Ceriificate in Computing (Cic) Tbrn-End Examination: .Fune, 2008
Ceriificate in Computing (Cic) Tbrn-End Examination: .Fune, 2008
(E+H)
Tbrn-End Examination
'
.fune,2008
E---
Note:
(t) Do rwt stort enswering untit thz invillatur ashsyou to storrt..
fti) Qucsti.onpaper contd,its 100 quzstions. Studznt is requircd to dnswer dl! tha questin B.
T'lwre is no chnice.
(iii) Nl questions carry equal narha
i . .
v -. . . ('iul. Eoxh quastion tnwt he given .w ansunr op$". If .mon thta otu cnsurr is mdrhcd or
given, zem marh will be awdrdpd forthat quastion.
:
'
Note : Four choices are giuen fur a qunstinn, out of which oro cli'zl.icemq be correct. Marh
'
con?ct answer in relcuant colunn of thz answer sheet giwn n you. In care you feel tltat
'
.' norc of tlw choices given in a qrnstion is mrrect, ma,rh in column 'A.
grven by
18. The classi.fication of parallel computer is
(1) Atexz (2) FlYnn
L4.Thekindofresourceswhichneedtobeprotectedfromgimultaneousaccessofmorethanone
processes are called
(1) Mutua] Exclusion
(2) Critical Section
(3) Fair Scheduling
(4) None of these
introduced
19. The seconil era of comput'er systein evolution
(1) Distributed system
(2) Object-oriented sYstem
(3) Batch Processing
(4) MultiProgrammrng
(3) P'T'o'
c t c - 2( E + H )
20. Casetools are related with
(1) SDLC /tt arDTr
(3) Rrsc (4) Assembly language
21. Following is nof a valid type
of language tool which falls into 4GL
category :
( I ) Aseembler
(2) ApplicationGenerator
(3) Report Generator
(4) Decision Support System
Glc-2 (E+H)
(4)
*self replicating" program ?
,t8. Who frrst gave the concept
of
of
Porper ON self-test is a Part
(1) Booting
(2) CryPtograPhy
(3) Networking
(4) DisasterManagement
which file ?
30, System infector virus afiects
(1) Command'com
(2) Autoexesbat
(3) IBMDOS'com
(4) Index'bat
in
can be incorporated
t'he CHKDSK command
31' For Ptevention of vrrus
(1) Autoexec'bat
(2) Command'com
(3) Config'sys
(4) IBMDOS'com
ph"t"'
of
alternatives is a part
32. Identifying risk of various
(2) Design
(I ) Defrnition
(4) ImPlementation
(3) Requirement
(t) Briilge
(2) HighwaY
(3) Gateway
(4) Router
a task is calleil
wti tten in any language to achieve
A sequence of instructions
(1) Flow chari
(2) Algorithm
(3) Program
(4) Project
byt€s.
' 47. One MegabYteis equal to
(2) 1000
(1) 100
(4) 1024 x 1024
(3) 1024
a printer.
4E. DaisY wheel Printer is '
(2) Iine
. (1) char
(4) file
(3) Page
'49. developed by
Macintosh computers were
(1) APPIe
(4) Intel
(3) IBM
and
level
written in any high
ri^ reads the program
error'
Produces s)rntactical
(1) Compiler
(2) Interpret€r
(3) Assembler
(4) Linker
(7)
CIC-2(E+H)
------:-
C[C-A(E+H)
.(6)
-:--- -
60, Compilet i8 a system software'
industry'
71, MS-WORD is used to create presentations in t'he
organizatrons'
7i-, IJND( is an operating system suitable for very big
Operating System'
7E. l}ansparency is the main advantage of Distributcd
storage devices'
81. Secondary storage devices are slower than primary
: P.T.O.
CIC-2(E+H) (s)
t9, Scannerb an input dwice.
.T':
.'
tt,
CIC-2(E+H) ( 1 0)
fsG.ffi@l
sffiAtd il{ ts.sr$.rft.)
TITTKIqSan
qr{,2008
: cts\m
<ft.slr$.S.'z
efqndsei6 :1oo
4. PGA4r q4 i.
(1) Particle Gas Analyser
(2) Pin Grid Array
(3) Particle Grid Analyser '
i4). Pin Grid Analyser
o. 8088=_--- G-efrc i r
(I) s frs (2) 16fre
tsi +if tu €ihrzl (4) F{i + +$ Tfr
*.-Fqatflrffd{uriI
(r) q|{fi (2) fofr
13yffiq (4) gs{
ffidfud qrq Fqtt$ sirtrq at? d :
(l) E4 ERIfuffi{
12; fufrffiq srFTs-{E
(s) Erdfss *{r
(4) qqrq 3qfu + frqrq +r rqrs
qJsfrs i{ft{c x1dffi
*T-{sT * ?
(r) gq-fiq frE;
(z) Eq+tq 2q
(B) {'Ffi bs
. (4) 3Tsqrffi qfr
s. +s{ 6rd qfrrsR*Aeq=lilmrt r
(1) ROM
(2) PROM
(3) EPROM
(4) EEPROM
ro. fr"ry + + sffi ri+drgtu
- t ?
(1) $frTrfi
' e) r6pr ffi-
(3) LcD
@) fi*
lL DMA 6r aI{ d
(l) Direct Memory Access
(2) Dynamic Memory Access
,
(3) Dynamic Memory Analysis ,
(4) Direct Memory Analysis
( 1 4)
rz. tr€ itrfi fi'ansfiqfr crfrcRfrt
ru rirat+np6fr-6trsii tz) 'ifr cfutqE-st
rsl rifr xfd F-{c ii t+l Ye cft ft-i-J it
ls. grrc-(6!411 6I Efi*ltrl t<qr tcl t
ru qffirog gm tzl fime anr
rat tEq eRI (4) fr EEI
t {qr+d effi{6-dl+fr
sIFTrrc
+-
t.
14. {erlii 6r q6 *5RmScd + olnrdctfr{itt gqc-(
i, .r6-dTA
t
111 qqg{ 3{T{+{
<zl ntfr-*aqun
tal scEsFr+ff
r+l {ciin +i Tfi
rtfirrd-q{frqT qifd qTqqrtr{ +,qn 6I sq-q
rs. qRfl q-itfl sfu {iqffigd +e f*g
_6,q]{s€,
tD ql{fr rzl fi-fi
rF (s) +{hc (4) s
16. dBASE sqr6{oTt
tri scdFrf,T6r
tzr xqrd ficRrri qTsr6I
tai slisgr-{qc 6l
(al rqre-qir +t
6I qFTt I
az. Efr{ f{+Ftii + ificc fr rr{qn Erttr -cFftql
(1) cRqNI (2) Ff,r{4
t(a) o{rg{qfi-at . (4) B=t"*
3{6R {€rfrl t ?
:X. firqfofi*a li + +tfir qscT 'ExE$t corvr{ff*reit 6T
(r; it{.rnr (2) t{-ff
(3) +ssfrc (4) +{
P.T.O.
( 1 7)
CIC-2(E+H)
$5. or6fus dqn qT'rt : lt f:
(u frERqsqnit+r
rzt arJTfuolwnit
+r
(s) qsnfls sqrritqr
r+r {qitn +$ i-fi
qliq qr sdqq i
rrr iElqR'Vt6-e il feq{
rz) qffi t#r er mrh
te; q$ trfw{f, t*a +r egww+
(4) gflEf,"r{*-a *r mqsa *+o t sqfarq
8?, Trq6'Tc{ tffiql s*-s BS w+ t
ru d) Ti{dq+ fds
(2) cuIII
(3) f+snfr
(4) =c{s q i + { r f f
,3E. EqF*t{ gfu t r
(rl friw
<a)+ii tu ethrsl
89, neu t
qrmt ?
lr. fiiqfefu-ct t +t{ff 6qt{ qmfic n ryfi rl7 aqr
rrr tt -'J
(2) IrdrcH
(3) ERqE
(4) qFl6
+-eerar
46. qrdcrq 6d + rds ffi fi rnqri Fsd.rq a-ga{im ergm+ i
11y YqrdsrJ
'
tzl qeiRcq
rsl xqtvt
ral qR-frqcl
( 1 e) P,T,O.
CIC-z(E+H)
;ie: s?+sows Rs rS d t 4E ftqxTrqT
6{4 sA d al t dfud d, sHEr ss €rH
qR qw
w o eiihd 6t, qaa al t
'66. if-ttren-else
XF*iqfg+ $q{ t I
OlC,2 (E+H) ( 2 0|
09, tr{qrr6 iifl (R{a) xffi+t d t
grh
75. rsBNsifrq {qrtr q n+q 6{A gq qr{, qi-+-Er *ffi n-qrcitfl q+t+tq A
i r
za. r+thn rqrcq dr or 5w enT crGftTfrT
( 2 1) P.T.O.
crc-2(E+H)
89, nr{v+ f+*wgtu t r
90, {qis dfqcf1idrtr + cwd + ffis
$M S a.rnfr t I
91. fu€ {trw frzt qgrqtrqr+frr fr€r +1irh{r ifim t( + I
92, qsr +s s6e bse{ 6{i + lds rSs frlr qnr
t r
s3. {e-m +q'a €rjeTTfs{c++1cb.qr€ r
94. upsqerqrgfu +r r+rrqt r
95. cPUEeTsqitrcEfut r
96. fr++ wonusS +reri t r
97, fqt .b"'pur.gir{fu6ri d{ +1qr qsfi S r
98. qs ilFs d roft-adfr t r
99, qqfrd il{ {s{Er qtq.q 6r ysq
t I
100, +sidror qrer €ErRRr rttqrqr rqFtor
I r
CIC-2(E+H) ( 2 2)