bits Bytes Word Question No: 16 ( M a r k s: 1 ) Command which saves the selected text before deleting is. Copy Delete Cut Undo Question No: 17 ( M a r k s: 1 ) AutoCAD falls in the category of _________________. Engineering Applications Graphics Applications Scientific Application Business Applications Question No: 18 ( M a r k s: 1 ) In Spreadsheets, you can create a relationship between two cells by using _____. Numbers Text Formulas None of the given choices Things that you must remember!! Make sure the "Set Cell" cell is a formula or function or cell reference. Make sure you have set that sell to a reasonable number.

Make sure the "By Changing Cell" cell is a number or blank, and not a formula, function or cell reference like =C5. Make sure there is a link by formulas between the two cells you entered in the Goal Seek. Question No: 19 ( M a r k s: 1 ) Which of the following symbol is used for multiple line comments in JavaScript? / // /* //* Question No: 20 ( M a r k s: 1 ) ____________ is a system software that converts the source code written in high level language into machine language code. Utilities Drivers Language Translator None of the these Language Translators Human programmers write programs in a language that is easy to understand for them. They use language translators to convert that program into machine language. It converts the human understandable code in uPs understandable code, i.e. a language that is easy to understand for the uPs. Question No: 21 ( M a r k s: 1 ) __________ is a particularly good language for processing numerical data, but it does not lend itself very well to large business programs. BASIC PASCAL JAVA FORTRAN FORTRAN is a particularly good language for processing numerical data, but it does not lend itself very well to large business programs. Question No: 22 ( M a r k s: 1 ) Which of the following number system is used by microprocessor? Binary

Decimal Octal Hexadecimal Question No: 23 ( M a r k s: 1 ) The __________Processor is specially designed for PDA? PowerPC StrongARM Crusoe SPARC Question No: 24 ( M a r k s: 1 ) Mainframe Computers are also called _____. Enterprise Servers Personal Servers Enterprise Managers Window Servers Question No: 25 ( M a r k s: 1 ) URL is a/an ________ Device Component Address Tool Question No: 26 ( M a r k s: 1 ) Ada, Countess of Lovelace developed first: Computer Website Computer Program Analytical engine Question No: 27 ( M a r k s: 1 ) What is the problem with Brute Force Strategy approach?

Question No: 28 ( M a r k s: 1 ) What was the name of first computer in which binary numbers were used instead of decimal numbers ? Question No: 29 ( M a r k s: 2 ) How can we say that JavaScript is Not Object-Oriented language? Question No: 30 ( M a r k s: 3 ) List down the names of any three parameters on which we analyze an algorithm. Question No: 31 ( M a r k s: 5 ) Write differences between Shareware and Trialware software. Question No: 32 ( M a r k s: 5 ) What is function of Goal Seek command in Excel?
onFocus executes the specified JavaScript code when ___________ a window receives focus a form element receives input focus a window receives focus or when a form element receives input focus None of the Given.

CERN releases WWW in: 1992 1993 1994 None of the given choices

Communications on the internet is controlled by a set of two protocols, named : HTTP & SMTP FTP & TELNET TCP & IP None of the given choices

One of the disadvantages of working at home is________________

Family life may be happier because of living at home. Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night Family life may become happier because he can give more time to his family. There is no disadvantage of working at home.

The greatest, shared resource of information created by humankind is: Web Dictionary Vocabulary Glossary http://groups.google.com/group/vuZs

There are _____________ types communication channels. 2 3 4 5

The Cyberwarefare is a ______ Crime War Software Game

In the statement PopUp(Message) : PopUp is the function Name, Message is the argument Message is function identifier Syntax Error: functions cannot be called in this way Error: function is undefined

RGB scheme stands for _________________________________. Red Grey Blue Red Green Brown Red Green Blue Red Green Black

_____________ is the part of the virus that generally consists of malicious computer instructions Off load Payload Loader Transmitter

Unlike viruses, __________________ are stand-alone programs Trojan horses Logic- or time-bombs Worms None of the given

Voice over IP has _____ modes

2 3 4 5

We use __________ to stop Break-Ins. Scanners Intrusion detectors Firewalls Intrusion detectors and Firewalls

Which one can lead user to leave your website? Simple design Poor navigation Information layout Adaptable design

_____________________ are the subcategories of AI Expert Systems Robotics Natural Language Processing All of the above

With the Help of FTP we can:

List, change, create folders on a remote computer Upload and download files Transferring Web content from the developers PC to the Web server All of the given choices

Which protocol is used for receiving E-mail messages? FTP POP Telnet Protocol SMTP

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________. Cooperation Shared responsibility Networking All of the given

___ is used to transfer files between computers on a TCP/IP network FTP POP Telnet Protocol SMTP

http://groups.google.com/group/vuZs Which of the following is True about pareseFloat(String) function: I) If the first character cannot be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point number. III) Parses the string argument; returns a FP number. IV) Non of given options. I and II Only II and III Only I and III Only IV Only

Event-driven programs can ____________________ events. capture respond capture and respond None of the Given.

Which of the statements is NOT true about Color Usage Guidelines for developing a presentation? Use color sparingly to to highlight a point, but don't get carried away Do not use colors like yellow or red for background except where needed. Do not use colors like green, blue and such like colors except where needed. None of given options

_________________ Type of databases management systems are supporting Terabytes of Data Personal Desktop Enterprise

Single-user

Because of the ever-decreasing costs of verbal, text, video communications; the distances have _________ Increased Expanded Contracted Lengthened

The structure of the networked organization is _________. Simple Flexible Complex All of the given

A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored in a ___________ format. Scalar Vector Both a & b ____ is a type of computer-to-computer messaging. TCP Telnet E-mail FTP

None of these

RDBMS stands for ________________________________ Relative Data Base Management System Relational Data Base Management System

Recursive Data Base Management System Responsible Data Base Management System

Using Color Mapping scheme only a limited number of color called _____________ are allowed. Reserved Pointers Platelet None of these

Using _________ topology, adding new nodes is difficult. Ring Bus Star None of the given choices

Problems with old presentation methods was (transparencies and projectors etc): They were costly Electronic transmission, in some cases, was not easy Presentation some times gets ambiguous All of given options

ARPANET splits into two nets to keep military & non-military network sites separate, named :

ARPANET & MILNET MICRONET & MILNET PICONET & ARPANET None of the given choices

Arguments values are passed to the function _________ by value by reference

Both a & b Non of the Given.

__________________ is a field that uniquely identifies each record stored in a table. Primary Key Foreign Key Secondary key Special Key

The IP address consists of _____ bits 64 32 16 128

Credit Card Fraud can be minimized by using _________________ single credit card numbers multiple-use credit card numbers single-use credit card numbers Firewalls

hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type Number String Boolean None of the given

Ref: you are evaluating a condition (temperature ==40) and result of this condition is getting stored in HotWeather variable. which is boolean in form

Output of evaluation of condition is in the form of true or false which is a boolean value Here I Try to key few lines to help you to see live (copy paste these in any test.htm) and run in broswer

NCSA stands for : NationalCenter for Supercomputing Applications NationalCenter for Supreme Applications NationalCenter for Super Authority None of the given choices

Self-replicating SW that eludes detection and is designed to attach itself to other files is called _____________. Trojans Viruses Sniffers Operating System

SVG stands for _________________________________________. Structured Vector Graphics Software Vector Graphics Structured Visual Graphics None of these

Viruses move from one computer to another with the __________ and spring into action when the _____________ is executed or opened Host Host Host Client Client Host Client Client http://groups.google.com/group/vuZs

____________________ is a layered structure consisting of a number of homogenous and simple processing elements. Genetic Algorithms Rule-based Systems Feed-Forward Network None of these

A property that gives the value of Pi is: PI() Graph.PI Math.PI Math.PI()

The smallest image forming element on a computer display is called ____________. Resolution Pixel Grey area None of these

SMTP stands for _______________________________________. Simple Mail Transfer Protocol Simple Mail Transparent Protocol Simple Mail Transfer Paradigm None of these

________________ network allows data to be sent directly from one computer to another. Ring Bus Star None of the given choices

Viruses attach themselves to other computer programs or data files, are known as____ Trojans Guests Hosts Spies

Avoid __________ to ensure readability of web page Overuse of bold and italics Use of paragraphs Use of white space Use of contrast colors

STP stands for : Shielded Twisted Pair Silver Twisted Pair Single Twisted Pair None of the given choices

In ______, the spies of one business monitors the network traffic of their competitors. Industrial intelligence Industrial Espionage Industrial spying Industrial surveillance

Color mapping scheme reducing the size of 2.25 MB graphic to _________ MB. 0.90 MB 0.75 MB 1.00 MB None of these

The functions which call themselves from their (own) body are called: Virtual functions Abstract functions Overriding functions Recursive functions

Browser sends _________ request to web server to access a file. SET GET TRANSFER All of the given choices

vuzs

The internet communities are ___________. Geographical based Interest based Country based Religion based

Infection propagation and Actual destructive are the components of _______________ Transmission mechanism Payload Worms Trojan Horse

1. Incorrect Based on the organizational definition of an organization, each of the following is a true statement except: Your answer: people make arrangements with subordinates and superiors about how work will be done. The correct answer: the primary production factors are capital and labor. INCORRECT.

2. Incorrect Organizations differ in their: Your answer: clear division of labor. The correct answer: ultimate goals and the types of power used to achieve them.

INCORRECT.

3. Correct A professional bureaucracy is a(n): Your answer: knowledge-based organization where goods and services depend on the expertise and knowledge of professionals. CORRECT.

4. Correct Each of the following is a common organizational feature except: Your answer: constituencies. CORRECT.

5. Incorrect The senior manager in charge of the information systems function in the firm defines: Your answer: network administrator. The correct answer: chief information officer. INCORRECT.

6. Correct The economic theory that views the firm as a nexus of contracts among self-interested individuals who must be supervised and managed is: Your answer: agency theory. CORRECT.

7. Incorrect Kotter argues that: Your answer: managers use their networks to execute personal agendas. The correct answer: managers do all of the above. INCORRECT.

8. Correct Deciding how to carry out specific tasks specified by strategic and middle management and establishing criteria for completion and resource allocation best describes: Your answer: operational control. CORRECT.

9. Incorrect A semi-structured decision made at the management level would be: Your answer: electronic scheduling. The correct answer: budget preparation. INCORRECT.

10. Incorrect A model of decision making stating that organizations are not rational and that decisions are solutions that become attached to problems for accidental reasons best describes the: Your answer: political model of decision making. The correct answer: "garbage can" model of decision making. INCORRECT.

11. Correct Strategic information systems are: Your answer: computer systems at any level of the organization that change goals, operations, products, services, or environmental relationships to help the organization gain a competitive advantage. CORRECT.

12. Incorrect A competitive strategy for developing new market niches for specialized products or services where a business can compete in the target area better than its competitors best describes: Your answer: market segmenting. The correct answer: focused differentiation. INCORRECT.

13. Incorrect The expenses a customer or company incurs in lost time and expenditure of resources when changing from one supplier or system to a competing supplier or system are: Your answer: development costs. The correct answer: switching costs. INCORRECT.

14. Incorrect A model based on the concept of a network where adding another participant entails zero marginal costs but can create much larger marginal gain defines: Your answer: vendor-managed inventory. The correct answer: network economics. INCORRECT.

15. Incorrect A movement from one level of a sociotechnical system to another is referred to as: Your answer: leveling. The correct answer: a strategic transition. INCORRECT. 1. Correct Information systems that monitor the elementary activities and transactions of the organizations are: Your answer: operational-level systems. CORRECT.

2. Incorrect Projections and responses to queries are information output characteristics associated with a(n): Your answer: MIS The correct answer: ESS INCORRECT.

3. Incorrect Summary transaction data, high-volume data, and simple models are information inputs characteristic of a(n): Your answer: DSS The correct answer: MIS INCORRECT.

4. Incorrect Which of the following individuals typically have less formal, advanced educational degrees and tend to process rather than create information? Your answer: knowledge workers The correct answer: data workers

INCORRECT.

5. Incorrect Management information systems usually: Your answer: help managers make decisions that are unique, rapidly changing, and not easily specified in advance. The correct answer: serve managers interested in weekly, monthly, and yearly results, not day-to-day activities. INCORRECT.

6. Correct Decision support systems usually: Your answer: help managers make decisions that are unique, rapidly changing, and not easily specified in advance. CORRECT.

7. Incorrect Identifying customers and markets using data on demographics, markets, consumer behavior, and trends is an example of a(n): Your answer: management-level sales and marketing information system. The correct answer: knowledge-level sales and marketing information system. INCORRECT.

8. Incorrect Deciding where to locate new production facilities is a(n) example of a manufacturing and production information system operating at the: Your answer: management level. The correct answer: strategic level. INCORRECT.

9. Correct Preparing short-term budgets is an example of a finance and accounting information system operating at the: Your answer: management level. CORRECT.

10. Incorrect Tracking employee training, skills, and performance appraisals is an example of a human resource information system operating at the: Your answer: management level. The correct answer: operational level. INCORRECT.

11. Correct Assembling a product, identifying customers and hiring employees are: Your answer: business processes. CORRECT.

12. Incorrect Which of the following is a network of facilities for procuring materials, transforming raw materials into intermediate and finished products, and distributing the finished products to customers? Your answer: primary chain The correct answer: supply chain INCORRECT.

13. Incorrect Information systems can facilitate supply chain management by: Your answer: providing product specifications. The correct answer: doing all of the above. INCORRECT.

14. Incorrect Enterprise systems support: Your answer: financial and accounting processes. The correct answer: all of the above. INCORRECT.

15. Incorrect Which of the following uses a vertical industrial network? Your answer: Ford The correct answer: Coca-Cola INCORRECT.

vuZs
Virtual University: Study Resource Bank

Home Study Portals o MBA Study PortalMasters in Business Administration o MCS Study PortalMasters In Computer Science o MIT Study PortalMasters in Information Technology o BSCS Study PortalBachelors in Computer Science (4 Years) o BIT Study PortalBachelors in Information Technology Old PapersPast Papers MCQsQuizzes Assignment& GDBs E-NotesArticles Reports& Projects LectureVideos FAQsFAQ

You are here: Home Like this Page? Press

Articles
IT430 Solved MCQs 100% with Ref shared by Kashagain B
Published on Saturday, 05 June 2010 09:46 Written by Bonfire

IT430 Solved MCQs

Solved and shared by Kashagain Part B SETSET(secure Electronic Transaction) was developed by Select correct option: Microsoft Netscape Navigator Master Cards and VISA All of the options

SSL stands for Select correct option: Secure Socket Layer Security Service Layer Sub Secured Length None of these What is basic advantage of symmetric algorithms? Select correct option: Symmetric key does not use any encryption Symmetric algorithms are faster Symmetric algorithms are easy to understand All of above Which of these keys can be used for encryption instead of using pair of private and public keys? Select correct option: Systematic key Asymmetric key Symmetric key All of above Using SSL, we type in URL as : Select correct option: https httpc httpc httpi Reference: (Page # 121) In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included: Select correct option: Buyer Accounts identifier Buyer password Address of Merchant Actual amount of money in favor of merchant

A unique large number, generated as a result of applying hash function on a message is called ______. Select correct option: Hash message Message digest Digitally singed message Secret message Reference: (page # 103) FVIPSS stands for _______. Select correct option: First Virtual Internet Payment System Server First Virtual International Payment System Server First Virtual International Payment System Services First Virtual Internal Payment System Services Reference: (Page # 110) Virtual PIN Payment system is considered suitable for ________. Select correct option: Low-cost items High-cost items Very expensive items Every kind of items Which of these is a primary participant in E-Cash Payment system? Select correct option: Buyer Bank Merchant All Most of the electronic payment systems on internet use cryptography. Select correct option: True False In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last withdrawals to the E-bank. Select correct option: 10 12 14 16 Reference: (page # 119) The key feature of E-Cash Payment system is Select correct option: Anonymity

Security Cryptography None of these Reference: (page # 116) At minting stage, the client is ..by E-Cashbank Select correct option: Known Unknown Secret informed Reference: (page. 118) Cipher suite is a combination of Select correct option: Cryptographic Algorithm Authentication methods Security layers Cryptographic Algorithm And Authentication methods Reference: (page. 121) SETSET(secure Electronic Transaction) was developed in Select correct option: 1995 1996 1997 1999 Reference: (page no. 122) Symmetric algorithms are faster than asymmetric. Select correct option: True False Reference: (Page # 105) Which entity does not include in SET(secure Electronic Transaction)? Select correct option: Seller Buyer Payment gateway Bank Reference: (Page # 122) A paper signature is believed to be more reliable than a digital signature. Select correct option:

True False If a key is 4 bit in length, how many unique key values are possible? Select correct option: 4 8 16 32 Explanation: A key value is always in binary form. A Binary Number is made up of only 0s and 1s. So each digit has only two possibilities: 0 or 1, So now we try to check all possible values of 4. 4 bit = 0000, 0001, 0010, 0100, 1000, 0011, 0110, 1100, 0101, 1010, 1011, 1101, 1001, 1110, 0111, 1111 Hence prove that if a key is 4 bit in length, then 16 unique key values are possible of that key. Hash function is a __________ Select correct option: Communication protocol Hardware device Encryption mechanism Log file Which of these attacks have been reported on symmetric key algorithms? Select correct option: Key Search Attacks Cryptanalysis System-Based Attacks All Reference: (Page # 108) Payment gateway is an organization which connects those entities to the internet which are offline. Select correct option: True False Reference: (Page # 122) How many elements an e-coin has? Select correct option: 1 2

3 4 Reference: (page # 116) EFT stands for _____________. Select correct option: Electronic Film Transmission Electronic Funds Transfer Electronic File Translation None of above Reference: (Page # 114)

________ is used to interpret and show contents of the webpage. Select correct option:

HTML Notepad Browser Computer

What is identified by the tag ? Select correct option:

Horizontal frame Bottom Frame Top Frame Vertical Frame

Which of the following is NOT an advantage of CSS? Select correct option:

Define the look of your pages in one place

Works on version 4 browsers or newer Easily change the look Implement same formatting each time tag is used. Links are used to connect ____________. Select correct option:

Images Text Images and web documents All of the given


An algorithm that always takes the best immediate or local solution while finding an answer is called____.

Deterministic Algorithm Non deterministic Algorithm Greedy Algorithm Randomized Algorithm

Which of the following command allows you to recover form mistakes in MS Word?

Clear Edit Undo Break

A ____________ operating system allows many users to take advantage of the computer's resources, simultaneously Single user Multi- user Single tasking Multi tasking

Network Interface Card is an __________ device Input Output Input/Output Storage

The decimal equivalent of binary 1000 is 7 8 9 10 http://groups.google.com/group/vuZs Which of the following is NOT RDBMS software? My Sql MS Excel Oracle SQL Server

A computer virus is a Software that saves the computer from being damaged. Application software that helps to make different type of viruses and worms Program that spreads itself and destroys other program Program that corrects the problems in your computer

What will be the result of a? a = Math.abs(-23)

23 -23 23.0 2.3 http://groups.google.com/group/vuZs A Special program required to view swf (Shockwave Flash) files in web Browser is called

TFlash Vflash plug-in None of the given options

Using Java Script you can write a character at random location on screen By applying randomCh() method With the help of String object With the help of random character property There is no built in approach in Java Script

If incorrectly we enter the negative age it is check by

Limit Integrity Type Integrity Referential Integrity Physical Integrity

Which protocol is use to transfer a file over the network?

UDP FTP TCP OSI

One can send an email message to a remote computer using _______ protocol HTTP SMTP FTP TELNET http://groups.google.com/group/vuZs In a System having many parts to be designed, one should always do the _____ first Hard part Simple part Development part Quality part

Flow control constructs in JavaScript includes: If-Else Loops and If -Else Switch and If-Else All of the given choices

___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW

Explorer.exe System Files Operating System Application Software

Machine language is also called Assembly Language Binary Language High Level Language HTML Language

_________ is the best known builder for supercomputers. Sun Cray Research Microsoft Apple http://groups.google.com/group/vuZs The weaknesses of the computer are:

Pattern recognition & Storage Speed & Innovative ideas Pattern recognition & Innovative ideas Speed & Storage

Communication protocol is a __________that governs the flow of information over a network Set of methods Set of protocols Set of rules Device

_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security. Support Configuration Management Quality Assurance Developer http://groups.google.com/group/vuZs _____________ team consists on the sharpest technical minds in the company. Architecture Business Development Configuration Management Developer

_______________ is responsible for day to day operations. CEO COO CMSO Developer http://groups.google.com/group/vuZs One of the key responsibilities of the ___________ is client relationship management.

Project Manager Team Lead Developer Quality Assurance Engineer

What is the major problem with flash based website? Its two heavy Cannot be indexed Less attractive Inaccessible

Which of the following is NOT an event handler for image object?

onAbort onError onLoad onUser

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ___________. Cooperation Shared responsibility Networking All of the given options

a = Math.abs(-23) What will be the value of a ? 23 -23 23.0 2.3

ERP is a type of __________________ . Entertainment software Productivity software Business software Scientific software

In Genetic Algorithm the most important thing you should know, is the ___________. Procedure Recognition of a good solution Different techniques None of the given options

According to a popular heuristic, success is defined by ___________.

The user The builder Both user and builder None of the given options http://groups.google.com/group/vuZs Rule of thumb learned through trial and error is called ___________. Design Heuristic Plan Aim

JavaScript Variables are ____________.

Dynamically Typed Statically Typed Strong Typed None of the given options

Which of the following application are collections of cells? Word

Excel PowerPoint Outlook Express http://groups.google.com/group/vuZs The browser breaks down the URL into ________ parts. 2 3 4 5

A named collection of properties (data, state) and methods (instruction, behavior) is called ____________. Array Function Variable Object

First computer network was ___________. NSFNET FIRSTNET ARPANET ORPHANET In JavaScript, a variable declaration is Optional Mandatory Not allowed None of the given A protocol used for receiving email messages is called ____________.

URL Telnet POP3 SMTP which one is correct? onUnload onUnLoad onUNLOAD All of the above Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. Loop Sequence Condition Array Variables allow us to manipulate data through the ___________. Actual Value

Reference Length Name Fuzzy logic is based on ____________. Ground facts Experience Practice Approximation http://groups.google.com/group/vuZs

Word Processor is a _________________

System Software Application Software Device Utility In the old days, databases did NOT support ____________. http://groups.google.com/group/vuZs Number Boolean Video Text In tabular storage, fields placed in a particular row are strongly ___________.

Independent Dependent Interrelated Inconsistent Due to working at home, lack of interaction may result in ___________ professional growth.

Slower Faster Higher Improved Distance learning has got a boost due to the ___________. Easy communication Online interactive contents Flexibility All of the given options _____________ technique can be used to create smooth animations or to display one of several images based on the requirement. Image downloading Image preloading Image uploading Image postloading The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time. Tree structured organizational model Network paradigm

Hierarchical structure None of the given options The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________.

Telecom Engineering Computer Engineering Computer Science Information Technology A large number of networks interconnected physically is called ______ LAN MAN Internet Network collection TCP stands for ________. Transfer Center protocol Transmission Control Protocol Transmission Center Protocol Telephone Center Protocol A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : Retrieving Database Information DBMS http://groups.google.com/group/vuZs ______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. Freeware Shareware Firewire Firmware Structures, in which another list starts before the first list is finished, are called: Multiple Lists Nested Lists Ordered Lists Un-ordered Lists http://groups.google.com/group/vuZs

The key property of the Array object in JavaScript is

Value Length Name All of the given choices Which one is the example of spreadsheet software ? MS Word MS PowerPoint MS Excel

MS Access The Encryption of data is related to Data updates Data security Data integrity Data accessibility _____ is the process of analyzing large databases to identify patterns. Data normalization Data management Data Mining None of the given options Which is the user-friendly way of presenting data ? Query Form Report All of the given options <form> Tags always placed between the <BODY> and </BODY> tags of a Web page

True False Java script has ----------------- ability to create and draw graphics. Limited Versatile Medium Not at all

Which of the following is incorrect for making design elements legible? Select correct option:

Elements should be large enough

Elements must contrast sufficiently

Related elements should be visually grouped Elements should have no visual focus

Function is also known as ______________. Select correct option:

subprogram

procedure

subroutine

All of given

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.

Select correct option:

1973 1983 1972

None of the given choices

E-mail system has ______ component(s) Select correct option:

E-mail client

SMTP server

POP3 server All of the given choices

_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element. Select correct option: Process Input or Output Decision

Connector

If a computer could pass the Turing test then it would be able to: Select correct option: http://groups.google.com/group/vuZs win a million dollar prize think like human begins think but slower than humans

do the things faster

Punched cards were replaced by: Select correct option:

Floppy Disk

Zip Drives Magnetic storage None of the given choices

vuzs The ________virus may display an annoying, but harmless message Select correct option:

Malicious Neutral Helpful

DoS

The name of very first computer was:

Select correct option:

ABC

BCD

EDC None of the given choices

The internet communities are ___________. Select correct option:

Geographical based Interest based Country based

Religion based

which one is correct? onUnload onUnLoad onUNLOAD All of the above Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.

Loop Sequence Condition Array Variables allow us to manipulate data through the ___________.

Actual Value Reference

Length Name Fuzzy logic is based on ____________.

Ground facts Experience Practice Approximation Word Processor is a _________________

System Software Application Software Device Utility In the old days, databases did NOT support ____________.

Number Boolean Video Text In tabular storage, fields placed in a particular row are strongly ___________.

Independent Dependent Interrelated Inconsistent Due to working at home, lack of interaction may result in ___________ professional growth.

Slower Faster Higher Improved Distance learning has got a boost due to the ___________. Easy communication Online interactive contents Flexibility All of the given options _____________ technique can be used to create smooth animations or to display one of several images based on the requirement.

Image downloading Image preloading Image uploading Image postloading The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.

Tree structured organizational model Network paradigm Hierarchical structure None of the given options The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called

_____________.

Telecom Engineering Computer Engineering Computer Science Information Technology A large number of networks interconnected physically is called ______ LAN MAN Internet Network collection TCP stands for ________. Transfer Center protocol Transmission Control Protocol Transmission Center Protocol Telephone Center Protocol A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : Retrieving Database Information DBMS

http://groups.google.com/group/vuZs

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.

Freeware Shareware Firewire Firmware Structures, in which another list starts before the first list is finished, are called:

Multiple Lists Nested Lists Ordered Lists Un-ordered Lists The key property of the Array object in JavaScript is Value Length Name All of the given choices

Which one is the example of spreadsheet software ? MS Word MS PowerPoint MS Excel MS Access

_____ is the process of analyzing large databases to identify patterns. Data normalization Data management Data Mining None of the given options Which is the user-friendly way of presenting data ? Query Form Report All of the given options JavaScript function fixed() has equivalent HTML tag-set ____

<.FIX></FIX> <F>..</F> <PRE>.</PRE> <H>..</H> <form> Tags always placed between the <BODY> and </BODY> tags of a Web page True False Java script has ----------------- ability to create and draw graphics. Limited Versatile Medium Not at all

Internet is an example of ______________ network.

Private Public Both Private and Public

None of the given choices

The name of first commercially available PC was:

UNIVAC 1 ENIAC

EDVAC

Altair 8800

Algorithm is a ____________________

Definition of a problem Sequence of steps to solve a problem Understanding of a problem

Solving a problem

A group of information is called __________________

File

Database Record Field

___________________ is a branch of computer science concerned with manipulating and enhancing computer graphics.

Image Handling Image Processing Image Engineering

None of these

__________has changed our way of life like no other technology.

Computational technology Computer technology Computing technology

None of the Above

Sophisticated event handling is not possible with _______________ event handling

Off-Line In-Line Out-Line

Non of the given choices

Babbages Analytical Engine could store information permanently in:

Magnetic Tape

Floppy Disk Punched Cards None of the given choices

There are __________ popular schemes to reduce the number of bytes that are required for storing graphics.

None of these

The internet-society is considered under Surveillance because:

While surfing, we are being watched, constantly

Our every click is recorded and analyzed to extract patterns and behaviors

Webcams are becoming common. Providing a cheap way for parents to watch their children's every move

All of the given

URL is a/an ________ Device

Component

Address Tool

To improve the time for scanning a web page, text should be ___________. Centered

Left Aligned

Right Aligned

Staggered

Communications on the internet is controlled by a set of two protocols which are ____________. IMAP and SMTP

FTP and HTTP

TCP and IP

TCP and HTTP

http://groups.google.com/group/vuZs FTP stands for __________. File transmission protocol

File transmission path

File transfer protocol Fine transfer path

A named collection of properties (data, state) and methods (instruction, behavior) is called ____________. Array

Function

Variable

Object

Anchor tag denoted by <A> is used to create Address

Hyperlink

Paragraph Title

<UL> tag is used to underline text

end the line

create ordered list

create unordered list

A user may access any item on the web through __________. URL Telnet

POP

SMTP

The browser breaks down the URL into ________ parts. 2

3 4

Which one of the following is NOT a primary color? Red

Green

Yellow Blue

According to a popular heuristic, success is defined by ___________.

The user The builder

Both user and builder

None of the given options

The idea of Neural Networks field is based upon ______________. Human nature

Human brain Human culture

Human actions

ERP is a type of __________________ . Entertainment software Productivity software Business software Scientific software

__________ are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs.

Event called programs

Event processed programs

Event driven programs Event declared programs

Automatic machines performing various tasks that were previously done by humans, are called ____________.

Robotics Computers

Decision Making Systems

Autonomous Web Agents

country=Hello Pakistan; document.write(country.charAt(6));

The out put of the above statement is _____________. o

P a

The distance among families is ___________ because of spending more time on internet.

Increased Expanded

Contracted

Decreased

The software used for the scanning of internet severs, is called __________.

Wscan

Mscan

Sscan Vscan

Adding images to html page, we use___________ tag.

<IMG> <IMAGE>

<PICTURE>

<PIC>

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________.

Telecom Engineering

Computer Engineering

Computer Science

Information Technology

The responsibilities of the Team Lead includes_____________.

Planning and tracking of the project

Detailed design

Professional development of team members

All of the given options

When the packets reach at destination, __________ reassembles them into original message.

Protocol

TCP IP

NIC

Many developers write the _________ first and then incrementally convert each line into _________.

Real code & Pseudo code Pseudo code & Real code Real code & Artificial code

None of the given options

Machine language is also called

Assembly Language

Binary Language

High Level Language HTML Language

In JavaScript, second element of an array has the index:

1 3

Each element in an array is given an index, which is an integer value between 0 and one less than the length of the array. The first element has an index of 0, the second element has an index of 1, and so on.

One can download or upload files to a remote computer using ________ protocol.

HTTP

SMTP

FTP TELNET

JavaScript ________ support drawing of graphics

Does

Does not Always

At times

Which of the following is NOT true about modern computers?

More powerful

Smaller in size

Consume less energy

Costly

Ada written a computer programme for ?

Analytical Engine

Difference Engine

Harvard Mark 1

Mechanical engine

A set of stand alone productivity applications designed to work together known as ______________ .

Productivity software suites

Compiled software

Secure software

Intelligent software

Because of spending more time on the internet, the distances among the families have been _____.

Increased Expanded

Contracted

Shortened

Sophisticated event handling is not possible with _______________ event handling

Off-Line In-Line

Out-Line

Non of the given choices http://groups.google.com/group/vuZs Autonomous Web Agents are also known as _________________

Mobile Agents

Softbots Both "Mobile Agents" & "Softbots" None of these

A communication protocol is a __________that governs the flow of information over a network.

Set of Methods

Set of Protocols Set of rules None of the given choices

By default in a web page Hyper Link for another web page is represented as:

Blue only

Black and Underlined

Blue and Bold Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.

Cooperation

Shared responsibility

Networking All of the given

Monitor is an example of __________devices Output Input

Processing

None of the given choices

The code in the ________ portion is the right choice for developing larger JavaScript scripts

Body

At End Head Separate

____________________ based on the principles of the logical reasoning ability of humans.

Genetic Algorithms Rule-based Systems Feed-Forward Network

None of these

The key benefit of VPNs over conventional PNs is:

Security

Efficiency Lower Cost None of the given choices

Choose the best answer. 1. Which of the following statement is not true about operating system? a. It manages both software and hardware resources b. It manages files on computer hard drives and control peripherals, like printers and scanners. c. It prevents unauthorized users from accessing the computer system. d. Operating systems for small and big computers have the same jobs to do. 2. Operating systems provide a stable, consistent way for applications to deal with the .. without having to know all the details of the . a. Hardware, software b. Hardware, hardware c. Software, hardware d. Software, software 3. Which of the following is not a category of the operating system? a. Multi-user Operating system b. Real-time operating systems c. Real-time multi-user Operating system d. Single-user single task Operating system 4. Which of the following is not a utility program? a c Virus scanning software Scandisk b Backup software d Disk patch 5. A utility suite can do many tasks. Which of the following statement is not true?

a. Firewall, Antivirus, Antispyware, Registry cleaner, data compression b. Shortcut cleaner, Edit system settings, Disk defragger, Disk checker, c. Removes clutter, Memory defragger, Network optimizer, Browser optimizer, d. Internet history cleaner, System diagnostics, Process explorer, Task scheduler, 6. In a Windows Operating system, the shows you programs and processes that are running. a. Windows diagnostic b. Windows performance monitor c. Windows task manager d. Windows even viewer 7. Drivers are used for interfacing with: a. Printers, Video adapters, Network cards, Sound cards b. Local buses of various sorts, Printers, Video adapters, c. computer storage devices such as hard disk, CD-ROM and floppy disk buses d. All of the above 8. A compiler is actually a computer program that translates programs written in a high-level language into .. a. machine code b. low-level code c. machine readable code d. binary code 9. is a Windows graphical tool for measuring the performance of your own computer or other computers on a network. a. Windows diagnostic b. Windows performance monitor c. Windows task manager d. Windows even viewer 10. A operating system allows many different users to take advantage of the computer's resources simultaneously. a. Multi-user b. Real-time

c. Real-time multi-user d. Single-user single task Answers: 1. d, 2. b 3. c 4. d 5. a 6. c 7. d 8. a 9. b 10. a

Question # 1 of 10 ( Start time: 07:16:31 PM ) Which of the following keyword is used to jump out of switch statement as soon as a match is found? Select correct option: default else jump break Question # 2 of 10 ( Start time: 07:17:02 PM ) ICQ, AIM, MSN Messenger are all examples of _________________ services. Select correct option: EMAIL IM FTP None of these Question # 3 of 10 ( Start time: 07:17:20 PM ) DBMS stands for _____________. Select correct option:

Total Marks: 1

Total Marks: 1

Total Marks: 1

Data Base Management System Data Base Mining System Data Base Merge System Data Base Manipulation System Question # 4 of 10 ( Start time: 07:17:39 PM ) Total Marks: 1

Viruses move from one computer to another with the __________ and spring into action when the _____________ is executed or opened Select correct option: Host Host Host Client Client Host Client Client Question # 5 of 10 ( Start time: 07:18:10 PM ) a = new Array( 9 ) ; b = new Array( 13 ) ; Looking at the above code; which statement is true ? Select correct option: b[ 0 ] = 23.7 ; b[ 1 ] = Bhola Continental Hotel ; b[ 2 ] = a ; All of the given choices Question # 6 of 10 ( Start time: 07:19:05 PM ) Total Marks: 1 Total Marks: 1

___________ converts computer messages to electrical pulses that are suitable for transmission over the telephone line. Select correct option: Modulator Demodulator Modulator and Demodulator None of the given choices _________________ are harmless in the sense that they only make copies of themselves on the infected computer Select correct option: Trojan horses Logic- or time-bombs Worms Viruses

Question # 8 of 10 ( Start time: 07:20:31 PM ) GIF stands for ________________________________________. Select correct option: Graphical Interchange File Graphical International Format Graphical Interchange Format None of these Question # 9 of 10 ( Start time: 07:20:59 PM )

Total Marks: 1

Total Marks: 1

_________ is a technique used create smooth animations or to display one of Several images based on the requirement Select correct option: Image preloading JavaScript Animated Gifs None of the given Question # 10 of 10 ( Start time: 07:21:35 PM ) Total Marks: 1

Using __________ , a user can remotely log on to a computer if it is connected to the users through TCP/IP network. Select correct option: FTP DNS Telnet None of these

ASP runs best on ________.

Internet information Software Intranet Information Software Intranet Information Server Internet Information Server

What is/are the methods to track the customer.

Database Cookies Hidden Fields All

Caching ______.

have no effect on downloading of the page saves the time of downloading the page increase the time of downloading the page None of Above www.vuzs.net

secure, dedicated point to point connection over the internet ______. : Metropolitan area Network Local area Network Wide Area Network Virtual Private Network

Branch to headquarter network _____. APN VPN NPV PNA

ERP Stands for Entrepreneur Resource Planning Enterprise Rescue Planning Enterprise Resource Program Enterprise Resource Planning

Enterprise Resource Planning: Enterprise Resource Planning (ERP) is a concept that integrates all aspects of a business e.g, accounting, logistics, manufacturing, marketing, planning, project management etc. at a single place. An ERP system such as SAP is expensive. E-commerce sites/software has to fully integrate with ERP software, wherever it is used. www.vuzs.net Enterprise Resource Planning (ERP) is a concept That integrates some aspects of business, at many locations. That integrates all aspects of a business at a single place. That integrates some aspects of business, at some locations. That integrates all aspects of business, at many locations.

Proxy Server can _____. Speed up the processing of http requests by caching web pages Translate HTTP request between trusted and un trusted network Can also act as a firewall filtering requests for certain web pages All of Above

Extranet formed when ____. When two or more internet is connected to each other. When two or more WAN are connected to each other. When two or more intranets are connected to each other. When two or more LAN is connected to each other.

ERP example is __ PAS DBMS SAP ASP www.vuzs.net

Performance of the web server measured in ___. A - Throughput B - Response Time A&B None of Above

Throughput is _________. No of instruction a server execute in one second. No of session a server handle. No of http request that a web server can handle. None of Above Throughput, which is the number of http requests that a particular server hardware and software can handle in the unit time. www.vuzs.net

Agents can be used for ___ Comparisons Filtering Web crawling All An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc. For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions.

Large companies establish connections between their e-commerce software and their existing accounting system by using a type of software called ________. Shareware Freeware Middleware None Large companies establish connections between their e-commerce software and their existing acco system by using a type of software called Middleware which is a part of e-commerce software package. www.vuzs.net

CERT _________. Computer Elegant Response Time Computer Emergency Response Time Computer Efficient Response Time Computer Enter Response Time Computer Emergency Response Time (CERT): Systems Administrator, Audit, Network and Security Institute (SANS Institute). The best response that the experts have come up with to tackle the security issue is in terms of cryptography.

SANS stands for _____. System Administration, Authentication, Network and Security Institute Software Authentication, Audit, Network and Security Institute Systems Administrator, Audit, Network and Security Institute None of Above

Application gateway firewall operate at ____. A -Session Layer B - Network Layer A&B None of Above It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests. www.vuzs.net

HTTP is a _____. State Oriented Stateless A&B None of Above

DoS stand for _______. Disk Operating System Denial of Services Do or stand Disk out System

What is web serve? Computer that delivers (serves up) web pages Computer that is big Computer that is Fast None of Above www.vuzs.net

Password attacks are basically a result of ___ Back door Sniffing Eavesdropping None of the Above Such attacks are basically a result of eavesdropping through which the hacker is able to know the account ID or password of a particular user. Then using it the hacker gains access to the network and gather information such as user names, passwords, computer names, resources etc. That can lead to modification, deletion or rerouting of network data.

Self hosting ____. Companies may opt to run a server in house Companies may not opt to run a server in house Companies may opt rent server None of Above

An agent is a software program that is ___

Triggers by human Not capable of autonomous action. Capable of autonomous action in its environment in order to meet its objectives None An agent is a software program that is capable of autonomous action in its environment in order to meet its objectives. Agents can be used for comparisons, filtering, web crawling, auctions etc. For example, there may be buyer agents and seller agents each with their goals and constraints. They can negotiate deals on behalf of the users. Agents can monitor health indicators and alert the individuals under given conditions. www.vuzs.net

IDS Stands for _______. Intrusion Defense System Intervention Detection System Intervention Defense System Intrusion Detection System In distributed denial of service attack, the compromised system itself is used as a source for further attacks. The use of firewalls and a proper Intrusion Detection System (IDS) can minimize.

Application gateway firewall______

Can not block any outgoing HTTP or FTP requests Can block any outgoing HTTP but not FTP requests Can not block any outgoing HTTP but FTP requests Can block any outgoing HTTP or FTP requests Application gateway firewall: It operates at application layer of the OSI Model. It uses strong user authentication to verify identity of a host attempting to connect to the network using application layer protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather than packets entering/leaving the network. It can block any outgoing HTTP or FTP requests. www.vuzs.net

Caching ____.

have no effect on downloading of the page saves the time of downloading the page increase the time of downloading the page None of Above

Worms have the characteristics; Can replicate it Have the capability to travel without any help or human action Can spread from computer to computer All

E-commerce Site must provide ______. Transaction processing Shopping cart capabilities A catalog display All of the above www.vuzs.net

Circuit level firewall operate at the ______.

Data Link Presentation Network Transport It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality. As a rule, the higher the layer of OSI model where a firewall operates, the more sophisticated is the firewall. It can make packets sent from internal network to a destination outside the firewall appear as if they originated at the firewall. Thus information regarding hosts on the internal network remains secret. It can also determine whether TCP/IP connection between a host and a machine outside firewall has been properly established. Thus it can cut off any connection which has been hijacked by a hacker trying to pass through the firewall. www.vuzs.net

Those hostile programs which, when run on a machine, install hidden services in order to give attackers remote access capabilities to a compromised machine. Back Doors Virus Worms Trapdoors

Front end consist of ______. Information which invisible to the user and he can interact with the same through some interface. Information which visible to the user and he can not interact with the same through some interface. Information which visible to the user and he can interact with the same through some interface. Information which is hidden.

Asp, JSP, PHP ? Server Side Scripts Client Side Script A&B None of Above www.vuzs.net

Solved By:Aniqa ( shinestar.star86@gmail.com)

Proxy Server can _______.

Speed up the processing of http requests by caching web pages Translate HTTP request between trusted and un trusted network Can also act as a firewall filtering requests for certain web pages All of Above

Response time ________.

Time a server take to process one request. Time a server take to process all the request. Time a server take to process some request. Time a server take to process ten request

It occurs when a customer clicks at checkout or confirm order button and is subjected to some payment _______.

Transaction Processing E cash System E Funds system None of Above

In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software.

Snooping Sniffing Eavesdropping All of Above Eavesdropping/ sniffing/snooping: In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software. For example, a hacker may install some backdoor or Trojan horse that can monitor the key strokes of a user we were wrong only master mind was right while typing and send the typed information to the hacker.

Processing of HTML code on the Client Side and web page request on the server. One Tier Architecture Two Tier Architecture Three Tier architecture N tier Architecture Example of 2-tier architecture is where processing of HTML code takes place on the client side and the web page request is processed on the server. www.vuzs.net
Solved by Mehreen Humayun

In java script "alert" function displays ________.(Chose best suitable answer)

Popup window Web page Task bar Menu bar Lesson 13 alert is the function/method of a predefined browser object that is, window object, and is used to create alert boxes or popup messages on the window.

Border-style: specifies the style of all borders in the order _________________.

border top style, border right style, border bottom style, border left style border top style, border left style, border bottom style, border right style border bottom style, border right style, border top style, border left style border top style, border bottom style, border bottom right, border left style Lesson 11 Border style border-top-style: specifies style of the top border border-right-style: specifies style of the right border

border-bottom-style: specifies style of the bottom border border-left-style: specifies style of the left border border-style: specifies the style of all borders in the order border-top-style, border-right style, border-bottom-style, border-left-style www.vuzs.net

In case mouse moves over a link, ________ event will be detected.

onMouseOver onRollOver overMouse All of the given Lesson 12

www.vuzs.net ________ is not a data type in java script.

int float string null Lesson 12 JavaScript Data types are Number, Boolean, String, Null and Undefined.

www.vuzs.net != comparison operator means __________.

Equal to Not equal to Greater than

None of the given Lesson 13 != for not equal

________ tag is used to control the layout of different elements.

css style span None of the given Ref: The

Question:1 Number of bits per symbol used in Baudot code is a. 7 b. 5 c. 8 d. 9 Question 2: What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC Question 3: An example of digital, rather than analog, communication is a. DDD b. DDS c. WATS d. DDT Question 4: Terminals are required for a. real-time, batch processing & time-sharing b. real time, time-sharing & distributed message processing c. real time, distributed processing & manager inquiry d. real-time, time sharing & message switching

Question 5: The receive equilizer reduces delay distortions using a a. tapped delay lines b. gearshift c. descrambler d. difference engine Question 6: Ina synchronous modem, the receive equilizer is known as a. adaptive equilizer b. impariment equilizer c. statistical equilizer d. compromise equilizer Question 7: The channel in the data communication model can be a. postal mail services b. telephone lines c. radio lines d. any of the above Question 8: A data terminal serves as an a. Effector b. sensor c. both a and b d. neither a nor b Question 9: Which of the following transmission systems provide the highest data rate to in individual device? a. computer bus b. telephone lines c. voice and mode d. lease lines Question 10: A protocol is a set of rules governing a time sequence of events that must take place a. between peers b. between an interface c. between modems d. across an interface

Answers

1. b 2. a 3. b 4. d 5. a 6. a 7. d 8. c 9. a 10. a

Question 1: The interactive transmission of data within a time sharing system may be best suited to a. simplex lines b. half-duplex lines c. full duplex lines d. biflex-lines

Question 2: Which of the following statement is incorrect? a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission. b. Half duplex line is a communication line in which data can move in two directions, but not at the same time. c. Teleprocessing combines telecommunications and DP techniques in online activities d. Batch processing is the prefered processing mode for telecommunication operation.

Question 3: Which of hte following is considered a broad band communication channel? a. coaxial cable b. fiber optics cable c. microwave circuits d. all of above

Question 4: Which of the following is not a transmission medium? a. telephone lines b. coaxial cables c. modem d. microwave systems

Question 5: Which of the following does not allow multiple uses or devices to share one communication line? a. doubleplexer b. multiplexer c. concentrator d. controller

Question 6: Which of the following signal is not standard RS-232-C signal? a. VDR b. RTS c. CTS d. DSR

Question 7: Which of the following statement is incorrect? a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line b. HDLC is a standard synchronous communication protocol. c. RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data d. RTS/CTS is the way the terminal indicates ringing

Question 8: Which of the following is an advantage to using fiber optics data transmission? a. resistance to data theft b. fast data transmission rate c. low noise level d. all of above

Question 9: Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium

Question 10: The transmission signal coding method of TI carrier is called a. Bipolar b. NRZ c. Manchester d. Binary

Answers:

1. b 2. d 3. d

4. c 5. a 6. a 7. d 8. d 9. d 10. a

Set 8 Collection of Multiple Choice Questions (MCQs) or Objective Questions from Microsoft Access (MSAccess)for Compute Jobs Exams like Computer Operator, Computer Engineer, Computer Officer and so on.

1. a. b. c. d.

Which control does access use to link data access page components to access data? Microsoft Dynamic Data Control Microsoft Data Connection Control Microsoft Office Data Source Control None of the above

Correct Answer: c

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

2. a. b. c. d.

Which program do you use to edit code for data access pages? Microsoft script editor Microsoft code editor Microsoft data access pages editor None of above

Correct Answer: a

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

3. a. b. c. d.

The way a particular application views the data from the database that the applicaton uses is a Module Relational model Schema Sub-schema

Correct Answer: d

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

4. a. b. c. d.

Which of the following is a database management system? Ms-Word Lotus 1-2-3 Oracle None of above

Correct Answer: c

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

5. a. b. c. d.

What is the corresponding text for the <#1/1/95# validation rule setting? Neter a value less or more than 1,195 Value must be less than 95 characters Enter a date before 1995 All of above

Correct Answer: a

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

6. What is the name of the Visual Basic Editor utility that allows you to view the Microsoft Access type librarys available objects and members?

a. b. c. d.

Object Viewer Object Browser Type Library Spy None of above

Correct Answer: b

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

7. a. b. c. d.

A computer language for informing the DBMS regarding the data structure used is PASCAL DDL PROLOG FORTRAN

Correct Answer: b

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

8. a. b. c. d.

Which of the following is not a data type Picture/graphic Data/time Texst Number

Correct Answer: a

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

9. a. b. c.

The executive responsible for the data processing function in an organization is PM DBMS DP

d.

DPM

Correct Answer: b

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

10.Which of the following is NOT a type of Microsoft Access database object? a. b. c. d. Queries Workbooks Forms Tables

Correct Answer: b

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

11.A file containing relatively permanent data is a. b. c. d. Random file Transaction file Master file Sequential file

Correct Answer: c

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

12.The complete picture of data stored in database is known as a. b. c. d. Record Scheme System flowchart DBMS

Correct Answer: b

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

13.A subset of characters within a data field is known as a. b. c. d. Record File Data string Byte

Correct Answer: c

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

14.Data items groped together for storage purposes are called a a. b. c. d. Record Title List string

Correct Answer: a

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

15.Which of the following terms does not describe a database structure used by a DBMS to link data from several files? a. b. c. d. Relational Structural Network All of the above

Correct Answer: b

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

16.In a relational schema, each tuple is divided into fields called a. b. c. d. Relations Domains Queries All of the above

Correct Answer: b

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

17.How do you filter by selection? a. Right click the field value and select filter by selection from the shortcut menu

b.

Find and double click the value on which you want to base the filter

c. Find and select the value on which you want to base the filter and select tools>filter by selection from the menu d. None

Correct Answer: a

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

18.What is a fast way t adjust the width of a column? a. b. c. d. Right click the left side of the column heading Double click the left side of the column heading Double click the right side of the column heading Select tools>adjust column width from the menu

Correct Answer: c

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

19.What are the columns in a Microsoft Access table called?

a. b. c. d.

Rows Fields Cells Records

Correct Answer: b

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

20.How do you update Pivot Table report data after changes are made to the source data? a. b. c. d. Save your changes, close the workbook, and then reopen it. Select the Pivot Table worksheet and press F9 on the keyboard Click the report, and on the Pivot Table toolbar, click the refresh data button All of the above

Correct Answer: c

1. Correct Information systems that monitor the elementary activities and transactions of the organizations are: Your answer: operational-level systems. CORRECT.

2. Correct Projections and responses to queries are information output characteristics associated with a(n): Your answer: ESS CORRECT.

3. Correct Summary transaction data, high-volume data, and simple models are information inputs characteristic of a(n): Your answer: MIS CORRECT.

4. Incorrect Which of the following individuals typically have less formal, advanced educational degrees and tend to process rather than create information? Your answer: executives The correct answer: data workers INCORRECT.

5. Incorrect Management information systems usually: Your answer: provide managers with a generalized computing and telecommunications capacity that can be applied to a changing array of problems. The correct answer: serve managers interested in weekly, monthly, and yearly results, not day-to-day activities.

INCORRECT.

6. Incorrect Decision support systems usually: Your answer: provide managers with a generalized computing and telecommunications capacity that can be applied to a changing array of problems. The correct answer: help managers make decisions that are unique, rapidly changing, and not easily specified in advance. INCORRECT.

7. Correct Identifying customers and markets using data on demographics, markets, consumer behavior, and trends is an example of a(n): Your answer: knowledge-level sales and marketing information system. CORRECT.

8. Incorrect Deciding where to locate new production facilities is a(n) example of a manufacturing and production information system operating at the: Your answer: management level. The correct answer: strategic level. INCORRECT.

9. Incorrect Preparing short-term budgets is an example of a finance and accounting information system operating at the: Your answer: operational level. The correct answer: management level. INCORRECT.

10. Correct Tracking employee training, skills, and performance appraisals is an example of a human resource information system operating at the: Your answer: operational level. CORRECT.

11. Incorrect Assembling a product, identifying customers and hiring employees are: Your answer: transactions. The correct answer: business processes. INCORRECT.

12. Incorrect Which of the following is a network of facilities for procuring materials, transforming raw materials into intermediate and finished products, and distributing the finished products to customers? Your answer: production chain The correct answer: supply chain INCORRECT.

13. Incorrect Information systems can facilitate supply chain management by: Your answer: tracking the status of orders. The correct answer: doing all of the above. INCORRECT.

14. Incorrect Enterprise systems support: Your answer: human resource processes. The correct answer: all of the above. INCORRECT.

15. Incorrect Which of the following uses a vertical industrial network? Your answer: Ford The correct answer: Coca-Cola INCORRECT. 1. Which of the following is not an option in the spelling dialog box? a. Edit b. Ignore c. Ignore all d. Change Correct Answer: a

2. You can quickly change the appearance of your work by choosing Auto Format from the . Menu a. Edit b. View c. Format d. Tools Correct Answer: c

3. To protect a worksheet, you can choose Protection and the Protect Sheet from the .. menu a. Edit b. Format c. Tools d. Data Correct Answer: c

4. You can open the Highlight Changes dialog box by choosing Track Changes from the . Menu.

a. Edit b. Insert c. Format d. Tools Correct Answer: d

5. Which of the following is not a worksheet design criterion? a. Efficiency b. Auditability c. Description d. Clarity Correct Answer: c

6. To copy cell contents using drag and drop, press the a. End key b. Shift key c. Esc key d. None of above Correct Answer: d

7. If you press ., the cell accepts your typing as its contents. a. Enter b. Ctrl + Enter c. TAB d. Insert Correct Answer: a

8. The autofill feature a. Extends a sequential series of data

b. Automatically adds a range of cell values c. Applies a boarder around selected cells d. None of above Correct Answer: a

9. What is the keyboard shortcut (button or buttons to be pressed) for creating a chart from the selected cells? a. F3 b. F5 c. F7 d. F11 Correct Answer: D

10. you can use the formula palette to a. format cells containing numbers b. create and edit formulas containing functions c. entered assumptions data d. copy a range of cells Correct Answer: b 11. What Pivot Table toolbar button updates the data in a Pivot Table or Pivot Chart report if the source data chas changed a. Format Report b. Pivot Table c. Refresh Data d. Show Detail Correct Answer: c

12. What is an expression that tells how the numbers in a determined set of cells are to be calculated? a. Formula b. Field c. Data

d. Query Correct Answer: Correct Answer: A

13. Qtr 1, Qtr 2, Qtr 3 is an example of a a. Formula b. Function c. Series d. Syntax Correct Answer: c

14. You can edit existing Excel data by pressing the a. F1 key b. F2 key c. F3 key d. F4 key Correct Answer: b

15. The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is . a. G1-G10 b. B1.G10 c. B1;G10 d. B1:G10 Correct Answer: d

16. A user wishes to remove a spreadsheet from a workbook. Which is the correct sequence of events that will do this? a. Go to File-Save As Save As Type Excel worksheet b. Right click on the spreadsheet tab and select DELETE c. Right click on the spreadsheet and select Insert Entire Column d. None of above

Correct Answer: b

17. What feature enables you to adjust or back solve the value in a cell to reach a desired outcome in a formula? a. Goal Seek b. Scenario Summary report c. Forecasting d. Trend line Correct Answer: d

18. what term describes a background that appears as a grainy, non smooth surface a. gradient b. pattern c. solid d. texture Correct Answer: a

19. Excel is a a. Graphic program b. None of these c. Word processor d. A spreadsheet Correct Answer: d

20.

To create an interactive Pivot Table for the web, you use a Microsoft Office Web component called

a. HTML b. Pivot Table Field List c. Pivot Table List d. Pivot Table Report Correct Answer: d

Set - 3
1. Which generation of computer is still under development a. Fourth Generation b. Fifth Generation c. Sixth Generation d. Seventh Generation

2. Artificial Intelligence is associated with which generation? a. First Generation b. Second Generation c. Fifth Generation d. Sixth Generation

3. Which operation is not performed by computer a. Inputting b. Processing c. Controlling d. Understanding

4. Fifth generation computer is also known as a. Knowledge information processing system b. Very large scale integration (VLSI) c. Both of above d. None of above

5. Central Processing Unit is combination of a. Control and storage b. Control and output unit c. Arithmetic logic and input unit d. Arithmetic logic and control unit

6. The brain of any computer system is a. Control Unit b. Arithmetic Logic Unit c. Central Processing Unit d. Storage Unit

7. Pick the one that is used for logical operations or comparisons such as less than equal to or greater than. a. Arithmetic and Logic Unit b. Control Unit c. Both of above d. None of above

8. Analog computer works on the supply of a. Continuous electrical pulses b. Electrical pulses but not continuous c. Magnetic strength d. None of the above

9. Digital devices are a. Digital Clock b. Automobile speed meter c. Clock with a dial and two hands d. All of them

10. The computer that process both analog and digital is called a. Analog computer b. Digital computer c. Hybrid computer d. Mainframe computer

Answers:

1. Which generation of computer is still under development

Correct Answer: b. Fifth Generation Explanation: Todays computer fall under the fourth generation computers that uses the LSI and VLSI Integrated Circuits. For fifth generation computers it is expected for Ultra Large Scale Integrated Circuits (ULSI). The study for using Gallium Arsenide instead of silicon chips is underway. Electrons can travel 5 times faster in Gallium Arsenide compared to the silicon. Similarly, genetically engineered protein molecules are being tried for processors. Fifth generation computers are expected to have artificial intelligence, ability to use natural language.
2. Artificial Intelligence is associated with which generation?

Correct Answer: c. Fifth Generation Explanation: A computer is a slave in a box. This is a saying due to the lack of intelligence in computer in spite of their speed, accuracy, diligence and reliability. A computer can only perform instructed task in the way already programmed. Thus, scientists are trying to develop artificial intelligence in computers so that they can think and make decisions themselves. This is expected for fifth generation computers.

3. Which operation is not performed by computer

Correct Answer: d. Understanding Explanation: Computers cant understand since they dont have intelligence. Lets hope in fifth generation they will achieve artificial intelligence and be able to understand.
4. Fifth generation computer is also known as

Correct Answer: a. Knowledge information processing system Explanation: Fifth Generation computers will have artificial intelligence and will be able to understand making knowledge information processing system possible,
5. Central Processing Unit is combination of

Correct Answer: d. Arithmetic logic and control unit Explanation: Arithmetic logic and control unit along with memory unit forms a complete central processing unit and central processing unit along with input/output unit forms a computer system.
6. The brain of any computer system is

Correct Answer: c. Central Processing Unit Explanation: Control unit or arithmetic logical unit alone can not represent the function of brain to compare with neither does storage unit only. Central Processing Unit is the combination of control, arithmetic logic and memory units thus can be compared with brain that controls the body, processes its functions and remembers.
7. Pick the one that is used for logical operations or comparisons such as less than equal to or greater than.

Correct Answer: a. Arithmetic and Logic Unit Explanation: Logical sub-unit of ALU performs all the comparisons such as less than equal to or greater than. Arithmetic sub-unit of ALU performs calculations such as addition, subtraction and so on.
8. Analog computer works on the supply of

Correct Answer: a. Continuous electrical pulses Explanation: Analog computers works on the continuous electrical pulses and digital computers work on the discrete electrical pulses. Analog computers need to process physical quantities such as temperature, pressure, speed etc.
9. Digital devices are

Correct Answer: a. Digital Clock. Explanation: Automobile speed meter and clock with a dial and two hands are analog devices. Speed meter works on speed of wheel and the later works on tension of dialed spring.
10. The computer that process both analog and digital is called

Correct Answer c. Hybrid Computer

Set - 6
1. Which was the computer conceived by Babbage? a. Analytical Engine b. Arithmetic Machine c. Donald Kunth d. All of above

2. Offline device is a. A device which is not connected to CPU b. A device which is connected to CPU c. A direct access storage device d. An I/O device

3. Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address registers b. Memory data registers c. Instruction register d. Program counter

4. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?

a. Memory address register b. Memory data register c. Instruction register d. Program counter

5. Microprocessors can be used to make a. Computers b. Digital systems c. Calculators d. All of above

6. how many address lines are needed to address each machine location in a 2048 x 4 memory chip? a. 10 b. 11 c. 8 d. 12

7. which American computer company is called Big Blue? a. Microsoft b. Compaq Corp c. IBM d. Tandy Svenson

8. When did IBM introduce the 20286 based PC/AT? a. 1982 b. 1984 c. 1985 d. 1989

9. When was the X window system born? a. 1984 b. 1989 c. 1988 d. 1990

10. Todays computer giant IBM was earlier known by different name which was changes in 1924. What was that name? a. Tabulator Machine Co. b. Computer Tabulating Recording Co. c. The Tabulator Ltd. d. International Computer Ltd.

11. The first electronic general purpose digital computer built by Mauchly and Eckert called ENIA did not work on the stored program principle. How many numbers could it store in its internal memory? a. 100 b. 20 c. 40 d. 80

12. The digital computer was developed primarily in a. USSR b. Japan c. USA d. UK

13. The subject of cybernetics deals with the science of a. Genetics b. Control and communication

c. Molecular biology d. Biochemistry

14. Who is credited with the idea of using punch cards to control patterns in a waving machine? a. Pascal b. Hollerith c. Babbage d. Jacquard

15. Most of the inexpensive personal computers do not have any disk or diskette drive. What is the name of such computes? a. Home computers b. Diskless computers c. Dedicated computers d. General purpose computers

16. Which of the following require large computers memory? a. Imaging b. Graphics c. Voice d. All of Above

17. A term associated with the comparison of processing speeds of different computer system is: a. EFTS b. MPG c. MIPS d. CPS

18. The process of starting a or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called

a. Duping b. Booting c. Padding d. CPS

19. who invented the microprocessor? a. Marcian E Huff b. Herman H Goldstein c. Joseph Jacquard d. All of above

20. One computer that is not considered a portable is a. Minicomputer b. Laptop computer c. Notebook computer d. All of above

Answers:

1. Which was the computer conceived by Babbage? a. Analytical Engine 2. Offline device is a. A device which is not connected to CPU 3. Which of the following registers is loaded with the contents of the memory location pointed by the PC? c. Instruction register 4. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?

d. Program counter 5. Microprocessors can be used to make d. All of above 6. how many address lines are needed to address each machine location in a 2048 x 4 memory chip? b. 11 7. which American computer company is called Big Blue? c. IBM 8. When did IBM introduce the 20286 based PC/AT? b. 1984 9. When was the X window system born? a. 1984 10. Todays computer giant IBM was earlier known by different name which was changes in 1924. What was that name? a. Tabulator Machine Co. 11. The first electronic general purpose digital computer built by Mauchly and Eckert called ENIA did not work on the stored program principle. How many numbers could it store in its internal memory? b. 20 12. The digital computer was developed primarily in c. USA 13. The subject of cybernetics deals with the science of b. Control and communication 14. Who is credited with the idea of using punch cards to control patterns in a waving machine? d. Jacquard 15. Most of the inexpensive personal computers do not have any disk or diskette drive. What is the name of such computes? a. Home computers 16. Which of the following require large computers memory? d. All of Above 17. A term associated with the comparison of processing speeds of different computer system is: c. MIPS 18. The process of starting a or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called b. Booting 19. who invented the microprocessor? a. Marcian E Huff

20. One computer that is not considered a portable is a. Minicomputer

Set - 12
1. To locate a data item for storage is a. Field b. Feed c. Database d. Fetch

2. programs designed to perform specific tasks is known as a. system software b. application software c. utility programs d. operating system

3. perforated paper used as input of output media is known as a. paper tapes b. magnetic tape c. punched papers tape d. card punch

4. Time during which a job is processed by the computer is a. Delay times b. Real time c. Execution time d. Down time

5. a computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as a. Super computer b. Mini computer c. Micro computer d. Macro computer

6. An approach that permits the computer to work on several programs instead of one is a. On-line thesaurus b. Multiprogramming c. Over lapped processing d. Outline processor

7. A directly accessible appointment calendar is feature of a resident package a. CPU b. Memory c. Buffer d. ALU

8. The term gigabyte refers to a. 1024 bytes b. 1024 kilobytes c. 1024 megabytes d. 1024 gigabyte

9. Which of the following processors use RISC technology? a. 486dx b. Power PC

c. 486sx d. 6340

10. A/n . Device is any device that provides information, which is sent to the CPU a. Input b. Output c. CPU d. Memory

11. Current SIMMs have either or connectors (pins) a. 9 or 32 b. 30 or 70 c. 28 or 72 d. 30 or 72

12. The storage subsystem in a microcomputer consists mainly of or media with varying capacities a. Memory or video b. Magnetic or optical c. Optical or memory d. Video or magnetic

13. Which of the following is not an input device? a. OCR b. Optical scanners c. Voice recognition device d. COM (Computer Output to Microfilm)

14. The central processing unit (CPU) consists of a. Input, output and processing

b. Control unit, primary storage, and secondary storage c. Control unit, arithmetic-logic unit and primary storage d. Control unit, processing, and primary storage

15. EBCDIC can code up to how many different characters? a. 256 b. 16 c. 32 d. 64

16. Which is considered a direct entry input device? a. Optical scanner b. Mouse and digitizer c. Light pen d. All of the above

17. Which is used for manufacturing chips? a. Bus b. Control unit c. Semiconductors d. A and b only

18. The computer code for the interchange of information between terminals is a. ASCII b. BCD c. EBCDIC d. All of above

19. A byte consists of

a. One bit b. Four bits c. Eight bits d. Sixteen bits

20. A hybrid computer a. Resembles digital computer b. Resembles analog computer c. Resembles both a digital and analog computer d. None of the above

Answers:

1. To locate a data item for storage is d. Fetch

2. programs designed to perform specific tasks is known as b. application software

3. perforated paper used as input of output media is known as a. paper tapes

4. Time during which a job is processed by the computer is c. Execution time

5. a computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as a. Super computer

6. An approach that permits the computer to work on several programs instead of one is c. Over lapped processing

7. A directly accessible appointment calendar is feature of a resident package b. Memory

8. The term gigabyte refers to c. 1024 megabytes

9. Which of the following processors use RISC technology? b. Power PC

10. A/n . Device is any device that provides information, which is sent to the CPU a. Input

11. Current SIMMs have either or connectors (pins) d. 30 or 72

12. The storage subsystem in a microcomputer consists mainly of or media with varying capacities b. Magnetic or optical

13. Which of the following is not an input device? d. COM (Computer Output to Microfilm)

14. The central processing unit (CPU) consists of

c. Control unit, arithmetic-logic unit and primary storage

15. EBCDIC can code up to how many different characters? a. 256

16. Which is considered a direct entry input device? d. All of the above

17. Which is used for manufacturing chips? c. Semiconductors

18. The computer code for the interchange of information between terminals is a. ASCII

19. A byte consists of c. Eight bits

20. A hybrid computer c. Resembles both a digital and analog computer

Set - 11
1. The ALU of a computer responds to the commands coming from a. Primary memory b. Control section c. External memory d. Cache memory

2. The act of retrieving existing data from memory is called a. Read-out b. Read from c. Read d. All of above

3. All modern computer operate on a. Information b. Floppies c. Data d. Word

4. Instructions and memory address are represented by a. Character code b. Binary codes c. Binary word d. Parity bit

5. Which of the following code used in present day computing was developed by IBM Corporation? a. ASCII b. Hollerith Code c. Baudot Code d. EBCDIC Code

6. What is the latest write-once optical storage media? a. Digital paper b. Magneto-optical disk c. WORM disk d. CD-ROM disk

7. The most important advantage of a video disk is a. Compactness b. Potential capacity c. Durability d. Cost effectiveness

8. What is the number of read-write heads in the drive for a 9-trac magnetic tape? a. 9 b. 16 c. 18 d. 27

9. Before a disk drive can access any sector record, a computer program has to provide the records disk address. What information does this address specify? a. Track number b. Sector number c. Surface number d. All of above

10. As compared to diskettes, the hard disks are a. More expensive b. More portable c. Less rigid d. Slowly accessed

11. Floppy disks which are made from flexible plastic material are also called? a. Hard disks b. High-density disks

c. Diskettes d. Templates

12. Regarding a VDU, Which statement is more correct? a. It is an output device b. It is an input device c. It is a peripheral device d. It is hardware item

13. What is the name of the computer terminal which gives paper printout? a. Display screen b. Soft copy terminal c. Hard copy terminal d. Plotter

14. Dot-matrix is a type of a. Tape e. Printer f. Disk g. Bus

15. The two kinds of main memory are: a. Primary and secondary b. Random and sequential c. ROM and RAM d. All of above

16. A kind of serial dot-matrix printer that forms characters with magnetically-charged ink sprayed dots is called a. Laser printer

b. Ink-jet printer c. Drum printer d. Chan printer

17. Which printer is very commonly used for desktop publishing? a. Laser printer b. Inkjet printer c. Daisywheel printer d. Dot matrix printer

18. An output device that uses words or messages recorded on a magnetic medium to produce audio response is b. Magnetic tape c. Voice response unit d. Voice recognition unit e. Voice band

19. Which of the following will happen when data is entered into a memory location? a. It will add to the content of the location b. It will change the address of the memory location c. It will erase the previous content d. It will not be fruitful if there is already some data at the location

20. A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is a. Memory b. Buffer c. Accumulator d. Address

Answers:

1. The ALU of a computer responds to the commands coming from b. Control section

2. The act of retrieving existing data from memory is called

d. All of above

3. All modern computer operate on c. Data

4. Instructions and memory address are represented by b. Binary codes

5. Which of the following code used in present day computing was developed by IBM Corporation? d. EBCDIC Code

6. What is the latest write-once optical storage media? d. CD-ROM disk

7. The most important advantage of a video disk is b. Potential capacity

8. What is the number of read-write heads in the drive for a 9-trac magnetic tape? a. 9

9. Before a disk drive can access any sector record, a computer program has to provide the records disk address. What information does this address specify? d. All of above

10. As compared to diskettes, the hard disks are a. More expensive

11. Floppy disks which are made from flexible plastic material are also called? c. Diskettes

12. Regarding a VDU, Which statement is more correct? c. It is a peripheral device

13. What is the name of the computer terminal which gives paper printout? c. Hard copy terminal

14. Dot-matrix is a type of b. Printer

15. The two kinds of main memory are: c. ROM and RAM

16. A kind of serial dot-matrix printer that forms characters with magnetically-charged ink sprayed dots is called b. Ink-jet printer

17. Which printer is very commonly used for desktop publishing? a. Laser printer

18. An output device that uses words or messages recorded on a magnetic medium to produce audio response is

b. Voice response unit

19. Which of the following will happen when data is entered into a memory location? c. It will erase the previous content

20. A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is b. Buffer

Set - 21
1. Which of the following are the two main components of the CPU? a. Control Unit and Registers b. Registers and Main Memory c. Control unit and ALU d. ALU and bus Correct Answer: c

Collected and distributed at psExam.com

2. The two basic types of record access methods are: a. Sequential and random b. Sequential and indexed c. Direct and immediate d. Online and real time Correct Answer: a

Please, point out any mistakes to admin@psexam.com

3. A disadvantage of the laser printer is a. It is quieter than an impact printer b. It is very slow c. The output is of a lower quality d. None of the above Correct Answer: d

Objective Questions - Multiple Choice Questions - MCQs at psExam.com

4. Different components n the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called? a. Conductors b. Buses c. Connectors d. Consecutives Correct Answer: b

Computer Fundamentals Fundamentals of Computer Science

5. The language that the computer can understand and execute is called a. Machine language b. Application software c. System program d. All of the above Correct Answer: a

Collected and distributed at psExam.com

6. Which of the following is used as a primary storage device? a. Magnetic drum b. PROM c. Floppy disk d. All of these Correct Answer: b

Please, point out any mistakes to admin@psexam.com

7. Which of the following memories needs refresh? a. SRAM b. DRAM c. ROM d. All of above Correct Answer: b

Objective Questions - Multiple Choice Questions - MCQs at psExam.com

8. Which of the following devices can be used to directly input printed text? a. OCR b. OMR c. MICR d. All of above Correct Answer: a

Computer Fundamentals Fundamentals of Computer Science

9. The output quality of a printer is measured by

a. Dot per cm b. Dots per inch c. Dots printed per unit time d. All of above Correct Answer: b

Collected and distributed at psExam.com

10. In analog computer a. Input is first converted to digital form b. Input is never converted to digital form c. Output is displayed in digital form d. All of the above Correct Answer: b

Please, point out any mistakes to admin@psexam.com

11. Who designed the first electronics computer ENIAC/ a. Von Neumann b. Joseph M Jacquard c. J. P. Eckert and J. W. Mauchly d. All of above Correct Answer: c

Objective Questions - Multiple Choice Questions - MCQs at psExam.com

12. Modern computers are very reliable but they are not

a. Fast b. Powerful c. Infallible d. Cheap Correct Answer: c

Computer Fundamentals Fundamentals of Computer Science

13. Which 8-bit chip was used in many of todays TRS-80 computers? a. Z-8000 b. Motorola 6809 c. Z-8808 d. Z-80 Correct Answer: d

Collected and distributed at psExam.com

14. Personal computers used a number of chips mounted on a main circuit board. What is the common name for such boards? a. Daughterboard b. Motherboard c. Father board d. Childboard Correct Answer: b

Please, point out any mistakes to admin@psexam.com

15. In most of the IBM PCs, the CPU, the device drivers, memory, expansion slots and active components are mounted on a single board. What is the name of the board? a. Motherboard

b. Daughterboard c. Bredboard d. Fatherboard Correct Answer: a

Objective Questions - Multiple Choice Questions - MCQs at psExam.com

16. A computer program that converts an entire program into machine language at one time is called a/an a. Interpreter b. CPU c. Compiler d. Simulator Correct Answer: c

Computer Fundamentals Fundamentals of Computer Science

17. A computer Program that translates one program inst5ruction at a time into machine language is called a/an a. Interpreter b. CPU c. Compiler d. Simulator Correct Answer: a

Set - 10
1. Which of the following devices can be sued to directly image printed text? a. OCR b. OMR c. MICR

d. All of above

2. The output quality of a printer is measured by a. Dot per inch b. Dot per sq. inch c. Dots printed per unit time d. All of above

3. In analog computer a. Input is first converted to digital form b. Input is never converted to digital form c. Output is displayed in digital form d. All of above

4. In latest generation computers, the instructions are executed a. Parallel only b. Sequentially only c. Both sequentially and parallel d. All of above

5. Who designed the first electronics computer ENIAC? a. Van-Neumann b. Joseph M. Jacquard c. J. Presper Eckert and John W Mauchly d. All of above

6. Who invented the high level language c? a. Dennis M. Ritchie b. Niklaus Writh

c. Seymour Papert d. Donald Kunth

7. Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

8. When did arch rivals IBM and Apple Computers Inc. decide to join hands? a. 1978 b. 1984 c. 1990 d. 1991

9. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens? a. Monitor b. Hardware c. Robot d. Computer

10. An error in software or hardware is called a bug. What is the alternative computer jargon for it? a. Leech b. Squid c. Slug d. Glitch

11. Modern Computer are very reliable but they are not a. Fast

b. Powerful c. Infallible d. Cheap

12. What is the name of the display feature that highlights are of the screen which requires operator attention? a. Pixel b. Reverse video c. Touch screen d. Cursor

13. IMB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operating system from Microsoft, the printer from Epson and the application software from everywhere. Can you name the country which contributed the video display? a. India b. China c. Germany d. Taiwan

14. Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards? a. Daughter board b. Motherboard c. Father board d. Breadboard

15. In most IBM PCs, the CPU, the device drives, memory expansion slots and active components are mounted on a single board. What is the name of this board? a. Motherboard b. Breadboard c. Daughter board d. Grandmother board

16. What is meant by a dedicated computer? a. Which is used by one person only b. Which is assigned one and only one task c. Which uses one kind of software d. Which is meant for application software

17. The system unit of a personal computer typically contains all of the following except: a. Microprocessor b. Disk controller c. Serial interface d. Modem

18. A computer program that converts an entire program into machine language is called a/an a. Interpreter b. Simulator c. Compiler d. Commander

19. A computer program that translates one program instructions at a time into machine language is called a/an a. Interpreter b. CPU c. Compiler d. Simulator

20. A small or intelligent device is so called because it contains within it a a. Computer b. Microcomputer c. Programmable

d. Sensor

Answers:

1. Which of the following devices can be sued to directly image printed text? a. OCR

2. The output quality of a printer is measured by b. Dot per sq. inch

3. In analog computer b. Input is never converted to digital form

4. In latest generation computers, the instructions are executed c. Both sequentially and parallel

5. Who designed the first electronics computer ENIAC? c. J. Presper Eckert and John W Mauchly

6. Who invented the high level language c? a. Dennis M. Ritchie

7. Personnel who design, program, operate and maintain computer equipment refers to c. Peopleware

8. When did arch rivals IBM and Apple Computers Inc. decide to join hands? d. 1991

9. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens? d. Computer

10. An error in software or hardware is called a bug. What is the alternative computer jargon for it? d. Glitch

11. Modern Computer are very reliable but they are not c. Infallible

12. What is the name of the display feature that highlights are of the screen which requires operator attention? b. Reverse video

13. IMB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operating system from Microsoft, the printer from Epson and the application software from everywhere. Can you name the country which contributed the video display? d. Taiwan

14. Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards? b. Motherboard

15. In most IBM PCs, the CPU, the device drives, memory expansion slots and active components are mounted on a single board. What is the name of this board? a. Motherboard

16. What is meant by a dedicated computer? b. Which is assigned one and only one task

17. The system unit of a personal computer typically contains all of the following except: d. Modem

18. A computer program that converts an entire program into machine language is called a/an c. Compiler

19. A computer program that translates one program instructions at a time into machine language is called a/an a. Interpreter

20. A small or intelligent device is so called because it contains within it a d. Sensor

Set - 9
1. A disadvantage of the laser printer is: a. It is quieter than an impact printer b. It is very slow c. The output is of a lower quality d. None of above

2. Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

3. The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable d. Keying errors can be detected as they occur.

4. The terminal device that functions as a cash register, computer terminal, and OCR reader is the: a. Data collection terminal b. OCR register terminal c. Video Display terminal d. POS terminal

5. Which of the following does not affect the resolution of a video display image? a. Bandwidth b. Raster scan rage c. Vertical and horizontal lines of resolution d. Screen size

6. While inserting a diskette into the diskette drive of a PC, the diskettes label side should face a. East b. North c. South d. Up

7. in which year was UKs premier computing event called The which computer started? a. 1980 b. 1985 c. 1986 d. 1987

8. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance, a. Capacitance keyboard b. Mechanical keyboard c. Qwerty keyboard d. Dvorak keyboard

9. Different components on the motherboard of a PC processor unit are linked together by sets or parallel electrical conducting lines. What are these lines called? a. Conductors b. Buses c. Connectors d. Connectively

10. Which of the following magazines covers only the IBM PC and its compatibles? a. Byte b. PC Magazine c. Personal Computing d. Interface Age

11. Which of the following professions has not been affected by personal computers? a. Medical b. Clerical and law c. Accounting d. None of the above

12. The arranging of data in a logical sequence is called a. Sorting b. Classifying

c. Reproducing d. Summarizing

13. When was Apple Macintosh II microcomputer introduced in the market? a. 1964 b. 1970 c. 1983 d. 1986

14. What is the name of the new color laptop computer which is powered by a 386 processor at 33 MHz and is built by Epson? a. AX3/33 b. NEC-20 c. Magnum 2000 d. HCL-3000

15. What does the disk drive of a computer do? a. Rotate the disk b. Read the disk c. Load a program from the disk into the memory d. Both b and c

16. The language that the computer can understand and execute is called a. Machine language b. Application software c. System program d. All of above

17. An application suitable for sequential processing is

a. Processing of grades b. Payroll processing c. Both a and b d. All of above

18. The word processing task associated with changing the appearance of a document is a. Editing b. Writing c. Formatting d. All of above

19. Which of the following is used as a primary storage device? a. Magnetic drum b. Prom c. Floppy d. All of above

20. Which of the following memories needs refreshing? a. SRAM b. DRAM c. ROM d. All of above

Answers

1. A disadvantage of the laser printer is:

d. None of above

2. Which of the following is not true for a magnetic disk? b. It provides only sequential access to stored data

3. The primary advantage of key-to-tape data entry system is c. The tape is reusable

4. The terminal device that functions as a cash register, computer terminal, and OCR reader is the: d. POS terminal

5. Which of the following does not affect the resolution of a video display image? d. Screen size

6. While inserting a diskette into the diskette drive of a PC, the diskettes label side should face d. Up

7. in which year was UKs premier computing event called The which computer started? a. 1980

8. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance, a. Capacitance keyboard

9. Different components on the motherboard of a PC processor unit are linked together by sets or parallel electrical conducting lines. What are these lines called? b. Buses

10. Which of the following magazines covers only the IBM PC and its compatibles? b. PC Magazine

11. Which of the following professions has not been affected by personal computers? d. None of the above

12. The arranging of data in a logical sequence is called a. Sorting

13. When was Apple Macintosh II microcomputer introduced in the market? c. 1983

14. What is the name of the new color laptop computer which is powered by a 386 processor at 33 MHz and is built by Epson? a. AX3/33

15. What does the disk drive of a computer do? d. Both b and c

16. The language that the computer can understand and execute is called a. Machine language

17. An application suitable for sequential processing is c. Both a and b

18. The word processing task associated with changing the appearance of a document is c. Formatting

19. Which of the following is used as a primary storage device? b. Prom

20. Which of the following memories needs refreshing? b. DRAM

Set - 8
1. IBM 7000 digital computer a. Belongs to second generation b. Uses VLSI c. Employs semiconductor memory d. Has modular constructions

2. The proper definition of a modern digital computer is a. An electronic automated machine that can solve problems involving words and numbers b. A more sophistic and modified electronic pocket calculator c. Any machine that can perform mathematical operations d. A machine that works on binary code

3. A modern electronic computer is a machine that is meant for a. Doing quick mathematical calculations b. Input, storage, manipulation and outputting of data c. Electronic data processing d. Performing repetitive tasks accurately

4. An integrated circuit is a. A complicated circuit

b. An integrating device c. Much costlier than a single transistor d. Fabricated on a tiny silicon chip

5. Most important advantage of an IC is its a. Easy replacement in case of circuit failure b. Extremely high reliability c. Reduced cost d. Lower power consumption

6. In a punched card system, data is processed by a a. Keypunch machine, sorter and posting machine b. Accounting machine, posting machine, and billing machine c. Sorter, posting machine, and billing machine d. Accounting machine, keypunch machine and sorter

7. The first machine to successfully perform a long series of arithmetic and logical operations was; a. ENIAC b. Mark I c. Analytic engine d. UNIVAC-I

8. In the third generation of computers: a. Distributed data processing first became popular b. An operating system was first developed c. High-level prcedu7ral languages were firs used d. On-line, real time systems first became popular

9. A characteristic of card systems is:

a. Slowness in processing data b. Using cards as records of transactions c. Needing a larger DP staff d. All of the above

10. An IBM system/38 represents the computer class of: a. Small-scale computer b. Medium-scale computer c. Large-scale computer d. Super computer

11. The first firm to mass- market a microcomputer as a personal computer was a. IBM b. Sperry Univac c. Data General corporation d. Radio Shack

12. A digital computer did not score over an analog computer in terms of a. Speed b. Accuracy c. Cost d. Memory

13. In 1830, Charles Babbage designed a machine called the Analytical Engine which he showed at the Paris Exhibition. In which year was it exhibition? a. 1820 b. 1860 c. 1855 d. 1870

14. Which was the worlds first minicomputer and when was it introduced? a. PDP-I, 1958 b. IBM System/36, 1960 c. PDP-II, 1961 d. VAX 11/780, 1962

15. Where was Indias first computer installed and when? a. Indian Institute of Technology, Delhi, 1977 b. Indian Institute of Science, Bangalore, 1971 c. Indian Iron & Steel Co. Ltd., 1968 d. Indian Statistical Institute, Calcutta, 1955

16. Which of the following are the two main components of the CPU? a. Control unit and registers b. Registers and main memory c. Control Unit and ALU d. ALU and bus

17. Which of the following is true? a. Fields are composed of bytes b. Records are composed of fields c. Fields are composed of characters d. All of above

18. Which of the following file organization is most efficient for a file with a high degree of file activity? a. Sequential b. ISAM c. VSAM

d. B-Tree Index

19. The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

20. The advantage of COM are its and a. Compact size; speed readability b. Compact size, speed c. Readability; speed d. Low cost; readability

Answers:

1. IBM 7000 digital computer c. Employs semiconductor memory 2. The proper definition of a modern digital computer is d. A machine that works on binary code 3. A modern electronic computer is a machine that is meant for b. Input, storage, manipulation and outputting of data 4. An integrated circuit is d. Fabricated on a tiny silicon chip 5. Most important advantage of an IC is its b. Extremely high reliability 6. In a punched card system, data is processed by a d. Accounting machine, keypunch machine and sorter

7. The first machine to successfully perform a long series of arithmetic and logical operations was; b. Mark I 8. In the third generation of computers: d. On-line, real time systems first became popular 9. A characteristic of card systems is: d. All of the above 10. An IBM system/38 represents the computer class of: a. Small-scale computer 11. The first firm to mass- market a microcomputer as a personal computer was c. Data General corporation 12. A digital computer did not score over an analog computer in terms of b. Accuracy 13. In 1830, Charles Babbage designed a machine called the Analytical Engine which he showed at the Paris Exhibition. In which year was it exhibition? c. 1855 14. Which was the worlds first minicomputer and when was it introduced? a. PDP-I, 1958 15. Where was Indias first computer installed and when? d. Indian Statistical Institute, Calcutta, 1955 16. Which of the following are the two main components of the CPU? c. Control Unit and ALU 17. Which of the following is true? d. All of above 18. Which of the following file organization is most efficient for a file with a high degree of file activity? a. Sequential 19. The two basic types of record-access methods are a. Sequential and random 20. The advantage of COM are its and b. Compact size, speed

Set - 5
1. Mnemonic a memory trick is used in which of the following language?

a. Machine language b. Assembly language c. High level language d. None of above

2. The translator program used in assembly language is called a. Compiler b. Interpreter c. Assembler d. Translator

3. Easily reloctable language is a. Machine language b. Assembly language c. High level language d. Medium level language

4. Which of the following is called low level languages? a. Machine language b. Assembly language c. Both of the above d. None of above

5. which of the following is problem oriented language? a. High level language

b. Machine language c. Assembly language d. Low level language

6. A compiler is a translating program which a. Translates instruction of a high level language into machine language b. Translates entire source program into machine language program c. It is not involved in programs execution d. All of above

7. Which of the following is machine independence program? a. High level language b. Low level language c. Assembly language d. Machine language

8. Which statement is valid about interpreter? a. It translates one instruction at a time b. Object code is saved for future use c. Repeated interpretation is not necessary d. All of above

9. Which is the limitation of high level language? a. Lower efficiency b. Machine dependence

c. machine level coding d. None of above

10. High level language is also called a. Problem oriented language b. Business oriented language c. Mathematically oriented language d. All of the above

11. A computer programmer a. Does all the thinking for a computer b. Can enter input data quickly c. Can operate all types of computer equipments d. Can draw only flowchart

12. CD-ROM is a a. Semiconductor memory b. Memory register c. Magnetic memory d. None of above

13. Which of the following is not a primary storage device? a. Magnetic tape b. Magnetic disk c. Optical disk

d. None of above

14. A name or number used to identify a storage location devices? a. A byte b. A record c. An address d. All of above

15. Which of the following is a secondary memory device? a. Keyboard b. Disk c. ALU d. All of the above

16. The difference between memory and storage is that memory is and storage is a. Temporary, permanent b. Permanent, temporary c. Slow, fast d. All of above

17. A floppy disk contains a. Circular tracks only b. Sectors only c. Both circular tracks and sectors d. All of the above

18. The octal equivalent of 111010 is a. 81 b. 72 c. 71 d. None of above

19. The first electronic computer in the world was a. UNIVAC b. EDVAC c. ENIAC d. All of above

20. The most commonly used standard data code to represent alphabetical, numerical and punctuation characters used in electronic data processing system is called a. ASCII b. EBCDIC c. BCD d. All of above

Answers:

1. 2. 3. 4.

Correct Answer: b Correct Answer: c Correct Answer: b Correct Answer: c

5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20.

Correct Answer: a Correct Answer: d Correct Answer: a Correct Answer: a Correct Answer: a Correct Answer: d Correct Answer: a Correct Answer: d Correct Answer: d Correct Answer: c Correct Answer: b Correct Answer: a Correct Answer: c Correct Answer: b Correct Answer: c Correct Answer: a

Question # 1 of 10 ( Start time: 05:21:25 PM ) Total M a r k s: 1 Internet is an example of ______________ network. Select correct option:

http://groups.google.com/group/vuZs

Private Public Both Private and Public None of the given choices Question # 2 of 10 ( Start time: 05:21:53 PM ) Total M a r k s: 1 The name of first commercially available PC was: Select correct option: UNIVAC 1 ENIAC EDVAC Altair 8800 Question # 3 of 10 ( Start time: 05:22:43 PM ) Total M a r k s: 1 Algorithm is a ____________________ Select correct option: Definition of a problem Sequence of steps to solve a problem Understanding of a problem Solving a problem

Question # 4 of 10 ( Start time: 05:23:52 PM ) Total M a r k s: 1 A group of information is called __________________ Select correct option:

File Database Record Field

http://groups.google.com/group/vuZs

Question # 5 of 10 ( Start time: 05:24:17 PM ) Total M a r k s: 1 ___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics. Select correct option: Image Handling Image Processing Image Engineering None of these Question # 6 of 10 ( Start time: 05:25:34 PM ) Total M a r k s: 1 __________has changed our way of life like no other technology. Select correct option: Computational technology Computer technology Computing technology None of the Above Question # 7 of 10 ( Start time: 05:26:27 PM ) Total M a r k s: 1 Sophisticated event handling is not possible with _______________ event handling Select correct option: Off-Line In-Line Out-Line Non of the given choices Question # 8 of 10 ( Start time: 05:27:03 PM ) Total M a r k s: 1 Babbages Analytical Engine could store information permanently in: Select correct option: Magnetic Tape Floppy Disk Punched Cards None of the given choices

Question # 9 of 10 ( Start time: 05:28:30 PM ) Total M a r k s: 1 There are __________ popular schemes to reduce the number of bytes that are required for storing graphics. Select correct option: 4 3 2 None of these

http://groups.google.com/group/vuZs

A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones: Color mapping Dithering

Question # 10 of 10 ( Start time: 05:30:01 PM ) Total M a r k s: 1 The internet-society is considered under Surveillance because: Select correct option:

http://groups.google.com/group/vuZs

While surfing, we are being watched, constantly Our every click is recorded and analyzed to extract patterns and behaviors Webcams are becoming common. Providing a cheap way for parents to watch their children's every move All of the given Which of the following is incorrect for making design elements legible? Select correct option: Elements should be large enough Elements must contrast sufficiently Related elements should be visually grouped Elements should have no visual focus

25.10 Making Display Elements Legible: 1. Designing (arranging) Display Elements


Elements must be large enough to be processed visually Elements must contrast sufficiently with their backgrounds Related elements should be visually grouped through the use of space, color, or graphical boundaries The relative levels of importance among elements in a display should be revealed graphically Question # 2 of 10 ( Start time: 05:03:37 PM ) Total M a r k s: 1 1. Function is also known as ______________. Select correct option: subprogram procedure subroutine All of given

Function:
A group of statements that is put together (or defined) once and then can be used (by reference) repeatedly on a Web page Also known as subprogram, procedure, subroutine

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET. Select correct option: 1973 1983 1972

None of the given choices

http://groups.google.com/group/vuZs

E-mail system has ______ component(s) 1983 - The TCP/IP protocols becomes the only set of protocols used on the ARPANET This sets a standard for all networks, and generates the use of the term Internet as the net of nets ARPANET splits into two nets to keep military & non-military network sites separate: ARPANET and MILNET Select correct option: E-mail client SMTP server POP3 server All of the given choices

_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element. Select correct option: Process Input or Output Decision Connector

Punched cards were replaced by: Select correct option: Floppy Disk Zip Drives Magnetic storage None of the given choices

http://groups.google.com/group/vuZs

Ref: http://en.wikipedia.org/wiki/Punched_card During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available.

The ________virus may display an annoying, but harmless message Select correct option: Malicious Neutral

Helpful DoS The internet communities are ___________. Select correct option: Geographical based Interest based Country based Religion based Question # 1 of 10 ( Start time: 04:51:32 PM ) Total M a r k s: 1 Because of spending more time on the internet, the distances among the families have been _____. Select correct option: Increased Expanded Contracted Shortened

Question # 3 of 10 ( Start time: 04:53:30 PM ) Total M a r k s: 1 Autonomous Web Agents are also known as _________________ Select correct option: Mobile Agents Softbots Both "Mobile Agents" & "Softbots" None of these

A communication protocol is a __________that governs the flow of information over a network. Select correct option: Set of Methods Set of Protocols Set of rules None of the given choices

http://groups.google.com/group/vuZs

Protocol
Rules governing communications over the network By default in a web page Hyper Link for another web page is represented as: Select correct option: Blue only Black and Underlined Blue and Bold Blue and Underlined The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________. Select correct option: Cooperation Shared responsibility Networking All of the given

Question # 7 of 10 ( Start time: 04:57:19 PM ) Total M a r k s: 1 Monitor is an example of __________devices Select correct option: Output Input Processing None of the given choices The code in the ________ portion is the right choice for developing larger JavaScript scripts Select correct option: Body At End Head Separate ____________________ based on the principles of the logical reasoning ability of humans. Select correct option: Genetic Algorithms Rule-based Systems Feed-Forward Network None of these

Rulebased Systems (1):


Based on the principles of the logical reasoning ability of humans

http://groups.google.com/group/vuZs

The key benefit of VPNs over conventional PNs is: Select correct option: Security Efficiency Lower Cost None of the given choices In __________________ automatic machines perform various tasks that were previously performed by humans. Select correct option: Fuzzy Logic Robotics Rule based Systems None of these

1.In a network, the computer that stores the files and process the data is named as a) Server b) Terminal c) Modem d) All of the above

2. Viruses are called that because a) They are viruses b) They can copy themselves and spread c) Both (a) and (b) d) None of the above

3. Which of the can't spread virus

a) An e-mail with attachment b) A plain text mail c) Downloading files over the web d) None of the above

4. There is a new anti-virus software update available, when it is downloaded to your computer a) Everyday b) Only in the night c) When you next switch on your computer d) All of the above

5. Numbers are stored and transmitted inside a computer in a) Binary form b) ASCII code form c) Alphabets form d) Numerical form

6. CPU capacity can be measured in a) BPS b) MIPS c) MHz d) MPI

7. MPIS stands for a) Million Instructions Per Second b) Million Instructions Per Season c) Monthly Instructions Per Second d) Million Inputs Per Second

8. LAN speeds are measured in a) BPS b) KBPS c) MBPS d) MIPS

9. Modem speeds are measured in a) BPS b) KBPS c) MBPS d) MIPS

10. BPS stands for a) Bits Per Second b) Bits Per Season c) Bytes Per Second d) Bits Per System

Chapter 14: Multiple Choice Questions 1. Demand for a given item is said to be dependent if a. the item has several children b. there is a deep bill of materials c. the finished products are mostly services (rather than goods) d. there is a clearly identifiable parent 2. Dependent demand and independent demand items differ in that a. for any product, all components are dependent-demand items b. the need for independent-demand items is forecasted c. the need for dependent-demand items is calculated d. all of the above are true 3. A master production schedule specifies a. the financial resources required for production b. what component is to be made, and when c. what product is to be made, and when d. the labor hours required for production 4. The ______ is(are) the MRP input detailing which end items are to be produced, when they are needed, and in what quantities. a. master production schedule b. gross requirements c. inventory records d. assembly time chart 5. A master production schedule contains information about a. quantities and required delivery dates of all sub-assemblies b. quantities and required delivery dates of final products c. inventory on hand for each sub-assembly d. inventory on hand for each final product 6. In continuous (make-to-stock) operations, the master production schedule is usually expressed in terms of a. end-items b. modules c. kits d. customer orders 7. In job shop (make-to-order) operations, the master production schedule is usually expressed in terms of a. end-items b. modules c. kits d. customer orders
2

8. The following table is an example of a(n)


Week 1 Week 2 Week 3 Week 4 Week 5 Clothes Washer 200 100 Clothes Dryer 300 100 100 100 Upright Freezer 200 500 a. aggregate plan b. load report c. master production schedule d. inventory record

9. The ______ is the input to Materials Requirements Planning which lists the assemblies, subassemblies, parts and raw materials needed to produce one unit of finished product. a. bill of materials b. net requirements chart c. inventory records

d. assembly time chart 10. A bill of materials lists the a. times needed to perform all phases of production b. production schedules for all products c. components, ingredients, and materials required to produce an item d. operations required to produce an item 11. One way to facilitate production scheduling and production in firms making a large number of different final products is to use a. planning bills b. modular bills c. phantom bills d. overdue bills 12. The bill of materials contains information necessary to a. convert (explode) net requirements at one level into gross requirements at the next level b. calculate quantities on hand and on order c. convert gross requirements into net requirements d. place an order to replenish the item 13. Which of the following statements best compares modular bills and phantom bills? a. Both pertain to assemblies that are not inventoried. b. There is no difference between the two. c. Both pertain to assemblies that are inventoried. d. Modular bills represent subassemblies that actually exist and are inventoried, while phantom bills represent subassemblies that exist only temporarily and are not inventoried. 14. Given the following bill-of-materials: If the demand for product A is 50 units, what will be the gross requirement for component E? a. 300 b. 100 c. 200 d. 250
3

15. The minimum record accuracy required for successful MRP is approximately a. lower than 90% b. 90% c. 95% d. 99% 16. Given the following bill of materials If the demand for product A is 50 units, what will be the gross requirement for component E? a. 50 b. 100 c. 150 d. 200 17. Given the following bill of materials If the demand for product A is 30 units, and there are on hand 10 units of B and none of C, how many units of part D will be needed? a. 3 b. 40 c. 70 d. 90
4

18. "Exploding" the bill of materials means a. converting the bill of materials into components and raw material requirements b. identifying the lead time of all the components c. determining the various components' quantities that are already on hand d. determining the net requirements for all the components

19. Low level coding means that a. a final item has only a few levels in the BOM structure b. it is the code for the missing items c. a component item is coded at the lowest level at which it appears in the BOM structure d. the top level of the BOM is below level zero and that BOM's are not organized around the finished product 20. Each X requires 2 of component Y; each Y requires 4 of part Z. The lead time for assembly of X is 1 week. The lead time for the manufacture of Y is 1 week. The lead time for the procurement of Z is 6 weeks. The cumulative lead time for X is _____ weeks. a. 48 b. 7 c. 8 d. 10 21. Each R requires 4 of component S; each S requires 3 of part T. The lead time for assembly of R is 1 week. The lead time for the manufacture of S is 2 weeks. The lead time for the procurement of T is 6 weeks. The cumulative lead time for R is ______ weeks. a. 6 b. 9 c. 12 d. 18 22. The MPS calls for 110 units of Product M. There are currently 30 of Product M on hand. Each M requires 4 of Component N. There are 20 units of N on hand. The gross requirements for N are a. 150 b. 170 c. 300 d. 320 23. The MPS calls for 50 units of Product A and 60 of B. There are currently 25 of Product B on hand. Each A requires 2 of Part C; each B requires 5 of C. There are 160 units of C available. The net requirements for C are a. 115 b. 175 c. 240 d. 690 24. The MPS calls for 110 units of Product A, there are currently 60 of Product A on hand. Each A requires 4 of Part B, there are 20 units of B available. The net requirements for B are a. 20 b. 120 c. 180 d. 240
5

25. In MRP record calculations, the appearance of a negative value for the gross requirements of an end item in a specific time bucket a. signals the need to purchase that end item in that period b. implies that value was scheduled by the MPS c. signals the need for a negative Planned Order Receipt in that period d. is impossible 26. A material requirements plan contains information with regard to all of the following except a. quantities and required delivery dates of all sub-assemblies b. quantities and required delivery dates of final products c. the capacity needed to provide the projected output rate d. inventory on hand for each final product 27. The number of units projected to be available at the end of each time period refers to a. net requirements b. scheduled receipts

c. the projected usage of the item d. the amount projected to be on hand 28. Linking a part requirement with the parent component that caused the requirement is referred to as a. net requirements planning b. a time fence c. pegging d. Kanban 29. In MRP, system nervousness is caused by a. management's attempt to continually respond to minor changes in production requirements b. the use of the lot-for-lot approach c. management's marking part of the master production schedule as "not to be rescheduled" d. the use of phantom bills of materials 30. One of the tools that is particularly useful in reducing the system nervousness in the MRP system is (are) a. modular bills b. time phasing c. time fences d. lot sizing 31. A major strength of MRP is its capability a. to minimize labor hours used in production b. for timely and accurate replanning c. to reduce lead times d. to maximize production throughput 32. Material requirements plan specify a. the quantities of the product families that need to be produced b. the quantity and timing of planned order releases c. the capacity needed to provide the projected output rate d. the costs associated with alternative plans
6

33. Which of the following statements is true about the MRP plan when using lot-for-lot ordering? a. The quantity of gross requirements for a child item is always equal to the quantity of planned order releases for its parent. b. The quantity of gross requirements for a child item is equal to the quantity of net requirements for its parent(s) multiplied by the number of child items used in the parent assembly. c. The quantity of gross requirements for a child item is always equal to the quantity of gross requirements for its parent. d. The quantity and gross requirements for a child item is always equal to the quantity of net requirements for its parent. 34. Which of the following lot-sizing-techniques results in the lowest holding costs? a. lot-for-lot b. EOQ c. part-period-balancing d. Wagner-Whitin algorithm 35. What lot sizing technique is generally preferred when inventory holding costs are extremely high? a. lot-for-lot b. EOQ c. part-period balancing d. the Wagner-Whitin algorithm 36. For the lot-for-lot lot-sizing technique to be appropriate a. future demand should be known for several weeks b. setup cost should be relatively small c. annual volume should be rather low d. item unit cost should be relatively small 37. MRP II is accurately described as

a. MRP software designed for services b. MRP with a new set of computer programs that execute on micro-computers c. MRP augmented by other resource variables d. usually employed to isolate manufacturing operations from other aspects of an organization 38. Enterprise Resource Planning (ERP) is a. severely limited by current MRP computer systems b. not related to MRP c. an advanced MRP II system that ties-in customers and suppliers d. not currently practical 39. The extension of MRP which extends to resources such as labor hours and machine hours, as well as to order entry, purchasing, and direct interface with customers and suppliers is a. MRP II b. Enterprise Resource Planning c. the master production schedule d. closed-loop MRP
7

40. Distribution Resource Planning (DRP) is a. a transportation plan to ship materials to warehouses b. a time-phased stock replenishment plan for all levels of a distribution network c. a shipping plan from a central warehouse to retail warehouses d. material requirements planning with feedback loop from distribution centers 41. In what way are Distribution Resource Planning (DRP) and Material Requirements Planning (MRP) similar? Both employ similar logic and procedures. Both are employed in a manufacturing organization. Both work most efficiently with largest lot sizes. Both are employed by retail organizations. 42. Enterprise resource planning (ERP) has existed for over a decade does not integrate well with functional areas other than operations is inexpensive to implement automates and integrates the majority of business processes 43. Enterprise resource planning (ERP) has been made possible because of advances in hardware and software uses client/server networks creates commonality of databases All of the above are true of ERP. 44. Which of the following is false concerning enterprise resource planning (ERP)? It attempts to automate and integrate the majority of business processes. It shares common data and practices across the enterprise. It is inexpensive to implement. It provides and accesses information in a real-time environment. 45. All of the following are advantages of enterprise resource planning (ERP) except it creates commonality of databases increases communications and collaboration worldwide helps integrate multiple sites and business units requires major changes in the company and its processes to implement Chapter 14: Multiple Choice Answers 1. d 2. d 3. c 4. a 5. b 6. a

7. d 8. c 9. a 10. c 11. b 12. a 13. d 14. a 15. d 16. a 17. c 18. a


8

19. c 20. c 21. b 22. c 23. a 24. c 25. d 26. c 27. d 28. c 29. a 30. c 31. b 32. b 33. b 34. a 35. a 36. b 37. c 38. c 39. b 40. b 41. a 42. d 43. d 44. c 45. d

You might also like