1. What is
the process at the most detailed level of the data flow diagrams known as?
A.Interfaces
B.functional primitives
C.data flow
D.transform descriptions
Answer: B) The process at the most detailed level of the data flow
diagrams known as functional primitives
2. Total
bits used by the IPv6 address is ________
A.64 bit
B.256 bit
C.128 bit
D.32 bit
Answer: C) Total bits used by the IPv6 address is 128 bits.
3. Identify
the language which is mainly used for Artificial Intelligence
A.Java
B.J2EE
C.Prolog
D.C
Answer: C) Prolog is used for Artificial Intelligence.
4. Why is a
firewall used in a computer?
A.Monitoring
B.data transmission
C.Authentication
D.security
Answer: D) Firewall is used in computers for security.
5. The full
form of DOM is?
A.Document-oriented memory
B.document object model
C.document object memory
D.none
Answer: B) DOM stands for document object model.
6. How many
levels are there in the architecture of the database?
A.2
B.3
C.4
D.5
Answer: B) There are three levels of architecture in the database -
physical level, the view level, and user level.
7. Among
the following which is not a database management software
A.MySQL
B.COBOL
C.Sybase
D.Oracle
Answer: B) COBOL is not a database management software
8. Identify
the total standard color names that HTML supports.
A.30
B.70
C.140
D.120
Answer: C) HTML supports a total of 140 standard color names.
9. Choose
the port number of FTP.
A.23
B.21
C.110
D.143
Answer: B) The port number of FTP is 21
10. Total
number of layers in OSI model is ___________
A.5
B.7
C.9
D.11
Answer: B) The total number of layers in the OSI model is 7.
11. UNIX is
written in which language?
A.C#
B.C++
C.C
D..Net
Answer: C) UNIX is written in C language. It was developed in the
1970s at AT & T Bell laboratories.
12. Identify
the different features of Big Data Analytics.
A.open source
B.data recovery
C.Scalability
D.All of the above
Answer: D) All of the above are features of Big Data Analytics
13. Which
of the following is an extension of image file?
A..mkv
B..gif
C..txt
D..vdf
Answer: B) .gif is an extension of image file.
14. Dbase
III is?
A.Hardware
B.Firmware
C.application software
D.operating system
Answer: C) dBase III is Application software.
15. The
main memory of a computer system is?
A.Non-volatile
B.Volatile
C.Restricted
D.Unrestricted
Answer: B) Main memory of a computer system is volatile
16. Identify
among the following servers which allow LAN users to share data.
A.Communication server
B.Point server
C.Data server
D.File server
Answer: D) File server allows LAN users to share data.
17. URL
stands for _______________
A.Uninterrupted data locator
B.Uninterrupted record locator
C.uniform record locator
D.uniform resource locator
Answer: D) The full form of URL is a uniform resource locator.
18. SSLstands
for _______________
A.secure socket layer
B.secure secret level
C.secure system level
D.section security layer
Answer: A) The full form of SSL is a secure socket layer.
19. Which
of the following is not a SQL command?
A.DELETE
B.ORDER BY
C.SELECT
D.WHERE
Answer: A) DELETE is not a SQL command
20. Identify
the range of byte data types in JavaScript
A.-10 to 9
B.128 to 127
C.-32768 to 32767
D.-2147483648 to 2147483647
Answer: B) the range of byte data type is - 128 to 127.
21. Computer
word size is a multiple of ______ bits
A.4 bits
B.10 bits
C.16 bits
D.1024 bits
Answer: C) Computer word size is a multiple of 16 bits
22. OCR
stands for _____________
A.Online computer retrieval
B.office cash receiver
C.optical character reader
D.optical card reader
Answer: D) OCR stands for optical card reader.
23. Testing
of program’s corporate is known as?
A.System testing
B.isolation testing
C.pilot testing
D.unit-testing
Answer: D) Testing of program’s corporate is known as unit testing.
24. Information
in computer read-only memory stored by
A.Engineer
B.Programmer
C.Manufacturer
D.user
Answer: C) Information in computer read-only memory is stored by the
manufacturer.
25. Device
driver required in?
A.Register
B.Main memory
C.Disk
D.Cache
Answer: C) A disk drive is a device driver that allows a specific
disk drive to communicate with the remainder of the computer. A good example of
this driver is a floppy disk drive.
26. Identify
the call which never returns an error?
A.fork
B.getpid
C.ioctl
D.open
Answer: B) The call getpid never returns an error
27. The
total view of a database is known as?
A.Physical view
B.Internal view
C.Conceptual view
D.External view
Answer: C) The conceptual view is referred to as the total view of a
database
28. Which
of the following does computer hardware consist of?
A.storage devices
B.CPU
C.I/O devices
D.all of the above
Answer: D) computer hardware consists of All of the above.
29. In what
terms is Computer memory measured?
A.Units
B.Bits
C.Cells
D.bytes
Answer: D) Computer memory is measured in terms of bytes.
30. Which
of the following memory of the computer is volatile?
A.EEPROM
B.RAM
C.ROM
D.CMOS
Answer: B) RAM is volatile.
31. Which
of the following computer memory users cannot write any information or
instruction?
A.EEPROM
B.RAM
C.ROM
D.CMOS
Answer: B) Users cannot write any information or instruction on ROM.
32. Which
of the following commands in UNIX is used to send a signal?
A.send
B.kill
C.sigsend
D.none
Answer: B) kill is used to send a signal in UNIX
33. Using
which of the following is the interconnection of the computer possible?
A.communication links
B.Cables
C.information technology
D.processing
Answer: C) Using information technology, interconnection of computer
is possible.
34. Where
is computer firmware present?
A.Cache memory
B.non-volatile memory
C.Volatile memory
D.RAM
Answer: B) Computer firmware is present in non-volatile memory.
35. LPT
stands for ______________
A.Low print typewriter
B.line per text
C.line printer
D.laser printer
Answer: C) LPT stands for Line printer.
36. What
are modern computers based on?
A.Microchip
B.Microprocessor
C.I/O devices
D.both a and b
Answer: B) Modern computers are based on both microchips and
microprocessors.
37. What else
is a command interpreter called?
A.prompt
B.kernel
C.command
D.shell
Answer: D) A command interpreter is also called the shell.
38. The
computer system which uses a drum plotter is known as?
A.mini computer
B.Mainframe computer
C.Both A and B
D.none
Answer: C) Computer system which uses drum plotter is known as both
mini and mainframe computer.
39. Which
of the following is known as an uninterruptible unit?
A.single
B.static
C.atomic
D.none of the mentioned
Answer: C) Atomic is known as an uninterruptible unit. That is,
whenever a process start executes, it doesn’t terminate or context switch until
its complete execution
40. Where
can the data be updated?
A.Informational environment
B.Data warehouse environment
C.Operational environment
D.Data mining environment
Answer: C) Data can be updated in an operational environment
41. Identify
the one which is not a networking device.
A.Switch
B.Traffic analyzer
C.Bridge
D.Router
Answer: B) Traffic analyzer is not a networking device
42. The
standard length of the MAC address is
A.16 bits
B.48 bits
C.32 bits
D.8 bits
Answer: B) Standard length of MAC address is 48 bits
43. Which
of the following is not an operating system?
A.Linux
B.DOS
C.Oracle
D.Windows
Answer: C) Oracle is not an operating system. It is a relational
database management system, also known as Oracle Database
44. Through
API, _____ service portability is enabled.
A.device
B.network
C.services
D.systems
Answer: D) Through API, systems service portability is enabled
45. What is
a table joined with itself called?
A.Join
B.Self-join
C.Outer join
D.Equi join
Answer: B) Table joined with self is known as Self Join
46. Which
of the following is a single-user operating system?
A.Windows
B.Ms-DOS
C.MAC
D.None
Answer: B) Ms-DOS is a single-user operating system.
47. Choose
among the following, which is the most common internet protocol.
A.PPP
B.FTP
C.TCP/IP
D.SMTP
Answer: D) SMTP is the most commonly used internet protocol.
48. Full
form of SBC is?
A.Standard business center
B.Smart business center
C.Standard building center
D.Smart building center
Answer: B) SBC stands for Smart business center
49. Another
name of reading operation in?
A.store operations
B.access operation
C.Fetch operation
D.control operation
Answer: C) Read operation is also known as fetch operation.
50. What is
the total number of users that can use a microprocessor at a time?
A.Single users
B.Multi-user
C.particular user
D.professional user
Answer: A) Only a single user can use a microprocessor at a time
0 Comments